Department of Computer Engineering 2 Shift 310252: Embedded Systems and Internet of Things Multiple Choice Questions and Answers
Department of Computer Engineering 2 Shift 310252: Embedded Systems and Internet of Things Multiple Choice Questions and Answers
Department of Computer Engineering 2 Shift 310252: Embedded Systems and Internet of Things Multiple Choice Questions and Answers
Unit I
Introduction to Embedded System and Internet of Things
Answer: d
Q2) MQTT is better than HTTP for sending and receiving data.
a)True
b) False
Answer: a
Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.
Answer: a
Explanation: The RPi can be used without additional hardware (except perhaps a power supply of
some kind), it won’t be much use as a general computer. As with any normal PC, it is likely you need
some additional hardware.
Answer: a
Explanation: The RPi has no internal storage or built-in operating system it requires an SD-card that
is set up to boot the RPi.
Answer: a
Explanation: The unit uses a Micro USB connection to power itself (only the power pins are
connected so it will not transfer data over the connection). A standard modern phone charger with a
micro USB connector will do, but needs at least 700 mA at 5 volts.
Answer: d
Explanation: ARM assembler is used in Raspberry Pi. Machine language is built up from discrete
statements or instructions implemented by a particular processor.
Answer: c
Explanation: Linux users. User management in Raspberry is done on the command line. The default
user is Pi, and the password is raspberry. You can add users and change each user’s password.
Answer: a
Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.
Unit II
Embedded IoT Platform Design Methodology
Answer: b
Explanation: The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor,
making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.
Answer: a
Answer: b
Answer: b
Answer: b
Answer: b
Answer: c
Answer: b
Unit III
Pillars of Embedded IoT and Physical Devices
Answer: a
Q22)Raspbian is:
a. Assembler
b. Language
c. Compiler
d. OS
Answer: d
Answer: b
Q24)Secure shell (SSH) network protocol is used for
a. remote command-line login
b. remote command execution
c. all of the mentioned
d. secure data communication
Answer: c
Q25)Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.
Answer: d
Answer: c
Q27) The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these
Answer: a
Q28)
Q29)
Q30)
Unit IV
IoT Protocols and Security
Answer: d
Explanation: SPI uses separate clock and data lines, along with a select line to choose the device
we wish to talk to.
Explanation: MOSI is the logic signal. The data will be sent to the slave from master.
Answer: a
Explanation: As we don’t have start and stop bits, so the data can be streamed continuously without
interruption.
Answer: c
Explanation: SPI devices communicate in full duplex mode using master-slave architecture with a
simple master.
Answer: a
Explanation: This protocol will address a large number of slave devices that are connected to the
same bus.
Answer: d
Explanation: I2C pronounced as I-squared-C, is a multi master, multi salve. It is typically used for
attaching lower-speed peripheral IC’s to processors and micro controllers in short distance, intra
band communication.
Q37) Typical voltages used are ___________
a) 5v
b) 3.3v
c) 5v or 3.3v
d) 2.5v
Answer: c
Explanation: I2C uses only two bidirectional open drain lines, SDA and SCL. Typical voltages used
are 5v or 3.3v, although system with other voltages is permitted.
Answer: c
Explanation: IoT devices are naturally vulnerable to security threats. There is a high level of
transparency and privacy issues with IoT.
Q39) ___________ Service is responsible for establishing the requested service with in the cloud
database.
a) Suspend
b) Resource Discovery
c) Unregister
d) Register
Answer: d
Explanation: Register service is responsible for establishing the requested service with in the cloud
database. To this end, it initially identifies and logs all the sensors which are pertinent and or needed
for delivering the requested IoT service.
Answer: a
Explanation: Enable from suspension service enables the previously suspended services. The data
structures holding the service’s meta data in the cloud are appropriately updated.
Unit V
Web of Things and Cloud of Things
Answer: c
Answer: d
Answer: b
Answer: c
Answer: d
Answer: a
Q47) What happens when url.py file is edited while the development server is still running?
Answer: b
Answer: a
Answer: d
Explanation: The most commonly used services uses a set of discovery and description
protocols based on WSDL.
Unit VI
IoT Physical Servers, Cloud Offerings and IoT Case Studies
Answer: b
Explanation: There are alternative sets of standards as well.
Q51) Applications such as a Web server or database server that can run on a virtual
machine image are referred to as ______________
a) virtual server
b) virtual appliances
c) machine imaging
d) all of the mentioned
Answer: b
Explanation: The name virtual appliance is a little misleading because it conjures up the
image of a machine that serves a narrow purpose.
Q52) Amazon Machine Images are virtual appliances that have been packaged to run on
the grid of ____ nodes.
a) Ben
b) Xen
c) Ken
d) Zen
Answer: b
Explanation: You run across virtual appliances in IaaS systems such as Amazon’s Elastic
Compute Cloud.
Answer: d
Explanation: Through hardware virtualization on Xen hypervisors, Amazon.com has made it
possible to create private virtual servers that you can run worldwide.
Our telegram channel - https://t.me/sppumcq
click here to join
Unit I : Fundamentals of IoT & Unit II :Sensors Networks
Answer: d
Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs
on top of the TCP/IP protocol.
Answer: a
Explanation: We want to send and receive data in real time through internet and RESTful API is not the most
appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.
Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.
Answer: a
Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe
mechanism.
6. PubNub publishes and subscribes _________ in order to send and receive messages.
a) Network
b) Account
c) Portal
d) Keys
Answer: d
Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages
in the network.
7. By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
Answer: b
Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and
paste each of these keys to use them in our code that will publish messages and subscribe to them.
Answer: c
Explanation: The 7 main elements are : sensor middleware (X-GSN), cloud data storage, scheduler, service delivery and
utility manager, request definition, request presentation, configuration and monitoring.
Answer: a
Explanation: GSN is developed on the observation that most of the requirements for the application development sensor
network are same. Having each sensor network development using its own custom software not only increases the cost but
also takes time for development and deployment.
10. One of the main characteristics of Linked Stream Data is “Live Streaming”.
a) True
b) False
Answer: a
Explanation: Most of the data on the web is from sensing devices. To facilitate the integration of data from sensed devices
and other sources, both sensor stream source and data are being enriched with schematic descriptions, creating Linked
Stream Data. It shows the live data depending on our application.
11. The huge number of devices connected to the Internet of Things has to communicate automatically, not via humans.
What is this called?
a) Skynet
b) Bot 2 Bot
c) Machine 2 Machine
d) Intercloud
Answer: c
Explanation: Devices are connected to other devices like mobiles, laptops, etc, to communicate among themselves which is
called machine to machine and that involves wireless communication techniques, serial connection and powerline
connection.
12. Internet of Things needs a lot of network connection. What is the proposed “white Space” radio standard called?
a) Bluetooth
b) WiMax
c) Weightless
d) Zigbee
Answer: c
Explanation: White space is nothing but gaps that sit in the frequency band used to broadcast digital TV. The development
of so called “Weightless standard” is for the use of TV white space and for IOT/M2M purpose. The main intention is to
reduce the cost and power utilization.
Answer: b
Explanation: Constrained Application Protocol is a specialized web transfer protocol which enables constrained devices to
communicate over internet and it is required for GSN in transferring data stream.
Answer: d
Explanation: Wrappers are classified as remote and local wrappers in GSN. Unlike them, the ZeroMQWrapper is a core
wrapper which allows for publishing stream elements that are produced by a Virtual Sensor.
15. Open IoT ontology is extending the W3C SSN ontology which supports the description of the physical and processing
structure of sensors.
a) True
b) False
Answer: a
Explanation: Sensors are not constrained to physical sensing devices, rather a sensor is anything that can calculate the
value of the phenomenon. Thus, either a device or Computational process or a combination of them could play the role of a
sensor.
16. Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of objects, through
which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP
Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not only physical devices
but in general any abstract or concrete entity that observes features of any kind.
17. What happens when service providers change their operating system and communication protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises
Answer: a
Explanation: Complexity arises when service providers change their operating system and communication protocols, which
results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among
diverse services.
18. In SOA, Service is termed as __________
a) Software service
b) Network service
c) Business service
d) Developer service
Answer: c
Explanation: Services are termed as business services. They are self-contained and logical.
Answer: a
Explanation: They are loosely coupled. That means every service is self-contained and exists alone logically.
Answer: b
Explanation: The first which has direct relevance to the business as it carries out business functions. The second layer is t he
technical layer which talks about managing computer resources like a database, web server etc.
21. Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.
22. In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation
24. The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these
Ans: a
Ans: d
26.Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these
Ans: d
Ans: d
28.Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.
Ans: d
Ans:b
30.Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.
Ans: d
Ans: a
Ans: c
Ans: d
34.Which CoAP message transfers response from the server within the acknowledgment message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback
Ans: d
Ans: a
36.Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these
Ans: a
Ans: a
Ans: d
39. Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these
Ans: d
Ans: a
41. The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64
Ans: b
Ans: b
43. This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these
Ans: a
44. The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
d. All of these
Ans: d
Ans: c
Ans: C
Ans: d
Ans: d
Ans: d
51. With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage
Ans: a
52.A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage
disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated
Ans: b
53. A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these
Ans: b
Ans: b
Ans: d
Ans: c
Ans: d
Ans: a
59.With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these
Ans: d
Ans: d
61. A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these
Ans: a
Ans: d
63. What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)
Ans: a
Ans: a
65. Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay
Ans: c
Ans: d
67. What is the servo library command to move the shaft of Servo motor back and forth across 180 degree?
a. Knob()
b. Sweep()
c. write()
d. detach()
Ans: b
Ans: c
69. Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()
Ans: d
70. Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these
Ans: d
Ans: a
Ans: b
Ans: a
Ans: a
Ans: d
Ans: b
77. What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN
Ans: c
Ans: b
Ans: d
Ans: b
81.Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data center
d. Cloud
Ans: b
82. The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen
Ans: c
Ans: a
84. Application program interface (API) used between data and control planes in SDN is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans:c
Ans: a
86. In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on OpenFlow protocol
Ans: a
Ans: a
88. Application program interface (API) used between application and control planes is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans: a
Ans: d
90. Typically, __ protocol is used in low-rate wireless PANs:
a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above
Ans: a
Ans: d
92. From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources
Ans: b
Ans: c
Ans: a
Ans: c
96. Billing information is calculated using
a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above
Ans: c
Ans: a
Ans: d
Ans: b
Ans: b
Ans: a
102. We normally take snapshot in Openstack, _.
a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet
Ans: a
Ans: b
Ans: d
105. What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above
Ans: c
Ans: c
107. If the time-sensitive data are sent to cloud for analysis, the latency will be __
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased
Ans: a
108. What is a good approach to reduce latency?
a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes
Ans: a
Ans: a
Ans: a
Ans: a
112. Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors
Ans: d
113. Smart Agriculture incorporates:
a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
c. Both the above
d. None of these
Ans: b
Ans: d
115. Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks
Ans: a
116. Which of these connects cable-based networks with wireless networks for increased sharing of media,
control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi
Ans: b
Ans: c
Ans: a
119. The V2X paradigm is not restricted to a single source information provider.
a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True
Ans: a
Ans: d
Ans: b
Ans: a
Ans: d
Ans: b
125. In IIoT environment, networks can
a. Communicate with each other, external environment and people.
b. Communicate with each other, but not with external environment and people.
c. Does not communicate with each other, but communicates with external
environment.
d. Communicate with each other, but not with people.
Ans: a
Ans: b
127. What is the key technology to enable V2V and V2R communication?
a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication
Ans: b
Ans: a
Ans: b
Ans: b
131.Mathematical model, which represents the relationship between variables, is termed as –
a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above
Ans: b
Ans: b
Ans: b
134. The primary challenges of an embedded operating system for WSN are
a. Small memory footprint
b. Low power and computing capability
c. Lack hardware parallelism
d. All of these
Ans: d
Ans: b
136. Which communication protocol is used between sensor devices in Ambusens WBAN system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1
Ans: d
137. Which privacy-aware scheme is used in Ambusens cloud framework
a. Hashing and reverse hashing of patient physiological data
b. Patient identity masking by hashing-based mechanism
c. Hashing and reverse hashing of physiological sensor ID
d. All of the above
Ans: b
Ans: d
139. Which of these sensors can be most appropriately used for activity monitoring in wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED
Ans: a
Ans: c
141. Which indicates the communication between internetworking devices and applications. a. Internet b.
Communication Devices c. Internet of things d. None of the above
Which indicates the computations at device level before the computed data is communicated through internet
a. Computing
b. Edge Computing
c. Communication
d. Internetworking
Ans: b
Ans: b
143. Which are the devices that sense the physical environments
a. Control units
b. Sensors
c. Firmware
d. PDU’s
Ans: b
Ans: a
Ans: c
Ans: a
Ans: a
Ans: d
IOT
Unit 3 & 4
1. What is NFC?
a)Short distance wireless communication technology
b)enhancement of ISO/IEC14443 standard
c)both a & b
d) cannot say
Answer: c
11. PubNub publishes and subscribes _________ in order to send and receive
messages.
a) Network
b) Account
c) Portal
d) Keys
Answer: d
50. Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP
Answer : a
55. ________ specification defining the PHY and MAC layer of low power devices.
a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer: d
58. Adheres to ________ approach for managing resources and support mapping to
HTTP.
a) RETful
b) IoT
c) Restful
d) RESTful
Answer : d
71. In IPv6, real-time audio or video, particularly in digital form, requires resources
such as __________
a) Fixed Bandwidth
b) Variable Bandwidth
c) High Bandwidth
d) Low Bandwidth
Answer : c
72. In practical IPv6 application, a technology encapsulates IPv6 packets inside IPv4
packets, this technology is called _______
a) Tunneling
b) Hashing
c) Routing
d) NAT
Answer: a
74. In the IPv6 header, the traffic class field is similar to which field in the IPv4
header?
a) Fragmentation field
b) Fast switching
c) TOS field
d) Option field
Answer : c
75. Which are the features present in IPv4 but not in IPv6?
a) Fragmentation
b) Header checksum
c) Options
d) All of the mentioned
Answer : d
76. IPv6 is designed to allow extension of the _________
a) Protocol
b) Dataset
c) Headers
d) Routes
Answer: a
82. How many messages will HTTP will send per hour?
a) 1,708
b) 160,278
c) 3,628
d) 263,314
Answer: a
83. IP is connectionless.
a) True
b) False
Answer : a
85. __________ layer is the communication layer that connects the IoT devices with
WAN.
a) Internet layer
b) Application layer
c) Sensor layer
d) Network layer
Answer : d
86.
87. What is the format of IP address?
a) 34 bit
b) 64 bit
c) 16 bit
d) 32 bit
Answer: d
88. MQTT is better than HTTP for sending and receiving data.
a) True
b) False
Answer: d
1) All questions are Multiple Choice Questions having single correct option.
7) Use only black/blue ball point pen to darken the appropriate circle.
Q.no 1. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.
A : Virtual
B : System Model
C : Attributes
D : Domain Model
Q.no 2. Which company played a key role in the development of cloud computing?
A : Microsoft
B : Google
C : Amazon
D : Cloudera
Q.no 3. MQTT protocol is based on
A : Client-Server Architecture
B : Publish-Subscribe Architecture
Q.no 4. In M2M/ IoT protocols the payload and hearder is very __________
A : Small
B : Big
D : Moderate
C : Integration of Applications
D : None of above
A : Application
B : Physical
C : Transport
D : Session
Q.no 8. Unique ID for each device in skynet is _______
A : SSID
B : UID
C : UUID
D : ID
Q.no 9. Which of the following feature is used for scaling EC2 sites ?
A : Auto Replica
B : Auto Scaling
C : Auto Ruling
A : a) Online control
B : b) Direct control
C : c) Supervisory control
D : d) Automatic control
A : Data
B : Message
C : Network
D : Device
A : DDL
B : XML
C : SOA
D : SODA
Q.no 13. SOA stands for ……….
A : SAS20
B : SAS70
C : SAS702
A : HTTP
B : MQTT
C : SMTP
D : CoAP
A : a) Software
B : b) Process
C : c) System
D : d) Hardware
Q.no 18. Making the smaller and smaller things have the ability to connect and
interact.
A : a) Micro Tech
B : b) Smart tech
C : c) Nano tech
D : d) RFID
A : a) Machine to Machine
B : b) Internet of Things
D : d) Machine Things
Q.no 20. Which one is the Last step in IOT Platforms Design Methodology
A : Application Development
D : Service Specification
A : Model
B : View
C : Template
A : IEEE 1459
B : IEEE 1451
C : IEEE 1441
D : IEEE 1414
Q.no 23. WAMP uses _____ messaging pattern
A : Function call
B : Procedure call
C : RPC
D : Web based
Q.no 24. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?
A : Salesforce
B : The force.com
C : Amazon
D : Cloudera
Q.no 25. What are the parameters that are default values?
A : a) Arch Linux
B : b) Debain
C : c) Fedora Remix
A : Sensors
B : Gateways
C : Processors
D : Applications
Q.no 28. Which one is not True regarding WebSocketAPIs
A : bi-directional
B : Full duplex
C : Not Secure
Q.no 29. This protocol is lightweight in nature and is ideal for connecting small
devices to constrained networks
A : MQTT
B : CoAP
C : IPv4
D : IPv6
B : Option I and II
D : Option III
Q.no 33. Which statement is True for Real Time Operating System (RTOS):
D : All of Above
Q.no 34. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device
A : Network router
B : Digital camera
C : Music player
D : All of these
Q.no 35. Which of the following Hardware can be alone used as IoT Gateway
A : a) RaspberriPI
B : b) NodeMCU ESP8266
C : c) Arduino UNO
D : d) Both a and b
Q.no 36. Gateway provides the connection between _____ and _____
A : FM Radio
B : low-power High-bandwidth
C : Balestic Missile
Q.no 38. ………. Middleware include all enterprise middleware, B2B, EAI, multi-
tenant App servers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
A : Connectionless
B : Connection-Oriented
C : OTA
Q.no 40. Which of the following is not a correct way to secure communication
layer
B : TLS/SSL
D : Firewalls
A : 1)Hard RTOS
B : Soft RTOS
C : Firm RTOS
D : Embedded RTOS
Q.no 42. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.
A : Grid Computing
B : Data Mining
C : Cloud Computing
D : Business Intelligence
A : a) 64-bit
B : b) 32-bit
C : c) 128-bit
A : Option I and II
D : Option I not IV
A : EBS
B : ECS
C : Cloud
D : Database
B : Easy installation.
A : a) Microsoft SQL
B : b) Postgres SQL
C : c) Mongo DB
A : Thumb
B : Cache
C : Fast Multiplier
D : None Of Above
B : shared by several organizations and supports a specific community that has shared
concerns.
Q.no 51. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
Q.no 52. From following which one is not fit for IOT Level
A : IOT LEVEL 1
B : IOT LEVEL 2
C : IOT LEVEL 3
D : IOT LEVEL 11
A : SOA
B : EBS
C : GEC
D : Option 2 and 3
Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.
A : deployment
B : characteristic
C : solution
D : service
Q.no 57. In threat modeling, what methodology used to perform risk analysis
A : DREAD
B : OWASP
C : STRIDE
D : DAR
A : Data Availability
B : Trust Management
C : Data Confidentiality
D : Secure Storage
Q.no 59. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
B : Distributed systems
C : Mobile systems
D : Super computers
B:3
C:5
D:6
Q.no 2. Which one is the First step in IOT Platforms Design Methodology
D : Service Specification
A : DNP3
B : T101
C : Both A & B
D : IPv4
A : WAMP
B : HTTP
B : Microsoft Azure
C : AWS
A : Static
B : Dynamic
C : Hybrid
D : Mixed
A : Amplifier filter
B : Noise Filter
C : Round Filter
D : Frequency filter
Q.no 10. The Functional View (FV) defines the functions of the IoT systems
grouped into various ----------.
A : a) RFID
B : b) Sensor
C : c) Nano tech
D : d) Server
A : a) Wireless fidelity
B : b) Wireless Flexibility
C : c) Wide Fidelity
D : d) WAN Flexibility
A : Composition Layer
B : Sharing Layer
C : Findability Layer
D : Accessibility Layer
A : a) Kevin Atrun
B : b) Kevin Atrhur
C : c) Kevin Ashton
D : d) Kevin Thomas
C : Fault Tolerance
Q.no 17. Process Specification is the ------ Step in IOT platforms Design
Methodology
A : First
B : Second
C : Third
D : Four
Q.no 18. Which of the following is billing and account management service ?
C : Amazon DevPay
D : Multi-Factor Authentication
Q.no 19. Which of the following is not the component of IoT Endpoint
A : Sensor
B : Gateway
C : Communication Module
D : MCU
A : CPU
C : networking capability
A : Amazon Prime
C : AWS Academy
A:1
B:2
C:3
D:4
A : PIN
B : Digital certificate
C : PAN
D : Biometrics
B : Printer
C : Watch
D : Washing Machine
Q.no 25. Which is true about model view controller architecture of Django
A : It represents by a database
A : a) LoRa
B : b) GSM
C : c) CDMA
D : d) LTE
A : Sensors
B : Actuators
C : RFID Tags
D : All of Above
Q.no 28. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.
Q.no 29. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
Q.no 30. Mention which markup language can be used in restful web api?
A : HTML
B:C
D : Option 1 and 2
A : 802.15.4
B : SCADA
C : RFID
D : BACNet
A : XML
B : HTML
C : JAVA
D : API
A : a) AI
B : b) ML
C : c) IOT
D : d) Internet
Q.no 36. Which of the following is a structured data store that supports indexing
and data queries to both EC2 and S3?
A : CloudWatch
B : Amazon SimpleDB
C : Amazon Cloudfront
Q.no 37. How many levels are present in a complex SCADA system?
A : a) 3 – levels
B : b) 5 – levels
C : c) 4 – levels
D : d) 6 – levels
A : Slower
B : Faster
C : none of above
D : All of Above
A : USE Cases
B : Processes
C : Views
D : Network Topology
A : Data collection
B : Data processing
C : Data communication
D : All of these
A : Software
B : Process
C : System
D : Hardware
Q.no 42. Which of the following tools are used for measuring I/O of system to
estimate transaction costs ?
A : EBS
B : IOSTAT
C : ESW
A : First
B : Second
C : Third
D : Last
B : shared by several organizations and supports a specific community that has shared
concerns.
B : b) Analyze
C : c) Examine
D : d) Rectify
Q.no 46. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client
B : client,AWS
C : only AWS
A : a) RTOS
B : b) Windows
C : c) Debian Linux
Q.no 48. Which step in in the IoT design methodology is the integration of the
devices and components.
A : Application Development
D : None of Above
A : ONLY (I)
B : ONLY (II)
A : Value-based verification
B : Identity-based verification
C : Name-based verification
D : Number-based verification
A : a) AWS IoT
C : c) PTC ThingWorx
Q.no 52. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
A : IEEE 802.16
B : IEEE 802.3
C : IEEE 802.11
D : IEEE 802.15
A : Physical
B : ZigBee device
C : Transport
D : IEEE 802.15.4
A : Google Map
B : MapReduce
Q.no 55. The processor must accept and process the frame before the next frame
is called as ______________
A : PLC
B : HMI
C : Alarm task
D : I/O task
Q.no 57. IaaS, PaaS and SaaS are three ……… models of cloud.
A : deployment
B : characteristic
C : solution
D : service
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.16
D : IEEE 802.15.4
A : Block
B : Logical Volumes
C : Distance
D : Signals
A : Network
B : Cloud
C : Devices
D : Connectivity
A : a) Default
B : b) User
C : c) Pi
D : d) Root
A : I2C
B : SSL
C : USART
D : TCP/IP
A : M2MXML
B : SDN
C : NFV
D : SNMP
A : Request – Response
B : Publish – Subscribe
C : Push-Pull
D : Exclusive Pair
A : Cloud Computing
D : Operating System
A : RESTful API
B : WebSocket API
C : HTTP
D : MQTT
A : CoAP
B : MQTT
C : XMPP
D : HTTP
Q.no 9. In 1999, Marc Benioff founded a company, which pioneered the multi-
tenant SaaS model, a new application-delivering mechanism. Which company is
that?
A : Salesforce
B : Oracle Siebel
C : SAP CRM
D : Infusionsoft
Q.no 10. Domain Model Specification is the ------ Step in IOT platforms Design
Methodology
A : First
B : Second
C : Third
D : Four
A : a) MQ Telemetry Things
B : b) MQ Transport Telemetry
C : c) MQ Transport Things
D : d) MQ Telemetry Transport
Q.no 12. Which of the following is storage data interchange interface for stored
data objects?
A : OCC
B : OCCI
C : OCMI
Q.no 13. How many categories of storage devices broadly exist in cloud?
A:1
B:2
C:3
D:4
A : General device
B : Information
C : IoT devices
D : Object
Q.no 15. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
A : Model
B : View
C : Template
Q.no 18. Which of the following impose additional overhead on clients and offer
faster transfer?
A : Block Storage
B : File Storage
C : File Server
B : State service
C : Controller Service
D : All of above
Q.no 20. The process of converting data into a format that can not be read by
another user
A : Registering
B : Locking
C : Encryption
D : Keying
A : RFID
B : Sensor
C : Nano tech
D : Server
A : a) processing
B : b) parallel processing
C : c) serial processing
D : d) multitasking
Q.no 23. Which of the following provide access for developers to charge Amazon's
customer for their purchases ?
A : FWS
B : FAS
C : FPS
B : Small Instance
C : Micro Instance
Q.no 25. Django interaction with application takes place with _____
A : Template
B : model
C : view
D : Service
Q.no 26. For constrained nodes and constrained networks in Internet of Things
which protocol is used.
A : IPv4
B : IPv6
C : CoAP
D : MQTT
Q.no 28. Which of the following is not the component of a SCADA system?
A : Database server
B : I/O system
C : PLC controller
D : Sparger controller
Q.no 29. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
Q.no 30. Which of the following is not the component of a SCADA system?
A : a) Database server
B : b) I/O system
C : c) PLC controller
D : d) Sparger controller
A : a) Raspberry Pi3
B : b) Raspberry Pi Zero WH
C : c) Raspberry Pi Zero W
D : d) Raspberry Pi Zero
Q.no 32. The …….. has features such as offline support, canvas drawing based on
low footprint SVG graphics, GeolocationAPI, video and audio streaming support
with flash, WebStorage, CSS3 Selectors, 2D animation for mobile cloud
applications.
A : HTML5
B : HTML4
C : HTML3
D : HTML2
B : innovation
C : inhibit change
D : change
Q.no 34. Applications using managed cloud storage are __________ as a Service Web
service.
A : Infrastructure
B : Platform
C : Software
Q.no 35. Gateway provides the connection between _____ and _____
Q.no 36. List out the tools or API for developing or testing web api?
B : Jersey API
C : Axis
D : All of above
A : HTTP
B : REST
C : Web Socket
A : ISO-based network
B : OSI-based network
C : ISI-OSI-based transport
D : ISO-based transport
Q.no 40. Which of the following factors might offset the cost of offline access in
hybrid applications?
A : Scalability
B : cost
C : ubiquitous access
Q.no 41. Which of the following layers are defined by the ZigBee stack?
A : Transport layer
B : Physical layer.
Q.no 43. The mango open source software platform for IOT and M2M has natural
fit between
A : CORBA &DOM
B : POJO & JSON
C : JASON &M2M
A : Transport Layer
B : Link Layer
C : Network Layer
D : Application Layer
A : 8-bit CISC
B : 8-bit RISC
C : 32-bit CISC
D : 32-bit RISC
B : shared by several organizations and supports a specific community that has shared
concerns.
B : DDOS
C : DOSD
D : SSOD
A : IASI
B : ASI
C : AMI
D : ASTI
B : Physical Entity
C : Virtual Entity
D : None of Above
A : 60 GHz
B : 2.4 GHz
C : Sub 1 GHz
D : 5 GHz
Q.no 52. Which if the following is Light waight protocol used of IoT Applications
A : a) MQTT
B : b) HTTP
C : c) WebSocket
B : EBS
C : GEC
D : Option 2 and 3
D : Application Management
A : Option I and II
C : Only Option I
Q.no 58. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by
A : IoT
B : WoT
Q.no 59. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive
A : Level1
B : Level 2
C : Level 3
D : Level 4
Q.no 60. ……. is the direct technological ancestor of cloud computing, which also
has roots in the COW technology.
A : Pervasive computing
B : Mobile computing
C : Grid computing
D : Quantum Computing
A : WAMP
B : HTTP
B : storage options
C : device options
D : All of above
A : System Model
B : Network Model
C : Domain Model
D : Basic Model
A:1
B : 10
C : 100
D : 110
A : RedHat Cloud
B : Microsoft Azure
C : AWS
D : Google Cloud Platform
A : IoT level
B : IOT BASICS
C : IOT PAYLOAD
D : IOT CHECKSUM
A : MQ Telemetry Things
B : MQ Transport Telemetry
C : MQ Transport Things
D : MQ Telemetry Transport
Q.no 9. Amazon S3 is
A:2
B:3
C:4
D:5
A : SAS20
B : SAS70
C : SAS702
Q.no 15. Which of the following system does not provision storage to most users?
A : PaaS
B : IaaS
C : CaaS
D : SaaS
A : a) 5
B : b) 2
C : c) 4
D : d) 3
A : Auditing
B : Authorisation
C : Authentication
D : Accounting
A : Data
B : Message
C : Network
D : Device
A : a) Cat5
B : b) Cat5e
C : c) Cat6
D : d) RJ45
A : Client
B : Server
C : Process
D : Batch
Q.no 21. The process of identifying assets and threats in an organisation is known
as
A : Threat Modeling
B : Security Auditing
C : Security Planning
D : Firewalling
Q.no 22. How many virtual servers can be launch with Amazon EC2 ?
A:1
B:2
C : Infinite
D:0
A : a) 24
B : b) 32
C : c) 64
D : d) 128
A : a) Wireless fidelity
B : b) Wireless Flexibility
C : c) Wide Fidelity
D : d) WAN Flexibility
D : None of Above
Q.no 27. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.
A : Grid Computing
B : Data Mining
C : Cloud Computing
D : Business Intelligence
Q.no 28. ________ is used to describe a perceived, quickly growing set of web based
applications.
A : Web 1.0
B : Web 2.0
C : Web 3.5
D : Web 4.0
A : UNIX
B : Raspbian OS
C : MAC
D : Windows
A : a) HTTP
B : b) CoAP
C : c) Both a and b
D : d) MQTT
A : 2.2 GHz
B : 3 GHz
C : 3.5 GHz
D : 2.4 GHz
A : Secure Storage
C : Trust Management
D : Data Availability
A : Only (I)
B : Only (II)
Q.no 35. Which of the following Hardware can be alone used as IoT Gateway
A : a) RaspberriPI
B : b) NodeMCU ESP8266
C : c) Arduino UNO
D : d) Both a and b
Q.no 36. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
Q.no 37. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of
A : 250 Kbits/s
B : 520 Kbits/s
C : 205 Kbits/s
D : 250 bits/s
Q.no 38. Range of Zigbee is low-cost and low-powered mesh network ___________
A : 10-100 meters
B : 100-1000 meters
C : 10-100 cm
D : 100-1000 cm
A : plant data
D : CBR Data
A : a) LoRa
B : b) GSM
C : c) CDMA
D : d) LTE
A : Sensors
B : Gateways
C : Processors
D : Applications
A : bi-directional
B : Full duplex
C : Not Secure
A : a) RETful API
B : b) RESTful API
C : c) HTTP
D : d) MQTT
Q.no 44. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.
Q.no 46. What is the typical range of transmission distance in a ZigBee network?
A : 5 m.
B : 50 m.
C : 500 m.
D : 5 km
Q.no 47. Which of there following wireless technology provide Mesh Network
architecture in easiest way
A : a) Bluetooth
B : b) ZigBee
C : c) Wi-Fi
A : Unidirectional
B : Bidirectional
C : both
B : Highly pipelined
D : All of Above
Q.no 50. Which step in in the IoT design methodology is the integration of the
devices and components.
A : Application Development
D : None of Above
A : Physical
B : ZigBee device
C : Transport
D : IEEE 802.15.4
A : Google Map
B : MapReduce
D : Hadoop
Q.no 53. IEEE 802.15.4 is a technical standard which defines the operation of
____________
A : LR-WPANs
B : USN
C : WSN
D : Zigbee
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.16
D : IEEE 802.15.4
Q.no 55. which of the following are IoT Plaftorms
A : a) AWS IoT
C : c) PTC ThingWorx
Q.no 56. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
B : Distributed systems
C : Mobile systems
D : Super computers
A : XMPP
B : TCP
C : CoAP
D : MQTT
A:3
B:4
C:5
D:6
A : HTTP
B : MQTT
C : SMTP
D : CoAP
A : SimpleDB
B : SQL Server
C : Oracle
D : RDS
Q.no 5. Which layer/layers of the OSI model does Web of Things (WoT) deals with ?
A : Application Layer
B : Network Layer
C : Transport Layer
D : Every layer
Q.no 6. Which of the following impose additional overhead on clients and offer
faster transfer?
A : Block Storage
B : File Storage
C : File Server
A : CoAP
B : MQTT
C : XMPP
D : HTTP
A : Better Availability
C : Fault Tolerance
Q.no 9. Which one is the Last step in IOT Platforms Design Methodology
A : Application Development
D : Service Specification
Q.no 10. Rate monotonic scheduling algorithm is an example of
____________category
A : Static
B : Dynamic
C : Hybrid
D : Mixed
Q.no 11. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
Q.no 12. AMIs are operating system running on ____ virtualisation hypervisor
A : Yen
B : Xen
C : Ben
D : Multi-Factor Authentication
Q.no 13. Making the smaller and smaller things have the ability to connect and
interact.
A : a) Micro Tech
B : b) Smart tech
C : c) Nano tech
D : d) RFID
A:4
B:3
C:5
D:6
Q.no 15. What are the parameters that are default values?
A : IaaS
B : SaaS
C : CaaS
D : Paas
A : a) MQTT
B : b) HTTP
C : c) CoAP
D : d) SPI
Q.no 18. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
A : a) Male HDMI
B : b) Female HDMI
A : Online control
B : Direct control
C : Supervisory control
D : Automatic control
C : Hierarchical Databases
D : Distributed Databses
A : Client-Server Architecture
B : Publish-Subscribe Architecture
A : MQ Telemetry Things
B : MQ Transport Telemetry
C : MQ Transport Things
D : MQ Telemetry Transport
A : Function call
B : Procedure call
C : RPC
D : Web based
A : a) MIPS
B : b) AutoBot
C : c) IoT Assistant
D : d) IoT
A : a) AI
B : b) ML
C : c) IOT
D : d) Internet
Q.no 29. DHT11 sensor is used to sens which of there wollowing parameters
A : a) Temperature
B : b) Pressure
C : c) Humidity
D : d) Both a and c
Q.no 30. Django forms and classes are created using _________
A : Template
B : view
C : Model
D : Django Services
A : a) X86
B : b) MSP
C : c) AVR
D : d) ARM
A : MTV
B : REST
C : Web Socket
A : a) More secure
B : b) Lightweight
D : d) a and b
Q.no 34. Which one of the following is the Zigbees operating mode?
A : Beacon
B : Base
C : WiFI
D : Zigbee
B : shared by several organizations and supports a specific community that has shared
concerns.
A : a) RTOS
B : b) Windows
C : c) Debian Linux
Q.no 37. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
A : Internet applications
B : Device applications
C : Wireless applications
D : Wired applications
Q.no 39. Goal of SWE is creation of web-based sensor networks to make all
sensors and repositories of
C : Providing connectivity
D : Option 1 and 2
B : Highly pipelined
D : None of Above
Q.no 42. OSGi (Open services Gateway initiative framework) is used for
D : Option 1 and 3
A : Transport Layer
B : Link Layer
C : Network Layer
D : Application Layer
C : Virtual Entity
D : None of Above
A : Application Development
Q.no 46. What are the essential tight constraint/s related to the design metrics of
an embedded system
A : PostgreSQL
B : MariaDB
C : Oracle
A : Web Security
B : Web Enhancement
C : Web Messaging
D : Web application
Q.no 49. WAMP follows ______ approach.
A : Connectionless
B : Connection-Oriented
C : OTA
A : 1)Hard RTOS
B : Soft RTOS
C : Firm RTOS
D : Embedded RTOS
A : Only III
A : Only III
Q.no 55. Exclusive pair communication model can be best described as ____________
A : Bidirectional , simplex
C : Unidirectional , simplex
Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.
A : deployment
B : characteristic
C : solution
D : service
D : Application Management
A : PLC
B : HMI
C : Alarm task
D : I/O task
Q.no 60. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
Q.no 1. Information Model defines the ------- of all the information in the IoT
system
A : Structure
B : service
C : Network
D : Device
A : IoT level
B : IOT BASICS
C : IOT PAYLOAD
D : IOT CHECKSUM
Q.no 3. Which of the following terms indicates that information is to be read only
by those people for whom it is intended?
A : Availability
B : Accounting
C : Integrity
D : Confidentiality
A : a) MQ Telemetry Things
B : b) MQ Transport Telemetry
C : c) MQ Transport Things
D : d) MQ Telemetry Transport
A : GPS
B : Message
C : Logging
D : Sensors
A : a) Kevin Atrun
B : b) Kevin Atrhur
C : c) Kevin Ashton
D : d) Kevin Thomas
A : MQ Telemetry Things
B : MQ Transport Telemetry
C : MQ Transport Things
D : MQ Telemetry Transport
A : SSID
B : UID
C : UUID
D : ID
A : a) USB connection
B : b) Internal battery
C : c) Charger
D : d) Adapter
Q.no 14. Which of the following is not the component of IoT Endpoint
A : Sensor
B : Gateway
C : Communication Module
D : MCU
Q.no 15. The entities, objects and concepts defined in the Domain Model
Specification
A : Physical Entity
B : Virtual Entity
C : Device
D : All of above
A : Client
B : Server
C : Process
D : Batch
Q.no 17. Which of the following is storage data interchange interface for stored
data objects?
A : OCC
B : OCCI
C : OCMI
A:1
B:2
C:3
D:4
A : a) RFID
B : b) Sensor
C : c) Nano tech
D : d) Server
A : Ubuntu
C : openSIS
D : Zimbra
A : a) 5
B : b) 2
C : c) 4
D : d) 3
Q.no 22. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?
A : Salesforce
B : The force.com
C : Amazon
D : Cloudera
A : Cloud Computing
D : Operating System
A : DDL
B : XML
C : SOA
D : SODA
A : Amplifier filter
B : Noise Filter
C : Round Filter
D : Frequency filter
A : 2.2 GHz
B : 3 GHz
C : 3.5 GHz
D : 2.4 GHz
B : Option I and II
D : Option III
A : POPMAIL
B : HTML/HTTPS
C : HTML/HTTP
D : SMTP
Q.no 30. How many levels are present in a complex SCADA system?
A : a) 3 – levels
B : b) 5 – levels
C : c) 4 – levels
D : d) 6 – levels
A : a) IEEE 802.15.4
B : b) IEEE 802.5
C : c) IEEE 802.4.13
D : d) Both a and b
B : MODBus
C : LRWPAN
D : WPAN
Q.no 33. Which of the following tools are used for measuring I/O of system to
estimate transaction costs ?
A : EBS
B : IOSTAT
C : ESW
A : Power
B : Controller
C : Scheduler
D : Package
A : Sensors
B : Gateways
C : Processors
D : Applications
A : a) Raspberry Pi3
B : b) Raspberry Pi Zero WH
C : c) Raspberry Pi Zero W
D : d) Raspberry Pi Zero
Q.no 37. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client
B : client,AWS
C : only AWS
Q.no 38. Applications using managed cloud storage are __________ as a Service Web
service.
A : Infrastructure
B : Platform
C : Software
A : a) 900MHz
B : b) 1.2GHz
C : c) 1GHz
D : d) 500MHz
A : UNIX
B : Raspbian OS
C : MAC
D : Windows
Q.no 41. Which of there following wireless technology provide Mesh Network
architecture in easiest way
A : a) Bluetooth
B : b) ZigBee
C : c) Wi-Fi
A : a) HTTP
B : b) CoAP
C : c) HTTPS
D : d) MQTT
B : shared by several organizations and supports a specific community that has shared
concerns.
A : USE Cases
B : Processes
C : Views
D : Network Topology
D : None of above
A : 1883
B : 8000
C : 8883
D : 8888
Q.no 49. ………. supports virtualization creates virtual versions of the resources
like servers, storage and OS.
A : Grid Computing
B : Data Mining
C : Cloud Computing
D : Business Intelligence
Q.no 50. Which of the following is a structured data store that supports indexing
and data queries to both EC2 and S3?
A : CloudWatch
B : Amazon SimpleDB
C : Amazon Cloudfront
A : Data Availability
B : Trust Management
C : Data Confidentiality
D : Secure Storage
Q.no 53. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive
A : Level1
B : Level 2
C : Level 3
D : Level 4
A : Block
B : Logical Volumes
C : Distance
D : Signals
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.16
D : IEEE 802.15.4
B : Distributed systems
C : Mobile systems
D : Super computers
A : XMPP
B : TCP
C : CoAP
D : MQTT
Q.no 58. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
A : IEEE 802.16
B : IEEE 802.3
C : IEEE 802.11
D : IEEE 802.15
Q.no 59. In threat modeling, what methodology used to perform risk analysis
A : DREAD
B : OWASP
C : STRIDE
D : DAR
Q.no 60. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by
A : IoT
B : WoT
A : a) Wireless fidelity
B : b) Wireless Flexibility
C : c) Wide Fidelity
D : d) WAN Flexibility
Q.no 3. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
A : System Model
B : Network Model
C : Domain Model
D : Basic Model
Q.no 5. Which of the following is billing and account management service ?
C : Amazon DevPay
D : Multi-Factor Authentication
A : a) Software
B : b) Process
C : c) System
D : d) Hardware
A : a) processing
B : b) parallel processing
C : c) serial processing
D : d) multitasking
Q.no 8. Information model adds more details to the Virtual Entities by defining
their ----------- and relations.
A : Virtual
B : System Model
C : Attributes
D : Domain Model
A : RESTful API
B : WebSocket API
C : HTTP
D : MQTT
Q.no 10. acroname of 6LoWPAN
Q.no 11. Which one is the First step in IOT Platforms Design Methodology
D : Service Specification
Q.no 12. How many categories of storage devices broadly exist in cloud?
A:1
B:2
C:3
D:4
A:2
B:3
C:4
D:5
A : M2MXML
B : SDN
C : NFV
D : SNMP
Q.no 15. In microcontrollers, UART is acronym of_____
A : IEEE 1459
B : IEEE 1451
C : IEEE 1441
D : IEEE 1414
Q.no 17. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).
A : Amazon Prime
C : AWS Academy
Q.no 18. In M2M/ IoT protocols the payload and hearder is very __________
A : Small
B : Big
D : Moderate
A : a) Machine to Machine
B : b) Internet of Things
D : d) Machine Things
A : CoAP
B : MQTT
C : XMPP
D : HTTP
A : PIN
B : Digital certificate
C : PAN
D : Biometrics
Q.no 23. Which of the following provide access for developers to charge Amazon's
customer for their purchases ?
A : FWS
B : FAS
C : FPS
A : HTTP
B : MQTT
C : SMTP
D : CoAP
Q.no 25. The control in SCADA is _____________
A : a) Online control
B : b) Direct control
C : c) Supervisory control
D : d) Automatic control
A : a) LoRa
B : b) GSM
C : c) CDMA
D : d) LTE
B : innovation
C : inhibit change
D : change
A : a) Arch Linux
B : b) Debain
C : c) Fedora Remix
A : Option I and II
D : Option I not IV
A : IASI
B : ASI
C : AMI
D : ASTI
A : Slower
B : Faster
C : none of above
D : All of Above
A : Internet applications
B : Device applications
C : Wireless applications
D : Wired applications
Q.no 34. Which step in in the IoT design methodology is the integration of the
devices and components.
A : Application Development
D : None of Above
B : Realtime state
C : none of above
Q.no 36. Which of the following is (are) example(s) of embedded system for data
communication? USB Mass Storage device
A : Network router
B : Digital camera
C : Music player
D : All of these
A : Connectionless
B : Connection-Oriented
C : OTA
A : MALC
B : DDOS
C : DOSD
D : SSOD
A : XMPP
B : HTTP
C : CoAP
D : MQTT
Q.no 40. IEEE 802.15.4-Specifies physical layer and media access control for
A : WPANs
B : LR-WPANs
C : HR-PANs
D : PAN
A : First
B : Second
C : Third
D : Last
A : a) 64-bit
B : b) 32-bit
C : c) 128-bit
A : a) WebSocket
B : b) HTTP
C : c) MQTT
D : d) CoAP
A : Sensors
B : Actuators
C : RFID Tags
D : All of Above
A : Software
B : Process
C : System
D : Hardware
A : Value-based verification
B : Identity-based verification
C : Name-based verification
D : Number-based verification
A : Secure Storage
C : Trust Management
D : Data Availability
A : a) X86
B : b) MSP
C : c) AVR
D : d) ARM
A : a) PLC
B : b) HMI
C : c) Alarm task
D : d) I/O task
Q.no 51. IaaS, PaaS and SaaS are three ……… models of cloud.
A : deployment
B : characteristic
C : solution
D : service
Q.no 52. IEEE 802.15.4 is a technical standard which defines the operation of
____________
A : LR-WPANs
B : USN
C : WSN
D : Zigbee
Q.no 53. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
A : SOA
B : EBS
C : GEC
D : Option 2 and 3
Q.no 56. Private cloud, public cloud, community cloud and hybrid cloud are four
…….. models of cloud.
A : deployment
B : characteristic
C : solution
D : service
Q.no 58. The processor must accept and process the frame before the next frame
is called as ______________
Q.no 60. Which if the following is Light waight protocol used of IoT Applications
A : a) MQTT
B : b) HTTP
C : c) WebSocket
A : Template
B : model
C : view
D : Service
A : Request – Response
B : Publish – Subscribe
C : Push-Pull
D : Exclusive Pair
Q.no 4. Which is true about model view controller architecture of Django
A : It represents by a database
A : Client-Server Architecture
B : Publish-Subscribe Architecture
A : Mode service
B : State service
C : Controller Service
D : All of above
A : Model
B : View
C : Template
B : Small Instance
C : Micro Instance
A : BC241
B : BC154
C : BC144
D : BC118
A : Session
B : Event
C : Transport
Q.no 11. Data stored in _______ domains doesn't require maintanance of schema.
A : SimpleDB
B : SQL Server
C : Oracle
D : RDS
Q.no 13. To define the information model, we first list the ------ Entities defined
A : Dynamic
B : Virtual
C : System
D : Basic
Q.no 14. In 1999, Marc Benioff founded a company, which pioneered the multi-
tenant SaaS model, a new application-delivering mechanism. Which company is
that?
A : Salesforce
B : Oracle Siebel
C : SAP CRM
D : Infusionsoft
Q.no 15. Information Model defines the ------- of all the information in the IoT
system
A : Structure
B : service
C : Network
D : Device
Q.no 16. The Functional View (FV) defines the functions of the IoT systems
grouped into various ----------.
Q.no 17. Which layer/layers of the OSI model does Web of Things (WoT) deals with
?
A : Application Layer
B : Network Layer
C : Transport Layer
D : Every layer
A : IaaS
B : SaaS
C : CaaS
D : Paas
Q.no 19. Which amongst the following is fastest Amazon Web Service ?
A : Amazon RDS
B : Amazon EC2
C : Amazon S3
D : Amazon DynamoDB
A : Online control
B : Direct control
C : Supervisory control
D : Automatic control
A : SAS20
B : SAS70
C : SAS702
C : Integration of Applications
D : None of above
A : a) Default
B : b) User
C : c) Pi
D : d) Root
Q.no 24. Two of the most common protocols for SCADA _______________
A : DNP3
B : T101
C : Both A & B
D : IPv4
Q.no 25. The process of converting data into a format that can not be read by
another user
A : Registering
B : Locking
C : Encryption
D : Keying
A : plant data
D : CBR Data
A : a) RTOS
B : b) Windows
C : c) Debian Linux
A : Transport Layer
B : Link Layer
C : Network Layer
D : Application Layer
Q.no 29. How many levels are present in a complex SCADA system?
A : a) 3 – levels
B : b) 5 – levels
C : c) 4 – levels
D : d) 6 – levels
B : Option I and II
D : Option III
A : bi-directional
B : Full duplex
C : Not Secure
A : EBS
B : ECS
C : Cloud
D : Database
B : Highly pipelined
D : All of Above
A : 802.15.4
B : SCADA
C : RFID
D : BACNet
Q.no 36. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.
A : deployment
B : characteristic
C : solution
D : service
Q.no 37. IEEE 802.15.4 framework conceives a 10m communications range with a
transfer rate of
A : 250 Kbits/s
B : 520 Kbits/s
C : 205 Kbits/s
D : 250 bits/s
Q.no 38. A network of physical objects or things embedded with electronics or
softwares.
A : a) AI
B : b) ML
C : c) IOT
D : d) Internet
Q.no 40. Which of the following makes sure that data is not changed when it not
supposed to be?
A : Integrity
B : Availability
C : Confidentiality
D : Accounting
Q.no 41. The …….. has features such as offline support, canvas drawing based on
low footprint SVG graphics, GeolocationAPI, video and audio streaming support
with flash, WebStorage, CSS3 Selectors, 2D animation for mobile cloud
applications.
A : HTML5
B : HTML4
C : HTML3
D : HTML2
A : a) IEEE 802.15.4
B : b) IEEE 802.5
C : c) IEEE 802.4.13
D : d) Both a and b
Q.no 43. OSGi (Open services Gateway initiative framework) is used for
D : Option 1 and 3
A : FM Radio
B : low-power High-bandwidth
C : Balestic Missile
A : XML
B : HTML
C : JAVA
D : API
B : Easy installation.
A : Request-Response
B : Publish-Subscribe
C : All of Above
D : None Of Above
Q.no 48. For constrained nodes and constrained networks in Internet of Things
which protocol is used.
A : IPv4
B : IPv6
C : CoAP
D : MQTT
A : HTTP
B : REST
C : Web Socket
A : Application Development
A : Option I and II
Q.no 52. Connecting heterogeneous devices that makes the integration across
systems and applications much simpler is achieved by
A : IoT
B : WoT
Q.no 53. In threat modeling, what methodology used to perform risk analysis
A : DREAD
B : OWASP
C : STRIDE
D : DAR
A : Google Map
B : MapReduce
D : Hadoop
A : Only III
B : ZigBee device
C : Transport
D : IEEE 802.15.4
D : Application Management
A : IEEE 802.3
B : IEEE 802.11
C : IEEE 802.16
D : IEEE 802.15.4
A : Data Availability
B : Trust Management
C : Data Confidentiality
D : Secure Storage
Q.no 1. The entities, objects and concepts defined in the Domain Model
Specification
A : Physical Entity
B : Virtual Entity
C : Device
D : All of above
A : a) Online control
B : b) Direct control
C : c) Supervisory control
D : d) Automatic control
Q.no 3. Domain Model Specification is the ------ Step in IOT platforms Design
Methodology
A : First
B : Second
C : Third
D : Four
A : Network
B : Cloud
C : Devices
D : Connectivity
A : Auditing
B : Authorisation
C : Authentication
D : Accounting
A : a) MQ Telemetry Things
B : b) MQ Transport Telemetry
C : c) MQ Transport Things
D : d) MQ Telemetry Transport
Q.no 8. Which one is the First step in IOT Platforms Design Methodology
D : Service Specification
A : CPU
C : networking capability
Q.no 10. Which of the following impose additional overhead on clients and offer
faster transfer?
A : Block Storage
B : File Storage
C : File Server
D : All of the above
Q.no 12. Amazon launched ……….. on a utility computing basis in 2006, which is
now categorized as IaaS (Infrastructure as a service).
A : Amazon Prime
C : AWS Academy
A : Amplifier filter
B : Noise Filter
C : Round Filter
D : Frequency filter
Q.no 14. How many virtual servers can be launch with Amazon EC2 ?
A:1
B:2
C : Infinite
D:0
A : a) Software
B : b) Process
C : c) System
D : d) Hardware
A : service inputs/output
B : service endpoints
C : Network Security
D : Service Preconditions
A : RFID
B : Sensor
C : Nano tech
D : Server
A:2
B:3
C:4
D:5
A : a) Machine to Machine
B : b) Internet of Things
A : HTTP
B : MQTT
C : SMTP
D : CoAP
Q.no 22. Process Specification is the ------ Step in IOT platforms Design
Methodology
A : First
B : Second
C : Third
D : Four
B : storage options
C : device options
D : All of above
Q.no 25. In 2008, which company launched the PaaS on-demand development
platform & become a new pillar of cloud computing?
A : Salesforce
B : The force.com
C : Amazon
D : Cloudera
A : ONLY (I)
B : ONLY (II)
A : Unidirectional
B : Bidirectional
C : both
Q.no 29. Django forms and classes are created using _________
A : Template
B : view
C : Model
D : Django Services
Q.no 30. ………. Middleware include all enterprise middleware, B2B, EAI, multi-
tenant App servers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
A : a) Raspberry Pi3
B : b) Raspberry Pi Zero WH
C : c) Raspberry Pi Zero W
D : d) Raspberry Pi Zero
D : None of above
Q.no 34. Which of the following layers are defined by the ZigBee stack?
A : Transport layer
B : Physical layer.
A : a) WebSocket
B : b) HTTP
C : c) MQTT
D : d) CoAP
A : a) Arch Linux
B : b) Debain
C : c) Fedora Remix
A : Power
B : Controller
C : Scheduler
D : Package
B : Physical Entity
C : Virtual Entity
D : None of Above
A : a) HTTP
B : b) CoAP
C : c) HTTPS
D : d) MQTT
Q.no 40. Standardization is like a double-edged sword:But it may threaten ........
when standards are accepted by the market
B : innovation
C : inhibit change
D : change
Q.no 41. What should be frequency of soil for hand gesturing functions ?
A : 50 Hz
B : 60 Hz
C : 35 Hz
D : 40 Hz
A : Internet applications
B : Device applications
C : Wireless applications
D : Wired applications
B : shared by several organizations and supports a specific community that has shared
concerns.
A : a) 64-bit
B : b) 32-bit
C : c) 128-bit
D : d) Both 64 and 32 bit
Q.no 45. ________ is used to describe a perceived, quickly growing set of web based
applications.
A : Web 1.0
B : Web 2.0
C : Web 3.5
D : Web 4.0
A : ISO-based network
B : OSI-based network
C : ISI-OSI-based transport
D : ISO-based transport
A : a) MIPS
B : b) AutoBot
C : c) IoT Assistant
D : d) IoT
Q.no 50. What is the long form of OMTP, which was a forum crated by mobile
network operators to discuss standards with manufacturers of cell phones and
other mobile devices.
A : a) AWS IoT
C : c) PTC ThingWorx
A : XMPP
B : TCP
C : CoAP
D : MQTT
A : Data communication
B : Monitoring
C : Control
D : All of these
Q.no 55. From following which one is not fit for IOT Level
A : IOT LEVEL 1
B : IOT LEVEL 2
C : IOT LEVEL 3
D : IOT LEVEL 11
Q.no 56. Which if the following is Light waight protocol used of IoT Applications
A : a) MQTT
B : b) HTTP
C : c) WebSocket
A : 60 GHz
B : 2.4 GHz
C : Sub 1 GHz
D : 5 GHz
Q.no 58. IoT level _______ systems are suitable for solutions where the data
involved is big and the analysis requirements are computationally intensive.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
A : PLC
B : HMI
C : Alarm task
D : I/O task
A : a) 5
B : b) 2
C : c) 4
D : d) 3
Q.no 3. _____ is virtual server platform that allows users to create and run virtual
machines on Amazon's server farm.
A : EC2
B : Azure
C : EC5
Q.no 4. To define the information model, we first list the ------ Entities defined
A : Dynamic
B : Virtual
C : System
D : Basic
Q.no 5. Which company played a key role in the development of cloud computing?
A : Microsoft
B : Google
C : Amazon
D : Cloudera
A : Function call
B : Procedure call
C : RPC
D : Web based
A : CoAP
B : MQTT
C : XMPP
D : HTTP
A : a) RFID
B : b) Sensor
C : c) Nano tech
D : d) Server
Q.no 10. Which layer/layers of the OSI model does Web of Things (WoT) deals with
?
A : Application Layer
B : Network Layer
C : Transport Layer
D : Every layer
Q.no 11. Two of the most common protocols for SCADA _______________
A : DNP3
B : T101
C : Both A & B
D : IPv4
Q.no 12. Which of the following terms indicates that information is to be read
only by those people for whom it is intended?
A : Availability
B : Accounting
C : Integrity
D : Confidentiality
B : Physical
C : Transport
D : Session
B : Printer
C : Watch
D : Washing Machine
Q.no 16. IoT Level_______ systems has a single node/device that performs sensing
and/ or actuation, stores data, performs analysis and hosts the application.
A : Level 1
B : Level 2
C : Level 3
D : Level 4
A : General device
B : Information
C : IoT devices
D : Object
A:4
B:3
C:5
D:6
B : SSL
C : USART
D : TCP/IP
A : M2MXML
B : SDN
C : NFV
D : SNMP
A : a) MQTT
B : b) HTTP
C : c) CoAP
D : d) SPI
A : DDL
B : XML
C : SOA
D : SODA
B : b) 32
C : c) 64
D : d) 128
A:1
B : 10
C : 100
D : 110
Q.no 26. Which of the following Hardware can be alone used as IoT Gateway
A : a) RaspberriPI
B : b) NodeMCU ESP8266
C : c) Arduino UNO
D : d) Both a and b
B : shared by several organizations and supports a specific community that has shared
concerns.
B : shared by several organizations and supports a specific community that has shared
concerns.
Q.no 29. List out the tools or API for developing or testing web api?
B : Jersey API
C : Axis
D : All of above
A : 2.2 GHz
B : 3 GHz
C : 3.5 GHz
D : 2.4 GHz
A : EBS
B : ECS
C : Cloud
D : Database
Q.no 35. Range of Zigbee is low-cost and low-powered mesh network ___________
A : 10-100 meters
B : 100-1000 meters
C : 10-100 cm
D : 100-1000 cm
A : XML
B : HTML
C : JAVA
D : API
A : IASI
B : ASI
C : AMI
D : ASTI
Q.no 39. Gateway provides the connection between _____ and _____
A : Only (I)
B : Only (II)
Q.no 41. ………. Middleware include all Grid middleware such as MSV Cluster
middleware, SSV and schedulers, etc.
A : SaaS
B : IaaS
C : FaaS
D : PaaS
B : Highly pipelined
D : All of Above
Q.no 43. This protocol is lightweight in nature and is ideal for connecting small
devices to constrained networks
A : MQTT
B : CoAP
C : IPv4
D : IPv6
B : shared by several organizations and supports a specific community that has shared
concerns.
A : Sensors
B : Gateways
C : Processors
D : Applications
Q.no 46. Private IoT, Public IoT, Community IoT and Hybrid IoT are four ……….
models of IoT.
A : deployment
B : characteristic
C : solution
D : service
Q.no 47. IEEE 802.15.4-Specifies physical layer and media access control for
A : WPANs
B : LR-WPANs
C : HR-PANs
D : PAN
Q.no 48. For Amazon EC2 instance, public and private keys are maintained by ?
A : AWS, client
B : client,AWS
C : only AWS
B : Easy installation.
A : FM Radio
B : low-power High-bandwidth
C : Balestic Missile
A : Google Map
B : MapReduce
D : Hadoop
A : Only III
A : Block
B : Logical Volumes
C : Distance
D : Signals
Q.no 54. In threat modeling, what methodology used to perform risk analysis
A : DREAD
B : OWASP
C : STRIDE
D : DAR
Q.no 55. ……. is the direct technological ancestor of cloud computing, which also
has roots in the COW technology.
A : Pervasive computing
B : Mobile computing
C : Grid computing
D : Quantum Computing
Q.no 56. ________ is an attack which forces an end user to execute unwanted
actions on a web application in which he/she is currently authenticated.
C : Two-factor authentication
D : Cross-site scripting
Q.no 57. Which of the following specifies a set of media access control (MAC) and
physical layer specifications for implementing WLANs?
A : IEEE 802.16
B : IEEE 802.3
C : IEEE 802.11
D : IEEE 802.15
Q.no 58. Exclusive pair communication model can be best described as ____________
A : Bidirectional , simplex
C : Unidirectional , simplex
Q.no 59. IoT level _______ systems are suitable for solutions where multiple nodes
are required, the data involved is big and the analysis requirements are
computationally intensive
A : Level1
B : Level 2
C : Level 3
D : Level 4
Q.no 60. The processor must accept and process the frame before the next frame
is called as ______________
SUB:- ESIOT
UNIT-IV
1. What is Standard
A)setup
D) None of above
b) business
c) Techniques
d) All ofabove
3. one of the few efforts targeting a holistic architecture for all IoT sectors
b) M2M
c)RFID
APR
d) SCADA
a)Manufacturing
b) Business growth
d) IOT Application
a) Sensor,Aculator
b) Embedded device
c) Computer
d) a&b
b)TCP
c)UDP
d)HTTP
a)IEEE
b) IETF
c) a&b
APR
d) ACM
b) IEEE
c)IEFT
d)ACM
c) communication
d) None of above
a) 10 meter
b)15 Meter
c) 30 meter
APR
d)40 Meter
a) 450 kbps
b) 350 kbps
c) 250 kbps
d) 150 kbps
b) zigbee
c)WAN
d)MAN
a) a slave protocol
b) a master protocol
c) a master/slave protocol
d) All,
15. In RTU (Remote Terminal Unit) transmission mode, the message is transmitted
a) a continuous stream
b) frequently
c) a discontinuous stream
APR
d) None of above
a) protocol
b) communication protocol
d) mesh protocol
a) ZigBee
b)WAN
c)MAN
d)WAN
c) Application Framework
d) all
a)Protocol
b) communications protocol
c)IEEE
APR
d)IEFT
b) communication
c) protocol
d)Standard
b)Communication
c) Embedded System
d)None of above
d) All of above
a)decentralised structure
b) centralised structure
c)a&B
d)None of above
communications protocol
a communications protocol
33. BACnet enables interoperability between different building systems and devices
34 ITU-T has a few study groups (SGs 2, 3, 5, 9, 11, 12, 13, 15, 16, and 17,
37.. Every BACnet device contains a device object that defines certain device information,.
39. Each BACnet device contains a collection of information about the device and any input and
output points that it monitors and controls.
40. The IoT-A (Internet of Things Architecture) is one of the few efforts targeting a holistic
architecture for all IoT sectors.
41. The IoT-A (Internet of Things Architecture consists of 17 European organizations from
nine countries.
APR
43. IPv4, IPv6, and 6LoWPAN were all developed by engineers within IETF
44. Data transport protocol standards: M2MXML, JavaScript Object Notation (JSON),
BiTXML, WMMP, MDMP, open Building Information Exchange (oBIX), EEML, open M2M
Information exchange (oMIX)
Sinhgad Technical Education Society’s
Sinhgad Academy of Engineering, Kondhwa [BK], Pune-48
Department of Computer Engineering
Subject: Embedded System and Internet of Things
Unit III MCQ’s