0% found this document useful (0 votes)
11 views5 pages

Week 11 Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

Week 11 Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1.

IIoT-enabled healthcare infrastructure can facilitate the monitoring of patient’s health


conditions remotely. State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 8 of Lecture 1 of Week 11

2. __________ develops continuous glucose monitoring devices. Fill in the blanks.

a. Dexcom
b. iHealth BP5
c. Kinsa smart thermometer
d. ADAMM Intelligent Asthma Monitoring device

Answer: (a)

Justification: Please refer to Slide 10 of Lecture 1 of Week 11

3. __________ is an example of a wireless ECG monitoring device. Fill in the blanks.

a. QardioCore
b. Dexcom
c. iHealth BP 5
d. Kinsa smart thermometer

Answer: (a)

Justification: Please refer to Slide 9 of Lecture 1 of Week 11

4. “ADAMM Intelligent Asthma Monitoring device predicts pre symptoms of asthma


attack from the body temperature, cough rate, heart rate.” State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 15 of Lecture 1 of Week 11


5. Which of the following represents the benefits of the digital power plant?

a. Decreased efficiency
b. Increased cost
c. Improvement in performance
d. Increase in energy requirement

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 2 of Week 11

6. ___________ is a communication network that covers in-home IoT devices using


Zigbee and 6LowPan. Fill in the blanks.

a. Home area network


b. Neighborhood area network
c. Field area network
d. Wide area network

Answer: (a)

Justification: Please refer to Slide 7 of Lecture 2 of Week 11

7. Which of the following statements is incorrect about Barcodes?

a. Barcodes are printed on paper and plastic, which makes them vulnerable
b. Barcodes need to be in the Line of Sight of the readers
c. Multiple barcodes can be read at a time
d. Barcodes cannot contain any added information

Answer: (c)

Justification: Please refer to Slide 13 of Lecture 3 of Week 11

8. Which of the following options is false about the Semi-Passive tags?

a. Has an onboard battery to power the IC


b. Does not have any active transmitter
c. Relies on backscattering
d. Depends on signals from the reader for power

Answer: (d)
Justification: Please refer to Slide 12 of Lecture 3 of Week 11

9. Which of the following problem(s) can be eliminated by using RFID tags?

a. Data inconsistency
b. Human errors
c. Data scattering
d. All of the above

Answer: (d)

Justification: Please refer to Slide 19 of Lecture 3 of Week 11

10. What is/are the necessity/necessities to render software security?

a. Prevent stealing of valuable information


b. Prevent corrupt behavior of software
c. Provide protection from Denial of Service (DoS) attacks
d. All of the above

Answer: (d)

Justification: Please refer to Slide 5 of Lecture 4 of Week 11

11. Which of the following options is false about the integrity of software security?
a. Assurance of an uncorrupted data
b. Correct functioning even under malicious attack
c. Ignore consistency, accuracy, and trustworthiness of data over its entire life
cycle
d. Assurance that data is not altered by unauthorized people

Answer: (c)

Justification: Please refer to Slide 7 of Lecture 4 of Week 11


12.

“Network Security does not maintain usability and integrity of network and data.”
State true or false.
a. True
b. False

Answer: (b)

Justification: Please refer to Slide 11 of Lecture 4 of Week 11

13. What does VPN stand for?

a. Virtual Private Network


b. Virtual Public Network
c. Versatile Private Network
d. Versatile Public Network

Answer: (a)

Justification: Please refer to Slide 15 of Lecture 4 of Week 11

14. Which of the following can be achieved by applying IoT in Facility Management?

a. Monitor alarms, smoke detectors, and other life safety systems remotely
b. Real-time information about emergency
c. Efficient supply management
d. All of the above

Answer: (d)

Justification: Please refer to Slide 15 of Lecture 5 of Week 11

15.

Active RFID tags are classified as _____________ and __________. Fill in the
blanks.

a. Transponders, beacons
b. Transponders, eigen
c. Transmitter, eigen
d. None of the above
Answer: (a)

Justification: Please refer to the book: Introduction to Industry 4.0 and Industrial Internet of
Things, chapter no.-15, page no.-297

You might also like