IOTA Unit Wise Objective Questions
IOTA Unit Wise Objective Questions
UNIT-1
1. What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
Answer: a
Explanation: The Internet of Things (IoT) is a network of physical objects embedded with sensors,
software, and other technologies for exchanging data with other devices over the internet.
Answer: c
Explanation: Following are the key components of a M2M system.
Sensors
RFID (Radio Frequency Identification)
Wi-Fi
Autonomic Computing.
12. Which challenge comes when we use many devices on the same network?
a) Signaling
b) Security
c) Presence detection
d) Power consumption
Answer: d
Explanation: You need minimal battery drain and low power consumption. You can’t afford to use
up 100% of an IoT devices small and expensive embedded CPU power.
15._______ in IoT as one of the key characteristics, devices have different hardware platforms and
networks.
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity
Answer: b
Explanation: Heterogeneity in IoT as one of the key characteristics, devices have different
hardware platforms and networks. And can interact with other devices or services platforms
through different networks.
UNIT-2
1. What is Arduino?
a) Programming language
b) Image editing software
c) Open-source electronics platform
d) Text editor
Answer: c
Explanation: Arduino is an open-source hardware and software platform that is easy to use.
Arduino boards are capable of reading analog or digital input signals from various sensors.
4. Which of the following is not a feature of the Raspberry PI model B IoT device?
a) It has 256 MB SDRAM
b) It has a single USB connector
c) It has its own operating system
d) It has an Ethernet port
Answer: a
Explanation: Raspberry PI model B has a single 2.0 USB connector and an on-board 10/100
Ethernet RJ45 jack. It has its own operating system and 512 MB SDRAM memory.
Answer: c
Explanation: PC is the place where the next instruction about to be executed is stored.
12. The addressing mode where the EA of the operand is the contents of Rn is ______
a) Pre-indexed mode
b) Pre-indexed with write back mode
c) Post-indexed mode
d) None of the mentioned
Answer: c
Explanation: None.
13. The effective address of the instruction written in Post-indexed mode, MOVE [Rn]+Rm is
_______
a) EA = [Rn]
b) EA = [Rn + Rm]
c) EA = [Rn] + Rm
d) EA = [Rm] + Rn
Answer: a
Explanation: Effective address is the address that the computer acquires from the current
instruction being executed.
14. The instructions which are used to load or store multiple operands are called as ________
a) Banked instructions
b) Lump transfer instructions
c) Block transfer instructions
d) DMA instructions
Answer: c
Explanation: These instructions are generally used to perform memory transfer operations.
UNIT-3
1. What type of communication is used in a commercial walkie talkie?
a) Simplex
b) Full duplex
c) Half duplex
d) Multiplex
Answer: c
Explanation: a walkie talkie the communication is two way but at a given time only one way
communication is allowed. This type of communication is called as half duplex communication.
Answer: b
Explanation: A light sensor is an analog sensor because it senses light intensity. A microphone is
also an analog sensor because it senses sound. Push buttons and keyboards are operated digitally
so, they are digital sensors.
5.Which of the following is used to capture data from the physical world in IoT devices?
a) Sensors
b) Actuators
c) Microprocessors
d) Microcontrollers
Answer: a
Explanation: Sensors are used to capture data from the physical world. Microprocessors and
microcontrollers are used to control the operations and actuators are for outputs of IoT devices.
10.CoAP is designed for use between devices on the same constrained network.
a) True
b) False
Answer: a
Explanation: CoAP is designed for use between devices on the same constrained network (e.g.,
low-power, lossy networks), between devices and general nodes on the internet, and between
devices on different constrained networks both joined by an internet.
15. Unauthorised access of information from a wireless device through a bluetooth connection is
called _________
a) bluemaking
b) bluesnarfing
c) bluestring
d) bluescoping
Answer: b
Explanation: Unauthorised access of information from a wireless device through a bluetooth
connection is called Bluesnarfing. It is done through exploiting the vulnerabilities of the Bluetooth
device to steal the transmitted information.
UNIT-4
1. Data acquisition can be done on qualitative quantities.
a) True
b) False
Answer: b
Explanation: Data acquisition cannot be done on qualitative quantities. It can be only done on
quantitative quantities. Data acquisition is a process of sampling physical signals that can be
represented in the form of digital numeric values.
5.Open IoT manages the registration, data acquisition, deployment of sensors and interconnected of
objects, through which network?
a) GSN
b) X-GSN
c) LSM
d) HTTP
Answer: b
Explanation: The core fundamental concept in X-GSN is the virtual sensor, which can represent not
only physical devices but in general any abstract or concrete entity that observes features of any
kind.
6._________ Services are the way in which the IoT is connected to data.
a) Cloud
b) Bigdata
c) Internet
d) Network
Answer: a
Explanation: Cloud based services are the way in which the IoT is connected to data. Just like
World Wide Web runs over the Internet, so does the IoT.
UNIT-5
7. Applications and services that run on a distributed network using virtualized resources is known
as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
Answer: d
Explanation: Cloud computing refers to the delivery of services such as storage, servers, databases,
networking, and other functions through the internet without the need for the user to manage them
directly. These applications are accessed by common Internet protocols and networking standards.
10. Which of the following is the correct statement about cloud computing?
a) Cloud computing abstracts systems by pooling and sharing resources
b) Cloud computing is nothing more than the Internet
c) The use of the word “cloud” makes reference to the two essential concepts
d) All of the mentioned
Answer: a
Explanation: Abstraction and Virtualization are the two essential concepts.
12. Which of the following model attempts to categorize a cloud network based on four
dimensional factors?
a) Cloud Cube
b) Cloud Square
c) Cloud Service
d) All of the mentioned
Answer: a
Explanation: Cloud Cube model is mainly used for secure collaboration.
13. Which of the following is the correct statement about cloud types?
a) Cloud Square Model is meant to show is that the traditional notion of a network boundary being
the network’s firewall no longer applies in cloud computing
b) A deployment model defines the purpose of the cloud and the nature of how the cloud is located
c) Service model defines the purpose of the cloud and the nature of how the cloud is located
d) All of the mentioned
Answer: b
Explanation: Four types of deployment models exist.
15. All cloud computing applications suffer from the inherent _______ that is intrinsic in their
WAN connectivity.
a) noise
b) propagation
c) latency
d) all of the mentioned
Answer: c
Explanation: While cloud computing applications excel at large-scale processing tasks, if your
application needs large amounts of data transfer, it may not be the best model for you.
16. Which of the following architectural standards is working with cloud computing industry?
a) Web-application frameworks
b) Service-oriented architecture
c) Standardized Web services
d) All of the mentioned
Answer: b
Explanation: These standards help to enable different business models that cloud computing
vendors can support, most notably Software as a Service (SaaS), Web 2.0 applications, and utility
computing.
18. Which of the following is the wrong statement about cloud computing?
a) Private cloud doesn’t employ the same level of virtualization
b) Data center operates under average loads
c) Private cloud doesn’t pooling of resources that a cloud computing provider can achieve
d) Abstraction enables the key benefit of cloud computing: shared, ubiquitous access
Answer: a
Explanation: Capacity of the datacenter is fixed by the assets it has.
23. Cloud computing is a concept that involves pooling physical resources and offering them as
which sort of resource?
a) cloud
b) real
c) virtual
d) none of the mentioned
Answer: c
Explanation: Cloud computing means providing services like storage, servers, database,
networking, etc. over the internet. It is a new model for provisioning resources, for staging
applications, and for platform-independent user access to services.
25. Into which expenditures does Cloud computing shifts capital expenditures?
a) local
b) operating
c) service
d) none of the mentioned
Answer: b
Explanation: The nature of the service provider and its connection with its client is changing as a
result of cloud computing.
27. Which of the following is the most essential element in cloud computing by CSA?
a) Virtualization
b) Multi-tenancy
c) Identity and access management
d) All of the mentioned
Answer: b
Explanation: Multi-tenancy refers to hosting shared among multiple customers. Multi-tenancy
introduces a variety of new security problems to cloud computing that must be addressed.
28. Which of the following monitors the performance of the major cloud-based services in real time
in Cloud Commons?
a) CloudWatch
b) CloudSensor
c) CloudMetrics
d) All of the mentioned
Answer: b
Explanation: The Cloud Commons is a new online community founded by CA to promote
information exchange on cloud service and the SMI standard.
29. Which of the following model consists of the service that you can access on a cloud computing
platform?
a) Deployment
b) Service
c) Application
d) None of the mentioned
Answer: b
Explanation: The sort of service that the service provider provides is described by the service
model. Three types of service provided are:
1) Platform-as-a-Service
2) Software-as-a-Service
3) Infrastructure-as-a-Service
30. Which of the following is the most important area of concern in cloud computing?
a) Scalability
b) Storage
c) Security
d) All of the mentioned
Answer: c
Explanation: When your data goes to and is stored on systems that are no longer under your
control, you run the risk of it being intercepted or misused by outsiders. Only an authorized user
can access the save data.