IOT 2022 assignment solution (2)
IOT 2022 assignment solution (2)
Introduction to
Internet of Things
Assignment-Week 1
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
Which of the following is a static mechanism for address allocation of IoT nodes?
QUESTION 2:
a. quantization error
b. aliasing error
c. hysteresis error
d. None of these
QUESTION 3:
a. Gas sensor
b. PIR sensor
c. Light sensor
d. Speaker
QUESTION 4:
“X” performs active application layer functions between IoT nodes and other entities. What is X?
a. IoT node
b. IoT proxy
c. IoT gateway
d. IoT Network
QUESTION 5:
Which of the following field in IPv4 header format indicates that it is concerned with
reliable transmission?
a. Traffic class
b. Hop limit
c. Fragment offset
d. Destination address
QUESTION 6:
QUESTION 7:
a. Mechanical actuators
b. Pneumatic actuators
c. Electric actuators
d. Magnetic actuators
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 8:
Which of the following mechanism for address autoconfiguration provide more control on the
allocated addresses?
a. DHCPv6
b. SLAAC
c. Both DHCPv6 and SLAAC
d. None of these
QUESTION 9:
QUESTION 10:
In a scenario when the IoT proxy has uplink connectivity, does the IoT LAN need global
addressing mandatorily?
a. Yes
b. No
c. Not applicable
Correct Answer: b. No
Detailed Solution: When the IoT proxy has uplink connectivity, it proxies communication
between the local IoT nodes and nodes in the external network. In this scenario, where all
communications go through a proxy, the IoT LAN does not need global addressing, but can
manage with link-local or ULA addresses, depending on the type of proxy.
See lecture 2 (IPv6 Addressing Strategies)
QUESTION 11:
QUESTION 12:
Statement I: Aliasing error occurs if the input variable or added noise changes periodically at a
frequency proportional to the multiple of the sampling rate.
Statement II: If the signal is monitored digitally, the sampling frequency can cause a dynamic
error triggering aliasing error.
QUESTION 13:
QUESTION 14:
Unique Local Addresses are intended to allow routing over a network that expands over multiple
links and routing hops, and even can expand over multiple networks. Can these addresses prevent
address collision?
a. Yes
b. No
c. Not Applicable
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
a. Pressure sensor
b. Strain sensor
c. Both pressure and strain sensors
d. Sound sensor
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 2
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
Which of the following protocol is used to implement device management for mobile
devices?
a. OMA-DM
b. Websocket
c. Alljoyn
d. DNS-SD
Correct Answer: a. OMA-DM
Detailed Solution: OMA-DM is a protocol specified by the Open Mobile Alliance and is
often used in the context of complex structured mobile solutions. It is often preferred by
service providers to implement device management for mobile devices.
See lecture 6
QUESTION 2:
QUESTION 3:
Which of the following functions as the network bridge in IEEE 802.15.4 network?
a. PAN Coordinator
b. Router
c. Device
d. None of these
Correct Answer: a. PAN Coordinator
Detailed Solution: Every IEEE 802.15.4 network has a minimum of one coordinator device
type who acts as the root; it also functions as the network bridge. The coordinator performs
data handling and storing operations.
See lecture 9
QUESTION 4:
Which of the following allow communication between Zigbee and no-Zigbee devices?
a. layer-5 application-level bridge
b. layer-7 application-level gateway
c. layer-7 application-level bridge
d. layer-5 application-level gateway
Correct Answer: b. layer-7 application-level gateway
Detailed Solution: In order to enable communication between Zigbee and no-Zigbee
devices, a layer-7 application-level gateway has to be created, which is quite complex.
Refer to the book: S. Misra, A. Mukherjee, and A. Roy, 2020. Introduction to IoT.
Cambridge University Press.
QUESTION 5:
QUESTION 6:
QUESTION 7:
Which of the following is designed to have low overhead and better scalability in terms of dense
networks?
a. LOADng
b. RPL
c. Both LOADng and RPL
d. AODV
Correct Answer: b. RPL
Detailed Solution: RPL is designed to have low overhead and better scalability in terms of dense
networks. See lecture 10
QUESTION 8:
Which of the following AMQP frame type controls the message flow rate?
a. Transfer
b. Flow
c. Control
d. Disposition
Correct Answer: b. Flow
Detailed Solution: “Flow” frame type controls the message flow rate. See lecture 8
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 9:
Does 6LoWPAN allow interoperability between IEEE802.15.4-based wireless devices and other
IP-based devices?
a. Yes
b. No
Correct Answer: a. Yes
Detailed Solution: 6LoWPAN allows interoperability between IEEE802.15.4-based
wireless devices, as well as other IP-based devices. 6LoWPAN simply uses a bridge to
enable communication between other devices.
Refer to the book: S. Misra, A. Mukherjee, and A. Roy, 2020. Introduction to IoT.
Cambridge University Press.
QUESTION 10:
QUESTION 11:
QUESTION 12:
Which of the following is the acronym for “Extensible Messaging and Presence Protocol”?
a. EMPP
b. XMLP
c. XMPP
d. XMP
Correct Answer: c. XMPP
Detailed Solution: XMPP stands for Extensible Messaging and Presence Protocol. See lecture 7
QUESTION 13:
QUESTION 14:
Which of the following technique is used to transmit data frames in Beacon-enabled IEEE
802.15.4 networks?
a. unslotted CSMA/CA
b. slotted CSMA/CA
c. unslotted CSMA/CD
d. slotted CSMA/CD
Correct Answer: b. slotted CSMA/CA
Detailed Solution: The periodic transmission of beacon messages characterizes beacon
enabled networks. Here, the data frames are sent via slotted CSMA/CA with a super-frame
structure managed by a personal area network (PAN) coordinator.
See lecture 9
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
************END***********
Week 3 : Assignment 3
The due date for submitting this assignment has passed.
Due on 2022-08-17, 23:59 IST.
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
1 point
a
b
c
d
No, the answer is incorrect.
Score: 0
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
c
1 point
a
b
c
d
No, the answer is incorrect.
Score: 0
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
1 point
a
b
c
d
No, the answer is incorrect.
Score: 0
Accepted Answers:
c
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
c
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
b
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
c
1 point
a
b
c
d
Yes, the answer is correct.
Score: 1
Accepted Answers:
a
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
QUESTION 2:
In WMSNs application, which of the following deployment can provide better sensing
and prolong network lifetime?
a. Scalar sensor nodes
b. Camera sensor nodes
c. Both scalar and camera sensor nodes
d. Vector sensor nodes
Correct Answer: c. Both scalar and camera sensor nodes
Detailed Solution: In WMSNs application, deployment of both camera sensor and scalar
sensor nodes can provide better sensing and prolong network lifetime. Camera sensor
See lecture 16
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 3:
In which of the following algorithms only a subset of nodes in the WASN participate in
sensing, communication, and computation?
a. Localized
b. Distributed
c. Centralized
d. All of these
Correct Answer: a. Localized
Detailed Solution: Localized algorithms are a special type of distributed algorithms where
only a subset of nodes in the WASN participate in sensing, communication, and
computation.
See lecture 17
QUESTION 4:
In general, the target-tracking problem consists of a WSN, whose nodes are strategically
or randomly deployed across the sensor field. Is the statement true?
a. Yes
b. No
Correct Answer: a. Yes
Detailed Solution: According to several authors, the target-tracking problem consists of a
WSN, whose nodes are strategically or randomly deployed across the sensor field.
See lecture 16 [Research Paper: Souza, Éfren L., Eduardo F. Nakamura, and Richard W.
Pazzi. "Target tracking for sensor networks: A survey." ACM Computing Surveys (CSUR)
49, no. 2 (2016): 1-31.]
QUESTION 5:
In Ad-Hoc FANETs, which of the following set-up can be considered as ground network?
a. Stationary WSNs
b. Control stations
c. VANETS
d. All of these
Correct Answer: d. All of these
Detailed Solution: In Ad-Hoc FANETs, ground networks may be stationary WSNs or
VANETS or Control stations.
See lecture 19
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 6:
Which of the following components in M2M monitors the status of devices and M2M
area networks, and controls them based on their status?
a. M2M User Platform
b. M2M Device Platform
c. M2M Service Platform
d. M2M Access Platform
Correct Answer: b. M2M Device Platform
Detailed Solution: M2M device platform manages device profiles, such as location, device
type, address, and description. It monitors the status of devices and M2M area networks,
and controls them based on their status.
See lecture 20
QUESTION 7:
In the guided target-tracking problem formulation, a tracker is added to the problem. The
tracker follows the trajectory defined by beacon nodes to intercept the target. Which of the
following objectives best define this tracking algorithm?
a. to fuse data about the target
b. to use the least amount of communication to reach the target
c. to reach the target in the shortest possible time
d. to increase the network lifetime
Correct Answer: c. to reach the target in the shortest possible time
Detailed Solution: The tracker can be a person or a guided vehicle that receives the
position of the target from the network so that it can move toward the target. The objective
is to reach the target in the shortest possible time.
See lecture 16
QUESTION 8:
In gateway selection algorithm in FANETs, each UAV acquires the information of all
UAVs within its ________ hop(s).
a. One
b. Two
c. More than one
d. Can’t be specific
Correct Answer: b. Two
Detailed Solution: In gateway selection algorithm in FANETs, gateway selection is
initiated by selection of the most stable node in the sub‐area. Each UAV acquires the
information of all UAVs within its 2 hops.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
See lecture 19
QUESTION 9:
A crossing is covered if it is in the _________ region of at least one node’s coverage disk.
a. exterior
b. interior
c. either exterior or interior
d. boundary
Correct Answer: b. interior
Detailed Solution: Crossings are the intersection points between disk boundaries or
between monitored space boundary and disk boundaries. A crossing is covered if it is in the
interior region of at least one node’s coverage disk.
See lecture 17
QUESTION 10:
There are several major challenges related to target-tracking applications. Which of the
following is NOT among those challenges?
a. target recovery
b. node non-cooperation
c. future-position estimation
d. energy management
Correct Answer: b. node non-cooperation
Detailed Solution: Authors identified six major challenges related to target-tracking
applications. These are target detection, target recovery, energy management, position
computation, node cooperation, and future-position estimation. Node cooperation is one of
the challenges, in which nodes cooperate and fuse data, reducing the number of messages.
See lecture 16
QUESTION 11:
Detailed Solution: M2M User Platform manages M2M service user profiles and provides
functionalities such as, user registration, modification, charging, and inquiry.
See lecture 20
QUESTION 12:
Which of the following is NOT regarded as one of the major scatters of underwater sound
in Underwater Acoustic Sensor Networks?
a. Non-linear internal waves
b. Solitons
c. Linear internal waves
d. None of these
Correct Answer: c. Linear internal waves
Detailed Solution: In a layered shallow oceanic region, the inclusion of the effect of
internal solitons on the performance of the network is important. Based on various
observations, it is proved that non-linear internal waves, i.e., Solitons are one of the
major scatters of underwater sound.
See lecture 16
QUESTION 13:
QUESTION 14:
Which of the following elements of target-tracking algorithm can perform data fusion?
a. Active node
b. Inactive node
c. Beacon node
d. Sink node
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 5
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
QUESTION 2:
QUESTION 3:
QUESTION 4:
QUESTION 5:
What is sketch?
a. Program coded in IoT devices.
b. Program coded in Arduino IDE.
c. Services of Arduino Uno.
d. Services of IoT devices
Correct Answer: b. Program coded in Arduino IDE.
Detailed Solution: Sketch is the program coded in Arduino IDE which mainly consists
of two parts setup() and loop.
See lecture 22 @ 12:15
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 6:
QUESTION 7:
QUESTION 8:
Which kind of conflict occur when different processing logics are applied to same IoT
networked devices or applications?
a. Semantic conflict.
b. Syntactic conflict.
c. System conflict.
d. Device conflict.
Correct Answer: a. Semantic conflict
Detailed Solution: Semantic conflict occurs when different processing logics are applied
to same IoT networked devices or applications.
See lecture 21@5:20
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 9:
Which of the following is TRUE for the sketch command given below?
delay(3000);
a. Provides a delay of 3000 seconds
b. Provides a delay of 3 seconds
c. Provides a delay of 3000 nano seconds
d. Provides a delay of 3000 simulation time
Correct Answer: b. Provides a delay of 3 second
Detailed Solution: As per the basics of Arduino programming.
See lecture 22@17:20
QUESTION 10:
Which of the following solutions are not responsible for generating unique address?
a. Election Product Code (EPC)
b. Unique Product Code (UPC)
c. Uniform Resource Identifier (URI)
d. IP Addresses
Correct Answer: b. Unique Product Code
Detailed Solution: As per the basics of device identification and categorization.
See lecture 21@16:25
QUESTION 11:
QUESTION 12:
The interoperability between devices and device user in term of message formats is called
_________.
a. Systematic interoperability.
b. Semantic interoperability.
c. Syntactic interoperability.
d. Device interoperability.
Correct Answer: c. Syntactic interoperability
Detailed Solution: The interoperability in terms of message formats is called syntactic
interoperability.
See lecture 21@17:00
QUESTION 13:
QUESTION 14:
Which of the following ontology utilize previous data to estimate what is going to happen?
a. Device ontology
b. Physical domain ontology
c. Estimation ontology
d. Virtual domain ontology
Correct Answer: c. Estimation ontology
Detailed Solution: As per the basics of semantic interoperability for device ineraction.
See lecture 21 @ 20:25
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
Which component of UMB converts physical devices into virtually abstracted one, as described
by Universal Device Template (UMB).
a. UMB-A
b. UMB-C
c. UDT mapping
d. UMB-B
Correct Answer: a. UMB-A
Detailed Solution: As per the definition of UMB-A.
See lecture 21 @ 28:00
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 6
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
What is the value that is assigned to the variable f in the given piece of python code?
i, f, str=50, 50.68, “Welcome to python”
a. 50
b. 50.68
c. Welcome to python
d. All of these
QUESTION 2:
x='17'
y='23'
z=x+y
print(z)
a. 40
b. 6
c. 1723
d. 30
QUESTION 3:
Detailed Solution: Raspbian is a free operating system for Raspberry Pi (Please refer to
lecture INTRODUCTION TO RASPBERRY PI-I@ 12:14).
QUESTION 4:
QUESTION 5:
QUESTION 6:
Which of the following represents the command used for rebooting Raspberry Pi?
a. sudo reboot
b. sudo apt-get rebooting
c. pip install rebooting
d. All of these
QUESTION 7:
a. True
b. False
QUESTION 8:
What is the data type of the variable ls in the following piece of Python code?
ls= {1: "item", "key": "21", "year": 2022}
a. dictionary
b. list
c. tuple
d. All of these
QUESTION 9:
a. True
b. False
QUESTION 10:
QUESTION 11:
What are the socket types that exist in Python based socket programming?
a. AF_DG and SOCK_SM
b. AF_UNIX and AF_INET
c. SOCK_UX and SOCK_IT
d. SOCK_DGRAM and SOCK_STREAM
QUESTION 12:
a. Yes
b. No
QUESTION 13:
Which of the following must be used to terminate a loop and move to the next code after the loop?
a. list
b. try
c. continue
d. break
QUESTION 14:
Select the option that does not represent a keyword in Python language?
a. while
b. if
c. try
d. integer
QUESTION 15:
Raspberry Pi does not support any other language other than Python?
a. True
b. False
Correct Answer: b. False
Detailed Solution: The default programming language installed in Raspberry Pi include
Python, C , C++, JAVA, Scratch and Ruby (Please refer to lecture INTRODUCTION TO
PYTHON PROGRAMMING- I @ 22:26).
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 7
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
You have an IoT temperature sensor that is sensing temperature from a particular location and sending the
data over the network to a server situated far away in another city for storage. This is an example of
remote data logging.
a. True
b. False
Detailed Solution Remote data logging refers to the process of sending data and information from a
client/sensor over the network to a remote server located somewhere else. Refer to lecture 31.
QUESTION 2:
For a two-way communication between a client and server, i.e both the client and the server send data to
each other, it is important that both of them knows about the following about each other
Detailed Solution Since it is a two-way communication, the client and server should both
know about the IP address and the port number of each other in order to communicate. Refer to
lecture 31.
QUESTION 3:
If you are using Raspberry Pi (RPi) to connect standard IoT sensors (such as DHT temperature sensors),
which among the following components of the Raspberry Pi do you use connect your Pi to your sensor for
data transfer.
Detailed Solution: The GPIO pins of the RPi board is responsible for connecting the RPi to
any external sensor/actuator. Refer standard materials on RPi and Lecture 31
QUESTION 4:
It is possible to connect a single DHT temperature sensor with a suitable number of connection wires with
two Raspberry Pis acting as a client for the same sensor.
a. True
b. False
Detailed Solution: You can connect any number of RPis to the same sensor, with each RPi
acting as a separate client, provided you have suitable number of connection wires.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 5:
Which among the following denotes the correct connection order for a standard 4-PIN DHT sensor with the
order of PIN numbers taken as 4,3,2,1 (from right to left)
a. Data, Null, Ground, Power
b. Ground, Data, Power, Null
c. Ground, Null, Data, Power
d. Power, Data, Null, Ground
Detailed Solution: This is the standard configuration for a 4-PIN DHT sensor. Refer Lecture
32@3:30
QUESTION 6:
Using the matplotlib library in Python, you are plotting a graph of pressure values versus time, with
pressure taken in the vertical axis and time taken in the horizontal axis. While writing the code to plot the
graph, which among the following is the correct parameter (denoted by ‘??’) that you can write within the
function “ylabel(??)”
a. Time
b. Pressure
c. Length
d. Mass
Detailed Solution: The function ylabel() sets the name of the Y-axis, i.e the vertical axis of a
graph. Since we are plotting pressure in the Y-axis, thus we should label it appropriately.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 7:
Lack of centralized control is a problem and limitation of traditional network architectures without
Software Defined Networking (SDN) support
a. True
b. False
Detailed Solution: Traditional networks do not have a central authority over them, therefore
many issues take time to get resolved with distributed algorithms. Refer Lecture 33,
introduction to SDN.
QUESTION 8:
Detaching the physical hardware from the overlying software components, such as the Operating System
(OS) and applications forms an important aspect of transitioning to SDN
a. True
b. False
QUESTION 9:
Flow rules are stored within SDN switches that run the OpenFlow protocol in the following format.
a. Images
b. Files
c. Tables
d. None of these
Detailed Solution: Flow rules are stored in tabular formats within the switches based on
which packets get routed. Refer Lecture 33, discussions on Rule Placement
QUESTION 10:
Among the following, which is the most unlikely to be considered as a suitable candidate for a match-
field for flow rules in SDN
Detailed Solution: The temperature of the motherboard of a switch generally has no role in
deciding how a packet will be forwarded. Refer to discussions on Flow rules in Lecture 33.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 11:
In SDN, the central controller of one network can communicate with the central controller of another
SDN network through which of the following directional APIs
Detailed Solution: In SDN, East and West bound APIs are used for inter-controller
communication in the control plane. Refer Lecture 34@1:56
QUESTION 12:
Suppose in SDN, there are two switches S1 and S2. The same packet P arrives in both the switches, S2 does
not have the appropriate flow rule to forward this particular packet, whereas S1 has. Then with respect to
the two switches, what is the correct action that is taken.
Detailed Solution: If a switch does not have an appropriate flow rule to process an incoming
packet, it sends PACKET_IN message to the controller, whereas if the switch has the flow
rule, it simply forwards the packet as per the flow rule. Refer lectures 33 and 34.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 13:
No matter how big an SDN network becomes, we can never have more than one SDN controller.
a. True
b. False
Detailed Solution: There is provision for splitting a single controller into multiple distributed
but connected controllers in tree/ring/mesh topologies to manage a very large network. Refer
Lecture 34, controller placement problem.
QUESTION 14:
With Software Defined IoT, it is possible to control the individual physical sensor and actuator nodes as
well as rule placement of the backbone network remotely by suitable orchestration and software.
a. Yes
b. No
Detailed Solution: SDIoT allows flexible control and management of the entire IoT network,
from the physical devices to the backbone network. Refer Lecture 35, architecture of SDN for
IoT.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
Soft-WSN that has been proposed as one of the solutions to Software Defined IoT achieves the following
Detailed Solution: Soft-WSN that has been proposed by Bera et. Al (IEEE SJ’16) achieves
both device and topology management efficiently. Refer Lecture 35@10:00 to 11:20
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 8
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
The process of abstracting physical network hardware and resources from the network services and use
cases are known as
a. Network Splitting
b. Network Virtualization
c. Network Scaling
d. None of these
Detailed Solution Network virtualization is the process by which various network services
are abstracted from their underlying physical hardware for smooth management. Refer
Lecture 36@4:00
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 2:
ODIN is one of the proposed solutions towards Software Defined WSN and mobility management. As
per the architecture of ODIN, which component of ODIN is placed on top of the controller.
a. ODIN master
b. ODIN agent
c. Both ODIN master and agent
d. Neither ODIN Master and agent
Detailed Solution: ODIN Master is associated with the SDN controller. Refer Lecture
36@9:50 onwards
QUESTION 3:
Shared pool of resources with easy configurability are important aspects of cloud computing.
a. True
b. False
Detailed Solution: Cloud computing deals with easy access of configurability of shared pool
of computing resources over network. Refer Lecture 37
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 4:
In cloud computing, the users have specific knowledge about the exact physical location of the computing
hardware with respect to the cloud services.
a. True
b. False
Detailed Solution: In cloud computing, the users have no knowledge about the backend
physical hardware orchestration and management. Refer Lecture 37.
QUESTION 5:
Suppose there are two organizations, A and B both of which provide cloud services. Any user can access the
cloud of A free of cost whereas only employees of organization B can access the cloud of B. Also
organization B has set up its cloud for only its own needs. With respect to the type of cloud infrastructure
provided by A and B, which among the following is true
Detailed Solution: Since anyone can access the cloud services of A, it is public, whereas as
only employees can access the cloud of B, the latter is a private cloud. Refer Lecture 37.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 6:
Which among the following can be considered as a potential service model for cloud computing.
a. Software as a Service
b. Database as a Service
c. Platform as a Service
d. All of these
Detailed Solution: All of the given options are well defined cloud service models. Refer
Lecture 37 and 38, cloud service models.
QUESTION 7:
Which of the following component can be considered as optional for a sensor node?
a. Sensing unit
b. Transceiver
c. Location finding unit
d. None of the above
Correct Answer: c. Location finding unit
Detailed Solution: Location finding unit, such as GPS is an optional component for any
sensor node.
See lecture 14 @ 08:30
QUESTION 8:
You have bought a spreadsheet processing software in the form of a CD-ROM which you would need to
install yourself on your computer to run and then manage. Is it an example of SaaS in cloud computing?
a. Yes
b. No
Correct Answer: b. No
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Detailed Solution: Cloud computing service models allows you to have access to software
over the Internet without the need to install them on your local computer. Refer lecture on
cloud computing service models.
QUESTION 9:
Suppose two persons A and B both wish to access a particular SaaS feature from a cloud service
provider through their respective personal computers. Both of them log into the cloud at the same time.
Then which among the following is true.
Detailed Solution: Cloud services are provided in a many to one manner by the service
provider simultaneously. So both will be able to access. Refer Lecture 38@13:50
QUESTION 10:
Along with Accounting, which among the following is an essential component of cloud service
management.
a. Virtualization
b. Billing
c. Deployment
d. None of these
Detailed Solution: Billing and Accounting are two important cloud service management
activities. Refer Lecture 39@5:36
QUESTION 11:
Which among the following security paradigms is concerned with securing the in-transit data between the
users and the cloud through the Internet.
Detailed Solution: Network level security is concerned with the security of the in-transit data
through the network in cloud computing. Refer Lecture 39@17:10
QUESTION 12:
“Cloud Security ensures that _____________ users can access their data after proper
____________________”
Choose which among the following should be the correct order of words to be filled in the blanks.
a. legitimate, authentication
b. illegitimate, authentication
c. malicious, inaction
d. malicious, attack
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Detailed Solution: Cloud security ensures proper authorization and authentication of only
legitimate users. Refer 39 on Cloud security models.
QUESTION 13:
Which among the following should be protected with proper access control in cloud computing
a. Database access
b. Server access
c. Virtual resource access
d. All of these
Detailed Solution: Access control should be incorporated in all of the given access points in
cloud security. Refer Lecture 39@24:09
QUESTION 14:
Before launching your cloud services as a product to customers, it is always a good idea to test your
cloud applications on a cloud simulator first in the pre-deployment phase.
a. True
b. False
Detailed Solution: Testing your cloud applications on a simulator first in the pre-deployment
phase can help you to correct many errors before actually launching them. Refer Lecture 40.
QUESTION 15:
With respect to virtualization in cloud computing, which among the following can be considered as
suitable virtualization paradigms.
a. Storage virtualization
b. Hardware virtualization
c. Application virtualization
d. All of these.
Detailed Solution: All of the given options can be considered for virtualization in cloud
architectures. Refer Chapter 10 of reference book ‘Introduction to IoT’ by Misra et. Al
(Cambridge University Press’20)
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 9
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
The OpenStack cloud simulation framework provides an interactive Graphical User Interface (GUI)
a. True
b. False
Detailed Solution: OpenStack provides a very interactive and efficient GUI. Refer Lecture 41
OpenStack demonstrations.
QUESTION 2:
Virtualized resources within the OpenStack simulator that you can define, set parameters of and deploy
within OpenStack are also known as
a. Instances
b. Files
c. Hypervisors
d. Sketches
Detailed Solution: In OpenStack instances refer to the virtual resources that you define,
initialize and deploy. Refer Lecture 41@15:36
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 3:
If you want to connect your OpenStack instance with the external public network (like the Internet), you
would need to connect the following between your instance and the public network
a. Database
b. File
c. Memory
d. Router
Detailed Solution: Your OpenStack instance is not connected by default to the public
network, you would need to initialize a router that makes the connection. Refer Lecture
41@17:37 onwards
QUESTION 4:
Which among the following is NOT a part of a sensor node connected to a wireless sensor network.
a. Sensing unit
b. Gaming unit
c. Processing unit
d. Communication unit
Detailed Solution: Each sensor in a WSN is equipped with Sensing unit, Processing unit and
Communication unit. Refer Lecture 42@5:29
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 5:
Consider that you have two types of sensors, soil monitoring sensor for smart farming and temperature
sensor for smart industry. The concept that the correct (right) type of sensor must be deployed only at their
correct and appropriate physical location suitable as per their functionalities is known as
Detailed Solution: The sensor nodes must always be deployed at their appropriate location.
i.e place which is suitable as per their functionalities. Refer Lecture 42@9:53
QUESTION 6:
Sensor-as-a-Service (Se-aaS) is an exciting new concept that brings the service models of cloud
computing to traditional IoT sensor networks. In this aspect, which among the following forms an
essential component of a Se-aaS architecture.
a. Sensor marketing
b. Sensor division
c. Sensor virtualization
d. Sensor manufacturing
Detailed Solution: Sensor virtualization is the principal concept behind the architecture and
orchestration of Se-aaS. Refer Chapter 10 of reference book ‘Introduction to IoT’ by Misra et.
(Cambridge University Press’20) Al and Refer Lecture 42
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 7:
Considering the end-to-end architecture of a WSN, from the physical sensor nodes right up to the users,
sensor-cloud supports different entities to have ownership of the different layers and components
simultaneously.
a. True
b. False
QUESTION 8:
In sensor cloud architecture the Sensor Cloud Service Provider (SCSP) is logically situated at the
following position of the architecture
Correct Answer: b. In between the physical sensors and the user layer
Detailed Solution: The SCSP is concerned with providing the cloud based services to the
virtual sensor layer, hence it sits in the middle of the physical sensors and the user application
layer. Refer Lecture 42 sensor cloud architecture.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 9:
In sensor cloud, the association between virtual sensor instances and the corresponding physical sensors
follows
Detailed Solution: One virtual sensor can be associated with multiple physical sensors,
similarly one physical sensor can be associated with many virtual sensors. Hence the mapping
is many-many. Refer Lecture 42@6:20 onwards
QUESTION 10:
Dynamic caching mechanism improves the flexibility and efficiency of sensor cloud.
a. True
b. False
Detailed Solution: Caching can improve in better handling the data movement and user
requests in a sensor cloud. Refer Lecture 43 on Dynamic and Adaptive Data Caching
mechanism.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 11:
With respect to the caching based architecture of a sensor cloud, the External Cache (EC) has a direct data
connection with which among the following
Detailed Solution: The external cache serves as the intermediate interconnection between the
physical sensors below and the Internal Cache (IC) above.
QUESTION 12:
Data from an IoT device is transferred to cloud via a network, which is then processed at the cloud and
then a response is sent back to the IoT device from the cloud after processing. The time it takes for one-
way data transfer between the node and cloud is 10s and the data processing time at the cloud is ‘x’
seconds. It takes a total of 25s for the entire to and fro transfer of data between the sensor and cloud along
with processing at the cloud. What is the value of x?
a. 10s
b. 5s
c. 15s
d. 20s
Correct Answer: b. 5s
Detailed Solution: Time taken for one-way data transfer between the node and cloud is 10s.
Total time taken for the data transfer is 25s. So 25=10+x+10 (transfer from node to
cloud+processing at cloud+transfer from cloud to node). Thus x=5s.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 13:
There are two types of sensor data, A and B. A is time sensitive that is required to be processed
immediately, while B is not time sensitive and can tolerate longer time for processing. As per the standard
utilities of cloud and fog computing, which among the following options show the correct processing
locations for A and B.
a. A:Cloud, B: Fog
b. A: Fog, B: Cloud
c. None of these
d. Both of these
Detailed Solution: Time sensitive data are processed at the fog layer while data that can
tolerate processing delay are processed at the cloud layer. Refer Lecture 45, the working of
Fog.
QUESTION 14:
There can be multiple fog nodes in between the physical sensor layer at the bottom and the cloud layer at
the top.
a: True
b. False
Detailed Solution: There can be multiple fog nodes in between the cloud layer and the
physical sensor nodes for efficient processing. Refer Lecture 45, Architecture of Fog.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 15:
Which among the following is/are a potential problem and challenge in fog computing?
a. Power consumption
b. Data security
c. Reliability
d. All of these
Detailed Solution: There are several key challenges in fog computing, some of which are the
options as given above. Refer challenges of Fog computing in Lecture 45.
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week
11
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
a. True
b. False
QUESTION 2:
Smart home uses the emerging smart grid technologies to satisfy which of the following?
a. Save energy
b. Contribute to the smooth and efficient functioning of the electric grid
c. Seek out the lowest rate
d. All of these
QUESTION 3:
Detailed Solution: For customers, the benefit of using a smart grid includes, updated
information on their energy usage in real-time, different pricing options, and enabling smart
appliances and other smart devices to be charged (Please refer to lecture SMART GRID-
I@14:34).
QUESTION 4:
QUESTION 5:
In smart grid communication, the gateway acts as a link between the smart meter and the
data aggregator unit.
a. True
b. False
QUESTION 6:
What is/are the vulnerability/vulnerabilities that may exist in the smart grid?
a. Physical threats
b. Availability
c. Dynamic system attacks
d. All of these
QUESTION 7:
Does the Industrial Internet of things follow the “rip & replace” approach?
a. Yes
b. No
Correct Answer: b. No
Detailed Solution: Industrial Internet of things follows the “wrap & re-use” approach.
(Please refer to lecture INDUSTRIAL INTERNET OF THINGS- I @ 6:12)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 8:
Sensor Purpose
QUESTION 9:
The implanted on-body sensors on a patient’s body have led to which of the following
facility/facilities?
QUESTION 10:
QUESTION 11:
a. Vehicle-to-vehicle connectivity
b. Vehicle-to-sensor connectivity
c. Vehicle-to-internet connectivity
d. All of these
QUESTION 12:
Structured Query Language is mainly used for managing _____________ data in database.
a. Unstructured
b. Structured
c. Audio
d. All of these
QUESTION 13:
QUESTION 14:
a. Noise
b. Abnormality
c. Biases
d. All of these
QUESTION 15:
a. True
b. False
************END***********
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Introduction to
Internet of Things
Assignment-Week 12
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15
QUESTION 1:
In general, the data collected from an interview can be analyzed through qualitative
analysis.
a. True
b. False
QUESTION 2:
a. Analysis of variables
b. Precision
c. Data dispersion
d. All of these
QUESTION 3:
A complete model does not have the same number of variables as the number of equations.
a. True
b. False
Correct Answer: b. False
Detailed Solution: A complete model does have the number of variables equal to the number of
equations. (Please refer lecture Data Handling and Analytics- Part II @ 8:15)
QUESTION 4:
Which of the following model is mostly applied when it is necessary to compare more than 2 populations
or samples?
a. Analysis of variance
b. Integration
c. Trigonometry
d. All of these
QUESTION 5:
Fill in the blanks. The effect size for determining statistical significance is the standardized
_________ difference between two groups.
a. Median
b. Mean
c. Inter quartile range
d. None of the above
QUESTION 6:
Which of the following is/are some of the future of the IoT applications in the agriculture?
QUESTION 7:
Which of the following may be considered as the objective of smart water management using IoT?
QUESTION 8:
With the advancement in the sensors and connectivity, it is feasible to enable preventive care
along with collecting patient’s data.
a. True
b. False
QUESTION 9:
Integrated design for remote server in AgriSens includes which of the following?
a. Web server
b. Repository data server
c. Multi users server
d. All of these
QUESTION 10:
The data sensed by the physiological sensors in an IoT-based healthcare system are of no
a. True
b. False
QUESTION 11:
Sensor Purpose
2. EMG
c. b. Measures the electrical and muscular activity of the heart
Detailed Solution: GSR measures the intensity of stress on a human, EMG measures the
health of a muscle and a nerve cell, ECG measures the electrical and muscular activity of the
heart, SpO2 measures the pulse and oxygen levels in blood. (Please refer book: S. Misra, A.
Mukherjee, and A. Roy, 2020. Introduction to IoT. Cambridge University Press. Chapter no.-
14, page no.-296)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 12:
a. Loss of connectivity
b. Security (e.g., data tampering and unauthorized access)
c. Error (e.g., misinterpretation of symptoms)
d. All of these
QUESTION 13:
Activity monitoring, particularly in IoT scenario, plays a vital role for rendering better quality of
life and safe guarding humans.
a. True
b. False
Detailed Solution: Particularly in IoT scenario, activity monitoring plays an important role for
rendering better quality of life and safe guarding humans. (Please refer lecture Activity
monitoring Case Study - I @ 10:00).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
QUESTION 14:
Processing the sensed data on the device itself is known as __________ approach.
a. Network based
b. In-place
d. None of these
Detailed Solution: Processing the sensed data on the device itself is known as in-place approach.
(Please refer lecture Activity monitoring Case Study - I @ 20:19).
QUESTION 15:
What is/are the different purpose/s that made wearable sensors popular?
a. Medical
b. Elderly-care
c. Child-care
d. All of these
Correct Answer: d. All of these
Detailed Solution: Wearable sensors have become popular for different purposes which
includes Medical, child-care and elderly-care (Please refer lecture Activity monitoring (Case
Study - I @ 2:15).
************END***********