Assssssss Iot
Assssssss Iot
Correct Answer: b. Network manager Detailed Solution: The Network manager supervises each
node in the network and guides them on when and where to send packets..
QUESTION 6:NFC is designed for use by devices within to each other?
a. Close proximity b. No near contact c.Both (a) and (b) d.None of these
Correct Answer: a. Close proximity
Detailed Solution: NFC is designed for use by devices within close proximity to each other.
QUESTION 7: contain information which is readable by other devices, however it cannot read information
itself. a.Active NFC devices b) Dumb NFC devices c. Passive NFC devices d. None
Correct Answer: c. Passive NFC devices Detailed Solution: Passive NFC devices contain information
which is readable by other devices, however it cannot read information itself.
QUESTION 8:NFC devices work on the principle of ?
a. Magnetic introduction
b. Magnetic induction
c. Both (a) and (b) D.None of these Correct Answer: b. Magnetic induction
Detailed Solution: NFC devices work on the principle of magnetic induction.
QUESTION 9:Which of these is NOT a mode of operation NFC? a. Server-to-Server
b. Peer-to-Peer
c. Read/Write
d. Card emulation
Correct Answer: a. Server-to-server
Detailed Solution: There are primarily three modes of operation in NFC as –
a. Peer-to-peer
b. Read/Write
c. Card emulation
QUESTION 10:State whether the following statement is true or false
Statement: Paging in Bluetooth is the process of forming a connection between two
Bluetooth devices.A.True B.False
Correct Answer: a. True
Detailed Solution: Paging in Bluetooth is the process of forming a connection between two
Bluetooth devices.
QUESTION 14: are simply those that are unable to perform an operation; this could be because of
power failure and environmental events.a. Normal nodes b. Failed nodes C)Badly failed nodes
D)None of these Correct Answer: b. Failed nodes Detailed Solution: Failed nodes are simply those
that are unable to perform an operation; this could be because of power failure and environmental events.
QUESTION 15:Dumb behavior of sensor nodes is in nature (as it is dependent on the effects of the
environmental conditions).
a. Temporal B)Spatial C)Both (a) and (b)
Correct Answer: a. Temporal Detailed Solution: Dumb behavior of sensor nodes is Temporal in nature
(as it is dependent on the effects of the environmental conditions).
QUESTION 11:
QUESTION 1:
Company ABC manufactures a room temperature monitor which sends data via protocol X and company
MNO manufactures another kind of room temperature sensor which sends data via protocol Y. With
respect to this, which among the following correctly captures the said scenario?
a. Homogeneity of IoT
b. Heterogeneity of IoT
Detailed Solution: IoT is characterized by heterogeneity where different kinds of devices, each
communicating with different set of protocols are designed. Refer first part of Lecture 21.
QUESTION 2:
When two IoT devices wish to communicate, semantic conflict in such a scenario in IoT
interoperability refers to_ .
a. Two devices built by the same manufacturer
b. Two devices sensing the same physical parameter
c. Two devices having different deployment location
d. Two devices having different processing and business logic
Correct Answer: d. Two devices having different processing and business logic
Detailed Solution: Semantic conflict refers to when different IoT devices have different processing and
business execution logic
QUESTION 3:Which of the following issues needs to be addressed while solving user
interoperability?
a)Device characterization and identification b)Syntactic interoperability c)Semanticinteroperability
d. All of these
Correct Answer: d. All of these Detailed Solution:All of the options given should be addressed
while solving user interoperability issues
QUESTION 4:
Which UMB interoperability component is responsible for converting physical devices into virtually
abstracted ones?
a. UMB Adaptor B. UMB Core C.UMB Hypervisor D.UMB Abstractor
Detailed Solution: UMB-A is responsible for converting physical devices into virtually abstracted ones.
QUESTION 5:A Protocol Translation Unit (PTU) acts as a middleware between two IoT devices with different
native protocols to enable them communicate with each other by translating the language of one device to
the other one and vice versa.
a. True b)False
Correct Answer: a. True
Detailed Solution: Refer Lecture 21@22:16 and onwards where PTU has been explained.
QUESTION 6:Suppose that a smart CCTV camera has been configured using C++ language. With
respect to the device’s cosign identification as per the standard definition (A,B,C,D), which among
the following the information “Configuration Lang:C++” will be most appropriately mapped ?
a)A b)B c)C d) D
Correct Answer: d. D Detailed Solution: ‘D’ refers to the definition of the object, hence is the most
appropriate to which configuration language, which may be considered a definition will be mapped.
QUESTION 7:Which among the following are components of an Arduino UNO Board?
a)LED Power Indicator b) Digital I/O Pins c)Analog IN Pins d) All of these
Correct Answer: d. All of these Detailed Solution: An Arduino UNO board contains several
components, which also contain the ones listed above. Refer Lecture 22 on Arduino Board details.
QUESTION 8: What is the series of micro controller chips powering Arduino UNO boards?
a)ATM series b)X86 series c)ARM 64series d. ATMEGA series
Correct Answer: d. ATMEGA series Detailed Solution:Arduino UNO micro controllers are powered by
ATMEGA series. Refer to any standard documentation on Arduino UNO.
QUESTION 9: In Arduino IDE the ‘Verify’ and ‘Upload’ buttons perform the exact same task.
a)False b)True
Correct Answer: a. False
Detailed Solution: In Arduino IDE, ‘Verify’ compiles the sketch and checks for its correctness, while
‘Upload’ uploads the sketch to the Arduino board.
QUESTION 10:Suppose that an Arduino UNO board is connected to a pneumatic sensor which sends tyre
pressure as floating point numbers. Which among the functions will you use to read from the sensor?
a)digitalRead() b)analogWrite() c. analogRead() d)None of these
Correct Answer: c. analogRead() Detailed Solution: As per the basics of Arduino
programming. When you have real numbers in analog format, you use
analogRead().QUESTION 11: Consider the following Arduino sketch.
What must be inserted in the place of ‘??’ within the second pinMode() function in void setup()?
a. INPUT
b. OUTPUT
c. None of these
d. Anyone of these is okay
Correct Answer: b. OUTPUT
Detailed Solution: Since pin ‘g’ is writing digital values, it is required to set in OUTPUT mode.
QUESTION 12:For integrating different types of sensors (such as DHT) with Arduino, you would need to
install and #include the sensor specific libraries in your sketch. A)True b)False
Correct Answer: a. True Detailed Solution:Each different type of sensor has its specific libraries and
functions which must be included with the Arduino sketch
QUESTION 13: Which of the following best describes the command given below?
ServoDemo.write(180);
a)Creates an instance of the servo b) Pin writes 180 to the servo c) Servo moves 180 degrees d. All of these
Correct Answer: c. Servo moves 180 degrees . Detailed Solution: As per the basics of Arduino libraries.
QUESTION 14:In an Arduino sketch, for the default function void setup(), which of the following is true?
a)Point where the code terminates. B) Point where
the code starts. C)It iterates over the different
tasks in the program.d)None of the above.
Correct Answer: b. Point where code starts. Detailed Solution: As per the basics of Arduino
programming
QUESTION 15: Which among the following can also be described as a relay, which is an actuator?
a)Pneumatic actuator b)Motor type actuator c)Electro-mechanical switchd)Thermal switch
Correct Answer: c. Electro-mechanical switch
Detailed Solution: Relay is a type of electro-mechanical switch and is also an actuator.
Week 6
QUESTION 1:Python doesn’t support strict rules for syntax and static variable declaration like C
a. True b)False
Correct Answer: a. True Detailed Solution: As per Python program
QUESTION 2: Fill in the blanks. is a data-type in Python.
a)list b)Tuple c)Dictionary d)all of these
Correct Answer: d. All of these
Detailed Solution: As per Python program.
QUESTION 3:Fill in the blanks. are the variables declared inside a function.
a)Immediate variables b)Global variables c)Local variables d) None of these
Correct Answer: c. Local variables
QUESTION 4:What does the open() function return for file operations?
a)File mode b)File object c)File name d)None of these
Correct Answer: b. File object
QUESTION 5:Python does not follow rigid indentation.
a. True b)false
Correct Answer: b. False
Detailed Solution: As per the basics of Python programming.
QUESTION 6:Which of the following is used to display an image in Python?
a. image.show()
b. image.open()
c. image.name()
d. image.mode()
Correct Answer: a. image.show()
Detailed Solution: As per the basics of Python programming
QUESTION 7:Which of the following models does python follow for networking.
a. Client-server
b. P2P
c. All of these
d. None of these
Correct Answer: a. Client-server
Detailed Solution: In python programming, python provides network services for client- server
models.
QUESTION 8:In python, ”with” ensures the file is closed after the operation is completed, but not when an
excetion occurs.
a)true b)False
Correct Answer: b. False Detailed Solution: As per the basics of Python programming
QUESTION 9:In Raspberry Pi, GPIO acts only as a digital output.
a)True b)False Correct Answer: b. False Detailed Solution: Raspberry Pi GPIO acts as both digital output and
digital input
QUESTION 10:Which of the following exits the nano editor in the terminal?
a. Ctrl+O b) Ctrl+X c)Ctrl+A d)None of these
Correct Answer: b. Ctrl+X
Detailed Solution: Ctrl+X exists the editor
Does Raspberry Pi provide configuration options for cameras ?
a. Yes b)No
Correct Answer: a. Yes
Detailed Solution: Raspberry Camera can be configured using raspi-config.
QUESTION 12:Does python provide a module for pi-camera ?
a. Yes b)no
Correct Answer: a. Yes Detailed Solution: Raspberry Camera can be configured using the
Python camera module python-picamera
print(pt)
What will be the output (See every detail, including the apostrophes carefully)?
a) ‘Sensor’,’Actuator’,’Arduino’]
b. Sensor@Actuator’,’Arduino’]
‘Sensor’,’Actuator%Arduino’] 4) [‘Sensor@Actuator%Arduino’]
b. add()
c. label()
d. title()
Detailed Solution: The title(<name_of_title>) functions adds title to a plot while using matplotlib.
QUESTION 8:In traditional non software-defined network consisting of a network of switches, suppose
OSPF is being used as the routing protocol. In this context which among the following is true.
a. All the switches execute OSPF distributively
b. Only one switch executes OSPF
c. No switch executes OSPF D)All of these are true
Correct Answer: a. All the switches execute OSPF distributively Detailed Solution: Traditional networks
are distributive, hence all the switches of the network execute OSPF
QUESTION 9:
In SDN, the Operating System (OS) is separated (i.e not strongly coupled) from the physical
hardware for each switch.
a)True
b)False
Detailed Solution: SDN separates the physical and logical plane of the switch. So OS (part of logical plane)
is separated from the hardware (part of the physical plane) for each switch.
QUESTION 10:Which among the following is a popular protocol implementing SDN?
a. OpenSwitch
b. OpenStack
c. OpenFlow
d. OpenEdge
Correct Answer: c. OpenFlow Detailed Solution: OpenFlow by ONF is the most popular protocol
implementing the principles of SDN.
QUESTION 11:With respect to Software Defined Networking (SDN), which among the following is true?
a. SDN couples the data plane and control plane.
b. SDN has no relation to either data plane or control plane C)
c. SDN separates the data plane and control plane.
d. None of the stated.
Correct Answer: c. SDN separates the data plane and control plane
Detailed Solution: SDN separates the data plane and control plane. It is the fundamental principle of SDN.
qUESTION 12:consider the following figure below. To which issue of SDN does this particular figure can
be related to?
A)True B)False Correct Answer: a. True Detailed Solution: Cloud computing uses virtualization heavily
and thus it allows different users to share the same underlying physical infrastructure.
QUESTION 6: As per NIST Visual Model of Cloud Computing, ‘Hybrid Cloud’ model and PaaS model both
fall in the same category. A)True b. False
Correct Answer: b. False Detailed Solution: ‘Hybrid Cloud’ is an example of cloud deployment model
while ‘PaaS’ is an example of cloud service model.
QUESTION 7: When you are accessing Google docs or Microsoft Word online for accessing the
features of a document writing software from your browser without specifically installing them,
which among the following cloud service models is the most appropriate one that you are using.
A)SaaS B)PaaS C)IaaS D)DaaS
Detailed Solution: This is an example of SaaS, since you are accessing a word/document processing
software as a client over the network. The actual software itself runs on some remote cloud server
QUESTION 8: An organization A wants to deploy a cloud infrastructure, whereby it wants to push majority
of the data to a cloud whose servers can be situated anywhere within the globe, but it wants certain
private data to be pushed only to cloud servers that are present on-premise and are accessible by only
authenticated members of the organization. In this context which among the following deployment model
should be used?
A)Private Cloud B)Public Cloud C)Hybrid CloudD) Any of these
Correct Answer: c. Hybrid Cloud Detailed Solution: Hybrid cloud deployment model supports both
the features of public and private cloud.
QUESTION 9:
Cloud services and resources should be rapidly in order to achieve their
required performance a.entrusted b. elastic C)enterprise D)None of the given
Correct Answer: b. elastic Detailed Answer: Rapid elasticity is one of the key requirements for cloud
computing paradigms and models.
QUESTION 10: Suppose that a start-up wants to enter into online book delivery business. It wants
to create the user interface and the application by itself, but it does not have any networking or
storage facility, so it wants to adopt the cloud computing practice. In this respect, which among
the following cloud service models is most suitable for the start-up.
a. Only SaaS
b. Neither PaaS nor IaaS
c. Both PaaS and IaaS can be adopted
d. Neither SaaS, PaaS or IaaS
Detailed Answer: Since both IaaS and PaaS provides infrastructure and storage support to clients, either
of PaaS or IaaS can be employed.
QUESTION 11: Data security and client authentication is an issue in which of the following cloud
service models?
A)SaaSB) aaS and PaaS C)IaaSll of them
Correct Answer: d. All of them Detailed Solution: Security is a pertinent issue in all of the cloud service
models, which includes SaaS, PaaS and IaaS. Refer to any standard discussion on challenges and issues on
cloud computing and Lecture
QUESTION 12:Network, and application level securities are the three aspects of cloud
infrastructure securities.
A)Client B)W eb c. Host d. Wireless
Detailed Solution: Network, host and application level securities are the fundamental aspects of
cloud infrastructure securitie
QUESTION 13: When a new user logs into a cloud framework, the first thing that needs to be done
is .
a. User should be authenticated
b. User should immediately be granted all the resources
c. User should log off
d. User should be penalized
Detailed Solution: User authentication is one of the primary security issue and any user which logs
into the cloud framework must first be authenticated.
QUESTION 14: Service Level Agreements (SLAs) are mutually agreed by the client (customer) and
cloud service provider (CSP) at the beginning. With respect to SLAs, what are the views that SLAs
provide?
a. Customer Point of View
b. CSP Point of View
c. Both Customer and CSP Point of View
d. Neither Customer nor CSP Point of View
Detailed Solution: SLAs provide both the customer point of view and the CSP point of view between the
customer and the CSP.
QUESTION 14: CloudAnalyst simulation tool provides GUI and is written on top of CloudSim
modules. A)Yes B)No
Detailed Solution: CloudAnalyst is built on top of CloudSim and also provides a GUI.
QUESTION 1 :Which component of OpenStack do you use to access all the other components?
a. Horizon
b. Glance
c. Neutron
d. None of these
Correct Answer: a. Horizon Detailed Solution: Horizon is the dashboard of OpenStack which provides the
GUI and from where you can access other components.
Component of OpenStack?
A)Horizon B) Heat c. Plasma D)d. Neutron
Correct Answer: c. Plasma
Detailed Solution: Plasma is not a component of OpenStack. The rest are various components,
including Nova, Glance, Swift etc.
QUESTION 3: Sensor cloud is simply dumping and organizing of sensor data on cloud computing
platforms. a. True b. False
Correct Answer: b. False
Detailed Solution: Sensor cloud incorporates many aspects and not simply dumping of senor data over
cloud platforms.
QUESTION 4: Which among the following are limitations of traditional Wireless Sensor Networks?
A)Procurement Issues B)Deployment Issues C) Maintenance Issues d. All of the given
Correct Answer: d. All of the given Detailed Solution: For traditional WSNs, procurement, deployment and
maintenance are all critical issues that needs to be taken care of.
QUESTION 5:……….,In a typical sensor cloud architecture, the sensor cloud infrastructure that
provides the virtualization lies ______
A)At the same layer as physical sensor devices B) At the application layer
C)In between the physical sensor layer and the application layerD)Sensor cloud does not support virtualization
Correct Answer: c. In between the physical sensor layer and the application layer
Detailed Answer: In a typical sensor cloud architecture, the sensor cloud infrastructure that provides
the virtualization lies in between the physical sensor layer and the application layer.
QUESTION 6:Generally speaking, Sensor Cloud Service Providers (SCSPs) are also always the owners
of the physical sensors A)YES B)NO
Correct Answer: b. No Detailed Solution: SCSPs are providers of the virtualized sensor services, but
they may not the owners of the physical sensors in a typical deployment. Refer Lecture 42, ‘Actors
in Sensor-cloud’.
QUESTION 7:In a typical sensor cloud architecture with virtualization, one virtual sensor can be associated
with how many physical sensors? A)Only one B)One or more than one C)None D)Only two
Correct Answer: b. One or more than one Detailed Solution: One instance of a virtual sensor in
sensor cloud architecture can be mapped with one, two or more physical sensors below. Refer Lecture
43, Optimal composition of virtual sensors
QUESTION 8: Sensor virtualization aims to achieve more in providing sensor based services
A)Complexity b. Flexibility
Correct Answer: b. Flexibility
Detailed Solution: Sensor virtualization and sensor cloud architecture are designed to provide more
flexibility and convenience than traditional sensor based services. Refer to the lectures on Sensor Cloud
and its motivation closely.
QUESTION 9: Suppose that you want to start a business to provide some IoT based application,
but you do not have the means to develop the application layer logic, neither you have the
means to purchase and deploy physical sensors. You can however, rent cloud servers for use and
write interface logic for interfacing with other modules. Which among the following actors will
be the most suitable for you?
a. Physical sensor owner
b. Application layer developer
c. Sensor Cloud Service Provider (SCSP)
d. You cannot start the business
Correct Answer: c. Sensor Cloud Service Provider (SCSP) Detailed Answer: SCSPs provide the sensor
virtualization layer in between the application layer and the physical sensor layer and thus this is the best
business model as per the requirements and constraints given
QUESTION 10: Which among the following is implemented along with sensor cloud to make its services
and performance better?
A). Cashing b. Caching C)Casing d) Calling
Correct Answer: b) Caching Detailed Solution: Caching is very important in sensor
cloud and is implemented along with sensor cloud to make the performances better
QUESTION 11: Which among the following cases is most likely to reduce the overall price of
sensor-cloud implementation provided that the data traverses through multiple sensor hops
starting from the origin sensor to the sink node, and provided that all owners are honest and
charge for only what is required?
a. If physical sensors are owned by multiple owners with high profit margin
b. If all physical sensors are owned by a single owner with uniform profit margin
Correct Answer: b. If all physical sensors are owned by a single owner with uniform profit margin
Detailed Solution: If all the physical sensors are owned by a single owner, then the single owner will
charge an uniform price for data traversing through the sensors. On the other hand, if multiple sensor
owners are there, different owners will charge different rates, which may increase the price.
QUESTION 12: Fog computing is aimed to replace cloud computing completely and has no scope
for integration with cloud a. True b. False
Correct Answer: b. False Detailed Solution: Fog computing is designed to assist and compliment cloud
based technologies in providing better services, not remove cloud all together.
QUESTION 13: Suppose data from an IoT device first goes to Fog layer for some basic
processing, after which it goes to Cloud layer for advanced processing, then the processed data
comes back to the Fog layer and then, it finally comes back to the origin sensor node. In the
return journey no processing of data takes place anywhere, just transfer of data takes place. If
‘Tf’ is the time taken by the data to travel from sensor to fog and vice versa, and ‘Tc’ is the time
taken by the data to travel from fog to cloud and vice versa, ‘Tfp’ is the data processing time at
fog and ‘Tcp’ is the data processing time at cloud, what is the total round trip time ‘T’ taken by
data starting from the origin sensor node, processing the data and then back to the sensor node
after being processed.
A)T = Tf + Tc + Tfp + Tcp B) T = Tf + Tc C)T = 2(Tf + Tc) + Tfp + Tcp D)T = 4(Tf + Tc + Tfp + Tcp)
Correct Answer: c. T = 2(Tf + Tc) + Tfp + Tcp
Detailed Solution: Since data comes back to the origin sensor node, the traversal latency Tf and Tc will be
counted twice. But, since processing takes place only once during onward journey, processing delay is
only one time. Therefore, T = 2(Tf + Tc) + Tfp + Tcp.
QUESTION 14:Consider the standard Fog computing architecture. In which of the following layer will ‘very
time sensitive data’ be processed? A)Nearest fog node B)Distant aggregate fog node C)Cloud D)Does
not matter Detailed Solution: it is required that the nearest fog node processes the data so that
immediate action can taken. This is the benefit of having fog computing
QUESTION 15:“Network, Accelerator, Compute and Storage” constitute the part of which view of fog
computing architecture, as defined by OpenFog Consortium Architecture Working Group?
A) System View b. Node
View c. Software Viewd.
NoneABOV
Correct Answer: b. Node View
Detailed Solution: Fog Computing Architectural framework has several views, node, system and software
among them. Network, Accelerator, Compute and Storage” fall under Node View
QUESTION 1: Data fusion enables optimum utilization of massive data gathered from multiple sources.
a. True B)False
Correct Answer: a. True Detailed Solution: Data fusion enables optimum utilization of massive
data gathered from multiple sources.
QUESTION 2:Which of the following is a stage in data fusion?
a. Decision level B)Feature level C)Pixel level D)All of the above
Correct Answer: d. All of the above Detailed Solution : Decision level, feature level, pixel level
and signal level are the four stages of data fusion.
QUESTION 3:Which of the following is one of the challenges of Data fusion?
a. Imperfection B)Conflicts C)Ambiguity D)All of the above
Correct Answer: d. All of the above Detailed Solution : The challenges of data fusion involves
Imperfection, Conflicts and Ambiguity.
QUESTION 4:Which of the following is one of the theory of evidence-based mathematical methods of data
fusion?
a. Belief function B)Bayesian analysis C)ANN D)None of these