0% found this document useful (0 votes)
4 views22 pages

Assssssss Iot

The document consists of a series of questions and answers related to the Internet of Things (IoT) and its components, including sensors, actuators, and communication protocols like MQTT and CoAP. It covers various concepts such as the characteristics of IoT, the functions of gateways, and the principles behind NFC and Bluetooth technologies. Additionally, it discusses the operational modes of different protocols and the constraints on sensor nodes.

Uploaded by

sonumaria000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views22 pages

Assssssss Iot

The document consists of a series of questions and answers related to the Internet of Things (IoT) and its components, including sensors, actuators, and communication protocols like MQTT and CoAP. It covers various concepts such as the characteristics of IoT, the functions of gateways, and the principles behind NFC and Bluetooth technologies. Additionally, it discusses the operational modes of different protocols and the constraints on sensor nodes.

Uploaded by

sonumaria000
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

1.Which of the following are the enablers of IoT?

a. RFID B.Nanotechnology C.Sensors D. All of the these


QUESTION 2:Which of the following is/are NOT a characteristic of IoT?
A. Efficient, scalable and associated architecture.B.ambiguous
naming and ddressing. C.Abundance of sleeping nodes, mobile &
non-IP devices D.None of these
QUESTION 3:State whether the following statement is True or False.
Statement: The increasing number of devices in IoT is expected to result in an address
crunch. A.True B.False Detailed Solution: The increasing number of devices in IoT is
expected to result in an address crunch.
QUESTION 4:State whether the following statement is True or False.
Statement: The gateway has a unique network prefix, which can be used to identify them globally.
a. True B.False Detailed Solution: The gateway has a unique network prefix, which can be used to
identify them globally.
QUESTION 5:Sometimes, when there is a need for the nodes to communicate directly to the Internet,
can be used. A.Sensors B. Actuators c. Tunneling D. None of these
Detailed Solution: Sometimes,there is a need for the nodes to communicate directly to the
Internet. This is achieved by tunneling.
QUESTION 6:In a node/network is connected to multiple networks for improved reliability.
A.Transparent roaming B.Multi-homing
C.None of these D.Both (a) and (b)
Detailed Solution: In multi-homing, a node/network is connected to multiple networks for improved
reliability.
QUESTION 7:The IPv6 notation uses values.
a. Roman B. Hexadecimal C.Both (a) and (b) D.None of these
Detailed Solution: The IPv6 notation uses hexadecimal values.
QUESTION 8:A detects (senses) changes in the ambient conditions or in the state of another device
or a system, and forwards or processes this information in a certain manner.
a. Sensor B.Actuator C.Both (a) and (b) D.None of these
Correct Answer: a. Sensor.
Detailed Solution: A sensor detects (senses) changes in the ambient conditions or in the state of
another device or a system, and forwards or processes this information in a certain manner..
QUESTION 9:A microphone is an example of an .
a. Input device and actuator B.Only actuator C.Only Transducer D.Input device and transducer
Correct Answer: d. Input device and transducer
Detailed Solution:A microphone is an example of an input device and transducer.
QUESTION 10:The of a sensor is the smallest change it can detect in the quantity that it is
measuring. A. Resolution B. Bias C.Noise D.None of these
Correct Answer: a. Resolution
Detailed Solution: The resolution of a sensor is the smallest change it can detect in the
quantity that it is measuring.
QUESTION 11:Based on the data type, sensors are classified as _ .
a. Scalar and Vector/Multimedia B.Only scalar C.Both (a) and (b) D.Only vector
Correct Answer: a. Scalar and Vector/Multimedia
Detailed Solution:Based on the data type, sensors are classified as Scalar&
Vector/Multimedia.
QUESTION 12:Solenoid valve is an example of .
a. Sensor
B. Actuator
c. Processing unit
d. None of these
Correct Answer: b. Actuator Detailed Solution:Solenoid valve is an example of actuator.
QUESTION 13:An actuator requires a and .
a. Control signal and a bias signal
b. Control signal and a source of energy
c. Noise signal and a source of energy
d. None of these
Correct Answer: b. Control signal and source of energy
Detailed Solution: An actuator requires a control signal and source of energy.
QUESTION 14:State whether the following statement is True or False.
Statement: Pneumatic rack and pinion actuators are used for valve controls of water
pipes. A.True B.False
Correct Answer: a. True Detailed Solution: Pneumatic rack and pinion actuators are used for valve
controls of water pipes.
QUESTION 15:Which of the following is NOT a function of an IoT gateway?
a. Switching B.Routing
C.Protocol conversion
d. Generating noise
Correct Answer: d. Generating noise Detailed Solution: Switching, routing, and protocol conversion
are the functions of an IoT gateway.
QUESTION 1:The full form of MQTT is
a. Message Queue Telemetry Transport
QUESTION 2:In MQTT, acontrols the publish-subscribe messaging pattern.
a. Publishers B.Message Broker C. Subscribers D.All of these
Correct Answer: b. Message Broker Detailed Solution: In MQTT, a message broker controls the
publish-subscribe messaging pattern.
QUESTION 3:Which of the following is NOT a component of MQTT?
a. Publishers
b. Users
c. Brokers
d. None of these
Correct Answer: b. Users
Detailed Solution: The three components of MQTT are –
a) Publishers , Subscribers , Brokers
QUESTION 4: is an extension of MQTT which uses lightweight attribute based encryption. It has
main stages.
a. SMQTT, three
B.MQTT, three
c. SMQTT, four
d. None of these
Correct Answer: c. SMQTT, four
Detailed Solution: SMQTT is an extension of MQTT which uses lightweight attribute based
encryption. It has four main stages.
QUESTION 5:Which of the following is based on Request-Response model between end-points.
a. MQTT b. CoAP C)Both (a) and (b)
D)Neither (a) nor (b)
Correct Answer: b. CoAP Detailed Solution: CoAP is based on Request-Response model
between end-points.
QUESTION 6:The two sub-layers of CoAP are -
a. Messaging and Request/response
Correct Answer: d. Messaging and Request/response
Detailed Solution: CoAP has two sub-layers which are –
a) Messaging
b) Request/response
QUESTION 7:Which of the following is used for real-time exchange of structured data?
a. MQTT B.SMQTT C. XMPP D.CoAP
Correct Answer: c. XMPPDetailed Solution: XMPP is used for real-time exchange of structured data.
QUESTION 8: XMPP uses the architecture.
a. Publish-subscribe
b. Client-server
c. Both (a) and (b)
d. Neither (a) nor (b)
Correct Answer: b. Client-server Detailed Solution: XMPP uses the client-server architecture.
QUESTION 9:With respect to AMQP, which of the following message delivery guarantees allow for each
message to be delivered certainly as well as to be delivered multiple times.
a. At-least-once
b. At-most-once
c. Exactly-once
d. Both (a) and (b)
Detailed Solution: The message delivery guarantees of AMQP are –
 At-most-once – each message is delivered once or never.
 At-least-once – each message is certain to be delivered, but may do so multiple
times.
 Exactly-once – message will always certainly arrive and do so only once
QUESTION 10:Which of the following is/are NOT an AMQP frame type?
a. Open
b. Close
c. End
d. None of these Correct Answer: d. None of these
Detailed Solution: Open, close, and end are valid frame types of the AMQP protocol.
QUESTION 11:Which of the following is/are NOT the function/functions of the Bindings component of the
AMQP protocol?
a. Receives messages and routes them to queues
b. Separate queues for separate business process
c. Consumer receive messages from queues d.
All of these
Correct Answer: d. All of these Detailed Solution: The Bindings component of the AMQP protocol
manages the rules for distributing messages
QUESTION 12:Which of the following is/are NOT exchange types in AMQP?
a. Direct b. Indirect
c.Fan-out d.Topic
Correct Answer: b. Indirect
Detailed Solution: The AMQP exchange types are –
a) Direct b)an-out c) Topic d)Header
QUESTION 13:State whether the following statement is True or False.
Statement: The IEEE 802.15.4 is a well-known standard for low data-rate Wireless
Personal Area Network (WPAN).
a. True B)False
Correct Answer: a. True
Detailed Solution: The IEEE 802.15.4 is a well-known standard for low data-rate Wireless Personal
Area Network (WPAN).
QUESTION 14:The networking topologies supported in the IEEE 802.15.4 are -
a. Only Star b.Star and Mesh c. Only Mesh d.None of these
Correct Answer: b. Star and Mesh
Detailed Solution: The networking topologies defined in IEEE 802.15.4 are star and mesh.
QUESTION 15:State whether the following statement is True or False.
Statement: Periodic transmission of beacon messages does not occur in beacon enabled
networks (IEEE 802.15.4). A)False B)True
Correct Answer: a. FalseDetailed Solution: Periodic transmission of beacon messages occur in
beacon enabled networks (IEEE 802.15.4).
QUESTION 1:State whether the following statement is true or false.
Statement: Wired HART lacks a network layer.
a. True B. False
Correct Answer: a. True Detailed Solution:Wired HART lacks a network layer.
QUESTION 2:The HART physical layer is derived from protocol and operates only in__GHz ISM band
a. IEEE 802.15.4, 2.4 B.IEEE 802.15.4.8
c. IEEE 802.16.5, 4.8 d. None of these
Correct Answer: a. IEEE 802.15.4, 2.4 Detailed Solution:The HART physical layer is derived from
IEEE 802.15.4 protocol and operates only in 2.4 GHz ISM band.
QUESTION 3:State whether the following statement is True or False
Statement: Super-frames in HART consist of grouped 20ms wide timeslots.
a. True
b. False
Correct Answer: b. False
Detailed Solution:Super-frames in HART consist of grouped 10ms wide timeslots.
QUESTION 4: identifies channels consistently affected by interference and removes themfrom use.
a. Channel hopping
b. Channel aggregating
c. Channel blacklisting
d. Frequency aggregatingCorrect Answer: c. Channel Blacklisting
Detailed Solution:Channel Blacklisting identifies channels consistently affected by interference
and removes them from use.
QUESTION 5:The _ supervises each node in the network and guides them on when and where to send
packets.
a. Application manager b. Network
manager c.Trust manager d.None of

Correct Answer: b. Network manager Detailed Solution: The Network manager supervises each
node in the network and guides them on when and where to send packets..
QUESTION 6:NFC is designed for use by devices within to each other?
a. Close proximity b. No near contact c.Both (a) and (b) d.None of these
Correct Answer: a. Close proximity
Detailed Solution: NFC is designed for use by devices within close proximity to each other.
QUESTION 7: contain information which is readable by other devices, however it cannot read information
itself. a.Active NFC devices b) Dumb NFC devices c. Passive NFC devices d. None
Correct Answer: c. Passive NFC devices Detailed Solution: Passive NFC devices contain information
which is readable by other devices, however it cannot read information itself.
QUESTION 8:NFC devices work on the principle of ?
a. Magnetic introduction
b. Magnetic induction
c. Both (a) and (b) D.None of these Correct Answer: b. Magnetic induction
Detailed Solution: NFC devices work on the principle of magnetic induction.
QUESTION 9:Which of these is NOT a mode of operation NFC? a. Server-to-Server
b. Peer-to-Peer
c. Read/Write
d. Card emulation
Correct Answer: a. Server-to-server
Detailed Solution: There are primarily three modes of operation in NFC as –
a. Peer-to-peer
b. Read/Write
c. Card emulation
QUESTION 10:State whether the following statement is true or false
Statement: Paging in Bluetooth is the process of forming a connection between two
Bluetooth devices.A.True B.False
Correct Answer: a. True
Detailed Solution: Paging in Bluetooth is the process of forming a connection between two
Bluetooth devices.

QUESTION 11:There aremodes of operation in Bluetooth.


A.3 B.2 C. 4 D.5
Correct Answer: b. 4 Detailed Solution: There are 4 modes of operation in Bluetooth.
QUESTION 12:Zwave uses for signaling and control?
a. Light
b.RF
C.SOund
c. None of these Correct Answer: b. RF Detailed Solution: Zwave
uses RF for signaling and control.

QUESTION 13Which of the following is/are not a constraint on sensor


nodes?
A.Must consume high powerB.Not be adaptive to the Environment
c. Both (a) and (b) d)None of these
Correct Answer: c. Both (a) and (b) Detailed Solution: Sensor nodes -

a. Must consume extremely low power


b. Be adaptive to the environment

QUESTION 14: are simply those that are unable to perform an operation; this could be because of
power failure and environmental events.a. Normal nodes b. Failed nodes C)Badly failed nodes
D)None of these Correct Answer: b. Failed nodes Detailed Solution: Failed nodes are simply those
that are unable to perform an operation; this could be because of power failure and environmental events.
QUESTION 15:Dumb behavior of sensor nodes is in nature (as it is dependent on the effects of the
environmental conditions).
a. Temporal B)Spatial C)Both (a) and (b)
Correct Answer: a. Temporal Detailed Solution: Dumb behavior of sensor nodes is Temporal in nature
(as it is dependent on the effects of the environmental conditions).

QUESTION 1:State whether the following statement is true or false.


Statement: Coverage in WSN is defined as the area-of-interest is covered satisfactorily. a.
True
b. False
Correct Answer: a. True Detailed Solution: Coverage in WSN is defined as the area-of-interest is
covered satisfactorily.
QUESTION 2:If transmission range >= 2* sensing range,
a. Coverage implies greater coverage
b. Coverage implies connectivity
c. Both (a) and (b)
d. None of these
Correct Answer: b. Coverage implies connectivity
Detailed Solution: If transmission range >= 2* sensing range, coverage implies connectivity.
QUESTION 3:The two types of reporting in WSN are -
a. Event driven and machine driven
b. Event driven and weather driven
c. Event driven and on demand
d. None of these
Correct Answer: c. Event driven and on demand
Detailed Solution: The two types of reporting in WSN are Event driven and on demand
QUESTION 4:The objective of coverage in WSN is to use a number of sensors and
the network lifetime.
a. minimum, minimize
b. minimum, maximize
c. maximum, minimize,
d. maximum, maximize
Correct Answer: b. minimum, maximize
Detailed Solution: The objective of coverage in WSN is to use minimum number of sensors
and maximize the network lifetime.

QUESTION 5:State true or false.


The disadvantages of stationary Wireless Sensor Networks are -
Statement-I: Node failure may result in partition of networks.
Statement-II: Topology cannot change automatically.
a. Statement-I True, Statement-II False
b. Both Statements are False
c. Both Statements are True
d. None of these
Correct Answer: c. Both Statements are True
Detailed Solution: The disadvantages of stationary Wireless Sensor Networks are –
a. Node failure may result in partition of networks.B.Topology cannot change
automatically.
QUESTION 6: A_ in MWSN moves in order to collect data from sensor nodes and goes to the sink and
delivers the collected data from different sensor nodes.
a. Drop
b. Molecule
c. Mule
d. None of these
Correct Answer: c. Mule Detailed Solution: A mule in MWSN moves in order to collect data from
sensor nodes and goes to the sink and delivers the collected data from different sensor nodes.
QUESTION 7: allows distributed sensing carried by humans and the goal is not just to collect data
but to allow the common people to assess and share the knowledge.
a. Voluntary sensing
b. Compressive sensing
c. Dynamic sensing
d. Participatory sensing
Correct Answer: d. Participatory sensing
Detailed Solution: Participatory sensing allows distributed sensing carried by humans and the goal
is not just to collect data but to allow the common people to assess and share the knowledge.
QUESTION 8:Which of the following is/are NOT feature/features of UAV networks?
a. Mesh or star networks
b. Multi-tasking
c. Large coverage area
d. None of these
Correct Answer: d. None of these
Detailed Solution: The following are the features of UAV networks -
a. Mesh or star networks
b. Multi-tasking
c. Large coverage area
QUESTION 9:Which of the following is NOT a UAV network constraint?
a. Frequent link breakages
b. Prone to malfunction
c. Very Complex
d. None of These
Correct Answer: d. None of these
Detailed Solution: The following are UAV network constraints -
a. Frequent link breakages
b. Prone to malfunction
c. Very Complex
QUESTION 10: In configuration, UAVs form multiple star topology. One node from each group
connects to the ground station.
a. Multi-star
b. Ring C. Both (a) and (b) D.None of these
Correct Answer: a. Multi-star Detailed Solution: In multi-star configuration, UAVs form multiple
star topology. One node from each group connects to the ground station.

QUESTION 11:

The full form of FANET is?


a. Flying Ad Hoc Network
b. Fast Ad Hoc Network
c. Fidelity Ad Hoc Network
d. None of these
Correct Answer: a. Flying Ad Hoc Network
Detailed Solution: The full form of FANET is Flying Ad Hoc Network
QUESTION 12:Low-end sensor nodes are -
A)Whose deployment has high density in order to increase network lifetime and survivability.B) Who
perform basic functions such as data aggregation, auto configuration, and power saving.C) Both (a) and
(b) None of these Correct Answer: c. Both (a) and (b)
Detailed Solution: Low-end sensor nodes are -
a. Whose deployment has high density in order to increase network lifetime and
survivability.
b. Who perform basic functions such as data aggregation, auto configuration, and
power saving.
QUESTION 13: Which of the following are the components of the M2M ecosystem?
a. Trees
b. Ocean
c. Device Providers
d. Non-service users
Correct Answer: c. Device Providers Detailed Solution: The components of the M2M
ecosystem are as follows –
a. Device Providers
b. Internet Service Providers (ISPs)
c. Platform Providers
d. Service Providers
e. Service Users

QUESTION 14:State whether the following statement is true or false


Statement: The M2M Device Platform enables access to objects connected to the Internet
anywhere any time. A.True B.False
Correct Answer: a. True
Detailed Solution: The M2M Device Platform enables access to objects connected to the
Internet anywhere any time.

QUESTION 15:State whether the following statement is true or false


Statement: The M2M Application Platform provides integrated services based on device
collected data-sets. A. True B. False
Correct Answer: a. True Detailed Solution: The M2M Application Platform provides integrated
services based on device collected data-sets.

QUESTION 1:

Company ABC manufactures a room temperature monitor which sends data via protocol X and company
MNO manufactures another kind of room temperature sensor which sends data via protocol Y. With
respect to this, which among the following correctly captures the said scenario?
a. Homogeneity of IoT

b. Heterogeneity of IoT

Correct Answer: b. Heterogeneity of IoT

Detailed Solution: IoT is characterized by heterogeneity where different kinds of devices, each
communicating with different set of protocols are designed. Refer first part of Lecture 21.

QUESTION 2:

When two IoT devices wish to communicate, semantic conflict in such a scenario in IoT
interoperability refers to_ .
a. Two devices built by the same manufacturer
b. Two devices sensing the same physical parameter
c. Two devices having different deployment location
d. Two devices having different processing and business logic
Correct Answer: d. Two devices having different processing and business logic
Detailed Solution: Semantic conflict refers to when different IoT devices have different processing and
business execution logic
QUESTION 3:Which of the following issues needs to be addressed while solving user
interoperability?
a)Device characterization and identification b)Syntactic interoperability c)Semanticinteroperability
d. All of these

Correct Answer: d. All of these Detailed Solution:All of the options given should be addressed
while solving user interoperability issues
QUESTION 4:

Which UMB interoperability component is responsible for converting physical devices into virtually
abstracted ones?
a. UMB Adaptor B. UMB Core C.UMB Hypervisor D.UMB Abstractor

Correct Answer: a. UMB Adaptor

Detailed Solution: UMB-A is responsible for converting physical devices into virtually abstracted ones.

QUESTION 5:A Protocol Translation Unit (PTU) acts as a middleware between two IoT devices with different
native protocols to enable them communicate with each other by translating the language of one device to
the other one and vice versa.
a. True b)False
Correct Answer: a. True
Detailed Solution: Refer Lecture 21@22:16 and onwards where PTU has been explained.

QUESTION 6:Suppose that a smart CCTV camera has been configured using C++ language. With
respect to the device’s cosign identification as per the standard definition (A,B,C,D), which among
the following the information “Configuration Lang:C++” will be most appropriately mapped ?
a)A b)B c)C d) D
Correct Answer: d. D Detailed Solution: ‘D’ refers to the definition of the object, hence is the most
appropriate to which configuration language, which may be considered a definition will be mapped.
QUESTION 7:Which among the following are components of an Arduino UNO Board?
a)LED Power Indicator b) Digital I/O Pins c)Analog IN Pins d) All of these
Correct Answer: d. All of these Detailed Solution: An Arduino UNO board contains several
components, which also contain the ones listed above. Refer Lecture 22 on Arduino Board details.
QUESTION 8: What is the series of micro controller chips powering Arduino UNO boards?
a)ATM series b)X86 series c)ARM 64series d. ATMEGA series

Correct Answer: d. ATMEGA series Detailed Solution:Arduino UNO micro controllers are powered by
ATMEGA series. Refer to any standard documentation on Arduino UNO.
QUESTION 9: In Arduino IDE the ‘Verify’ and ‘Upload’ buttons perform the exact same task.
a)False b)True
Correct Answer: a. False
Detailed Solution: In Arduino IDE, ‘Verify’ compiles the sketch and checks for its correctness, while
‘Upload’ uploads the sketch to the Arduino board.
QUESTION 10:Suppose that an Arduino UNO board is connected to a pneumatic sensor which sends tyre
pressure as floating point numbers. Which among the functions will you use to read from the sensor?
a)digitalRead() b)analogWrite() c. analogRead() d)None of these
Correct Answer: c. analogRead() Detailed Solution: As per the basics of Arduino
programming. When you have real numbers in analog format, you use
analogRead().QUESTION 11: Consider the following Arduino sketch.

What must be inserted in the place of ‘??’ within the second pinMode() function in void setup()?

a. INPUT
b. OUTPUT
c. None of these
d. Anyone of these is okay
Correct Answer: b. OUTPUT
Detailed Solution: Since pin ‘g’ is writing digital values, it is required to set in OUTPUT mode.
QUESTION 12:For integrating different types of sensors (such as DHT) with Arduino, you would need to
install and #include the sensor specific libraries in your sketch. A)True b)False
Correct Answer: a. True Detailed Solution:Each different type of sensor has its specific libraries and
functions which must be included with the Arduino sketch
QUESTION 13: Which of the following best describes the command given below?
ServoDemo.write(180);
a)Creates an instance of the servo b) Pin writes 180 to the servo c) Servo moves 180 degrees d. All of these
Correct Answer: c. Servo moves 180 degrees . Detailed Solution: As per the basics of Arduino libraries.
QUESTION 14:In an Arduino sketch, for the default function void setup(), which of the following is true?
a)Point where the code terminates. B) Point where
the code starts. C)It iterates over the different
tasks in the program.d)None of the above.
Correct Answer: b. Point where code starts. Detailed Solution: As per the basics of Arduino
programming
QUESTION 15: Which among the following can also be described as a relay, which is an actuator?
a)Pneumatic actuator b)Motor type actuator c)Electro-mechanical switchd)Thermal switch
Correct Answer: c. Electro-mechanical switch
Detailed Solution: Relay is a type of electro-mechanical switch and is also an actuator.
Week 6
QUESTION 1:Python doesn’t support strict rules for syntax and static variable declaration like C
a. True b)False
Correct Answer: a. True Detailed Solution: As per Python program
QUESTION 2: Fill in the blanks. is a data-type in Python.
a)list b)Tuple c)Dictionary d)all of these
Correct Answer: d. All of these
Detailed Solution: As per Python program.
QUESTION 3:Fill in the blanks. are the variables declared inside a function.
a)Immediate variables b)Global variables c)Local variables d) None of these
Correct Answer: c. Local variables
QUESTION 4:What does the open() function return for file operations?
a)File mode b)File object c)File name d)None of these
Correct Answer: b. File object
QUESTION 5:Python does not follow rigid indentation.
a. True b)false
Correct Answer: b. False
Detailed Solution: As per the basics of Python programming.
QUESTION 6:Which of the following is used to display an image in Python?
a. image.show()
b. image.open()
c. image.name()
d. image.mode()
Correct Answer: a. image.show()
Detailed Solution: As per the basics of Python programming
QUESTION 7:Which of the following models does python follow for networking.
a. Client-server
b. P2P
c. All of these
d. None of these
Correct Answer: a. Client-server
Detailed Solution: In python programming, python provides network services for client- server
models.
QUESTION 8:In python, ”with” ensures the file is closed after the operation is completed, but not when an
excetion occurs.
a)true b)False
Correct Answer: b. False Detailed Solution: As per the basics of Python programming
QUESTION 9:In Raspberry Pi, GPIO acts only as a digital output.
a)True b)False Correct Answer: b. False Detailed Solution: Raspberry Pi GPIO acts as both digital output and
digital input
QUESTION 10:Which of the following exits the nano editor in the terminal?
a. Ctrl+O b) Ctrl+X c)Ctrl+A d)None of these
Correct Answer: b. Ctrl+X
Detailed Solution: Ctrl+X exists the editor
Does Raspberry Pi provide configuration options for cameras ?
a. Yes b)No
Correct Answer: a. Yes
Detailed Solution: Raspberry Camera can be configured using raspi-config.
QUESTION 12:Does python provide a module for pi-camera ?
a. Yes b)no

Correct Answer: a. Yes Detailed Solution: Raspberry Camera can be configured using the
Python camera module python-picamera

QUESTION 13:Which of the following converts energy to motion?


a. Actuator
b. Raspberry Pi
c. All of these
d. None of these
Correct Answer: a. Actuator
Detailed Solution: Actuator converts energy to motion.
QUESTION 14:Which of the following is a property of a Relay.
a. Mechanical switch
b. Electrochemical switch
c. None of these
d. All of these
Correct Answer: a. Mechanical switch
Detailed Solution: Relay is a mechanical switch.
QUESTION 15: Sensors can be neither analog nor digital.
a. True
b. False
Correct Answer: b. False
Detailed Solution: Sensors can be analog or digital. (Please refer to lecture 30 @ 3:20)
things Assignment-Week 7
QUESTION 1:Raspberry Pi is like a mini computer which can perform a wide range of general
purpose tasks.a) True b)False
Correct Answer: a. True Detailed Solution: Raspberry Pi devices act just like mini computers and can be
configured to perform many things. Refer to the lectures on Raspberry Pi
qUESTION 2:What is the complete form of GPIO pins on Raspberry Pi devices.
a)General Public Input/Output b) Generative Purpose Input/Output c). General Purpose
Input/Output d) Global Purpose Input/Output
Correct Answer: c. General Purpose Input/Output
WQUESTION 3:The Python program which you execute on Raspberry Pi to read data from sensors
and control actuators has the same syntax and style as any other Python program.a. False b. True
Correct Answer: b. True Detailed Solution It does not matter for what a Python program is written, all
Python programs follow the same syntax and style.
qUESTION 4: uring remote server access by a Raspberry Pi, where the Raspberry Pi acts as a
client, the client needs the following?
a. Only IP address of server B)Only port number
C)Both server IP address and port number D)Client’s IP address
Correct Answer: c. Both server IP address and port number
Detailed Solution: A client can communicate with a server only if both IP address and port numbers
are known.
QUESTION 5:Which among the following are valid data processing activities
a. Data Splitting
b. Data filtering
c. Data plotting

d. All of the given

Correct Answer: d. All of the given

Detailed Solution: As per the basics of Python


QUESTION 6:Consider the following Python code snippet. Assume the syntax is correct and all required
libraries are imported
var = ‘Sensor@Actuator%Arduino’ pt = var.split(‘%’)

print(pt)

What will be the output (See every detail, including the apostrophes carefully)?

a) ‘Sensor’,’Actuator’,’Arduino’]

b. Sensor@Actuator’,’Arduino’]

‘Sensor’,’Actuator%Arduino’] 4) [‘Sensor@Actuator%Arduino’]

Correct Answer: b. [‘Sensor@Actuator’,’Arduino’]


Detailed Solution: As per Python programming directives and the working of the split function().
QUESTION 7:Which among the following functions do you use while using MATPLOTLIB to add title to a
plot?
a. plot()

b. add()

c. label()

d. title()

Correct Answer: d. title()

Detailed Solution: The title(<name_of_title>) functions adds title to a plot while using matplotlib.

QUESTION 8:In traditional non software-defined network consisting of a network of switches, suppose
OSPF is being used as the routing protocol. In this context which among the following is true.
a. All the switches execute OSPF distributively
b. Only one switch executes OSPF
c. No switch executes OSPF D)All of these are true
Correct Answer: a. All the switches execute OSPF distributively Detailed Solution: Traditional networks
are distributive, hence all the switches of the network execute OSPF
QUESTION 9:

In SDN, the Operating System (OS) is separated (i.e not strongly coupled) from the physical
hardware for each switch.
a)True
b)False

Correct Answer: a. True

Detailed Solution: SDN separates the physical and logical plane of the switch. So OS (part of logical plane)
is separated from the hardware (part of the physical plane) for each switch.
QUESTION 10:Which among the following is a popular protocol implementing SDN?
a. OpenSwitch
b. OpenStack
c. OpenFlow
d. OpenEdge
Correct Answer: c. OpenFlow Detailed Solution: OpenFlow by ONF is the most popular protocol
implementing the principles of SDN.
QUESTION 11:With respect to Software Defined Networking (SDN), which among the following is true?
a. SDN couples the data plane and control plane.
b. SDN has no relation to either data plane or control plane C)
c. SDN separates the data plane and control plane.
d. None of the stated.
Correct Answer: c. SDN separates the data plane and control plane

Detailed Solution: SDN separates the data plane and control plane. It is the fundamental principle of SDN.
qUESTION 12:consider the following figure below. To which issue of SDN does this particular figure can
be related to?

a. Controller placement issue

b. Flow Rule placement issue

c. Hardware placement issue


d. Analysis placement issue
Correct Answer: b. Flow Rule placement issue
Detailed Solution: The given figures shows the tabular structure of how flow rules are installed within
SDN switches, so it pertains to flow rule placement issues
QUESTION 13:Suppose that there are two LANs, each configured to be SDN enabled with their own
set of switches and controller. Which among the following directional APIs will be used for
communication between the two controllers?
A)Northbound API B)East-Westbound API C)Southbound API D)Northeastbound API
Correct Answer: b. East-Westbound API
Detailed Solution: East-Westbound APIs are responsible for communication between different SDN
controllers and domains.
QUESTION 14:Which among the following is true?
A)Backup Controllers have no use is SDN B)There is no difference between the main controller and backup
controller C). Backup controllers take over when the main controller goes down D) It is not a good idea to keep
backup controllers.
Correct Answer: c. Backup controllers take over when the main controller goes down
Detailed Solution: Backup Controllers are required to take over the network control when the
main controller fails.
QUESTION 15:IoT being data intensive and having a lot of security concerns, it is a good idea to
integrate SDN with IoT to mitigate many of these issues.
a. True b)False
Correct Answer: a. True Detailed Solution: SDN can be integrated with IoT to reap several benefits of
both.
Week 8
QUESTION 1: Traditional Wireless Mobile Networks are cost expensive in terms of ?
A)Only CAPEX B)Only OPEX C)Both CAPEX and OPEX D)Neither CAPEX and OPEX
Correct Answer: c. Both CAPEX and OPEX Detailed Solution: Traditional wireless mobile networks are
cost expensive both with respect to capital expenditure (CAPEX) and Operational Expenditure (OPEX).
QUESTION 2: High mobility of users is one of the key challenges in rule placement for software
defined wireless mobile networks. A)True B)FALSE
Correct Answer: a. True Detailed Solution: Dynamic user mobility restricts the ease with which rules can
be placed for software defined wireless mobile networks
QUESTION 3: Which among the following is a solution for mobility-aware flow rule placement in
SDIoT? A)Mobility-Flow B) Mobile-Flow C)Mobi-FlowD)M-Flow
Correct Answer: c. Mobi-Flow Detailed Answer: Mobi-Flow has been proposed to provide a solution for
mobility-aware flow rule placement.
QUESTION 4: Cloud, Utility, Grid and have been the major trends in computing
A)Clone B) Cluster C)ClosureD)Cloud
Correct Answer: b. Cluster Detailed Answer: Cloud, Utility, Grid and Cluster computing are some of the
major trends in computing
QUESTION 5: Cloud computing models allow different users to share the same physical resources?

A)True B)False Correct Answer: a. True Detailed Solution: Cloud computing uses virtualization heavily
and thus it allows different users to share the same underlying physical infrastructure.
QUESTION 6: As per NIST Visual Model of Cloud Computing, ‘Hybrid Cloud’ model and PaaS model both
fall in the same category. A)True b. False
Correct Answer: b. False Detailed Solution: ‘Hybrid Cloud’ is an example of cloud deployment model
while ‘PaaS’ is an example of cloud service model.
QUESTION 7: When you are accessing Google docs or Microsoft Word online for accessing the
features of a document writing software from your browser without specifically installing them,
which among the following cloud service models is the most appropriate one that you are using.
A)SaaS B)PaaS C)IaaS D)DaaS
Detailed Solution: This is an example of SaaS, since you are accessing a word/document processing
software as a client over the network. The actual software itself runs on some remote cloud server
QUESTION 8: An organization A wants to deploy a cloud infrastructure, whereby it wants to push majority
of the data to a cloud whose servers can be situated anywhere within the globe, but it wants certain
private data to be pushed only to cloud servers that are present on-premise and are accessible by only
authenticated members of the organization. In this context which among the following deployment model
should be used?
A)Private Cloud B)Public Cloud C)Hybrid CloudD) Any of these
Correct Answer: c. Hybrid Cloud Detailed Solution: Hybrid cloud deployment model supports both
the features of public and private cloud.
QUESTION 9:
Cloud services and resources should be rapidly in order to achieve their
required performance a.entrusted b. elastic C)enterprise D)None of the given
Correct Answer: b. elastic Detailed Answer: Rapid elasticity is one of the key requirements for cloud
computing paradigms and models.
QUESTION 10: Suppose that a start-up wants to enter into online book delivery business. It wants
to create the user interface and the application by itself, but it does not have any networking or
storage facility, so it wants to adopt the cloud computing practice. In this respect, which among
the following cloud service models is most suitable for the start-up.
a. Only SaaS
b. Neither PaaS nor IaaS
c. Both PaaS and IaaS can be adopted
d. Neither SaaS, PaaS or IaaS
Detailed Answer: Since both IaaS and PaaS provides infrastructure and storage support to clients, either
of PaaS or IaaS can be employed.
QUESTION 11: Data security and client authentication is an issue in which of the following cloud
service models?
A)SaaSB) aaS and PaaS C)IaaSll of them
Correct Answer: d. All of them Detailed Solution: Security is a pertinent issue in all of the cloud service
models, which includes SaaS, PaaS and IaaS. Refer to any standard discussion on challenges and issues on
cloud computing and Lecture
QUESTION 12:Network, and application level securities are the three aspects of cloud
infrastructure securities.
A)Client B)W eb c. Host d. Wireless
Detailed Solution: Network, host and application level securities are the fundamental aspects of
cloud infrastructure securitie
QUESTION 13: When a new user logs into a cloud framework, the first thing that needs to be done
is .
a. User should be authenticated
b. User should immediately be granted all the resources
c. User should log off
d. User should be penalized
Detailed Solution: User authentication is one of the primary security issue and any user which logs
into the cloud framework must first be authenticated.
QUESTION 14: Service Level Agreements (SLAs) are mutually agreed by the client (customer) and
cloud service provider (CSP) at the beginning. With respect to SLAs, what are the views that SLAs
provide?
a. Customer Point of View
b. CSP Point of View
c. Both Customer and CSP Point of View
d. Neither Customer nor CSP Point of View
Detailed Solution: SLAs provide both the customer point of view and the CSP point of view between the
customer and the CSP.
QUESTION 14: CloudAnalyst simulation tool provides GUI and is written on top of CloudSim
modules. A)Yes B)No
Detailed Solution: CloudAnalyst is built on top of CloudSim and also provides a GUI.
QUESTION 1 :Which component of OpenStack do you use to access all the other components?
a. Horizon
b. Glance
c. Neutron
d. None of these
Correct Answer: a. Horizon Detailed Solution: Horizon is the dashboard of OpenStack which provides the
GUI and from where you can access other components.
Component of OpenStack?
A)Horizon B) Heat c. Plasma D)d. Neutron
Correct Answer: c. Plasma
Detailed Solution: Plasma is not a component of OpenStack. The rest are various components,
including Nova, Glance, Swift etc.
QUESTION 3: Sensor cloud is simply dumping and organizing of sensor data on cloud computing
platforms. a. True b. False
Correct Answer: b. False
Detailed Solution: Sensor cloud incorporates many aspects and not simply dumping of senor data over
cloud platforms.
QUESTION 4: Which among the following are limitations of traditional Wireless Sensor Networks?
A)Procurement Issues B)Deployment Issues C) Maintenance Issues d. All of the given
Correct Answer: d. All of the given Detailed Solution: For traditional WSNs, procurement, deployment and
maintenance are all critical issues that needs to be taken care of.
QUESTION 5:……….,In a typical sensor cloud architecture, the sensor cloud infrastructure that
provides the virtualization lies ______
A)At the same layer as physical sensor devices B) At the application layer
C)In between the physical sensor layer and the application layerD)Sensor cloud does not support virtualization
Correct Answer: c. In between the physical sensor layer and the application layer
Detailed Answer: In a typical sensor cloud architecture, the sensor cloud infrastructure that provides
the virtualization lies in between the physical sensor layer and the application layer.
QUESTION 6:Generally speaking, Sensor Cloud Service Providers (SCSPs) are also always the owners
of the physical sensors A)YES B)NO
Correct Answer: b. No Detailed Solution: SCSPs are providers of the virtualized sensor services, but
they may not the owners of the physical sensors in a typical deployment. Refer Lecture 42, ‘Actors
in Sensor-cloud’.
QUESTION 7:In a typical sensor cloud architecture with virtualization, one virtual sensor can be associated
with how many physical sensors? A)Only one B)One or more than one C)None D)Only two
Correct Answer: b. One or more than one Detailed Solution: One instance of a virtual sensor in
sensor cloud architecture can be mapped with one, two or more physical sensors below. Refer Lecture
43, Optimal composition of virtual sensors
QUESTION 8: Sensor virtualization aims to achieve more in providing sensor based services
A)Complexity b. Flexibility
Correct Answer: b. Flexibility
Detailed Solution: Sensor virtualization and sensor cloud architecture are designed to provide more
flexibility and convenience than traditional sensor based services. Refer to the lectures on Sensor Cloud
and its motivation closely.
QUESTION 9: Suppose that you want to start a business to provide some IoT based application,
but you do not have the means to develop the application layer logic, neither you have the
means to purchase and deploy physical sensors. You can however, rent cloud servers for use and
write interface logic for interfacing with other modules. Which among the following actors will
be the most suitable for you?
a. Physical sensor owner
b. Application layer developer
c. Sensor Cloud Service Provider (SCSP)
d. You cannot start the business
Correct Answer: c. Sensor Cloud Service Provider (SCSP) Detailed Answer: SCSPs provide the sensor
virtualization layer in between the application layer and the physical sensor layer and thus this is the best
business model as per the requirements and constraints given
QUESTION 10: Which among the following is implemented along with sensor cloud to make its services
and performance better?
A). Cashing b. Caching C)Casing d) Calling
Correct Answer: b) Caching Detailed Solution: Caching is very important in sensor
cloud and is implemented along with sensor cloud to make the performances better
QUESTION 11: Which among the following cases is most likely to reduce the overall price of
sensor-cloud implementation provided that the data traverses through multiple sensor hops
starting from the origin sensor to the sink node, and provided that all owners are honest and
charge for only what is required?
a. If physical sensors are owned by multiple owners with high profit margin
b. If all physical sensors are owned by a single owner with uniform profit margin
Correct Answer: b. If all physical sensors are owned by a single owner with uniform profit margin
Detailed Solution: If all the physical sensors are owned by a single owner, then the single owner will
charge an uniform price for data traversing through the sensors. On the other hand, if multiple sensor
owners are there, different owners will charge different rates, which may increase the price.
QUESTION 12: Fog computing is aimed to replace cloud computing completely and has no scope
for integration with cloud a. True b. False
Correct Answer: b. False Detailed Solution: Fog computing is designed to assist and compliment cloud
based technologies in providing better services, not remove cloud all together.
QUESTION 13: Suppose data from an IoT device first goes to Fog layer for some basic
processing, after which it goes to Cloud layer for advanced processing, then the processed data
comes back to the Fog layer and then, it finally comes back to the origin sensor node. In the
return journey no processing of data takes place anywhere, just transfer of data takes place. If
‘Tf’ is the time taken by the data to travel from sensor to fog and vice versa, and ‘Tc’ is the time
taken by the data to travel from fog to cloud and vice versa, ‘Tfp’ is the data processing time at
fog and ‘Tcp’ is the data processing time at cloud, what is the total round trip time ‘T’ taken by
data starting from the origin sensor node, processing the data and then back to the sensor node
after being processed.
A)T = Tf + Tc + Tfp + Tcp B) T = Tf + Tc C)T = 2(Tf + Tc) + Tfp + Tcp D)T = 4(Tf + Tc + Tfp + Tcp)
Correct Answer: c. T = 2(Tf + Tc) + Tfp + Tcp
Detailed Solution: Since data comes back to the origin sensor node, the traversal latency Tf and Tc will be
counted twice. But, since processing takes place only once during onward journey, processing delay is
only one time. Therefore, T = 2(Tf + Tc) + Tfp + Tcp.
QUESTION 14:Consider the standard Fog computing architecture. In which of the following layer will ‘very
time sensitive data’ be processed? A)Nearest fog node B)Distant aggregate fog node C)Cloud D)Does
not matter Detailed Solution: it is required that the nearest fog node processes the data so that
immediate action can taken. This is the benefit of having fog computing
QUESTION 15:“Network, Accelerator, Compute and Storage” constitute the part of which view of fog
computing architecture, as defined by OpenFog Consortium Architecture Working Group?
A) System View b. Node
View c. Software Viewd.
NoneABOV
Correct Answer: b. Node View
Detailed Solution: Fog Computing Architectural framework has several views, node, system and software
among them. Network, Accelerator, Compute and Storage” fall under Node View
QUESTION 1: Data fusion enables optimum utilization of massive data gathered from multiple sources.
a. True B)False
Correct Answer: a. True Detailed Solution: Data fusion enables optimum utilization of massive
data gathered from multiple sources.
QUESTION 2:Which of the following is a stage in data fusion?
a. Decision level B)Feature level C)Pixel level D)All of the above
Correct Answer: d. All of the above Detailed Solution : Decision level, feature level, pixel level
and signal level are the four stages of data fusion.
QUESTION 3:Which of the following is one of the challenges of Data fusion?
a. Imperfection B)Conflicts C)Ambiguity D)All of the above
Correct Answer: d. All of the above Detailed Solution : The challenges of data fusion involves
Imperfection, Conflicts and Ambiguity.
QUESTION 4:Which of the following is one of the theory of evidence-based mathematical methods of data
fusion?
a. Belief function B)Bayesian analysis C)ANN D)None of these

Detailed Solution: Belief function is one of the theory of


Correct Answer: a. Belief function
evidence-based mathematical methods of data fusion
QUESTION 5:DLNA stands for Digital Living Network Alliance.
a. True B)False
Correct Answer: a. True
Detailed Solution: DLNA stands for Digital Living Network Alliance
QUESTION 6:Which of the following are the functional layers in smart parking?
A)Information collection B)System Deployment C)Service DisseminationD)All of these
Correct Answer: d. All of these Detailed Solution: Information collection, System Deployment and
Service Dissemination are the three functional layers in smart parking
QUESTION 7:Which of the following statements are true about the HAN standards? Statement I: Physical
and MAC layers are defined by IEEE802.15.4. Statement II: Network layer is defined by Zigbee.
Statement III: Application layer is defined by IEEE802.15.4
a. Statements I and II
b. Statements I and III
c. Statements II and III
d. Statements I, II and III
Correct Answer: a. Statements I and II
Detailed Solution: Physical and MAC layers are defined by IEEE802.15.4. Network layer and
Application layers are defined by Zigbee.
QUESTION 8:Which of the following are true about X-10?
Statement I: It allows remote control of compliant transmitters.
Statement II: It has low speed and data rate.
Statement III: It is adopted by GE. A)Statement I and II B)Statement II and III
C)Statement I and III D)Statement I, II and III
Correct Answer: d. Statement I, II and III Detailed Solution: X-10 allows remote control of
compliant transmitters, has low speed and data rate and is adopted by GE.
QUESTION 9: enables vehicles to wirelessly share a diverse range of information.
a. Local area network B)V2X Paradigm C)V2A Paradigm D)Metropolitan area network
Correct Answer: b. V2X Paradigm Detailed Solution: V2X enables vehicles to wirelessly share a
diverse range of information
QUESTION 10:Which of the following is a property of Vehicular Ad-hoc Networks?
a. Is based on DSRC B)Is based on WAVE C)Guaranteed low latency D)All of these
Correct Answer: d. All of these
Detailed Solution: VANETs are based on DSRC and WAVE. They also have guaranteed
low-latency in mobile environments.
QUESTION 11:Knob is a switch type of INN. A)TrueB)False
Correct Answer: a. True Detailed Solution: Knob is a switch type of INN
QUESTION 12:Which of the following is responsible for central coordination in Body-brain architecture?
a. Body B)INN C) Spinal cord D)None of these
Crrt Ans: None DS:The brain is responsible for central coordination in Body-brain architecture
QUESTION 13:Which of the following stands for DSRC?
a. Directed Short Range Communication
b. Dedicated Short Range Communication
c. Directed Small Range Communication
d. Dedicated Small Range Communication
QUESTION 14:Ad-hoc is a domain of VANET.
a. True B.False
Correct Answer: a. True
Detailed Solution: Ad-hoc is a domain of VANET.
QUESTION 15:What are the disadvantages of V2X communication?
a. Increased traffic safety B)Tracking of movement C)Efficient use of fuel D)None of these
De.SOLN : Disadvantages of V2X communication includes tracking of movement, violation of privacy, ETC.
Assignment-Week 11
QUESTION 1:What are some of the other names of the smart grids?
a. Electricity with a brain B)Energy internet C)Electronet D)All of these
Detailed Solution: Smart grids are also known as Electricity with a brain, Energy internet, and Electronet
QUESTION 2:Smart Grid follows which type of the flow of energy?
a. Bidirectional B) Unidirectional C)All of these D)None of these
Detailed Solution: Smart grid is a modernized grid that enables bidirectional flow of energy.
QUESTION 3:Which of the following is not a benefit associated with smart grids?
A)Efficient transmission of electricity B)Lower electricity rates C)Unreliable and insecure electricity
D)Improved security Detailed Solution: Smart Grids provide efficient transmission of electricity,
lower electricity rates and Improved security.
QUESTION 4:Which of the following is a component of smart grid communication?
a. Gateways B)Smart meters C)MDMSs D)All of these
Detailed Solution: The components of Smart Grid are Smart meters, Gateways, DAUs and MDMSs
QUESTION 5: Fill in the blank. can be used as an energy source in on-peak hours.
D. PMUs B.DAUs C.PEVs D.None of these Correct Answer: c. PEVs Detailed Solution: PEVs or
Plug-In Electric Vehicles can be used as an energy source in on-peak hours
QUESTION 6:Which of the following is a type of Dynamic System Attacks?
A)Replay Attacks B) Dynamic data injection attacks C)Covert attacks D)All of these
Detailed Solution: Replay Attacks, Dynamic data injection attacks and Covert attacks are all types
of Dynamic System Attacks
QUESTION 7:Which of the following statements are true about gateways?
Statement I: Each gateway connects a few closely located smart meters.
Statement II: Gateways communicate mostly based on WiFi.
Statement III: They help in two-way communication.
a. Statements I and II b. Statements I and III c.Statements II and III d.Statement I, II and III
Correct Answer: d. Statements I, II and III Detailed Solution: The gateways connect a few
closely located smart meters, communicate mostly on WiFi and help in two-way communication.
QUESTION 8:Fill in the blank. is a centralized coordinator for smart grid communication.
a. Gateway B)Smart meter C)PMU D)MDMS
Detailed Solution: MDMS is a centralized coordinator for smart grid communication
QUESTION 9:Fill in the blank. are available protocols for smart home appliances.
a. C-Bus B)DECT C)EnOcean D)All of these
Detailed Solution: C-Bus, DECT, EnOcean and Universal Powerline Bus
QUESTION 10:Fill in the blank. IIoT is a network of .
a. Physical objects b. Systems c .Platforms d.All of the above
Correct Answer: d. All of the above
Detailed Solution: IIoT is a network of physical objects, systems, platforms and applications
QUESTION 11:IoT is based on Rip & Replace approach.
a. True B.False Correct Answer: b. False
Detailed Solution: IIoT is based on wrap & re-use approach
QUESTION 12:Which of the following happened in the 1st Revolution?
a. Mass production b.Internet evolution C.Automation D.None of these
Correct Answer: d. None of these Detailed Solution: Mass production, internet evolution,
automation happened in forth revolution
QUESTION 13:Which of the following is a challenge of IIoT?
a. Worker health and safety B)Environmental production
C)Optimized operations D)All of these
Correct Answer: d. All of these
Detailed Solution: Worker health and safety, environmental production and optimized
operations are all the safety challenges of IIoT
QUESTION 14: Monitoring and restoration of the traditional electrical grid is done manually.
A)True B)False
Correct Answer: a. True
Detailed Solution: Monitoring and restoration of the traditional electrical grid is done manually
QUESTION 15:What is Hadoop used in?
A)Distributed processing of large datasets B.Large clusters of computers C.All of these D.None of these
Deta Solon: Hadoop is used for distributed processing of large datasets across Large clusters of Computers
Assignment-Week 12
QUESTION 1:The two types of data analysis are _.
A)Qualitative and Quantitative B.Repetitive and Quantitative C.Repetitive and Qualitative D.All of these
Detailed Solution: Qualitative and Quantitative are the two types of data analysis.
QUESTION 2:Which of the following is a principle of Qualitative analysis?
a. Notice things B.Think about things C.Collect things D.All of these
Dted Sln: The three principles of Qualitative analysis are: Notice things, think about things &collect things
QUESTION 3:Select the statement(s) that denote the type of ANOVA. Statement I: One way analysis
Statement II: Two way analysis ST atement III: K-way
analysis
a. Statement I B.Statement II C.Statements I, II, and III D.None of these
Detailed Solution: The types of ANOVA includes One way analysis, Two way analysis and K-way analysis .
QUESTION 4:What is the type of the data dispersion?
a. Range B.Average absolute deviation. C.Variance D.All of these
Detailed Solution: Range, average absolute deviation and variation are the type of data dispersions
QUESTION 5:The process by which numerical data is analyzed is known as .
a. Qualitative analysis B.Quantitative analysis C.None of these D.All of these
Detailed Solution: Quantitative analysis is the process by which numerical data is analyzed.
QUESTION 6:The mathematical equation that is formulated in the form of relationships between variables
is known as ____ A)Logical model B. Relational model C. Data dispersion D.Statistical model
Detailed Solution: The mathematical equation that is formulated in the form of relationships
between variables is known as Statistical model
QUESTION 7:What are the two types of statistical models?
A.Qualitative and quantitative B.Complete and incomplete C.Regression and dispersion D.None
Correct Answer: b. Complete and incompleteDetailed Solution: Complete and incomplete are
two types of statistical models
QUESTION 8:Contingency table is also known as?
a. Cross tabulation B.Cross table C.All of these D.None of these
Correct Answer: c. All of these
Detailed Solution: Contingency table is also known as Cross tabulation and Cross table.
QUESTION 9:Advances in sensor and connectivity have disabled preventive care.
a. True B False
Correct Answer: b. False Detailed Solution: Advances in sensor and connectivity have disabled
preventive care.
QUESTION 10:Which of the following is a feature of IoT Healthcare?.
a. Non-invasive monitoring B.Cloud-based analytics C.Wireless transmission.D.All of these
Correct Answer: d. All of these Detailed Solution: Non-invasive monitoring, Cloud-based analytics
and Wireless transmission are all types of IoT healthcare.
QUESTION 11:Which of the following are components of IoT?
a. Sensing layer B.Aggregated layer C.Processing layer D.All of these
Correct Answer: d. All of these Detailed Solution: Sensing layer, Aggregated layer, Processing layer
and cloud platform are components of IoT.
QUESTION 12:Which of the following is the advantage of activity monitoring?
a. Hard integration B.Long term monitoring C.Expensive D.None of these
Correct Answer: b. Long term monitoring Detailed Solution: Long term monitoring is one of the
advantages of Activity monitoring
QUESTION 13: Deep learning based data analysis cannot be performed on videos
a. True B.False
Correct Answer: b. False Detailed Solution: Deep learning based data analysis can be done on
sensor data, images and videosQUESTION 14:Which of the following is true for in-place activity
monitoring data analysis?
a. Low power B. Good network connection required C.On-device D.Group-based analytics
Correct Answer: c. On device Detailed Solution: In-place activity monitoring data analysis is
on-device and power intensive
QUESTION 15:Fill in the blank. Processing the handheld activity device data with artificial intelligence can be
used for ______A.Fall detection B.Heart rate detection. C.Vehicle detection D.All of these
Correct Answer: a. Fall detection Detailed Solution: Processing the handheld activity device data
with artificial intelligence can be used for detecting sudden fall of a person.

You might also like