0% found this document useful (0 votes)
115 views308 pages

Emerging Technologies MCQ

The document contains a series of questions and answers related to emerging technologies, including quantum computing, blockchain, IoT, cloud computing, and AI. It covers various aspects such as their functions, characteristics, and applications. Additionally, it addresses cybersecurity measures and the role of different technologies in enhancing efficiency and security.

Uploaded by

uzmasaiyed713
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views308 pages

Emerging Technologies MCQ

The document contains a series of questions and answers related to emerging technologies, including quantum computing, blockchain, IoT, cloud computing, and AI. It covers various aspects such as their functions, characteristics, and applications. Additionally, it addresses cybersecurity measures and the role of different technologies in enhancing efficiency and security.

Uploaded by

uzmasaiyed713
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 308

1 1.

Which emerging technology utilizes quantum bits (qubits) to perform calculations and solve complex proble
a) Artificial Intelligence
b) Blockchain
c) Quantum Computing
d) Internet of Things

2 2. What is the primary function of a neural lace, a technology often associated with brain-computer interfaces
a) Enhancing virtual reality experiences
b) Enabling direct communication with computers using thoughts
c) Improving wireless internet connectivity
d) Facilitating secure blockchain transactions

3 3. Which emerging technology aims to revolutionize transportation by using low-pressure tubes to propel pod
a) Hyperloop
b) Autonomous Vehicles
c) Vertical Takeoff and Landing (VTOL) aircraft
d) Drones

4 4. What is the main purpose of CRISPR technology in the field of biotechnology?


a) Gene editing
b) Virtual reality simulations
c) Renewable energy production
d) Blockchain security

5 5. Which emerging technology involves the use of decentralized networks to store and manage data securely
a) Augmented Reality
b) Edge Computing
c) Fog Computing
d) Distributed Ledger Technology (DLT)

6 1. c) Quantum Computing
2. b) Enabling direct communication with computers using thoughts
3. a) Hyperloop
4. a) Gene editing
5. d) Distributed Ledger Technology (DLT)

==========================================================

7 1. IIoT stands for __________


a) Industrial Internet of Things
b) Internet Internet of Things
c) Intelligence Internet of Things
d) Internal Internet of Things
Answer: a

8 2. IIoT is sophisticated.
a) True
b) False
Answer: b
9 3. What does design provide?
a) Technology
b) Ecosystem
c) Technology and ecosystem
d) Digital revolution
Answer: c

10 4. Which possibility ensures load balancing and peak levelling of energy consumption?
a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
Answer: b

11 5. Which possibility automatically communicates with other vehicles?


a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
Answer: c

12 6. Which possibility connects the production line to suppliers?


a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
Answer: d

13 7. Which possibility provides inter connectivity between shop floor and top floor?
a) Transportation and logistics
b) Energy and utilities
c) Plant control flow operation
d) Connected supply chain
Answer: c

==========================================================

14 1. IIoT stands for __________


a) Industrial Internet of Things
b) Internet Internet of Things
c) Intelligence Internet of Things
d) Internal Internet of Things
Answer: a.

15 2.The father of ioT.


1. Kevin Atrun
2. Kevin Atrhur
3. Kevin Ashton
4. Kevin Thomas
Answer : Option 3 - Kevin Ashton
16 3._is the primary factor in automation which we can save through IoT platform.
1. Cost
2. Time
3. Privacy
4. Security
Ans. 2

17 4._____ service provider delivers software and applications through the internet.
1. IaaS
2. PaaS
3. SaaS
4. All of above
Ans. 3.

18 5._____ manages all the services and supporting infrastructure off-site over the internet and shares it across m
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. None of above
Ans. 1.

19 6. Google’s G suite, GitHub and Dropbox are the examples of ____ Cloud computing.
1. PaaS
2. IaaS
3. SaaS
4. None of above
Ans. 3.

20 7.______ is the example of IaaS Cloud Computing.


1. Amazon web services (AWS) ec2
2. Microsoft Azure VM
3. Google Compute Engine (GCE)
4. All of above
Ans. 4

21 8.The term ______ refers to a Network or Internet.


1.Cloud Computing
2.Cloud
3.Computing
4.Grid
Solution-2. Cloud.

22 9._____________ will play an important role in simplifying cloud architecture.


1.Blockchain
2.IoT
3.Automation
4.None of the above
Solution:3.Automation
================================================

23 1. Which of the following is a primary characteristic of IoT devices?


A) High processing power
B) Limited memory and computing resources
C) Large storage capacity
D) Fast network connectivity
Answer: B) Limited memory and computing resources

24 2. What is the main advantage of cloud computing in IoT deployments?


A) Reduced latency
B) Limited scalability
C) Increased security risks
D) Flexible resource allocation
Answer: D) Flexible resource allocation

25 3. Which cybersecurity measure is crucial for protecting IoT devices from unauthorized access?
A) Using default passwords
B) Implementing strong encryption
C) Ignoring software updates
D) Disabling firewalls
Answer: B) Implementing strong encryption

26 4. In cloud computing, what does SaaS stand for?


A) Software as a Service
B) Security as a Service
C) Storage as a Service
D) System as a Service
Answer: A) Software as a Service

27 5. Which of the following is a potential security threat in IoT ecosystems?


A) Robust authentication mechanisms
B) Regular security audits
C) Denial-of-Service (DoS) attacks
D) Strong encryption protocols
Answer: C) Denial-of-Service (DoS) attacks

28 6. What role does edge computing play in IoT networks?


A) Centralizing all processing tasks
B) Increasing latency
C) Offloading processing tasks to local devices
D) Reducing the need for data storage
Answer: C) Offloading processing tasks to local devices

29 7. Which cloud deployment model provides dedicated resources for a single organization?
A) Public cloud
B) Private cloud
C) Hybrid cloud
D) Community cloud
Answer: B) Private cloud
30 8. What is a common challenge associated with the integration of IoT devices?
A) Interoperability issues
B) Standardized protocols
C) Excessive resource allocation
D) Limited scalability
Answer: A) Interoperability issues

31 9. Which of the following is NOT a layer of the IoT architecture?


A) Perception layer
B) Network layer
C) Application layer
D) Data layer
Answer: D) Data layer

32 10. Which encryption algorithm is commonly used to secure data transmission in IoT systems?
A) DES (Data Encryption Standard)
B) RSA (Rivest-Shamir-Adleman)
C) MD5 (Message Digest Algorithm 5)
D) AES (Advanced Encryption Standard)
Answer: D) AES (Advanced Encryption Standard)

======================================================

33 1. What is the primary purpose of blockchain technology?


a) Data storage
b) Decentralized transaction ledger
c) Online marketing
d) Social networking
Answer: b

34 2. Which technology is foundational to the development of autonomous vehicles?


a) Bluetooth
b) Artificial Intelligence
c) USB-C
d) Solar power
Answer: b

35 3. What is the Internet of Things (IoT)?


a) A social media platform
b) A global area network
c) The interconnection of everyday objects via the internet
d) A new web browser
Answer: c

36 4. Which of the following is a characteristic of 5G technology?


a) Lower speed than 4G
b) Cable-only connection
c) Higher latency than previous generations
d) Increased bandwidth and speed
Answer: d

37 5. What does AI stand for in the context of emerging technologies?


a) Automated Intelligence
b) Artificial Intelligence
c) Augmented Intelligence
d) Advanced Intelligence
Answer: b

38 6. What is quantum computing expected to significantly impact?


a) Social media algorithms
b) Email communication
c) Cryptography
d) Smartphone design
Answer: c

39 7. Which technology is used to create digital twins?


a) Virtual Reality
b) 3D Printing
c) Blockchain
d) Both a and b
Answer: d

=========================================================

40 Which technology is used to create digital twins?


a) Virtual Reality
b) 3D Printing
c) Blockchain
d) Both a and b
Answer: d

41 What is the main benefit of using cloud computing?


a) Local data storage .
b) On-demand resource availability
c) Physical hardware security
d) Decreased internet usage
Answer: b

42 What is augmented reality (AR)?


a) A type of video game
b) A fully immersive virtual environment
c) An enhanced version of reality created by the use of technology
d) A new television display technology Answer: c

43 What is the primary concern regarding the ethics of AI?


a) Job displacement
b) Energy consumption
c) Privacy and decision-making
d) Entertainment value
Answer: c

44 Which technology is essential for big data analysis?


a) Antivirus software
b) Spreadsheet software
c) Machine Learning
d) Word processors
Answer: c

45 What is the main feature of wearable technology?


a) Water resistance
b) Fashion statement
c) Health and fitness tracking
d) Solar charging
Answer: c

46 What is the goal of edge computing?


a) To replace cloud computing
b) To bring computation and data storage closer to data sources
c) To increase dependency on central datacenters
d) To make devices heavier
Answer: b

===============================================

CYBER SECURITY

48 What is the purpose of multi-factor authentication (MFA) in cybersecurity?


A. To protect against physical threats
B. To secure data only when it is in transit
C. To provide an additional layer of security by requiring multiple forms of verification
D. To prevent malware attacks on computers

Correct answer: C. To provide an additional layer of security

49 BLOCKCHAIN

What is the primary purpose of a blockchain?


A. Securely store large amounts of data
B. Facilitate centralized control over data
C. Ensure immutability and transparency of data
D. Increase data transfer speeds

The correct answer is C. Ensure immutability and transparency of data.

IOT

50 Question: What does IoT stand for?


A) Internet of Transactions
B) Internet of Technologies
C) Internet of Things
D) Internet of Telecommunications

Answer: C) Internet of Things

CLOUD COMPUTING

51 What is the primary advantage of using cloud computing?

A. Increased hardware costs


B. Reduced scalability
C. Improved accessibility and flexibility
D. Limited data storage options

Answer: C. Improved accessibility and flexibility

=================================================

Unit : 1
52 1. Identify the element which is not considered in the triad, according to the CIA.
A. Authenticity
B. Availability
C. Integrity
D. Confidentiality
Ans : D

Unit: 2
53 1. Bitcoin is a cryptocurrency, which is an application of Blockchain.
A. True
B. False
Ans: A) True

54 Unit : 3
1. What is the full form of IDE in Arduino IDE IoT software?
a) Intra Defence Environment
b) Intra Development Environment
c) Integrated Development Environment
d) Integrated Deployed Environment
Ans: C

55 Unit: 4
1. Which one of the following options can be considered as the Cloud?
A. Hadoop
B. Intranet
C. Web Applications
D. All of the mentioned
Ans: A
=======================================================

56 1.What is the name of the technology that is used to create virtual worlds?
a.Virtualization
b.Augmented Reality
c.Virtual Reality
d.Artificial Intelligence

Answer- a.Virtualization

57 2.What is the term used to describe the process of using computers to generate images that look like photogr
a.Rendering
b.Coding
c.Data Mining
d.Deep Learning

Answer- a.Rendering

58 3.Which of the following is a type of artificial intelligence that is designed to mimic human conversation?
a.Expert System
b.Machine Learning
c.Natural Language Processing
d.Robotics

Answer- c.Natural Language Processing

59 4.Which of the following technologies is used to create interactive web applications?


a.CSS
b.JavaScript
c.XML
d.HTML

Answer- b.JavaScript

60 5.__ gives users access to storage, networking, servers and other computing resources via the cloud.
a.PaaS
b.IaaS
c.SaaS
d.All of above

Answer- b.IaaS

61 6.___solutions are preferred for enhanced security and privacy by the users.
a.Public cloud
b.Private cloud
c.Hybrid cloud
d.None of above

Answer- b.Private cloud

62 7. IoT helps in __ human efforts.


a.removing
b.reducing
c.increasing
d.stopping

Answer- b.Reducing

======================================================================

67 1. What is the full form of IANA?

(A) Internal Assessment Numerical Access


(B) Internet Association Numbers Authority
(C) International Aid For Network Automation
(D) Internet Assigned Numbers Authority
Answer:- D

68 2. Which is not an IoT platform?

(A) Xiaomi Cloud


(B) GoogleCloud
(C) Myntra
(D) AWS(Amazon Web Services)
Answer:- C

68 3. What is Cloud Computing?


a) Cloud Computing means providing services like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
c) Cloud Computing is a tool used to create an application
d) None of the mentioned
Answer: a

69 4. Which of the following is an example of the cloud?


a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above
Answer: d

69 5. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any di

Decentralized
Demanding
Secure
Popular
Answer: A) Decentralized

70 6. Blockchain has ____ versions.

(A) 2
(B) 3
(C) 4
(D) 5
Answer: B) 3

71 7. In _________________ attacks, the attacker manages to get an application to execute an SQL query created
a) SQL injection
b) SQL
c) Direct
d) Application
Answer: a

72 8. A Website that allows users to enter text, such as a comment or a name, and then stores it and later display
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer: c

======================================================

73 1. Which one of the following is Cloud Platform by Amazon?


A. Azure
B. AWS
C. Cloudera
D. All of the mentioned
Ans - b

74 2. What is IoT?
A. network of physical objects embedded with sensors
B. network of virtual objects
C. network of objects in the ring structure
D. network of sensors
Ans - a

75 3. keys are used to reduce repetitive strain.


a. Filter
b. Toggle
c. Sticky
d. Mouse
Ans - c

76 4. The alternatives to POW are_____________


A. Delegated Proof Of Stake
B. Proof of stake
C. Both A and B
D. None of the above
Ans - c

77 5. Which of the following is a component of cyber security?


A. Internet Of Things
B. AI
C. Database
D. Attacks
Ans - a

78 6. Which of the following is a type of cyber attack?


A. Phishing
B. SQL Injections
C. Password Attack
D. All of the above
Ans - d

78 7. Which layer is used for wireless connection in IoT devices?


A. Application layer
B. Network layer
C. Data link layer
D. Transport layer
Ans - c

=================================================

79 1)What is cloud computing?


a) A method of storing data on local servers
b) A technology that allows access to computing resources over the internet
c) A type of hardware used for high-performance computing
d) A programming language for cloud-based applications
Answer: b) A technology that allows access to computing resources over the internet

80 2)Which of the following is NOT a common example of social engineering attack?


a) Phishing
b) Ransomware
c) Spear Phishing
d) CEO Fraud
Answer: b) Ransomware

81 3) Which of the following is a potential security benefit of cloud computing?

a) Limited control
b) Decreased compliance
c) Improved data encryption
d) Restricted monitoring
Answer: c) Improved data encryption

82 4)What is the primary purpose of data carving in cyber forensics?


a) To encrypt data
b) To analyze data patterns
c) To recover fragmented or deleted files
d) To extract metadata from files
Answer: c) To recover fragmented or deleted files

83 5)Which of the following is a key characteristic of blockchain?


a) Centralized control
b) Immutable record-keeping
c) Closed network access
d) High transaction fees
Answer: b) Immutable record-keeping

84 6)Which of the following network devices is commonly used in IoT deployments to facilitate communication b

a) Router
b) Switch
c) Hub
d) Gateway
Answer: d) Gateway

85 7)Which of the following is a key characteristic of a serverless architecture in cloud computing?

A) Management of physical servers


B) Continuous monitoring of virtual machines
C) Provisioning of infrastructure resources
D) Automatic scaling and allocation of resources on demand
Answer: D) Automatic scaling and allocation of resources on demand

=======================================================

86 1: What is the java extension file used in IoT?

a. .jar
b. .obj
c. .cpp
d. .exe
Ans:-A

2: In the Planning Phase, Which of the following is the correct step for performing the analysis?

a.Cloud Computing Value Proposition


b.Cloud Computing Strategy Planning
c.Both A and B
d.Business Architecture Development
Ans:C

3: Which of the following is a component of cyber security?


a.Internet Of Things
b.AI
c.Database
d.Attacks

Ans:A

4: Blockchain can perform user transactions without involving any third-party intermediaries.
a.With the help of the third party
b.Without involving any third party
c.Without involving any owned
d.Without involving any authenticated
Ans: B

====================================================

1.Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any dig

A. Decentralized
B. Demanding
C. Secure
D. Popular
Answer: A) Decentralized

2. Blockchain networks are much _____ and deal with no real single point of failure.

A. Simpler
B. Easier to scale
C. Convenient
D. Faster
Answer: B) Easier to scale

3.What is the full form of IoT?


a) Internet of Technology
b) Incorporate of Things
c) Internet of Things
d) Incorporate of Technology
answer c
4. Which
of the
following
is false
about IoT
devices?
a) IoT
devices
use the
internet
for
collecting
and
sharing
data
b) IoT
devices
need
microcont
rollers
c) IoT
devices
use
wireless
technolog
y
d) IoT
devices
are
answer :d
5.What is
Cloud
Computin
g?
a) Cloud
Computin
g means
providing
services
like
storage,
servers,
database,
networkin
g, etc
b) Cloud
Computin
g means
storing
data in a
database
c) Cloud
Computin
g is a tool
used to
create an
applicatio
n
d) None of
answer a

6. Which of the following is not a type of cloud server?


a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers
answer d
7.What is
Cyber
Security?
a) Cyber
Security
provides
security
against
malware
b) Cyber
Security
provides
security
against
cyber-
terrorists
c) Cyber
Security
protects a
system
from
cyber
attacks
d) All of
the
mentione
d
answer d
8.Which of
the
following
is defined
as an
attempt to
steal, spy,
damage or
destroy
computer
systems,
networks,
or their
associated
informatio
n?
a) Cyber
attack
b)
Computer
security
c)
Cryptogra
phy
d) Digital
hacking
answer a

==========================================

1 )Which of the following communication protocols is commonly used in IoT devices for low-power, short-ran
a) Bluetooth
b) Wi-Fi
c) Ethernet
d) NFC
Ans: a) Bluetooth

2) Which of the following is not a primary component of an IoT system?


a) Sensors
b) Cloud Computing
c) Actuators
d) Optical Drives
Ans: d) Optical Drives

3) Which layer of the cloud computing architecture is responsible for managing virtualized resources, such as
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Answer: a) Infrastructure as a Service (IaaS)

4) Which component of the cloud computing architecture provides users with access to applications and softw
a) Data Center
b) Virtualization Layer
c) Cloud Service Provider
d) Software as a Service (SaaS)
Answer: d) Software as a Service (SaaS)

5) What is the primary purpose of a blockchain?


a) To store large amounts of data on a centralized server.
b) To facilitate secure and transparent transactions without the need for a trusted intermediary.
c) To create private social networks.
d) To generate cryptocurrency through mining.
Answer: b) To facilitate secure and transparent transactions without the need for a trusted intermediary.

6) Which characteristic best describes blockchain technology?


a) It requires a central authority for data management.
b) It allows data to be altered or deleted after being recorded.
c) It uses cryptographic techniques to secure data.
d) It relies solely on traditional databases for data storage.
Answer: c) It uses cryptographic techniques to secure data.

7) What is a common security measure to protect web applications against cross-site scripting (XSS) attacks?
a) Encrypting all data transmitted over the network
b) Using strong passwords for user authentication
c) Validating and sanitizing user input
d) Implementing firewalls at the network perimeter
Answer: c) Validating and sanitizing user input

==================================================

01. Which of the following is a characteristic of fog computing in IoT systems?


a) Centralized data processing in the cloud
b) Low-latency data processing at the edge of the network
c) Heavy reliance on physical hardware infrastructure
d) Limited scalability compared to cloud computing

02. What is the primary benefit of using hybrid cloud deployment models?
a) Lower cost compared to other deployment models
b) Enhanced security due to data redundancy
c) Increased flexibility and scalability
d) Simplified management and maintenance

03. Which cloud computing service model allows developers to build, deploy, and manage applications withou
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)

04. Which cybersecurity principle ensures that data is accurate, consistent, and reliable?
a) Availability
b) Confidentiality
c) Integrity
d) Authentication

05. What is the primary function of antivirus software in cybersecurity?


a) To encrypt sensitive data stored on the hard drive
b) To detect and remove malicious software from a computer system
c) To monitor network traffic for suspicious activities
d) To authenticate users accessing the network

06. Which type of cyber attack involves exploiting vulnerabilities in software or hardware systems to gain una
a) Phishing attack
b) DDoS attack
c) Exploit attack
d) Ransomware attack

07. What is the purpose of encryption in cybersecurity?


a) To detect and block malicious network traffic
b) To authenticate users accessing a network
c) To protect data from unauthorized access by converting it into a ciphertext
d) To provide secure remote access to a private network

08. Which authentication factor relies on somewhere the user is?


a) Inherence factor
b) Knowledge factor
c) Location factor
d) Possession factor

09. Which cybersecurity concept refers to the process of converting plaintext into ciphertext to secure data tr
a) Hashing
b) Digital signatures
c) Encryption
d) Key management

10. Which cloud computing deployment model offers resources shared among multiple organizations with a c
a) Public Cloud
b) Private Cloud
c) Hybrid Cloud
d) Community Cloud

Answers:
01. b) Low-latency data processing at the edge of the network
02. c) Increased flexibility and scalability
03. b) Platform as a Service (PaaS)
04. c) Integrity
05. b) To detect and remove malicious software from a computer system
06. c) Exploit attack
07. c) To protect data from unauthorized access by converting it into a ciphertext
08. c) Location factor
09. c) Encryption
10. d) Community Cloud

===========================================

1.Which of the following are the features of cloud computing?


a) Security
b) Availability
c) Large Network Access
d) All of the mentioned
Answer: D

2.Which one of the following options can be considered as the Cloud?


A) Hadoop
B) Intranet
C) Web Applications
D) All of the mentioned
Answer: A

3.What can you find in the block of a blockchain?


A) Timestamp
B) Transaction data
C) Hash point
D) All of the above
Answer: D

4.Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any dig
A) Decentralized
B) Demanding
C) Secure
D) Popular
Answer: A

5.VNC stands for _________


A) Virtual network communication
B) Virtual network computing
C) Virtual network computers
D) None
Answer: B

6.Which of the following is the way in which an IoT device is associated with data?
A) Internet
B) Cloud
C) Automata
D) Network
Answer:B
7.What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
Answer: D

8.In which of the following, a person is constantly followed/chased by another person or group of several peo
A) Phishing
B) Bulling
C) Stalking
D) Identity theft
Answer: C

=============================================

1) What IoT collects?


a) Device data
b) Machine-generated data
c) Sensor data
d) Human-generated data
Ans-> B

2) Which of the following is not an application of IoT?


a) BMP280
b) Smart home
c) Smart city
d) Self-driven cars
Ans-> A

3) Which architectural layer is used as a backend in cloud computing?


a) cloud
b) soft
c) client
d) all of the mentioned
Ans-> A

4) Which of the following is a type of cyber attack?


a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
Ans-> D

5) What are the features of cyber security?


a) Compliance
b) Defense against internal threats
c) Threat Prevention
d) All of the above
Ans-> D
6) Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any d
a) Decentralized
b) Demanding
c) Secure
d) Popular
Ans-> A

7) What does a block in a Blockchain have?


a) Header & Digital ledger
b) Bitcoins & Input
c) Transactions & Bitcoins
d) Header & Transaction
Ans-> D

=========================================================

1)Which of the following can not be considered an IoT device?

A) Smartwatch
B) Andriod Phone
C) Laptop
D) Tubelight
Answer:- D

2) Which is not an IoT platform?


A) Xiaomi Cloud
B) GoogleCloud
C) Myntra
D) AWS(Amazon Web Services)
Answer:- C

3) IoT is based on ______ technology.


A) Hardware
B) Software
C) None
D) Both of these
Answer:- D

4) What is an IoT network?


A) a collection of networked devices
B) a collection of Interconnected devices
C) a collection of signalled devices
D) None of the above
Answer:- B

5) Full-Form of VNC:
A) Virtual network of computers
B) Very network of computers
C) Virtual network for communication
D) Virtual network computing
Answer:- D

7) ____ is a security mechanism used in WiFi.


A) WPA
B) HTTP
C) MLA
D) None of these
Answer:- A

==========================================

1)Which protocol is commonly used for communication between IoT devices?


a) HTTP
b) MQTT
c) SMTP
d) FTP

ans:b) MQTT

2)What is the main purpose of IoT platforms?


a) To secure IoT devices
b) To manufacture IoT devices
c) To manage and analyze data from IoT devices
d) To regulate IoT device prices

ans:c) To manage and analyze data from IoT devices

3)Which of the following is NOT a primary component of an IoT system?


A) Sensors
B) Cloud Computing
C) Mobile Applications
D) Analog Circuits
E) Actuators

Answer: D) Analog Circuits

4)Cloud Computing also known as _____________.


a)On-Demand Computing
b)Grid Computing
c)SMART Computing
d)Edge Computing

ans:a)On-Demand Computing

5)Which cloud service model provides access to virtualized hardware resources over the internet?
a) Platform as a Service (PaaS)
b) Infrastructure as a Service (IaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
ans:b) Infrastructure as a Service (IaaS)

6)What is SQL injection?


a) Injecting malicious scripts into a website's HTML
b) Intercepting data transmitted between a client and a server
c) Exploiting vulnerabilities in a web application's database queries
d) Brute-force guessing of login credentials

ans:c) Exploiting vulnerabilities in a web application's database queries

7)What is the main purpose of a blockchain?


a) Securely store and verify transactions
b) Share social media posts
c) Create digital artwork
d) Manage email communication

ans:a) Securely store and verify transactions

========================================

1. Which of the following is NOT a type of cyberattack?


a) Phishing
b) Encryption
c) Denial-of-Service (DoS)
d) Man-in-the-Middle (MitM)
Ans:- (b)

2. What is the primary goal of cyber security?


a) To develop new hacking techniques
b) To improve online shopping experiences
c) To protect information systems from unauthorized access, use, disclosure, disruption, modification, or de
d) To increase internet traffic
Ans:- (c)

3. Multi-factor authentication (MFA) is an example of which cyber security control?


a) Preventative control
b) Detective control
c) Corrective control
d) All of the above
Ans:- (d)

4. What is the main benefit of using cloud computing services?


a) Increased hardware maintenance costs
b) Scalability and elasticity
c) Limited data storage capacity
d) Slower processing power
Ans:- (b)

5. Which cloud service model provides users with access to on-demand, virtualized computing resources?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Everything as a Service (EaaS) (This is not a standard cloud service model)
Ans:- (a)

6. Security concerns are a major consideration when adopting cloud computing. What is a shared responsibili
a) The cloud provider is solely responsible for data security.
b) The user is solely responsible for data security.
c) Security responsibility is shared between the cloud provider and the user.
d) There is no shared responsibility model in cloud security.
Ans:- (c)

7. What is the core concept behind the Internet of Things (IoT)?


a) Connecting large mainframe computers together
b) Enabling physical devices to connect and exchange data over the internet
c) Upgrading existing communication networks to 5G
d) Developing new social media platforms
And:- (b)

8. IoT devices often have limited processing power and memory. What is a potential security risk associated
a) Increased data storage capacity
b) Difficulty implementing robust security measures
c) Faster internet connection speeds
d) Improved user experience
Ans:- (b)

===============================================

1.Which consensus mechanism is commonly used in blockchain networks?


A) Proof of Work (PoW)
B) Proof of Authority (PoA)
C) Proof of Stake (PoS)
D) All of the above
Answer: D) All of the above

2.What is the primary benefit of using cloud computing?


a) Increased upfront costs
b) Reduced maintenance overhead
c) Limited accessibility
d) Decreased scalability
Answer: b) Reduced maintenance overhead

3.Which of the following is NOT a service model in cloud computing?


a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Local Area Network as a Service (LANaaS)
Answer: d) Local Area Network as a Service (LANaaS)
4.Which of the following is an example of a preventive cybersecurity measure?
A) Installing antivirus software
B) Conducting regular data backups
C) Responding to security incidents
D) Updating security policies
Correct Answer: A) Installing antivirus software

5.What does the term "social engineering" refer to in cybersecurity?


A) A method of encrypting data
B) A technique for securing physical premises
C) A method of manipulating people to reveal confidential information
D) A framework for developing cybersecurity policies
Correct Answer: C) A method of manipulating people to reveal confidential information

6.Which of the following is NOT a typical component of an IoT system?


a) Sensors
b) Actuators
c) Microcontrollers
d) Laser printers
Answer: d) Laser printers

7.Which of the following is a potential security concern associated with IoT devices?
a) Limited connectivity
b) Over-reliance on manual operation
c) Lack of encryption
d) Excessive battery consumption
Answer: c) Lack of encryption

==========================================

1.What is the existence of weakness in a system or network is known as?


a)Attack
b) Exploit
c) Vulnerability
d) Threat
Answer: c

2._________is a code injecting method used for attacking the database of a system / website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
Answer: b

3.XSS is abbreviated as ______.


a) Extreme Secure Scripting
b) Cross Site Security
c) X Site Scripting
d) Cross Site Scripting
Answer: d
4.Which method of hacking will record all your keystrokes?
a) Keyhijacking
b) Keyjacking
c) Keylogging
d) Keyboard monitoring
Answer: c

5.Which of the following is true about Arduino IoT devices?


a) They are open-source software
b) They can only read analog inputs
c) They have their own operating systems
d) They don't have pre-programmed firmware
Answer: a

6.Which architectural layer is used as a backend in cloud computing?


a) cloud
b) soft
c) client
d) all of the mentioned
Answer: a

7.Which of the following is not a property of cloud computing?


a) virtualization
b) composability
c) scalability
d) all of the mentioned
Answer: b

8. What is the incentive for miners to validate transactions?


a) Appreciation of the community
b) Block rewards
c) Additional memory
d) None of the above
Answer:b

9.What is a blockchain?
a). A blockchain is a centralized digital ledger consisting of records called blocks.
b). A blockchain is a decentralized, distributed, digital ledger consisting of records called blocks.
c). A blockchain is a digital database consisting of records called class.
d). None of the above
Answer: b

=======================================================

6. Which emerging technology involves the use of algorithms and statistical models to enable computer system
a) Blockchain
b) Artificial Intelligence
c) Quantum Computing
d) Augmented Reality
7. What is the primary application of 3D printing technology in the medical field?
a) Manufacturing electronic devices
b) Creating prosthetic limbs
c) Developing virtual reality games
d) Designing autonomous vehicles

8. Which of the following technologies is associated with the concept of "smart cities," integrating IoT devices
a) Virtual Reality
b) Augmented Reality
c) Internet of Things
d) Blockchain

9. What is the main purpose of using drones in agriculture?


a) Enhancing cybersecurity measures
b) Monitoring crop health
c) Predicting stock market trends
d) Conducting deep space exploration

10. Which emerging technology involves the use of wearable devices to track and analyze physiological data fo
a) Blockchain
b) Edge Computing
c) Virtual Reality
d) Internet of Medical Things (IoMT)

Answers:
6. b) Artificial Intelligence
7. b) Creating prosthetic limbs
8. c) Internet of Things
9. b) Monitoring crop health
10. d) Internet of Medical Things (IoMT)

=======================================================

1. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS

Ans-A

2.How does a blockchain achieve security and tamper-resistance in data storage?


a) By using a centralized server to manage data storage
b) By encrypting all data stored on the blockchain
c) By distributing data across multiple nodes and using cryptographic hashing
d) By granting full control to a single authority over the data

Ans-C
3.What is the full form of DHCP in IoT communication protocols?
a) Dynamic Host Communication Protocol
b) Domain Host Communication Protocol
c) Dynamic Host Control Protocol
d) Domain Host Control Protocol

Ans-A

4.Cloud computing is a concept that involves pooling physical resources and offering them as which sort of res
a) cloud
b) real
c) virtual
d) none of the mentioned

Ans-C

5.Which of the following is the most refined and restrictive cloud service model?
a) PaaS
b) IaaS
c) SaaS
d) CaaS

Ans-A

6.______ is the example of IaaS Cloud Computing.


a) Amazon web services (AWS) ec2
b) Microsoft Azure VM
c) Google Compute Engine (GCE)
d) All of above

Ans-D

7.Which of the following can improve the performance of an AI agent?


a) Perceiving
b) Learning
c) Observing
d) All of the mentioned

Ans-B

=======================================

1.What is the term applied for splits in a blockchain network?


Mergers
Divisions
Forks
None of the above
Ans :- Forks
2.Through which network does Open IoT manage registration, deployment of sensors?
LSM
HTTP
X-GSN
GSN
Ans :- X-GSN

3.What type of computing technology refers to services and applications that typically run on a distributed ne

Distributed Computing
Cloud Computing
Soft Computing
Parallel Computing
Ans :- cloud computing

4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networ
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
Ans :- Cyber Attack

=======================================================

1. What is the primary goal of data loss prevention (DLP) systems in cybersecurity?
a) To monitor network traffic for suspicious activities
b) To prevent unauthorized access to a network
c) To protect sensitive data from being leaked or lost
d) To authenticate users accessing a network
Ans :c

2. Which type of cybersecurity attack involves impersonating a legitimate entity to deceive individuals or gain
a) Phishing attack
b) DDoS attack
c) Brute force attack
d) Man-in-the-middle attack
Ans :a

3. What is the primary advantage of using biometric authentication methods in cybersecurity?


a) Enhanced security compared to traditional authentication methods
b) Lower implementation costs
c) Improved scalability and flexibility
d) Simplified user experience
Ans:a

4. Which cloud computing service model offers users the ability to run application code without the need to m
a) Infrastructure as a Service(laaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Ans:d

5. Which cybersecurity principle ensures that systems and data are available and accessible when needed?
a) Integrity
b) Confidentiality
c) Availability
d) Authentication
Ans:c

================================================

1) IoT helps in ____ human efforts.


a) removing
b) reducing
c) increasing
d) stopping
Ans. b.

2) IoT devices can collect data from ____.


a) environment
b) internet
c) books
d) documents
Ans. a.

3) _____is the primary factor in automation which we can save through IoT platform.
a) Cost
b) Time
c) Privacy
d) Security
Ans. b.

4) ____ gives users access to storage, networking, servers and other computing resources via the cloud.
a) PaaS
b) IaaS
c) SaaS
d) All of above
Ans. b.

5) ______ is the example of IaaS Cloud Computing.


a) Amazon web services (AWS) ec2
b) Microsoft Azure VM
c) Google Compute Engine (GCE)
d) All of above
Ans. d.

6) In _____, the providers take care of security, operating systems, server software and backups.
a) IaaS
b) PaaS
c) SaaS
D) All of above
Ans. b.

7) _____ service provider delivers software and applications through the internet.
a) IaaS
b) PaaS
c) SaaS
d) All of above
Ans. c.

8) Google’s G suite, GitHub and Dropbox are the examples of ____ Cloud computing.
a) PaaS
b) IaaS
c) SaaS
d) None of above
Ans. c.

9) _____ manages all the services and supporting infrastructure off-site over the internet and shares it across
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) None of above
Ans. a.

10) _____solutions are preferred for enhanced security and privacy by the users.
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) None of above
Ans. b.

a1. Which of the following statement is correct?


(A) Reliability ensures the validity
(B) Validity ensures reliability
(C) Reliability and validity are independent of each other
(D) Reliability does not depend on objectivity

Answer: (C)

Q2. Which of the following statements is correct?


(A) Objectives of research are stated in first chapter of the thesis
(B) Researcher must possess analytical ability
(C) Variability is the source of problem
(D) All the above

Answer: (D)
Q3. The first step of research is:
(A) Selecting a problem
(B) Searching a problem
(C) Finding a problem
(D) Identifying a problem

Answer: (D)

Q4. Research can be conducted by a person who:


(A) holds a postgraduate degree
(B) has studied research methodology
(C) possesses thinking and reasoning ability
(D) is a hard worker

Answer: (B)

Q5. Research can be classified as:


(A) Basic, Applied and Action Research
(B) Philosophical, Historical, Survey and Experimental Research
(C) Quantitative and Qualitative Research
(D) All the above

Answer: (D)

Q6. To test null hypothesis, a researcher uses:


(A) t test
(B) ANOVA
(C) X2
(D) factorial analysis

Answer: (B)

Q7. Bibliography given in a research report:


(A) shows vast knowledge of the researcher
(B) helps those interested in further research
(C) has no relevance to research
(D) all the above

Answer: (B)

Q8. A research problem is feasible only when:


(A) it has utility and relevance
(B) it is researchable
(C) it is new and adds something to knowledge
(D) all the above
Answer: (D)

Q9. The study in which the investigators attempt to trace an effect is known as:
(A) Survey Research
(B) Summative Research
(C) Historical Research
(D) ‘Ex-post Facto’ Research

Answer: (D)

Q10. Generalized conclusion on the basis of a sample is technically known as:


(A) Data analysis and interpretation
(B) Parameter inference
(C) Statistical inference
(D) All of the above

Answer: (A)

Q11. Fundamental research reflects the ability to:


(A) Synthesize new ideals
(B) Expound new principles
(C) Evaluate the existing material concerning research
(D) Study the existing literature regarding various topics

Answer: (B)

Q12. The main characteristic of scientific research is:


(A) empirical
(B) theoretical
(C) experimental
(D) all of the above

Answer: (D)

Q13. Authenticity of a research finding is its:


(A) Originality
(B) Validity
(C) Objectivity
(D) All of the above

Answer: (C)

Q14. Which technique is generally followed when the population is finite?


(A) Area Sampling Technique
(B) Purposive Sampling Technique
(C) Systematic Sampling Technique
(D) None of the above

Answer: (C)
Q15. Research problem is selected from the stand point of:
(A) Researcher’s interest
(B) Financial support
(C) Social relevance
(D) Availability of relevant literature

Answer: (C)

Q16. The research is always –


(A) verifying the old knowledge
(B) exploring new knowledge
(C) filling the gap between knowledge
(D) all of these

Answer: (D)

Q17. Research is
(A) Searching again and again
(B) Finding a solution to any problem
(C) Working in a scientific way to search for the truth of any problem
(D) None of the above

Answer: (C)

Q20. A common test in research demands much priority on


(A) Reliability
(B) Useability
(C) Objectivity
(D) All of the above

Answer: (D)

Q21. Which of the following is the first step in starting the research process?
(A) Searching sources of information to locate the problem.
(B) Survey of related literature
(C) Identification of the problem
(D) Searching for solutions to the problem

Answer: (C)

Q22. Which correlation coefficient best explains the relationship between creativity and intelligence?
(A) 1.00
(B) 0.6
(C) 0.5
(D) 0.3

Answer: (A)

Q23. Manipulation is always a part of


(A) Historical research
(B) Fundamental research
(C) Descriptive research
(D) Experimental research

Answer: (D)

Explanation: In experimental research, researchers deliberately manipulate one or more independent variable

Q24. The research which is exploring new facts through the study of the past is called
(A) Philosophical research
(B) Historical research
(C) Mythological research
(D) Content analysis

Answer: (B)

Q25. A null hypothesis is


(A) when there is no difference between the variables
(B) the same as research hypothesis
(C) subjective in nature
(D) when there is difference between the variables

Answer: (A)

Q26. We use Factorial Analysis:


(A) To know the relationship between two variables
(B) To test the Hypothesis
(C) To know the difference between two variables
(D) To know the difference among the many variables

Answer: (D)

Explanation: Factorial analysis, specifically factorial analysis of variance (ANOVA), is used to investigate the eff

Q27. Which of the following is classified in the category of the developmental research?
(A) Philosophical research
(B) Action research
(C) Descriptive research
(D) All the above

Answer: (D)

Q28. Action-research is:


(A) An applied research
(B) A research carried out to solve immediate problems
(C) A longitudinal research
(D) All the above

Answer: (B)
Explanation: Action research is an approach to research that encompasses all the options mentioned. It is an a

Q29. The basis on which assumptions are formulated:


(A) Cultural background of the country
(B) Universities
(C) Specific characteristics of the castes
(D) All of these

Answer: (A)

Q30. How can the objectivity of the research be enhanced?


(A) Through its impartiality
(B) Through its reliability
(C) Through its validity
(D) All of these

Answer: (D)

Q31. A research problem is not feasible only when:


(A) it is researchable
(B) it is new and adds something to the knowledge
(C) it consists of independent and dependent variables
(D) it has utility and relevance

Answer: (C)

Explanation: A research problem is considered feasible when it can be studied and investigated using appropr

Q32. The process not needed in experimental research is:


(A) Observation
(B) Manipulation and replication
(C) Controlling
(D) Reference collection

Answer: (D)

In experimental research, reference collection is not a part of the process.

Q33. When a research problem is related to heterogeneous population, the most suitable sampling method is
(A) Cluster Sampling
(B) Stratified Sampling
(C) Convenient Sampling
(D) Lottery Method

Answer: (B)

Explanation: When a research problem involves a heterogeneous population, stratified sampling is the most s

Q34. Generalised conclusion on the basis of a sample is technically known as:


(A) Data analysis and interpretation
(B) Parameter inference
(C) Statistical inference
(D) All of the above

Answer: (C)

Explanation: Generalized conclusions based on a sample are achieved through statistical inference. It involves

Q35. The experimental study is based on

(A) The manipulation of variables


(B) Conceptual parameters
(C) Replication of research
(D) Survey of literature

Answer: (A)

Q36. Which one is called non-probability sampling?


(A) Cluster sampling
(B) Quota sampling
(C) Systematic sampling
(D) Stratified random sampling

Answer: (B)

Q37. Formulation of hypothesis may NOT be required in:


(A) Survey method
(B) Historical studies
(C) Experimental studies
(D) Normative studies

Answer: (B)

Q38. Field-work-based research is classified as:


(A) Empirical
(B) Historical
(C) Experimental
(D) Biographical

Answer: (A)

Q39. Which of the following sampling method is appropriate to study the prevalence of AIDS amongst male an
(A) Cluster sampling
(B) Systematic sampling
(C) Quota sampling
(D) Stratified random sampling

Answer: (B)

Q40. The research that applies the laws at the time of field study to draw more and more clear ideas about th
(A) Applied research
(B) Action research
(C) Experimental research
(D) None of these

Answer: (A)

Q1 Choose the correct IaaS provider among the following.


A EC2
EC1
EC10
Hybrid
Q2 Which of the following refers to network or internet?
Cloud
CRM
A Cloud Computing
Computing
Q3 What is the full form of IoT?
a) Internet of Technology
b) Incorporate of Things
A c) Internet of Things
d) Incorporate of Technology
Q When was the actual term “Internet of Things” coined?
a) 1998
A b) 1999
c) 2000
d) 2002
Q What is the most important concern of cloud computing?
Cost
Space
A Security
Platform
Q Identify the technique used for creating cloud computing.
Insubordination
Cannibalization
A Virtualization
Transubstantiation
Q Which of the following is not an IoT device?
A a) Table
b) Laptop
c) Arduino
d) Tablet
Q _________ provides the environment where services are run
Application
Service
A Runtime cloud
Infrastructure
Q What is Microsoft Azure? Select the best answer.
An open platform that aids in development, service hosting
A cloud computing service created by Microsoft which helps in testing, deploying, and managing th
A platform that offers a variety of technologies that are used for cloud service, mobile apps, etc.
A All the mentioned
Q Google cloud platform is an example of
Private cloud
A Public cloud
Hybrid cloud
Community cloud
Q Which of the following is not an application of IoT?
A a) BMP280
b) Smart home
c) Smart city
d) Self-driven cars
Q Which layer is used for wireless connection in IoT devices?
a) Application layer
b) Network layer
A c) Data link layer
d) Transport layer
Q when you try to shift applications between two or multiple Cloud ecosystems, ___________ is a ch
Reliability
Dependency on network
Security
A Interoperability
Q What is Cloud Security?
Protecting clouds from rain and storms
A Ensuring data protection and privacy in cloud environments
Preventing unauthorized access to physical servers
Storing digital assets offline
Q Which of the following is used to capture data from the physical world in IoT devices?
A a) Sensors
A b) Actuators
c) Microprocessors
d) Microcontrollers
Q Which of the following is the application of cloud computing?
a) Adobe
b) Paypal
c) Google G Suite
A d) All of the above
Q In a blockchain network, how do participants communicate with each other?
Through intermediaries
Through a centralized server
A Directly with other participants
Through a hierarchical structure
Q How does blockchain technology contribute to cost efficiency?
A By increasing transaction fees
By reducing the need for intermediaries
By adding layers of verification
By introducing complex settlement processes
Q What does blockchain enable in the supply chain?
A Transparency and visibility
Centralized control
Offline tracking
Random product movement
Q Which consensus mechanisms are commonly used in public blockchains?
A Proof of Work (PoW) and Proof of Stake (PoS)
Centralized control
Closed networks
Permissioned access
Q What functionality does Ethereum introduced?
A Decentralized voting
Smart Contracts
Social media platform
Email service
Q What role do hash functions play in blockchain?
A Generating unique digital fingerprints for each block
Verifying digital signatures
Encrypting transaction data
Generating public and private keys
Q What type of cyber attack involves tricking victims into revealing personal information by pretend
A) Trojan Horse
A B) Phishing
C) Ransomware
D) Spyware
Q What type of attack is characterized by overwhelming a system with traffic from multiple sources,
A) Phishing
B) Virus
A C) DDoS
D) Trojan
Q What term is used for malware that is disguised as, or embedded within, legitimate software?
A) Virus
B) Worm
C) Trojan Horse
A D)Spyware
Q What does P2P stand for?
A a):Peer to Peer
A b):Product to Product
A c):Password to Password
A d):None of the above
Q Which of the following is a type of cyber attack?
A a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above
Q What does design provide?
a) Technology
b) Ecosystem
A c) Technology and ecosystem
d) Digital revolution
Q _____________ will play an important role in simplifying cloud architecture.
A 1.Blockchain
2.IoT
3.Automation
4.None of the above
Q Google’s G suite, GitHub and Dropbox are the examples of ____ Cloud computing.
A 1. PaaS
2. IaaS
3. SaaS
4. None of above
Q In which year Ethereum launched ICO for fund raise?
A 2014
2015
2016
2012
Q What is the full form of PoS in blockchain technology?
A Proof of Stake
Proof of System
Proof of Security
Proof of Service
Q Which type of Infrastructure is being used in Cardano Ecosystem?
Stable and Secured
A scalable and sustainable
modular
Fiat
Q Which of the below is a kind of cyber security?
1. Cloud Security
2. Application Security
3. Cloud Security
A 4. All options mentioned
Q Which of the below does not constitute a cybercrime?
1. Refusal of service
2. Man in the middle
3. Phishing
A 4. AES
Q Which of the below is a popular victim of cyber attackers looking to gain the IP address of a target
1. Emails
A 2. Websites
3. IP tracer
4. web pages
Q Any company or agency’s IT protection is managed and maintained by?
1. Software Security Specialist
2. CEO of the organisation
3. Security Auditor
A 4. IT Security Engineer
Q The ____________ is anything which your search engine cannot search.
a) Haunted web
b) World Wide Web
c) Surface web
A d) Deep Web
Q ________________ is a network construct over the internet that is encrypted. It offers anonymity
a) Freenet
A b) Darknet
c) ARPANET
d) Stuxnet
Q Which of the following is a browser to access darkweb?
ios
Google chrome
A Tor
Linux
Q From the perspective of geographic coverage, which of the following categories of netoworks has
PAN
LAN
A WAN
MAN
Q Which of these describes an ongoing pursuit by an individual/group?
A a) Stalking
b) Identity theft
c) Phishing
d) Bulling
Q Which of the following typically keeps tabs on every online activity the victim engages in, compiles
a) Adware
b) Malware
A c) Spyware
d) All of the above
Q Which of the following can not be considered an IoT device?
Smart Watch
Andriod Watch
Laptop
A Tubelight
Q Which is not an IoT platform?
Xiaomi Cloud
GoogleCloud
A Myntra
AWS(Amazon Web Services)
Q In which of the following way, data is associated with an IoT device:
Internet
Network Connection
Cables
A Cloud
Q A _____ is the component that executes a program in an IoT system.
Micro converter
A Microcontroller
Microsensor
None
Q ___________ is a community that is working together to establish an IoT architecture
A Eclipse IoT
RedHat
Intercloud
Bot 2 Bot
Q ________ is a name given to the current trend of automation and data exchange in manufacturin
A Industry 4.0
Industry 5.0
Industry 3.0
Industry 2.0
Q Which one is not the benefit of IoT in manufacturing sector?
Process Optimization
Inventory Management
Predictive Maintence
A Product design improvement
hen stores it and later display it to other users, is potentially vulnerable to a kind of attack called a ___________________ attack.
or more independent variables to observe their effects on dependent variables. The goal is to establish cause-and-effect relationships

is used to investigate the effects of two or more independent variables on a dependent variable. It helps to determine whether there
options mentioned. It is an applied research method where researchers work collaboratively with practitioners or stakeholders to ad

nd investigated using appropriate research methods and resources. The presence of independent and dependent variables is not a fac

atified sampling is the most suitable sampling method. Stratified sampling involves dividing the population into subgroups or strata ba
atistical inference. It involves using sample data to make inferences or predictions about a larger population. Statistical inference help
ause-and-effect relationships and test hypotheses. This type of research often involves control groups and random assignment to ensu

s to determine whether there are significant differences or interactions among the independent variables and their combined effects
tioners or stakeholders to address immediate problems or issues in a real-world context. It is often conducted over a period of time, m

pendent variables is not a factor that determines the feasibility of a research problem. Instead, it is an essential component of a well-d

n into subgroups or strata based on certain characteristics or variables. Each stratum represents a relatively homogeneous subset of t
ion. Statistical inference helps researchers draw conclusions, estimate parameters, and test hypotheses about the population from wh
d random assignment to ensure the validity of the findings. Manipulation is an essential aspect of experimental research to assess the
ucted over a period of time, making it a longitudinal research approach. So, all the options (A) An applied research, (B) A research carr

sential component of a well-defined research problem that helps in formulating research questions or hypotheses. Feasibility depends

ely homogeneous subset of the population. Then, a random sample is taken from each stratum in proportion to its size or importance
about the population from which the sample was taken. It is a fundamental concept in statistics and plays a crucial role in various field
mental research to assess the impact of specific variables and draw conclusions about their influence on the outcome.
research, (B) A research carried out to solve immediate problems, and (C) A longitudinal research are correct when describing action

potheses. Feasibility depends on whether the research problem can be addressed and answered within the constraints of available tim

rtion to its size or importance in the population. This method ensures that the sample is representative of the diversity present in the
he constraints of available time, resources, and methods. Options (A), (B), and (D) are more relevant to the feasibility of a research pr

f the diversity present in the population and allows for more precise estimates of population parameters for each subgroup.
he feasibility of a research problem.

You might also like