Iot
Iot
A. Internet of Tech
B. Incorporation of Things
C. Internet of Things
A. Smartwatch
B. Andriod Phone
C. Laptop
D. Tubelight Answer:- D
A. Xiaomi Cloud
B. GoogleCloud
C. Myntra
A. Smartwatch
B. Andriod Phone
C. Laptop
D. Tubelight Answer:- D
6. IoT is based on ______ technology.
A. Hardware
B. Software
C. None
A. 8 bits
B. 32 bits
C. 48 bits
A. MML
B. ML
C. MX
D. MM Answer:- C
A. Destination IP Address
B. Source IP Address
C. Both of these
1.
A. Data Link
B. Network
C. Physical
A. .jar
B. .obj
C. .cpp
D. .exe Answer:-A
16. Which one out of these is not a Data Link Layer Technology
A. Bluetooth
B. Wifi
C. HTTP
A. IPI interface
B. UART interface
C. I2P interface
D. None Answer:- B
A. 3
B. 4
C. 2
20. Which of the following things is mandatory for the IoT gateway to provide?
C. Software Security
A. Internet
B. Network connection
C. Cables
D. Cloud Answer:- D
Answer:- B
1.
Answer:- A
1.
D. All of these
Answer:- B
Explanation: API systems enable the portability of Systems Service.
1.
A. to enhance security
D. All of these
Answer:- C
1.
A. security
B. transport
C. data communication
D. logical
Answer:- B
1.
D. None
Answer:- C
A. binary logic
B. Hexa logic
C. fuzzy logic
D. All of these
Answer:- C
29. The collection of ____ that connects several devices is called the bus.
1.
A. network
B. lines
C. cables
D. None of these
Answer:- B
1.
A. WPA
B. HTTP
C. MLA
D. None of these
Answer:- A
1.
B. to improve security
C. to improve the usability and interoperability
D. All of these
Answer:- C
Explanation: Web of things(WoT) is used to improve the usability and interoperability of IoT.
1.
A. limited
B. unlimited
C. not available
D. All of these
Answer:- A
1.
A. 424 Kbps
B. 1106 Kbps
C. 216 Kbps
D. All of these
Answer:- D
Explanation: The NFC can transfer data at any speed of either 212, 1106, or 424 Kbps.
1.
Answer:- D
1.
A. GSN
B. MMQT
C. GAN
D. None of these
Answer:- A
Explanation: GSN(Global Sensor Network) uses Java as it is more portable than other languages like C++, Python, etc.
D. None Answer:- D
A. Bluetooth
B. VPN
C. Wife
D. Hotspot Answer:- B
39. A _____ is the component that executes a program in an IoT system.
A. micro converter
B. microcontroller
C. micro sensor
D. None Answer:- B
A. LORA
B. SIGFOX
C. NB-IoT
D. Bluetooth Answer:- D
41. With two-factor Authentication, which attack can be users vulnerable to?
B. Man-in-the-middle attack
C. Cross Attack
42. Which one out of these is in a format which is not readable by the user?
A. Encryption
B. Passwords
C. .text