0% found this document useful (0 votes)
1 views

2024 Spring Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

2024 Spring Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 59

Introduction To Industry 4.

0 And Industrial Internet Of Things


Assignment-1

Number of questions: 15 Total marks: 10 X 1= 15

1. What is a transducer?

a. A device that converts energy from one form to another


b. A type of sensor that detects only energy
c. A digital communication device
d. A part of a computer processor

Answer: (a)

Justification: Please refer to Slide 3 of Lecture 1 of Week 1

2. What does sensor accuracy refer to?

a. The range of the sensor


b. The smallest detectable input change
c. The correctness of the output compared to a standard value
d. The sensor's response time

Answer: (c)

Justification: Please refer to Slide 8 of Lecture 1 of Week 1

3. What is an active sensor?

a. A sensor that can only sense physical changes


b. A sensor that operates without an external power source
c. A sensor that independently senses the input
d. A sensor that operates without any energy consumption

Answer: (c)

Justification: Please refer to Slide 16 of Lecture 1 of Week 1

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
4. What does 'Actuator' primarily refer to in IIoT systems?

a. A device that stores data


b. A device that processes information
c. A device that converts signals into physical action
d. A device that enhances signal strength

Answer: (c)

Justification: Please refer to Slide 21 of Lecture 1 of Week 1

5. Zigbee technology is popular for ______________.

a. Long-range communications
b. High power consumption
c. Low-cost, low-power wireless mesh networks
d. High data rate transfer

Answer: (c)

Justification: Please refer to Slide 13 of Lecture 2 of Week 1

6. Which of the following is true about 6LoWPAN?

a. It is used for high-power industrial networks


b. It enables IPv6 packets over low-power wireless networks
c. It focuses on high-speed ethernet
d. It's a standard for satellite communications
Answer: (b)

Justification: Please refer to Slide 17 of Lecture 2 of Week 1

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
7. Near Field Communication (NFC) is typically used for:

a. Long-range satellite communications


b. High-power industrial networks
c. Short-range wireless interaction between electronic devices
d. Storing large amounts of data

Answer: (c)

Justification: Please refer to Slides 20 and 21 of Lecture 3 of Week 1

8. Which of the following actuators work on the principle of compression and decompression?

a. Hydraulic Actuators
b. Thermal Actuators
c. Electric Actuators
d. Mechanical Actuators

Answer: (a)

Justification: Please refer to Page 109 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy

9. ISA 100.11a is significant in IIoT because it _____________________.

a. Provides high-speed internet connectivity


b. Focuses on wireless network technology for industrial automation
c. Is used for long-range satellite communications
d. Enhances Bluetooth signal strength

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 3 of Week 1

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
10. What is the primary function of IEEE 802.15.4 in IoT?

a. High-speed data transmission


b. Providing security algorithms
c. Establishing low-rate wireless personal area networks
d. Data storage and retrieval

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 2 of Week 1

11. Z-Wave technology is best suited for ___________________.

a. Industrial communication
b. Home automation
c. Satellite communication
d. High-speed internet

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 3 of Week 1

12. What is the maximum data rate possible in Wireless HART?

a. 2500 b/s
b. 2.5 mb/s
c. 250 kb/s
d. None of the above

Answer: (c)

Justification: Please refer to Slide 23 of Lecture 2 of Week 1

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
13. QoS 2 in MQTT is also known as ____________.

a. At most once
b. At least once
c. Exactly once
d. None of the above

Answer: (c)

Justification: Please refer to Slide 8 of Lecture 5 of Week 1

14. CoAP works on Request/Response framework based on the _______ architecture.

a. UDP
b. TCP
c. SCTP
d. DCCP

Answer: (a)

Justification: Please refer to Slide 10 of Lecture 5 of Week 1

15. Infra-red sensor is an example of _____________________.

a. Acoustic Sensor
b. Mechanical Sensor
c. Electrical Sensor
d. Optical Sensor

Answer: (d)

Justification: Please refer to Page 190 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things
Assignment-2
Number of questions: 15 Total marks: 10 X 1= 15

1. Which of the following is a key characteristic of the Fourth Industrial Revolution?

a. Extensive use of steam engines


b. Evasion of corporate taxes
c. Widespread use of artificial intelligence
d. Introduction of assembly lines

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 1 of Week 2

2. Which of the following is not a physical megatrend?

a. Cloud Computing
b. 3D Printer
c. Autonomous Vehicle
d. Advanced Robotics

Answer: (a)

Justification: Please refer to Slide 15 of Lecture 1 of Week 2

3. How does Industry 4.0 enhance sustainability in manufacturing industries?

a. By increasing manual labor


b. Through globalization and emerging technologies
c. By reducing the use of digital technologies
d. Focusing on traditional manufacturing methods

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 2 of Week 2

4. What is a crucial aspect of Supply Chain Management (SCM) in sustainable manufacturing?

a. Prioritizing high-cost production


b. Ignoring environmental concerns
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
c. Outsourcing without strategic planning
d. Considering environmental concerns such as climate change, contamination, and
resource consumption

Answer: (d)

Justification: Please refer to Slide 6 of Lecture 2 of Week 2

5. What role does ICT play in the manufacturing industry?

a. Reducing communication within the enterprise


b. Serving as the main nervous system of any manufacturing industry
c. Discouraging the sharing of information between customer, producer, and supplier
d. Eliminating the need for enterprise resource planning

Answer: (b)

Justification: Please refer to Slide 7 of Lecture 2 of Week 2

6. What characterizes an emerging market in the context of Industry 4.0?

a. Markets that are fully developed and static


b. Markets that meet the standards of newly developed innovative products
c. Markets that exclusively focus on traditional products
d. Markets that resist globalization

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 2 of Week 2

7. What is the primary focus of the Lean Production System?

a. Overworking the employees to boost production


b. Prioritizing customer needs
c. Increasing the price of products
d. Reducing technology use

Answer: (b)

Justification: Please refer to Slides 2 of Lecture 3 of Week 2

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
8. Which among the following are aspects of socio-economic issues of sustainability in Industry
4.0?

a. Social
b. Economic
c. Environmental
d. All of the above

Answer: (d)

Justification: Please refer to Page 61 of the book Introduction to Industrial Internet of Things and
Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

9. The Lean Production System mainly focuses on the customer’s need. Which company is
credited for the development of Lean Production System?

a. Siemens
b. Toyota Motors
c. Hitachi
d. Microsoft

Answer: (b)

Justification: Please refer to Slide 2 of Lecture 3 of Week 2

10. What is a major concern in implementing Lean Production in the context of Industry 4.0?

a. Reducing digital technology use


b. Integrating humans in plants
c. Ignoring customer feedback
d. Avoiding environmental considerations

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 3 of Week 2

11. Which of the following is not a benefit of smart and connected products?

a. Decreased environmental impact


b. Better usage of product
c. Rapid increment in the sale price of a product
d. Smart Supply Chain

Answer: (c)
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Justification: Please refer to Slide 3 of Lecture 4 of Week 2

12. Which of the following is not a fundamental building block of a smart and connected
business in the context of Industry 4.0?

a. Blueprint of profits
b. Customer values
c. Key resources and processes
d. None of the above

Answer: (d)

Justification: Please refer to Slide 5 of Lecture 4 of Week 2

13. What is a major advantage of smart factories?

a. Increased production costs


b. Reduced efficiency
c. Improvement in quality and safety
d. Limited product variety

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 5 of Week 2

14. How is information technology utilized in smart factories?

a. For manual data processing


b. To avoid data analysis
c. For smart software applications and to control processes
d. To limit connectivity and communication

Answer: (c)

Justification: Please refer to Slide 10 of Lecture 5 of Week 2

15. Communication, trust and capital with respect to the created values play an important role
in IIoT business model.

a. False
b. True

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (b)

Justification: Please refer to Page 109 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-3

Number of questions: 15 Total marks: 10 X 1= 15

1. Which of the following is not a feature of Cyber-Physical Systems?

a. Reactive Computation
b. Concurrency
c. Real-Time Computation
d. Standalone non-networked Computation

Answer: (d)

Justification: Please refer to Slides 6 and 7 of Lecture 1 of Week 3

2. In the context of CPS in Smart Grid, what is the full form of DAU?

a. Data Aggregation Unit


b. Data Analytic Unit
c. Distributed Augmented Universe
d. Dedicated Accounting Unit

Answer: (a)

Justification: Please refer to Slide 10 of Lecture 1 of Week 3

3. Which of the following is not a component of CPS's “5C Architecture” for Industry 4.0?

a. Connection
b. Conversion
c. Compatibility
d. Cognition

Answer: (c)

Justification: Please refer to Slide 12 of Lecture 1 of Week 3

4. What are the key parts enabling collaboration productivity in Industry 4.0?

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. IT Proliferation, Single Source of Truth, Industrialization, Coordination
b. Financial Analysis, Market Research, Legal Compliance, Public Relations
c. Human Resources, Sales Targets, Customer Feedback, Advertising
d. Supply Chain Management, Quality Control, Cost Reduction, Branding

Answer: (a)

Justification: Please refer to Slide 4 of Lecture 2 of Week 3

5. What does 'PLM' stand for in the context of Industry 4.0?

a. Product Lifecycle Management


b. Public Liability Marketing
c. Professional Learning Modules
d. Personal Leadership Mastery

Answer: (a)

Justification: Please refer to Slide 9 of Lecture 2 of Week 3

6. What does the Technique 'ABC' in PLM stand for?

a. Activity Based Costing


b. Advanced Business Computing
c. Analytical Business Concepts
d. Automated Banking Coordination

Answer: (a)

Justification: Please refer to Slide 21 of Lecture 2 of Week 3

7. In which fields are AR and VR used in Industry 4.0?

a. Cooking and nutrition


b. Fashion design only
c. Machining, production, and education
d. Network Security

Answer: (c)

Justification: Please refer to Slides 2 of Lecture 3 of Week 3

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
8. Which among the following is one type of categorization of AR?

a. Marker-attached AR
b. Markerless AR
c. Null AR
d. Marker-like AR

Answer: (b)

Justification: Please refer to Page 153 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

9. Who first coined the term "Augmented Reality"?

a. Thamos Caudell
b. Steve Jobs
c. Elon Musk
d. Mark Zuckerberg

Answer: (a)

Justification: Please refer to Slide 6 of Lecture 3 of Week 3

10. What type of AR uses visual markers for outcomes?

a. Marker-based Augmented Reality


b. Markerless Augmented Reality
c. Projection Based Augmented Reality
d. Superimposition Based Augmented Reality

Answer: (a)

Justification: Please refer to Slide 10 of Lecture 3 of Week 3

11. What type of knowledge is used in AI techniques?

a. Only historical data


b. Only factual information
c. Procedural, declarative, and heuristic knowledge
d. Limited to scientific formulas

Answer: (c)

AdaityaJustification:
Mondal,Please refer to Slide 6 of Lecture 4 of Week 3
[email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
12. What is the use of AI in IIoT?

a. No use in IIoT
b. Only for data storage
c. Machine safety, efficient product lifecycle, efficient manufacturing processes, and others
d. Limited to basic calculations

Answer: (c)

Justification: Please refer to Slide 11 of Lecture 4 of Week 3

13. Which of the following characterizes Big Data?

a. Limited to textual data only


b. Consists of structured and non-structured data
c. Only includes numerical data
d. Data that is always organized

Answer: (b)

Justification: Please refer to Slide 2 of Lecture 5 of Week 3

14. What does a distributed file system in Big Data ensure?

a. Inconsistency of data
b. Unreliable data storage
c. Consistency, accessibility, and fault tolerance of data
d. Limited data access

Answer: (c)

Justification: Please refer to Slide 18 of Lecture 5 of Week 3

15. Suppose you write a program which uses API to collect data continuously from LinkedIn
and Facebook. You then wish to analyze such data. What type of big data source you are
using?

a. Internal data source


b. External data source
c. Complimentary data source
d. All of the above

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (b)

Justification: Please refer to Page 163 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-4

Number of questions: 15 Total marks: 10 X 1= 15

1. What does Cybersecurity protect?

a. Only physical infrastructure


b. Only software
c. Hardware, software, and data
d. Only company policies

Answer: (c)

Justification: Please refer to Slides 3 of Lecture 1 of Week 4

2. What is the focus of Network Security?

a. Only securing physical buildings


b. Protecting network architecture from unauthorized access and improper use
c. Protecting only the company CEO's information
d. Solely focused on securing paper documents

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 1 of Week 4

3. What does the CIA Triad in Cybersecurity stand for?

a. Confidentiality, Integrity, Availability


b. Costing, Integrity, Assets
c. Company, Internet, Availability
d. Communication, Information, Assessment

Answer: (a)

Justification: Please refer to Slide 15 of Lecture 1 of Week 4

4. What are the key differences between IIoT and traditional Automation?

Adaitya Mondal, [email protected]


a. No significant differences 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
b. Ubiquitous sensing, advanced analytics, IT tools, and methodologies
c. Only in terms of cost
d. Limited to the type of machinery used

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 2 of Week 4

5. What are the benefits of deploying sensors and actuators in IIoT?

a. Limited to academic purposes


b. To sell more software
c. To control, enhance, and optimize various functions
d. To reduce operational efficiency

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 2 of Week 4

6. How does IIoT benefit the mining industry?

a. By relaxing safety standards


b. Increasing disaster risks
c. Early disaster warning
d. Ignoring carbon footprint metrics

Answer: (c)

Justification: Please refer to Slide 19 of Lecture 2 of Week 4

7. What is the Third Wave in GE's industrial level innovation?

a. The Industrial Intranet


b. The Digital Revolution
c. The Industrial Revolution
d. The Industrial Internet

Answer: (d)

Justification: Please refer to Slides 3 of Lecture 3 of Week 4

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
8. Scarcity of non-renewable sources of energy pose a significant challenge with respect to
energy consumption for the future smart industries and industrial internet?

a. True
b. False

Answer: (a)

Justification: Please refer to Page 83 of the book Introduction to Industrial Internet of Things and
Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

9. What was the negative effect of the Industrial Revolution?

a. Increased life expectancy


b. Environmental pollution
c. Rise in literacy
d. Technological advancement

Answer: (b)

Justification: Please refer to Slide 7 of Lecture 3 of Week 4

10. Which of the following is not one of the three key elements of the Industrial Internet?

a. Intelligent machines
b. Advanced analytics
c. People at work
d. Social Networking

Answer: (d)

Justification: Please refer to Slide 10 of Lecture 3 of Week 4

11. How is a smart sensor defined according to IEEE 1451 standard?

a. Sensor with large storage capacity


b. Sensor with standardized physical connection for communication
c. Sensor that operates independently
d. Sensor without the need for a power supply

Answer: (b)

Justification: Please refer to Slide 7 of Lecture 4 of Week 4


Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
12. What is the purpose of the MRAA library in Intel IoT devices?

a. High-level gaming interface


b. Large data analysis
c. Cloud storage management
d. Low-level communication in GNU/Linux platform

Answer: (d)

Justification: Please refer to Slide 14 of Lecture 4 of Week 4

13. What is a key aspect of the design philosophy for IIoT in industrial processes?

a. Facilitating communication between heterogeneous objects


b. Prioritizing manual control over automated systems
c. Limiting data interoperability
d. Reducing smart object autonomy

Answer: (a)

Justification: Please refer to Slide 6 of Lecture 5 of Week 4

14. What is a feature of the Autonomous Pull Economy in Industrial Process 4.0?

a. High waste generation


b. Manual data processing
c. Limited resource optimization
d. End-to-end automation facility

Answer: (d)

Justification: Please refer to Slide 14 of Lecture 5 of Week 4

15. Considering the future architecture of the smart Industrial plant, which among the following
layers is responsible for autonomous decision making , machine learning and decision support
system?

a. Connection Layer
b. Conversion Layer
c. Cyber Layer
d. Cognition Layer

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (d)

Justification: Please refer to Page 190 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-5

Number of questions: 15 Total marks: 15 X 1= 15

1. What is a key technology driver in Amazon's Smart Warehousing?

a. Warehouse Automation
b. Drone Delivery
c. Cryptocurrency Payments
d. 3D Printing

Answer: (a)

Justification: Please refer to Slides 5 of Lecture 1 of Week 5

2. Which of the following is not covered under the domain of Industry 4.0?

a. Intelligent manufacturing
b. Smart warehousing
c. Smart logistics
d. Rapid deforestation

Answer: (d)

Justification: Please refer to Slide 2 of Lecture 1 of Week 5

3. Which of the following IIoT platforms is used by Hitachi?

a. UnifyTwin
b. Lumada
c. Insights Hub
d. RootCloud

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 1 of Week 5

4. Which of the following is not a type of business model for IoT?

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. Subscription Model
b. Outcome-Based Model
c. Asset-Sharing Model
d. Loss-Sharing Model

Answer: (d)

Justification: Please refer to Slide 12 of Lecture 2 of Week 5

5. Which is an advantage of the Subscription Model in IoT?

a. Predictable recurring revenue


b. High initial costs
c. Limited customer interaction
d. Single revenue stream

Answer: (a)

Justification: Please refer to Slide 13 of Lecture 2 of Week 5

6. Which is a critical challenge of the IoT-as-a-Service model?

a. Limited product applicability


b. Over-dependence on manual processes
c. Security of data
d. Reduced licensing costs

Answer: (c)

Justification: Please refer to Slide 19 of Lecture 2 of Week 5

7. Which of the following is NOT offered by a Service-Oriented IIoT Business Model?

a. CapEx-focused investment strategies


b. Aggregation and analysis of data
c. On-demand services backed by cloud-based Business Models
d. Self-service interface

Answer: (a)

Justification: Please refer to Slide 13 of Lecture 3 of Week 5

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
8. Process Oriented Business Model is a _________ business model?

a. Static
b. Actuating
c. Hybrid
d. Defunct

Answer: (c)

Justification: Please refer to Page 111 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

9. What is IIRA?

a. A standard architecture for IIoT Systems


b. A scheme for corporate tax rebate
c. A package for installing IIoT Software
d. An internship program for IoT enthusiasts

Answer: (a)

Justification: Please refer to Slide 2 of Lecture 4 of Week 5

10. Which of the following statements is incorrect about IIRA?

a. Safety is not a concern in the IIRA infrastructure,


b. The IIRA infrastructure allows interoperability
c. The IIRA infrastructure is proposed by the IIC Technology Working Group
d. The IIRA infrastructure maps application technologies

Answer: (a)

Justification: Please refer to Slide 2 and 3 of Lecture 4 of Week 5

11. Which of the following is not a component of the three-tier architecture pattern of IIRA?

a. Edge layer
b. Fog layer
c. Platform layer
d. Enterprise layer

Answer: (b)

AdaityaJustification:
Mondal,Please refer to Slides 15 and 16 of Lecture 4 of Week 5
[email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
12. What are the IIRA Viewpoints?

a. Mining, Smelting, Forging and Casting


b. User, Demand, Production and Supply
c. Analysis, Management, Manipulation and Modification
d. Business, Usage, Functional and Implementation

Answer: (d)

Justification: Please refer to Slide 2 of Lecture 5 of Week 5

13. The elements of an activity in IIRA are __________.

a. Controls, Events, Feedback, and Termination


b. Cause and Effect
c. Trigger, Workflow, Effect, and Constraints
d. Planning, Projection, Execution, and Feedback

Answer: (c)

Justification: Please refer to Slide 13 of Lecture 5 of Week 5

14. In the Business Viewpoint of IIRA, what are fundamental capabilities?

a. High-level specifications essential for business tasks


b. Detailed technical standards
c. Financial goals
d. Marketing strategies

Answer: (a)

Justification: Please refer to Slide 8 of Lecture 5 of Week 5

15. With respect to the IIRA functional domain, industrial actuation falls under which of the
following domains?

a. Operations Domain
b. Business Domain
c. Control Domain
d. Application Domain

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (c)

Justification: Please refer to Slide 15 of Lecture 5 of Week 5

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-6

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following temperature sensors generates an analog voltage proportional to the
temperature?

a. DS1621
b. DHT11
c. DS18B20
d. LM 35

Answer: (d)

Justification: Please refer to Slides 15 of Lecture 1 of Week 6

2. What are the key components of an IoT Sensing Device?

a. Sensor, Processor, Wireless Communication Module, Power Management Unit


b. Battery, Processor, Universal Serial Bus, Visual Display Unit
c. Sensor, Compiler, Interpreter, Energy Harvester
d. None of the above

Answer: (a)

Justification: Please refer to Slide 14 of Lecture 1 of Week 6

3. What kind of sensor is ADXL335?

a. Accelerometer
b. Gyroscope
c. Magnetometer
d. Proximity sensor

Answer: (a)

Justification: Please refer to Slide 19 of Lecture 1 of Week 6

4. “MOS gas sensor depend on the thermal energy for its operation which is
supplied with a heater.” State True or False.
Adaitya Mondal, [email protected] 9609582670 Copyright
a. True
@Matrixbreach
b. False Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (a)

Justification: Please refer to Slide 4 of Lecture 2 of Week 6

5. Which of the following is not a probable application of Gas Sensors?

a. Air quality monitoring


b. Leakage Detection of Toxic gases
c. Alcohol Breath Test
d. Motion Tracking

Answer: (d)

Justification: Please refer to Slide 8 of Lecture 2 of Week 6

6. What is meant by the Sensitivity of a Gas Sensor?

a. Change in the output signal for a unit change in gas concentration


b. Ability to detect a particular gas in a mixture of different gases
c. Ability to provide consistent output over a long period of time
d. The time taken by the sensor to stabilize its response

Answer: (a)

Justification: Please refer to Slide 6 of Lecture 2 of Week 6

7. The ModBus-TCP protocol defines two units in the data frame. One of them is Protocol Data
Unit. What is the other one?

a. Analogous Data Unit


b. Advanced Data Unit
c. Application Data Unit
d. Architectural Data Unit

Answer: (c)

Justification: Please refer to Slide 6 of Lecture 3 of Week 6

8. With respect to sensors, a camera which can simultaneously sense the ambient temperature
as well as capture live video recordings is a type of __________ sensor.

Adaitya Mondal,
a. Scalar [email protected] 9609582670 Copyright
b. Multimedia
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
c. Hybrid
d. All of the above

Answer: (c)

Justification: Please refer to Page 105 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy by Cambridge University Press

9. EtherNet/IP defines two primary types of communications. What are those?

a. Explicit and Implicit


b. Internal and External
c. Inbound and Outbound
d. Telemetric and Geometric

Answer: (a)

Justification: Please refer to Slide 14 of Lecture 3 of Week 6

10. Which of the following statements is incorrect about Profinet?

a. Profinet is the standard for industrial Ethernet


b. Profinet is based upon Ethernet/IP
c. Profinet can not be used for process control or process measurement
d. Profinet uses NRT, RT and IRT communication channels

Answer: (c)

Justification: Please refer to Slide 17 and 18 of Lecture 3 of Week 6

11. Modbus-RTU is a serial protocol that follows the __________ architecture.

a. Producer/Consumer
b. Master/Slave
c. Scalar/Vector
d. None of the above

Answer: (b)

Justification: Please refer to Slides 15 and 16 of Lecture 3 of Week 6

12. Which of the following network topologies is used by Profibus?

a. Ring Topology
Adaitya Mondal, [email protected] 9609582670 Copyright
b. Bus Topology
c. Mesh Topology
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
d. Star Topology

Answer: (b)

Justification: Please refer to Slide 5 of Lecture 4 of Week 6

13. In the context of DeviceNet, CAN is the acronym for _____________.

a. Cognitive Adaptable Network


b. Campus Area Network
c. Controller Area Network
d. Captive Area Network

Answer: (c)

Justification: Please refer to Slide 14 of Lecture 4 of Week 6

14. How shorter TTL is achieved in uRLLC?

a. By using smaller slot length


b. By reducing Orthogonal Frequency Division Multiplexing symbols in TTL
c. Reducing symbol duration
d. All of the above

Answer: (d)

Justification: Please refer to Slide 23 of Lecture 5 of Week 6

15. What is the frequency spectrum of mmWave Communication?

a. 30 – 300 MHz
b. 550 – 1720 KHz
c. 88 – 108 MHz
d. 30 – 300 GHz

Answer: (d)

Justification: Please refer to Slide 26 of Lecture 5 of Week 6

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-7

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following stands for LP in LPWAN?

a. Large Power
b. Light Power
c. Low Power
d. Long Range

Answer: (c)

Justification: Please refer to Slide 3 of Lecture 1 of Week 7

2. “We need to pay a license fee to use LoRa in the 868 MHz radio frequency band in
Europe.” State True or False.

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 4 of Lecture 1 of Week 7

3. Which of the following is true about the SIGFOX network in terms of messages and payload?

a. Up to 50 messages per day with a payload of 8 bytes per message


b. Up to 75 messages per day with a payload of 10 bytes per message
c. Up to 140 messages per day with a payload of 12 bytes per message
d. Up to 200 messages per day with a payload of 15 bytes per message

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 1 of Week 7

4. Which library (header file) is used for interfacing the DHT22 sensor, as demonstrated in the
Adaitya Mondal, [email protected] 9609582670 Copyright
Hands On Industrial Environment Monitoring project?

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
a. DHT.h
b. DHT22.h
c. DHT11.h
d. Adafruit_DHT.h

Answer: (a)

Justification: Please refer to Slide 18 of Lecture 1 of Week 7

5. Which of the following topologies are supported by Zigbee?

a. Point-to-Point and Star


b. Bus and Ring
c. Tree, and Mesh
d. Ring and Mesh

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 2 of Week 7

6. The physical and MAC layers of the Zigbee communication protocol is based on
__________. Fill in the blanks.

a. IEEE 802.11
b. IEEE 802.15.4
c. IEEE 802.3
d. IEEE 802.16

Answer: (b)

Justification: Please refer to Slide 5 of Lecture 2 of Week 7

7. “Xbee is a mesh communication protocol based on the IEEE 802.15.4 whereas Zigbee is the
product that uses the Xbee communication protocol for radio communication.” State true or
false.

a. True
b. False
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (b)

Justification: Please refer to Slide 7 of Lecture 2 of Week 7

8. Which of the following functions is performed by the coordinator node in a Zigbee network?
a. Data relay
b. End device connector
c. Acts as the root of the network and bridge between different networks
d. Control plane

Answer: (c)

Justification: Please refer to Slide 6 of Lecture 2 of Week 7

9. Which of the following is/are the data characteristics of IIoT processing?

a. Polymorphism
b. Temporal relationships in data
c. Correlation in space, time, and other dimensions
d. All of the above

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 3 of Week 7

10. Which of the following is false about the rule-based engine?

a. Extract causal and temporal patterns using predefined rules


b. Handles multiple data streams and correlates them to provide meaningful output
c. Cannot process data in near real-time
d. Performs decision-making processes based on predefined rules

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 3 of Week 7

11. Which of the following represents the limitation of current CEP systems?

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. Manual threshold specification
b. Run-time update of threshold not possible
c. Not context-aware
d. All of the above

Answer: (d)

Justification: Please refer to Slide 13 of Lecture 3 of Week 7

12. Which of the following options is false about the services rendered by the Smart Water
Management System?

a. Entirely non-replicable services


b. Fully customizable services
c. Application-specific services
d. Entirely replicable services

Answer: (a)

Justification: Please refer to Slide 4 of Lecture 4 of Week 7

13. “iRobot-Factory is a cognitive manufacturing factory which applies cognitive intelligence and
edge computing for improved manufacturing.” State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 14 of Lecture 4 of Week 7

14. Which of the following is false about the design of the SmartSantander?

a. Heterogeneity
b. Reliability
c. Mobility
d. Unrealistic experimentation

Answer: (d)

Justification: Please refer to Slide 11 of Lecture 4 of Week 7


Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
15. Which of the following represents a type of Industrial Control System?

a. Programmable Logic Compiler


b. Decentralized Control Suite
c. Supervisory Control and Data Acquisition
d. Distributed Compiled System

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 5 of Week 7

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-8

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following does not characterize big data analytics?

a. Volume
b. Velocity
c. Vector
d. Variability

Answer: (c)

Justification: Please refer to Slide 7 of Lecture 1 of Week 8

2. Which of the following algorithms is useful when it is feasible to acquire training data for the
different states (or classes) that need to be modeled?

a. Unsupervised learning algorithm


b. Supervised learning algorithm
c. Reinforcement learning algorithm
d. None of the above

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 1 of Week 8

3. “Which of the following is false about the deep learning models?

a. Learns features automatically without manually specifying them


b. Does not use neural networks
c. Raw data from sensors can be directly fed into the model
d. Generally require a large amount of computation power

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 1 of Week 8

4. Which of the following software may be used for batch-oriented analytics?


Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. Apache Hadoop and Apache Spark
b. Eclipse
c. Sublime
d. None of the above

Answer: (a)

Justification: Please refer to Slide 13 of Lecture 1 of Week 8

5. Which of the following is an example of a classification algorithm?

a. Density-Based Spatial Clustering of Applications with Noise


b. Support Vector Machine
c. K-Means
d. Bayes Regression

Answer: (b)

Justification: Please refer to Slide 14 of Lecture 1 of Week 8

6. In ___________, data points may belong to more than one cluster. Fill in the blanks.

a. Hard Clustering
b. Soft Clustering
c. Hard Classification
d. Soft Classification

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 2 of Week 8

7. Which of the following supervised learning algorithms may be used when the output variable
is a real number instead of a categorical value?

a. Regression
b. Classification
c. Both (a) and (b)
d. Neither (a) nor (b)

Answer: (a)

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Justification: Please refer to Slide 10 of Lecture 2 of Week 8

8. Which of the following statements about the reinforcement learning algorithm is false?

a. There is no external supervisor to guide the agent


b. Builds a knowledge graph from the constant feedback of the corresponding actions
c. There is no reward function
d. There is a mapping between input and output

Answer: (c)

Justification: Please refer to Slide 15 of Lecture 2 of Week 8

9. “Machine learning is a subset of deep learning that can learn automatically by finding the
features of the object on its own.” State true or false.

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 3 of Week 8

10. Why is cloud computing necessary for IIoT?

a. High computational speed for data monitoring and analytics


b. Scalable and secure services
c. Effective data acquisition
d. All of the above

Answer: (d)

Justification: Please refer to Slide 5 of Lecture 4 of Week 8

11. Which of the following is not true about Platform-as-a-service for IIoT?

a. Allows industries to self-develop applications


b. Clients have control over the application and the configuration environment
c. The service provider manages everything
d. Software firms like Cumulocity, Bosch IoT, and Carriots offer PaaS for IoT industries

AdaityaAnswer:
Mondal,(c)
[email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Justification: Please refer to Slide 9 of Lecture 4 of Week 8

12. Who among the following does not provide Industrial Cloud Platform?

a. C3 IoT
b. Uptake
c. Netbeans
d. GE Predix

Answer: (c)

Justification: Please refer to Slide 16 of Lecture 4 of Week 8

13. Which of the following is/are the advantage(s) of using a Cloud simulator before real
deployment?

a. Pre-deployment test before real implementation


b. System testing at no cost
c. Repeatable evaluation of the system
d. All of the above

Answer: (d)

Justification: Please refer to Page 246 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy published by Cambridge University Press

14. Which of the following does not represent the objective of Industry 4.0?

a. Rigid solutions
b. Expanded security
c. Better performance
d. Higher production

Answer: (a)

Justification: Please refer to Slide 19 of Lecture 5 of Week 8

15. “K-medoid is a clustering algorithm that is used to maximize the distance between some
randomly selected points in a cluster.” State true or false.

a. True
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
b. False

Answer: (b)

Justification: Please refer to Page 260 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee published by CRC Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-9

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following is not a valid reason for employing fog computing in IIoT?

a. Consistent release of data from sensors and machines


b. Need for immediate action and quick response
c. Devaluing existing functionalities of IIoT
d. Data may be critical as well as time-sensitive

Answer: (c)

Justification: Please refer to Slide 2 of Lecture 1 of Week 9

2. Which of the following statements is false about the fog-enabled IIoT for Smart Grid and
Power
Industry?

a. Dynamic demand of appliances


b. Unidirectional communication between the consumer and supplier
c. Power supply is provided from micro-grids, local distribution companies
d. Advanced metering infrastructure for bi-directional communication

Answer: (b)

Justification: Please refer to Slide 10 of Lecture 1 of Week 9

3. Nebbiolo Technologies, who is one of the pioneers of Fog Computing, brought together IT
and OT for real-time services and rendered optimized solutions with smarter decision making
capability in lower cost. Which of the following products is not produced by Nebbiolo
Technologies?

a. fogOS
b. fogNode
c. fogSM
d. fogBCD

Answer: (d)

AdaityaJustification:
Mondal,Please refer to Slide 20 of Lecture 1 of Week 9
[email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
4. SONM is a Decentralized Fog Computing Platform that renders distributed cloud services
with fog as the backend. Which of the following facilities is not supported by SONM?

a. Blockchain infrastructure
b. Video streaming
c. Machine learning
d. Digital triplet

Answer: (d)

Justification: Please refer to Slide 22 of Lecture 1 of Week 9

5. “In R Programming, it is compulsory to specify the datatype at the time of variable


declaration.” State true or false.

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 6 of Lecture 2 of Week 9

6. Which of the following can be used to calculate ab in R programming?

a. a+b
b. a/b
c. a^b
d. a@b

Answer: (c)

Justification: Please refer to Slide 7 of Lecture 2 of Week 9

7. Which of the following operands is used to create series of numbers for a vector in R
programming?

a. <=
Adaitya Mondal, [email protected] 9609582670 Copyright
b. #

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
c. :
d. !

Answer: (c)

Justification: Please refer to Slide 11 of Lecture 2 of Week 9

8. Which of the following is/are supported by the Julia programming language?

a. Tuples
b. Dictionary
c. Arrays
d. All of the above

Answer: (d)

Justification: Please refer to Slide 21-23 of Lecture 2 of Week 9

9. Which of the following represents the essential characteristics of cloud computing according
to NIST?

a. On-demand self service


b. Resource pooling
c. Broad network access
d. All of the above

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 3 of Week 9

10. Why is it necessary to perform integration which is a part of data pre-processing in the
context of Data management?

a. Mitigating redundancy
b. Combining data from various sources
c. Cleaning incomplete data
d. Identifying inaccurate data

Answer: (b)

Justification: Please refer to Slide 10 of Lecture 3 of Week 9

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
11. “There are three main NoSQL databases. They are Key-value databases, column-oriented
databases, and document-oriented databases.” State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 11 of Lecture 3 of Week 9

12. “In Hadoop Master/Slave Architecture, the master serves read and write requests from the
file system’s clients whereas slave executes operations like opening, closing, and renaming
files and directories.” State true or false.

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 22 of Lecture 3 of Week 9

13. Which of the following is false about the BCube topology of the data center network.

a. Follow switch-oriented practice, rather than the server-centric approach


b. Provides multiple parallel short paths between any pair of server
c. Places intelligence on modular data center (MDC) servers
d. Forms multiple edge-disjoint server spanning tree

Answer: (a)

Justification: Please refer to Slide 11 of Lecture 4 of Week 9

14. Which of the following protocols is used by the SDN?

a. OpenByte
b. OpenFlow
c. WideFlow
d. ClosedByte

Answer: (b)

AdaityaJustification:
Mondal,Please [email protected]
refer to Slide 4 of Lecture 5 of Week 9 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
15. Which of the following is incorrect about Software-defined networks (SDN)?

a. SDN increases complexity of traditional networks by separating the control and data
planes
b. SDN and NFV are separate paradigms
c. SDN provides a centralized view of the whole network which improves controllability,
efficiency and network stability
d. SDN can provide seamless transition of data routes, self-organization, configuration
optimization and smart transmissions

Answer: (a)

Justification: Justification: Please refer to Page 316 of the book Introduction to IoT by S Misra, A
Mukherjee, A Roy by Cambridge University Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-10

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following is not a part of the SDIIoT Architecture?

a. WSN
b. Private network
c. Industrial cloud
d. Industrial bus and network

Answer: (b)

Justification: Please refer to Slide 2 of Lecture 1 of Week 10

2. Which of the following is not a part of the SDWSN platform in the context of Industry 4.0?

a. Applications
b. Data plane
c. Control plane
d. Terrestrial plane

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 1 of Week 10

3. Data processing is generally performed in __________ present in the SDIIoT


architecture?

a. LAN
b. Public network
c. Industrial cloud
d. None of the above

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 1 of Week 10

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
4. R stands for ___________ in STRIDE Threat Model of IoT security. Fill in the blanks.

a. Repudiation
b. Reliable
c. Replicable
d. Resonance

Answer: (a)

Justification: Please refer to Slide 10 of Lecture 2 of Week 10

5. Application layer of the IoT attack surface is vulnerable to which of the following IIoT Attack
Vectors?

a. Reversal attack
b. Man-in-the-middle attack
c. Jamming attack
d. None of the above

Answer: (a)

Justification: Please refer to Slide 12 of Lecture 2 of Week 10

6. What does trust permeation aim to establish within the IIoT system?

a. Unit hierarchies
b. Device integrity
c. Manufacturing logistics
d. Development life cycle

Answer: (b)

Justification: Please refer to Slide 16 of Lecture 2 of Week 10

7. Which of the following does not represent the building blocks of IIoT security framework?

a. Fog device protection


b. Cloud security
c. Data protection
d. Embezzlement protection
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Answer: (d)

Justification: Please refer to Slide 4 of Lecture 3 of Week 10

8. Which of the following standards is supported by the OT security of IIoT?

a. ISO/IEC 154083
b. ISO 27017, NIST SP 800-144, ENISA standard
c. NERC-CIP
d. ISO series of standards for privacy, framework and regulations

Answer: (c)

Justification: Please refer to Slide 21 of Lecture 3 of Week 10

9. Which of the following is not a key component of cloud security of IIoT framework?

a. Data privacy
b. Flow-rule protection
c. Access control
d. Identity management

Answer: (b)

Justification: Please refer to Slide 10 of Lecture 3 of Week 10

10. Which of the following is not a key feature of smart factory?

a. Connected
b. Optimized
c. Ambiguous
d. Agile

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 4 of Week 10

11. Which of the following is incorrect about Kuka – an IoT-Enabled Factory?

a. A German robotics maker


b. Built an IoT-enabled factory
Adaitya Mondal, [email protected] 9609582670 Copyright
c. Robots are connected with a private cloud

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
d. Deployed on the A330 and A350 final assembly lines in Toulouse

Answer: (d)

Justification: Please refer to Slide 7 of Lecture 4 of Week 10

12. ____________ is carried out by Amazon – Robotic Shelves. Fill in the blanks.

a. Automated product search


b. Manufacturing of drones
c. AR app based end-to-end factory floor view
d. None of the above

Answer: (a)

Justification: Please refer to Slide 11 of Lecture 4 of Week 10

13. Which of the following is incorrect about Maersk – Intelligent Shipping?

a. It is a container shipping company


b. Uses IoT for preserving refrigerated containers
c. Does not use blockchain technology for supply chain optimization
d. Tracks assets and fuel consumption using sensors

Answer: (c)

Justification: Please refer to Slide 18 of Lecture 4 of Week 8

14. Which of the following represents the applications of IoT in Livestock Barns?

a. Soil moisture sensors optimize irrigation and fertilization


b. Monitoring health parameters of animals
c. Drone-assisted mining monitoring
d. None of the above

Answer: (b)

Justification: Please refer to Slide 7 of Lecture 5 of Week 8

Adaitya15.In
Mondal,
the [email protected]
of Agricultural IoT, what do we mean by LAI? 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. Leaf Area Index
b. Layout Area Increment
c. Low Achor Installation
d. None of the above

Answer: (a)

Justification: Please refer to Page 276 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy by Cambridge University Press

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things

Assignment-11

Number of questions: 15 Total marks: 15 X 1= 15

1. Which of the following is/are a challenge faced by IoT in healthcare?

a. Devices have limited computational capability


b. Devices have limited memory
c. Devices use low-power battery hence have short battery life
d. All of the above

Answer: (d)

Justification: Please refer to Slide 20 of Lecture 1 of Week 11

2. What is the general action of healthcare body sensors in case some abnormalities are
detected?

a. Sensors do nothing
b. Sensors automatically turned off
c. Sensors trigger an alarm
d. None of the above

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 1 of Week 11

3. Confidentiality, Integrity, ______________ and Availability are the four security cornerstones
of IIoT based Healthcare monitoring and management.

a. Accelerometer
b. Authentication
c. Automation
d. Auxiliary

Answer: (b)

Justification: Please refer to Slide 19 of Lecture 1 of Week 11

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
4. Optimization and Autonomy are the features of which among the following IIoT models in the
Power sector?.

a. SLA Model
b. Peripheral Model
c. Maturity Model
d. Component Model

Answer: (c)

Justification: Please refer to Slide 6 of Lecture 2 of Week 11

5. In Smart grids supported by IIoT, data communication network is not integrated with the
physical power transmission network?

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 2 of Week 11.

6. Consider the following two statements with respect to Passive RFID tags and Active RFID
tags.

1. Passive RFID tags have no internal power source whereas active RFID
has a battery power source
2. Passive RFID tags have longer range than Active RFID tags

a. Both Statements 1 and 2 are correct


b. Statement 1 is correct but 2 is not
c. Statement 1 is incorrect while 2 is correct
d. Both Statements 1 and 2 are incorrect

Answer: (b)

Justification: Please refer to Slides 10 and 11 of Lecture 3 of Week 11

7. IIoT can be deployed in inventory management to automate which of the following activities?

a. Only Stock-In Activities


b. Only Stock-Out Activities
Adaitya Mondal, [email protected] 9609582670 Copyright
c. Both Stock-In and Stock-Out Activities

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
d. Neither Stock-In nor Stock-Out Activities

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 3 of Week 11

8. In the context of Network Security, what does behavioral analytics deal with?

a. Detects abnormal behavior by the network


b. Establishes a connection between the sender and receiver
c. Generates new routes across the network
d. None of the above

Answer: (a)

Justification: Please refer to Slide 13 of Lecture 4 of Week 11

9. IP rights are a risk when using AR/VR?

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 21 of Lecture 4 of Week 11

10. Which of the following is NOT a stakeholder in Facility Management?

a. Buildings
b. Finance
c. People
d. Patents

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 5 of Week 11

11. Which of the following challenges arise due to ageing of inventory?

a. Increase in network traffic


b. Need for proactive, preventive and maintenance procedures
c. Recurring taxation levied by the Government
Adaitya Mondal, [email protected] 9609582670 Copyright
d. All of the above

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
Answer: (b)
Justification: Please refer to Slides 12 of Lecture 5 of Week 11

12. In IIoT enabled facility management, logically where do subcontractors are located?

a. In between Owners and Customers


b. As a part of the owners
c. As a part of the customers
d. As a master authority of the owners

Answer: (a)

Justification: Please refer to Slide 5 of Lecture 5 of Week 11

13. Optimized usage of which of the following resources is preferable?

a. Manpower
b. Assets
c. Technology
d. All of the above

Answer: (d)

Justification: Please refer to Slide 11 of Lecture 5 of Week 11

14. Transponders and Beacons are types of what kind of RFID tags?

a. Active RFID tags


b. Passive RFID tags
c. Semi-passive tags
d. All of the above

Answer: (a)

Justification: Please refer to Page 297 of the book Introduction to Industrial Internet of Things
and Industry 4.0 by S Misra, C Roy, A Mukherjee by CRC Press

15. Real time and easy diagnosis are ______ of Healthcare IoT?

a. Advantages
b. Risks
c. Disadvantages
Adaitya Mondal, [email protected] 9609582670 Copyright
d. None of the above

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
Answer: (a)

Justification: Please refer to Page 298 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy by Cambridge University Press.

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Introduction To Industry 4.0 And Industrial Internet Of Things
Assignment-12
Number of questions: 15 Total marks: 15 X 1= 15

1. What are the advantages of implementing IoT in the chemical industry?

a. Increase Energy Expenses


b. Maximize Supply Chain Risk
c. Improve Logistics
d. Deteriorate Quality and equipment management

Answer: (c)

Justification: Please refer to Slide 11 of Lecture 1 of Week 12

2. Which of the following is one of the primary goals of predictive maintenance?

a. Maximizing equipment breakdowns


b. Addressing historical issues only
c. Reducing equipment breakdown
d. Ignoring real-time problems

Answer: (c)

Justification: Please refer to Slide 12 of Lecture 1 of Week 12

3. What is/are the benefits of using IoT sensors in the Pharmaceutical Industry?

a. Access huge data of different manufacturing departments


b. Real time monitoring
c. Reduce production cost and wastage
d. All of the above

Answer: (d)

Justification: Please refer to Slide 18 of Lecture 1 of Week 12

4. “By applying IoT in the pharmaceutical industry, it is possible to detect Adverse Drugs
Reaction (ADR), effects of pharmaceutical excipients, and allergies.” State true or false.
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
a. True
b. False

Answer: (a)

Justification: Please refer to Slide 19 of Lecture 1 of Week 12

5. UAVs are capable of performing which of the following operations?

a. Aerial imagery
b. Visual imagery
c. Thermal imagery
d. All of the above

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 2 of Week 12

6. Which of the following is true about the first generation of the UAV technology?

a. Fundamental Remote-Control UAVs of different forms


b. Enhanced intelligent piloting models and full autonomy, full airspace awareness, auto
action
c. Transformable designs with 360° gimbals, high quality video or higher-value
instrumentation, improved piloting modes
d. Improved safety and regulatory, platform and payload adaptability, automated safety
modes, intelligent piloting models and full autonomy, airspace awareness

Answer: (a)

Justification: Please refer to Slide 4 of Lecture 2 of Week 12

7. How is the application of UAVs in the construction site beneficial?

a. It does not show clients work progress when they are far away from job sites
b. Require more time, energy and money
c. Monitor shoreline erosion
d. All of the above

Answer: (c)
Adaitya Mondal, [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Justification: Please refer to Slide 9 of Lecture 2 of Week 12

8. What are the advantages of using UAVs in telecommunication?

a. Monitor towers from any angle and height


b. Broadcasting only historical events
c. Decrease work safety
d. Covers local areas with high cost

Answer: (a)

Justification: Please refer to Slide 13,14 of Lecture 2 of Week 12

9. “By using UAVs it is possible to scan a huge number of items in a warehouse, check the
missing items and monitoring full inventory in a day.” State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 17 of Lecture 2 of Week 12

10. Which of the following can be performed by using UAVs in the forestry?

a. Manage forest plantations and evenly distribute seedlings sprinkling fertilizer


b. Measure the carbon storage in biomass by remote sensing
c. Resist deforestation and increase security
d. All of the above

Answer: (d)

Justification: Please refer to Slide 19 of Lecture 2 of Week 12

11. Which of the following activities can be performed by using UAVs in the mining?

a. Regular surface survey for optimized blast design


b. Manage stockpiles
c. Site exploration
d. All of the above

AdaityaAnswer:
Mondal,(d) [email protected] 9609582670 Copyright
@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,
Justification: Please refer to Slide 11 of Lecture 2 of Week 12

12. “Case study enables a researcher to closely examine the data within a specific context by
following certain procedures and providing quantitative and qualitative analysis of the data.”
State true or false.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 2 of Lecture 3 of Week 12

13. What is the primary purpose of case studies?

a. Create fictional scenarios for analysis


b. Explore and investigate real-life phenomena
c. Focus on large geographical areas
d. Involve a vast number of individuals in the study

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 3 of Week 12

14. What does IoD stand for in the context of IoT and IIoT?

a. Internet of Devics
b. Internet of Drones
c. Intensity of Data
d. Intention of Damage

Answer: (b)

Justification: Please refer to Page 308 of the book Introduction to IoT by S Misra, A Mukherjee,
A Roy by Cambridge University Press

15. Which of the following is false about the application of UAVs in agriculture?

a. Increase effective yields


b. Crop health monitoring
c. Hinder farmers in scouting their crops
Adaitya Mondal, [email protected] 9609582670 Copyright
d. Optimize use of seed, fertilizer, water

@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,


[email protected] 9609582670 Adaitya Mondal,
Answer: (c)

Justification: Please refer to Slide 6 of Lecture 2 of Week 12

Adaitya Mondal, [email protected] 9609582670 Copyright


@Matrixbreach Innovations OPC Pvt Ltd Adaitya Mondal,
[email protected] 9609582670 Adaitya Mondal,

You might also like