Week 11
Week 11
Correct Answer: b
Justification: Refer to slide 8, lecture 1, week 11
______________________________________________________________________________
2. Which IoT-enabled device is used for continuous glucose level monitoring?
a. QardioCore
b. Dexcom Glucose Sensor
c. iHealth BP5
d. Kinsa Smart Thermometer
Correct Answer: b
Justification: Refer to slide 10, lecture 1, week 11
______________________________________________________________________________
3. Which IIoT device monitors body temperature using wearable sensors?
a. Kinsa Smart Thermometer
b. Dexcom Glucose Sensor
c. iHealth BP5
d. ADAMM Intelligent Asthma Monitor
Correct Answer: a
Justification: Refer to slide 12, lecture 1, week 11
______________________________________________________________________________
4. Which of the following ensures that medical data is not accessible by unauthorized users?
a. Integrity
b. Authentication
c. Confidentiality
d. Availability
Correct Answer: c
Justification: Refer to slide 19, lecture 1, week 11
______________________________________________________________________________
5. What is a major benefit of smart metering in IIoT?
a. Reduces operational costs by enabling remote management
b. Increases the chance of energy loss
c. Eliminates the need for grid optimization
d. Limits data collection from power systems
Correct Answer: a
Justification: Refer to slide 11, lecture 2, week 11
______________________________________________________________________________
6. What is a key advantage of Advanced Metering Infrastructure (AMI)?
a. Prevents broadband and radio frequency communications
b. Enables smart meters to collect and transmit energy consumption data
c. Eliminates the need for automated power distribution
d. Reduces the effectiveness of metering data management
Correct Answer: b
Justification: Refer to slide 13, lecture 2, week 11
______________________________________________________________________________
7. How does IIoT benefit the wind energy sector?
a. Predicts turbine issues before large-scale damage occurs
b. Prevents automation in remote power plants
c. Increases the difficulty of maintaining remote turbines
d. Disables predictive maintenance in wind farms
Correct Answer: a
Justification: Refer to slide 16, lecture 2, week 11
_____________________________________________________________________________
8. Which of the following is NOT a key function of Inventory Management?
a. Decouple components of the production-distribution system
b. Hedge against price increases or take advantage of quantity discounts
c. Eliminating stock monitoring
d. Smoothen the flow of operations
Correct Answer: c
Justification: Refer to slide 5, lecture 3, week 11
____________________________________________________________________________
9. What type of RFID tag has an onboard battery but no active transmitter?
a. Active RFID Tag
b. Passive RFID Tag
c. Semi-Passive RFID Tag
d. Dynamic RFID Tag
Correct Answer: c
Justification: Refer to slide 12, lecture 3, week 11
_____________________________________________________________________________
10. Which of the following is NOT true about RFID tags?
a. RFID tags can store additional information like temperature and damage status.
b. RFID tags require a line-of-sight for data reading.
c. RFID tags are used for product identification and visibility.
d. RFID tags have better security compared to barcodes.
Correct Answer: b
Justification: Refer to slides 9- 15, lecture 3, week 11
______________________________________________________________________________
11. Which network security measure is used to detect and prevent malware?
a. Access control
b. Antivirus and antimalware software
c. Virtual Private Network
d. Data encryption
Correct Answer: b
Justification: Refer to slide 12, lecture 4, week 11
______________________________________________________________________________
12. Which of the following is not a key feature of AR?
a. AR creates the perception of a mixed reality spectrum.
b. AR produces an enhanced view of the real world using multiple sensory modalities –
auditory, haptic, somatosensory, olfactory, and visual.
c. AR completely replaces the real-world environment with a fully virtual space.
d. AR utilizes the existing physical environment and overlays additional useful information
on top of it.
Correct Answer: c
Justification: Refer to Chapter 7, Section 7.2, p. 152 of the book Introduction to Industrial
Internet of Things and Industry 4.0 by S Misra, C. Roy, and A Mukherjee
______________________________________________________________________________
13. How does IoT enhance security in facility management?
a. By monitoring alarms, smoke detectors, and life safety systems remotely
b. By disconnecting emergency response systems
c. By preventing real-time access to security alerts
d. By limiting surveillance capabilities in buildings
Correct Answer: a
Justification: Refer to slide 14, lecture 5, week 11
______________________________________________________________________________
14. Which of the following is NOT a type of network security?
a. Intrusion prevention systems
b. Firewalls
c. Mobile device security
d. Manual error tracking
Correct Answer: d
Justification: Refer to slides 12-14, lecture 4, week 11
______________________________________________________________________________
15. Which of the following is NOT a component of an RFID system?
a. RFID reader
b. Antenna
c. Integrated Circuit Card (ICC)
d. RFID tag or smart label
Correct Answer: c
Justification: Refer to Chapter 7, Section 7.7, p. 141 of the book Introduction to IoT by S
Misra, A Mukherjee, and A Roy
______________________________________________________________________________