0% found this document useful (0 votes)
273 views13 pages

Class:-BE Sub:-Wsns: MCQ Question Bank

This document contains 30 multiple choice questions about wireless sensor networks. The questions cover topics such as components of a sensor network, sensor network topologies, challenges in sensor network design, energy consumption ratios for communication vs computation, physical environment monitoring using sensor networks, throughput scaling with increasing number of sensor nodes, and protocols used at various layers of sensor networks including 6LoWPAN, IEEE 802.15.4, CoAP, and TCP/IP. Each question is followed by a short answer and explanation of the answer.

Uploaded by

Shasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
273 views13 pages

Class:-BE Sub:-Wsns: MCQ Question Bank

This document contains 30 multiple choice questions about wireless sensor networks. The questions cover topics such as components of a sensor network, sensor network topologies, challenges in sensor network design, energy consumption ratios for communication vs computation, physical environment monitoring using sensor networks, throughput scaling with increasing number of sensor nodes, and protocols used at various layers of sensor networks including 6LoWPAN, IEEE 802.15.4, CoAP, and TCP/IP. Each question is followed by a short answer and explanation of the answer.

Uploaded by

Shasha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

MCQ Question Bank

Class:-BE SUB :- WSNs

Q.1. Which of the following are components of a sensor network?

a) Mesh network

b) Microcontroller

c) GPU

d) All of the above

Which of the following are components of a sensor node?

a) Sensor nodes

b) Sensors

c) Gateway

d) All of the Above

Q.2 Which sensor network topology has no single point of failure?

a) Point-to-point

b) Mesh

c) Star

d) All of the above

Q.3 The challenges we face in designing sensor network systems and applications include

a: limited hardware

b: limited support for networking

c: limited support for software development

Ans: (a/b/c/all)

Q.4 routes user queries or commands to appropriate nodes in a sensor


network(bridge/gateway)
Ans: gateway
Q.5 A sensor network is subject to a unique set of resource constraints such as a: finite on-
board battery power

b: limited network communication bandwidth

Ans: both

Q.6 For the Sensoria sensors and Berkeley motes, the ratio of energy consumption for
communicationand computation is in the range of to

Ans: 1000 to 100000

Q.7 A sensor network is designed to collect information from a


environment(logical/physical)

Ans: Physical

Q.8 Information collected by and transmitted on a sensor network describes conditions of


physicalenvironments and requires advanced query interfaces and search engines to
effectively supportuser-level functions (true/false)

Ans: True

Q.9 In a typical sensor network, each sensor node operates unethered and has a microprocessor
anda small amount of memory for signal processing and task scheduling
(true/false)

Ans: True

Q.10 Each node is equipped with one or more sensing devices such as acoustic microphone
arrays,video or still cameras, infrared, seismic or magnetic sensors (true/false)

Ans: True

Q.11
If every sensor has some data that it needs to send to another node in a network, then per
nodethroughput scales as {sqrt(N) or 1/sqrt (N)}

Ans: 1/sqrt (N)}

Q.12 As the number of nodes , every node spends almost all of its time
forwardingpackets of other nodes (decreases/increases)

Ans: increases

Q.13 Wireless transmission of signals can be done via _


a) radio waves
b) microwaves
c) infrared
d) all of the mentioned

Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves.
These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless
transmission. Radio waves can penetrate through walls and are used in radio communications,
microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite
communications and device communications respectively.

Q.14 Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC

Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred,
whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier
Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing
Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel
access.

Q.15 Physical or logical arrangement of network is


a) Topology
b) Routing
c) Networking
d) Control

Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in
the network is connected. There are many topologies in networking like bus, tree, ring, star,
mesh, and hybrid topology. There is no particular best topology and a suitable topology can be
chosen based on the kind of application of the network .

Q.16 topology requires a multipoint connection.


a) Star
b) Mesh
c) Ring
d) Bus

Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data passes
through all other nodes in the network through the cable. It is really simple to install but it’s
not secure enough to be used in most of the computer network applications.

Q.17 Which network topology requires a central controller or hub?


a) Star
b) Mesh
c) Ring
d) Bus

Answer: a
Explanation: In star topology, no computer is connected to another computer directly but all
the computers are connected to a central hub. Every message sent from a source computer
goes through the hub and the hub then forwards the message only to the intended destination
computer.

Q.18 In TDM, slots are further divided into


a) Seconds
b) Frames
c) Packets
d) Bits

Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for
combining several low rate channels to a single high rate channel. For a certain time slot, the
several channels could use the maximum bandwidth. Each channel is inactive for a period of
time too. Some other multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.

Q.19 is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM

Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is
used when the bandwidth of the channel is greater than the combined bandwidth of all the
signals which are to be transmitted. The channel is active at all times unless a collision occurs
with another channel trying to use the same frequency. Some other multiplexing techniques
are Time division multiplexing and Phase division multiplexing.

Q20 is a high performance fiber optic token ring LAN running at 100 Mbps over
distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR

Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber
optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000
stations connected.

Q.21 Frequency division duplexing provides distinct bands of frequencies for


user.
a) Two, two
b) One, two
c) Two, one
d) Two, many

Answer: c
Explanation: Frequency division duplexing (FDD) provides two distinct bands of frequencies
for every user. In FDD, any duplex channel actually consists of two simplex channels.

Q.22 The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False

Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the mobile.
The reverse band provides traffic from the mobile to the base station.

Q.23 enables seamless integration of LoWPAN devices with internet leveraging.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN

Q.24 enables seamless integration of LoWPAN devices with internet leveraging.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN

Answer: a
Explanation: IETF 6LoWPAN enables seamless integration of LoWPAN devices with internet
leveraging IPv6 large address space and appln. Layer protocol reuse.
Q.25 Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP

Answer: a
Explanation: The internet of Thing is the global system of interconnected computer networks
that use the Internet Protocol suite (TCP/IP) to link billions of devices worldwide.

Q.26 enables open application layer for constrained nodes.


a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN

Answer: d
Explanation: IEEE 802.15.4.LoWPAN – specification defining the PHY and MAC layer of
low power devices supporting 250 Kb/s data rate, small packet size 127 bytes.

Q.27 specification defining the PHY and MAC layer of low power devices.
a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN

Answer: d
Explanation: IEEE 802.15.4.LoWPAN – specification defining the PHY and MAC layer of
low power devices supporting 250 Kb/s data rate, small packet size 127 bytes.

Q.28 6LoWPAN Adaption layer contains?


a) Header compression
b) Fragmentation
c) Layer 2 forwarding
d) Header compression, Fragmentation, and Layer 2 forwarding

Answer: d
Explanation: 6LoWPAN Adaption Layer:
Header compression
Fragmentation
Layer 2 forwarding.

Q.29 WSN stands for


a) Wired Sensor Network
b) Wireless Sensor Network
c) Wired Service Network
d) Wireless Service Network

Answer: b
Explanation: WSN – Wireless Sensor Network comprises of motes running a WSN
application and a light weight CoAP server.

Q.30 A device which is used to boost the signal between two cable segments or wireless access
points is
a) Booster
b) Repeater
c) Switch
d) Router

Q.31 A device that helps prevent congestion and data collisions –


a) Switch
b) Hub
c) Gateway
d) Proxy Server

Answer: a
Explanation: A switch is a device that splits large networks into smaller segments, decreasing
the number of users sharing the same network resources and bandwidth.

Q.32 is the anticipation of unauthorized access or break to computers or


data by means of wireless networks.
a) Wireless access
b) Wireless security
c) Wired Security
d) Wired device apps

Answer: b
Explanation: Wireless security is the anticipation of unauthorized access or breaks to
computers or data by means of wireless networks. The most widespread types of wireless
securities are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and
recently released WPA3.

Q.33 The type of traffic carried by a network determines the routing service.
a) True
b) False

Answer: a
Explanation: The type of traffic carried by a network determines the routing services. It also
determines protocols, and call handling techniques which must be employed.

Q.34 Wireless data networks are not well supported by _


a) Datagram services
b) Circuit switching
c) Connectionless services
d) Routing service

Answer: b
Explanation: Wireless data networks are not supported by circuit switching. It is due to their
short, bursty transmissions which are often followed by periods of inactivity. Circuit switching
is best suited for dedicated voice only traffic.

Q.35 Wireless Sensor Networks are networks consisting of equipped with sensors which are

distributed in an ad hoc manner


(a) tiny motes, (b) node, (c) processor, (d) all of the above.

Q.36 Wireless Sensor Networks is a collection of


(a) embedded sensor devices with networking capabilities, (b) small devices, (c)
processor, (d) all of the above
Q.37 In short WSN is a combination of

(a) Sensor Techniques, (b)Embedded Techniques, (c)Distributed Information Processing &

Communication Mechanism, (d) all of the above.

Q.38 The node consists of


(a) sensing, (b)processing, (c)communication and power subsystems (d) all of the
above.

Q.39 The wireless sensor network has mostly limitation


(a) Deployment is difficult-to-access location. (b) Limited memory, (c) Limited battery
(d) all of the above.
Q.40 What is the main constraint in wireless sensor network
(a) Energy constraint (b) Unreliable communication, (c) ad hoc deployment of nodes (d)
all of the above.
Q.41 Most popular operating system for WSN developed by UC Berkeley
(a) TinyOS (b) Contiki, (c) eRTOS (d) all of the above.
Q.42 It is a common metric for all networks. The end-to-end throughput measures the number of
packets per second received at the destination.
(a) Network throughput, (b) Scalability, (c) accuracy, (d) all of the above.
Q.43 As these are the ‘terrestrial’ sensor networks therefore they are above ground and solar cells
can
be used to power up these networks. The energy can be conserved by
(a) minimizing delays and by using operations of low duty cycles etc. (b) minimizing rise
and fall time, (c) reducing processing time, (d) all of the above.

Q.44 Low cost sensor nodes equipped with


(a) Microphones & cameras, (b) low cost sensor, (c) processor (d) None of the above.
Q.45 The advantages of MWSN over the static wireless sensor networks include
(a)Better and improved coverage, (b) Better energy efficiency, (c)Superior channel
capacity, and so On, (d) None of the above.
Q.46 A sensor network is composed of a large number of sensor nodes, which are densely deployed
either inside the phenomenon or very close to it.
(a)Random deployment , (b) Cooperative capabilities, (c) planned deployment, (d) none
of the above.
Q.47 Sensor nodes are
(a) limited in power, (b) computational capacities (c) memory.,(d) all of the above.

Q.48 Sensor nodes mainly used for


(a) broadcast, most ad hoc networks are based on p2p. (b) unicast, (c) none of the above.

Q.49 The Industrial, Scientific and Medical radio bands are the industrial equivalent of the "Citizens
Band".
(a) No license is required, (b) license is required, (c) permission from Govt. as well as
service provider is required, (d) none of the above.
Q.50 Properties of wireless communication
(a) Attenuation (b) Reflection/refraction (c) Diffraction/Scattering & Doppler effect (d)
all of the Above.
Q.51 Path loss in communication is due to
(a) Interference, (b) noise, (c) EMI, (d) all of the above
Q.52 Wireless communication involves transfer of information without any physical connection
between
two or more points. Because of this absence of any 'physical infrastructure', wireless
communication has certain advantages. Wireless communication has several advantages:
(a) Cost effectiveness, (b)flexibility, (c) convenience, (d) all of the above.
Q.53 MAC protocols is used for
(a) avoiding packet collision, (b)avoid resending packet, (c)increase through put, (d) all of
the above.
Q.54 In centralised TDMA, the schedule is calculated _ and provided to the sensor nodes
at
startup.
(a) Offline, (b) online, (c) manually (d) none of the above.
Q.55 In Persistant CSMA, If the channel is busy, the sender continues sensing the channel until it
becomes
(a) idle again and sends them immediately, (b) non idle again and sends them immediately,
(c ) free, (d) none of the above.
Q.56 Sensor MAC (S-MAC) has been developed especially for
(a) sleep-enabled sensor networks, (b) enabled sensor networks, (c ) large sensor network
(d) none of the above.
Q.57 Berkeley MAC (B-MAC) was developed to tackle the problems of
(a) S-MAC, (b) TDMA, (c ) CDMA, (d) none of the above.
Q.58 Drawbacks of wrong topology
(a ) Reduce network capacity, (b) Increase interference, (c ) Increase end-to-end packet
delay, (d) all of the above

Q.59 is the proposed standard for low rate wireless personal area networks (LR-
WPAN’s) with focus on enabling WSNs (Gutierrez et al. 2001.
(a) IEEE 802.15.4, (b) IEEE 802.4.15, (c ) IEEE 802.15.1, (d) none of the above.

Q.60 IEEE 802.15.4 focuses on

(a) low cost of deployment, (b) low complexity, (c ) low power consumption; (d) all of the
above.

Q.61 ZigBee has been introduced by IEEE with IEEE 802.15.4 standard, it is designed for
(a) simple, (b) low cost, (c) low power wireless communication technology used in
embedded applications, (d) all of the above.
Q.62 The WirelessHART standard provides a wireless network communication protocol for
(a) process measurement and control applications, (b) length measurement and control
applications, (c) measurement and control applications, (d) none of the above.
Q.63 ISA 100.11a is the first standard of ISA100 family with foundations for
(a) process automation, (b)provisions for secure, (c ) reliable, low data rate wireless
monitoring (d) all of the above.

Q.64 6LoWPAN standard provides an


(a) adaptation layer, (b) new packet format, (c ) address management, (d) all of the above.

Q.65 Localization accuracy is the distance between the estimated and the real
position of the sensor node.
(a) largest, (b) smallest, (c) medium , (d) None of the above.
Q.66 Infrastructural costs refer to the special installation of some infrastructure to localize the
nodes, such as
(a) GPS anchors, (b) mobile nodes, (c) Simple node, (d) None of the above.
Q.67 In trilateration, you measure the distances to the to compute your own position.
(a) anchor nodes, (b) nodes only, (c) Sensor node, (d) None of the above
Q.68 Range-free localization is a
(a) combination of proximity-based and ranging techniques, (b) combination of number
of sensor, (c) combination of anchors, (d) None of the above.
Q.69 Released in 2006 by Nokia, it is a wireless communication technology designed for low
power consumption, short-range communication, and low cost devices,
(a) it is called Baby-Bluetooth, and renamed Bluetooth Low Energy (BLE) technology,
(b) Zigbee, (c) GSM, (d) None of the above.
Q.70 Wibree allows the communication between
(a) small battery-powered devices and Bluetooth devices, (b) zigbee and Bluetooth
devices, (c) Communicating nodes, (d) None of the above.
Q.71 Bluetooth–Wibree utilizes the existing Bluetooth RF and enables
(a) ultra-low power consumption, (b) ultra-high power consumption, (c) ultra-medium
power consumption, (d) None of the above.

Q.72 Transmission range of wibree is


(a) 10 m, (b) 20 m, (c) 25 m, (d) None of the above.

Q.73 Z-Wave, a proprietary technology developed by Zensys A/S of Denmark, is focusing


(a) exclusively on the residential market, (b) on industrial use, (c) on domestic and
commercial use, (d) none of the above.

Q.74 Z-Wave uses a two-way RF system that operates in the (868 MHz in Europe
and 908 MHz in the United States).
(a) 908 MHz ISM bands, (b) 1 MHz ISM bands, (c) 908 MHz commercial bands, (d)
none of the above.
Q.75 ANT is a proprietary technology featuring a wireless communication protocol stack
thought for
(a) ultra-low power networking application (ANT 2013). (b) ultra-high power
networking application (ANT 2013). (c) low energy applications, (d) none of the above.
Q.76 INSTEON is a solution developed for by SmartLabs and promoted by the
INSTEON Alliance (INSTEON 2013).
(a) home automation, (b) industry automation, (c) space automation, (b) All of the above
Q.77 Wavenis is a wireless protocol stack developed by Coronis Systems for control and
monitoring applications in several environments, including
(a) home and building automation, (b) infrastructure automation, (c) space automation,
(d) All of the above.

Q.78 The main idea of clustering is to organize the network into smaller , so that data
can be collected and analyzed in a location-restricted way.
(a) sub-networks, (b) node contains network, (c) campus network, (b) none of the above.
Q.79 The main objective of clustering is to
(a) save energy and to avoid data congestion in the network, (b) save memory, (c) save
transmission time, (b) none of the above.
Q.80 The sink, sometimes called the global sink, is a single node in the network, which gathers
all information from
(a) all nodes in the network, (b) cluster member, (c) both node and cluster member, (d)
none of the above.
Q.81 In geographical clustering, the network is cut into clusters according to
(a) geographic coordinates, (b) requirement of network, (c) increase through put of
network, (d) none of the above.
Q.82 Compressive sensing is signal processing concept, which samples a signal
instead of continuously.
(a) randomly, (b) specific, (c) continuous (d) none of the above.
Q.83 In misdirection attack, the adversary creates
(a) wrong routes, (false route, (c) correct routes, (d) none of the above.
Q.84 Another kind of attack desynchronization, which can be applied to resting
on sequence numbers.
(a) transport protocols, (b) network protocols, (c) TCP protocol, (d) none of the above.
Q.85 There are two prominent examples for failing deployments: the so-called
(a) Potatoes application, (b)Duck Island application, (c) all of the above.
In the Netherlands to monitor temperature and humidity, and to take centralized
irrigation decisions based on the acquired data for precision agriculture for the Potato
field. This application officially called
(a) LOFAR-agro, (b) Solar-Agro, (c) auto-agro, (d) none of the above.
Q.86 Battery issues cause not only problems at the node level but also
(a) for communication and sensing as hardware performance. (b) communication issues,
(c) sensing issues, (d) none of the above.
Q.87 is one of the most common problems. Suddenly, a node stops working completely.
(a) Node death, (b) Sink, (c) Global Sink, (d) none of the above.
Q.88 However, the far most important task is to ensure that communication is
(a)self-sustainable, (b) self-adapting (c) robust, (d) all of the above.
Q.89 Global Problems in networking are classified into:
(a) Topology, (b) Lifetime, (c) Semantic problems, (d) all of the above.
Q.90 are hard to predict or test because they manifest themselves too late in the
process.
(a) Lifetime problem, (b) Global problem, (c) all of the above.
Q.91 Semantic problems occur most often when the data and its meaning does not match
expectations.This can be caused by
(a) Missing or bad calibration of the sensing hardware
(b) Deteriorating batteries causing wrong sensor readings;
(c) Wrong interpretation of the data itself
(d) all of the above.
Q.92 are a good option, as sun is abundant on the vineyard, even in winter
periods.
(a) Solar batteries, (b) Lead acid batteries, (c) SMF Batteries, (d) none of the above.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy