Class:-BE Sub:-Wsns: MCQ Question Bank
Class:-BE Sub:-Wsns: MCQ Question Bank
a) Mesh network
b) Microcontroller
c) GPU
a) Sensor nodes
b) Sensors
c) Gateway
a) Point-to-point
b) Mesh
c) Star
Q.3 The challenges we face in designing sensor network systems and applications include
a: limited hardware
Ans: (a/b/c/all)
Ans: both
Q.6 For the Sensoria sensors and Berkeley motes, the ratio of energy consumption for
communicationand computation is in the range of to
Ans: Physical
Ans: True
Q.9 In a typical sensor network, each sensor node operates unethered and has a microprocessor
anda small amount of memory for signal processing and task scheduling
(true/false)
Ans: True
Q.10 Each node is equipped with one or more sensing devices such as acoustic microphone
arrays,video or still cameras, infrared, seismic or magnetic sensors (true/false)
Ans: True
Q.11
If every sensor has some data that it needs to send to another node in a network, then per
nodethroughput scales as {sqrt(N) or 1/sqrt (N)}
Q.12 As the number of nodes , every node spends almost all of its time
forwardingpackets of other nodes (decreases/increases)
Ans: increases
Answer: d
Explanation: Wireless transmission is carried out by radio waves, microwaves and IR waves.
These waves range from 3 Khz to above 300 Ghz and are more suitable for wireless
transmission. Radio waves can penetrate through walls and are used in radio communications,
microwaves and infrared (IR) waves cannot penetrate through walls and are used for satellite
communications and device communications respectively.
Q.14 Which of the following is the multiple access protocol for channel access control?
a) CSMA/CD
b) CSMA/CA
c) Both CSMA/CD & CSMA/CA
d) HDLC
Answer: c
Explanation: In CSMA/CD, it deals with detection of collision after collision has occurred,
whereas CSMA/CA deals with preventing collision. CSMA/CD is abbreviation for Carrier
Sensing Multiple Access/Collision detection. CSMA/CA is abbreviation for Carrier Sensing
Multiple Access/Collision Avoidance. These protocols are used for efficient multiple channel
access.
Answer: a
Explanation: Topology in networks is the structure or pattern in which each and every node in
the network is connected. There are many topologies in networking like bus, tree, ring, star,
mesh, and hybrid topology. There is no particular best topology and a suitable topology can be
chosen based on the kind of application of the network .
Answer: d
Explanation: In bus topology, there is a single cable to which all the network nodes are
connected. So whenever a node tries to send a message or data to other nodes, this data passes
through all other nodes in the network through the cable. It is really simple to install but it’s
not secure enough to be used in most of the computer network applications.
Answer: a
Explanation: In star topology, no computer is connected to another computer directly but all
the computers are connected to a central hub. Every message sent from a source computer
goes through the hub and the hub then forwards the message only to the intended destination
computer.
Answer: b
Explanation: TDM is the abbreviation for Time division multiplexing. It is technique for
combining several low rate channels to a single high rate channel. For a certain time slot, the
several channels could use the maximum bandwidth. Each channel is inactive for a period of
time too. Some other multiplexing techniques are Frequency division multiplexing and Phase
division multiplexing.
Q.19 is the multiplexing technique that shifts each signal to a different carrier frequency.
a) FDM
b) TDM
c) Both FDM & TDM
d) PDM
Answer: a
Explanation: FDM is an abbreviation for Frequency Division Multiplexing. This technique is
used when the bandwidth of the channel is greater than the combined bandwidth of all the
signals which are to be transmitted. The channel is active at all times unless a collision occurs
with another channel trying to use the same frequency. Some other multiplexing techniques
are Time division multiplexing and Phase division multiplexing.
Q20 is a high performance fiber optic token ring LAN running at 100 Mbps over
distances upto 1000 stations connected.
a) FDDI
b) FDDT
c) FDDR
d) FOTR
Answer: a
Explanation: FDDI stands for Fiber Distributed Data Interface. It is a set of standards for fiber
optic token ring LANs running at 100 Mbps over distances up to 200 km in diameter and 1000
stations connected.
Answer: c
Explanation: Frequency division duplexing (FDD) provides two distinct bands of frequencies
for every user. In FDD, any duplex channel actually consists of two simplex channels.
Q.22 The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False
Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the mobile.
The reverse band provides traffic from the mobile to the base station.
Answer: a
Explanation: IETF 6LoWPAN enables seamless integration of LoWPAN devices with internet
leveraging IPv6 large address space and appln. Layer protocol reuse.
Q.25 Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP
Answer: a
Explanation: The internet of Thing is the global system of interconnected computer networks
that use the Internet Protocol suite (TCP/IP) to link billions of devices worldwide.
Answer: d
Explanation: IEEE 802.15.4.LoWPAN – specification defining the PHY and MAC layer of
low power devices supporting 250 Kb/s data rate, small packet size 127 bytes.
Q.27 specification defining the PHY and MAC layer of low power devices.
a) IETF 6LoWPAN
b) IEFT CoAP
c) RFID/NFC
d) IEEE 802.15.4.LoWPAN
Answer: d
Explanation: IEEE 802.15.4.LoWPAN – specification defining the PHY and MAC layer of
low power devices supporting 250 Kb/s data rate, small packet size 127 bytes.
Answer: d
Explanation: 6LoWPAN Adaption Layer:
Header compression
Fragmentation
Layer 2 forwarding.
Answer: b
Explanation: WSN – Wireless Sensor Network comprises of motes running a WSN
application and a light weight CoAP server.
Q.30 A device which is used to boost the signal between two cable segments or wireless access
points is
a) Booster
b) Repeater
c) Switch
d) Router
Answer: a
Explanation: A switch is a device that splits large networks into smaller segments, decreasing
the number of users sharing the same network resources and bandwidth.
Answer: b
Explanation: Wireless security is the anticipation of unauthorized access or breaks to
computers or data by means of wireless networks. The most widespread types of wireless
securities are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and
recently released WPA3.
Q.33 The type of traffic carried by a network determines the routing service.
a) True
b) False
Answer: a
Explanation: The type of traffic carried by a network determines the routing services. It also
determines protocols, and call handling techniques which must be employed.
Answer: b
Explanation: Wireless data networks are not supported by circuit switching. It is due to their
short, bursty transmissions which are often followed by periods of inactivity. Circuit switching
is best suited for dedicated voice only traffic.
Q.35 Wireless Sensor Networks are networks consisting of equipped with sensors which are
Q.49 The Industrial, Scientific and Medical radio bands are the industrial equivalent of the "Citizens
Band".
(a) No license is required, (b) license is required, (c) permission from Govt. as well as
service provider is required, (d) none of the above.
Q.50 Properties of wireless communication
(a) Attenuation (b) Reflection/refraction (c) Diffraction/Scattering & Doppler effect (d)
all of the Above.
Q.51 Path loss in communication is due to
(a) Interference, (b) noise, (c) EMI, (d) all of the above
Q.52 Wireless communication involves transfer of information without any physical connection
between
two or more points. Because of this absence of any 'physical infrastructure', wireless
communication has certain advantages. Wireless communication has several advantages:
(a) Cost effectiveness, (b)flexibility, (c) convenience, (d) all of the above.
Q.53 MAC protocols is used for
(a) avoiding packet collision, (b)avoid resending packet, (c)increase through put, (d) all of
the above.
Q.54 In centralised TDMA, the schedule is calculated _ and provided to the sensor nodes
at
startup.
(a) Offline, (b) online, (c) manually (d) none of the above.
Q.55 In Persistant CSMA, If the channel is busy, the sender continues sensing the channel until it
becomes
(a) idle again and sends them immediately, (b) non idle again and sends them immediately,
(c ) free, (d) none of the above.
Q.56 Sensor MAC (S-MAC) has been developed especially for
(a) sleep-enabled sensor networks, (b) enabled sensor networks, (c ) large sensor network
(d) none of the above.
Q.57 Berkeley MAC (B-MAC) was developed to tackle the problems of
(a) S-MAC, (b) TDMA, (c ) CDMA, (d) none of the above.
Q.58 Drawbacks of wrong topology
(a ) Reduce network capacity, (b) Increase interference, (c ) Increase end-to-end packet
delay, (d) all of the above
Q.59 is the proposed standard for low rate wireless personal area networks (LR-
WPAN’s) with focus on enabling WSNs (Gutierrez et al. 2001.
(a) IEEE 802.15.4, (b) IEEE 802.4.15, (c ) IEEE 802.15.1, (d) none of the above.
(a) low cost of deployment, (b) low complexity, (c ) low power consumption; (d) all of the
above.
Q.61 ZigBee has been introduced by IEEE with IEEE 802.15.4 standard, it is designed for
(a) simple, (b) low cost, (c) low power wireless communication technology used in
embedded applications, (d) all of the above.
Q.62 The WirelessHART standard provides a wireless network communication protocol for
(a) process measurement and control applications, (b) length measurement and control
applications, (c) measurement and control applications, (d) none of the above.
Q.63 ISA 100.11a is the first standard of ISA100 family with foundations for
(a) process automation, (b)provisions for secure, (c ) reliable, low data rate wireless
monitoring (d) all of the above.
Q.65 Localization accuracy is the distance between the estimated and the real
position of the sensor node.
(a) largest, (b) smallest, (c) medium , (d) None of the above.
Q.66 Infrastructural costs refer to the special installation of some infrastructure to localize the
nodes, such as
(a) GPS anchors, (b) mobile nodes, (c) Simple node, (d) None of the above.
Q.67 In trilateration, you measure the distances to the to compute your own position.
(a) anchor nodes, (b) nodes only, (c) Sensor node, (d) None of the above
Q.68 Range-free localization is a
(a) combination of proximity-based and ranging techniques, (b) combination of number
of sensor, (c) combination of anchors, (d) None of the above.
Q.69 Released in 2006 by Nokia, it is a wireless communication technology designed for low
power consumption, short-range communication, and low cost devices,
(a) it is called Baby-Bluetooth, and renamed Bluetooth Low Energy (BLE) technology,
(b) Zigbee, (c) GSM, (d) None of the above.
Q.70 Wibree allows the communication between
(a) small battery-powered devices and Bluetooth devices, (b) zigbee and Bluetooth
devices, (c) Communicating nodes, (d) None of the above.
Q.71 Bluetooth–Wibree utilizes the existing Bluetooth RF and enables
(a) ultra-low power consumption, (b) ultra-high power consumption, (c) ultra-medium
power consumption, (d) None of the above.
Q.74 Z-Wave uses a two-way RF system that operates in the (868 MHz in Europe
and 908 MHz in the United States).
(a) 908 MHz ISM bands, (b) 1 MHz ISM bands, (c) 908 MHz commercial bands, (d)
none of the above.
Q.75 ANT is a proprietary technology featuring a wireless communication protocol stack
thought for
(a) ultra-low power networking application (ANT 2013). (b) ultra-high power
networking application (ANT 2013). (c) low energy applications, (d) none of the above.
Q.76 INSTEON is a solution developed for by SmartLabs and promoted by the
INSTEON Alliance (INSTEON 2013).
(a) home automation, (b) industry automation, (c) space automation, (b) All of the above
Q.77 Wavenis is a wireless protocol stack developed by Coronis Systems for control and
monitoring applications in several environments, including
(a) home and building automation, (b) infrastructure automation, (c) space automation,
(d) All of the above.
Q.78 The main idea of clustering is to organize the network into smaller , so that data
can be collected and analyzed in a location-restricted way.
(a) sub-networks, (b) node contains network, (c) campus network, (b) none of the above.
Q.79 The main objective of clustering is to
(a) save energy and to avoid data congestion in the network, (b) save memory, (c) save
transmission time, (b) none of the above.
Q.80 The sink, sometimes called the global sink, is a single node in the network, which gathers
all information from
(a) all nodes in the network, (b) cluster member, (c) both node and cluster member, (d)
none of the above.
Q.81 In geographical clustering, the network is cut into clusters according to
(a) geographic coordinates, (b) requirement of network, (c) increase through put of
network, (d) none of the above.
Q.82 Compressive sensing is signal processing concept, which samples a signal
instead of continuously.
(a) randomly, (b) specific, (c) continuous (d) none of the above.
Q.83 In misdirection attack, the adversary creates
(a) wrong routes, (false route, (c) correct routes, (d) none of the above.
Q.84 Another kind of attack desynchronization, which can be applied to resting
on sequence numbers.
(a) transport protocols, (b) network protocols, (c) TCP protocol, (d) none of the above.
Q.85 There are two prominent examples for failing deployments: the so-called
(a) Potatoes application, (b)Duck Island application, (c) all of the above.
In the Netherlands to monitor temperature and humidity, and to take centralized
irrigation decisions based on the acquired data for precision agriculture for the Potato
field. This application officially called
(a) LOFAR-agro, (b) Solar-Agro, (c) auto-agro, (d) none of the above.
Q.86 Battery issues cause not only problems at the node level but also
(a) for communication and sensing as hardware performance. (b) communication issues,
(c) sensing issues, (d) none of the above.
Q.87 is one of the most common problems. Suddenly, a node stops working completely.
(a) Node death, (b) Sink, (c) Global Sink, (d) none of the above.
Q.88 However, the far most important task is to ensure that communication is
(a)self-sustainable, (b) self-adapting (c) robust, (d) all of the above.
Q.89 Global Problems in networking are classified into:
(a) Topology, (b) Lifetime, (c) Semantic problems, (d) all of the above.
Q.90 are hard to predict or test because they manifest themselves too late in the
process.
(a) Lifetime problem, (b) Global problem, (c) all of the above.
Q.91 Semantic problems occur most often when the data and its meaning does not match
expectations.This can be caused by
(a) Missing or bad calibration of the sensing hardware
(b) Deteriorating batteries causing wrong sensor readings;
(c) Wrong interpretation of the data itself
(d) all of the above.
Q.92 are a good option, as sun is abundant on the vineyard, even in winter
periods.
(a) Solar batteries, (b) Lead acid batteries, (c) SMF Batteries, (d) none of the above.