0% found this document useful (0 votes)
16 views69 pages

Iot Bits

The document contains a series of multiple-choice questions and answers related to topics in cloud computing, software-defined networking (SDN), and Python programming. Key concepts covered include the functionalities of various cloud service models, the role of Mobi-Flow in SDN, and Python programming syntax and libraries. It also addresses misconceptions about cloud deployment models and the importance of security in cloud services.

Uploaded by

lvijaykumarlvk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views69 pages

Iot Bits

The document contains a series of multiple-choice questions and answers related to topics in cloud computing, software-defined networking (SDN), and Python programming. Key concepts covered include the functionalities of various cloud service models, the role of Mobi-Flow in SDN, and Python programming syntax and libraries. It also addresses misconceptions about cloud deployment models and the importance of security in cloud services.

Uploaded by

lvijaykumarlvk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 69

1)What is Sensor Openflow?

An SDN protocol tailored for IoT devices

2)With respect to Mobi-Flow, how does Mobi-Flow fare in comparison to Conventional


networking in terms of message overhead? Mobi-Flow < Conventional

3)Virtual Machines came before Cloud Computing.True

4)Private cloud services cannot provide Software-as-a-Service (SaaS). False

5)Which among the following is a solution for mobility-aware flow rule placement in SDIoT?
Mobi-Flow

6)An organization A wants to deploy a cloud infrastructure, whereby it wants to push


majority of the data to a cloud whose servers can be situated anywhere within the
globe, but it wants certain private data to be pushed only to cloud servers that are
present on-premise and are accessible by only authenticated members of the
organization. In this context which among the following deployment model should be
used?Hybrid Cloud
7)Which among the following is the most on-premise cloud deployment
model? Private Cloud
8)Which of the following type of client requires constant communication/connection
with the cloud server? Thin client

9)A thin client is a network computer without a hard disk drive and high
configurations. They act as simple terminals and require constant communication with
the servers.

10)What does ‘CIA’ in cloud data security stand for? Confidentiality, Integrity,
Availability

11)When you are accessing Spotify online for listening to music from your browser
without specifically installing them, which among the following cloud service
models is the most appropriate one that you are using. SaaS

This is an example of SaaS, since you are accessing a word/document processing


software as a client over the network. The actual software itself runs on some remote
cloud server (Please refer Lecture 37@26:14 AND 38@13:16)

12)With respect to Cloud Computing security, which of the following are necessary

a. Network Level Security but not Host Level Security


b. Application Level Security but not Host Level Security
c. Host Level Security but not Network Level Security
d. All of Network, Host and Application Level Security.
All of Network, Host and Application Level Security
Detailed Solution: Refer Lecture 39 Cloud Security.

QUESTION 12:

Data security and client authentication is an issue in which of the following cloud service
models?

a.

SaaS

b.
c.

SaaS and PaaS

d.
e.

IaaS

f.
g.

All of them

h.

Correct Answer: d. All of them

Detailed Solution: Security is a pertinent issue in all of the cloud service models, which
includes SaaS, PaaS and IaaS. Refer to any standard discussion on challenges and issues on
cloud computing and Lecture 39.

QUESTION 13:

What is the role of a Hypervisor (most probable answer)?

a. To facilitate installation of a router


b. To provide a platform for executing virtual machines
c. To facilitate sensor fabrication
d. To communicate between switches themselves.

Correct Answer: b. To provide a platform for executing virtual machines.

Detailed Solution: Refer Lecture 38@5:40.

QUESTION 14:

Which of the following is a limitation of SaaS?


a. Remote software execution
b. Platform independence
c. Centralized control
d. None of these.

Correct Answer: c. Centralized control

Detailed Solution: Refer Lecture 38@15:58.

QUESTION 15:

Fill in the blank.


____________ means independent of device or location.
a. Scalable
b. Reliability
c. Agile
d. Ubiquitous

Correct Answer: d. Ubiquitous


Detailed Solution: Ubiquitous means independent of device or location.
(Please refer Lecture 37@18:06)

************END***********
Introduct
ion to
Internet
of Things
Assignme
nt-Week
7
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:

In Python socket programming, while defining a socket, SOCK_STREAM refers to a type


of

a. SocketFamily
b. SocketType
c. SocketName
d. SocketProtocol

Correct Answer: b. SOCK_STREAM refers to a type of SocketType, i.e either


TCP socket or UDP socket.

Detailed Solution: Refer Lecture 31@6:27

QUESTION 2:

If you want to change the label of the Y-axis while plotting a graph using matplotlib in
Python, what among the following functions do you use? Suppose you have imported
matplotlib as plt

a. plt.show()
b. plt.plot()
c. plt.ylabel()
d. plt.yaxis()

Correct Answer: c. plt.ylabel()


Detailed Solution: Refer Lecture 32@12:39.

QUESTION 3:

In Socket programming, the parameter AF_INET stands for ___________.

a. Unix protocols
b. Internet Protocol (IP)
c. File sharing
d. Time slicing

Correct Answer: b. Internet Protocol (IP)

Detailed Solution The AF_INET specifies the rules and standards of the
Internet protocol, hence the socket acts as an IP socket. (Please refer Lecture
31@14:13)

QUESTION 4:

Suppose a Python server is receiving data from a socket as follows,

data, addr = sock.recvfrom(1024)

What kind of socket ‘sock’ is being considered here.

a.

TCP socket

b.
c.

UDP socket

d.
e.

TAP socket

f.
g.

None of the given


h.

Correct Answer: b. UDP socket

Detailed Solution: sock.recvfrom() is the form used to receive data from UDP
sockets. Refer to any standard socket programming documentations.

QUESTION 5:

What is the use of the Mobi-Flow protocol?

a.

Enabling static SDN

b.
c.

Enabling SDN to incorporate mobility

d.
e.

Enabling Odin Master

f.
g.

Enabling traditional BGP

h.

Correct Answer: b. Enabling SDN to incorporate mobility

Detailed Solution: Refer Lecture 34@14:41.

QUESTION 6:

During remote server access using socket programming what is the utility of
the <socket_name>.listen() function?

a.

To create a new socket


b.
c.

To bind the socket to connection

d.
e.

To wait for clients to connect

f.
g.

To close the connection

h.

Correct Answer: c. To wait for clients to connect


Detailed Solution: listen() function makes the server wait for incoming client
connections (Refer Lecture 31 ppt no 13)

QUESTION 7:

Which among the following is the correct direction for PACKET_OUT type
messages in SDN?

a.

From controller to switch

b.
c.

From switch to controller

d.
e.

Between two switches

f.
g.

Between two controllers

h.
Correct Answer: a. From controller to switch

Detailed Solution: PACKET_OUT messages are sent from switches to the


controller upon receipt of new unknown packets. Refer lecture 33, ppt no 20.

QUESTION 8:

Which among the following is a limitation of the traditional non-SDN networks?

a.

Switches do not possess routing table

b.
c.

Switches are unable to forward traffic

d.
e.

Switches do not have a global view of the network.

f.
g.

All of the given

h.

Correct Answer: c. Switches do not have a global view of the network.


Detailed Solution: Refer Lecture 33@6:53.

QUESTION 9:

During remote server access by a Raspberry Pi, where the Raspberry Pi acts as a client, the
client needs the following?

a. Only IP address of server


b. Only port number
c. Both server IP address and port number
d. Client’s IP address

Correct Answer: c. Both server IP address and port number

Detailed Solution: A client can communicate with a server only if both IP


address and port numbers are known. (Please refer Lecture 31@14:13)

QUESTION 10:

With respect to the concept of soft time-out and hard time-out in SDN switches,
which of the following relations hold?

a.

Soft time-out > = hard time-out

b.
c.

Hard time-out >= soft time-out

d.
e.

Soft time-out = hard time-out always

f.
g.

None of the given

h.

Correct Answer: b. Hard time-out >= soft time-out


Detailed Solution: Hard time-outs of flow rules are always greater than soft
time-outs, not the other way round. Refer lecture 33, OpenFlow Protocol III

QUESTION 11:

Which of the following is true?


a. Traditional Network: Routing Table, Software Defined Network: Routing
Table
b. Traditional Network: Flow Table, Software Defined Network: Routing Table
c. Traditional Network: Routing Table, Software Defined Network: Flow Table
d. Traditional Network: Flow Table, Software Defined Network: Flow Table

Correct Answer: c. Traditional Network: Routing Table, Software Defined Network: Flow
Table

Detailed Solution: All switches in traditional network have routing tables and those in
Software Defined Network have flow tables (Please refer Lecture 33@17:15)

QUESTION 12:

Consider the following figure below. To which issue of SDN does this particular figure can
be related to?

a. Controller placement issue


b. Flow Rule placement issue
c. Hardware placement issue
d. Analysis placement issue

Correct Answer: b. Flow Rule placement issue

Detailed Solution: The given figures shows the tabular structure of how flow rules are
installed within SDN switches, so it pertains to flow rule placement issues. Refer Lecture
33@18:54, Rule Placement.

QUESTION 13:

With respect to the directional APIs in SDN, what is the functionality of East-Westbound
APIs?

a. To communicate between the controller and switches


b. To communicate among multiple controllers
c. East-Westbound APIs do not exist
d. To communicate between switches themselves.

Correct Answer: b. To communicate among multiple controllers.

Detailed Solution: Refer Lecture 34@2:10.

QUESTION 14:

Hierarchical SDN architecture is also known as __________ architecture.

a. Tree
b. Flat
c. Mesh
d. Line

Correct Answer: a. Tree

Detailed Solution: Refer Lecture 34@6:12

QUESTION 15:

Integrating SDN with IoT is not recommended and is not a suitable approach to follow

a.

False

b.
c.

True

d.

Correct Answer: a. False


Detailed Solution: SDN integration with IoT is highly recommended for
efficient delivery of services. Refer Lecture 35.

************END***********

Introduct
ion to
Internet
of Things
Assignme
nt-Week
6
TYPE OF QUESTION:MCQ/MSQ
Number of questions:15 Total marks: 15 X 1= 15

QUESTION 1:

State True or False.

Statement: “Python is popular for embedded application development as it is a


very lightweight programming language.”

a.

True

b.
c.

False

d.

Correct Answer: a. True

Detailed Solution: Python is popular for embedded application development


as it is a very lightweight programming language.
(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING- I
@ 1:22)

QUESTION 2:

State True or False.

Adafruit provides a library to work with DHT22 Sensor.

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: Adafruit provides a library to work with DHT22 Sensor.
(Please refer to lecture Implementation of IoT with Raspberry Pi- II @ 4:41)

QUESTION 3:

Consider the following piece of Python code. What is the output?


x = [4, 5, 6]
y = [str(x[0] + 1), str(len(x) * 2) + '&Code']
z = y[1].split('&')
print(z[1])

a) 5
b) 12
c) Code
d) &Code

Correct Answer: c. Code


Detailed Solution:
1. x = [4, 5, 6]: A list with three elements.
2. y = [str(x[0] + 1), str(len(x) * 2) + '&Code']:
o x[0] is 4, so x[0] + 1 is 5, and str(x[0] + 1) becomes "5".
o len(x) is 3, so len(x) * 2 is 6, and str(len(x) * 2) + '&Code' becomes
"6&Code".
o Therefore, y = ["5", "6&Code"].
3. z = y[1].split('&'):
o y[1] is "6&Code".
o Splitting "6&Code" by '&' gives ['6', 'Code'].
4. z[1] is 'Code'.
Thus, the print(z[1]) statement outputs Code.

QUESTION 4:

State True or False.

Statement: “To indicate different blocks of code, Python follows rigid indentation.”

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: To indicate different blocks of code, Python follows rigid
indentation.

(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING- I


@ 7::29).
QUESTION 5:

What is the output of the following line of code in Python?


>>> print “Hi, Welcome to python!”

a.

Hi, Welcome to python!

b.
c.

“Hi, Welcome to python!”

d.
e.

Hi, Welcome to python

f.
g.

None of these

h.

Correct Answer: a. Hi, Welcome to python!


Detailed Solution: The output of the following line of code in Python -
>>> print “Hi, Welcome to python!”
Output: Hi, Welcome to python!

(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING-


II @ 07:31)

QUESTION 6:

During remote server access by a Raspberry Pi, where the Raspberry Pi acts
as a client, the client needs the following?

a. Only IP address of server

b. Only port number

c. Both server IP address and port number


d. Client’s IP address

Correct Answer: c. Both server IP address and port number

Detailed Solution: A client can communicate with a server only if both IP


address and port numbers are known. (Please refer Lecture 31@14:13)

QUESTION 7:

State whether the following command to install the PIL library is correct or
not.

sudo pip install pillow

a.

Correct

b.
c.

Incorrect

d.

Correct Answer: a. Correct


Detailed Solution: The command to install the PIL library is sudo pip install
pillow.

(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING-


II @ 17:40 )

QUESTION 8:

What is the purpose of the "w" mode in the open() function in Python?

A) To read a file
B) To write data to a file, overwriting existing content
C) To append data to a file
D) To open a file in read and write mode

Correct Answer: B) To write data to a file, overwriting existing content


Detailed Solution: “w” mode is used to write data to a file, overwriting existing
content

(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING-


II @05:05).

QUESTION 9:

What will be the output of the given Python program when reading from the file?
with open("PythonProgram.txt", "w") as file:
file.write("Writing data")
with open("PythonProgram.txt", "r") as file:
f = file.read() print('Reading from the file\n') print(f)

A) Writing data
B) Reading from the file
Writing data
C) Error: File not found
D) None of the above
Correct Answer: B. Reading from the file
Writing data
Detailed Solution: Reading from the file
Writing data

(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING-II


@05:05).

QUESTION 10:

Can we configure Raspberry Pi as a File Server?

a.

Yes

b.
c.

No
d.

Correct Answer: a. Yes

Detailed Solution: We can configure Raspberry Pi as a File Server.

See lecture INTRODUCTION TO RASPBERRY PI-I @ 02:46

QUESTION 11:

Which command is used to configure the Raspberry Pi for the camera module?

A) sudo camera-config
B) sudo raspi-config
C) sudo enable-camera
D) sudo pi-setup

Correct Answer: B) sudo raspi-config

Detailed Solution: sudo raspi-config is used to configure the Raspberry


Pi for the camera module

See lecture INTRODUCTION TO RASPBERRY PI-II @ 18:44

QUESTION 12:

What is the final step after enabling the camera in the Raspberry Pi configuration?

A) Restart the camera service


B) Run a camera test command
C) Reboot the Raspberry Pi
D) Reinstall the Raspberry Pi OS

Correct Answer: C) Reboot the Raspberry Pi

Detailed Solution: after enabling the camera in the Raspberry Pi configuration, reboot.
See lecture IMPLEMENTATION OF IOT WITH RASPBERRY PI-II @ 18:44

QUESTION 13:

Which command Exits the nano editor?


a.

Ctrl + X

b.
c.

Ctrl + O

d.
e.

Ctrl + K

f.
g.

None of these

h.

Correct Answer: a. Ctrl + X


Detailed Solution: Ctrl + O exits the nano editor.

See lecture IMPLEMENTATION OF IOT WITH RASPBERRY PI-II @ 10:20

QUESTION 14:

In a temperature-controlled fan system using a relay, when should the fan turn on?

A) When the relay is manually triggered


B) When the surrounding temperature is lower than a predefined threshold
C) When the surrounding temperature exceeds a predefined threshold
D) When the battery voltage drops below a certain level

Correct Answer: C) When the surrounding temperature exceeds a predefined


threshold
Detailed Solution: In a temperature-controlled fan system using a relay, the fand
should turn on when the surrounding temperature exceeds a predefined threshold.
(Please refer to lecture INTRODUCTION TO PYTHON PROGRAMMING- II @ 11:18)

QUESTION 15:

What does the following line of code do?


raspistillcapture -o image.jpg

a.

Captures video feed

b.
c.

Captures still image

d.
e.

Both (a) and (b)

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: Command is wrong.

(Please refer to lecture INTRODUCTION TO RASPBERYY PI-II @ 19:29)

************END***********

Introduct
ion to
Internet
of Things
Assignme
nt-Week
5
TYPE OF QUESTION: MCQ/MSQ

Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:
Which of the following is/are current challenges in IoT?

a. Large scale of co-operation

b. Global heterogeneity

c. Both (a) and (b)

d. Neither (a) nor (b)

Correct Answer: c. Both (a) and (b)

Detailed Solution: Large scale of co-operation and Global heterogeneity are current
challenges in IoT.

See lecture 21 (Interoperability in Internet of Things) @ 03:41.

QUESTION 2:

State True or False.


Statement: “Interoperability is not a characteristic of a product or system.”

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: Interoperability is a characteristic of a product or system.
Refer Lecture 21@5:51

QUESTION 3:

Interoperability is required because

a.

There are different programming languages

b.
c.

There are different communication protocols

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: c. Both (a) and (b)

Detailed Solution: Interoperability is required because

a.

There are different programming languages

b.
c.

There are different communication protocols

d.

Refer Lecture 21@08:30

QUESTION 4:
State whether the following statement is true or false

Statement: “Use of different programming languages such as JavaScript, Python, JAVA,


and others is an example of heterogeneity in IoT. This brings in the need for
interoperability.”

a.

False

b.
c.
True

d.

Correct Answer: b. True

Detailed Solution: Use of different programming languages such as JavaScript, Python,


JAVA, and others is an example of heterogeneity in IoT. This brings in the need for
interoperability

(Please refer Lecture 21@09:12)

QUESTION 5:

State True or False.


Statement: “The interoperability between devices and device users in terms of
message formats is called Systematic Interoperability.”

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: The interoperability between devices and device users in
terms of message formats is called Syntactic Interoperability.
Refer Lecture 21@17:06.
QUESTION 6:

What is the full form of UMB in IoT interoperability?

a.

Universal Meta Bridge

b.
c.

Universal Main Bridge


d.
e.

Universal Main Bracket

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: UMB stands for Universal Middleware Bridge.
Refer Lecture 21@22:16.

QUESTION 7:
State true of false

Arduino is an open-source electronic programmable board.

a. True

b. False

Correct Answer: a. True

Detailed Solution: Arduino is an open-source electronic programmable board.

Refer Lecture 22@05:17

QUESTION 8:
State true or false

Additional electronic circuits are essential to load a program into the Arduino controller
board.

a. True

b. False

Correct Answer: b. False

Detailed Solution: No additional electronic circuits are essential to load a program into the
Arduino controller board.
Refer Lecture 22@05:17.

QUESTION 9:
Arduino UNO has _________ number of Digital I/O pins.

a. 8

b. 13

c. 14

d. None of these

Correct Answer: c. 14

Detailed Solution: Arduino UNO has 14 number of Digital I/O pins.

Refer Lecture 22@07:08.

QUESTION 10:

What does the following code do?

int ledPin = 13;

void setup() {

pinMode(ledPin, OUTPUT);

for (int i = 0; i < 3; i++) {

digitalWrite(ledPin, HIGH);

delay(1000);

digitalWrite(ledPin, LOW);

delay(500);

void loop() {
// Do nothing

a) Blink 3 times with 1000ms ON and 500ms OFF

b) Blink 3 times with 500ms ON and 500ms OFF

c) Blink 3 times with 1000ms ON and 1000ms OFF

d) Stay ON continuously

Correct Answer: a) Blink 3 times with 1000ms ON and 500ms OFF

Detailed Solution:

The LED is turned ON for 1000ms using delay(1000).

The LED is turned OFF for 500ms using delay(500).

This process repeats 3 times in the for loop.

Thus, the LED blinks 3 times with 1000ms ON and 500ms OFF.

QUESTION 11:

How many types of loops will you find in Arduino Programming?

a. 1

b. 2

c. 3

d. 4

Correct Answer: c. 3
Detailed Solution: Like C programming Arduino sketches also have 3 types
of loops, for, while and do-while loops.

QUESTION 12:

Choose the right option for if/conditional operator.

a. Val = (condition)?(Statement 1):(Statement 2)

b. Val = (condition)?(Statement 2):(Statement 1)

c. Val = (condition):(Statement 1)?(Statement 2)

d. Val = (condition):(Statement 2)?(Statement 1)

Correct Answer: a. Val = (condition)?(Statement 1):(Statement 2)

Detailed Solution: Conditional operator may also be written as Val =


(condition)?(Statement 1):(Statement 2). (Please refer Lecture 23@2:01)

QUESTION 13:

What is the purpose of calling dht.begin(); in the setup() function?

A.

To initialize the Serial Monitor

B.
C.

To start communication with the DHT sensor

D.
E.

To set the temperature and humidity values to zero

F.
G.

To define the data pin for the sensor


H.

Correct Answer: B) To start communication with the DHT sensor


Detailed Solution: Calling dht.begin(); in the setup() function starts
communication with the DHT sensor.
Refer Lecture 24@ 17:25.

QUESTION 14:

What function is used to read the humidity value from the DHT sensor?
A) dht.getHumidity();
B) dht.readTemp();
C) dht.readHumidity();
D) dht.getTemperature();
Correct Answer: c. dht.readHumidity();

Detailed Solution: dht.readHumidity(); function is used to read the humidity value from
the DHT sensor
Lecture 24@17:25.

QUESTION 15:

What function is used to set the servo motor to a specific angle?


A) ServoDemo.move()
B) ServoDemo.rotate()
C) ServoDemo.write()
D) ServoDemo.setAngle()
Correct Answer: c. ServoDemo.write()
Detailed Solution: ServoDemo.write() function is used to set the servo motor to a
specific angle.
Refer Lecture 25@18:47.

************END***********
Introduct
ion to
Internet
of Things
Assignme
nt-Week
4
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:

State whether the following statement is true or false.


Statement: In “AID”, a set of sensor nodes are deployed over an agricultural
field.

a.

True

b.
c.

False

d.

Correct Answer: a. True

Detailed Solution: In “AID”, a set of sensor nodes are deployed over a


agricultural field

See lecture 16 (Sensor Networks-III) @ 13:16

QUESTION 2:

State True or False.

Statement: Ultrasonic sensor senses the distance at which an object is


located.

a.
True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: Ultrasonic sensor senses the distance at which an object
is located.

See lecture 16 (Sensor Networks-III) @ 13:18

QUESTION 3:
State true or false.
In case of static sensors, where to deploy and/or activate sensors in WSN is
a coverage problem.

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: In case of static sensors, where to deploy and/or activate
sensors in WSN is a coverage problem.

See lecture 17 (Sensor Networks-IV) @ 07:11

QUESTION 4:

State whether the following statement is true or false.


Statement: Objective of coverage in WSN is to use maximum number of
sensors and minimize network lifetime.

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: The objective of coverage in WSN is to use minimum
number of sensors and maximize the network lifetime.

See lecture 17 (Sensor Networks-IV) @ 08:47

QUESTION 5:

State whether the following statement is true or false.


Statement: “A crossing is covered if it is in the interior of at least one
node’s coverage disk.”

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: A crossing is covered if it is in the interior of at least one
node’s coverage disk.

See lecture 17 (Sensor Networks-IV) @ 18:58

QUESTION 6:

State which of the following is/are correct for stationary wireless sensor
networks.
a.

Topology cannot be changed automatically.

b.
c.

Node failure may result in partition of networks.

d.
e.

Both (a) and (b)

f.
g.

None of these

h.

Correct Answer: c. Both (a) and (b)


Detailed Solution: Topology cannot be changed automatically. And Node
failure may result in partition of networks. Are correct.

See lecture 18 (Sensor Networks-V) @ 00:43

QUESTION 7:

Most problems in static WSN can be classified as -

a.

No coverage

b.
c.

More coverage

d.
e.

Both (a) and (b)

f.
g.

None of these
h.

Correct Answer: d. None of these


Detailed Solution: Most problems in static WSN can be classified as -

a.

Area coverage

b.
c.

Point coverage

d.
e.

Barrier coverage

f.

See lecture 18 (Sensor Networks-V) @ 11:30

QUESTION 8:

Which of the following is/are correct with respect UAV networks?

a.

Multi-tasking

b.
c.

Large coverage area

d.
e.

Both (a) and (b)

f.
g.

None of these

h.
Correct Answer: c. Both (a) and (b)
Detailed Solution: Multi-tasking and Large coverage area are correct.

See lecture 19 (Sensor Networks-V) @ 05:19

QUESTION 9:

State True or False.


Statement: UAV networks are scalable.

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: UAV networks are scalable.
See lecture 19 (UAV Networks-V) @ 09:00

QUESTION 10:

In Mobile WSN, the Data Mules

a.

Collect the data from sensor nodes

b.
c.

Goes to the sink and delivers the collected data

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.
Correct Answer: c. Both (a) and (b)
Detailed Solution: In Mobile WSN, the Data Mules

a.

Collect the data from sensor nodes

b.
c.

Goes to the sink and delivers the collected data

d.

See lecture 18 (Sensor Networks-V) @ 07:15

QUESTION 11:

The full form of AUV is -

a.

Antenna Used Vehicle

b.
c.

Autonomous Underwater Vehicle

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: b. Autonomous Underwater Vehicle (AUV)


Detailed Solution: Autonomous Underwater Vehicle (AUV)

See lecture 18 (Sensor Networks-V) @ 08:35

QUESTION 12:
Humans carry their devices and move around. Sensors embedded within the
devices record readings. Sensory readings are then transmitted for
processing.
This paradigm of sensing is known as –

a.

Machine Centric Sensing

b.
c.

Device Centric Sensing

d.
e.

Human Centric Sensing

f.
g.

None of these

h.

Correct Answer: c. Human Centric Sensing


Detailed Solution: Humans carry their devices and move around. Sensors
embedded within the devices record readings. Sensory readings are then
transmitted for processing.
This paradigm of sensing is known as Human Centric Sensing.

See lecture 18 (Sensor Networks-V) @ 11:37

QUESTION 13:

State True or False.


Energy of Devices and Participant selection are not two major problems in
Human Centric Sensing.

a.

True

b.
c.
False

d.

Correct Answer: b. False


Detailed Solution: Energy of Devices and Participant selection are not two
major problems in Human Centric Sensing.
See lecture 18 (Sensor Networks-V) @ 12:45

QUESTION 14:

Which of the following network topologies is used in UAV networks?

a.

Bus

b.
c.

Star

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: b. Star


Detailed Solution: UAV networks use the mesh and star network topologies.

See lecture 19 (UAV Networks) @ 02:43

QUESTION 15:

State true of false.


The M2M Application Platform provides integrated services based on
device collected data-sets.

a.
True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: The M2M Application Platform provides integrated
services based on device collected data-sets.

See lecture 20 (Machine to Machine Communication) @ 18:00

************END***********

Introduct
ion to
Internet
of Things
Assignme
nt-Week
3
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:

State True or False.

Statement: “WirelessHART is the latest release of Highway Addressable


Remote Transducer protocol.”

a.

True

b.
c.

False
d.

Correct Answer: a. True


Detailed Solution: WirelessHART is the latest release of Highway
Addressable Remote Transducer protocol.

See lecture 11 (Connectivity Technologies-III) @ 01:42

QUESTION 2:

State True or False.


Statement: “Wired HART has a network layer.”

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: Wired HART does not have a network layer.

See lecture 11 (Connectivity Technologies-III) @ 04:25

QUESTION 3:

State true or false:


“WirelessHART physical layer is derived from 802.15.2 protocol”

a.

False

b.
c.

True

d.

Correct Answer: a. False


Detailed Solution: WirelessHART physical layer is derived from 802.15.4
protocol.

See lecture 11 (Connectivity Technologies-III) @ 06:00

QUESTION 4:

WirelessHART operates only in __________ GHz ISM band.

a.

3.7

b.
c.

4.8

d.
e.

4.8

f.
g.

2.4

h.

Correct Answer: d. 2.4


Detailed Solution: HART operates only in the 2.4 GHz ISM band.

See lecture 11 (Connectivity Technologies-III) @ 06:00

QUESTION 5:

HART standard was developed from _____________ smart field devices.

a.

amplified

b.
c.

diminished

d.
e.

isolated

f.
g.

networked

h.

Correct Answer: d. networked


Detailed Solution: HART standard was developed for networked smart
field devices.

See lecture 11 (Connectivity Technologies-III) @ 02:36

QUESTION 6:

Main difference between wired and unwired versions is in the physical, data
link, and ______ layers.

a.

Data link

b.
c.

Network

d.
e.

Transport

f.
g.

None of these

h.

Correct Answer: b. Network


Detailed Solution: Main difference between wired and unwired versions is in
the physical, data link, and network layers.

See lecture 11 (Connectivity Technologies-III) @ 05:05


QUESTION 7:

State true or false


“Collision free and deterministic communication is achieved in HART’s
data link layer.”

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: Collision free and deterministic communication is
achieved in HART’s data link layer.

See lecture 11 (Connectivity Technologies-III) @ 06:37

QUESTION 8:

Channel hopping is incorporated in which layer of HART?

a.

Data link layer

b.
c.

Physical layer

d.
e.

Application layer

f.
g.

Transport layer

h.
Correct Answer: a. Data link layer
Detailed Solution: Channel hopping is incorporated in the data link layer of
HART.

See lecture 11 (Connectivity Technologies-III) @ 08:21

QUESTION 9:
State True or False.
“The HART application layer is responsible for extracting commands from
a message, executing it and generating responses.”

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: The HART application layer is responsible for extracting
commands from a message, executing it and generating responses.

See lecture 11 (Connectivity Technologies-III) @ 10:26

QUESTION 10:

NFC is designed for use by devices within ________________ to each


other.

a.

Anywhere on the globe

b.
c.

A small building

d.
e.

Both (a) and (b)

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: NFC is designed for use by devices within close proximity
to each other.

See lecture 11 (Connectivity Technologies-III) @ 17:47

QUESTION 11:

Passive NFC devices ___________ information which is _____________


by other devices.

a.

contain, read

b.
c.

read, contain

d.
e.

contain, contain

f.
g.

None of these

h.

Correct Answer: a. contain, read


Detailed Solution: Passive NFC devices contain information which is read by
other devices.

See lecture 11 (Connectivity Technologies-III) @ 18:34


QUESTION 12:

State True or False.


“NFC devices work on the principle of magnetic induction.”

a.
True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: NFC devices work on the principle of magnetic induction.

See lecture 11 (Connectivity Technologies-III) @ 21:47

QUESTION 13:

Bluetooth technology is based on _________________.

a.

HART

b.
c.

ZigBee

d.
e.

All of these

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: Bluetooth technology is based on Ad-hoc piconets.

See lecture 12 (Connectivity Technologies-IV) @ 02:30

QUESTION 14:

State whether the following statement is true or false.


Statement: The Link Manager Protocol in Bluetooth manages the only
establishment and authentication.
a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: The Link Manager Protocol in Bluetooth manages the
establishment, authentication, link configuration.

See Page number – 157, Chapter - 7, Book - Introduction to IoT, Authors –


Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University
Press, Edition – 1
(2021)

QUESTION 15:

Zigbee commonly uses __________data rate.

a.

260 bps

b.
c.

260 kbps

d.
e.

260 Mbps

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: Zigbee commonly uses a 250-kbps data rate.
See Page number – 131, Chapter - 7, Book - Introduction to IoT, Authors –
Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University
Press, Edition – 1
(2021)

************END***********

Introduct
ion to
Internet
of Things
Assignme
nt-Week
2
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:

Based on functionality, MQTT is a _______ protocol.

a.

Transport

b.
c.

Data

d.
e.

Semantic

f.
g.

None of these

h.
Correct Answer: b. Data
Detailed Solution: MQTT is a Data Protocol.

See lecture 6 (Basics of IoT Networking – Part II) @ 01:30

QUESTION 2:

MQTT is designed for -

a.

Remote connections

b.
c.

Limited bandwidth

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: c. Both (a) and (b)


Detailed Solution: MQTT is designed for –

1.

Remote connections

2.
3.

Limited bandwidth

4.

See lecture 6 (Basics of IoT Networking – Part II) @ 03:50


QUESTION 3:

State True or False.


MQTT protocol follows _____________ paradigm for exchanging messages.

1.

Client-Server

2.
3.

Publish-Subscribe

4.
5.

Both (a) and (b)

6.
7.

None of these

8.

See lecture 6 (Basics of IoT Networking – Part II) @ 02:00

QUESTION 4:

State True or False.

Statement: “In MQTT, the Subscribers are Lightweight Sensors.”

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: In MQTT, the Publishers are lightweight sensors.
See lecture 6 (Basics of IoT Networking – Part II) @ 04:49
QUESTION 5:

Which of the following is MQTT component?

a.

Middleman

b.
c.

Mules

d.
e.

Both (a) and (b)

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution:
Components of MQTT are –

1.

Publishers

2.
3.

Subscribers

4.
5.

Beokers

6.
See lecture 6 (Basics of IoT Networking – Part II) @ 04:50

QUESTION 6:

State True or False.


A topic in MQTT can only be numbers.

a.

False

b.
c.

True

d.

Correct Answer: b. False

Detailed Solution: A topic in MQTT is a string.

Book - Introduction to IoT, Authors – Sudip Misra, Anandarup Mukherjee,


and Arijit Roy, Publisher – Cambridge University Press, Edition – 1 (2021)

QUESTION 7:

State True or False.


There are only two methods specified by the MQTT protocol.

a.

False

b.
c.

True

d.

Correct Answer: a. False


Detailed Solution: There are 5 number of methods in MQTT protocol.
See lecture 6 (Basics of IoT Networking – Part II) @ 05:49

QUESTION 8:

The Publish/Subscribe architecture in MQTT is _____________ driven.

a.

Event

b.
c.

Pulse

d.
e.

Sound

f.
g.

None of these

h.

Correct Answer: a. Event


Detailed Solution: Publish/Subscribe in MQTT is event-driven and enables
messages to be pushed to clients.
See lecture 6 (Basics of IoT Networking – Part II) @ 08:32

QUESTION 9:

State True or False.


The topic is the routing information for the broker.

a.

True
b.
c.

False

d.

Correct Answer: a. True

Detailed Solution: The topic is the routing information for the broker.
See lecture 6 (Basics of IoT Networking – Part II) @ 08:30

QUESTION 10:

CoAP is _____________ and ____________.

a.

Based on HTTP

b.
c.

Is designed for M2M applications

d.
e.

None of these

f.
g.

Both (a) and (b)

h.

Correct Answer: d. Both (a) and (b)


Detailed Solution: CoAP is based on HTTP and is designed for M2M
applications.

See lecture 7 (Basics of IoT Networking – Part III) @ 00:49


QUESTION 11:

In CoAP, client-server interaction is asynchronous over a datagram transport


protocol such as ____________.

a.

UDP

b.
c.

TCP

d.
e.

IP

f.
g.

XMP

h.

Correct Answer: a. UDP


Detailed Solution: In CoAP, client-server interaction is asynchronous over a
datagram transport protocol such as UDP.
See lecture 7 (Basics of IoT Networking – Part III) @ 00:50

QUESTION 12:

What is the full form of AMQP?

a.

Advanced Message Querying Protocol

b.
c.

Advanced Message Quality Protocol

d.
e.

Advanced Message Queuing Protocol

f.
g.

None of these

h.

Correct Answer: c. Advanced Message Queuing Protocol


Detailed Solution: Advanced Message Queuing Protocol

See lecture 7 (Basics of IoT Networking – Part IV) @ 0:55

QUESTION 13:

AMQP has _______ number of frame types.

a.

b.
c.

d.
e.

f.
g.

h.

Correct Answer: d. 9
Detailed Solution: In AMQP there are nine frame types..
See lecture 8 (Basics of IoT Networking – Part IV) @ 07:20

QUESTION 14:

State True or False.


Statement: “The OSI model has 7 layers.”

a.

True

b.
c.

False

d.

Correct Answer: a. True


Detailed Solution: The OSI model is a conceptual framework that divides any
networked communication system into seven layers.

See Page number – 10, Chapter - 1, Book - Introduction to IoT, Authors –


Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University
Press, Edition –
1 (2021)

QUESTION 15:

The “Destination Address” in the IPv4 packet represents which of the


following?

a.

The source node address of the packet

b.
c.

The intermediate hop in the network


d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: d. Neither (a) nor (b)


Detailed Solution: The “Destination Address” in the IPv4 packet represents
the address of the destination node in the network.
See Page number – 18, Chapter - 1, Book - Introduction to IoT, Authors –
Sudip Misra, Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge
University Press, Edition – 1 (2021)

************END***********

Introduct
ion to
Internet
of Things
Assignme
nt-Week
1
TYPE OF QUESTION: MCQ/MSQ
Number of questions: 15 Total marks: 15 X 1= 15

QUESTION 1:

IoT stands for ____________.

a.

Internet of Tasks

b.
c.

Internet of Tuples

d.
e.

Internet of Things

f.
g.

None of these

h.

Correct Answer: c. Internet of Things


Detailed Solution: The full form of IoT is “Internet of Things”

See lecture 1 (Introduction to IoT – Part - I) @ 1:30

QUESTION 2:

Which of the following technologies have unified and has resulted in the
evolution of IoT?

a.

High-power embedded systems

b.
c.

Super Computing

d.
e.

Engine Technology

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution: Unification of technologies which has resulted in the
advancement of IoT are –

a.

Low-power embedded systems

b.
c.

Cloud Computing

d.
e.

Big Data

f.
g.

Machine Learning

h.
i.

Networking

j.

See lecture 1 (Introduction to IoT – Part - I) @ 5:54

QUESTION 3:

Which of the following are the enables of IoT?

a.

RFID

b.
c.

Nanotechnology

d.
e.

Sensors
f.
g.

All of these

h.

Correct Answer: d. All of these


Detailed Solution: The enables of IoT are –

a.

RFID

b.
c.

Nanotechnology

d.
e.

Sensors

f.
g.

Smart Networks

h.

See lecture 2 (Introduction to IoT – Part - I) @ 12:50

QUESTION 4:

Which of the following is NOT a function of an IoT LAN?

a.

Long range communication, global

b.
c.

World wide connections


d.
e.

Both (a) and (b)

f.
g.

Neither (a) Nor (b)

h.

Correct Answer: c. Both (a) and (b)

Detailed Solution: The functionalities of an IoT Gateway are –

a.

Local, short-range communication

b.
c.

Spreads across buildings or organization

d.

See lecture 2 (Introduction to IoT – Part - II) @ 3:09

QUESTION 5:

State whether the following statement is True or False.


Statement: The integration of existing devices, smart devices, and constrained
nodes in a singular framework is one of the reasons for the address crunch in
IoT.

a.

True

b.
c.

False

d.
Correct Answer: a. True
Detailed Solution: The integration of existing devices, smart devices, and
constrained nodes in a singular framework is one of the reasons for the address
crunch in IoT.
See lecture 2 (Introduction to IoT – Part - II) @ 02:35

QUESTION 6:
State True or False.

Statement: “In Multi-homing, a node/network is connected to a single network


for improved reliability.

a.

True

b.
c.

False

d.

Correct Answer: b. False


Detailed Solution: In multi-homing, a node/network is connected to multiple
networks for improved reliability.

See lecture 2 (Introduction to IoT – Part - II) @ 15:22

QUESTION 7:

Which of the following is/are the approach/approaches for multi-homing?

a.

Proxy-based approach

b.
c.

Gateway-based approach

d.
e.

Both (a) and (b)


f.
g.

None of these

h.

Correct Answer: c. Both (a) and (b)

Detailed Solution: The following are the approaches for multi-homing –

1.

Proxy-based approach

2.
3.

Gateway-based approach

4.

See lecture 2 (Introduction to IoT – Part - II) @ 16:10

QUESTION 8:

IPv6 uses ____________ notation for its representation.

a.

Hexadecimal

b.
c.

Binary

d.
e.

Decimal

f.
g.
None of these

h.

Correct Answer: a. Hexadecimal

Detailed Solution: IPv6 uses Hexadecimal notation for its representation.

See lecture 2 (Introduction to IoT – Part - II) @ 17:00

QUESTION 9:

State True or False.

The parameters sensed by a sensor may be sent to the cloud for further
processing.

a.

False

b.
c.

True

d.

Correct Answer: b. True

Detailed Solution: The parameters sensed by a sensor may be sent to the


cloud for further processing.

See lecture 3 (Sensing) @ 01:15

QUESTION 10:

The IPv6 notation uses ___________________ number of bits to represent an


address.

a.

64
b.
c.

128

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: b. 128

Detailed Solution: The IPv6 notation uses 128 bits to represent an address.

See lecture 2 (Introduction to IoT – Part - II) @ 16:33

QUESTION 11:

A sensor is -

a.

Only sensitive to the measured property

b.
c.

Insensitive to any other property that what the sensor is made to sense

d.
e.

Both (a) and (b)

f.
g.

None of these

h.
Correct Answer: c. Both (a) and (b)
Detailed Solution:

a.

Only sensitive to the measured property

b.
c.

Insensitive to any other property that what the sensor is made to sense

d.

See lecture 3 (Sensing) @ 12:30

QUESTION 12:

We classify sensors based on -

a.

Output

b.
c.

Data type

d.
e.

Both (a) and (b)

f.
g.

None of these

h.

Correct Answer: d. None of these


Detailed Solution:
We classify sensors based on -
a.

Output

b.
c.

Data type

d.

See lecture 3 (Sensing) @ 13:30

QUESTION 13:

Which of the following is correct statement

a.

Controlling AC loads using low DC signals

b.
c.

Relays are electromechanical

d.
e.

Relays are actuators

f.
g.

All of these

h.

Correct Answer: d. All of these


Detailed Solution: All the statements given are correct.

QUESTION 14:

Based on the output, sensors are classified as _______________________.


a.

Analog

b.
c.

Digital

d.
e.

Both (a) and (b)

f.
g.

Neither (a) nor (b)

h.

Correct Answer: c. Both (a) and (b)


Detailed Solution: Based on the output, sensors are classified as Digital and
Analog.

See lecture 3 (Sensing) @ 13:05

QUESTION 15:

Soft actuators are -

a.

Polymer-based

b.
c.

Mechanical

d.
e.

Electromechanical

f.
g.
None of these

h.

Correct Answer: a. Polymer-based


Detailed Solution: Soft actuators are polymer based.
Lecture 4, @ 15:00
************END***********

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy