IoT and Sensor Technology Quiz Answers
IoT and Sensor Technology Quiz Answers
QUESTION 1:
Which of the following allows us to identify objects and extract information?
a. RFID
b. Sensors
c. Actuators
d. IoT
Nodes
Correct Answer: a.
RFID
Detailed Solution: RFID Technology allows us to automatically identify and track tags
that are attached to the objects. It extracts information from the tags through
electromagnetic fields.
See lecture 1 @
12:57
QUESTION 2:
How many layers does Zigbee consist of?
a. 1
b. 2
c. 3
d. 4
Correct Answer: d.
4
Detailed Solution: Zigbee consists of 4 layers: Physical, Medium Access Control,
Network,
and
Application.
See lecture 48 @
16:11
QUESTION 3:
Which of the following is not a component of cloud computing?
a. Clients
b. LocalServers
c. Services
d. Applications
Correct Answer: b. Local Servers
Detailed Solution: Cloud computing components include clients, services, applications,
platform, storage, and infrastructure.
See lecture 37 @ 23:29
QUESTION 4:
Which of the following is a distance measuring sensor module?
a. DHT22
b. HC-SR04
c. TSL2591
d. HC-SR505
Correct Answer: b. HC-SR04
Detailed Solution: HC-SR04 is the distance measuring module ultrasonic sensor, which
measures the distance between 2cm~450cm.
See lecture 3 @ 5:00
1
QUESTION 5:
Which of the following is a component in a typical sensor network?
a. Sink
b. Gateway
c. Router
d. All of these
Correct Answer: d. All of these
Detailed Solution: A typical sensor network comprises of sensor nodes, routers, gateway,
and sink.
QUESTION 6:
Which of the following sensors are responsible for measuring orientation and angular velocity?
a. Accelerometer
b. GPS
c. Temperature
d. None of these
Correct Answer: d. None of these
Detailed Solution: A gyroscope is responsible for measuring orientation and
angular velocity.
See lecture 59 @ 15:41
QUESTION 7:
“ISA 100.11A” is a wireless networking technology standard. ISA stands for
. a. International Society of Automation
b. International Society of
Advancement c. Industrial Society of
Automation
d. Industrial Society of Advancement
Correct Answer: a. International Society of Automation
Detailed Solution: ISA100.11a is a wireless networking technology standard developed
by the International Society of Automation (ISA).
See lecture 13@ 15:55
QUESTION 8:
Which of the following is not a difference between traditional data center and cloud computing?
a. Scalability
b Flexibility
c. Elasticity
d. Storage
Correct Answer: d. Storage
Detailed Solution: Major differences between traditional data center and cloud
computing include scalability, flexibility, elasticity, automation, running costs,
and security
See lecture 39 @ 11:02
QUESTION 9:
Smart grid is also known as the energy
internet. a. True
2
b. False
Correct Answer: a. True
Detailed Solution: Smart grid is also known as the energy internet.
See lecture 51 @ 7:51
QUESTION 10:
Can a point of node failure result in the partition of the network in the stationary sensor network?
a. Yes
b. No
Correct Answer: a. Yes
Detailed Solution: If there is a failure in the stationary sensor network then it is likely that
the point of failure can partition the network into two or more fragments.
******************************ASSIGNMENT 1******************************
QUESTION 1:
Which of the following technologies have unified and has resulted in the evolution of IoT?
Detailed Solution: Unification of technologies which has resulted in the advancement of IoT
are –
QUESTION 3:
4
Statement: The integration of existing devices, smart devices, and constrained nodes in a
singular framework is one of the reasons for the address crunch in IoT.
a. True
b. False
Correct Answer: a. True
Detailed Solution: The integration of existing devices, smart devices, and constrained nodes
in a singular framework is one of the reasons for the address crunch in IoT.
See lecture 2 (Introduction to IoT – Part - II) @ 02:35
QUESTION 6:
State True or False.
a. True
b. False
Correct Answer: b. False
Detailed Solution: In multi-homing, a node/network is connected to multiple networks for
improved reliability.
See lecture 2 (Introduction to IoT – Part - II) @ 15:22
QUESTION 7:
The parameters sensed by a sensor may be sent to the cloud for further processing.
a. False
b. True
Correct Answer: b. True
Detailed Solution: The parameters sensed by a sensor may be sent to the cloud for further
processing.
See lecture 3 (Sensing) @ 01:15
QUESTION 10:
Detailed Solution: The IPv6 notation uses 128 bits to represent an address.
A sensor is -
a. Only sensitive to the measured property
b. Insensitive to any other property that what the sensor is made to sense
c. Both (a) and (b)
d. None of these
6
b. Insensitive to any other property that what the sensor is made to sense
See lecture 3 (Sensing) @ 12:30
QUESTION 12:
a. Output
b. Data type
c. Both (a) and (b)
d. None of these
Correct Answer: d. Both (a) and (b)
Detailed Solution:
We classify sensors based on -
a. Output
b. Data type
See lecture 3 (Sensing) @ 13:30
QUESTION 13:
a. Polymer-based
b. Mechanical
c. Electromechanical
d. None of these
Correct Answer: a. Polymer-based
Detailed Solution: Soft actuators are polymer based.
Lecture 4, @ 15:00
********************************ASSIGNMENT 2*********************************
QUESTION 1:
8
QUESTION 3:
QUESTION 5:
Book - Introduction to IoT, Authors – Sudip Misra, Anandarup Mukherjee, and Arijit Roy,
Publisher – Cambridge University Press, Edition – 1 (2021)
QUESTION 7:
QUESTION 8:
10
Correct Answer: a. True
Detailed Solution: The topic is the routing information for the broker.
See lecture 6 (Basics of IoT Networking – Part II) @ 08:30
QUESTION 10:
a. UDP
b. TCP
c. IP
d. XMP
Correct Answer: a. UDP
Detailed Solution: In CoAP, client-server interaction is asynchronous over a datagram
transport protocol such as UDP.
See lecture 7 (Basics of IoT Networking – Part III) @ 00:50
QUESTION 12:
See Page number – 10, Chapter - 1, Book - Introduction to IoT, Authors – Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University Press, Edition –
1 (2021)
QUESTION 15:
The “Destination Address” in the IPv4 packet represents which of the following?
a. The source node address of the packet
b. The intermediate hop in the network
c. Both (a) and (b)
d. Neither (a) nor (b)
Correct Answer: d. Neither (a) nor (b)
Detailed Solution: The “Destination Address” in the IPv4 packet represents the address of
the destination node in the network.
12
See Page number – 18, Chapter - 1, Book - Introduction to IoT, Authors – Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University Press, Edition – 1
(2021)
*********************************ASSIGNMENT 3***************************
QUESTION 1:
QUESTION 3:
13
Correct Answer: a. False
Detailed Solution: WirelessHART physical layer is derived from 802.15.4 protocol.
See lecture 11 (Connectivity Technologies-III) @ 06:00
QUESTION 4:
Detailed Solution: HART standard was developed for networked smart field devices.
See lecture 11 (Connectivity Technologies-III) @ 02:36
QUESTION 6:
Main difference between wired and unwired versions is in the physical, data link, and
______ layers.
a. Data link
b. Network
c. Transport
d. None of these
Correct Answer: b. Network
Detailed Solution: Main difference between wired and unwired versions is in the physical,
data link, and network layers.
See lecture 11 (Connectivity Technologies-III) @ 05:05
QUESTION 7:
“Collision free and deterministic communication is achieved in HART’s data link layer.”
14
a. True
b. False
Correct Answer: a. True
“The HART application layer is responsible for extracting commands from a message,
executing it and generating responses.”
e. True
f. False
Correct Answer: a. True
Detailed Solution: The HART application layer is responsible for extracting commands
from a message, executing it and generating responses.
See lecture 11 (Connectivity Technologies-III) @ 10:26
QUESTION 10:
QUESTION 11:
15
Passive NFC devices ___________ information which is _____________ by other devices.
a. contain, read
b. read, contain
c. contain, contain
d. None of these
Correct Answer: a. contain, read
Detailed Solution: Passive NFC devices contain information which is read by other devices.
See lecture 11 (Connectivity Technologies-III) @ 18:34
QUESTION 12:
Statement: The Link Manager Protocol in Bluetooth manages the only establishment and
authentication.
a. True
b. False
Correct Answer: b. False
Detailed Solution: The Link Manager Protocol in Bluetooth manages the establishment,
authentication, link configuration.
See Page number – 157, Chapter - 7, Book - Introduction to IoT, Authors – Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University Press, Edition – 1
16
(2021)
QUESTION 15:
See Page number – 131, Chapter - 7, Book - Introduction to IoT, Authors – Sudip Misra,
Anandarup Mukherjee, and Arijit Roy, Publisher – Cambridge University Press, Edition – 1
(2021)
**********************************ASSIGNMENT 4******************************
QUESTION 1:
Statement: In “AID”, a set of sensor nodes are deployed over an agricultural field.
a. True
b. False
Correct Answer: a. True
Detailed Solution: In “AID”, a set of sensor nodes are deployed over a agricultural field
See lecture 16 (Sensor Networks-III) @ 13:16
QUESTION 2:
Detailed Solution: Ultrasonic sensor senses the distance at which an object is located.
See lecture 16 (Sensor Networks-III) @ 13:18
QUESTION 3:
State true or false.
In case of static sensors, where to deploy and/or activate sensors in WSN is a coverage
problem.
17
a. True
b. False
Correct Answer: a. True
Detailed Solution: In case of static sensors, where to deploy and/or activate sensors in
WSN is a coverage problem.
See lecture 17 (Sensor Networks-IV) @ 07:11
QUESTION 4:
a. True
b. False
a. True
b. False
State which of the following is/are correct for stationary wireless sensor networks.
e. Topology cannot be changed automatically.
f. Node failure may result in partition of networks.
g. Both (a) and (b)
h. None of these
Correct Answer: c. Both (a) and (b)
18
Detailed Solution: Topology cannot be changed automatically. And Node failure may
result in partition of networks. Are correct.
See lecture 18 (Sensor Networks-V) @ 00:43
QUESTION 7:
a. Area coverage
b. Point coverage
c. Barrier coverage
See lecture 18 (Sensor Networks-V) @ 11:30
QUESTION 8:
19
Detailed Solution: UAV networks are scalable.
See lecture 19 (UAV Networks-V) @ 09:00
QUESTION 10:
Humans carry their devices and move around. Sensors embedded within the devices record
readings. Sensory readings are then transmitted for processing.
This paradigm of sensing is known as –
a. Machine Centric Sensing
b. Device Centric Sensing
c. Human Centric Sensing
d. None of these
Correct Answer: c. Human Centric Sensing
Detailed Solution: Humans carry their devices and move around. Sensors embedded within
the devices record readings. Sensory readings are then transmitted for processing.
This paradigm of sensing is known as Human Centric Sensing.
See lecture 18 (Sensor Networks-V) @ 11:37
QUESTION 13:
QUESTION 14:
The M2M Application Platform provides integrated services based on device collected
data-sets.
a. True
b. False
Correct Answer: a. True
Detailed Solution: The M2M Application Platform provides integrated services based on
device collected data-sets.
See lecture 20 (Machine to Machine Communication) @ 18:00
*************************************ASSIGNMENT 5***************************
QUESTION 1:
Which of the following is/are current challenges in IoT?
21
c. Both (a) and (b)
d. Neither (a) nor (b)
Correct Answer: c. Both (a) and (b)
Detailed Solution: Large scale of co-operation and Global heterogeneity are current challenges in IoT.
QUESTION 2:
a. True
b. False
Correct Answer: b. False
Detailed Solution: Interoperability is a characteristic of a product or system.
QUESTION 3:
Interoperability is required because
QUESTION 4:
State whether the following statement is true or false
Statement: “Use of different programming languages such as JavaScript, Python, JAVA, and others is an example of
heterogeneity in IoT. This brings in the need for interoperability.”
a. False
b. True
Correct Answer: b. True
22
Detailed Solution: Use of different programming languages such as JavaScript, Python, JAVA, and others is an
example of heterogeneity in IoT. This brings in the need for interoperability
QUESTION 5:
b. False
QUESTION 6:
d. None of these
QUESTION 7:
State true of false
a. True
b. False
Correct Answer: a. True
23
QUESTION 8:
State true or false
Additional electronic circuits are essential to load a program into the Arduino controller board.
a. True
b. False
Correct Answer: b. False
Detailed Solution: No additional electronic circuits are essential to load a program into the Arduino
controller board.
QUESTION 9:
Arduino UNO has _________ number of Digital I/O pins.
a. 8
b. 13
c. 14
d. None of these
Correct Answer: c. 14
QUESTION 10:
void setup() {
pinMode(ledPin, OUTPUT);
digitalWrite(ledPin, HIGH);
delay(1000);
digitalWrite(ledPin, LOW);
delay(500);
}
24
void loop() {
// Do nothing
d) Stay ON continuously
Detailed Solution:
Thus, the LED blinks 3 times with 1000ms ON and 500ms OFF.
QUESTION 11:
a. 1
b. 2
c. 3
d. 4
Correct Answer: c. 3
Detailed Solution: Like C programming Arduino sketches also have 3 types of loops,
for, while and do-while loops.
QUESTION 12:
25
a. Val = (condition)?(Statement 1):(Statement 2)
QUESTION 13:
QUESTION 14:
What function is used to read the humidity value from the DHT sensor?
A) [Link]();
B) [Link]();
C) [Link]();
D) [Link]();
Detailed Solution: [Link](); function is used to read the humidity value from the DHT sensor
QUESTION 15:
A) [Link]()
26
B) [Link]()
C) [Link]()
D) [Link]()
***************************ASSIGNMENT 6**********************************
QUESTION 1:
a. True
b. False
Correct Answer: a. True
Detailed Solution: Python is popular for embedded application development as it is a very
lightweight programming language.
QUESTION 2:
a. True
b. False
a) 5
b) 12
c) Code
d) &Code
Detailed Solution:
27
1. x = [4, 5, 6]: A list with three elements.
2. y = [str(x[0] + 1), str(len(x) * 2) + '&Code']:
o x[0] is 4, so x[0] + 1 is 5, and str(x[0] + 1) becomes "5".
o len(x) is 3, so len(x) * 2 is 6, and str(len(x) * 2) + '&Code' becomes "6&Code".
o Therefore, y = ["5", "6&Code"].
3. z = y[1].split('&'):
o y[1] is "6&Code".
o Splitting "6&Code" by '&' gives ['6', 'Code'].
4. z[1] is 'Code'.
Thus, the print(z[1]) statement outputs Code.
QUESTION 4:
State True or False.
Statement: “To indicate different blocks of code, Python follows rigid indentation.”
a. True
b. False
Correct Answer: a. True
Detailed Solution: To indicate different blocks of code, Python follows rigid indentation.
QUESTION 5:
What is the output of the following line of code in Python?
d. None of these
QUESTION 6:
During remote server access by a Raspberry Pi, where the Raspberry Pi acts as a client,
the client needs the following?
Detailed Solution: A client can communicate with a server only if both IP address and
port numbers are known. (Please refer Lecture 31@14:13)
QUESTION 7:
State whether the following command to install the PIL library is correct or not.
sudo pip install pillow
a. Correct
b. Incorrect
QUESTION 8:
What is the purpose of the "w" mode in the open() function in Python?
A) To read a file
B) To write data to a file, overwriting existing content
C) To append data to a file
D) To open a file in read and write mode
QUESTION 9:
What will be the output of the given Python program when reading from the file?
with open("[Link]", "w") as file:
[Link]("Writing data")
with open("[Link]", "r") as file:
f = [Link]() print('Reading from the file\n') print(f)
A) Writing data
B) Reading from the file
Writing data
29
C) Error: File not found
D) None of the above
Correct Answer: B. Reading from the file
Writing data
Detailed Solution: Reading from the file
Writing data
QUESTION 10:
b. No
Which command is used to configure the Raspberry Pi for the camera module?
A) sudo camera-config
B) sudo raspi-config
C) sudo enable-camera
D) sudo pi-setup
What is the final step after enabling the camera in the Raspberry Pi configuration?
Detailed Solution: after enabling the camera in the Raspberry Pi configuration, reboot.
See lecture IMPLEMENTATION OF IOT WITH RASPBERRY PI-II @ 18:44
QUESTION 13:
a. Ctrl + X
30
b. Ctrl + O
c. Ctrl + K
d. None of these
Correct Answer: a. Ctrl + X
Detailed Solution: Ctrl + O exits the nano editor.
QUESTION 14:
In a temperature-controlled fan system using a relay, when should the fan turn on?
Detailed Solution: In a temperature-controlled fan system using a relay, the fand should turn on
when the surrounding temperature exceeds a predefined threshold.
QUESTION 15:
raspistillcapture -o [Link]
a. Captures video feed
d. None of these
a. SocketFamily
b. SocketType
c. SocketName
d. SocketProtocol
Correct Answer: b. SOCK_STREAM refers to a type of SocketType, i.e either TCP socket or UDP
socket.
31
QUESTION 2:
If you want to change the label of the Y-axis while plotting a graph using matplotlib in Python, what among the
following functions do you use? Suppose you have imported matplotlib as plt
a. [Link]()
b. [Link]()
c. [Link]()
d. [Link]()
QUESTION 3:
In Socket programming, the parameter AF_INET stands for ___________.
a. Unix protocols
b. Internet Protocol (IP)
c. File sharing
d. Time slicing
Detailed Solution The AF_INET specifies the rules and standards of the Internet protocol, hence the
socket acts as an IP socket. (Please refer Lecture 31@14:13)
QUESTION 4:
Suppose a Python server is receiving data from a socket as follows,
a. TCP socket
b. UDP socket
c. TAP socket
d. None of the given
Correct Answer: b. UDP socket
Detailed Solution: [Link]() is the form used to receive data from UDP sockets. Refer to any
standard socket programming documentations.
32
QUESTION 5:
What is the use of the Mobi-Flow protocol?
QUESTION 6:
During remote server access using socket programming what is the utility of the
<socket_name>.listen() function?
a. To create a new socket
b. To bind the socket to connection
c. To wait for clients to connect
d. To close the connection
Correct Answer: c. To wait for clients to connect
Detailed Solution: listen() function makes the server wait for incoming client connections
QUESTION 7:
Which among the following is the correct direction for PACKET_OUT type messages in SDN?
a. From controller to switch
b. From switch to controller
c. Between two switches
d. Between two controllers
Correct Answer: a. From controller to switch
Detailed Solution: PACKET_OUT messages are sent from switches to the controller upon
receipt of new unknown packets. Refer lecture 33, ppt no 20.
QUESTION 8:
33
d. All of the given
Detailed Solution: A client can communicate with a server only if both IP address and port numbers are
known. (Please refer Lecture 31@14:13)
QUESTION 10:
With respect to the concept of soft time-out and hard time-out in SDN switches, which of the
following relations hold?
a. Soft time-out > = hard time-out
b. Hard time-out >= soft time-out
c. Soft time-out = hard time-out always
d. None of the given
Correct Answer: b. Hard time-out >= soft time-out
Detailed Solution: Hard time-outs of flow rules are always greater than soft time-outs, not
the other way round. Refer lecture 33, OpenFlow Protocol III
QUESTION 11:
Which of the following is true?
Correct Answer: c. Traditional Network: Routing Table, Software Defined Network: Flow Table
Detailed Solution: All switches in traditional network have routing tables and those in Software Defined Network have
flow tables (Please refer Lecture 33@17:15)
34
QUESTION 12:
Consider the following figure below. To which issue of SDN does this particular figure can be related to?
Detailed Solution: The given figures shows the tabular structure of how flow rules are installed within SDN switches,
so it pertains to flow rule placement issues. Refer Lecture 33@18:54, Rule Placement.
QUESTION 13:
With respect to the directional APIs in SDN, what is the functionality of East-Westbound APIs?
QUESTION 14:
a. Tree
b. Flat
c. Mesh
d. Line
35
QUESTION 15:
Integrating SDN with IoT is not recommended and is not a suitable approach to follow
a. False
b. True
Correct Answer: a. False
**********************************ASSIGNMENT 8*******************************
QUESTION 1:
What is Sensor Openflow?
QUESTION 2:
With respect to Mobi-Flow, how does Mobi-Flow fare in comparison to Conventional networking in terms of
message overhead?
QUESTION 3:
Virtual Machines came before Cloud Computing.
a. True
b. False
Correct Answer: a. True
Detailed Solution Virtual Machines came before Cloud Computing. Refer Lecture 37@8:00
36
QUESTION 4:
Private cloud services cannot provide Software-as-a-Service (SaaS).
a. True
b. False
Detailed Solution: Any cloud deployment model can provide any cloud service model. Refer Lecture
QUESTION 5:
Which among the following is a solution for mobility-aware flow rule placement in SDIoT?
a. Mobility-Flow
b. Mobile-Flow
c. Mobi-Flow
d. M-Flow
Correct Answer: c. Mobi-Flow
Detailed Answer: Mobi-Flow has been proposed to provide a solution for mobility-aware flow rule placement.
QUESTION 6:
An organization A wants to deploy a cloud infrastructure, whereby it wants to push majority of the
data to a cloud whose servers can be situated anywhere within the globe, but it wants certain
private data to be pushed only to cloud servers that are present on-premise and are accessible by
only authenticated members of the organization. In this context which among the following
deployment model should be used?
a. Private Cloud
b. Public Cloud
c. Hybrid Cloud
d. Any of these
Correct Answer: c. Hybrid Cloud
Detailed Solution: Hybrid cloud deployment model supports both the features of public and
private cloud. Refer lecture 37, ppt No. 18.
QUESTION 7:
Which among the following is the most on-premise cloud deployment model?
a. Private Cloud
b. Public cloud
c. IaaS
37
d. PaaS
Correct Answer: a. Private Cloud
QUESTION 8:
Which of the following type of client requires constant communication/connection with the cloud
server?
a. Thin client
b. Thick client
d. None of these
Detailed Answer: A thin client is a network computer without a hard disk drive and high
configurations. They act as simple terminals and require constant communication with the servers.
QUESTION 9:
Detailed Solution: ‘CIA’ stands for ‘Confidentiality, Integrity and Availability’. (Please refer
QUESTION 10:
When you are accessing Spotify online for listening to music from your browser without
specifically installing them, which among the following cloud service models is the most
appropriate one that you are using.
a. SaaS
b. PaaS
c. IaaS
d. DaaS
38
Correct Answer: a. SaaS
Detailed Solution: This is an example of SaaS, since you are accessing a word/document
processing software as a client over the network. The actual software itself runs on some remote
cloud server (Please refer Lecture 37@26:14 AND 38@13:16)
QUESTION 11:
With respect to Cloud Computing security, which of the following are necessary
QUESTION 12:
Data security and client authentication is an issue in which of the following cloud service models?
a. SaaS
b. SaaS and PaaS
c. IaaS
d. All of them
Correct Answer: d. All of them
Detailed Solution: Security is a pertinent issue in all of the cloud service models, which includes SaaS, PaaS and IaaS.
Refer to any standard discussion on challenges and issues on cloud computing and Lecture 39.
QUESTION 13:
What is the role of a Hypervisor (most probable answer)?
QUESTION 14:
QUESTION 15:
**************************ASSIGNMENT 9***********************************
QUESTION 1:
a. Elasticity
b. Pay-per-use
c. Self Service
Detailed Solution: The advantages of cloud computing include Elasticity, Pay-per-use and Self-
Service. (Please refer Lecture 42@6:45)
QUESTION 2:
Fill in the blanks. Fog computing is an intermediate layer between __________ and _________.
40
b. Cloud and devices
d. None of these
QUESTION 3:
The managerial role is played by __________ in sensor-cloud architecture.
a. End-users
c. Neither a nor b
d. Both a and b
Detailed Solution: Sensor-Cloud Service Provider plays the managerial role in sensor-cloud architecture. (Please refer
Lecture 42@14:29)
QUESTION 4:
Which of the following is not a component of OpenStack?
a. Suse
b. Nova
c. Swift
d. All of these
Detailed Solution: Nova and Swift are two of the many components of OpenStack
41
QUESTION 5:
Who coined the term Fog computing?
a. IBM
b. CISCO
c. All of these
d. None of these
Detailed Solution: CISCO coined the term Fog computing. (Please refer Lecture 44@4:18)
QUESTION 6:
Fill in the blank. The concept of ________ enables physical hardware to be shared among
multiple entities.
a. Hardware virtualization
b. Software virtualization
c. Module virtualization
d. All of these
Detailed Solution: The concept of hardware virtualization enables physical hardware to be shared
among multiple entities. (Please refer to Page 262, Chapter 11, Introduction to IoT. S. Misra, A.
Mukherjee, and A. Roy, 2020. Cambridge University Press.)
QUESTION 7:
Openstack is a free open source software for cloud framework simulation and experimentation with
various cloud applications.
a. True
b. False
a. Horizon
b. Heat
c. Stellar
d. Neutron
Which among the following is the principal feature of sensor clouds, with respect to sensor nodes?
a. Sensor monitoring
b. Sensor instantiation
c. Sensor virtualization
d. Sensor collection
Correct Answer: c. Sensor virtualization
Detailed Solution: Sesnor virtualization is the principal feature of sensor clouds and their
utility. Refer lecture 42 and 43 on Sensor cloud
QUESTION 11:
a. Logistics
b. Pricing
c. Caching
Detailed Solution: The optimal composition of Virtual sensor nodes is a management issue in
sensor-cloud. (Please refer Lecture 43@4:39)
QUESTION 12:
43
How many different types of caching mechanism are there in sensor cloud?
a. 1
b. 4
c. 2
d. 3
Correct Answer: c. 2
Detailed Answer: Internal Cache (IC) and External Cache (EC) are two different types of caching
QUESTION 13:
Data from an IoT device is transferred to cloud via a network, which is then processed at the
cloud and then a response is sent back to the IoT device from the cloud after processing. The
time it takes for one- way data transfer between the node and cloud is 10s and the data
processing time at the cloud is ‘x’ seconds. It takes a total of 25s for the entire to and fro
transfer of data between the sensor and cloud along with processing at the cloud. What is the
value of x?
a. 10s
b. 5s
c. 15s
d. 20s
Correct Answer: b. 5s
Detailed Solution: Time taken for one-way data transfer between the node and cloud is 10s. Total time
taken for the data transfer is 25s. So 25=10+x+10 (transfer from node to cloud+processing at
cloud+transfer from cloud to node). Thus x=5s.
QUESTION 14:
d. Fog computing is more powerful than cloud computing (with respect to resources).
44
Detailed Solution: Fog computing and cloud computing are complementary technologies.
Fog helps in bringing the cloud closer to the IoT devices. (Please refer Lecture 45@1:06)
QUESTION 15:
Which component of OpenStack do you use to access all the other components?
a. Horizon
b. Glance
c. Neutron
d. None of these
Correct Answer: a. Horizon
Detailed Solution: Horizon is the dashboard of OpenStack which provides the GUI and from where
you
can access other components. Please refer Lecture 41@3:54
************ASSIGNMENT 10***********
QUESTION 1:
Which among the following are active connected entities in a holistic smart city environment?
a. Police station
b. Banks
c. Transport centers
QUESTION 2:
With the help of ICT tools, it is possible to increase and improve citizen participation for a good governance based
smart city
a. True
b. False
45
QUESTION 3:
Which among the following is a possible challenge with respect to smart parking lots?
c. Auto-charging of vehicles
Detailed Solution: All of the given options are indeed potential challenges as well. Refer Lecture 46@24:37.
QUESTION 4:
What refers to combining information from multiple sensor sources?
a. Information Collection
b. Multi-sensor deployment
c. Multi-sensor dissemination
Detailed Solution: Multi-sensor data fusion combines information from multiple sensor sources. (Please refer
QUESTION 5:
Which of the following is one of the theory of evidence-based mathematical methods of data fusion?
a. Belief function
b. Bayesian analysis
c. ANN
d. None of these
46
Detailed Solution: Belief function is one of the theory of evidence-based mathematical methods of data fusion.
(Please refer Lecture 47 @11:49)
QUESTION 6:
With respect to data fusion from multiple IoT sensors, does outlier data present with a challenge?
a. No
b. Yes
QUESTION 7:
a. Based on 2G
b. Based on 4G LTE
d. All of these
Detailed Solution: The phases of ICV development: Phase 1: Based on 2G, Phase 2: Based on 4G
LTE, Phase 3: Vehicles connected to cloud (Please refer Lecture 50@12:28)
QUESTION 8:
With which of the following can the decision-making gap between the sensors and the actuators be bridged.
c. SDN
d. OpenStack Horizon
e. Artificial Intelligence (AI)
f. Arduino IDE
QUESTION 9:
Which of the following statements are true about the HAN standards?
47
Statement II: Network layer is defined by Zigbee.
a. Statements I and II
Detailed Solution: Physical and MAC layers are defined by IEEE802.15.4. Network layer
and Application layers are defined by Zigbee. (Please refer Lecture 48@16:11)
QUESTION 10:
What is UPnP?
e. Uninterrupted Post-messaging
f. Universal Pull Streaming
g. Universal Plug and Play
h. Unhindered Public Networking
Correct Answer: c. Universal Plug and Play
Detailed Solution: Refer Lecture 48@12:53.
QUESTION 11:
b. Tracking of movement
d. None of these
QUESTION 12:
Mobility of vehicles in a V2X environment limit which of the following that restricts the use of TCP/IP for V2X
communication?
48
a. Communication between vehicular infrastructure
b. Localization of data
d. Human-vehicle interaction
Detailed Answer: TCP/IP works best with localized data, which is not present in V2X environments. This restricts the
use of TCP/IP for V2X communication. Refer Lecture 49@12:33 onward.
QUESTION 13:
In VANET, link durations are long and easily scaled-up to include all the vehicles on the road?
a. True
b. False
Detailed Solution: Link durations are short due to the highly dynamic nature of VANETs.
QUESTION 14:
a. True
b. False
Detailed Solution: CCN (Content Centric Networking) is derived from Information Centric Networking (ICN) (Please
refer Lecture 49@15:32).
QUESTION 15:
In an ICV environment, efficient cooperation between different vehicles on a highway can lead to a
safer scenario with respect to collision and avoiding incoming traffic.
a) True
b) False
Correct Answer: a. True
Detailed Solution: Refer Lecture 50@2:00.
49
***********************ASSIGNMENT 11***************************
QUESTION 1:
Which among the following is the most probable application scenario for a smart grid?
a. Home automation
b. Hospital networks
d. Crop monitoring
QUESTION 2:
With respect to a smart grid, which stakeholders are potentially benefitted?
d. Energy consumers/customers
QUESTION 3:
It is not possible to perform load forecasting using a smart grid.
e. True
f. False
Detailed Solution: Load forecasting is possible in a smart grid. Refer Lecture 51@22:00.
50
QUESTION 4:
With respect to the following Smart Grid architecture, which among the following is the most probable utility of the IP
network?
f. IP network is used to connect smart grid components globally for seamless data transfer
Correct Answer: b. IP network is used to connect smart grid components globally for seamless
data transfer
QUESTION 5:
Smart Home is an isolated concept and is not integrable with smart grid?
e. False
f. True
QUESTION 6:
a) Information management
b) Energy management
51
c) Security
d) All of these
Detailed Solution: Energy management, information management and security are all the cloud
applications in smart grid (Please refer Lecture 52@21:55)
QUESTION 7:
a) Integrity
b) Physical threats
d) None of these
Detailed Solution: Integrity, physical threats and dynamic system attacks are all
QUESTION 8:
IIoT corresponds to which industrial revolution?
g. 1st
h. 2nd
i. 3rd
j. 4th
QUESTION 9:
a. Yes
b. No
52
Detailed Solution: In IIoT, big data analytics plays an important part, hence it is inherently data
intensive. Refer Lecture 53@16:28 onward.
QUESTION 10:
Which among the following is one of the requirements and utility of IIoT?
a. Bidirectional
b. Unidirectional
c. Both a and b
d. Neither a nor b
Detailed Solution: Smart grid follows bidirectional flow of energy. (Please refer Lecture 51@5:41)
QUESTION 12:
a. Acquisition>Generation>Storage>Analysis
b. Generation>Storage>Analysis>Acquisition
c. Generation>Acquisition>Storage>Analysis
d. None of these
Detailed Solution: The flow of the data is Generation, Acquisition, Storage and
53
QUESTION 13:
Intelligent transport system is least likely to render which of the following connectivity?
a. Vehicle-to-vehicle connectivity
b. Vehicle-to-sensor connectivity
c. Vehicle-to-road infrastructure
d. Vehicle-to-home connectivity
QUESTION 14:
Approximately around ________ of the total data available currently in the world is unstructured.
a. 20 %
b. 40 %
c. 60 %
d. 80%
Detailed Solution: Unstructured data accounts for 80% of the total data available today in the world. (Please refer
Lecture 55@9:23)
QUESTION 15:
a. True
b. False
QUESTION 2:
Which of the following data analysis technique involve the use of study of difference of variance?
g. ARIMA
h. ANOVA
i. DNN
j. OpenFlow
QUESTION 3:
Given that you have an independent variable and that you want to predict the dependent variable based on the
relationship between the two variables. Which among the following technique would you use?
g. ANOVA
h. ARIMA
i. Regression Analysis
j. Pre-analysis
QUESTION 4:
With respect to AgriSens, how many logical layers are there in its architecture?
55
i. Perception Layer
j. Processing Layer
k. Application Layer
QUESTION 5:
AgriSens supports real-time monitoring of soil moisture conditions and instant reporting to a dashboard.
g. False
h. True
QUESTION 6:
What is the data aggregator is also known as in the context of IoT in smart healthcare?
e) CPU
f) LPU
g) APU
h) PPU
QUESTION 7:
Fill in the blanks. The effect size for determining statistical significance is the standardized
a. Median
b. Mean
QUESTION 8:
Processing the sensed data on the device itself is known as __________ approach.
a. Network based
b. In-place
d. None of these
Detailed Solution: Processing the sensed data on the device itself is known as in-place
QUESTION 9:
Fill in the blank. Processing the handheld activity device data with artificial intelligence can be
used for ________.
a. Fall detection
c. Vehicle detection
d. All of these
Detailed Solution: Processing the handheld activity device data with artificial intelligence can be
used for detecting sudden fall of a person. (Please refer Lecture 60@11:56)
QUESTION 10:
QUESTION 11:
Select the statement(s) that denote the type of ANOVA.
a. Statement I
b. Statement II
d. None of these
Detailed Solution: The types of ANOVA includes One way analysis, Two way analysis and K-way analysis (Please
refer Lecture 56@11:57)
QUESTION 12:
a. True
b. False
QUESTION 13:
The two most relevant sensors directly used in agriculture are __________.
d. All of these
Detailed Solution: Soil moisture and water level sensors are the necessary sensors generally used in
agriculture. (Please refer Lecture 57@13:11)
QUESTION 14:
a. Discrete, categorical
b. Continuous, quantitative
c. Discrete, quantitative
d. Range, Variance
Detailed Solution: Examples of dispersion measures include Range and Variance (Please
QUESTION 15:
Suppose that your smartphone tilts by an angle of 15 degrees. Which among the following sensors
will detect this tilt?
g) HC-SR04
h) Gyroscope
i) Accelerometer
j) Monometer
Correct Answer: b. Gyroscope
Detailed Solution: Refer Lecture 60@3:06.
59