0% found this document useful (0 votes)
11 views

Bits IOT

Uploaded by

srkrec.cse.c056
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Bits IOT

Uploaded by

srkrec.cse.c056
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

IoT Unit-3 Part-2 Quiz with answers.

1. Identify the incorrect feature of Arduino. [D]


A. Arduino boards are able to read analog or digital input signals
B. You can control your board functions by sending a set of instructions to the microcontroller
on the board via Arduino IDE
C. Arduino provides a standard form factor that breaks the functions of the micro-controller
into a more accessible package.
D. Arduino IDE uses a simplified version of C++

2. How many analog input pins are available on Arduino Uno board? [A]
A. 6 B. 5 C. 4 D. 0
3. The Arduino UNO board has ____ digital I/O pins, of which ___ pins provide PWM (Pulse Width
Modulation) output. [C]
A. 10, 2 B. 12, 4 C. 14, 6 D. 14, 4
4. Which serial port of the PC is typically allocated for connecting Arduino Board? [D]
A. COM1 B. COM2 C. Always COM3 D. COM3 or higher
5. On the Uno and other ATMEGA based boards, a word stores a _____________ number. [A]
A. 16-bit unsigned B. 16-bit signed C. 32-bit unsigned D. 32-bit signed
6. Identify the delay function that can generate a delay of 2 seconds. [B]
A. delay(2) B. delay(2000) C. delay(200) D. delay(20000)
7. The function ____________ resets Arduino’s pseudorandom number generator. [B]
A. random(seed) B. randomSeed(seed) C. randomSeed(x, y) D. random(x, y)
8. _______ is used as the first parameter of the attachInterrupt() function. [C]
A. ISR B. mode C. digitalPinToInterrupt(pin) D. digitalInterrupt(pin)
9. Usually _____ company microcontrollers are used on Arduino boards. [C]
A. Intel B. ARM C. ATMEL D. MICROCHIP
10. Which of the following is not valid datatype in Arduino? [A]
A. bit B. bool C. byte D. word
1. A _____________ is a collection of operations that form a single logical unit of database. [a]
Transaction b) Business Process c) Analytics d) Enterprise System
2. __________data is used for analytics, new facts and decision taking on those facts [b]
a)Unorganized b)Organized c)Redundant d) None
3. ________ uses statistical methods and finds new parameters which add value to the data. [c]
a)Clustering b) Classification c) Analytics d) Real-time
4. __________ are analytics tools? [d]
Descriptive analytics b) Statistics c) data mining and machine learning d)All the above
5. OLAP runs faster on column format, i.e. more rows and few columns [a]
a)True b) False
6. Prescriptive analytics answers not only what is anticipated or what will happen or when it will happen,
but also why it will happen based on inputs from descriptive analytics and business rules. [b]
a)True b) False
7. Event analytics use ________data for event tracking and event reporting [b]
a) Object b) Event c) Class d) Hierarchical
8. Knowledge is sharable information and understanding about a subject or context. [a]
a)Sharable b)Non-sharable c)Ordered d)Unordered
9. _____________ is the ability to use experience and knowledge in order to make sensible and reasonable
judgment and decisions [d]
Knowledge b) Knowledge Management c) Analytics d) Wisdom
10. _________is a software system, which contains a set of programs specially designed for creation,
management and transactions of data stored in a database. [d]
Data Mining b) Data Warehouse c) Data Store d) Database Management System
11. Data store is a data repository of a set of objects, which integrate into the store [a]
True b) False
12. Data generates from the __________ [b]
a)Active devices b) Passive Devices c)Both d)None
13. ____________is storage through a spatial database which is optimised to store, enable querying of the
data objects defined in a geometric space [d]
Data Storage c) Memory storage c) Numerical Storage d) Spatial storage
14. _______ data means an array of numbers indexed with time (date-time or a range of date-time). [a]
A) Time series b) Real-time Series c)Batch Series d) None
15. NOSQL stands for __________________ [a]
a) Not Only SQL b) Near Only SQL c) Nest Only SQL d) NAND only SQL
16. Decision on real-time data is fast when query processing in live data (streaming) has low _______.[c]
a) Energy b)Power c) Throughput d) Latency
17. Event analytics use event data, for events tracking and event reporting. [b]
a)False b) True
18. Distribution of processes reduces the complexity and communication costs, and enables ______responses
and ______ processing load at the central system. [a]
1. Faster and smaller b)Slower and Larger c) Faster and High d) Slower and Low
19. Data Information Knowledge Wisdom forms a ___________. [c]
a)Square b) Circle c)Pyramid d) None
20. Business intelligence is a process that enables a business service to extract new facts and knowledge and
then undertake better decisions. [a]
a)True b)False
1
IV Year I Sem R20 IoT

UNIT-5 Quiz

1. “How much of the IoT devices data and which data need absolute privacy and which need
limited privacy?” is decided by _____________
A. Government Policy B. Privacy Policy C. Message Privacy D. Information Privacy [B]

2. ________ are flaws in a computer system that weaken the overall security of the device/system.
A. Virus B. Worms C. Vulnerabilities D. Threats [C]

3. OWASP stands for _______.


A. Open Web Application Security and Privacy B. Open Web Authority for Security and
Privacy C. Open Web Application Security Project D. Open Web Application Security
Protection [C]

4. Which of the following is not among the Five functional components (FCs) of security defined
in IoT reference architecture.
A. Cryptography B. Key Exchange and management C. Authentication D. Authorization [A]

5. Identify the possible security issue at Network Layer. [D]


A. SQL Injection B. Vulnerable Ports C. MAC Flooding D. ICMP Attack

6. Which of the following is an attack on Data Link Layer?


A. DDoS attack B. Ping Flood C. SYN flood D. ARP Poisoning [D]

7. _________ is a framework of policies and technologies to ensure that the right users have the
appropriate access to technology resources.
A. Identity Management B. Authentication C. Authorization D. Privacy Policy [A]

8. ______ is the selective restriction of access to a place or other resource, while access
management describes the process.
A. Identify Management B. Access Control C. Authentication D. Authorization [B]

9. In any access-control model, the entities that can perform actions on the system are called.
A. Objects B. Subjects C. Users D. Humans [B]

10. In access-control model, the entities representing resources to which access may need to be
controlled are called ____.
A. Objects B. Subjects C. Users D. Humans [A]

11. _________ is a policy determined by the owner of an object.


A. Mandatory Access Control B. Role based Access Control C. Discretionary access
control D. Attribute-based access control [C]
12. ________ is a method of limiting access to resources based on the sensitivity of the information
that the resource contains and the authorization of the user to access information with that level
of sensitivity.
A. Mandatory Access Control B. Role based Access Control C. Discretionary access
control D. Attribute-based access control [A]

13. ________ means an assurance that the source of a message once having communicated the data
to a sender, cannot deny it later.
A. Integrity B. Denial of Service C. Repudiation D. Non-repudiation [D]

14. ______ service provides proof of the message’s origin as well as its integrity.
A. Encryption B. Message Digest C. Hash Function D. Digital Signature [D]

15. Which of the following security profile is used for 6LowPAN/CoAP?


A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [A]

16. Which of the following security profile is meant for home usage?
A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [B]

17. Which of the following security profile is for the purpose of managed home usage?
A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [C]

18. Which of the following security profile is for Industrial usage?


A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [D]

19. Which of the following security profile is used in advanced industrial usage?
A. SecProf_4 B. SecProf_1 C. SecProf_2 D. SecProf_3 [A]

20. _______protocol refers to issue of a digital certificate with a trust based on TTP authorised
certification authority.
A. DTLS B. X.509 C. TLS D. SSH [B]

You might also like