Bits IOT
Bits IOT
2. How many analog input pins are available on Arduino Uno board? [A]
A. 6 B. 5 C. 4 D. 0
3. The Arduino UNO board has ____ digital I/O pins, of which ___ pins provide PWM (Pulse Width
Modulation) output. [C]
A. 10, 2 B. 12, 4 C. 14, 6 D. 14, 4
4. Which serial port of the PC is typically allocated for connecting Arduino Board? [D]
A. COM1 B. COM2 C. Always COM3 D. COM3 or higher
5. On the Uno and other ATMEGA based boards, a word stores a _____________ number. [A]
A. 16-bit unsigned B. 16-bit signed C. 32-bit unsigned D. 32-bit signed
6. Identify the delay function that can generate a delay of 2 seconds. [B]
A. delay(2) B. delay(2000) C. delay(200) D. delay(20000)
7. The function ____________ resets Arduino’s pseudorandom number generator. [B]
A. random(seed) B. randomSeed(seed) C. randomSeed(x, y) D. random(x, y)
8. _______ is used as the first parameter of the attachInterrupt() function. [C]
A. ISR B. mode C. digitalPinToInterrupt(pin) D. digitalInterrupt(pin)
9. Usually _____ company microcontrollers are used on Arduino boards. [C]
A. Intel B. ARM C. ATMEL D. MICROCHIP
10. Which of the following is not valid datatype in Arduino? [A]
A. bit B. bool C. byte D. word
1. A _____________ is a collection of operations that form a single logical unit of database. [a]
Transaction b) Business Process c) Analytics d) Enterprise System
2. __________data is used for analytics, new facts and decision taking on those facts [b]
a)Unorganized b)Organized c)Redundant d) None
3. ________ uses statistical methods and finds new parameters which add value to the data. [c]
a)Clustering b) Classification c) Analytics d) Real-time
4. __________ are analytics tools? [d]
Descriptive analytics b) Statistics c) data mining and machine learning d)All the above
5. OLAP runs faster on column format, i.e. more rows and few columns [a]
a)True b) False
6. Prescriptive analytics answers not only what is anticipated or what will happen or when it will happen,
but also why it will happen based on inputs from descriptive analytics and business rules. [b]
a)True b) False
7. Event analytics use ________data for event tracking and event reporting [b]
a) Object b) Event c) Class d) Hierarchical
8. Knowledge is sharable information and understanding about a subject or context. [a]
a)Sharable b)Non-sharable c)Ordered d)Unordered
9. _____________ is the ability to use experience and knowledge in order to make sensible and reasonable
judgment and decisions [d]
Knowledge b) Knowledge Management c) Analytics d) Wisdom
10. _________is a software system, which contains a set of programs specially designed for creation,
management and transactions of data stored in a database. [d]
Data Mining b) Data Warehouse c) Data Store d) Database Management System
11. Data store is a data repository of a set of objects, which integrate into the store [a]
True b) False
12. Data generates from the __________ [b]
a)Active devices b) Passive Devices c)Both d)None
13. ____________is storage through a spatial database which is optimised to store, enable querying of the
data objects defined in a geometric space [d]
Data Storage c) Memory storage c) Numerical Storage d) Spatial storage
14. _______ data means an array of numbers indexed with time (date-time or a range of date-time). [a]
A) Time series b) Real-time Series c)Batch Series d) None
15. NOSQL stands for __________________ [a]
a) Not Only SQL b) Near Only SQL c) Nest Only SQL d) NAND only SQL
16. Decision on real-time data is fast when query processing in live data (streaming) has low _______.[c]
a) Energy b)Power c) Throughput d) Latency
17. Event analytics use event data, for events tracking and event reporting. [b]
a)False b) True
18. Distribution of processes reduces the complexity and communication costs, and enables ______responses
and ______ processing load at the central system. [a]
1. Faster and smaller b)Slower and Larger c) Faster and High d) Slower and Low
19. Data Information Knowledge Wisdom forms a ___________. [c]
a)Square b) Circle c)Pyramid d) None
20. Business intelligence is a process that enables a business service to extract new facts and knowledge and
then undertake better decisions. [a]
a)True b)False
1
IV Year I Sem R20 IoT
UNIT-5 Quiz
1. “How much of the IoT devices data and which data need absolute privacy and which need
limited privacy?” is decided by _____________
A. Government Policy B. Privacy Policy C. Message Privacy D. Information Privacy [B]
2. ________ are flaws in a computer system that weaken the overall security of the device/system.
A. Virus B. Worms C. Vulnerabilities D. Threats [C]
4. Which of the following is not among the Five functional components (FCs) of security defined
in IoT reference architecture.
A. Cryptography B. Key Exchange and management C. Authentication D. Authorization [A]
7. _________ is a framework of policies and technologies to ensure that the right users have the
appropriate access to technology resources.
A. Identity Management B. Authentication C. Authorization D. Privacy Policy [A]
8. ______ is the selective restriction of access to a place or other resource, while access
management describes the process.
A. Identify Management B. Access Control C. Authentication D. Authorization [B]
9. In any access-control model, the entities that can perform actions on the system are called.
A. Objects B. Subjects C. Users D. Humans [B]
10. In access-control model, the entities representing resources to which access may need to be
controlled are called ____.
A. Objects B. Subjects C. Users D. Humans [A]
13. ________ means an assurance that the source of a message once having communicated the data
to a sender, cannot deny it later.
A. Integrity B. Denial of Service C. Repudiation D. Non-repudiation [D]
14. ______ service provides proof of the message’s origin as well as its integrity.
A. Encryption B. Message Digest C. Hash Function D. Digital Signature [D]
16. Which of the following security profile is meant for home usage?
A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [B]
17. Which of the following security profile is for the purpose of managed home usage?
A. SecProf_0 B. SecProf_1 C. SecProf_2 D. SecProf_3 [C]
19. Which of the following security profile is used in advanced industrial usage?
A. SecProf_4 B. SecProf_1 C. SecProf_2 D. SecProf_3 [A]
20. _______protocol refers to issue of a digital certificate with a trust based on TTP authorised
certification authority.
A. DTLS B. X.509 C. TLS D. SSH [B]