Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Introduction To Internet of Things Prof. Sudip Misra Assignment 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

Introduction to Internet of Things

Prof. Sudip Misra

Assignment 1

1. Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.

2. In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation

3. Why is IPv6 preferred over IPv4 for IoT implementations?


a. Larger addressing range
b. More security
c. Both a and b
d. Neither a or b

4. The main function of the IoT Gateway can be summarized as:


a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these

5. Scalability of IoT means:


a. Expandable/reducible in terms of scale or size.
b. Measurable
c. Increasing/decreasing monetary costs.
d. All of these.
6. Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these
7. Which statement is NOT TRUE:
a. IoT WAN connects various network segments.
b. IoT WAN is geographically wide.
c. IoT WAN is organizationally wide.
d. None of these.
8. Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.
9. Which of these is NOT a feature of Shape Memory Alloys (SMA)?
a. Low density
b. Low strain recovery
c. Biocompatibility
d. Biodegradability
10. Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.
Introduction to Internet of Things
Prof. Sudip Misra

Assignment 2

1. MQTT stands for:


a. Message Queue Telemetry Transport
b. Multiple Queue Telemetry Transport
c. Multiple Query Transport Technique
d. Multiple Query Transport Technique
2. AMQP is designed for connecting:
a. Constrained networks
b. LANs and WANs
c. Systems and Business processes
d. None of these
3. Which modulation scheme is followed by IEEE 802.15.4 standard?
a. BPSK
b. QPSK
c. DSSS
d. All of these
4. Which CoAP message transfers response from the server within the acknowledgment
message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback
5. Collision prevention in 802.15.4 standard is provided by means of:
a. CSMA-CA
b. CSMA-CD
c. ALOHA
d. None of these

6. Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these
7. The basic unit of AMQP data is:
a. A frame
b. A packet
c. A byte
d. A bit
8. RPL supports:
a. Message confidentiality
b. Loop detection in the routes
c. Data path validation
d. All of these
9. Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these
10. LOADng routing uses:
a. AODV
b. DSDV
c. RIPv2
d. OSPF
Introduction to Internet of Things
Prof. Sudip Misra

Assignment 3

1. The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64
2. Channel hopping is performed at which HART layer?
a. Physical
b. Data link
c. Network
d. Application
3. This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these
4. The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
All of these
5. WASN stands for:
a. Wireless and Sensor networks
b. Wired and Sensor networks
c. Wireless Ad-hoc Sensor Networks
d. None of these
6. Class-2 Bluetooth devices have a range of:
a. 1m
b. 10m
c. 100m
d. 1000m
7. SOS in sensor web stands for
a. Sensor of a System
b. System of Sensors
c. Sensor Observation Service
d. None of these
8. Which topology is supported by Z wave:
a. Star
b. Mesh
c. Tree
d. All of these
9. QoS guarantees in WSNs include:
a. Offering guarantees in terms of bandwidth, delay, jitter
b. Offering guarantees in terms of packet loss probability.
c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF
channel characteristics.
d. All of these
10. The WSN nodes are prone to:
a. Malicious attacks
b. Eavesdropping
c. Interference
d. All of these
Introduction to Internet of Things
Prof. Sudip Misra

Assignment 4

1. With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage

2. A crossing with respect to WSN coverage is _______ if it is in the interior region of at


least one node’s coverage disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated
3. A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these
4. WMSNs stand for:
a. Wired Multimedia Sensor Networks
b. Wireless Multimedia Sensor Networks
c. Wireless Mobile Sensor Networks
d. Wireless Machine Sensor Network

5. UAV-VANETS link-up may be used for:


a. visual guidance
b. Data-muling
c. Coverage enhancement
d. All of these

6. M2M stands for:


a. MAC to MAC communication
b. Machine to MAC communication
c. Machine to machine communication
d. MAC to machine communication
7. In WSN area coverage problem, which is TRUE?
a. Energy-efficient random coverage
b. Connected random coverage
c. A network is connected if any active node can communicate with any other active
nodes
d. All of these
8. In a M2M ecosystem, Internet service providers:
a. Provide their infrastructures for M2M device communications.
b. are responsible for devices providing raw data.
c. is an individual or company what utilizes M2M applications.
d. None of these
9. With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these
10. High-end M2M nodes have:
a. Mobility
b. QoS guarantees
c. Low density deployment
d. All of these
Introduction to Internet of Things
Prof. Sudip Misra

Assignment 5

1. A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these

2. Why interoperability is required?


a. Heterogeneous wireless communication protocols
b. Different programming languages
c. Different control models
d. All of the above

3. What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)

4. Device interoperability problem is between


a. Two devices
b. A device and an user
c. Both (a) and (b)
d. None of the above
5. Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay

6. Which of the following is not a sensor?


a. Barometer
b. Light Dependent Resistor (LDR)
c. DHT
d. Relay

7. What is the servo library command to move the shaft of Servo motor back and forth across 180
degree?
a. Knob()
b. Sweep()
c. write()
d. detach()

8. The code written in Arduino IDE is referred to as:


a. Script
b. Block
c. Sketch
d. Arduino Script

9. Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()

10. Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these
Introduction to Internet of Things

Assignment 6

1. By default, the GPIO pins in Raspberry Pi are configured as?


a. Input except pins 14 and 15
b. Output except pins 14 and 15
c. Bcm
d. GPIO

2. Which of the following datatype is correct for the object below?


D = ['python', 3.43, 'p', 100]
a. Array
b. Dictionary
c. Tuple
d. List

3. What does the method readline() return:


a. One line
b. One byte
c. One character
d. Bool

4. What is the maximum peripheral current draw allowed in Raspberry pi 3?


a. 1200mA
b. 700mA
c. 500mA
d. 100mA

5. Data collected by Raspberry Pi from the sensor can be


a. Processed in Raspberry Pi
b. Sent to other devices connected to the network
c. Used to control/activate other devices in the network
d. All of the above

6. Relay is a kind of:


a. Sensor
b. Actuator
c. Hub
d. Router

7. What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN

8. Which of the following variants of Raspberry Pi has an inbuilt wi-fi?


a. Raspberry Pi 2
b. Raspberry Pi 3
c. Raspberry Pi A+
d. Raspberry Pi Zero

9. Internet of Things refers to:


a. Interconnection of devices in a network
b. Exchange of data between devices in a network
c. An ecosystem of devices, accessible through internet
d. All of the above

10. IoT devices must have:


a. A USB port
b. A unique identification
c. Wired connectivity
d. All of the above
Introduction to Internet of Things

Assignment 7

1. Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data centre
d. Cloud

2. The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen

3. Bind() function in Python socket programming is used to:


a. Specify the port for service on the specified host
b. Read data from the socket
c. Send data to the socket
d. Initiate the connection

4. Application program interface (API) used between data and control planes in SDN is
known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

5. When does a switch send PAKCET-IN message to a controller in SDN:


a. Flow-rule associated with a received flow does not exist
b. All the time
c. After deleting a flow-rule
d. None of the above

6. In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on OpenFlow protocol

7. One of the advantages of SDN-based sensor network is:


a. Real-time programmability
b. No need to replace any node
c. Both a & b
d. None of the above

8. Application program interface (API) used between application and control planes is
known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

9. An SDN Controller can be placed based on:


a. Hierarchical manner
b. Star-topology
c. Mesh topology
d. All of the above

10. Typically, ______________ protocol is used in low-rate wireless PANs:


a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above
Introduction to Internet of Things

Assignment 8

1. Using SDN, the following can be managed:


a. Network partition
b. Network matching
c. Load balancing
d. All of the above

2. From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources

3. Pre-configure facility for allocation of virtualized resources comes under


a. Availability and reliability
b. Scalability and elasticity
c. Manageability and interoperability
d. Measured Services

4. Service Management mainly focusses on


a. Importance to desired outcomes of customers
b. Importance to desired outcomes of organizations
c. Both (a) and (b)
d. none of the above

5. Broad network access in cloud deals with


a. Dynamic allocation for scale out
b. Recorded resource usage
c. Availability of cloud resources over the network
d. All of the above

6. Billing information is calculated using


a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above
7. Integrity in data security is :

a. Detecting unauthorized data modification


b. Sending secure data to cloud
c. Preserving the privacy of data
d. None of the above

8. CloudAnalyst provides
a. Support for large scale cloud applications
b. GUI based control
c. Flexible and repeatable environment
d. All of these

9. GreenCloud Simulator is designed based on


a. NS-3
b. NS-2
c. CloudSim
d. DCSim

10. Which of the following is not a cloud simulator?


a. CloudSim
b. NS-3
c. DCSim
d. GroudSim
Introduction to Internet of Things

Assignment 9

1. What is the purpose of floating IP in Openstack?


a. To connect the instance with the external network
b. To interconnect among instances
c. To connect among instances inside a same network
d. None of them

2. We normally take snapshot in Openstack, _______.


a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet

3. Sensor-Cloud deals with


a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these

4. Which of the following statement is true in sensor-cloud


a. End user procures sensors and lend these to sensor-cloud service provider
b. Sensor-cloud is based only on dumping the sensor data to the cloud
c. Single sensor nodes is shared dedicatedly with only one end user
d. None of these

5. What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above

6. Why data volume is a problem in IoT-based cloud computing?


a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume
of generated data is growing very fast
d. because IoT device density is decreasing each day and in turn the volume of
generated data are decreasing very fast

7. If the time-sensitive data are sent to cloud for analysis, the latency will be ________.
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased

8. What is a good approach to reduce latency?


a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes

9. What are less time-sensitive data?


a. Data which can be analyzed after seconds or minutes
b. Data which should be analyzed within fraction of a second
c. Data which can be wait for hours, days, weeks
d. Data which can be wait for months

10. How fog provide better privacy to industries and companies?


a. By providing the facility to store confidential data in their local servers
b. By providing more secure communication system
c. By providing a secured VPN network
d. All of the above
Introduction to Internet of Things

Assignment 10

1. Which of these can be considered as the skeleton for smart cities?


a. Buildings
b. Transportation
c. Banks
d. Sensors

2. Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors

3. Smart Agriculture incorporates:


a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
c. Both the above
d. None of these

4. Heterogeneity for IoT in smart cities stands for:


a. Integration of varying hardware platforms and specifications.
b. Integration of different radio specifications.
c. Integration of various software platforms.
d. All of these

5. Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks

6. Which of these connects cable-based networks with wireless networks for increased
sharing of media, control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi

7. Which of these is NOT a feature of VANETs?


a. High Dynamic Topology
b. High transmission and computation capability
c. Stable connectivity
d. Predictable mobility pattern

8. X-10 protocol is characterized by:


a. Low-speed and low data rate.
b. Low speed and high data rate
c. High speed and low data rate
d. High speed and high data rate

9. The V2X paradigm is not restricted to a single source information provider.


a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True

10. TCP/IP fails in V2X because:


a. TCP/IP is designed mainly for handling information exchange between a single
pair of entities.
b. Information exchanges in TCP/IP are dependent on the location of data.
c. TCP/IP can only identify the addresses of endpoints, which alone is not useful for
content distribution.
d. All of these
Introduction to Internet of Things

Assignment 11

1. Net metering depends on –


a. Energy consumed by the consumers and energy generated by the consumers
b. Energy consumed by the consumers and energy supplied back to the grid
c. Only energy consumed by the consumer
d. None of the above

2. Smart grid enables –


a. Distributed energy management
b. Centralized energy management
c. Both distributed and centralized energy management
d. None of these

3. Self-healing in smart grid can be done –


a. Dampening unwanted power oscillations
b. Avoiding unwanted flows of current through the grid
c. Rerouting power flows in order to avoid overloading in a transmission line
d. All of these

4. Full form of SANETs –


a. Sensors and Actions Networks
b. Sensors and Actuator Networks
c. Smart and Active Networks
d. None of these

5. Smart grid interface between the customer and the energy service provider –
a. Smart meter
b. DAU
c. Gateway
d. MDMS

6. IIoT is mainly focused on


a. Convenience of individuals
b. Efficiency, safety and security of operation and individuals.
c. Efficiency of the system.
d. Data security.

7. What is the key technology to enable V2V and V2R communication?


a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication

8. Zigbee is –
a. IEEE 802.15.4 protocol
b. IEEE 802.16.4 protocol
c. IEEE 802.11a protocol
d. None of these

9. What is the full form of PMU in smart grid?


a. Power management unit
b. Phasor measuring unit
c. Phasor-based micro-grid unit
d. None of these

10. What are the risks associated with IIoT?


a. Lack of vision and leadership
b. Cheap sensors
c. Confident workforce
d. Both cheap sensors and confident workforce
Introduction to Internet of Things

Assignment 12

1. Mathematical model, which represents the relationship between variables, is termed as –


a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above

2. If all the data points are same, statistical dispersion becomes –


a. 1
b. 10
c. 100
d. None

3. Why automated irrigation system is required for water management in agriculture field?
a. Save limited water resource
b. Precise water management
c. More yields with less water
d. All of the above

4. The characteristics of a sensor node are


a. Energy-efficiency
b. Distributed sensing
c. Low-cost
d. All of the above

5. What is the network topology of Ambusens WBAN devices


a. Bus topology
b. Star Topology
c. Mesh Topology
d. None of the above

6. Which communication protocol is used between sensor devices in Ambusens WBAN


system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1

7. IoT based remote healthcare monitoring is typically most useful for


a. people in urban areas
b. People without easy access to healthcare
c. both a and b
d. none of the above
8. Activity monitoring:
a. Provides better quality of life
b. Provides information accurately in a reliable manner
c. Provides continuous monitoring support.
d. All of these

9. Which of these sensors can be most appropriately used for activity monitoring in
wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED

10. In-place activity recognition is:


a. On the device
b. Power intensive
c. No network connection required
d. All of these

You might also like