Explore topic-wise MCQs in Internet of things (IoT).

This section includes 254 Mcqs, each offering curated multiple-choice questions to sharpen your Internet of things (IoT) knowledge and support exam preparation. Choose a topic below to get started.

151.

The _______ field in the SNMP PDU is an offset that points to the variable in error.

A. community
B. enterprise
C. error index
D. none of the above
Answer» D. none of the above
152.

The first phase of JPEG is ___________.

A. DCT transformation
B. quantization
C. data compression
D. none of the above
Answer» B. quantization
153.

The _______ data types are atomic data types.

A. structure
B. simple
C. both a and b
D. none of the above
Answer» C. both a and b
154.

_______ is a standard to allow telephones on the public telephone network to talk to computers connected to the Internet.

A. SIP
B. H.323
C. Q.991
D. none of the above
Answer» C. Q.991
155.

In File Transfer Protocol (FTP), while the control connection is open, the data connection can be opened and closed

A. One time
B. Several Times
C. Not even Once
D. None of the given
Answer» D. None of the given
156.

Jitter is introduced in real-time data by the _______________.

A. error caused during transmission
B. delay between packets
C. both a and b
D. none of the above
Answer» C. both a and b
157.

___________ audio/video refers to the broadcasting of radio and TV programs through the Internet.

A. Interactive
B. Streaming live
C. Streaming stored
D. none of the above
Answer» C. Streaming stored
158.

Using POP3, the e-mails are stored at .................

A. Users’ PC
B. Router
C. Gateway
D. Server
Answer» B. Router
159.

A file is being transferred. The time required actually is 6- hours. The mean time between crashes is 2-hours. The time required for the transfer is hours if synchronization is not provided.

A. 12 hours
B. 3 hours
C. Zero hours
D. Infinite
Answer» E.
160.

____________ is used to compress video.

A. MPEG
B. JPEG
C. either a or b
D. none of the above
Answer» B. JPEG
161.

At the beginning of the Internet era, the messages sent by electronic mail were short and consisted of

A. Images Only
B. Strings only
C. Text Only
D. Numbers Only
Answer» D. Numbers Only
162.

An SNMP agent can send _______ messages.

A. Response
B. GetRequest
C. SetRequest
D. none of the above
Answer» B. GetRequest
163.

____________ is used to compress images.

A. MPEG
B. JPEG
C. either a or b
D. none of the above
Answer» C. either a or b
164.

We can compare the task of network management to the task of writing a program. Both tasks have actions performed by statements. In network management this is handled by _______.

A. SMNP
B. MIB
C. SMI
D. none of the above
Answer» B. MIB
165.

The _______ field in the SNMP PDU consists of a sequence of variables and their corresponding values.

A. version
B. community
C. VarBindList
D. none of the above
Answer» D. none of the above
166.

To distinguish data from control characters, each sequence of control characters is preceded by a special control character called ________.

A. ICA
B. IAC
C. AIC
D. none of the above
Answer» C. AIC
167.

RTCP uses an odd-numbered _______ port number that follows the port number selected for RTP.

A. UDP
B. TCP
C. both a and b
D. none of the above
Answer» B. TCP
168.

___________ is a protocol for controlling the flow and quality of data.

A. RTP
B. RTCP
C. UDP
D. none of the above
Answer» C. UDP
169.

The command of End-of-File in the UNIX operating system is

A. Ctrl+E
B. Ctrl+v
C. Ctrl+u
D. Ctrl+d
Answer» E.
170.

When the sender and the receiver of an e-mail are on the same system, we need only two

A. IP
B. Domain
C. Servers
D. User Agents
Answer» E.
171.

To define the data type, SMI uses fundamental _______ definitions and adds some new definitions.

A. AMS.1
B. ASN.1
C. ASN.2
D. none of the above
Answer» C. ASN.2
172.

The chunk of information at the application layer is called

A. Packet
B. Message
C. Segment
D. Frame
Answer» C. Segment
173.

What is the port number for Gopher services?

A. 23
B. 70
C. 80
D. 71
Answer» C. 80
174.

In EMAIL, We need two VAs and two pairs of MTAs, When the sender is connected to the mail server via

A. MTA and VTA
B. LAN and WAN
C. IP and TCP
D. Host and IP
Answer» C. IP and TCP
175.

What is the port number of the SMTP ?

A. 25
B. 23
C. 20/21
D. 27960
Answer» B. 23
176.

The Response PDU is sent from the ______ to the ______ in response to GetRequest or GetNextRequest.

A. server; client
B. client; server
C. network; host
D. none of the above
Answer» B. client; server
177.

We can compare the task of network management to the task of writing a program. Both tasks need variable declarations. In network management this is handled by _________.

A. SMNP
B. MIB
C. SMI
D. none of the above
Answer» C. SMI
178.

Protocol used for electronic mail?

A. TELNET
B. NNTP
C. HTTP
D. SMTP
Answer» E.
179.

If the sender wants to enable an option, it sends a _______ command.

A. WILL
B. DO
C. WONT
D. none of the above
Answer» B. DO
180.

Real-time traffic needs the support of ____________.

A. broadcasting
B. multicasting
C. both a and b
D. none of the above
Answer» C. both a and b
181.

RTP uses a temporary even-numbered _______ port.

A. UDP
B. TCP
C. both a and b
D. none of the above
Answer» B. TCP
182.

What is the port number of the HTTP ?

A. 80
B. 25
C. 23
D. 20/21
Answer» B. 25
183.

When there is more than one source, the _______ identifier defines the mixer.

A. synchronization source
B. contributor
C. timestamp
D. none of the above
Answer» B. contributor
184.

Example of command-driven user agents are

A. mail
B. pine
C. elm
D. All of them
Answer» E.
185.

A _______ changes the format of a high-bandwidth video signal to a lower quality narrow-bandwidth signal.

A. timestamp
B. sequence number
C. translator
D. none of the above
Answer» D. none of the above
186.

The program that accepts the commands for composing, receiving and replying to messages, as well as for manipulating mail boxes is .....................

A. user agent
B. browser agent
C. message transfer agent
D. server agent
Answer» B. browser agent
187.

FTP copies a file from

A. node to node
B. one host to another
C. from servers
D. one network to other
Answer» C. from servers
188.

An RTP packet is encapsulated in _______.

A. a UDP user datagram
B. a TCP segment
C. an IP datagram
D. none of the above
Answer» B. a TCP segment
189.

A __________on each packet is required for real-time traffic.

A. timestamp
B. sequence number
C. both a and b
D. none of the above
Answer» D. none of the above
190.

TELNET uses only one TCP connection. The server uses ________ port and the client uses ________ port.

A. a well-known; another well-known
B. an ephemeral; another ephemeral
C. a well-known; an ephemeral
D. none of the above
Answer» D. none of the above
191.

File Transfer Protocol (FTP), uses the well-known port 21 is used for the control connection and port 20 for the

A. Data Rate
B. Data Connection
C. Data Protocol
D. Data Congestion
Answer» C. Data Protocol
192.

The third phase of JPEG is ___________.

A. DCT transformation
B. quantization
C. data compression
D. none of the above
Answer» D. none of the above
193.

___________ is an application protocol that establishes, manages, and terminates a multimedia session.

A. RIP
B. SIP
C. DIP
D. none of the above
Answer» C. DIP
194.

When the sender and the receiver of an e-mail are on different systems, we need two VAs and a pair of

A. MTA
B. VTA
C. IP
D. TCP
Answer» B. VTA
195.

The correct syntax for accessing the telnet is

A. telnet//www.example.com
B. telnet:www.example.com
C. telnet://www.example.com
D. telnet www.example.com
Answer» D. telnet www.example.com
196.

This is an application protocol that uses the Internet's TCP/IP protocols to transfer Web page files to a server. It's also used to download programs and other files from a server to your computer.

A. FTP
B. HTTP
C. DNS
D. Telnet
Answer» B. HTTP
197.

_______ allows you to connect and login to a remote computer.

A. Telnet
B. FTP
C. HTTP
D. None of the mentioned
Answer» B. FTP
198.

Which one of the following is not correct regarding telent?

A. telnet is a general purpose client-server program
B. telnet lets user access an application on a remote computer
C. telnet can also be used for file transfer
D. none of the mentioned
Answer» D. none of the mentioned
199.

Which of the following is/are Protocols of Application layer?

A. FTP
B. DNS
C. Telnet
D. All of above
Answer» E.
200.

If 5 files are transferred from server A to client B in the same session. The number of TCP connection between A and B is

A. 5
B. 10
C. 2
D. 6
Answer» E.