MCQOPTIONS
Saved Bookmarks
This section includes 259 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 51. |
ROSTOPIC uses at the command line for representing the content of the message. |
| A. | yaml_syntax |
| B. | rostopic bw |
| C. | rostopic delay |
| D. | rostopic echo |
| Answer» B. rostopic bw | |
| 52. |
The message is sent to the input queue of a message flow that contains a _ |
| A. | subscriber |
| B. | server |
| C. | publication node |
| D. | client |
| Answer» E. | |
| 53. |
Publish command message is sent from |
| A. | only publisher to broker |
| B. | only broker to publisher |
| C. | publisher to broker and broker topublisher |
| D. | server to client |
| Answer» D. server to client | |
| 54. |
Do we run our program in the same computer wherewe have written? |
| A. | true |
| B. | false |
| C. | may or maynot |
| D. | cannot bedetermined |
| Answer» D. cannot bedetermined | |
| 55. |
Command is used to retrieve the latest dweetmade for our thing |
| A. | http |
| B. | httpie |
| C. | curl |
| D. | restful api |
| Answer» C. curl | |
| 56. |
A program written with the IDE for Arduino is called |
| A. | ide source |
| B. | sketch |
| C. | cryptography |
| D. | source code |
| Answer» C. cryptography | |
| 57. |
Arduino shields are also called as |
| A. | extra peripherals |
| B. | add on modules |
| C. | connectivity modules |
| D. | another arduinos |
| Answer» C. connectivity modules | |
| 58. |
Which instruction set architecture is used in RaspberryPi? |
| A. | x86 |
| B. | msp |
| C. | avr |
| D. | arm |
| Answer» E. | |
| 59. |
What is the range of microSD card that is connectedexternally? |
| A. | 16gb |
| B. | 32gb |
| C. | 8gb |
| D. | 64gb |
| Answer» C. 8gb | |
| 60. |
The 10/100Mbit Ethernet support enables the board toconnect to |
| A. | lan |
| B. | man |
| C. | wan |
| D. | wlan |
| Answer» B. man | |
| 61. |
Communication between and is encrypted for security. |
| A. | cloud and device |
| B. | end user and data center |
| C. | network and device |
| D. | cloud and network |
| Answer» C. network and device | |
| 62. |
The availability of is the cloud services provider who will host video and data for end users. |
| A. | devices |
| B. | memory |
| C. | security system |
| D. | objects |
| Answer» D. objects | |
| 63. |
SLA stands for |
| A. | service level agreement |
| B. | security level agreement |
| C. | system local area |
| D. | service local area |
| Answer» B. security level agreement | |
| 64. |
There are efficiency gains from all sorts of equipment. |
| A. | implementat ion |
| B. | analogous |
| C. | evolution |
| D. | digitization |
| Answer» E. | |
| 65. |
Number of pins in 8051 microcontroller with package. |
| A. | 40 pin withllc |
| B. | 60 pinwith qfp |
| C. | 40 pin withdip |
| D. | 60 pin withqfp |
| Answer» D. 60 pin withqfp | |
| 66. |
In an object of type Thread in the namespace System.Threading represents and controls one thread. |
| A. | . py |
| B. | .sap |
| C. | .net |
| D. | .exe |
| Answer» D. .exe | |
| 67. |
. ENOB stands for |
| A. | effective no of bits |
| B. | effective no of bytes |
| C. | efficient no of bits |
| D. | efficient no of bytes |
| Answer» B. effective no of bytes | |
| 68. |
Using which customized endpoint will be accessed overHTTP? |
| A. | id andenabled |
| B. | enabled |
| C. | sensitive |
| D. | id |
| Answer» E. | |
| 69. |
should be added to start the existing actuators in boot. |
| A. | spring-boot- actuator |
| B. | sprint-actuator- boot |
| C. | boot-spring- actuator |
| D. | actuator- spring-boot |
| Answer» B. sprint-actuator- boot | |
| 70. |
enables production-ready feature to thespring boot application. |
| A. | actuators |
| B. | endpoint |
| C. | boot |
| D. | hyper media |
| Answer» B. endpoint | |
| 71. |
AIDC stands for |
| A. | data carriers |
| B. | carriers |
| C. | computing |
| D. | device carriers |
| Answer» B. carriers | |
| 72. |
is prototyping and testing a scalable.Secure Distribution Tolerant Mesh Network to protect strategic military assets. |
| A. | spanar |
| B. | spawar |
| C. | apwanr |
| D. | spanar |
| Answer» C. apwanr | |
| 73. |
Fog computing can be perceived in and |
| A. | big data and cloud systems |
| B. | big data and iot |
| C. | cloud systems and iot |
| D. | big data, cloud systems and iot |
| Answer» B. big data and iot | |
| 74. |
Supplementary platforms in the architecture providesupport for these services. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 75. |
IoT promotes the creation of IoT terminal industry |
| A. | devices |
| B. | network |
| C. | clusters |
| D. | things |
| Answer» D. things | |
| 76. |
The core element is operated by |
| A. | paas |
| B. | iotservice provider |
| C. | saas |
| D. | iaas |
| Answer» C. saas | |
| 77. |
The core element of architecture of smart city is |
| A. | mobile unified service |
| B. | urban application platform |
| C. | management center |
| D. | integrated information provider |
| Answer» E. | |
| 78. |
An IoT center is envisaged as an important part of the generic IoT platform to unify the organization. |
| A. | individual information |
| B. | individual integration |
| C. | integrated information |
| D. | individual and integrated information |
| Answer» D. individual and integrated information | |
| 79. |
. The use of RFID in product logistics may realizeautomatic acquisition of logistics information. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 80. |
In order to improve their competitiveness and services assurance, the require independently fundedIoT projects. |
| A. | egovermnent related |
| B. | enterprise-based |
| C. | company based |
| D. | business orientedplatform |
| Answer» C. company based | |
| 81. |
ITS stands for |
| A. | internet travel services |
| B. | internet transportat ion security |
| C. | intelligent transportation security |
| D. | intelligent transportation services |
| Answer» E. | |
| 82. |
The IoT platforms are mainly divided into how manytypes |
| A. | 3 types |
| B. | 5 types |
| C. | 4 types |
| D. | 2 types |
| Answer» D. 2 types | |
| 83. |
IoT is a paradigm that involves ubiquitous presence inthe environment |
| A. | true |
| B. | false |
| Answer» B. false | |
| 84. |
a cellular network is expensive, especially withmany IoT devices. |
| A. | signaling |
| B. | security |
| C. | bandwidth |
| D. | powerconsumption |
| Answer» D. powerconsumption | |
| 85. |
Which challenge comes when we use many devices onthe same network? |
| A. | signaling |
| B. | security |
| C. | presencedetection |
| D. | powerconsumption |
| Answer» E. | |
| 86. |
gives an exact, up to the second state of alldevices on a network. |
| A. | signaling |
| B. | security |
| C. | presencedetection |
| D. | powerconsumption |
| Answer» D. powerconsumption | |
| 87. |
Which challenge comes under IoT devices, reliablebidirectional signaling. |
| A. | signaling |
| B. | security |
| C. | presencedetection |
| D. | powerconsumption |
| Answer» B. security | |
| 88. |
in IoT as one of the key characteristics, devices have different hardware platforms andnetworks. |
| A. | sensors |
| B. | heterogeneity |
| C. | security |
| D. | connectivity |
| Answer» C. security | |
| 89. |
Provide the means to create capability that reflects true awareness of the physical world and people. |
| A. | sensors |
| B. | b)heterogene ity |
| C. | security |
| D. | connectivity |
| Answer» B. b)heterogene ity | |
| 90. |
The collection of data is achieved with changes. |
| A. | intelligence |
| B. | b)connectivit y |
| C. | dynamic nature |
| D. | enormous scale |
| Answer» D. enormous scale | |
| 91. |
empowers IoT by bringing together everyday objects. |
| A. | intelligence |
| B. | b)connectivit y |
| C. | dynamic nature |
| D. | enormous scale |
| Answer» C. dynamic nature | |
| 92. |
The original IEEE 802 MAC addresscomes from |
| A. | mac address |
| B. | ip address |
| C. | ethernetaddress |
| D. | http |
| Answer» D. http | |
| 93. |
IEEE standards for Institute of Electricaland Electronics Engineers. |
| A. | false |
| B. | true |
| Answer» C. | |
| 94. |
On wireless networks filtering isthe security measure. |
| A. | oui |
| B. | ip |
| C. | nic |
| D. | mca |
| Answer» E. | |
| 95. |
MAC addresses are very useful indiagnosing network issues. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 96. |
Number of approaches gateway can beinstalled? |
| A. | 2 approaches |
| B. | 3 approaches |
| C. | 2 approaches |
| D. | 2 approaches |
| Answer» C. 2 approaches | |
| 97. |
Gateway software should be smartenough to handle |
| A. | gps |
| B. | message |
| C. | logging |
| D. | sensors |
| Answer» D. sensors | |
| 98. |
Does IOT gateway provide security for thenetwork. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 99. |
Sensors provide data per second. |
| A. | hundreds of hundreds of data |
| B. | hundreds of thousands of data |
| C. | tens of hundreds of data |
| D. | tens of thousands of data |
| Answer» E. | |
| 100. |
Gateway provides the connection between and |
| A. | cloud and controller |
| B. | network andcloud |
| C. | network andcontroller |
| D. | controller anddevice |
| Answer» B. network andcloud | |