Welcome to your I.O.T. Set - 3Read this before do Start Exam: 1- There are 25 Questions and complete it within 30 Minutes. 2- For Best Experience download our Android App from Google Play Store.परीक्षा शुरू करने से पहले इसे पढ़ें: 1- 25 प्रश्न हैं और इसे 30 मिनट के भीतर पूरा करें। 2- बेहतरीन अनुभव के लिए Google Play Store से हमारा Android ऐप डाउनलोड करें।Download App Now 1. Domain Name System is used to: provide system security increase data and speed obtain IP Address enhance network communication None 2. At which level does the router operate in the OSI reference model? Network Physical Data Link None of these None 3. Which library is used to access I2C in Arduino IoT devices? Wire EEPROM ArduinoJson DHT11 None 4. What is the use of PWM signals in IoT development boards? They are used by actuators to have digital input They are used by sensors to have analog input They are used by sensors to have digital input They are used by actuators to have analog input None 5. The father of IOT. Kevin Thomas Kevin Atrhur Kevin Atrun Kevin Ashton None 6. Which of the following is not LPWAN Technologies? NB-IoT LORA Bluetooth SIGFOX None 7. What is the java extension file used in IoT? .obj .exe .jar .cpp None 8. Which of the following is true about Arduino IoT devices? They can only read analog inputs They have their own operating systems They are open-source hardware They are open-source software None 9. The standard form of CGI is: Common Gateway Interdependent Common Gateway of Interest Both A & B None of these None 10. What type of interface is used by fingerprint sensors to collect data? UART interface I2P interface IPI interface Both B & C None 11. Which one out of these is not a Data Link Layer Technology? Wifi HTTP Bluetooth Mobile Hotspot None 12. Which of the following is not a feature of the Raspberry PI model B IoT device? It has 526 MB SDRAM It has 652 MB SDRAM It has an Ethernet port It has 256 MB SDRAM None 13. How many number of elements in the Open IoT Architecture? 7 elements 6 elements 3 elements 8 elements None 14. With two-factor Authentication, which attack can be users vulnerable to? Radiant Attack Cross Attack Ransome ware Attack Man-in-the-middle attack None 15. What is the standard form of LLN? Low Lossy Powered Network Lower Lossy Network Low Power Lossy Network Lossy Low Power Network None 16. Which one out of these is in a format which is not readable by the user? Passwords .text Encryption None of these None 17. _____ is the component that executes a program in an IoT system. microcontroller microsensor micro converter None None 18. Full form of MQTT? Message Queuery Telemetry Transport Message Quetion Type Technique Message Queue Telemetry Transport Message Quetion Type Transport None 19. What is an IoT network? a collection of networked devices a collection of Interconnected devices All of the above None 20. Full-Form of VNC: Very network of computers Virtual network computing Virtual network of computers Virtual network for communication None 21. Which of the following is not a short-range wireless network? VPN Bluetooth Hotspot Wifi None 22. Which of the following uses Java Language? MMQT GAN GSN None of these None 23. Which of the following is used to reprogram a Bootloader in IoT devices? ICSP VHDL programming MANET IDE None 24. Which of the following processor is used in the Raspberry PI 3 IoT device? Broadcom BCM2837 Intel 8085 Broadcom BCM2711 None of these None 25. IoT-A stands for ________ Internet of Things Area Internet of Things Address Internet of Things Architecture Industrial of things Architecture None Share this:TweetEmailTelegramPrintWhatsAppLike this:Like Loading...Related Posts (You May Also Read):