Internet of Things MCQs

 1) ___________ is a device that provides application intelligence to the Internet.

A) Sensor B) Actuator C) Controller D) Camera

Correct Ans: Controller


2) The ___________ consumes more power when it is active, performing accelerated graphics.

A) GPU     B) CPU C) APU     D) FPGA

Correct Ans: GPU


3) ____________ is a binary protocol, and it does not support the encoding or decoding of content.

A) UPnp     B) MQTT C)CoAP     D) XMPP

Correct Ans: MQTT


4) __________ was originally designed for use in instant messaging applications (or chat).

A)UPnp     B)MQTT C) XMPP D) CoAP

Correct Ans: XMPP


5) ___________ library contains a data abstraction layer, and is a crucial tool for the efficient management of objects in the system.

A) Clayster.Library.Abstract         B) Clayster.Library.Installation

C) Clayster.Library.Meters             D) Clayster.AppServer.Infrastructure

Correct Ans: Clayster.Library.Abstract


6) The __________ and related tools must generate code suitable for the target platform.

A)Pulse Width Modulation B)libraries     C) cross-compiler D) ARM Platform

Correct Ans: cross-compiler


7) When program pwm is provided with command-line arguments, it simply sets up and starts the ______________ peripheral.

A)PWM     B)mmap()     C) cross-compiler     D) GPIO

Correct Ans: PWM


8) The __________ argument is the pixel-depth specification.

A) -depth 16 B) -geometry C) -pixel D) vncpasswd

Correct Ans:-depth 16


9) The Raspberry Pi includes a ________ pin strip identified as P1, which exposes GPIO pins.

A) 12x2 B)13x2 C) 14x2 D)  15x2

Correct Ans: 13X2


10) The Raspberry Pi has a __________ interface to allow it to perform serial data communications.

A) UART B) GPIO C) I2C D) SPI

Correct Ans: UART


11) The _________ operates at a fixed speed within Raspbian Linux.

A)SPI bus     B)I2C bus     C)both A & B     D)none of these 

Correct Ans: I2C bus


12) __________ communication involves transmitting data while simultaneously receiving data.

A) SPI B) I2C C) both A & B D)none of these

Correct Ans: SPI


13) To gain access to a system is to try and impersonate a server component in a system instead of a client. This is often referred to as a ____________ attack.

A) MITM B) DoS C) M2M D) IoT

Correct Ans: MITM


14) ___________ only permits messages from accepted friends.

A) CoAP     B) XMPP C) MQTT     D) HTTP

Correct Ans: XMPP


15) A method that is often used to protect unsecured solutions on the Internet is to protect them using _____________.

A) CoAP     B) SASL C) PKI D) VPNs

Correct Ans: VPNs


16) The pseudo file ____________ provides us with information about memory utilization.

A) /proc/meminfo     B) /vm/overcommit_ratio     C) -lpthread     D) pthread_create

Correct Ans: /proc/meminfo


17) The ____________ line indicates the total amount of memory available, minus a few reserved binary regions.

A) meminfo     B) MemTotal     C) MemFree     D) Buffers

Correct Ans: MemTotal


18) The ___________ memory value represents recently used memory that is not reclaimed, unless absolutely necessary.

A) Active B) Inactive C) SwapCached D) SwapTotal

Correct Ans: Active


19) All SD cards start with one data bit line until the capabilities of the _______________ are known.

A)hardware     B) data bus     C) memory card     D) All of these

Correct Ans: memory card


20) To determine the physical block size used under Raspbian, we first discover how the ___________ system is mounted.

A) root file     B) boot file     C) system file     D) binary file

Correct Ans: root file


Comments