Internet of Things MCQs
1) ___________ is a device that provides application intelligence to the Internet.
A) Sensor B) Actuator C) Controller D) Camera
Correct Ans: Controller
2) The ___________ consumes more power when it is active, performing accelerated graphics.
A) GPU B) CPU C) APU D) FPGA
Correct Ans: GPU
3) ____________ is a binary protocol, and it does not support the encoding or decoding of content.
A) UPnp B) MQTT C)CoAP D) XMPP
Correct Ans: MQTT
4) __________ was originally designed for use in instant messaging applications (or chat).
A)UPnp B)MQTT C) XMPP D) CoAP
Correct Ans: XMPP
5) ___________ library contains a data abstraction layer, and is a crucial tool for the efficient management of objects in the system.
A) Clayster.Library.Abstract B) Clayster.Library.Installation
C) Clayster.Library.Meters D) Clayster.AppServer.Infrastructure
Correct Ans: Clayster.Library.Abstract
6) The __________ and related tools must generate code suitable for the target platform.
A)Pulse Width Modulation B)libraries C) cross-compiler D) ARM Platform
Correct Ans: cross-compiler
7) When program pwm is provided with command-line arguments, it simply sets up and starts the ______________ peripheral.
A)PWM B)mmap() C) cross-compiler D) GPIO
Correct Ans: PWM
8) The __________ argument is the pixel-depth specification.
A) -depth 16 B) -geometry C) -pixel D) vncpasswd
Correct Ans:-depth 16
9) The Raspberry Pi includes a ________ pin strip identified as P1, which exposes GPIO pins.
A) 12x2 B)13x2 C) 14x2 D) 15x2
Correct Ans: 13X2
10) The Raspberry Pi has a __________ interface to allow it to perform serial data communications.
A) UART B) GPIO C) I2C D) SPI
Correct Ans: UART
11) The _________ operates at a fixed speed within Raspbian Linux.
A)SPI bus B)I2C bus C)both A & B D)none of these
Correct Ans: I2C bus
12) __________ communication involves transmitting data while simultaneously receiving data.
A) SPI B) I2C C) both A & B D)none of these
Correct Ans: SPI
13) To gain access to a system is to try and impersonate a server component in a system instead of a client. This is often referred to as a ____________ attack.
A) MITM B) DoS C) M2M D) IoT
Correct Ans: MITM
14) ___________ only permits messages from accepted friends.
A) CoAP B) XMPP C) MQTT D) HTTP
Correct Ans: XMPP
15) A method that is often used to protect unsecured solutions on the Internet is to protect them using _____________.
A) CoAP B) SASL C) PKI D) VPNs
Correct Ans: VPNs
16) The pseudo file ____________ provides us with information about memory utilization.
A) /proc/meminfo B) /vm/overcommit_ratio C) -lpthread D) pthread_create
Correct Ans: /proc/meminfo
17) The ____________ line indicates the total amount of memory available, minus a few reserved binary regions.
A) meminfo B) MemTotal C) MemFree D) Buffers
Correct Ans: MemTotal
18) The ___________ memory value represents recently used memory that is not reclaimed, unless absolutely necessary.
A) Active B) Inactive C) SwapCached D) SwapTotal
Correct Ans: Active
19) All SD cards start with one data bit line until the capabilities of the _______________ are known.
A)hardware B) data bus C) memory card D) All of these
Correct Ans: memory card
20) To determine the physical block size used under Raspbian, we first discover how the ___________ system is mounted.
A) root file B) boot file C) system file D) binary file
Correct Ans: root file
Comments
Post a Comment