IOT

MCQs on " IOT": Find the multiple choice questions on " IOT", frequently asked for all competitive examinations.

The IoT(Internet of Things) is impacting the lifestyle of everyone, from the way one reacts and behaves. Air conditioners, smartphones, Smart Cars, and the Smartwatch are some examples of IoT used in daily life. IoT is a massive network of devices that are connected with each other. These devices collect and transmit data about the environment in which they are used and how they are operated. 

It is done using the sensors implanted in every physical device. These sensors constantly transfer data about the operating condition of the devices.

IoT provides a common medium for all these devices to communicate and share their data. Data is transferred from different sensors to the IoT platform security. IoT platform combines the assembled data from the sources and performs analytics on the data. Valuable information is collected and transferred to other devices to improve and provide a better experience.

The IoT(Internet of Things) is impacting the lifestyle of everyone, from the way one reacts and behaves. Air conditioners, smartphones, Smart Cars, and the Smartwatch are some examples of IoT used in daily life. IoT is a massive network of devices that are connected with each other. These devices collect and transmit data about the environment in which they are used and how they are operated. It is done using the sensors implanted in every physical device. These sensors constantly transfer data about the operating condition of the devices. IoT provides a common medium for all these devices to communicate and share their data. Data is transferred from different sensors to the IoT platform security. IoT platform combines the assembled data from the sources and performs analytics on the data. Valuable information is collected and transferred to other devices to improve and provide a better experience.

MCQs

1. What is the full form of IANA?

    1. Internal Assessment Numerical Access
    2. Internet Association Numbers Authority
    3. International Aid For Network Automation
    4. Internet Assigned Numbers Authority

Answer:- D

2. IoT stands for:

    1. Internet of Tech
    2. Incorporation of Things
    3. Internet of Things
    4. Incorporation of Technology

Answer:- C

3. Which of the following can not be considered an IoT device?

    1. Smartwatch
    2. Andriod Phone
    3. Laptop
    4. Tubelight

Answer:- D

4. Which is not an IoT platform?

    1. Xiaomi Cloud
    2. GoogleCloud 
    3. Myntra
    4. AWS(Amazon Web Services)

Answer:- C

Explanation: AWS, Google Cloud, and Xiaomi Cloud deliver cloud computing IoT services. But Myntra is an e-commerce website that supplies goods.

5. Which of the following can not be considered an IoT device?

    1. Smartwatch
    2. Andriod Phone
    3. Laptop
    4. Tubelight

Answer:- D

6. IoT is based on ______ technology.

    1. Hardware
    2. Software
    3. None
    4. Both of these

Answer:- D

7. What is the standard form of RFID?

    1. Radio Frequency Identification
    2. Radio Waves Frequency Identification
    3. Radio Frequency InterDependent 
    4. Radio Wave Frequency Independent

Answer:- A

8. What is considered the standard length for a MAC Address?

    1. 8 bits
    2. 32 bits
    3. 48 bits
    4. None of these

Answer:- C

9. What “bit” represents the address bit in the control register?

    1. MML
    2. ML
    3. MX
    4. MM

Answer:- C

10. What is mandatory for an IP Packet to contain?

    1. Destination IP Address
    2. Source IP Address
    3. Both of these
    4. None of these

Answer:- C

Explanation: Each IP Packet must contain source and destination IP addresses.

11. At which level does the router operate in the OSI reference model?

    1. Data Link
    2. Network
    3. Physical
    4. None of these

Answer:- B

12. What is an IoT network?

    1. a collection of networked devices
    2. a collection of Interconnected devices
    3. a collection of signalled devices
    4. None of the above

Answer:- B

Explanation:  IoT is a massive network of devices that are connected with each other. These devices collect and transmit data to each other.

13. Full form of MQTT?

    1. Message Queue Telemetry Transport
    2. Messanger Queue Telemetry Transport
    3. Message Queuery Telemetry Transport
    4. None of these

Answer:- A

14. Full-Form of VNC: 

    1. Virtual network of computers
    2. Very network of computers
    3. Virtual network for communication
    4. Virtual network computing

Answer:- D

15. What is the java extension file used in IoT?

    1. .jar
    2. .obj
    3. .cpp
    4. .exe

Answer:-A

16. Which one out of these is not a Data Link Layer Technology?

    1. Bluetooth
    2. Wifi
    3. HTTP
    4. Mobile Hotspot

Answer:- C

17. What is the standard form of LLN?

    1. Lower Lossy Network
    2. Low Power Lossy Network
    3. Lossy Low Power Network
    4. Low Lossy Powered Network

Answer:- B

18. What type of interface is used by fingerprint sensors to collect data?

    1. IPI interface
    2. UART interface
    3. I2P interface
    4. None

Answer:- B

19. How many wires does the SPI protocol use?

    1. 3
    2. 4
    3. 2
    4. More than 4

Answer:- B

20. Which of the following things is mandatory for the IoT gateway to provide?

    1. Simple and secure installation
    2. Data network and storage
    3. Software Security
    4. Protocol abstraction

Answer:- D

Explanation: An IoT gateway must provide a few things like Protocol abstraction, Computing, I/O performance, and Integration communication capability to enhance the security of the user.

21. In which of the following way, data is associated with an IoT device:

    1. Internet
    2. Network connection
    3. Cables
    4. Cloud

Answer:- D

22. Full form of HART:

    1. Highway Address Remote Transmitter
    2. Highway Addressable Remote Transducer
    3. Highway Addressable Router Transmitter
    4. Highway Address Remote Transmitter

Answer:- B

23. Full form of LPWAN:

    1. Low Power Wide Area Network
    2. Lower Power Wide Area of Network
    3. Low Protocol Wide Area of Network
    4. Long Protocol Wider Area Network

Answer:- A

24. What do API systems enable?

    1. Networks service portability is allowed by API
    2. Systems service portability is allowed by API
    3. Device service portability is allowed by API
    4. All of these

Answer:- B

Explanation: API systems enable the portability of Systems Service.

25. What do RETful API systems allow the user?

    1. to enhance security
    2. to modify communication capability
    3. to control electronic components
    4. All of these

Answer:- C

26. In IoT, does the _____ layer help in end-to-end communication?

    1. security
    2. transport
    3. data communication
    4. logical

Answer:- B

Explanation: The transport layer is used to provide end-to-end communication in IoT.

27. LTE stands for:

    1. Long Terminal evolution
    2. Lower Terminal evolution
    3. Long Term evolution
    4. None

Answer:- C

28. Many-Valued Logic is formed because of:

    1. binary logic
    2. Hexa logic
    3. fuzzy logic
    4. All of these

Answer:- C

29. The collection of ____ that connects several devices is called the bus.

    1. network
    2. lines
    3. cables
    4. None of these

Answer:- B

Explanation: A collection of lines that connects several devices is called bus.

30. ____ is a security mechanism used in WiFi.

    1. WPA
    2. HTTP
    3. MLA
    4. None of these

Answer:- A

31. The main purpose of the web of things(WoT) in IoT is:

    1. to increase the cost
    2. to improve security
    3. to improve the usability and interoperability
    4. All of these

Answer:- C

Explanation: Web of things(WoT) is used to improve the usability and interoperability of IoT.

32. The storage is _____ in IoT.

    1. limited
    2. unlimited
    3. not available
    4. All of these

Answer:- A

Explanation: The storage in IoT is very limited.

33. At what rate can NFC transmit data?

    1. 424 Kbps
    2. 1106 Kbps
    3. 216 Kbps
    4. All of these

Answer:- D

Explanation: The NFC can transfer data at any speed of either 212, 1106, or 424 Kbps.

34. The standard form of ICT is:

    1. Inter Connected Technology
    2. International Connection Technology
    3. Inter Communication Technology
    4. Information and Communication Technology

Answer:- D

35. Which of the following uses Java Language?

    1. GSN
    2. MMQT
    3. GAN
    4. None of these

Answer:- A

Explanation:  GSN(Global Sensor Network) uses Java as it is more portable than other languages like C++, Python, etc.

36. Domain Name System is used to:

    1. provide system security
    2. enhance network communication
    3. increase data and speed
    4. obtain IP Address

Answer:- D

37. The standard form of CGI is:

    1. Common Gateway of Interest
    2. Common Gate Interfere
    3. Common Gateway Interdependent
    4. None

Answer:- D

Explanation:  CGI stands for Common Gateway Interface.

38. Which of the following is not a short-range wireless network?

    1. Bluetooth
    2. VPN
    3. Wifi
    4. Hotspot

Answer:- B

Explanation:  Those wireless networks having a short-range like Bluetooth and Wifi are called short-range wireless networks. These are suitable for working in the local environment.

39. A _____ is the component that executes a program in an IoT system.

    1. micro converter
    2. microcontroller
    3. microsensor
    4. None

Answer:- B

Explanation:  A Microcontroller is a component that executes a program in an IoT system. It consists of a command unit, storage memory, timers, etc., that are used to handle the execution of a program.

40. Which of the following is not LPWAN Technologies?

    1. LORA
    2. SIGFOX
    3. NB-IoT
    4. Bluetooth

Answer:- D

41. With two-factor Authentication, which attack can be users vulnerable to?

    1. Ransome ware Attack
    2. Man-in-the-middle attack
    3. Cross Attack
    4. Radiant Attack

Answer:- B

Explanation: Users may be vulnerable to a man-in-the-middle attack even after two-factor authentication. 

42. Which one out of these is in a format which is not readable by the user?

    1. Encryption
    2. Passwords
    3. .text
    4. None of these

Answer:- A

Explanation:  Encryption is converting data into a specific form that is unreadable to any other user.