Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. Which axis accelerometer is mostly used in IOT?
a) 2- axis
b) 3- axis
c) 1- axis
d) Combination of all

View Answer

Answer: b [Reason:] It uses 3-axis accelerometer. It detect orientation, shake, tap, double tap, fall, tilt, motion, positioning, shock or vibration.

2. Accelerometer is the measurement of ________
a) Velocity/time
b) Energy/time
c) Height/time
d) Angle/time

View Answer

Answer: a [Reason:] Accelerometer is the measurement of the chane in velocity or speed divided by time. For example, a car accelerating from a standstill to 60mph in 60 seconds is determined to have an acceleration of 10mph per second(60/6).

3. What is the use of accelerometer in laptops?
a) To rotate the screen
b) To protect hard drives from damage
c) To get the angle on monitor
d) To get the linear acceleration

View Answer

Answer: b [Reason:] Accelerometer in laptops protect hard drives from damage. If the laptop were to suddenly drop while in use, the accelerometer would detect the sudden free fall and immediately turn off the hard drive to avoid hitting the reading heads into the hard drive platter.

4. Are accelerometer used in cars?
a) True
b) False

View Answer

Answer: a [Reason:] Accelerometers are likewise used in cars as the industry method way of detecting car crashes and deploying airbags almost instantaneously.

5. How many and what are the parts that are present in the accelerometer sensor?
a) 1, capacitor sensor
b) 3, piezoelectric effect, Analog display,Digital display
c) 2, piezoelectric effect and capacitor sensor
d) 2, Capacitor sensor, Digital Display

View Answer

Answer: c [Reason:] The accelerometer consists of many different parts and work in many ways, two of which are piezoelectric effect and the capacitor sensor. The piezoelectric effect is the most common form of accelerometer and uses microscopic crystal structures that become stressed due to accelerative forces. The capacitance accelerometer senses changes in capacitance between micro structures located next to the device.

6. The BGM160 gyroscope sensor is fitted with ________ interfaces.
a) Only SPI
b) Only I2C
c) SPI and UART
d) SPI and I2C

View Answer

Answer: d [Reason:] The BGM160 is fitted with digital bi-directional SPI and I2C interfaces for optimum system integration, which require 3.3v operation.

7. Gyroscope is used for_________
a) Anti-theft
b) Capacitive proximity sensing
c) Gaming
d) Angle detection

View Answer

Answer: c [Reason:] Gyroscope is mainly used in 3D mouse, games and athlete training. Gyroscope is also used in navigation, Remote control, notebooks and ultrabooks.

8. Gyroscope is used to measure_________
a) Linear Acceleration
b) Angular velocity
c) Angular velocity and linear acceleration
d) Linear velocity

View Answer

Answer: b [Reason:] Gyroscope is used to measure angular velocity. Gyroscopes aimed to create smaller and more sensitive devices.

9. What is the rate noise density of gyroscope?
a) 0.011 dps/√Hz
b) 0.0011 dps/√Hz
c) 1.11 dps/√Hz
d) 11.1 dps/√Hz

View Answer

Answer: a [Reason:] Gyroscopes offer superior stability over time and temperature, with a rate noise density up to 0.011 dps/√Hz. This guarantees the level of accuracy required by the most of the advanced motion-based applications.

10. How many sensing structures are there in gyroscope sensor?
a) Two structures
b) Three structures
c) Depending on application
d) Single structure

View Answer

Answer: d [Reason:] The 3-axis gyroscopes have a single sensing structure for motion measurement along all three orthogonal axis, while other solutions on the market relay on two or three independent structures.

11. Theory behind working of accelerometer can be understood from ________
a) Rotary
b) Liner
c) Newtonian mechanism
d) Reciprocating

View Answer

Answer: c [Reason:] Theory behind working of accelerometer can be understood from mechanical model of accelerometer, using Newtonian mechanics. The sensing element essentially is a proof mass.

12. ________ is included in a system to provide desirable damping effect.
a) Speedometer
b) Seismic
c) Damper
d) Dashpot

View Answer

Answer: d [Reason:] A dashpot is also included in a system to provide desirable damping effect. The dashpot is attached between the mass and the casing.

13. Displacement and acceleration are related by fundamental scaling law.
a) True
b) False

View Answer

Answer: a [Reason:] Displacement and acceleration are related by fundamental scaling law. A higher resonant frequency implies less displacement or low sensitivity.

14. ________ sensor is used for tracking rotation or twist.
a) Gyroscope
b) Temperature
c) Pressure
d) Proximity

View Answer

Answer: a [Reason:] Accelerometers in mobile phones are used to detect the orientation of the phone. The gyroscope adds an additional dimension to the information supplied by the accelerometer by tracking rotation or twist.

15. Ring laser type gyroscope operates based on _________ principle.
a) Damper
b) Sagnac
c) Seismic
d) Dashpot

View Answer

Answer: b [Reason:] Ring laser type gyroscope operates based on sagnac effect. Sagnac involves splitting a beam of light in two and sending them through different opposite paths and then creating interference between the two beams.

Set 2

1. There is efficiency gains from ________ all sorts of equipment.
a) Implementation
b) Analogous
c) Evolution
d) Digitization

View Answer

Answer: d [Reason:] There are efficiency gains from digitization of all sorts of equipment and measures that used to be analog and disconnected.

2. Business values can be Daunting Proposition to figure out how to best harness all this data.
a) True
b) False

View Answer

Answer: a [Reason:] Across every industry, organization is looking at ways they can derive business value from IoT. While some benefits will be relative clear cut, it can be a Daunting Proposition to figure out how to best harness all this data.

3.The availability of ________ is the cloud services provider who will host video and data for end users.
a) Devices
b) Memory
c) Security system
d) Objects

View Answer

Answer: c [Reason:] The availability of cloud based security is the cloud services provider who will host video and data for end users, as providers are solely responsible for ensuring the availability and reliability of this data.

4. SLA stands for ____________
a) Service Level Agreement
b) Security Level Agreement
c) System Local Area
d) Service Local Area

View Answer

Answer: a [Reason:] Not all cloud service providers service level agreement offer that level of guarantee.

5. A provider which produces 99 percent uptime ________
a) Security issues
b) Network Issues
c) Programming issue
d) Memory issue

View Answer

Answer: b [Reason:] Among the exceptions that release a provider from providing 99 percent uptime are network issues not within their direct control, client negligence, “acts of god,” scheduling maintenance and more.

6. With physical security, the stakes are incredibly ________
a) Very high
b) Low
c) Very low
d) High

View Answer

Answer: d [Reason:] With physical security, the stakes are incredibly high, so even if you are working with a limited budget, cloud services are not an area where you should shop for a bargain.

7. Issue with connecting to data stored have anything to do with data centers.
a) True
b) False

View Answer

Answer: a [Reason:] The reality is that any issues with connecting to data stored in the cloud rarely have anything to do with the service provider’s data center.

8. The most likely culprit is ________
a) Things
b) Network
c) Device
d) Internet connectivity

View Answer

Answer: d [Reason:] The most likely culprit is internet connectivity, leaving end users unable to access their hosted data or even perform management functions.

9. ________ are designed to protect data and servers.
a) Physical walls
b) Logical firewalls
c) Both Physical and logical
d) Neither physical nor logical

View Answer

Answer: c [Reason:] Physical and logical firewalls measure are designed to protect data and the servers where it is stored from theft. Sabotage and damage caused by natural disasters.

10. Communication between ________ and ________ is encrypted for security.
a) Cloud and device
b) End user and data center
c) Network and device
d) Cloud and Network

View Answer

Answer: b [Reason:] Communication between end user sites and data centre is encrypted according to industry standards to further improve system security.

11. Undertaking the intervention over an extended period of time would enhance the change of gaining access.
a) True
b) False

View Answer

Answer: a [Reason:] Undertaking the intervention over an extended period of time would enhance the change of gaining access to revelation about the thinking of biology teachers.

12. ________ phase starts with the construction of spanning tree for ordinary routing information.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection

View Answer

Answer: a [Reason:] Initialization phase starts with the construction of spanning tree for ordinary routing information. A level corresponds to the hop distance of the node from the sink and data will be transmitted.

13. In which phase packets are forwarded hop by hop to get closer to the sink?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection

View Answer

Answer: b [Reason:] Packets are forwarded hop by hop to get closer to the sink. Intermediate nodes keep the packetId in their buffer during Tcol corresponding to the maximum delay allowed to transmit.

14. ________ is achieved using over hearing mechanism.
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection

View Answer

Answer: d [Reason:] The lost message detection is achieved by over hearing mechanism. Upon sensing the channel, if node A does not hear node B transmitting the packet packetId to its next hop, it becomes aware that the packet has been lost and that are transmission is required.

15. What is the last step in algorithm for reliable data transfer?
a) Initialization
b) Message Relaying
c) Selective recovery
d) Lost message detection

View Answer

Answer: c [Reason:] Once a packet is detected, the AJIA mechanism relies on its routing metric to choose the best next hop for the packet re transmission.

Set 3

1. API enables services portability between ____________
a) Systems
b) Devices
c) Networks
d) Services

View Answer

Answer: a [Reason:] API enables services portability between sysyems, I.e., service may be allocated to end-systems or servers, with possible relocation and replication throughout its lifecycle.

2. Ubiquitous service provision depends on _________
a) QoS
b) Management
c) Interoperability
d) Routing

View Answer

Answer: c [Reason:] Ubiquitous service provision depends on interoperability, not only for provisioning of a standard QoS controlled IP bearer, but also for cross domain naming, security, mobility, multicast, including fair compensation for utility provisioning.

3. API architecture not only includes critical elements but also caters for _________
a) System
b) Devices
c) Network
d) Multi homing

View Answer

Answer: d [Reason:] API architecture not only includes critical elements but also caters for multi homing, mobile networks with dynamic membership, and third party persistent storage based on indirection.

4. All portals are embedded into a single supercomputer, known as _________
a) Network
b) Web
c) Internet
d) System

View Answer

Answer: b [Reason:] The web is now one, enormous, global computer. Our devices be them phones, tablets, TVS, watches, glasses, etc. These all are all portals into this single computer, known as Web.

5. _________ is uniquely identifiable embedded computing devices.
a) Internet
b) IoT
c) Bigdata
d) Cloud

View Answer

Answer: b [Reason:] The IoT is the part of the Internet that is made up of “uniquely identified embedded computing devices,” as Wikipedia status. Just like the world Wide Web is a Internet, so does the IoT.

6. Web is a mesh of computers, so too is _________
a) IoT
b) Bigdata
c) Cloud
d) Internet

View Answer

Answer: a [Reason:] Just like World Wide Web runs over the Internet, so does the IoT. Similarly to how the Web is a mesh of computers, so too is the IoT.

7. Without _________ computers embedded in house keys are worthless.
a) Data
b) Services
c) Both Data and Services
d) Neither data nor services

View Answer

Answer: c [Reason:] Without data and services, the little computers embedded in thermostat, house keys, baby monitors, trash cans, fire extinguishers, and store shelve are nearly worthless.

8. _________ Services are the way in which the IoT is connected to data.
a) Cloud
b) Bigdata
c) Internet
d) Network

View Answer

Answer: a [Reason:] Cloud based services are the way in which the IoT is connected to data. Just like World Wide Web runs over the Internet, so does the IoT.

9. APIs are the skybridge.
a) True
b) False

View Answer

Answer: a [Reason:] APIs are the skybridge – IoT on one side, useful information and plentiful data crunching capabilities on the other. APIs make IoT useful, turning limited little things into powerful portals of possibilities.

10. IoT solutions are at the heart of IDC’s view of the _________
a) Three
b) Two
c) One
d) Four

View Answer

Answer: d [Reason:] IoT solutions are at the heart of IDC’s view of the four pillars: Mobility Social business Big data Cloud Resulting in the millions of an applications available to the billions at the end point.

11. _________ are the inter connectors.
a) Web
b) Internet
c) Network
d) APIs

View Answer

Answer: d [Reason:] APIs are the inter connector which provide the interface between the Internet and Things.

12. Is APIs are glue?
a) True
b) False

View Answer

Answer: a [Reason:] JavaWorld’s Andrew Oliver calls APIs “the glue and interesting part where the Internet of Things starts to become useful and more than a buzzword.”

13. Most IoT problems are addressed at _________ layer
a) TCP
b) IP
c) API
d) UDP

View Answer

Answer: c [Reason:] As more and more devices are connected to the net, however, certain recurring problems must be solved. These problems are addressed at the API layer.

14. IoT-A stands for ________
a) Internet of Things Address
b) Internet of Things Architecture
c) Internet of Things Area
d) Industrial of things Architecture

View Answer

Answer: b [Reason:] The EU’s Internet of Things Architecture is another example of the way in which we can solve IoT related challenges.

15. IoT-A reference model is a _________
a) Scalable
b) Secure
c) Both scalable and secure
d) Neither scalable nor secure

View Answer

Answer: c [Reason:] IoT-A architectural reference model is a scalable and secure solution intended to guide the design of protocols, interface and algorithms necessary to scale the IoT.

Set 4

1. Kansas-temp will display _________ Components.
a) 3 components
b) Can’t say
c) 4 components
d) Infinite

View Answer

Answer: b [Reason:] Check the Kansas-temp… checkbox and the site will display the registered components for the selected device. Registered components may be temperature, humidity etc.

2. What temperature of checkbox will display?
a) Temperature in Fahrenheit
b) Temperature in Celsius
c) Percentage
d) Temperature in Fahrenheit for the past hour

View Answer

Answer: d [Reason:] The temperature checkbox and the site will display a chat with the ambient temperature measured in degrees Fahrenheit for the past hour.

3. Chat uses _________ to generate graph.
a) Lines
b) Rows and Columns
c) Only rows
d) Only columns

View Answer

Answer: a [Reason:] By default, the chart uses a line and generates a graph with the time series values registered in the past hour.

4. Refresh rate for the graph is set to _________
a) 20 seconds
b) 5 seconds
c) 30 seconds
d) Every second

View Answer

Answer: c [Reason:] By default, the refresh rate for the graph is set to 30 seconds, and therefore, the chart will be updated every 30 seconds.

5. What is the maximum refresh rate that can be set?
a) 100 seconds
b) 120 seconds
c) 40 seconds
d) 60 seconds

View Answer

Answer: d [Reason:] We can change the refresh rate to as low as 5 seconds or as high as 60 seconds.

6. My chat page allows searching criteria such as _________
a) Device Name
b) Associated tags
c) Properties
d) Charts

View Answer

Answer: c [Reason:] Charts site will display the My Charts page that will allow you to search for devices using many search criteria, such as the device name, the associated tags, and its properties.

7. Raw rate button will display what?
a) Raw data
b) Data from all components
c) All types of data
d) Device names

View Answer

Answer: a [Reason:] The raw data site will display a list with raw data that has been sent to build the time series, that is, all the observations received for the selected component.

8. Can we use MALAB for analysing IOT sensor data?
a) True
b) False

View Answer

Answer: a [Reason:] We can use MATLAB to analyse IOT sensor data. As IoT solutions emerge, the amount of available sensor data is growing, but developing insight into that data can be difficult.

9. ___________ is used to organize and manipulate time-stamped data.
a) Network
b) Machine Learning
c) Cluster
d) Timetable

View Answer

Answer: d [Reason:] Timetable is used to organize and manipulate time-stamped data. Timetable is designed to help you combine data-sets with different time-stamps in a meaningful way.

10. Machine learning algorithm use computational methods to learn.
a) False
b) True

View Answer

Answer: b [Reason:] Machine learning algorithm use computational methods to learn information directly from data without assuming a predetermined equation as a model.

Set 5

1. Fog computing is utilized to _________ all debris into a single platform.
a) Integrate
b) Store
c) Task
d) Flexible

View Answer

Answer: a [Reason:] Some tasks require large amount of computation and storage, eg., real time video analytics, are infeasible due to the limited capacity of hardware. To solve these problems, fog computing is utilized to integrate all debris into a single platform.

2. OpenFog Consortium defines and extends the application of _______ computing.
a) Mist computing
b) Edge computing
c) Cloud computing
d) Mobile Cloud computing

View Answer

Answer: b [Reason:] OpenFog Consortium defines and extends the application of fog computing.

3. Cloud computing must work _______ with fog computing to provide a seamless end to end customer experiences.
a) Seamlessly
b) Scalable
c) Control
d) Multiple services

View Answer

Answer: a [Reason:] Cloud computing must work seamlessly with fog computing to provide a seamless end to end customer experiences, said Antunes.

4. Fog computing works well in cloud based _______ panel
a) Cloud
b) Data
c) Control
d) Fog

View Answer

Answer: c [Reason:] Fog computing works well in a cloud based control plane to provide control and broader insight across a large numbers of nodes.

5. Challenges can be addressed within a single IoT network by _______
a) Fog node
b) Cloud node
c) Data
d) Control

View Answer

Answer: a [Reason:] Large cities face challenges from traffic congestion, public safety, high energy use. These challenges can be addressed within a single IoT network by installing a network of fog node.

6. Lack of broadband _______ and connectivity is a major issue in establishing smart cities.
a) Storage
b) Bandwidth
c) Address
d) Services

View Answer

Answer: b [Reason:] A lack of broadband bandwidth and connectivity is a major issue in establishing smart cities. While most of the modern cities have one or more cellular networks providing adequate coverages.

7. Fog computing addresses security, data encryption.
a) True
b) False

View Answer

Answer: a [Reason:] Fog computing addresses security, data encryption and distributed analytics requirements.

8. Building automation demonstrates the need for _______
a) Edge intelligence
b) Sensors
c) Control function
d) Local operations

View Answer

Answer: a [Reason:] Building automation demonstrates the need for edge intelligence and localized processing.

9. A commercial building may contain mainly _______ component.
a) Memory
b) Fog node
c) Cloud nodes
d) Sensors

View Answer

Answer: d [Reason:] A commercial building may contain thousands of sensors to measure various building operating parameters: temperature, keypad readers and parking space occupancy.

10. Who will do actions if there is needed?
a) Fog node
b) Fog computing
c) Devices
d) Controller

View Answer

Answer: b [Reason:] Data from sensors must be analyzed to see if actions are needed, such as triggering a fire alarm if smoke is sensed. Fog computing allows for autonomous local operations for optimized control function.

11. Fog node is ___________
a) Floor
b) Wing
c) Individual room
d) Floor and Wing

View Answer

Answer: d [Reason:] Each floor, wing or even individual room could contain its own fog node that is responsible for performing emergency monitoring and response functions.

12. Fog computing works with cloud computing.
a) False
b) True

View Answer

Answer: b [Reason:] Fog computing works with cloud computing, so the long term history of building operational telemetry and control actions can be aggregated and uploaded to the cloud.

13. What is OpenFog?
a) Software
b) Device
c) Derived from fog computing
d) Architecture

View Answer

Answer: d [Reason:] The OpenFog architecture specifies a secure end to end computer environment between the cloud and the fog nodes that connect to IoT devices.

14. IoT devices use _______ for security.
a) Cloud
b) Software
c) Immutable
d) Fognode

View Answer

Answer: c [Reason:] These devices use a hardware-based immutable root of trust, which can be attested by software agents running throughout the infrastructure.

15. Fog computing allows for latency sensitive distributed surveillance that maintains privacy.
a) True
b) False

View Answer

Answer: a [Reason:] Fog computing allows for latency sensitive distributed surveillance that maintains privacy because privacy concerns must be addressed when using a camera as a sensor.