Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. _____________ reduces the adoption and learning curve for the end user.
a) Intuitive
b) IoT
c) Commands
d) Devices

View Answer

Answer: a [Reason:] Intuitive reduces the adoption and learning curve for the end user while, at the same time, create q unique bond between the product and its owner.

2. Most common application for voice control application are ___________
a) Home security
b) Family health monitoring
c) Home security and health monitoring
d) Business

View Answer

Answer: c [Reason:] The most common application for voice control technology will be home security, personal and family health monitoring, and family monitoring(whether remote or local).

3. _________ either built into smoke alarm and thermostat or in the form of small plug – in.
a) Microphones
b) Loudspeaker
c) Microphone and loudspeaker
d) Mic

View Answer

Answer: a [Reason:] Environmental microphones either built into smoke alarms and thermostat or in the form of small plug in modules such as an electric air freshener.

4. Voice recognition software and virtual assistant programs offer for ________ and _________
a) Communication
b) Communication and Entertainment
c) Entertainment
d) Communication and Software

View Answer

Answer: b [Reason:] Many big companies offer voice recognition software and virtual assistant programs for their communication and entertainment products that talk to users and respond to a list of commands.

5. Voice control doesn’t provide the level of __________
a) Amplitude control
b) Sound control
c) Voice control
d) Frequency control

View Answer

Answer: d [Reason:] Voice control doesn’t provide the level of voice control monitoring that analysts see as the wave of the near future.

6. The advanced security and smart system first monitor and then interacts with human.
a) True
b) False

View Answer

Answer: a [Reason:] The advanced security and smart system first monitor and then interacts with human users to fulfil their daily needs – turning on lights, adjusting thermostat, reporting intruders and identifying residents or employees based on certain biological signs.

7. How many types of voice communications are there in IoT environment?
a) 2 types
b) 4 types
c) 3 types
d) 5 types

View Answer

Answer: c [Reason:] There are 3 key types of voice communication in IoT environment: 1. Bi-directional voice communication 2. Mono-directional voice communication 3. Voice recognition.

8. _________ is particularly appealing when the human’s hands or eye are otherwise occupied.
a) Voice recognition
b) Sound recognition
c) Amplitude recognition
d) Frequency recognition

View Answer

Answer: a [Reason:] Voice recognition is particularly appealing when the human’s hands or eye are otherwise occupied. For example, it may not only convenient but also a legal requirement to use verbal commands.

9. Voice telephony is an efficient means of __________ with machines that can listen.
a) Mono-directional voice communication
b) Bi-directional voice communication
c) Voice recognition
d) Both bi directional and mono directional

View Answer

Answer: b [Reason:] Voice telephony is an efficient means of Bi-directional voice communication with machine that can listen, and respond without the need for complex commands.

10. ________ could potentially challenge the need of touch screen on many devices.
a) Voice recognition
b) Voice telephony
c) Voice Integration
d) Intuitive

View Answer

Answer: c [Reason:] Voice Integration could potentially challenge the need for a touch screen on many devices, as it reduces the cost for devices that will be dormant for majority of the time.

11. ________ Will reduces the cost of the devices.
a) Intuitive
b) Voice telephony
c) Voice recognition
d) Voice Integration

View Answer

Answer: d [Reason:] Voice Integration could potentially challenge the need for a touch screen on many devices, as it reduces the cost for devices that will be dormant for majority of the time.

12. How the voice is transferred to our phone?
a) Internet
b) Bluetooth
c) Sharing applications
d) Zigbee

View Answer

Answer: a [Reason:] In car, consumer electronics and entertainment devices are all using Bluetooth to transfer our words to our phone or a gateway, which connects to the cloud.

13. Is there any limit for connecting devices though voice?
a) False
b) True

View Answer

Answer: b [Reason:] There are a virtually limitless number of applications for voice-controlled, IoT-connected devices.

14. Microphones usually have ___________
a) Amplitude filter
b) Noise filter
c) Round filter
d) Frequency filter

View Answer

Answer: c [Reason:] Microphones usually have a fuzzy covering or a round filter known in the industry as pop filter. They are designed to block out distortion from breath and wind.

15. _________ are well integrated antennas for long range communication.
a) BC241
b) BC154
c) BC144
d) BC118

View Answer

Answer: d [Reason:] To enable the connectivity, BC118, BC127, BC188 modules work with Bluetooth or WiFi devices, this has long range communication.

Set 2

1. IaaS stands for __________
a) Infrastructure as a Service
b) Infrastructure as a Software
c) Internet as a Service
d) Internet as a Software

View Answer

Answer: a [Reason:] Cloud Computing delivers infrastructure, platform, and software that are provided as services on the usage based payment to end users. These services are Infrastructure as a Service (IaaS).

2. Mobile cloud computing at its simplest refers to an __________
a) Intervention
b) Internet
c) Infrastructure
d) Intervention & Internet

View Answer

Answer: c [Reason:] Mobile cloud computing at its simplest refers to an infrastructure where both data storage and the data processing happen outside of the mobile devices.

3. Mobile Cloud applications move the __________ Power and __________ away from mobile phone and into cloud.
a) Computing and internet
b) Data storage and computing
c) Computing and data storage
d) Internet and computing

View Answer

Answer: c [Reason:] Mobile cloud applications move the computing power and data storage away from mobile phones and into the cloud, bringing applications and mobile computing to not just smart phone users but a much broader range of mobile subscribers.

4. SaaS stands for __________
a) Service as a Smartphone
b) Service as a software
c) Smartphone as a service
d) Software as a Service

View Answer

Answer: d [Reason:] Cloud computing delivers infrastructure, platform, and software that are provided as services on the usage based payment to end users. These services are Software as a Service (SaaS).

5. __________ reduces the development and running cost of mobile applications on smartphone devices.
a) Infrastructure
b) Productive business
c) Software
d) Services

View Answer

Answer: b [Reason:] It is a productive business choice that transfers data from smartphone devices to powerful and centralized computer platform located in the cloud. Thus reducing the development and running cost of mobile applications on smartphine devices.

6. PaaS stands as __________
a) Platform as a ervice
b) Photo as a service
c) Platform as a Service
d) Photo as a Software

View Answer

Answer: c [Reason:] Cloud Computing delivers infrastructure, platform, and software that are provided as services on the usage based payment to end users. These services are Platform as a Service (PaaS).

7. The architecture of MCC is such that various mobile devices are connected to their respective mobile networks via __________
a) Software
b) Satellite
c) Access point
d) Base Station

View Answer

Answer: d [Reason:] The architecture of MCC is such that various mobile devices are connected to their respective mobile networks via base station.

8. MCC stands for Mobile Cloud Computation.
a) True
b) False

View Answer

Answer: a [Reason:] The advancement in cloud computing is leading to an excessive growth of mobile devices that can become powerful means for information access and mobile applications. Introducing a latent technology called Mobile Cloud Computing.

9. __________ is the minimum value which an application shall exceed to be offloaded.
a) Static value
b) Critical value
c) Threshold value
d) Dynamic value

View Answer

Answer: c [Reason:] Threshold value is the minimum value which an application shall exceed to be offloaded. The threshold value can be measured in terms of processing time, energy consumption ad memory usage.

10. Offloading decision depends upon __________ to be offloaded.
a) Size of application
b) Threshold value
c) Critical value
d) Dynamic value

View Answer

Answer: a [Reason:] Offloading decision depends upon size of application to be offloaded. It saves energy for a code compilation, if size of code is large.

11. The part of the code which involves complex computations and requires more time to execute is referred to as __________
a) Static session
b) Threshold session
c) Dynamic session
d) Critical session

View Answer

Answer: d [Reason:] The part of the code which involves complex computations and requires more time to execute is referred to as critical session. The module of the application if falls under the critical section then it is offloaded.

12. In __________ offloading application is partitioned during development.
a) Static offloading
b) Dynamic offloading
c) Threshold offloading
d) Critical offloading

View Answer

Answer: a [Reason:] In static offloading application is partitioned during development. In static environment, parameters such as data size and execution time which acts as deciding factor for offloading are known beforehand.

13. __________ network environment means changing connection status.
a) Static offloading
b) Dynamic offloading
c) Threshold offloading
d) Critical offloading

View Answer

Answer: b [Reason:] Dynamic network environment means changing connection status and bandwidth that affect the process of offloading.

14. __________ is defined as delay between the offloading and final result.
a) Latency rate
b) Network Bandwidth
c) Heterogeneity
d) Migration Cost

View Answer

Answer: a [Reason:] Latency rate is defined as delay between the offloading of an application on the cloud and final results to be retracted back to the smartphone.

15. _____________ Depends upon the amount of the code being offloaded.
a) Latency rate
b) Network Bandwidth
c) Heterogeneity
d) Migration Cost

View Answer

Answer: b [Reason:] Bandwidth Utilization depends on the amount of the code being offloaded. If large amount of data is to be offloaded to the cloud then it ultimately increases the latency rate which in turn affects the efficiency.

Set 3

1. Privacy protection solution was proposed with KP-ABE and CP-ABE.
a) True
b) False

View Answer

Answer: a [Reason:] The hybrid privacy protection solution was proposed with KP-ABE and CP-ABE. This way chosen different way to encrypt the privacy information based on user attributions according to cloud service business type.

2. _________ consumers investing in general data protection needs in multiple dimensions.
a) Normal
b) Business
c) Office
d) Third Party

View Answer

Answer: b [Reason:] Business consumers investing in general data protection needs in multiple dimensions. First, the type of device they need to support determines one continuum to potential solutions from desktop through to mobile phones. Second, the location of the data determines another axis for consideration, either on the device or stored in the cloud.

3. Software that address the data protection is divided into _________ Segments.
a) 1 segment
b) 2 segments
c) 4 segments
d) 3 segments

View Answer

Answer: d [Reason:] Because of the two factors, it’s possible to divide software that addresses data protection into three segments: Cloud privacy protection Endpoint protection Mobile device management.

4. _________ segment contributing to protection of data on device.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud

View Answer

Answer: a [Reason:] The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,

5. _________ segment indicates protection for device integrity.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud

View Answer

Answer: a [Reason:] The oldest segment contributing to protection of data on device is End Point Protection. EPP also indicates protection for device integrity, including protection against malware, etc.,

6. EPP approach favours _________ data into the device.
a) UnLocking
b) Locking
c) Blocking
d) Unblocking

View Answer

Answer: b [Reason:] For data protection, End Point Protection approach favour locking data into the device through full disk encryption port control, auditing and restriction of data prior to release from the device and other similar mechanisms.

7. End Point Protection primarily focused around deployment on _________
a) Laptops
b) Desktops
c) Both laptops and desktops
d) Phones

View Answer

Answer: c [Reason:] End Point Protection primarily focused around deployment on desktops and laptops although some endpoint protection exists for mobile devices. In these cases, EPP overlaps with MDD.

8. _________ is concerned with management of mobile.
a) Endpoint Protection
b) Cloud Privacy Protection
c) Mobile Device Management
d) Cloud

View Answer

Answer: c [Reason:] Mobile Device Management is primarily concerned with management of mobile devices. Solution often consists of configuration, network, and services management on mobile devices.

9. Is mobile device management similar to that of end point protection with respect to locking?
a) True
b) False

View Answer

Answer: a [Reason:] For data protection, mobile device management, in similar fashion to end point protection favors locking data on the devices so that it cant be compromised.

10. How MDM will achieve locking mechanism?
a) Wrapping
b) Controlling
c) Both wrapping and controlling
d) Encryption

View Answer

Answer: c [Reason:] Mobile device management achieves this by wrapping and controlling access by all applications on the device.

11. MDM is focused on _________
a) Laptops
b) Tablets
c) Both phones and tablets
d) Phones

View Answer

Answer: c [Reason:] MDM id focused on mobile devices, including mobile phones and tablets. As the line between less distinct, mobile device management will overlap capabilities with end point protection.

12. _________ complicates _________ and _________
a) MDM, EPP and CPP
b) EPP, CPP and MDM
c) MDM, CPP and EPP
d) CPP, EPP and MDM

View Answer

Answer: d [Reason:] The new cloud privacy protection segment complicates end point protection and mobile device management. It embraces the inevitable movement of data off device across all the devices of an enterprise.

13. _________ enables the use of cloud sync and storage.
a) Inevitable movement of data
b) Encryption
c) Wrapping
d) Controlling

View Answer

Answer: a [Reason:] The inevitable movement of data off device across all the devices of an enterprise. This enables the use of cloud sync and storage by desktops and laptops beyond the device boundary where EPP provides protection.

14. It enables _________ use of mobile devices without requiring the lockdown of data.
a) own-device
b) controlling
c) sharing of data
d) bring-your-own-device

View Answer

Answer: d [Reason:] It enables bring-your-own-device use of mobile devices without requiring the lockdown of data through MDM.

15. CPP embraces sharing of data between ____________
a) Devices
b) Users
c) Both devices and users
d) Cloud and Devices

View Answer

Answer: c [Reason:] Cloud privacy protection embraces sharing of data between devices and users. This sharing means that data must transmit through intermediaries and be protected while doing so.

Set 4

1. QoE stands for _________
a) Quality of Energy
b) Quality of Experience
c) Quality of Envelop
d) Quality of Encryption

View Answer

Answer: b [Reason:] If the light weight query engine returns a poor result, then the user may have to issue my query redundantly to the cloud based query processing engine with the hope of getting a better result. This may hurt the overall Quality of Experience.

2. The RAE learns the _________ algorithm to learn the most cost effective policy.
a) Logistic Regression
b) Device/cloud algorithm
c) QoE algorithm
d) Anatomous algorithm

View Answer

Answer: a [Reason:] The RAE learns the logistic regression algorithm to learn the most cost effective policy for distributing the task among devices and cloud, given the resource state.

3. _________ is the weighted sum of resource state, network, and cpu.
a) Logistic Regression
b) Cloud
c) Device
d) Cost function

View Answer

Answer: d [Reason:] The cost function is the weighted sum of resource state, network, and CPU usage.

4. The policy obtained by running logistic regression is enforced by _________ module.
a) Device/cloud section
b) Only device
c) Only Cloud
d) Cost function

View Answer

Answer: a [Reason:] The policy obtained by running logistic regression is enforced by Device/cloud section module, based on the expected cost value for a given task.

5. The mechanism of the RAE is _________ which can be deployed on each device and cloud.
a) QoE
b) Logistic regression
c) Anatomous agent
d) Device/cloud

View Answer

Answer: c [Reason:] The mechanism of the RAE is anatomous agent, which can be deployed on each device and cloud.

6. OAD stands for ___________
a) Optimal Application Distribution
b) Orientational Application Distribution
c) Orientation Application Development
d) Optimal Application Development

View Answer

Answer: a [Reason:] The exponential growth of cloud service offering in the last year has increased the number of alternative for engineering and re-engineering applications to be partially or completely run in a cloud environment.

7. _________ enables the application developer to enhance the application design.
a) Cloud Blueprint
b) TOSCA standard
c) Both Cloud blueprint and TOSCA standard
d) Utility function

View Answer

Answer: c [Reason:] TOACA standard and Cloud Blueprint enable the application developer to enhance the application design by providing the means to model which cloud offering is used to host which parts of the application stack.

8. _________ process must support the analysis and evaluation of the application topology.
a) Support of different Migration types
b) Enrichment of Topology specification
c) Management and Configuration
d) Top-down and bottom-up

View Answer

Answer: d [Reason:] Top-down and bottom-up application evaluation process must support the analysis and evaluation of the application topology alternatives both based on previous knowledge and empirical analysis, and during the application productive phase.

9. _________ process has to support the definition of application topologies in various formats.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types

View Answer

Answer: b [Reason:] Enrichment of Topology specification process has to support the definition of application topologies in various formats such as TOSCA or Blueprints and must consider non-functional aspects specified as extension of the previous formats.

10. Any tool providing _________ process must provide management and configuration for cloud services.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types

View Answer

Answer: c [Reason:] Any tool providing Management and Configuration process must provide management and configuration for cloud services from different providers covering all cloud service and delivery models.

11. In order to re- distribute an application _________ process has to support all cloud native and non cloud native applications.
a) Top-down and bottom-up
b) Enrichment of Topology specification
c) Management and Configuration
d) Support of different Migration types

View Answer

Answer: d [Reason:] In order to re- distribute an application support of different migration types process has to support all cloud native and non cloud native application types identified.

12. _________ process must support the characterization of different adaptation actions.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware

View Answer

Answer: a [Reason:] Characterization of adaptation strategies process must support the characterization of different adaptation actions that can be used during run time for a given application.

13. In _________ the application to be re directional is based on 3-layered architecture.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware

View Answer

Answer: b [Reason:] In Independence of Architectural Paradigm the application to be re directional is based on 3-layered architecture, must be supported.

14. As the workload of an application is subjected to fluctuation over time _________ process must support the identification.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware

View Answer

Answer: c [Reason:] s the workload of an application is subjected to fluctuation over time support and reaction to application resources demand evolution process must support the identification.

15. _________ process must consider such characteristics for optimizing the overall application performance.
a) Characterization of adaptation strategies
b) Independence of Architectural Paradigm
c) Support and reaction to application resources
d) Support of hardware

View Answer

Answer: d [Reason:] Support of hardware, software, application characteristics process must consider such characteristics for optimizing the overall application performance.

Set 5

1. CoAP is specialized in ___________
a) Internet applications
b) Device applications
c) Wireless applications
d) Wired applications

View Answer

Answer: a [Reason:] Constrained Application Protocol (CoAP) is a specialized Internet Application Protocol for constrained devices, as defined in RFC 7228.

2. CoAP is designed for use between devices on the same constrained network.
a) True
b) False

View Answer

Answer: a [Reason:] CoAP is designed for use between devices on the same constrained network (e.g., low-power, lossy networks), between devices and general nodes on the internet, and between devices on different constrained networks both joined by an internet.

3. Which layer is CoAP?
a) Control layer
b) Transport layer
c) Service layer
d) Application layer

View Answer

Answer: c [Reason:] In intelligent network and cellular network, service layer is a conceptual layer within a network service provider architecture. CoAP is a service layer protocol that is intended for use in resource-constrained internet devices, such as wireless sensor network nodes.

4. CoAP provides which of the following requirements?
a) Multicast support and simplicity
b) Low overhead and multicast support
c) Simplicity and low overhead
d) Multicast support, Low over head, and simplicity

View Answer

Answer: d [Reason:] Multicast, low overhead, and simplicity are extremely important for Internet of Things (IoT) and Machine-to-Machine (M2M) devices, which tend to be deeply embedded and have much less memory and power supply than traditional internet devices have.

5. The core of the protocol is specified in _________
a) RFC 7254
b) RFC 7252
c) RFC 7452
d) RFC 7524

View Answer

Answer: b [Reason:] The core of the protocol is specified in RFC 7252, important extensions are in various of the standardization process.

6. Do CoAP has memory?
a) True
b) False

View Answer

Answer: a [Reason:] The nodes have 8-bit microcontrollers with smaill amount of ROM and RAM, while constrained network such as IPv6 over Low-power Wireless Personal Area Network often high packet error rates and a typical throughput of 10s of kbit/s.

7. CoAP does not provide any security.
a) True
b) False

View Answer

Answer: b [Reason:] The Internet of Things cannot spread as long as it can be exploited by hackers willy-nilly. CoAP does not just pay lip service to security, it actually provides strong security. CoAP’s default choice of DTLS parameters is equivalent to 3072-bit RSA keys, yet still runs fine on the smallest nodes.

8. What is the RAM and ROM size in CoAP?
a) 100 KiB of RAM and 10 KiB of ROM
b) 10 KiB of RAM and 100 KiB of ROM
c) 10 KiB of RAM and 250 KiB of ROM
d) 250 KiB of RAM and 10 KiB of ROM

View Answer

Answer: b [Reason:] The Internet of Things will need billions of nodes, many of which will need to be inexpensive. CoAP has been designed to work on microcontrollers with as low as 10 KiB of RAM and 100 KiB of ROM (code space).

9. CoAP feels very much like HTTP.
a) True
b) False

View Answer

Answer: a [Reason:] From developer point of view, CoAP feels very much like HTTP. Obtaining a value from a sensor is not much different from obtaining a value from a Web API.

10. Which is open standard?
a) HTTP
b) MQTT
c) XMPP
d) CoAP

View Answer

Answer: d [Reason:] IoT needs standard protocols. Two of the most promising for small devices are MQTT and CoAP. Both ate standard protocols.

11. Will CoAP connects to internet?
a) True
b) False

View Answer

Answer: a [Reason:] CoAP is one of the latest application layer protocol developed by IETF for smart devices to connect to Internet.

12. HART stands for_________
a) Highway Addressable Remote Transducer
b) High Addressable Remote Transducer
c) High Application Remote Transducer
d) Highway Application Remote Transducer

View Answer

Answer: a [Reason:] IoT PHY/MAC Layers involve all the common wireless communication technology, such as IEEE 802.11 series, 802.15, HART.

13. LTP stands for _________
a) Lean Transducer Protocol
b) Lean Transport Protocol
c) Layer Transport Protocol
d) Layer Transducer Protocol

View Answer

Answer: b [Reason:] IETF has developed several lightweight protocols e.g., CoAP, Embedded Binary HTTP, Lean Transport Protocol.

14. CoAP is a specialized _________ protocol.
a) Web Transfer
b) Power
c) Application
d) Resource

View Answer

Answer: a [Reason:] The CoAP is a specialized web transfer protocol for use with constrained nodes and constrained networks.

15. URI and content type support is which protocol feature?
a) Http
b) UDP
c) CoAP
d) SPI

View Answer

Answer: c [Reason:] CoAP needs to consider optimizing length of datagram and satisfying REST protocol to support URI. It also needs to provide dependable communication based on UDP protocol.