Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. What is the java extension file in IoT?
a) .jar
b) .c
c) .exe
d) .py

View Answer

Answer: a [Reason:] Java IDE to run the example in any computer or build .jar file with all the dependencies included and launch it any computer or devices that you want to use as the MQTT client with a command similar to the following line.

2. Do we run our program in same computer where we have written?
a) True
b) False
c) May or may not
d) Cannot be determined

View Answer

Answer: c [Reason:] In case you don’t run the example in the same computer in which you are running the MQTT server, remember to change the value for the mqttServerHost string in the main method of the Main class.

3. Publish command message is sent from _________
a) Only publisher to broker
b) Only broker to publisher
c) Publisher to broker and broker to publisher
d) Server to client

View Answer

Answer: c [Reason:] The public command message is sent from a publisher to a broker or from a broker to a subscriber, to publish information on a specified topic or topics.

4. The message is sent to the input queue of a message flow that contains a _________
a) Subscriber
b) Server
c) Publication node
d) Client

View Answer

Answer: d [Reason:] Message is sent to the input queue of a message flow that contains a publishing node. Authority to put a message into the queue and to publish on the specified topic.

5. Does user has authority for all topics?
a) True
b) False

View Answer

Answer: b [Reason:] If the user has no authority on topic a warning response will come which indicates which are not published, if not those topics are published.

6. ROSTOPIC uses _________ at the command line for representing the content of the message.
a) YAML_syntax
b) rostopic bw
c) rostopic delay
d) rostopic echo

View Answer

Answer: a [Reason:] ROSTOPIC uses YAML_syntax at the command line for representing the content of the message. For information on how to use this YAML syntax for commands like rostopic pub.

7. Which command displays the band width?
a) rostopic hz
b) rostopic delay
c) rostopic echo
d) rostopic bw

View Answer

Answer: d [Reason:] Rostopic bw displays the bandwidth. The bandwidth reported is the received bandwidth. If there are network connectivity issues or rostopic cannot keep up with the publisher.

8. rostopic delay will provide delay for ___________
a) Topics which has header
b) Topics which has tail
c) Topics which has tail and head
d) To all topics

View Answer

Answer: a [Reason:] Rostopic delay display the delay for topic which has header. Rostopic is implemented in python.

9. Which command displays messages published to a topic?
a) rostopic bw
b) rostopic delay
c) rostopic echo
d) rostopic hz

View Answer

Answer: c [Reason:] Rostopic echo displays messages published to a topic. Rostopic is implemented in python.

10. Which command finds out the topic?
a) rostopic bw
b) rostopic delay
c) rostopic echo
d) rostopic find

View Answer

Answer: d [Reason:] Rostopic find, finds topics by type. Rostopic is implemented in python. ROSTOPIC uses YAML_syntax at the command line

Set 2

1. What is the image that we have been using to boot Intel Galileo Gen 2 board?
a) Local agent
b) IoTkit
c) Device Id
d) SSH Terminal

View Answer

Answer: a [Reason:] The image that we have been using to boot Intel Galileo Gen 2 board includes a local agent for Intel IoT Analytics preinstalled.

2. The agent running as a _________ on a device.
a) SSH Terminal
b) Yocto Linux
c) Daemon
d) Local agent

View Answer

Answer: c [Reason:] Unless we have made specific changes to the Yocto Linux meta distribution to disable specific component, we will have the agent running as a daemon on the device.

3. _________ command line utility allows us to perform specific interactions with Intel IoT Analytics.
a) Iotkit-admin
b) SSH Terminal
c) Local agent
d) Daemon

View Answer

Answer: a [Reason:] The agent includes the iotkit-admin command line utility allows us to perform specific interactions with Intel IoT Analytics.

4. We will not use command line utility to perform _________
a) proper communication with Intel IoT analytics
b) Obtain device id
c) Activate device
d) Send observations

View Answer

Answer: d [Reason:] The agent includes the iotkit-admin command line utility allows us to perform specific interactions with Intel IoT Analytics. We will use command line utility to perform the following tasks: –> Test the proper communication with Intel IoT Analytics –> Obtain the device Id –> Activate a device –> Register three time series components for the device –> Send test observations.

5. To check whether the command line utility can establish proper communication the command is _________
a) iotkit-admin test
b) iotkit – admin test
c) admin-iotkit test
d) admin – iotkit test

View Answer

Answer: a [Reason:] First, we will check whether the iotkit-admin command line utility can establish proper communication with Intel IoT Analytics. We just need to run the following command in the SSH terminal: Iotkit-admin test.

6. Build: 0.14.5 defines what?
a) Ip Address
b) Medium
c) Address
d) Version

View Answer

Answer: d [Reason:] If the connection is successful, we will see lines similar to the following ones. The last line provides the information about the version.

7. Command line to obtain the device Id?
a) iotkit-admin device-id
b) iotkit-admin deviceid
c) Iotkit – admin device-id
d) Iotkit – admin device – id

View Answer

Answer: a [Reason:] The following command in the SSH terminal to obtain the device ID, also known as deviceId: Iotkit-admin device-id.

8. Default, device Id is equal to _________
a) IP Address
b) MAC Address
c) ISP
d) UI

View Answer

Answer: b [Reason:] The Iotkit-admin device-id command line will generate an output line such as the following one with the device ID. By default, the device ID is equal to the MAC address of the network interface card 2016-04.05T02:23:170Z – info: Device ID: 98-4F-EE-01-75-72.

9. Command to change the device Id?
a) iotkit-admin set-device-id new-device-id
b) iotkit – admin set – device – id new – device – id
c) iotkit-admin setdevice-id newdevice-id
d) iotkit-admin set-device-id new-device-id

View Answer

Answer: d [Reason:] The following command to change the device ID to a different one:iotkit-admin set-device-id new-device-id. We just need to replace new-device-id with new device id you want to set up for your devices. However, bear in mind the new device ID must be a globally unique identifier.

10. Do new device ID should be a globally unique identifier.
a) False
b) True

View Answer

Answer: b [Reason:] The following command to change the device ID to a different one:iotkit-admin set-device-id new-device-id. We just need to replace new-device-id with new device id you want to set up for your devices. However, bear in mind the new device ID must be a globally unique identifier.

Set 3

1. Does Raspberry Pi need external hardware?
a) True
b) False

View Answer

Answer: b [Reason:] The RPi can be used without additional hardware (except perhaps a power supply of some kind), it won’t be much use as a general computer. As with any normal PC, it is likely you need some additional hardware.

2. Do RPi have an internal memory?
a) True
b) False

View Answer

Answer: a [Reason:] The RPi has no internal storage or built-in operating system it requires an SD-card that is set up to boot the RPi.

3. What do we use to connect TV to RPi?
a) Male HDMI
b) Female HDMI
c) Male HDMI and Adapter
d) Female HDMI and Adapter

View Answer

Answer: c [Reason:] HD TV’s and most LCD Monitors can be connected using a full-size ‘male HDMI cable,and with an inexpensive adapter if DVI is used. HDMI version 1.4 cable is recommended.

4.How power supply is done to RPi?
a) USB connection
b) Internal battery
c) Charger
d) Adapter

View Answer

Answer: a [Reason:] The unit uses a Micro USB connection to power itself ( only the power pins are connected so it will not transfer data over the connection). A standard modern phone charger with a micro USB connector will do, but needs at least 700 mA at 5 volts.

5. What is the Ethernet/LAN cable used in RPi?
a) Cat5
b) Cat5e
c) Cat6
d) RJ45

View Answer

Answer: d [Reason:] We can use a Ethernet cable or a USB Wifi adapter. The RPi ethernet port is auto-sensing which means that it may be connected to a router or directly to another computer (without the need for a crossover cable).

6. What are the parameters that are default values?
a) Port_Name and Bits
b) Speed and Port_Names
c) Speed and Parity
d) Stop bit and Flow Control

View Answer

Answer: b [Reason:] Port_Name : Linux automatically assigns different names for different types of serial connectors. For Standard Serial Port: ttyS0 … ttySn USB Serial Port Adapter: ttyUSB0 … ttyUSBn Speed: 115200.

7. What is the command used for easy using of GNU screen?
a) $useradd -G {dialout} your_name
b) Screen Port_Name115200
c) Minicom -b 115200 -o -D Port_Name
d) Prompt> # help

View Answer

Answer: b [Reason:] This command is used to open and write or modify data on GNU screen and we should write in the terminal window.

8. Which instruction set architecture is used in Raspberry Pi?
a) X86
b) MSP
c) AVR
d) ARM

View Answer

Answer: d [Reason:] ARM assembler is used in Raspberry Pi. Machine language is built up from discrete statements or instructions implemented by a particular processor.

9. What is the default user in Debain on Raspberry Pi?
a) Default
b) User
c) Pi
d) Root

View Answer

Answer: c [Reason:] Linux users. User management in Raspberry is done on the command line. The default user is Pi, and the password is raspberry. You can add users and change each user’s password.

10. What are the distributions are supported by raspberry Pi?
a) Arch Linux
b) Debain
c) Fedora Remix
d) Arch Linux, Debain, and Fedora Remix

View Answer

Answer: d [Reason:] These all are the distributors that have Linux operating system which has default GUI for Fedora as Xfce, Mate, None-depends on spin.

11. What bit processor is used in Pi 3?
a) 64-bit
b) 32-bit
c) 128-bit
d) Both 64 and 32 bit

View Answer

Answer: a [Reason:] The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor, making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

12. What is the speed of operation in Pi 3?
a) 900MHz
b) 1.2GHz
c) 1GHz
d) 500MHz

View Answer

Answer: b [Reason:] The first is a next generation Quad Core Broadcom BCM2837 64-bit ARMv8 processor, making the processor speed increase from 900MHz on the Pi 2 to up to 1.2GHz on the Pi 3.

13. WiFi is not present in which of the following models?
a) Raspberry Pi3
b) Raspberry Pi Zero WH
c) Raspberry Pi Zero W
d) Raspberry Pi Zero

View Answer

Answer: d [Reason:] All the 3 has an inbuilt Wifi in which all of them works on 802.11 n. For Raspberry Pi Zero an external ESP2866 should be connected.

14. Does micro SD card present in all modules?
a) True
b) False

View Answer

Answer: a [Reason:] All the products has a in built memory as well as a extended memory.

15. How many USB ports are present in Raspberry Pi 3?
a) 5
b) 2
c) 4
d) 3

View Answer

Answer: c [Reason:] In Raspberry Pi3 there is an upgraded switched power source that goes up to 2.5 Amps instead of just 2 Amps, allowing pi to power even more powerful devices over USB ports.

Set 4

1. What is the popular method of organizing wireless network topologies?
a) Software
b) Synchronization
c) Network
d) Cluster

View Answer

Answer: d [Reason:] Clustering is a popular method of organising wireless network topologies, in which a few nodes, the cluster heads are elected as representing to route the traffic originated in the entire network.

2. _________ will enable the humans to access, control and manage the operation.
a) IoT
b) Bigdata
c) Network
d) Communication

View Answer

Answer: a [Reason:] IoT enables the humans to access, control and manage the operations and data of the objects working under different information systems of their surroundings.

3. In _________ the embedded devices and objects working under IoT are resource constrained.
a) Health
b) Industry
c) Home
d) Information system

View Answer

Answer: d [Reason:] In information system the embedded devices and objects working under IoT implementation are resource constrained.

4. What type of networks is interacting under IoT?
a) Heterogeneous only
b) Homogeneous Only
c) Both hetero and homogeneous
d) Neither hetero nor Homo

View Answer

Answer: a [Reason:] Due to the huge number of heterogeneous network elements interacting and working under IoT based information systems, there is an enormous need of resource management for the smooth running of IoT operations.

5. Managing of resources can be done by implementing ________
a) Protocols
b) Algorithms
c) Networks
d) Protocols and algorithms

View Answer

Answer: d [Reason:] Managing of resources by implementing protocols, algorithms or techniques is required to enhance the scalability, reliability and stability in the operations of IoT across different domains of technology.

6. This section is to solicit the efforts and ongoing research work in the domain of _______
a) Information Management
b) Resource Management
c) Industrial Management
d) Network Management

View Answer

Answer: b [Reason:] The motivation of this section is to solicit the efforts and ongoing research work in the domain of resource management in IoT.

7. Resource management will elaborate the key aspects of _________
a) Industrial managements
b) Energy management
c) Network management
d) Information management

View Answer

Answer: c [Reason:] Resource management will elaborate the key aspects of energy management, communication protocols and future applications of IoT for information systems.

8. Resource management includes ___________
a) IoT Devices
b) IoT Cloud
c) IoT Networks
d) IoT Web

View Answer

Answer: b [Reason:] Resource management includes IoT Cloud, IoT based industrial and home environment and integration of IoT concept in upcoming technologies of Cyber Physical System, Ambient living and Fog Computing.

9. What is the role of communication protocol in IoT?
a) Smart cities
b) Cyber physical system
c) Mac layer issue
d) Managing energy

View Answer

Answer: c [Reason:] Role of communication protocol in IoT : –> Multimedia communication –> QoS in communication protocol –> Mac layer issues –> Secure communication in D2D.

10. Which of the following is the future application of IoT?
a) Role of green IoT system
b) QoS in communication
c) Secure communication
d) Multimedia communication

View Answer

Answer: a [Reason:] Future applications of IoT: –> IoT based information system for Ambient living –> Cyber Physical System in IoT –> Role of Green IoT system –> Fog computing.

11. The object of IoT will be empowered by ___________
a) Network
b) Cloud
c) Devices
d) Connectivity

View Answer

Answer: c [Reason:] The objects of the Internet of Things will be empowered by embedded devices whose constrained resources will need to be managed efficiently.

12. The embedded devices will form _______ network.
a) ATM
b) Ethernet
c) FDDI
d) Ad-hoc

View Answer

Answer: d [Reason:] It is envisioned that these devices will be able to form ad-hoc network, and that the connection from these networks to the Internet of Things infrastructure will not always be possible.

13. _______ are used to overcome the challenges of managing the resources of the IoT.
a) Clustering
b) Software agents
c) Synchronization techniques
d) Cluster, Software agent, and Synchronization techniques

View Answer

Answer: d [Reason:] The use of Cluster, Software agent, and Synchronization techniques in order to overcome the challenges of managing the resources of the Internet of Things objects.

14. Which will reduce the energy expenditure?
a) Clustering
b) Software agents
c) Synchronization techniques
d) Cluster, Software agent, and Synchronization techniques

View Answer

Answer: a [Reason:] Clustering will be beneficial to reduce the energy expenditure and improve the scalability and robustness of the object networks.

15. Synchronization techniques will be necessary to address the various challenges of harmonising.
a) False
b) True

View Answer

Answer: b [Reason:] Synchronization techniques will be necessary to address the various challenges of harmonising plenty of copies of object data with potentially partially disconnected Internet of Things architecture components.

Set 5

1. What happens when service providers change their operating system and communication protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises

View Answer

Answer: a [Reason:] Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.

2. In SOA, Service is termed as __________
a) Software service
b) Network service
c) Business service
d) Developer service

View Answer

Answer: c [Reason:] Services are termed as business services. They are self-contained and logical.

3. Are SOA components loosely coupled.
a) True
b) False

View Answer

Answer: a [Reason:] They are loosely coupled. That means every service is self-contained and exists alone logically.

4. The SOA architecture is divided into how many layers?
a) 5 layers
b) 2 layers
c) 7 layers
d) no layers ie., only one layer

View Answer

Answer: b [Reason:] The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like database, web server etc.

5. Which layer in SOA delivers messages between applications?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

View Answer

Answer: a [Reason:] ESB is a group of components/ software which helps us to send and receive messages between the disparate applications. It is usually shown as a huge plump pipe in the architecture.

6. Which block is the central reference of meta-data for services?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

View Answer

Answer: c [Reason:] SOA registry is like reference database of services. It describes what each service does, where they are located, and how they can communicate.

7. Which block ties work flow and SOA registry?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) Accounting package
d) SOA supervisor

View Answer

Answer: b [Reason:] Service broker reads the work flow and takes services from the SOA registry and ties them together. Service brokers are normally middleware like EAI(Enterprise Application Integration) products.

8. Which blocks deals with performance issues?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

View Answer

Answer: d [Reason:] SOA supervisor is a traffic cop ensuring do not having issues. It deals with performance issues of the system so that appropriate service levels are met. If any of the services have performance problems it sends messages to the proper infrastructure to fix the issue.

9. What are the three terminologies on which SOA service stands__________
a) Contract, Address and Building
b) Contract, Address and Service
c) Service, Contract and Building
d) Service, Building and Address

View Answer

Answer: a [Reason:] Contract-It describes parameters and return values for a method. Address-It is a URL which points to the location of the service. Building-It determines how the communication is done.

10. Which standard is preferable to achieve SOA?
a) Software service
b) Business service
c) Network service
d) Web service

View Answer

Answer: d [Reason:] In SOA we need services to be loosely coupled. A web service communicates using the SOAP protocol which is XML based, Which is very loosely coupled.

11. SOA stands for _____________
a) Solution Oriented Architecture
b) Sector Oriented Architecture
c) Service Oriented Architecture
d) Source Oriented Architecture

View Answer

Answer: c [Reason:] Service Oriented Architecture (SOA) approach traditionally used to couple functionality of heavyweight corporate IT systems, are becoming application to embedded real world devices.

12. ________ is used to describe a perceived, quickly growing set of web based applications.
a) Web 4.0
b) Web 3.5
c) Web 2.0
d) Web 4.5

View Answer

Answer: c [Reason:] Web 2.0 to describe a perceived, quickly growing set of web based applications. A topic that has experienced extensive coverage involves the relationship between Web 2.0 and service oriented architectures.

13. ________ is the philosophy of encapsulating application logic in services.
a) API
b) SOA
c) Both SOA and API
d) Neither SOA and API

View Answer

Answer: b [Reason:] SOA is the philosophy of encapsulating application logic in services with a uniformly defined interface and making these publicly available via discovery mechanisms.

14. ________ are a modern interpretation of service oriented architectures used to build distributed software systems.
a) SOA
b) API
c) Microservices
d) Web 2.0

View Answer

Answer: c [Reason:] Microservices are a modern interpretation of service oriented architectures used to build distributed software systems. Services in the microservice architecture are processes.

15. Services in a microservice architecture are ………. that communicates with each other over the network.
a) Microservices
b) SOA
c) API
d) Processes

View Answer

Answer: d [Reason:] Services in the microservice architecture are processes that communicate with each other over the network in order to fulfill a goal. These services use technology agnostic protocols.