Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
nmims post
Objective Type Set
Online MCQ Assignment
Question Solution
Solved Question
Uncategorized

Multiple choice question for engineering

Set 1

1. ________ device, perhaps in the form of doll or toy.
a) Anthropomorphic
b) Devil toy
c) Chunky
d) Teddy

View Answer

Answer: a [Reason:] Anthropomorphic device, perhaps in the form of doll or toy, may be configured to control one or more media devices.

2. The anthropomorphic device may aim its gaze at the source of ________
a) Interpreter
b) Media device
c) Social cue
d) Transmitter

View Answer

Answer: c [Reason:] Upon reception or a detection of a social cue, such as movement or spoken word or phase, the anthropomorphic device may aim its gaze at the source of the social cue.

3. The anthropomorphic device may transmit the media device command to ________
a) Social cue
b) Media device
c) Interpreter
d) Transmitter

View Answer

Answer: b [Reason:] In response to receiving a voice command, the anthropomorphic device may interpret the voice command and map it to a media device command. Then, the device may transmit the media command to a media device.

4. The toy includes ________
a) Microphone
b) Camera
c) Speaker
d) Microphone, camera, and speaker

View Answer

Answer: d [Reason:] The toys, which include microphones, cameras, speakers and motors, have some people pointing at teddy, the super computer toy.

5. The privacy concerns are ________ when devices have the capacity to record conversations and log activity.
a) Clear
b) Not clear
c) Fluctuating
d) Constant

View Answer

Answer: a [Reason:] The privacy concerns are clear when devices have the capacity to record conversations and log activity.

6. When we hear about IoT, we think of our ________
a) Microphone
b) Speaker
c) Thermostat
d) Transmitter

View Answer

Answer: c [Reason:] Usually when you hear about the Internet of Things, you think about it in terms of your thermostat.

7. Sensible objects first game is called Fabulous Beast.
a) True
b) False

View Answer

Answer: a [Reason:] Sensible objects first game is called Fabulous Beast. A multi-player balancing game that fleetwood describes as a cross between Jenga and collectible card pokemon.

8. Hello Barbie does what?
a) Moves its hands
b) Raises its Eyebrow
c) Moves its legs
d) Moves its head

View Answer

Answer: b [Reason:] Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.

9. Does the HelloBarbie connected to cloud?
a) True
b) False

View Answer

Answer: a [Reason:] Barbie went through hard times as Mattel released Hello Barbie, a cloud connected doll that raised eyebrows amongst parents who were uncomfortable with Barbie listening to children.

10. Using ________ toy will keep interaction between toy and child.
a) Device
b) Motor
c) Driver
d) Engine

View Answer

Answer: d [Reason:] Using a dialogue engine to utilize some of the most advanced language processing algorithms available driving the personalization of our platform, and keeping the interaction going between toy and child.

11. With set of sensors and app children can do ________
a) Feed
b) Bathe
c) Hatch
d) Feed, bathe and hatch

View Answer

Answer: d [Reason:] Peppered with his own set of sensors and app children can virtual feed, bathe, and hatch the toy, providing yet another variant of how physical toys and connectivity can merge.

12. ________ introduces children to the concept of computer programming.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy

View Answer

Answer: a [Reason:] Lightbot introduces children to the concept of computer programming through fun interactive puzzles.

13. Using what the time can and should be used for encouraging education and imagination.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy

View Answer

Answer: b [Reason:] The connected toy should not abuse this already concerning trend, but capitalize on the value it produces. With this children’s should improve education and imagination.

14. By using which of the following the floor of the child plays area turn into interactive game?
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy

View Answer

Answer: c [Reason:] Lumo’s Interactive Projector turns the floor of your child play area into an interactive game that encourages running, jumping and all sorts os physical activities, which makes the child healthy and active.

15. ________ the connected toy will warrant significant effort from manufactures.
a) Lightbot
b) Brain Development
c) Healthy and activity
d) Privacy and safety

View Answer

Answer: d [Reason:] Safety and privacy surrounding the connected toy will warrant significant effort from manufactures and parents alike.

Set 2

1. What are the functions of the transport layer?
a) Multiplexing/ Demultiplexing
b) Connection less Services
c) Connection oriented service
d) Congestion control

View Answer

Answer: a [Reason:] Transport layer functions are: –> Multiplexing / DE multiplexing : Normally the transport layer will create distinct network connection for each transport connection required by the session layer. –> Fragmentation and Re assembly: The data accepted by the transport layer from the session layer is split up into smaller units if needed and then passed to the network layer.

2. Which services are provided by transport layer?
a) Error control
b) Connection service
c) Connection less service
d) Congestion control

View Answer

Answer: a [Reason:] The transport layer also decides the type of service that should be provided to the session layer. The message may or may not be received in the order in which it was sent. The decision regarding the type of service to be provided is taken at the time when the connection is established.

3. TCP and UDP are called ________
a) Application protocols
b) Session protocols
c) Transport protocols
d) Network protocols

View Answer

Answer: c [Reason:] Above the network layer, we find TCP and UDP, the two transport protocols. TCP is used for most of our human interactions with the web. UDP is also better suited for real-time data applications such as voice and video.

4. Security based connection is provided by which layer?
a) Network layer
b) Session layer
c) Application layer
d) Transport layer

View Answer

Answer: d [Reason:] IOT is, of course all about connection to the internet. And even moreso, it is about security. Without security and without encrypted communication, anyone can see what I send and receive. So encryption and secure communication are key. The solution is to use a connection that uses the TLS(Transport Layer Security) Protocol.

5. TCP is the standard protocol with std no?
a) 5
b) 4
c) 7
d) 3

View Answer

Answer: c [Reason:] TCP is a standard protocol with STD number 7. TCP is described by RFC 793-Transmission Control Protocol. Its status is recommended, but in practice, every TCP/IP implementation that is not used exclusively for routing will include TCP.

6. Using which method in transport layer data integrity can be ensured?
a) Checksum
b) Repetition codes
c) Cyclic redundancy checks
d) Error correcting codes

View Answer

Answer: a [Reason:] Using checksum’s, the data integrity across all the delivery layers can be ensured. These checksum’s guarantee that the data transmitted is he same as the data received through repeated attempts made by other layers to have missing data resent.

7. Buffer overrun can be reduced by using what?
a) Traffic control
b) Flow control
c) Byte orientation
d) Data integrity

View Answer

Answer: b [Reason:] Devices at each end of a network connection often have no way of knowing each other’s capabilities in terms of data throughput and can therefore send data faster than the receiving devices is able to buffer or process it. In these cases, buffer overruns can cause complete communication breakdowns.

8. Transport layer can identify the symptoms of overload nodes using _________
a) Flow control
b) Traffic control
c) Byte orientation
d) Data integrity

View Answer

Answer: b [Reason:] Digital communications networks are subject to bandwidth and processing speed restrictions,, which can mean a huge amount of potential for data congestion on the network. This network congestion can affect almost every part of a network. The transport layer can identify the symptoms of overload nodes and reduced flow rates.

9. Transport layer receives data in the form of __________
a) Packets
b) Byte streams
c) Bits stream
d) Both packets and Byte stream

View Answer

Answer: b [Reason:] Some applications prefer to receive byte stream instead of packets; the transport layer allows for the transmission of byte-orientated data stream if required.

10. Transport layer is which layer in OSI model?
a) Fourth layer
b) Third layer
c) Second layer
d) Fifth layer

View Answer

Answer: a [Reason:] The transport layer is the fourth layer from the bottom in the OSI reference model. It is responsible for message delivery from process.

11. Congestion control can control traffic entry into a telecommunications network, so to avoid _________
a) Congestive connection
b) Connection collapse
c) Congestive collapse
d) Collapse congestive

View Answer

Answer: c [Reason:] Congestion control can control traffic entry into a telecommunications network, so to avoid Congestive collapse by attempting to avoid oversubscription of any of the processing or link capabilities of the intermediate nodes.

12. FCP stands for _________
a) Fiber Channel Protocol
b) Field Channel Protocol
c) Fast Channel Protocol
d) Fiber Carrying Protocol

View Answer

Answer: a [Reason:] Fiber Channel Protocol is the SCSI interface protocol utilizing an underlying Fiber channel connection.

13. UDP packets are called as _________
a) Segments
b) Checksum
c) Frames
d) Datagrams

View Answer

Answer: d [Reason:] UDP is a very simple protocol, and does not provide virtual circuits, nor reliable communication, deleting these functions to the application program. UDP packets are called datagrams, rather than segments.

14. _________ do not provide end to end communication.
a) TCP
b) UDP
c) Both TCP and UDP
d) Neither TCP nor UDP

View Answer

Answer: b [Reason:] TCP, not UDP, provide end to end communication, i.e. error recovery by means of error detecting code and automatic repeat request protocol.

15. ARQ stands for __________
a) Automatic Repeat Request
b) Automatic Request Repeat
c) Application Repeat Request
d) Application Request Repeat

View Answer

Answer: a [Reason:] TCP, not UDP, provide end to end communication, i.e. error recovery by means of error detecting code and automatic repeat request protocol. The ARQ protocol also provides flow control, which may be combined with congestion avoidance.

Set 3

1. GPS module like SIM900/800 uses which protocol?
a) UART protocol
b) USART protocol
c) SPI protocol
d) I2C protocol

View Answer

Answer: a [Reason:] GSM/GPS modules like SIM900/800 uses UART communication for accepting AT commands that are used to control them and gather the replies.

2. Finger print sensor uses which interface?
a) USART protocol
b) UART protocol
c) SPI protocol
d) I2C protocol

View Answer

Answer: b [Reason:] Projects that use RFID modules can be built with modules that have an UART interface. This even applies to some finger print sensors.

3. RS232 is used for long range wired communication.
a) True
b) False

View Answer

Answer: a [Reason:] For long range communications we can convert UART protocol using an external IC to RS232 or RS485, the latter of which can be used for wired communication @100 kbits/sec up to 1.2km.

4. UART is similar to _________
a) SPI protocol
b) I2C protocol
c) HTTP protocol
d) MQTT protocol

View Answer

Answer: b [Reason:] UART(Universal Asynchronous Receiver/Transmitter) is a small, efficient communication device, similar to I2C.

5.What does UART contains?
a) Parallel register
b) Shift register
c) Clock
d) Parallel shift register

View Answer

Answer: b [Reason:] UART contains a shift register, which is the fundamental method of conversion between serial and parallel forms.

6. Communication in UART is ___________
a) Only simple
b) Only duplex
c) Only full duplex
d) Simplex, half duplex, full duplex

View Answer

Answer: d [Reason:] Communication may be simplex(in one direction only no provision for the receiving device to send data back to the transmission device), full duplex(both devices send and receive data at the same time), half duplex(devices takes turns transmitting and receiving).

7. Start bit of UART is logic high.
a) True
b) False

View Answer

Answer: b [Reason:] The start bit is logical low. The start bit signals the receiver that a new character is coming.

8. Which error occurs when the receiver can’t process the character?
a) Overrun error
b) Underrun error
c) Framing error
d) Break condition

View Answer

Answer: a [Reason:] An over run error occur when the receiver cannot process the character that just came in before the next one arrives. If the CPU or DMA controller does not service the UART quickly enough and the buffer become full, an over run will occur, and incoming will be lost.

9. What is WD1402A?
a) SPI
b) USART
c) SPIUART
d) I2C

View Answer

Answer: c [Reason:] WD1402A is the first single chip UART on general sale. Introduced about 1971. Compatible chip included the Fairchild TR1402A and the general instruments AY-5-1013.

10. What is the speed of the 8250 UART?
a) 4800bits/sec
b) 1200bits/sec
c) 12000bit/sec
d) 9600bits/sec

View Answer

Answer: d [Reason:] The 8250 UART has one character buffer for the receiver and the transmitter each, which meant that communications software performed poorly at speed above 9600bits/sec, especially it operating under a multitasking system or if handling interrupts from disk controllers.

11. Which error occurs when UART transmitter has completed sending a character and the transmit buffer is empty?
a) Overrun error
b) Underrun error
c) Framing error
d) Break condition

View Answer

Answer: b [Reason:] An Under run error occurs when UART transmitter has completed sending a character and the transmit buffer is empty. In asynchronous mode this is treated as an indication that no data remains to be transmitted.

12. Which error occurs when the designated start and stop bits are not found?
a) Overrun error
b) Underrun error
c) Framing error
d) Break condition

View Answer

Answer: c [Reason:] A framing error occurs when the designated start and stop bits are not found. If the data line is not in the expected state when the stop bit is expected, a framing error will occur.

13. Which error occurs when the parity of the number of 1 bits disagrees with that specified by the parity bit?
a) Overrun error
b) Underrun error
c) Framing error
d) Parity error

View Answer

Answer: d [Reason:] A parity error occurs when the parity of the number of 1 bits disagrees with that specified by the parity bit. Using parity is optional, so this error will only occur if parity checking has been enabled.

14. A __________ occurs when the receiver input is at the space level.
a) Overrun error
b) Underrun error
c) Framing error
d) Break condition

View Answer

Answer: d [Reason:] A break condition occurs when the receiver input is at the space level for longer than some duration of time, typically, for more than a character time.

15. The term break derives from ___________ signaling.
a) Current loop
b) Voltage loop
c) Power loop
d) Current and Power loop

View Answer

Answer: a [Reason:] The term break derives from current loop signaling, which was the traditional signaling used for teletypewriters.

Set 4

1. What is the protocol used by USART?
a) RS232
b) RS232C
c) RS485
d) RS422

View Answer

Answer: b [Reason:] RS232C is a long established standard (“c” is the current version) that describes the physical interface and protocol for relatively low speed serial data communication between computers and relates devices.

2. USART provides a synchronous mode that is not in UART?
a) True
b) False

View Answer

Answer: a [Reason:] Unlike a UART, USART offers the option of synchronous mode. In program to program communication, the synchronous mode requires that each end of an exchange respond in turn without initiating a new communication.

3. Which of the following needs a clock?
a) Only Asynchronous
b) Only synchronous
c) Both synchronous and Asynchronous
d) Sometimes Synchronous

View Answer

Answer: b [Reason:] Synchronous mode requires both data and clock. Asynchronous mode requires only data.

4. During receiving operation what does URXD have?
a) Positive edge
b) Negative edge
c) Level edge
d) Either raising or falling edge

View Answer

Answer: a [Reason:] The receive operation is initiated by the receipt of a valid start bit. It consists of a negative edge at URXD, followed by the taking of majority vote from three samples, where 2 of the samples must be zero.

5. What is the timing of X?
a) 1/32 to 1/64 times of BRCKL
b) 1/42 to 1/63 times of BRCKL
c) 1/32 to 1/63 times of BRCKL
d) 1/32 to 1/56 times of BRCKL

View Answer

Answer: c [Reason:] The timing of x is 1/32 to 1/63 of BRCLK, bu at least BRCLK, depending on the division on the division rate of the baud rate generation.

6. The secondary implementation uses a fixed second clock divided which is divided by ______________
a) 4
b) 8
c) 32
d) 16

View Answer

Answer: d [Reason:] The standard implementation uses a prescalar from any clock source and a fixed second clock divider which is usually a divided by 16.

7. The USART module supports ________ multiprocessor communication modes when the asynchronous mode is used.
a) one
b) two
c) three
d) five

View Answer

Answer: b [Reason:] These formats can be used to transfer information between many microcomputers on the same serial link. Information is transferred as a block of frames from a particular source to one or more destinations.

8. How many asynchronous multiprocessor protocols are present?
a) 4
b) 3
c) 2
d) 5

View Answer

Answer: c [Reason:] Both asynchronous multiprocessor protocols, the idel line and the address bit microprocessor mode allow efficient data transfer between multiple communication systems.

9. Which bit in control register defines the address bit or idle line multiprocessor protocol mode?
a) MM
b) URXWIE
c) URXIE
d) RXWake

View Answer

Answer: a [Reason:] The MM bit in control register defines the address bit or idle line multiprocessor protocol mode. Both formats use the wake up on transmitting, using the address feature function (TWWake bit), and on activating the RXWake bit.

10. In idle line multiprocessor mode, a precise idle period can be generated to create efficient address character identifiers.
a) True
b) False

View Answer

Answer: a [Reason:] In idle line multiprocessor mode, a precise idle period can be generated to create efficient address character identifiers.

11. In synchronous operation characters must be provided on time if not ______ error occurs.
a) Overrun error
b) Underrun error
c) Framing error
d) Parity error

View Answer

Answer: b [Reason:] USART in synchronous operation characters must be provided on time until a frame is complete, if the controlling processor does not do so, this is an underrun error, and transmission of the frame is aborted.

12. HDLC stands for ___________
a) High level Data Link Control
b) High level Data Level Control
c) High level Data Link Coordinator
d) High level Data Link Commutator

View Answer

Answer: a [Reason:] ISO standard high level data link control synchronous link layer protocols, which were with synchronous voice frequency modems.

13. SDLC stands for ___________
a) Synchronous Data Link Control
b) Synchronous Data Level Control
c) Synchronous Data Level Coordinator
d) Synchronous Data Link Coordinator

View Answer

Answer: a [Reason:] Synchronous Data Link Control synchronous link layer protocols, which were with synchronous voice frequency modems. These protocols were designed to make the best use of bandwidth when modems were analog devices.

14. STR stands for___________
a) Synchronous Transmit Rate
b) Synchronous Target Rate
c) Synchronous Target Receive
d) Synchronous Transmit Receive

View Answer

Answer: d [Reason:] Synchronous Transmit Receive, which were with synchronous voice frequency modems. These protocols were designed to make the best use of bandwidth when modems were analog devices.

15. BSC stands for ____________
a) Binary Service Communication
b) Bandwidth Synchronous Communication
c) Binary Synchronous Communication
d) Bandwidth Service Communication

View Answer

Answer: c [Reason:] Binary Synchronous Communication, which were with synchronous voice frequency modems. These protocols were designed to make the best use of bandwidth when modems were analog devices.

Set 5

1. Boot loader consists of __________ number of components.
a) 4 components
b) 2 components
c) 3 components
d) 5 components

View Answer

Answer: c [Reason:] The boot loader consists of the following components: –> Target MCU –> Master programmer –> Data source.

2. All silicon labs SiMxxxxx MCUs with Flash memory are self-programmable.
a) True
b) False

View Answer

Answer: a [Reason:] All silicon labs SiMxxxxx MCUs with Flash memory are self-programmable, ie., code running on the MCUs can erase and write other parts of the code memory.

3. If the device is programmed with a bootloader, the application image is loaded in _________ interface.
a) UART
b) USB
c) SPI
d) I2C

View Answer

Answer: b [Reason:] An uninitialized device requires the bootloader to be flashed over the debug interface. Once the device is programmed with a bootloader, the application image is loaded in USB interface.

4. Application/s that provide to test the bootloader functionality.
a) Blinky_Fast and B.inky-Medium
b) Only Blinky_slow
c) Only Blinky_Fast
d) Blinky_Fast and Blinky_Slow

View Answer

Answer: d [Reason:] There are two example applications provided to test out the bootloader functionality: –> Blinky_Fast –> Blinky_Slow.

5. _________ command should be performed to very that the firmware image is Blinky_fast
a) Query
b) Reset
c) Upload
d) Download

View Answer

Answer: a [Reason:] Query command is performed and we have to verify that the sAppName of the loaded firmware image is Blinky_Fast.

6. Which switch should be pressed to perform all commands?
a) Up switch
b) Push
c) Down switch
d) Reset switch

View Answer

Answer: d [Reason:] Force the device into bootloader mode by holding down sw2 and pressing and releasing reset switch to perform a query, upload, or download command on the device.

7. DFU stands for Device Firmware Update.
a) True
b) False

View Answer

Answer: a [Reason:] The file manager and DFU state machine are imported unmodified from the framework software.

8. When is DEVICE_Init called?
a) Upload
b) Reset
c) Download
d) Query

View Answer

Answer: b [Reason:] The DEVICE_Init routine is called after each device reset and is responsible for initializing the device and checking for the appropriate trigger sources.

9. DEVICE_Init performs what?
a) Disabling watchdog timer and disabling APB clock
b) Enabling APB clock and enabling watchdog timer
c) Disabling watchdog timer and enabling APB clock
d) Disabling APB clock and enabling watchdog timer

View Answer

Answer: c [Reason:] The DEVICE_Init routine performs the following functions: –> Disables the watchdog timer and enables the APB clock –> Determines the amount of Flash and RAM in the device –> Check all internal and external automatic trigger sources.

10. DEVICE_Restore routine restores all the device registers modified by DEVICE_Init to their reset values.
a) True
b) False

View Answer

Answer: a [Reason:] DEVICE_Restore routine restores all the device registers modified by DEVICE_Init to their reset values. This includes starting the watchdog timer and restoring the APB clock gates back to their reset value.