0% found this document useful (0 votes)
2K views6 pages

m4 r5 Iot MCQ Questions

For preparing NIELIT O Level IOT Paper

Uploaded by

ab161277761
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2K views6 pages

m4 r5 Iot MCQ Questions

For preparing NIELIT O Level IOT Paper

Uploaded by

ab161277761
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MCQ Sample Questions

Paper Code: M4-R5


Paper Name: IoT and its Applications
Unit 1: Introduction to IoT- Applications/Devices

1. Which of the following transducers have on-board battery facility?

a) Active transducers
b) Passive transducers
c)Both a and b
d)None of these
correct Answer-a

2. Which of the following IEEE standards represent WIMAX?


a)802.3
b)802.11
c)802.16
d)802.15.4
correct Answer:d

3.What is the maximum date rate of BLE?


a)2Mbps
b)4 Mbps
c)8Mbps
d)10Mbps
Correct answer: a

4.Which of the following protocol facilitates packet flow identification?


a) IPV4
b) IPV6
c)Both a and b
d)None of these
Correct answer:b

5. Which of the following protocol is called as ”Father of modern home automation”?


a) Sigfox
b) Zigbee
c) X-10
d) LoRaWAN
Correct Answer:c
Unit 2: Things and connections

1. Which of the following system does have a feedback mechanism?


a)Open loop control system
b)Closed loop control system
c)MIMO system
d)None of the above
Correct Answer:b

2. Which of the following protocol works in the transport layer?


a)MQTT
b)TCP
c)IPV6
d)UDP
Correct answer:UDP

3.Which of the following cables are very much responsible for noise cancellation in
communication?
a)Coaxial cable
b)Twisted pair cable
c)Fiber optic cable
d)None of the above
Correct answer:b

4.Which of the following cables are the most susceptible to EMI?


a)UTP
b)STP
c)Coaxial cable
d)Fiber optic cable
Correct answer:a

5.Which cable uses the principle of TIR transfers signal from one point to another point?
a)UTP
b)STP
c)Coaxial cable
d)Fiber optic cable
Correct answer:d
Unit 3:Sensors,actuators and Microcontrollers

1.What are the appropriate criteria for selecting a sensor?


a)Range
b)Accuracy
c)Resolution
d)All of the above
Correct Answer:d

2.What is the full form of CISC?


a)Complex instruction set computers
b)Calculated informed set computers
c)Complex inflow set computers
d)None of the above
Correct answer:a

3.The LDR sensor converts the --------------energy into the change in resistance .
a)Photonic
b)Hydraulic
c)Pneumatic
d)Gaseous
Correct answer:a

4.Which of the following sensor converts biological process into electrical signals?
a)IR sensors
b)Ultrasonic sensors
c)Biosensors
d)LDR
Correct answer:c

5.Which of the following are the application area of 8051 microcontroller?


a)Medical equipment
b)Aeronautical and space
c)Defense system
d)All of the above
Correct answer:d
Unit 4:Building IOT applications:

1.Which of the following extension is used for saving the Arduino code?
a).uno
b).ino
c).eno
d).ano
Correct answer:b

2.Which of the following function is used for intializing pins on Arduino board?
a) setup()
b) loop()
c) Both a and b
d)None of the above
Correct answer:a

3.Total no. of analog pins present on the Arduino board is-----


a)4
b)6
c)8
d)10
Correct answer:b

4.The Arduino board can be powered on by using ----------


a)DC powerjack
b)USB cable
c)Both a and b
d)None of the above
Correct answer:c

5.Which of the following sensor is used for measuring temperature and humidity?
a)MQ135
b)HC-SR-04
c)DHT11
d)None of the above
Correct answer:c
Unit 5:Security and Future of IOT ecosystem:

1.Botnet is often used to launch_____________ attack


a)DoS
b)DDoS
c)Brute force
d)Passive
Correct Answer:b

2.Which of the following is a system based attack?


a)Phishing
b)Session hijacking
c)Trojan horse
d)Brute force attack
Correct Answer:c

3.What is Artificial Intelligence?


a)Putting your intelligence into computer
b)Programming with your own intelligence
c)Making a machine intelligent
d)Putting more memory into computer
Correct Answer:c

4._________ is designed to launch botnet attack from IOT.

a)Virus
b)Trojan
c)Phishing
d)Mirai
Correct Answer:d

5.Bitcoin transaction are verified by network nodes and recorded in a public distribute
ledger called a_____________.
a)Artificial Intelligence
b)Machine learning
c)Blockchain
d)None of the above.
Correct answer:c
Unit 6:Soft-skills-Personality Development

1.The most persistent behavior of human attitude is called as___________


a)Personality
b)Self-efficacy
c)Self-motivation
d)Self-esteem
Correct Answer:a

2.____________factors affect the personality of an individual.

a)Psychological
b)Social
c)Both a & b
d)None of the above
Correct Answer:c

3.The handshake that conveys confidence is:

a)Limp
b)Firm
c)Loose
d)None of these
Correct Answer:b

4.____________ is the extent of one’s belief in its own ability to compete the task and
reach towards its goals.

a)Self-esteem
b)Self-evaluation
c)Self-efficiency
d)Self-analysis
Correct answer: c

5._____________ means being specific,definite and vivid.

a)Consideration
b)Completeness
c)Concreteness
d)Conciseness

Correct answer: c

You might also like