IoT (Internet of Things) MCQ
1) How many numbers of the element in the open IoT architecture?
- Four elements
- Five elements
- Six elements
- Seven elements
Answer: (d) Seven elements
Description: There are seven numbers of elements in the open IoT architecture:
- Configuration and monitoring
- Cloud data storage
- Scheduler
- Request definition
- Request presentation
- Service delivery and utility manager
- Sensor middleware (X-GSN)
2) Which of the following is the way in which an IoT device is associated with data?
- Internet
- Cloud
- Automata
- Network
Answer: (b) Cloud
Description: Cloud-based services provide a way for IoT devices to be connected to data. For example: Just as the WWW (World Wide Web) runs on the Internet, so does IoT.
3) Which of the following IoT networks has a very short range?
- Short Network
- LPWAN
- SigFox
- Short-range Wireless Network
Answer: (d) Short Range Wireless Network
Description: Short-range wireless networks have a very short range. This type of network is used for applications running in the local environment. The best example of this network is Wi-Fi and Bluetooth.
4) What is the full form of the LPWAN?
- Low Protocol Wide Area Network
- Low Power Wide Area Network
- Long Protocol Wide Area Network
- Long Power Wide Area Network
Answer: (b) Low Power Wide Area Network
Description: The full form of the LPWAN is Low Power Wide Area Network. LPWAN is a type of wireless telecommunication, and it is specially designed for M2M (Machine to Machine) and IoT devices.
5) An IoT network is a collection of ______ devices.
- Signal
- Machine to Machine
- Interconnected
- Network to Network
Answer: (c) Interconnected
Description: An IoT network is a collection of interconnected devices that communicate with other devices without human involvement.
6) Which one of the following is not an IoT device?
- Amazon echo voice controller
- Google Home
- Nest Smoke Alarm
- None of these
Answer: (d) None of the these
Description: These are all IoT devices. Google Home is a smart speaker that obeys all the commands given by the user. The Amazon Echo Voice Controller is also a smart speaker. The Nest Smoke Alarm is an IoT device that sends a smoke alert message to the user when a fire occurs.
7) What is the main purpose of WoT (Web of Things) in the IoT?
- Improve the usability and interoperability
- Reduce the security
- Complex the development
- Increase the cost
Answer: (a) Improve the usability and interoperability
Description: The main purpose of the Web of Things is to improve the usability and interoperability in IoT. Developing IoT Apps through WoT is much easier, faster, and less expensive.
8) What is the Arduino UNO?
- Software
- Hardware device
- Network
- Protocol
Answer: (b) Hardware device
Description: The Arduino Uno is a hardware device that is based on the Microchip ATmega328P microcontroller. It has been developed by Arduino.cc.
9) ______ allows the user to control electronic components.
- Android API
- RETful API
- MQTT API
- CoAP API
Answer: (b) RETful API
Description: The RETful API allows the user to control the electronic components connected to the Intel Galileo Gen 2 board via HTTP requests.
10) Which of the following is not an application of IoT?
- Wearables
- Smart Grid
- Arduino
- Smart City
Answer: (c) Arduino
Description: The Arduino Uno is a hardware device that is based on the Microchip ATmega328P microcontroller.
11) Which one of the following protocols is lightweight?
- IP
- HTTP
- MQTT
- CoAP
Answer: (c) MQTT
Description: The full form of the MQTT is Message Queue Telemetry Transport. It is a lightweight messaging protocol that runs over the TCP / IP protocol.
12) What is the role of Big Data in IoT's Smart Grid architecture?
- Filter the data
- Locked the data
- Store data
- None of the these
Answer: (c) Store data
Description: The main role of Big Data is to store data on a real-time basis. It uses multiple storage technologies to store the data.
13) What is the real example of a smart grid device in IoT?
- Mobile phone
- Television
- Smart Speaker
- Smart Meters
Answer: (d) Smart Meters
Description: Smart Grid is used to monitor the power supply. Consumers' data is collected using a smart grid, and that data is analyzed and distributed to the consumers. The real example of a smart grid device is a smart meter.
14) What is the full form of the MQTT?
- Multi-Queue Telemetry Things
- Multiple Queue Telemetry Things
- Message Queue Telemetry Things
- Message Queue Telemetry Transport
Answer: (d) Message Queue Telemetry Transport
Description: The full form of the MQTT is Message Queue Telemetry Transport. It is a lightweight messaging protocol that runs over the TCP / IP protocol.
15) What is the full form of ICT?
- InterConnect Technology
- Internet Connection Topology
- Information and Communication Technology
- Infer Communication Topology
Answer: (c) Information and Communication Technology
Description: The full form of ICT is Information and Communication Technology. ICT is a multidimensional term for the IT sector that refers to all communication technologies, including the Internet, wireless networks, cell phones, computers, and software.
16) Which of the following frequencies is correct for the Galileo gen 2 board?
- 250 MHz
- 400 MHz
- 450 MHz
- 300 MHz
Answer: (b) 400 MHz
Description: The frequency of this board is 400 MHz. The Galileo gen 2 board frequency gives the speed of operation of the board. Therefore, the speed increases as the frequency increases.
17) What is the full form of IANA?
- Inter-Assessment-Number-Access
- Internet-Association-Numbers-Authority
- International-Aid-for-Network-Authority
- Internet-Assigned-Numbers-Authority
Answer: (d) Internet-Assigned-Numbers-Authority
Description: The full form of IANA is Internet-Assigned-Numbers-Authority. It is an administrative function of the Internet that monitors the IP addresses and domain names.
18) What is the standard port number of secure MQTT?
- 1883
- 8000
- 8883
- 8888
Answer: (c) 8883
Description: The standard port number of Secure MQTT is 8883, and it is registered in IANA for Secure MQTT.
19) Which of the following layers provides end-to-end communication in IoT?
- Logical layer
- Data link layer
- Transport layer
- Session layer
Answer: (c) Transport layer
Description: The transport layer focuses on end-to-end communication, and it gives reliability and congestion avoidance that packets will be delivered in the same way as the user sent the packet.
20) Which of the following devices is used to measure the gases or liquid?
- Optical Sensor
- Gas Sensor
- Smoke Sensor
- Pressure sensor
Answer: (d) Pressure sensor
Description: The pressure sensor is used to measure the gases or liquid. Pressure is the expression of a force that is necessary to prevent fluid from expansion.
21) Which interface does the fingerprint sensor use?
- UART interface
- CoAP interface
- SPI interface
- I2P interface
Answer: (a) UART interface
Description: The fingerprint sensor uses a UART interface to store fingerprint data. It can be configured in 1:1 or 1:N mode to identify the person.
22) Which of the following protocols is used by USART?
- RS32
- RS232C
- 4RS85
- All of the these
Answer: (b) RS232C
Description: The most commonly used protocol for USART in asynchronous mode is RS232C. This protocol describes the physical interface for relatively low-speed serial data-communication between devices and computers.
23) What is the full form of HDLC?
- Higher Data Level Communication
- Higher Data Link Communication
- High-level Data Link Control
- High Data Level Control
Answer: (c) High-level Data Link Control
Description: The full form of the HDLC is High level Data Link Control. It is a communication protocol. It is used to transmit data between nodes and data points.
24) Which of the following "bit" defines the address bit in the control register?
- ML
- MM
- RXWake
- None of the these
Answer: (b) MM
Description: The MM bit defines the address bit in the control register.
25) What is another name for I2C?
- Signal wire interface
- Two wire interfaces
- UART
- USART
Answer: (b) Two wire interface
Description: The I2C protocol is also known as the two-wire interface. It is a simple serial-communication-protocol that uses pins of a microcontroller, named as serial clock (SCL) and serial data (SDA).
26) When the clock line SCL is high, the SDA is ____ transitioned.
- Low
- High
- Medium
- All of the these
Answer: (a) Low
Description: When the clock line SCL is high, the SDA is low transitioned. Under normal circumstances, this does not happen, as you can see in the subsequent clock pulses that the data line is stable in one state, either high or low, when the clock line is high.
27) Which of the following protocols does the secure digital card application use?
- XMPP
- SPI
- MQTT
- HTTPS
Answer: (b) SPI
Description: SPI stands for Serial Peripheral Interface. The SPI protocol is commonly used to secure digital card applications and liquid crystal displays.
28) How many logic signals are there in the SPI protocol?
- Five signals
- Six signals
- Nine signals
- Zero signals
Answer: (a) Five signals
Description: There are five logic signals in the SPI protocol.
- SCLK (Serial Clock): This signal is used to clock-signal.
- MOSI (Master Output Slave Input): This signal is used to transfer the data from master to slave.
- MISO (Master Input Slave Output): This signal is used to transfer the data from slave to master.
- SDIO (Serial Data I/O)
- SS (Slave Select)
29) What does MOSI mean?
- MOSI is a network line.
- MOSI is a clock signal that sends the clock signals from master to slave.
- MOSI is a data line that sends the data from master to slave.
- None of the these
Answer: (c) MOSI is a data line that sends the data from master to slave.
Description: MOSI stands for Master Out Slave In. MOSI is a data line that sends the data from master to slave.
30) What is the full form of HART?
- Highway Application Remote Transport
- Highway Addressable Remote Transducer
- High Address Reduce Transport
- High Application Remote Transport
Answer: (b) Highway Addressable Remote Transducer
Description: The full form of HART is Highway Addressable Remote Transducer. It is a master and slave protocol in which a slave device only speaks when spoken by a master.
31) What is the range of z-wave?
- 30 to 100 m
- 300 to 1000 m
- 100 to 1000 m
- Only 10 m
Answer: (a) 30 to 100 m
Description: The Z-Wave is a low-power Mac protocol designed especially for smart home and small business domains. It covers the range from 30 to 100 m.
32) Which of the following topology is used for ZigBee Smart Energy?
- Bus Topology
- Ring Topology
- Star Topology
- Any Topology
Answer: (c) Star Topology
Description: ZigBee Smart Energy is designed for a wide range of IoT applications. It supports a wide range of network topologies, such as star topology.
33) Which of the following protocols does not exist at the data link layer?
- ZigBee Smart Energy
- LoRaWAN
- WirelessHART
- Secure MQTT
Answer: (d) Secure MQTT
Description: Secure MQTT is a session layer protocol. It is an extended version of the MQTT protocol that uses encryption based on lightweight attribute-based encryption.
34) Which of the following is the type of SPI controller?
- Micro-wire or plus
- Microwire
- Data SPI
- Queued SPI
Answer: (d) Queued SPI
Description: A Queued SPI is a type of SPI controller that is used to send a data queue from the SPI bus.
35) What is MQTT primarily used for?
- User communication
- System transfer
- Machine to Machine Communication
- Create connection
Answer: (c) Machine-to-Machine Communication
Description: MQTT is a public messaging protocol. It is designed for lightweight "Machine to Machine" communication. It was originally developed by IBM.
36) What is the frequency rate of z-wave?
- 908.42 GHz
- 928.49 GHz
- 888.42 GHz
- 708.49 GHz
Answer: (a) 908.42 GHz
Description: The frequency rate of z-wave is 908.42 GHz. The Z-Wave is a low-power Mac protocol designed especially for smart home and small business domains.
37) What is another name of the tactile sensor?
- Weight sensor
- Imaging sensor
- Proximity sensor
- Touch sensor
Answer: (d) Touch sensor
Description: The tactile sensor is also called a touch sensor. It is an electronic sensor used for detecting physical touch. The size of this sensor is very small.
38) How many types of capacitive touch sensors in IoT?
- Two types
- Five types
- Seven types
- Nine types
Answer: (a) Two types
Description: Two types of capacitive touch sensors in IoT:
- Projected-capacitive sensing
- Surface-capacitive sensing
39) Which of the following touch sensors is used in a cell phone?
- Resistive touch sensors
- Human sensor
- Capacitive touch sensor
- Follow sensor
Answer: (c) Capacitive touch sensor
Description: The capacitive touch sensors are widely used in portable devices such as cell phones. The main reason for this sensor development on the phone is low cost, durability, and design.
40) Which of the following languages does GSN work on?
- Python
- JAVA
- Android
- C++
Answer: (b) JAVA
Description: GSN stands for Global Sensor Network. GSN works on JAVA language because JAVA language is portable in nature. The other language (such as C, C++, Python, and HTML) is not portable in nature.
41) Which of the following is the example of a short-range wireless network?
- VPN
- Wi-Fi
- Internet
- WWW
Answer: (b) Wi-Fi
Description: Short-range wireless networks have a very short range. This type of network is used for applications running in the local environment. Examples of this network are Wi-Fi and Bluetooth.
1. _________ allows us to control electronic components
a) RETful API
b) RESTful API
c) HTTP
d) MQTT
View Answer
Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2 board through HTTP requests.
2. MQTT stands for _____________
a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport
View Answer
Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs on top of the TCP/IP protocol.
3. MQTT is better than HTTP for sending and receiving data.
a) True
b) False
View Answer
Explanation: We want to send and receive data in real time through internet and RESTful API is not the most appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.
4. MQTT is _________ protocol.
a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
View Answer
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.
5. Which protocol is lightweight?
a) MQTT
b) HTTP
c) CoAP
d) SPI
View Answer
Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe mechanism.
a) Network
b) Account
c) Portal
d) Keys
View Answer
Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages in the network.
7. By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
View Answer
Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and paste each of these keys to use them in our code that will publish messages and subscribe to them.
8. The messageChannel class declares the _________ class attribute that defines the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
View Answer
Explanation: The messageChannel class declares the command_key class attribute that defines the key string that defines what the code will understand as the command.
9. _________ method saves the received arguments in three attributes.
a) __Init
b) Init__
c) __Init__
d) _init_
View Answer
Explanation: __Init__ method saves the received arguments in three attributes with the same names.
10. _________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
View Answer
Explanation: Then, the constructor declares two local variables: public_key and subscribe_key. These local variables save the public and subscribe keys that we had generated with the PubNub Admin portal.
11. _________ specifies the function that will be called when there is a new message received from the channel.
a) Reconnect
b) Error
c) Connect
d) Callback
View Answer
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Callback: specifies the function that will be called when there is a new message received from the channel.
12. _________ specifies the function that will be called on an error event.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Error: specifies the function that will be called on an error event.
13. _________ Specifies the function that will be called when a successful connection with the PubNub cloud.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Connect: specifies the function that will be called when a successful connection with the PubNub cloud.
14. _________ specifies the function that will be called when a successful re-connection is completed.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Reconnect: specifies the function that will be called when a successful re-connection is completed with the PubNub cloud.
15. ___________ specifies the function that will be called when the client disconnects.
a) Callback
b) Error
c) Connect
d) Disconnect
View Answer
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Disconnect: specifies the function that will be called when the client disconnects from the PubNub cloud.
Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.
Ans:d. All of these.
In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation
Why is IPv6 preferred over IPv4 for IoT implementations?
a. Larger addressing range
b. More security
c. Both a and b
d. Neither a or b
Ans:c. Both a and b
The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these
Scalability of IoT means:
a. Expandable/reducible in terms of scale or size.
b. Measurable
c. Increasing/decreasing monetary costs.
d. All of these.
Ans:d. All of these.
Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these
Which statement is NOT TRUE:
a. IoT WAN connects various network segments.
b. IoT WAN is geographically wide.
c. IoT WAN is organizationally wide.
d. None of these.
Ans:d. None of these.
Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.
Ans:d. All of these.
Which of these is NOT a feature of Shape Memory Alloys (SMA)?
a. Low density
b. Low strain recovery
c. Biocompatibility
d. Biodegradability
Ans:b. Low strain recovery
Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.
Ans:d. Data sensing and actuation protocols.
MQTT stands for:
a. Message Queue Telemetry Transport
b. Multiple Queue Telemetry Transport
c. Multiple Query Transport Technique
d. Multiple Query Transport Technique
Ans:a. Message Queue Telemetry Transport
AMQP is designed for connecting:
a. Constrained networks
b. LANs and WANs
c. Systems and Business processes
d. None of these
Which modulation scheme is followed by IEEE 802.15.4 standard?
a. BPSK
b. QPSK
c. DSSS
d. All of these
Ans:d. All of these
Which CoAP message transfers response from the server within the acknowledgment message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback
Ans:d. Piggyback
Collision prevention in 802.15.4 standard is provided by means of:
a. CSMA-CA
b. CSMA-CD
c. ALOHA
d. None of these
Ans:a. CSMA-CA
Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these
Ans:a. RPL
The basic unit of AMQP data is:
a. A frame
b. A packet
c. A byte
d. A bit
Ans:a. A frame
RPL supports:
a. Message confidentiality
b. Loop detection in the routes
c. Data path validation
d. All of these
Ans:d. All of these
Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these
Ans:d. All of these
LOADng routing uses:
a. AODV
b. DSDV
c. RIPv2
d. OSPF
Ans:a. AODV
The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64
Ans:b. 15
Channel hopping is performed at which HART layer?
a. Physical
b. Data link
c. Network
d. Application
Ans:b. Data link
This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these
Ans:a. Healing
The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
d. All of these
Ans:d. All of these
WASN stands for:
a. Wireless and Sensor networks
b. Wired and Sensor networks
c. Wireless Ad-hoc Sensor Networks
d. None of these
Ans:c. Wireless Ad-hoc Sensor Networks
Class-2 Bluetooth devices have a range of:
a. 1m
b. 10m
c. 100m
d. 1000m
Ans:b. 10m
SOS in sensor web stands for
a. Sensor of a System
b. System of Sensors
c. Sensor Observation Service
d. None of these
Ans:c. Sensor Observation Service
Which topology is supported by Z wave:
a. Star
b. Mesh
c. Tree
d. All of these
Ans:d. All of these
QoS guarantees in WSNs include:
a. Offering guarantees in terms of bandwidth, delay, jitter
b. Offering guarantees in terms of packet loss probability.
c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF channel characteristics.
d. All of these
Ans:d. All of these
The WSN nodes are prone to:
a. Malicious attacks
b. Eavesdropping
c. Interference
d. All of these
Ans:d. All of these
With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage
Ans:a. Optimal Geographic Density Control
A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated
Ans:b. Covered
A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these
Ans:b. Passive Infra-Red
WMSNs stand for:
a. Wired Multimedia Sensor Networks
b. Wireless Multimedia Sensor Networks
c. Wireless Mobile Sensor Networks
d. Wireless Machine Sensor Network
Ans:b. Wireless Multimedia Sensor Networks
UAV-VANETS link-up may be used for:
a. visual guidance
b. Data-muling
c. Coverage enhancement
d. All of these
Ans:d. All of these
M2M stands for:
a. MAC to MAC communication
b. Machine to MAC communication
c. Machine to machine communication
d. MAC to machine communication
Ans:c. Machine to machine communication
In WSN area coverage problem, which is TRUE?
a. Energy-efficient random coverage
b. Connected random coverage
c. A network is connected if any active node can communicate with any other active nodes
d. All of these
Ans:d. All of these
In a M2M ecosystem, Internet service providers:
a. Provide their infrastructures for M2M device communications.
b. are responsible for devices providing raw data.
c. is an individual or company what utilizes M2M applications.
d. None of these
Ans:a. Provide their infrastructures for M2M device communications.
With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these
Ans:d. All of these
High-end M2M nodes have:
a. Mobility
b. QoS guarantees
c. Low density deployment
d. All of these
Ans:d. All of these
A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these
Ans:a. Verified and compiled
Why interoperability is required?
a. Heterogeneous wireless communication protocols
b. Different programming languages
c. Different control models
d. All of the above
Ans:d. All of the above
What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)
Ans:a. dht.readHumidity()
Device interoperability problem is between
a. Two devices
b. A device and an user
c. Both (a) and (b)
d. None of the above
Ans:a. Two devices
Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay
Ans:c. DHT
Which of the following is not a sensor?
a. Barometer
b. Light Dependent Resistor (LDR)
c. DHT
d. Relay
Ans:d. Relay
What is the servo library command to move the shaft of Servo motor back and forth across 180 degree?
a. Knob()
b. Sweep()
c. write()
d. detach()
Ans:b. Sweep()
The code written in Arduino IDE is referred to as:
a. Script
b. Block
b. Sweep()
d. Arduino Script
Ans:b. Sweep()
Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()
Ans:d. random()
Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these
Ans:d. None of the these
By default, the GPIO pins in Raspberry Pi are configured as?
a. Input except pins 14 and 15
b. Output except pins 14 and 15
c. Bcm
d. GPIO
Ans:a. Input except pins 14 and 15
Which of the following datatype is correct for the object below?
D = [‘python’, 3.43, ‘p’, 100]
a. Array
b. Dictionary
c. Tuple
d. List
Ans:b. Dictionary
What does the method readline() return:
a. One line
b. One byte
c. One character
d. Bool
Ans:a. One line
What is the maximum peripheral current draw allowed in Raspberry pi 3?
a. 1200mA
b. 700mA
c. 500mA
d. 100mA
Ans:a. 1200mA
Data collected by Raspberry Pi from the sensor can be
a. Processed in Raspberry Pi
b. Sent to other devices connected to the network
c. Used to control/activate other devices in the network
d. All of the above
Ans:d. All of the above
Relay is a kind of:
a. Sensor
b. Actuator
c. Hub
d. Router
Ans:b. Actuator
What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN
Ans:c. GPIO and BCM
Which of the following variants of Raspberry Pi has an inbuilt wi-fi?
a. Raspberry Pi 2
b. Raspberry Pi 3
c. Raspberry Pi A+
d. Raspberry Pi Zero
Ans:b. Raspberry Pi 3
Internet of Things refers to:
a. Interconnection of devices in a network
b. Exchange of data between devices in a network
c. An ecosystem of devices, accessible through internet
d. All of the above
Ans:d. All of the above
IoT devices must have:
a. A USB port
b. A unique identification
c. Wired connectivity
d. All of the above
Ans:b. A unique identification
Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data center
d. Cloud
Ans:b. Any device/program which serves or responds to the request from client
The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen
Ans:c. Any specified delimiter
Bind() function in Python socket programming is used to:
a. Specify the port for service on the specified host
b. Read data from the socket
c. Send data to the socket
d. Initiate the connection
Ans:a. Specify the port for service on the specified host
Application program interface (API) used between data and control planes in SDN is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans:c. Southbound API
When does a switch send PAKCET-IN message to a controller in SDN:
a. Flow-rule associated with a received flow does not exist
b. All the time
c. After deleting a flow-rule
d. None of the above
Ans:a. Flow-rule associated with a received flow does not exist
In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on OpenFlow protocol
Ans:a. Depends on application and network topology
One of the advantages of SDN-based sensor network is:
a. Real-time programmability
b. No need to replace any node
c. Both a & b
d. None of the above
Ans:a. Real-time programmability
Application program interface (API) used between application and control planes is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API
Ans:a. Northbound API
An SDN Controller can be placed based on:
a. Hierarchical manner
b. Star-topology
c. Mesh topology
d. All of the above
Ans:d. All of the above
Typically, __ protocol is used in low-rate wireless PANs:
a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above
Ans:a. IEEE 802.15.4
Using SDN, the following can be managed:
a. Network partition
b. Network matching
c. Load balancing
d. All of the above
Ans:d. All of the above
From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources
Ans:b. Low level generalization of computation
Pre-configure facility for allocation of virtualized resources comes under
a. Availability and reliability
b. Scalability and elasticity
c. Manageability and interoperability
d. Measured Services
Ans:c. Manageability and interoperability
Service Management mainly focusses on
a. Importance to desired outcomes of customers
b. Importance to desired outcomes of organizations
c. Both (a) and (b)
d. none of the above
Ans:a. Importance to desired outcomes of customers
Broad network access in cloud deals with
a. Dynamic allocation for scale out
b. Recorded resource usage
c. Availability of cloud resources over the network
d. All of the above
Ans:c. Availability of cloud resources over the network
Billing information is calculated using
a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above
Ans:c. Billing rules, Accounting records and Resource prices
Integrity in data security is :
a. Detecting unauthorized data modification
b. Sending secure data to cloud
c. Preserving the privacy of data
d. None of the above
Ans:a. Detecting unauthorized data modification
Cloud Analyst provides
a. Support for large scale cloud applications
b. GUI based control
c. Flexible and repeatable environment
d. All of these
Ans:d. All of these
GreenCloud Simulator is designed based on
a. NS-3
b. NS-2
c. CloudSim
d. DCSim
Ans:b. NS-2
Which of the following is not a cloud simulator?
a. CloudSim
b. NS-3
c. DCSim
d. GroudSim
Ans:b. NS-3
What is the purpose of floating IP in Openstack?
a. To connect the instance with the external network
b. To interconnect among instances
c. To connect among instances inside a same network
d. None of them
Ans:a. To connect the instance with the external network
We normally take snapshot in Openstack, _.
a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet
Ans:a. After the installation of an instance
Sensor-Cloud deals with
a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these
Ans:b. Sensor-as-a-Service
Which of the following statement is true in sensor-cloud
a. End user procures sensors and lend these to sensor-cloud service provider
b. Sensor-cloud is based only on dumping the sensor data to the cloud
c. Single sensor nodes is shared dedicatedly with only one end user
d. None of these
Ans:d. None of these
What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above
Ans:c. volume, latency, bandwidth
Why data volume is a problem in IoT-based cloud computing?
a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume of generated data is growing very fast
d. because IoT device density is decreasing each day and in turn the volume of generated data are decreasing very fast
Ans:c. because the density of IoT devices is increasing each day and in turn the volume of generated data is growing very fast
If the time-sensitive data are sent to cloud for analysis, the latency will be __
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased
Ans:a. Increased
What is a good approach to reduce latency?
a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes
Ans:a. Analyzing data close to the data source
What are less time-sensitive data?
a. Data which can be analyzed after seconds or minutes
b. Data which should be analyzed within fraction of a second
c. Data which can be wait for hours, days, weeks
d. Data which can be wait for months
Ans:a. Data which can be analyzed after seconds or minutes
How fog provide better privacy to industries and companies?
a. By providing the facility to store confidential data in their local servers
b. By providing more secure communication system
c. By providing a secured VPN network
d. All of the above
Ans:a. By providing the facility to store confidential data in their local servers
Which of these can be considered as the skeleton for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors
Ans:a. Buildings
Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors
Ans:d. Sensors
Smart Agriculture incorporates:
a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
c. Both the above
d. None of these
Ans:b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.
Heterogeneity for IoT in smart cities stands for:
a. Integration of varying hardware platforms and specifications.
b. Integration of different radio specifications.
c. Integration of various software platforms.
d. All of these
Ans:d. All of these
Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks
Ans:a. CNN
Which of these connects cable-based networks with wireless networks for increased sharing of media, control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi
Ans:b. DLNA
Which of these is NOT a feature of VANETs?
a. High Dynamic Topology
b. High transmission and computation capability
c. Stable connectivity
d. Predictable mobility pattern
Ans:c. Stable connectivity
X-10 protocol is characterized by:
a. Low-speed and low data rate.
b. Low speed and high data rate
c. High speed and low data rate
d. High speed and high data rate
Ans:a. Low-speed and low data rate.
The V2X paradigm is not restricted to a single source information provider.
a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True
Ans:a. True
TCP/IP fails in V2X because:
a. TCP/IP is designed mainly for handling information exchange between a single pair of entities.
b. Information exchanges in TCP/IP are dependent on the location of data.
c. TCP/IP can only identify the addresses of endpoints, which alone is not useful for content distribution.
d. All of these
Ans:d. All of these
Net metering depends on –
a. Energy consumed by the consumers and energy generated by the consumers
b. Energy consumed by the consumers and energy supplied back to the grid
c. Only energy consumed by the consumer
d. None of the above
Ans:b. Energy consumed by the consumers and energy supplied back to the grid
Smart grid enables –
a. Distributed energy management
b. Centralized energy management
c. Either of these
d. None of these
Ans:a. Distributed energy management
In smart grid, gateways communicate using –
a. IEEE 802.15.4
b. IEEE 802.15.6
c. 6LowPAN
d. IEEE 802.11
Ans:d. IEEE 802.11
Full form of SANETs –
a. Sensors and Actions Networks
b. Sensors and Actuator Networks
c. Smart and Active Networks
d. None of these
Ans:b. Sensors and Actuator Networks
In IIoT environment, networks can
a. Communicate with each other, external environment and people.
b. Communicate with each other, but not with external environment and people.
c. Does not communicate with each other, but communicates with external
environment.
d. Communicate with each other, but not with people.
Ans:a. Communicate with each other, external environment and people.
IIoT is mainly focused on
a. Convenience of individuals
b. Efficiency, safety and security of operation and individuals.
c. Efficiency of the system.
d. Data security.
Ans:b. Efficiency, safety and security of operation and individuals.
What is the key technology to enable V2V and V2R communication?
a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication
Ans:b. Dedicated Short Range Communication
What do you mean by service management in IIoT?
a. Implementation and management of the quality of services
b. Collection of services
c. Features extracted from data received
d. Services which do not meet the demand of end-users.
Ans:a. Implementation and management of the quality of services
Traditional RDBMS unable to process –
a. Structured data
b. Unstructured data
c. Both structured and unstructured data
d. None of these
Ans:b. Unstructured data
Structured data is managed in database using –
a. .NET Framework
b. Structured Query Language
c. Normal Language Processing
d. All of these
Ans:b. Structured Query Language
Mathematical model, which represents the relationship between variables, is termed as –
a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above
Ans:b. Statistical model
ANOVA has –
a. Two types
b. Three Types
c. Four Types
d. Any finite value
Ans:b. Three Types
Which of the following option supports a long-range communication
a. ZigBee
b. GPRS
c. Bluetooth
d. All of the above
Ans:b. GPRS
The primary challenges of an embedded operating system for WSN are
a. Small memory footprint
b. Low power and computing capability
c. Lack hardware parallelism
d. All of these
Ans:d. All of these
What is the network topology of Ambusens WBAN devices
a. Bus topology
b. Star Topology
c. Mesh Topology
d. None of the above
Ans:b. Star Topology
Which communication protocol is used between sensor devices in Ambusens WBAN system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1
Ans:d. IEEE 802.15.1
Which privacy-aware scheme is used in Ambusens cloud framework
a. Hashing and reverse hashing of patient physiological data
b. Patient identity masking by hashing-based mechanism
c. Hashing and reverse hashing of physiological sensor ID
d. All of the above
Ans:b. Patient identity masking by hashing-based mechanism
Activity monitoring:
a. Provides better quality of life
b. Provides information accurately in a reliable manner
c. Provides continuous monitoring support.
d. All of these
Ans:d. All of these
Which of these sensors can be most appropriately used for activity monitoring in wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED
Ans:a. Accelerometer
Statistical methods of activity recognition can work on:
a. Videos
b. Images
c. Scalar sensor data
d. All of these
Ans:c. Scalar sensor data
Which indicates the communication between internetworking devices and applications.
a. Internet
b. Communication Devices
c. Internet of things
d. None of the above
Ans:c. Internet of things
Which indicates the computations at device level before the computed data is communicated through internet
a. Computing
b. Edge Computing
c. Communication
d. Internetworking
Ans:b. Edge Computing
The levels of IoT are called as
a. Nodes
b. Tires
c. Items
d. Blocks
Ans:b. Tires
Which are the devices that sense the physical environments
a. Control units
b. Sensors
c. Firmware
d. PDU’s
Ans:b. Sensors
Which IoT block contains the MCU or Customer chip
a. Control units
b. Sensors
c. Firmware
d. PDU’s
Ans:a. Control units
REST stands for
a. Raspbian state transfer
b. Raspberry state transfer
c. Representational state transfer
d. Raswik state transfer
Ans:c. Representational state transfer
Which is an operating system for IOT
a. Contiki
b. RIOT
c. Spark
d. Allyoyn
Ans:a. Contiki
Which is an open data platform with open API
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where
Ans:a. Thingspeak
Which provides complete platform for managing IoT Devices
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where
Ans:d. Site Where
1. The ___ works best when handling data in byte sized packages.
a. 8031 b. 8091 c. 8071 d. 8081
Ans: a
2. _____ displays commonly contain LED segments arranged as an 8.
a. Seven segment display b. intelligent LCD display c. 4X4 display d. 2X2 display
Ans: a
3. In intelligent LCD display, D0 to D7 are located at
a. 1 to 7 pins b. 7 to 14 pins c. 2 to 8 pins d. 8 to 16 pins
Ans: b
4. The ___ display contains two internal byte-wide registers.
a. seven segment display b. intelligent LCD display c. 4X4 display d. 2X2 display
Ans: b
5. ___ displays include incandescent and, more likely, LED indicators.
a. single light b. double light c. single character d. intelligent alphanumeric
Ans: a
6. ____ displays include numeric and alphanumeric arrays.
a. single
Ans: c
7. _____ displays are equipped with a built-in microcontroller.
a. single light b. double light c. single character d. intelligent alphanumeric
Ans: d
8. 20 characters per line display can be possible in
a. Seven segment display b. intelligent LCD display c. 4X4 display d. 2X2 display
Ans: b
9. Control sequence of D/A conversion is
a. CS then WR b. WR then CS c. CS then WR then RD d. WR then RD
Ans: a
10. Control sequence of A/D conversion is
a. CS then WR b. WR then CS c. CS then WR then RD d. WR then RD
Ans: c
11. A/D conversion time is
a. 1 μs b. 2 μs c. 3 μs d. 4 μs
Ans: a
12. For a 1000-hertz wave, S could be ____ samples.
a. 50d b. 100d c. 150d d. 200d
Ans:
13. D/A conversion time is
a. 3 μs b. 4 μs c. 5 μs d. 6 μs
Ans: d
14. The frequency of the counted pulse train is
a. unknown frequency = counter / timer
b. unknown frequency = counter X timer
c. unknown frequency = counter – timer
d. unknown frequency = counter + timer
Ans: a
15. If the counter counts 200 pulses over an interval of 0.1 second generated by the timer, the frequency is
a. 200 Hz b. 2000Hz c. 20000Hz d. 200000Hz
Ans: b
16. The frequency of the pulse value in D/A conversion is
a. UF = 1 / (wave time high X 2)
b. UF = 1 / (wave time high + 2)
c. UF = 1 / (wave time high – 2)
d. UF = 1 / (wave time high / 2)
Ans: a
17. Reference voltage value in D/A conversion is
a. ±8V b. ±10V c. ±12V d. ±14V
Ans: a
18. A/D converters use ____ types.
a. SAR b. flash c. magnetic d. bubble
Ans: b
19. A/D converters use ____ types.
a. SAR b. flash c. magnetic d. bubble
Ans: b
20. For a 1000-hertz wave, S could be ____ samples.
a. 50d b. 100d c. 150d d. 200d
Ans: d
21. The ___ display contains two internal byte-wide registers.
a. Seven segment display b. intelligent LCD display c. 4X4 display d. 2X2 display
Ans: b
22. The 8051 external input pin is
a. INT1 b. DPH c. DPL d. IE
Ans: a
23. The 8051 external input pin is
a. INT0 b. DPH c. DPL d. IE
Ans: a
24. Reference voltage value in D/A conversion is
a. ±8V b. ±10V c. ±12V d. ±14V
Ans: a
25. A/D conversion time is
a. 1 μs b. 2 μs c. 3 μs d. 4 μs
Ans: a
26. In intelligent LCD display, D0 to D7 are located at
a. 1 to 7 pins b. 7 to 14 pins c. 2 to 8 pins d. 8 to 16 pins
Ans: b
27. _____ displays commonly contain LED segments arranged as an 8.
a. Seven segment display b. intelligent LCD display c. 4X4 display d. 2X2 display
Ans: a
28. ____ is not suitable for the interchange of data between 8051 microcontrollers.
a. mode 0 b. mode 1 c. mode 4 d. mode 3
Ans: d
29. Data transmission using modes 2 and 3 features ___ bits per character.
a. 8 b. 9 c. 10 d. 11
Ans: d
30. Which serial data communication mode is multiprocessor 9-bit UART?
a. mode 0 b. mode 1 c. mode 2 d. mode 4
Ans: c
Which of the following is a synchronous serial interface protocol?
a. SPI b. I2C c. UART d. Both (a) and (b)
Ans: d
Synchronous interfaces make use of clock signal? State True or False
a. True b. False
Ans: True
Which of the following serial protocol is used for on-board serial communication?
a. USB b. I2C c. Wifi d. Bluetooth
Ans: b
Which of the following protocol make use of 7 bit address for its operation?
a. I2C b. SPI c. RS232 d. RS485
Ans: a
Which of the following interface is used to 127 slave device to the master device?
a. SPI b. I2C c. RS232 d. RS485
Ans: b
RS232 protocol makes use of clock signal for sending data? True or False
a. True b. False
Ans: b
Which serial communication interface is used to connect modems and for non networked communication between computers and other devices?
a. SPI b. I2C c. UART d. USB
Ans: C
How many wires are used to connect I2C devices?
a. 1 wire b. 2 wires c. 3 wires d. 4 wires
Ans: b
Which of the following interface was developed by Motorola Company?
a. I2C b. SPI c. USB d. Bluetooth
Ans: b
Which of the following make use of 4 wires for its operation?
a. USB b. CAN c. SPI d. I2C
Ans: c
Which of the following is a full duplex communication interface?
a. I2C b. 1 – Wire c. SPI
Ans: c
Which of the following is true about MOSI signal?
a. Signal Line carrying the clock signal
b. Signal line for slave select
c. Signal line carrying the data from master to slave device
d. Signal line carrying the data from slave to master device
Ans: c
Which of the following supports only point to point communication and not suitable for multi drop communication
a. RS485 b. RS232 c. RS422 d. Rs484
Ans: b
Which of the following is a low cost, low power, short range wireless communication for voice and data
a. Wi-Fi b. Infrared c. Zigbee d. Bluetooth
Ans: d
Which of the following is true about Opto-Coupler?
a. Optocoupler is used as only input device
b. Optocoupler is used as only output device
c. Optocoupler is used in both input and output circuitry
d. None of these
Ans: c
Which of the following is true for Common Anode 7 segment displays?
a. All anodes are connected to ground
b. All anodes are connected to Power supply
c. All cathodes are connected to Power Supply
d. None of these
Ans: b
LED stands for
a. Light Emitting Display b. Light Emitting Diode
c. Light Energy Device d. Light Energy Display
Ans. b
Which of the following is true for a Relay?
a. Relay is a Mechanical device b. Relay is Electric device
c. Relay is Electro – Mechanical device d. None of these
Ans: c
Which of the following is true about Buzzer?
a. Buzzer is an output device b. Buzzer is an input device
c. Buzzer is both input and out device d. None of these
Ans: a
Which device generates discrete displacement in response to dc electrical signals?
a. LED b. Buzzer c. 7 segment Display d. Stepper Motor
Ans: d
A task owning a mutex, cannot be ______
a. added b. modified c. released d. deleted
Ans: d
Array of mailboxes can be considered as
a. pipes b. semaphore c. timer d. message queue
Ans: d
Mutex stands for
a. mutual text b. mutual exclusion c. mutual task d. mutual timer
Ans: b
Which occurs when two or more tasks wait for a resource being held by another task
a. deadlock b. live lock c. semaphore d. starvation
Ans: a
Mutual exclusion problem occurs between
a. two disjoin process that not interact
b. processes that share
Ans: b
What problem is solved by dijkstras bankers algorithm?
a. mutual
Ans: b
Mutex is a special
a. count
Ans: b
A common use of ____ is to serve as the program memory for a micro processor
a. ROM b. EPROM c. EEPROM d. Flash memory
Ans: c
To obtain better memory utilization dynamic loading ids used with dynamic loading a routine is not loaded until it is called for implementing dynamic loading
a. special support from hardware is essential
b. special support from operating system is essential
c. special support from both hardware and operating system are essential
d. user programs can implement dynamic loading without any special support from the operating system or the hardware
Ans: d
One common use of a ______ timer is to enable an embedded system to restart itself in case of a failure
a. watchdog b. special c. reaction d. proactive
Ans: a
Which is an extension of EEPROM
a. RAM b. SRAM c. Flash memory d. DRAM
Ans: c
What is really more of a bus interface architecture the DRAM architecture
a. EDORAM b. Rambus DRAM c. SDRAM d. FPMDRAM
Ans: b
What are used to measure the elapsed time of events
a. timers b. counters c. schedulers d. processes
Ans: a
What is an extremely common peripheral devi
a. counters b. timers c. schedulers d. process
Ans: b
To use a ______
Ans: b
A ______ timer is an application that measures the time a person takes to respond to a visual or audio stimulus
a. watchdog b. special c. reaction d. proactive
Ans: c
System’s _____ interrupt response time has to be considered while evaluating the performance of an operating system embedded software
a. best-case b. worst-case c. average-case d. all cases
Ans: b
ISR stands for
a. Interface service routine b. Interrupt Service Runner
c. Interrupt Service Routine d. Interface Standard Routine
Ans: c
When a process makes a system call, its mode change from
a. user to
Ans: a
The technique that allows only one user to work with a file at a particular time is called
a. semaphore b. critical region c. locking d. dedicated mode
Ans: c
What is a hardware signal that informs the CPU that an important event has occurred
a. event b. signal c. process d. interrupt
Ans: d
When interrupt occurs , CPU saves its context and jumps to the _______
a. ISR b. API c. IP d. ITS
Ans: a
The maximum time for which interrupts are disabled + time to start the execution of the first instruction in the ISR is called_______
a. Interrupt response time b. Interrupt recovery time c. Interrupt latency d. Interrupt handler
Ans: c
a. Interrupt response time b. Interrupt recovery time c. Interrupt latency d. Interrupt handler
Ans: a
Time required for CPU to return to the interrupted code/ highest priority task is called
a. Interrupt response time b. Interrupt recovery time c. Interrupt latency d. Interrupt handler
Ans: b
In a preemptive kernel , response time =
a. Interrupt recovery time + time to save CPU registers context
b. Interrupt respond time + time to save CPU registers context
c. Interrupt handler + time to save CPU registers context
d. Interrupt latency + time to save CPU registers context
Ans: d
Principle of RTOS is
a. write short interrupt routines b. you do not need tasks for priority
c. you need tasks for inheritance d. consider turning time-slicing off
Ans: a
Which causes more task switched and therefore cuts throughput.
a. time-slicing b. encapsulation c. priority d. routines
Ans: a
Comments
Post a Comment