Embeded System and Internet of Things(IOT) MCQ

 

IoT (Internet of Things) MCQ

1) How many numbers of the element in the open IoT architecture?

  1. Four elements
  2. Five elements
  3. Six elements
  4. Seven elements
 

Answer: (d) Seven elements

Description: There are seven numbers of elements in the open IoT architecture:

  1. Configuration and monitoring
  2. Cloud data storage
  3. Scheduler
  4. Request definition
  5. Request presentation
  6. Service delivery and utility manager
  7. Sensor middleware (X-GSN)

2) Which of the following is the way in which an IoT device is associated with data?

  1. Internet
  2. Cloud
  3. Automata
  4. Network
 

Answer: (b) Cloud

Description: Cloud-based services provide a way for IoT devices to be connected to data. For example: Just as the WWW (World Wide Web) runs on the Internet, so does IoT.


3) Which of the following IoT networks has a very short range?

  1. Short Network
  2. LPWAN
  3. SigFox
  4. Short-range Wireless Network
 

Answer: (d) Short Range Wireless Network

Description: Short-range wireless networks have a very short range. This type of network is used for applications running in the local environment. The best example of this network is Wi-Fi and Bluetooth.


4) What is the full form of the LPWAN?

  1. Low Protocol Wide Area Network
  2. Low Power Wide Area Network
  3. Long Protocol Wide Area Network
  4. Long Power Wide Area Network
 

Answer: (b) Low Power Wide Area Network

Description: The full form of the LPWAN is Low Power Wide Area Network. LPWAN is a type of wireless telecommunication, and it is specially designed for M2M (Machine to Machine) and IoT devices.


5) An IoT network is a collection of ______ devices.



  1. Signal
  2. Machine to Machine
  3. Interconnected
  4. Network to Network
 

Answer: (c) Interconnected

Description: An IoT network is a collection of interconnected devices that communicate with other devices without human involvement.


6) Which one of the following is not an IoT device?

  1. Amazon echo voice controller
  2. Google Home
  3. Nest Smoke Alarm
  4. None of these
 

Answer: (d) None of the these

Description: These are all IoT devices. Google Home is a smart speaker that obeys all the commands given by the user. The Amazon Echo Voice Controller is also a smart speaker. The Nest Smoke Alarm is an IoT device that sends a smoke alert message to the user when a fire occurs.


7) What is the main purpose of WoT (Web of Things) in the IoT?

  1. Improve the usability and interoperability
  2. Reduce the security
  3. Complex the development
  4. Increase the cost
 

Answer: (a) Improve the usability and interoperability

Description: The main purpose of the Web of Things is to improve the usability and interoperability in IoT. Developing IoT Apps through WoT is much easier, faster, and less expensive.


8) What is the Arduino UNO?

  1. Software
  2. Hardware device
  3. Network
  4. Protocol
 

Answer: (b) Hardware device

Description: The Arduino Uno is a hardware device that is based on the Microchip ATmega328P microcontroller. It has been developed by Arduino.cc.


9) ______ allows the user to control electronic components.


  1. Android API
  2. RETful API
  3. MQTT API
  4. CoAP API
 

Answer: (b) RETful API

Description: The RETful API allows the user to control the electronic components connected to the Intel Galileo Gen 2 board via HTTP requests.


10) Which of the following is not an application of IoT?

  1. Wearables
  2. Smart Grid
  3. Arduino
  4. Smart City
 

Answer: (c) Arduino

Description: The Arduino Uno is a hardware device that is based on the Microchip ATmega328P microcontroller.


11) Which one of the following protocols is lightweight?

  1. IP
  2. HTTP
  3. MQTT
  4. CoAP
 

Answer: (c) MQTT

Description: The full form of the MQTT is Message Queue Telemetry Transport. It is a lightweight messaging protocol that runs over the TCP / IP protocol.


12) What is the role of Big Data in IoT's Smart Grid architecture?

  1. Filter the data
  2. Locked the data
  3. Store data
  4. None of the these
 

Answer: (c) Store data

Description: The main role of Big Data is to store data on a real-time basis. It uses multiple storage technologies to store the data.


13) What is the real example of a smart grid device in IoT?


  1. Mobile phone
  2. Television
  3. Smart Speaker
  4. Smart Meters
 

Answer: (d) Smart Meters

Description: Smart Grid is used to monitor the power supply. Consumers' data is collected using a smart grid, and that data is analyzed and distributed to the consumers. The real example of a smart grid device is a smart meter.


14) What is the full form of the MQTT?

  1. Multi-Queue Telemetry Things
  2. Multiple Queue Telemetry Things
  3. Message Queue Telemetry Things
  4. Message Queue Telemetry Transport
 

Answer: (d) Message Queue Telemetry Transport

Description: The full form of the MQTT is Message Queue Telemetry Transport. It is a lightweight messaging protocol that runs over the TCP / IP protocol.


15) What is the full form of ICT?

  1. InterConnect Technology
  2. Internet Connection Topology
  3. Information and Communication Technology
  4. Infer Communication Topology
 

Answer: (c) Information and Communication Technology

Description: The full form of ICT is Information and Communication Technology. ICT is a multidimensional term for the IT sector that refers to all communication technologies, including the Internet, wireless networks, cell phones, computers, and software.


16) Which of the following frequencies is correct for the Galileo gen 2 board?

  1. 250 MHz
  2. 400 MHz
  3. 450 MHz
  4. 300 MHz
 

Answer: (b) 400 MHz

Description: The frequency of this board is 400 MHz. The Galileo gen 2 board frequency gives the speed of operation of the board. Therefore, the speed increases as the frequency increases.


17) What is the full form of IANA?


  1. Inter-Assessment-Number-Access
  2. Internet-Association-Numbers-Authority
  3. International-Aid-for-Network-Authority
  4. Internet-Assigned-Numbers-Authority
 

Answer: (d) Internet-Assigned-Numbers-Authority

Description: The full form of IANA is Internet-Assigned-Numbers-Authority. It is an administrative function of the Internet that monitors the IP addresses and domain names.


18) What is the standard port number of secure MQTT?

  1. 1883
  2. 8000
  3. 8883
  4. 8888
 

Answer: (c) 8883

Description: The standard port number of Secure MQTT is 8883, and it is registered in IANA for Secure MQTT.


19) Which of the following layers provides end-to-end communication in IoT?

  1. Logical layer
  2. Data link layer
  3. Transport layer
  4. Session layer
 

Answer: (c) Transport layer

Description: The transport layer focuses on end-to-end communication, and it gives reliability and congestion avoidance that packets will be delivered in the same way as the user sent the packet.


20) Which of the following devices is used to measure the gases or liquid?

  1. Optical Sensor
  2. Gas Sensor
  3. Smoke Sensor
  4. Pressure sensor
 

Answer: (d) Pressure sensor

Description: The pressure sensor is used to measure the gases or liquid. Pressure is the expression of a force that is necessary to prevent fluid from expansion.


21) Which interface does the fingerprint sensor use?


  1. UART interface
  2. CoAP interface
  3. SPI interface
  4. I2P interface
 

Answer: (a) UART interface

Description: The fingerprint sensor uses a UART interface to store fingerprint data. It can be configured in 1:1 or 1:N mode to identify the person.


22) Which of the following protocols is used by USART?

  1. RS32
  2. RS232C
  3. 4RS85
  4. All of the these
 

Answer: (b) RS232C

Description: The most commonly used protocol for USART in asynchronous mode is RS232C. This protocol describes the physical interface for relatively low-speed serial data-communication between devices and computers.


23) What is the full form of HDLC?

  1. Higher Data Level Communication
  2. Higher Data Link Communication
  3. High-level Data Link Control
  4. High Data Level Control
 

Answer: (c) High-level Data Link Control

Description: The full form of the HDLC is High level Data Link Control. It is a communication protocol. It is used to transmit data between nodes and data points.


24) Which of the following "bit" defines the address bit in the control register?

  1. ML
  2. MM
  3. RXWake
  4. None of the these
 

Answer: (b) MM

Description: The MM bit defines the address bit in the control register.


25) What is another name for I2C?



  1. Signal wire interface
  2. Two wire interfaces
  3. UART
  4. USART
 

Answer: (b) Two wire interface

Description: The I2C protocol is also known as the two-wire interface. It is a simple serial-communication-protocol that uses pins of a microcontroller, named as serial clock (SCL) and serial data (SDA).


26) When the clock line SCL is high, the SDA is ____ transitioned.

  1. Low
  2. High
  3. Medium
  4. All of the these
 

Answer: (a) Low

Description: When the clock line SCL is high, the SDA is low transitioned. Under normal circumstances, this does not happen, as you can see in the subsequent clock pulses that the data line is stable in one state, either high or low, when the clock line is high.


27) Which of the following protocols does the secure digital card application use?

  1. XMPP
  2. SPI
  3. MQTT
  4. HTTPS
 

Answer: (b) SPI

Description: SPI stands for Serial Peripheral Interface. The SPI protocol is commonly used to secure digital card applications and liquid crystal displays.


28) How many logic signals are there in the SPI protocol?

  1. Five signals
  2. Six signals
  3. Nine signals
  4. Zero signals
 

Answer: (a) Five signals

Description: There are five logic signals in the SPI protocol.

  1. SCLK (Serial Clock): This signal is used to clock-signal.
  2. MOSI (Master Output Slave Input): This signal is used to transfer the data from master to slave.
  3. MISO (Master Input Slave Output): This signal is used to transfer the data from slave to master.
  4. SDIO (Serial Data I/O)
  5. SS (Slave Select)

29) What does MOSI mean?


  1. MOSI is a network line.
  2. MOSI is a clock signal that sends the clock signals from master to slave.
  3. MOSI is a data line that sends the data from master to slave.
  4. None of the these
 

Answer: (c) MOSI is a data line that sends the data from master to slave.

Description: MOSI stands for Master Out Slave In. MOSI is a data line that sends the data from master to slave.


30) What is the full form of HART?

  1. Highway Application Remote Transport
  2. Highway Addressable Remote Transducer
  3. High Address Reduce Transport
  4. High Application Remote Transport
 

Answer: (b) Highway Addressable Remote Transducer

Description: The full form of HART is Highway Addressable Remote Transducer. It is a master and slave protocol in which a slave device only speaks when spoken by a master.


31) What is the range of z-wave?

  1. 30 to 100 m
  2. 300 to 1000 m
  3. 100 to 1000 m
  4. Only 10 m
 

Answer: (a) 30 to 100 m

Description: The Z-Wave is a low-power Mac protocol designed especially for smart home and small business domains. It covers the range from 30 to 100 m.


32) Which of the following topology is used for ZigBee Smart Energy?

  1. Bus Topology
  2. Ring Topology
  3. Star Topology
  4. Any Topology
 

Answer: (c) Star Topology

Description: ZigBee Smart Energy is designed for a wide range of IoT applications. It supports a wide range of network topologies, such as star topology.


33) Which of the following protocols does not exist at the data link layer?


  1. ZigBee Smart Energy
  2. LoRaWAN
  3. WirelessHART
  4. Secure MQTT
 

Answer: (d) Secure MQTT

Description: Secure MQTT is a session layer protocol. It is an extended version of the MQTT protocol that uses encryption based on lightweight attribute-based encryption.


34) Which of the following is the type of SPI controller?

  1. Micro-wire or plus
  2. Microwire
  3. Data SPI
  4. Queued SPI
 

Answer: (d) Queued SPI

Description: A Queued SPI is a type of SPI controller that is used to send a data queue from the SPI bus.


35) What is MQTT primarily used for?

  1. User communication
  2. System transfer
  3. Machine to Machine Communication
  4. Create connection
 

Answer: (c) Machine-to-Machine Communication

Description: MQTT is a public messaging protocol. It is designed for lightweight "Machine to Machine" communication. It was originally developed by IBM.


36) What is the frequency rate of z-wave?

  1. 908.42 GHz
  2. 928.49 GHz
  3. 888.42 GHz
  4. 708.49 GHz
 

Answer: (a) 908.42 GHz

Description: The frequency rate of z-wave is 908.42 GHz. The Z-Wave is a low-power Mac protocol designed especially for smart home and small business domains.


37) What is another name of the tactile sensor?



  1. Weight sensor
  2. Imaging sensor
  3. Proximity sensor
  4. Touch sensor
 

Answer: (d) Touch sensor

Description: The tactile sensor is also called a touch sensor. It is an electronic sensor used for detecting physical touch. The size of this sensor is very small.


38) How many types of capacitive touch sensors in IoT?

  1. Two types
  2. Five types
  3. Seven types
  4. Nine types
 

Answer: (a) Two types

Description: Two types of capacitive touch sensors in IoT:

  • Projected-capacitive sensing
  • Surface-capacitive sensing

39) Which of the following touch sensors is used in a cell phone?

  1. Resistive touch sensors
  2. Human sensor
  3. Capacitive touch sensor
  4. Follow sensor
 

Answer: (c) Capacitive touch sensor

Description: The capacitive touch sensors are widely used in portable devices such as cell phones. The main reason for this sensor development on the phone is low cost, durability, and design.


40) Which of the following languages does GSN work on?

  1. Python
  2. JAVA
  3. Android
  4. C++
 

Answer: (b) JAVA

Description: GSN stands for Global Sensor Network. GSN works on JAVA language because JAVA language is portable in nature. The other language (such as C, C++, Python, and HTML) is not portable in nature.


41) Which of the following is the example of a short-range wireless network?



  1. VPN
  2. Wi-Fi
  3. Internet
  4. WWW
 

Answer: (b) Wi-Fi

Description: Short-range wireless networks have a very short range. This type of network is used for applications running in the local environment. Examples of this network are Wi-Fi and Bluetooth.


1. _________ allows us to control electronic components
a) RETful API
b) RESTful API
c) HTTP
d) MQTT
View Answer

Answer: a
Explanation: RETful API that allows us to control electronic components connected to our Intel Galileo Gen 2 board through HTTP requests.

2. MQTT stands for _____________
a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport
View Answer

Answer: d
Explanation: MQTT was known as MQ Telemetry Transport protocol. MQTT is a lightweight protocol that runs on top of the TCP/IP protocol.

3. MQTT is better than HTTP for sending and receiving data.
a) True
b) False
View Answer

Answer: a
Explanation: We want to send and receive data in real time through internet and RESTful API is not the most appropriate option to do this. Instead, we will work on MQTT which is lighter than HTTP.

4. MQTT is _________ protocol.
a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things
View Answer

Answer: c
Explanation: The MQTT protocol is a machine to machine and Internet of thing connectivity protocol.

5. Which protocol is lightweight?
a) MQTT
b) HTTP
c) CoAP
d) SPI
View Answer

Answer: a
Explanation: MQTT is a lightweight protocol that runs on top of the TCP/IP protocol and works with publish subscribe mechanism.
6. PubNub publishes and subscribes _________ in order to send and receive messages.

a) Network
b) Account
c) Portal
d) Keys
View Answer

Answer: d
Explanation: It is necessary to generate our PubNub publishes and subscribes keys in order to send and receive messages in the network.

7. By clicking which key the PubNub will display public, subscribe, and secret keys.
a) Pane
b) Demo Keyset
c) Portal
d) Network
View Answer

Answer: b
Explanation: Click on Demo keyset pane and PubNub will display public, subscribe, and secret keys. We must copy and paste each of these keys to use them in our code that will publish messages and subscribe to them.

8. The messageChannel class declares the _________ class attribute that defines the key string.
a) command_key
b) command-key
c) commandkey
d) Key_command
View Answer

Answer: a
Explanation: The messageChannel class declares the command_key class attribute that defines the key string that defines what the code will understand as the command.

9. _________ method saves the received arguments in three attributes.
a) __Init
b) Init__
c) __Init__
d) _init_
View Answer

Answer: c
Explanation: __Init__ method saves the received arguments in three attributes with the same names.

10. _________ and _________ saves the publish and subscribe keys that we have generated with the PubNub Admin portal.
a) public_key and subscribe_key
b) Public-key and subscribe-key
c) publickey and subscribekey
d) Key_public and key_subscribe
View Answer

Answer: a
Explanation: Then, the constructor declares two local variables: public_key and subscribe_key. These local variables save the public and subscribe keys that we had generated with the PubNub Admin portal.

11. _________ specifies the function that will be called when there is a new message received from the channel.
a) Reconnect
b) Error
c) Connect
d) Callback
View Answer

Answer: d
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Callback: specifies the function that will be called when there is a new message received from the channel.

12. _________ specifies the function that will be called on an error event.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer

Answer: b
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Error: specifies the function that will be called on an error event.

13. _________ Specifies the function that will be called when a successful connection with the PubNub cloud.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer

Answer: c
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Connect: specifies the function that will be called when a successful connection with the PubNub cloud.

14. _________ specifies the function that will be called when a successful re-connection is completed.
a) Callback
b) Error
c) Connect
d) Reconnect
View Answer

Answer: d
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Reconnect: specifies the function that will be called when a successful re-connection is completed with the PubNub cloud.

15. ___________ specifies the function that will be called when the client disconnects.
a) Callback
b) Error
c) Connect
d) Disconnect
View Answer

Answer: d
Explanation: The call to this message specifies many methods declared in the MessageChannel class
Disconnect: specifies the function that will be called when the client disconnects from the PubNub cloud.

Internet of Things (IoT) can be integrated with which of these separate domains:
a. Cloud-based storage and computing.
b. Cyber Physical Systems.
c. Big-data networks.
d. All of these.

Ans:d. All of these.

In the current market scenario, IoT captures the maximum share in which one of these?
a. Industry
b. Security
c. Healthcare
d. Home automation


Ans:a. Industry

Why is IPv6 preferred over IPv4 for IoT implementations?
a. Larger addressing range
b. More security
c. Both a and b
d. Neither a or b

Ans:c. Both a and b

The main function of the IoT Gateway can be summarized as:
a. Forwarding packets between LAN and WAN on the IP layer.
b. Performs application layer functions between IoT nodes and other entities.
c. Enables local, short-range communication between IoT devices.
d. All of these


Ans:a. Forwarding packets between LAN and WAN on the IP layer.

Scalability of IoT means:
a. Expandable/reducible in terms of scale or size.
b. Measurable
c. Increasing/decreasing monetary costs.
d. All of these.

Ans:d. All of these.

Which one of these is the most important factor to be considered in an IoT implementation:
a. Scalability
b. Power efficiency
c. Efficient and scalable addressing schemes
d. All of these

Ans:d. All of these

Which statement is NOT TRUE:
a. IoT WAN connects various network segments.
b. IoT WAN is geographically wide.
c. IoT WAN is organizationally wide.
d. None of these.

Ans:d. None of these.

Which of these statements regarding sensors is TRUE?
a. Sensors are input devices.
b. Sensors can be analog as well as digital
c. Sensors respond to some external stimuli.
d. All of these.

Ans:d. All of these.


Which of these is NOT a feature of Shape Memory Alloys (SMA)?
a. Low density
b. Low strain recovery
c. Biocompatibility
d. Biodegradability

Ans:b. Low strain recovery

Which of these is a part of the Sensing Layer of the IoT Service Oriented Architecture?
a. Service integration
b. Service repository
c. Business logic
d. Data sensing and actuation protocols.

Ans:d. Data sensing and actuation protocols.

MQTT stands for:
a. Message Queue Telemetry Transport
b. Multiple Queue Telemetry Transport
c. Multiple Query Transport Technique
d. Multiple Query Transport Technique

Ans:a. Message Queue Telemetry Transport

AMQP is designed for connecting:
a. Constrained networks
b. LANs and WANs
c. Systems and Business processes
d. None of these


Ans:c. Systems and Business processes

Which modulation scheme is followed by IEEE 802.15.4 standard?
a. BPSK
b. QPSK
c. DSSS
d. All of these

Ans:d. All of these

Which CoAP message transfers response from the server within the acknowledgment message?
a. Separate
b. Confirmable
c. Non-confirmable
d. Piggyback

Ans:d. Piggyback

Collision prevention in 802.15.4 standard is provided by means of:
a. CSMA-CA
b. CSMA-CD
c. ALOHA
d. None of these

Ans:a. CSMA-CA

Which of these is a routing protocol for low power lossy networks over IPv6?
a. RPL
b. OSPF
c. Both a and b
d. None of these

Ans:a. RPL


The basic unit of AMQP data is:
a. A frame
b. A packet
c. A byte
d. A bit

Ans:a. A frame

RPL supports:
a. Message confidentiality
b. Loop detection in the routes
c. Data path validation
d. All of these

Ans:d. All of these

Which statement is TRUE with respect to the IEEE 802.15.4 standard?
a. It is a low data-rate standard.
b. Used for architecting wireless PANs
c. Uses only two layers – PHY and MAC
d. All of these

Ans:d. All of these

LOADng routing uses:
a. AODV
b. DSDV
c. RIPv2
d. OSPF

Ans:a. AODV

The number of channels incorporated in physical layer of the HART standard are:
a. 10
b. 15
c. 20
d. 64

Ans:b. 15


Channel hopping is performed at which HART layer?
a. Physical
b. Data link
c. Network
d. Application

Ans:b. Data link

This process of bypassing radio dead-spots in Z wave is done using a message called
a. Healing
b. Beacon
c. Probe
d. None of these

Ans:a. Healing


The difference between the wired and wireless versions of HART are at the:
a. Network layer
b. Physical layer
c. Data link layer
d. All of these

Ans:d. All of these

WASN stands for:
a. Wireless and Sensor networks
b. Wired and Sensor networks
c. Wireless Ad-hoc Sensor Networks
d. None of these

Ans:c. Wireless Ad-hoc Sensor Networks

Class-2 Bluetooth devices have a range of:
a. 1m
b. 10m
c. 100m
d. 1000m

Ans:b. 10m

SOS in sensor web stands for
a. Sensor of a System
b. System of Sensors
c. Sensor Observation Service
d. None of these

Ans:c. Sensor Observation Service

Which topology is supported by Z wave:
a. Star
b. Mesh
c. Tree
d. All of these

Ans:d. All of these


QoS guarantees in WSNs include:
a. Offering guarantees in terms of bandwidth, delay, jitter
b. Offering guarantees in terms of packet loss probability.
c. Offering guarantees in terms of Limited bandwidth, unpredictable changes in RF channel characteristics.
d. All of these

Ans:d. All of these

The WSN nodes are prone to:
a. Malicious attacks
b. Eavesdropping
c. Interference
d. All of these

Ans:d. All of these

With respect to WSN coverage problems, the OGDC algorithm is an acronym for:
a. Optimal Geographic Density Control
b. Optimal Geographic Distance Control
c. Optimal Geographic Distance Coverage
d. Optimal geographic Density Coverage

Ans:a. Optimal Geographic Density Control

A crossing with respect to WSN coverage is _ if it is in the interior region of at least one node’s coverage disk.
a. Partially covered
b. Covered
c. Not covered
d. Isolated

Ans:b. Covered

A PIR Sensor stands for:
a. Proximity Infra-Red
b. Passive Infra-Red
c. Picture Infra-Red
d. None of these

Ans:b. Passive Infra-Red

WMSNs stand for:
a. Wired Multimedia Sensor Networks
b. Wireless Multimedia Sensor Networks
c. Wireless Mobile Sensor Networks
d. Wireless Machine Sensor Network

Ans:b. Wireless Multimedia Sensor Networks

UAV-VANETS link-up may be used for:
a. visual guidance
b. Data-muling
c. Coverage enhancement
d. All of these

Ans:d. All of these

M2M stands for:
a. MAC to MAC communication
b. Machine to MAC communication
c. Machine to machine communication
d. MAC to machine communication

Ans:c. Machine to machine communication

In WSN area coverage problem, which is TRUE?
a. Energy-efficient random coverage
b. Connected random coverage
c. A network is connected if any active node can communicate with any other active nodes
d. All of these

Ans:d. All of these

In a M2M ecosystem, Internet service providers:
a. Provide their infrastructures for M2M device communications.
b. are responsible for devices providing raw data.
c. is an individual or company what utilizes M2M applications.
d. None of these

Ans:a. Provide their infrastructures for M2M device communications.

With respect to stationary sensor networks, which of these points apply?
a. Easy deployment
b. Node can be placed in an optimized distance
c. Easy topology maintenance
d. All of these

Ans:d. All of these

High-end M2M nodes have:
a. Mobility
b. QoS guarantees
c. Low density deployment
d. All of these

Ans:d. All of these

A hardware code, before uploading to an embedded processor board first needs to be:
a. Verified and compiled
b. Executed
c. Both a and b
d. None of these

Ans:a. Verified and compiled

Why interoperability is required?
a. Heterogeneous wireless communication protocols
b. Different programming languages
c. Different control models
d. All of the above

Ans:d. All of the above

What is the function for reading humidity from DHT sensor from Arduino?
a. dht.readHumidity()
b. dht.readTemperature()
c. dht.begin()
d. d. dht(pin,DHT22)

Ans:a. dht.readHumidity()

Device interoperability problem is between
a. Two devices
b. A device and an user
c. Both (a) and (b)
d. None of the above

Ans:a. Two devices

Which is the following is not an Actuator?
a. Servo motor
b. Stepper motor
c. DHT
d. Relay

Ans:c. DHT

Which of the following is not a sensor?
a. Barometer
b. Light Dependent Resistor (LDR)
c. DHT
d. Relay

Ans:d. Relay

What is the servo library command to move the shaft of Servo motor back and forth across 180 degree?
a. Knob()
b. Sweep()
c. write()
d. detach()

Ans:b. Sweep()

The code written in Arduino IDE is referred to as:
a. Script
b. Block
b. Sweep()
d. Arduino Script

Ans:b. Sweep()

Which of the following library functions can be used to generate a random number in Arduino?
a. randomize()
b. ran()
c. rand()
d. random()

Ans:d. random()

Which pin of Arduino should be connected with the pin 3 of the DHT sensor?
a. Pint 5V
b. Pin 3.3V
c. Pin GND
d. None of the these

Ans:d. None of the these

By default, the GPIO pins in Raspberry Pi are configured as?
a. Input except pins 14 and 15
b. Output except pins 14 and 15
c. Bcm
d. GPIO

Ans:a. Input except pins 14 and 15

Which of the following datatype is correct for the object below?
D = [‘python’, 3.43, ‘p’, 100]
a. Array
b. Dictionary
c. Tuple
d. List

Ans:b. Dictionary

What does the method readline() return:
a. One line
b. One byte
c. One character
d. Bool

Ans:a. One line

What is the maximum peripheral current draw allowed in Raspberry pi 3?
a. 1200mA
b. 700mA
c. 500mA
d. 100mA

Ans:a. 1200mA

Data collected by Raspberry Pi from the sensor can be
a. Processed in Raspberry Pi
b. Sent to other devices connected to the network
c. Used to control/activate other devices in the network
d. All of the above

Ans:d. All of the above

Relay is a kind of:
a. Sensor
b. Actuator
c. Hub
d. Router

Ans:b. Actuator

What are the mode/modes used for addressing the pins in Raspberry Pi?
a. GPIO
b. BCM
c. GPIO and BCM
d. GPIO, BCM and CAN

Ans:c. GPIO and BCM

Which of the following variants of Raspberry Pi has an inbuilt wi-fi?
a. Raspberry Pi 2
b. Raspberry Pi 3
c. Raspberry Pi A+
d. Raspberry Pi Zero

Ans:b. Raspberry Pi 3

Internet of Things refers to:
a. Interconnection of devices in a network
b. Exchange of data between devices in a network
c. An ecosystem of devices, accessible through internet
d. All of the above

Ans:d. All of the above

IoT devices must have:
a. A USB port
b. A unique identification
c. Wired connectivity
d. All of the above

Ans:b. A unique identification

Server is a:
a. Computer
b. Any device/program which serves or responds to the request from client
c. A data center
d. Cloud

Ans:b. Any device/program which serves or responds to the request from client

The split() function in Python programming language breaks the string on the basis of:
a. Blank Space
b. Comma
c. Any specified delimiter
d. Hyphen

Ans:c. Any specified delimiter

Bind() function in Python socket programming is used to:
a. Specify the port for service on the specified host
b. Read data from the socket
c. Send data to the socket
d. Initiate the connection

Ans:a. Specify the port for service on the specified host

Application program interface (API) used between data and control planes in SDN is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

Ans:c. Southbound API

When does a switch send PAKCET-IN message to a controller in SDN:
a. Flow-rule associated with a received flow does not exist

b. All the time
c. After deleting a flow-rule
d. None of the above

Ans:a. Flow-rule associated with a received flow does not exist

In SDN, does the control overhead increase compared to the traditional network:
a. Depends on application and network topology
b. Yes, always
c. Not at all
d. Depends on OpenFlow protocol

Ans:a. Depends on application and network topology

One of the advantages of SDN-based sensor network is:
a. Real-time programmability
b. No need to replace any node
c. Both a & b
d. None of the above

Ans:a. Real-time programmability

Application program interface (API) used between application and control planes is known as:
a. Northbound API
b. Eastbound API
c. Southbound API
d. Westbound API

Ans:a. Northbound API

An SDN Controller can be placed based on:
a. Hierarchical manner
b. Star-topology
c. Mesh topology
d. All of the above

Ans:d. All of the above

Typically, __ protocol is used in low-rate wireless PANs:
a. IEEE 802.15.4
b. IEEE 802.11
c. IEC 6250
d. None of the above

Ans:a. IEEE 802.15.4

Using SDN, the following can be managed:
a. Network partition
b. Network matching
c. Load balancing
d. All of the above

Ans:d. All of the above

From the below given options, which is not a characteristic of cloud computing?
a. Low management effort
b. Low level generalization of computation
c. On-demand network access
d. Configurable computing resources

Ans:b. Low level generalization of computation

Pre-configure facility for allocation of virtualized resources comes under
a. Availability and reliability
b. Scalability and elasticity
c. Manageability and interoperability
d. Measured Services

Ans:c. Manageability and interoperability

Service Management mainly focusses on
a. Importance to desired outcomes of customers
b. Importance to desired outcomes of organizations
c. Both (a) and (b)
d. none of the above

Ans:a. Importance to desired outcomes of customers

Broad network access in cloud deals with
a. Dynamic allocation for scale out
b. Recorded resource usage
c. Availability of cloud resources over the network
d. All of the above

Ans:c. Availability of cloud resources over the network

Billing information is calculated using
a. Accounting Records only
b. Billing rules and Accounting records
c. Billing rules, Accounting records and Resource prices
d. None of the above

Ans:c. Billing rules, Accounting records and Resource prices

Integrity in data security is :
a. Detecting unauthorized data modification
b. Sending secure data to cloud
c. Preserving the privacy of data
d. None of the above

Ans:a. Detecting unauthorized data modification

Cloud Analyst provides
a. Support for large scale cloud applications
b. GUI based control
c. Flexible and repeatable environment
d. All of these

Ans:d. All of these

GreenCloud Simulator is designed based on
a. NS-3
b. NS-2
c. CloudSim
d. DCSim

Ans:b. NS-2

Which of the following is not a cloud simulator?
a. CloudSim
b. NS-3
c. DCSim
d. GroudSim

Ans:b. NS-3

What is the purpose of floating IP in Openstack?
a. To connect the instance with the external network
b. To interconnect among instances
c. To connect among instances inside a same network
d. None of them

Ans:a. To connect the instance with the external network

We normally take snapshot in Openstack, _.
a. After the installation of an instance
b. Before the installation of an instance
c. It is an inbuilt image in Openstack
d. It should be downloaded from the internet

Ans:a. After the installation of an instance

Sensor-Cloud deals with
a. Sensor-for-Service
b. Sensor-as-a-Service
c. Sensor-in-Cloud
d. None of these

Ans:b. Sensor-as-a-Service

Which of the following statement is true in sensor-cloud
a. End user procures sensors and lend these to sensor-cloud service provider
b. Sensor-cloud is based only on dumping the sensor data to the cloud
c. Single sensor nodes is shared dedicatedly with only one end user
d. None of these

Ans:d. None of these

What are the three main issues faced by cloud while handling IoT data?
a. speed, volume, bandwidth
b. speed, quality of service, volume
c. volume, latency, bandwidth
d. none of the above

Ans:c. volume, latency, bandwidth

Why data volume is a problem in IoT-based cloud computing?
a. because data are encrypted and hard to analyze
b. because data coming from IoT devices are always in raw format and difficult to store
c. because the density of IoT devices is increasing each day and in turn the volume of generated data is growing very fast
d. because IoT device density is decreasing each day and in turn the volume of generated data are decreasing very fast

Ans:c. because the density of IoT devices is increasing each day and in turn the volume of generated data is growing very fast

If the time-sensitive data are sent to cloud for analysis, the latency will be __
a. Increased
b. Decreased
c. neither increase nor decrease
d. first increase, then decreased

Ans:a. Increased

What is a good approach to reduce latency?
a. Analyzing data close to the data source
b. Analyzing data in cloud
c. Increasing number of nodes
d. Decreasing number of nodes

Ans:a. Analyzing data close to the data source

What are less time-sensitive data?
a. Data which can be analyzed after seconds or minutes
b. Data which should be analyzed within fraction of a second
c. Data which can be wait for hours, days, weeks
d. Data which can be wait for months

Ans:a. Data which can be analyzed after seconds or minutes

How fog provide better privacy to industries and companies?
a. By providing the facility to store confidential data in their local servers
b. By providing more secure communication system
c. By providing a secured VPN network
d. All of the above

Ans:a. By providing the facility to store confidential data in their local servers

Which of these can be considered as the skeleton for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors

Ans:a. Buildings

Which of these can be considered as the sensory organs for smart cities?
a. Buildings
b. Transportation
c. Banks
d. Sensors

Ans:d. Sensors

Smart Agriculture incorporates:
a. Alert generation in case of above-threshold pollutants in the air or water.
b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.

c. Both the above
d. None of these

Ans:b. Scheduling harvesting and arranging proper transfer of harvests to
warehouses or markets.

Heterogeneity for IoT in smart cities stands for:
a. Integration of varying hardware platforms and specifications.
b. Integration of different radio specifications.
c. Integration of various software platforms.
d. All of these

Ans:d. All of these

Which of these can be categorized as AI based mathematical model for data fusion?
a. CNN
b. Recursive methods
c. Bayesian analysis
d. Belief networks

Ans:a. CNN

Which of these connects cable-based networks with wireless networks for increased sharing of media, control and access and can share network media resources?
a. UPnP
b. DLNA
c. LAN
d. WiFi

Ans:b. DLNA

Which of these is NOT a feature of VANETs?
a. High Dynamic Topology
b. High transmission and computation capability
c. Stable connectivity
d. Predictable mobility pattern

Ans:c. Stable connectivity

X-10 protocol is characterized by:
a. Low-speed and low data rate.
b. Low speed and high data rate
c. High speed and low data rate
d. High speed and high data rate

Ans:a. Low-speed and low data rate.

The V2X paradigm is not restricted to a single source information provider.
a. True
b. False
c. Sometimes True, mostly False
d. Sometimes False, mostly True

Ans:a. True

TCP/IP fails in V2X because:
a. TCP/IP is designed mainly for handling information exchange between a single pair of entities.
b. Information exchanges in TCP/IP are dependent on the location of data.
c. TCP/IP can only identify the addresses of endpoints, which alone is not useful for content distribution.
d. All of these

Ans:d. All of these

Net metering depends on –
a. Energy consumed by the consumers and energy generated by the consumers
b. Energy consumed by the consumers and energy supplied back to the grid
c. Only energy consumed by the consumer
d. None of the above

Ans:b. Energy consumed by the consumers and energy supplied back to the grid

Smart grid enables –
a. Distributed energy management
b. Centralized energy management
c. Either of these
d. None of these

Ans:a. Distributed energy management

In smart grid, gateways communicate using –
a. IEEE 802.15.4
b. IEEE 802.15.6
c. 6LowPAN
d. IEEE 802.11

Ans:d. IEEE 802.11

Full form of SANETs –
a. Sensors and Actions Networks
b. Sensors and Actuator Networks
c. Smart and Active Networks
d. None of these

Ans:b. Sensors and Actuator Networks

In IIoT environment, networks can
a. Communicate with each other, external environment and people.
b. Communicate with each other, but not with external environment and people.
c. Does not communicate with each other, but communicates with external
environment.
d. Communicate with each other, but not with people.

Ans:a. Communicate with each other, external environment and people.

IIoT is mainly focused on
a. Convenience of individuals
b. Efficiency, safety and security of operation and individuals.
c. Efficiency of the system.
d. Data security.

Ans:b. Efficiency, safety and security of operation and individuals.

What is the key technology to enable V2V and V2R communication?
a. Short Range Communication
b. Dedicated Short Range Communication
c. Long Range Communication
d. Medium Range Communication

Ans:b. Dedicated Short Range Communication

What do you mean by service management in IIoT?
a. Implementation and management of the quality of services
b. Collection of services
c. Features extracted from data received
d. Services which do not meet the demand of end-users.

Ans:a. Implementation and management of the quality of services

Traditional RDBMS unable to process –
a. Structured data
b. Unstructured data
c. Both structured and unstructured data
d. None of these

Ans:b. Unstructured data

Structured data is managed in database using 
a. .NET Framework
b. Structured Query Language
c. Normal Language Processing
d. All of these

Ans:b. Structured Query Language

Mathematical model, which represents the relationship between variables, is termed as –
a. Mathematical model
b. Statistical model
c. Variability model
d. None of the above

Ans:b. Statistical model

ANOVA has –
a. Two types
b. Three Types
c. Four Types
d. Any finite value

Ans:b. Three Types

Which of the following option supports a long-range communication
a. ZigBee
b. GPRS
c. Bluetooth
d. All of the above

Ans:b. GPRS

The primary challenges of an embedded operating system for WSN are
a. Small memory footprint
b. Low power and computing capability
c. Lack hardware parallelism
d. All of these

Ans:d. All of these

What is the network topology of Ambusens WBAN devices
a. Bus topology
b. Star Topology
c. Mesh Topology
d. None of the above

Ans:b. Star Topology

Which communication protocol is used between sensor devices in Ambusens WBAN system
a. 3G
b. WLAN/Wi-fi
c. IEEE 802.15.4
d. IEEE 802.15.1

Ans:d. IEEE 802.15.1

Which privacy-aware scheme is used in Ambusens cloud framework
a. Hashing and reverse hashing of patient physiological data
b. Patient identity masking by hashing-based mechanism
c. Hashing and reverse hashing of physiological sensor ID
d. All of the above

Ans:b. Patient identity masking by hashing-based mechanism

Activity monitoring:
a. Provides better quality of life
b. Provides information accurately in a reliable manner
c. Provides continuous monitoring support.
d. All of these

Ans:d. All of these

Which of these sensors can be most appropriately used for activity monitoring in wearables?
a. Accelerometer
b. Cameras
c. LIDARs
d. LED

Ans:a. Accelerometer

Statistical methods of activity recognition can work on:
a. Videos
b. Images
c. Scalar sensor data
d. All of these

Ans:c. Scalar sensor data

Which indicates the communication between internetworking devices and applications. 

a. Internet 

b. Communication Devices 

c. Internet of things 

d. None of the above

Ans:c. Internet of things 

Which indicates the computations at device level before the computed data is communicated through internet
a. Computing
b. Edge Computing
c. Communication
d. Internetworking

Ans:b. Edge Computing

The levels of IoT are called as
a. Nodes
b. Tires
c. Items
d. Blocks

Ans:b. Tires

Which are the devices that sense the physical environments
a. Control units
b. Sensors
c. Firmware
d. PDU’s

Ans:b. Sensors

Which IoT block contains the MCU or Customer chip
a. Control units
b. Sensors
c. Firmware
d. PDU’s

Ans:a. Control units

REST stands for
a. Raspbian state transfer
b. Raspberry state transfer
c. Representational state transfer
d. Raswik state transfer

Ans:c. Representational state transfer

Which is an operating system for IOT
a. Contiki
b. RIOT
c. Spark
d. Allyoyn

Ans:a. Contiki

Which is an open data platform with open API
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where

Ans:a. Thingspeak

Which provides complete platform for managing IoT Devices
a. Thingspeak
b. Nimbits
c. IoT toolkit
d. Site Where

Ans:d. Site Where

1. The ___ works best when handling data in byte sized packages.  

a. 8031   b. 8091   c. 8071   d. 8081  

Ans:  a

2. _____ displays commonly contain LED segments arranged as an 8.  

a. Seven segment display   b. intelligent LCD display   c. 4X4 display   d. 2X2 display  

Ans: a

3. In intelligent LCD display, D0 to D7 are located at  

a. 1 to 7 pins   b. 7 to 14 pins   c. 2 to 8 pins   d. 8 to 16 pins  

Ans: b

4. The ___ display contains two internal byte-wide registers.  

a. seven segment display   b. intelligent LCD display   c. 4X4 display   d. 2X2 display  

Ans: b

5. ___ displays include incandescent and, more likely, LED indicators.  

a. single light   b. double light   c. single character   d. intelligent alphanumeric  

Ans: a

6. ____ displays include numeric and alphanumeric arrays. 

 a. single light b. double light   c. single character d. intelligent alphanumeric 

Ans: c

7. _____ displays are equipped with a built-in microcontroller.  

a. single light   b. double light   c. single character   d. intelligent alphanumeric 

Ans: d

8. 20 characters per line display can be possible in  

a. Seven segment display   b. intelligent LCD display   c. 4X4 display   d. 2X2 display 

Ans: b

9. Control sequence of D/A conversion is  

a. CS then WR   b. WR then CS   c. CS then WR then RD   d. WR then RD  

Ans: a

10. Control sequence of A/D conversion is  

a. CS then WR   b. WR then CS   c. CS then WR then RD   d. WR then RD

Ans: c

11. A/D conversion time is 

 a. 1 μs   b. 2 μs   c. 3 μs   d. 4 μs  

Ans:  a

12. For a 1000-hertz wave, S could be ____ samples. 

a. 50d  b. 100d  c. 150d  d. 200d 

Ans:

13. D/A conversion time is 

a. 3 μs  b. 4 μs  c. 5 μs  d. 6 μs 

Ans: d

14. The frequency of the counted pulse train is 

a. unknown frequency = counter / timer 

b. unknown frequency = counter X timer 

c. unknown frequency = counter – timer 

d. unknown frequency = counter + timer 

Ans: a

15. If the counter counts 200 pulses over an interval of 0.1 second generated by the timer, the  frequency is 

a. 200 Hz  b. 2000Hz  c. 20000Hz  d. 200000Hz 

Ans: b

16. The frequency of the pulse value in D/A conversion is 

a. UF = 1 / (wave time high X 2) 

b. UF = 1 / (wave time high + 2) 

c. UF = 1 / (wave time high – 2) 

d. UF = 1 / (wave time high / 2) 

Ans: a

17. Reference voltage value in D/A conversion is 

a. ±8V  b. ±10V  c. ±12V  d. ±14V 

Ans: a

18. A/D converters use ____ types.

 a. SAR  b. flash  c. magnetic  d. bubble 

Ans: b

19. A/D converters use ____ types.

 a. SAR  b. flash  c. magnetic  d. bubble 

Ans: b

20. For a 1000-hertz wave, S could be ____ samples.

 a. 50d  b. 100d  c. 150d  d. 200d 

Ans: d

21. The ___ display contains two internal byte-wide registers. 

a. Seven segment display  b. intelligent LCD display  c. 4X4 display  d. 2X2 display 

Ans:  b

22. The 8051 external input pin is 

a. INT1  b. DPH  c. DPL  d. IE 

Ans: a

23. The 8051 external input pin is 

a. INT0  b. DPH  c. DPL  d. IE

Ans: a

24. Reference voltage value in D/A conversion is

a. ±8V  b. ±10V  c. ±12V  d. ±14V 

Ans: a

25. A/D conversion time is 

a. 1 μs  b. 2 μs  c. 3 μs  d. 4 μs 

Ans: a

26. In intelligent LCD display, D0 to D7 are located at 

a. 1 to 7 pins  b. 7 to 14 pins  c. 2 to 8 pins  d. 8 to 16 pins 

Ans: b

27. _____ displays commonly contain LED segments arranged as an 8. 

a. Seven segment display  b. intelligent LCD display  c. 4X4 display  d. 2X2 display

Ans: a

 28. ____ is not suitable for the interchange of data between 8051 microcontrollers. 

a. mode 0  b. mode 1  c. mode 4  d. mode 3

Ans:  d

29.  Data transmission using modes 2 and 3 features ___ bits per character.

 a. 8  b. 9  c. 10  d. 11 

Ans: d

30. Which serial data communication mode is multiprocessor 9-bit UART?

 a. mode 0  b. mode 1  c. mode 2  d. mode 4 

Ans: c

Which of the following is a synchronous serial interface protocol?

a. SPI b. I2C c. UART d. Both (a) and (b)

Ans: d

Synchronous interfaces make use of clock signal? State True or False

a. True b. False

Ans: True

Which of the following serial protocol is used for on-board serial communication?

a. USB b. I2C c. Wifi d. Bluetooth

Ans: b

Which of the following protocol make use of 7 bit address for its operation?

 a. I2C b. SPI c. RS232 d. RS485

Ans: a

Which of the following interface is used to 127 slave device to the master device?

a. SPI b. I2C c. RS232 d. RS485

Ans: b

RS232 protocol makes use of clock signal for sending data? True or False

a. True b. False

Ans: b

Which serial communication interface is used to connect modems and for non networked communication between computers and other devices?

a. SPI b. I2C c. UART d. USB

Ans: C

How many wires are used to connect I2C devices?

a. 1 wire b. 2 wires c. 3 wires d. 4 wires

Ans: b

Which of the following interface was developed by Motorola Company?

 a. I2C b. SPI c. USB d. Bluetooth

Ans: b

Which of the following make use of 4 wires for its operation?

 a. USB b. CAN c. SPI d. I2C

Ans: c

Which of the following is a full duplex communication interface?

a. I2C b. 1 – Wire c. SPI

Ans: c

Which of the following is true about MOSI signal?

 a. Signal Line carrying the clock signal

b. Signal line for slave select

c. Signal line carrying the data from master to slave device

d. Signal line carrying the data from slave to master device

Ans: c

Which of the following supports only point to point communication and not suitable for multi drop communication

a. RS485 b. RS232 c. RS422 d. Rs484

Ans: b

Which of the following is a low cost, low power, short range wireless communication for voice and data

a. Wi-Fi b. Infrared c. Zigbee d. Bluetooth

Ans: d

Which of the following is true about Opto-Coupler?

 a. Optocoupler is used as only input device

b. Optocoupler is used as only output device

c. Optocoupler is used in both input and output circuitry

d. None of these

Ans: c

Which of the following is true for Common Anode 7 segment displays?

 a. All anodes are connected to ground

b. All anodes are connected to Power supply

c. All cathodes are connected to Power Supply

d. None of these

Ans: b

LED stands for

a. Light Emitting Display b. Light Emitting Diode

c. Light Energy Device d. Light Energy Display

Ans. b

Which of the following is true for a Relay?

a. Relay is a Mechanical device b. Relay is Electric device

c. Relay is Electro – Mechanical device d. None of these

Ans: c

Which of the following is true about Buzzer?

 a. Buzzer is an output device b. Buzzer is an input device

c. Buzzer is both input and out device d. None of these

Ans: a

Which device generates discrete displacement in response to dc electrical signals?

 a. LED b. Buzzer c. 7 segment Display d. Stepper Motor

Ans: d

A task owning a mutex, cannot be ______ 

a. added  b. modified  c. released  d. deleted 

Ans:  d

Array of mailboxes can be considered as 

a. pipes  b. semaphore  c. timer  d. message queue 

Ans:  d

Mutex stands for 

a. mutual text  b. mutual exclusion  c. mutual task  d. mutual timer 

Ans:  b

Which occurs when two or more tasks wait for a resource being held by another task 

a. deadlock  b. live lock  c. semaphore  d. starvation

Ans:  a

Mutual exclusion problem occurs between 

a. two disjoin process that not interact 

b. processes that share resources 

c. processes that do not use the same resource 

d. processes have priority 

Ans:  b

What problem is solved by dijkstras bankers algorithm? 

a. mutual exclusion  b. deadlock recovery 

c. deadlock avoidance  d. cache coherence 

Ans:  b

Mutex is a special 

a. count semaphore  b. binary semaphore 

c. task semaphore  d. time semaphore 

Ans:  b

A common use of ____ is to serve as the program memory for a micro processor 

a. ROM  b. EPROM  c. EEPROM d. Flash memory  

Ans:  c

To obtain better memory utilization dynamic loading ids used with dynamic loading a routine is  not loaded until it is called for implementing dynamic loading 

a. special support from hardware is essential 

b. special support from operating system is essential 

c. special support from both hardware and operating system are essential 

d. user programs can implement dynamic loading without any special support from the operating  system or the hardware

Ans:  d

One common use of a ______ timer is to enable an embedded system to restart itself in case of a failure 

a. watchdog  b. special  c. reaction  d. proactive 

Ans:  a

Which is an extension of EEPROM 

a. RAM  b. SRAM  c. Flash memory  d. DRAM 

Ans:  c

What is really more of a bus interface architecture the DRAM architecture 

a. EDORAM  b. Rambus DRAM  c. SDRAM  d. FPMDRAM 

Ans:  b

What are used to measure the elapsed time of events 

a. timers  b. counters  c. schedulers  d. processes 

Ans:  a

What is an extremely common peripheral devices that can measure time intervals 

a. counters  b. timers  c. schedulers  d. process 

Ans:  b

To use a _______ , we must configure its inputs and monitors its outputs 

a. counters  btimers  cschedulers  d. process 

Ans:  b

A ______ timer is an application that measures the time a person takes to respond to a visual or audio stimulus 

a. watchdog  b. special  c. reaction  d. proactive 

Ans:  c

System’s _____ interrupt response time has to be considered while evaluating the performance  of an operating system embedded software 

a. best-case  b. worst-case  c. average-case  d. all cases 

Ans:  b

ISR stands for 

a. Interface service routine  b. Interrupt Service Runner

 c. Interrupt Service Routine  d. Interface Standard Routine 

Ans:  c

When a process makes a system call, its mode change from 

a. user to kernel   b. kernel to user    c. restricted to process  d. unrestricted to restricted 

Ans:  a

The technique that allows only one user to work with a file at a particular time is called 

a. semaphore  b. critical region  c. locking  d. dedicated mode 

Ans:  c

What is a hardware signal that informs the CPU that an important event has occurred 

a. event  b. signal  c. process  d. interrupt 

Ans:  d

When interrupt occurs , CPU saves its context and jumps to the _______ 

a. ISR  b. API  c. IP  d. ITS 

Ans:  a

The maximum time for which interrupts are disabled + time to start the execution of the first instruction in the ISR is called_______ 

a. Interrupt response time  b. Interrupt recovery time  c. Interrupt latency  d. Interrupt handler 

Ans:  c

Time between receipt of interrupt signal and starting the code that handles the interrupt is  called_____ 

a. Interrupt response time  b. Interrupt recovery time  c. Interrupt latency  d. Interrupt handler

Ans:  a

Time required for CPU to return to the interrupted code/ highest priority task is called 

a. Interrupt response time  b. Interrupt recovery time  c. Interrupt latency  d. Interrupt handler 

Ans:  b

In a preemptive kernel , response time = 

a. Interrupt recovery time + time to save CPU registers context 

b. Interrupt respond time + time to save CPU registers context 

c. Interrupt handler + time to save CPU registers context

d. Interrupt latency + time to save CPU registers context

Ans:  d

Principle of RTOS is 

a. write short interrupt routines  b. you do not need tasks for priority

 c. you need tasks for inheritance  d. consider turning time-slicing off

Ans: a

Which causes more task switched and therefore cuts throughput. 

a. time-slicing  b. encapsulation  c. priority  d. routines

Ans:  a





Comments