Internet of Things(BCA-6002)
Multiple Choice Questions
1. What is the role of communication protocol in IoT?
a) Smart cities
b) Cyber physical system
c) Mac layer issue
d) Managing energy
2. Which of the following is the future application of IoT?
a) Role of green IoT system
b) QoS in communication
c) Secure communication
d) Multimedia communication
3. The embedded devices will form _______ network.
a) ATM
b) Ethernet
c) FDDI
d) Ad-hoc
4. Which will reduce the energy expenditure?
a) Clustering
b) Software agents
c) Synchronization techniques
d) Cluster, Software agent, and Synchronization techniques
5. What is a potential security concern with IoT devices?
a) They are typically very expensive.
b) They are immune to data loss.
c) They can be vulnerable to hacking and unauthorized access.
d) They are not connected to the internet.
6. Which IoT communication protocol is designed for low-power, low-
bandwidth devices?
a) HTTP
b) MQTT
c) TCP/IP
d) UDP
7. Which of the following is NOT a challenge in the implementation of IoT?
a) Data Security and Privacy
b) Interoperability
c) Scalability
d) Limited Connectivity Options
8. Which layer of the IoT architecture is responsible for processing and
analyzing data collected from sensors?
a) Application Layer
b) Network Layer
c) Data Processing Layer
d) Physical Layer
9. Which IoT application involves using connected devices to monitor and
manage health and wellness?
a) Precision Agriculture
b) Industrial IoT (IIoT)
c) Wearable Health Devices
d) Smart Grids
10. Which technology is commonly used for short-range communication
between IoT devices?
a) Wi-Fi
b) Bluetooth
c) Cellular
d) RFID
11. What IoT application involves using sensors and actuators to automate
industrial processes?
a) Precision Agriculture
b) Industrial IoT (IIoT)
c) Connected Cars
d) Smart Grids
12. Which of the following is not a source of IoT data?
a) Sensors
b) Smartphones
c) Social Media
d) Wearable Devices
13. Which of the following frameworks is commonly used to conceptualize
the Internet of Things (IoT)?
a) TCP/IP model
b) OSI model
c) IoT reference model
d) Blockchain model
14. Which architecture is more likely to rely on cloud-based platforms:
M2M or IoT?
a) M2M
b) IoT
c) Both equally
d) None
15. Which of the following is a needed capability in IoT systems?
a) High human intervention
b) Low-latency communication
c) Limited device interoperability
d) Point-to-point communication
16. What is a characteristic of IoT architecture?
a) Emphasis on direct communication between specific devices
b) Centralized network architecture
c) Cloud-based platforms for data storage
d) Low emphasis on interoperability
17. What is a primary emphasis in M2M communication?
a) Interoperability
b) Cloud-based processing
c) Point-to-point communication
d) Human intervention
18. Which capability is crucial for accommodating the vast number of
devices in IoT systems?
a) High human intervention
b) Scalability
c) Low-latency communication
d) Device-level protocols
19. In IoT architecture, what is the role of cloud-based platforms?
a) Low-latency communication
b) Inter-device communication
c) Data storage, processing, and analysis
d) Point-to-point communication
20. Which of the following is a characteristic of M2M communication?
a) Emphasis on cloud-based platforms
b) Direct communication between specific machines
c) Distributed network architecture
d) Human intervention in data flow
21. Which standard is widely adopted for IoT communication protocols?
a) HTTP
b) MQTT
c) FTP
d) Telnet
22. MAC stands for
a) media area control
b) memory access control
c) memory area control
d) media access control
23. A program written with IDE for Arduino is
a) ide source
b) sketch
c) cryptography
d) source code
24. Which instruction set architecture is used in Raspberry Pi?
a) x86
b) msp
c) avr
d) arm
a) .
25. What is the main function of Nest Thermostat E?
a) change the temperature only when we are at home
b) reduce the energy used
c) change the temperature from anywhere
d) powers off when a person is not present
26.------ is uniquely identifiable embedded computing devices.
a) internet
b) iot
c) bigdata
d) cloud
e)
27. How many USB ports are present in Raspberry Pi 3?
a) 5
b) 2
c) 4
d) 3
28. tags, devices, smart phones useful in identification.
a) ietf 6lowpan
b) ieft coap
c) rfid/nfc
d) ieee802.15.4.lo wpan
29. Networking Hardware Address is referred with . . .
a) ip address
b) mac address
c) nic
d) organizationally unique identifier
30. IoT-A reference model is a
a) scalable
b) secure
c) both scalable and secure
d) neither scalable nor secure
31. Publish command message is sent from
a) only publisher to broker
b) only broker to publisher
c) publisher to broker and broker to publisher
d) server to client
32. in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
a) sensors
b) heterogeneity
c) security
d) connectivity
33. MQTT is . . . . . . . . protocol.
a) machine to machine
b) internet of things
c) machine to machine and internet of things
d) machine things
34. The number of devices that need to be managed and that communicate
with each other will be much larger.
a) intelligence
b) connectivity
c) dynamic nature
d) enormous scale
35. . . . . . . . . resources are identified by Uniform Resource Identifiers.
a) coap
b) hmtp
c) mqtt
d) tcp/ip
36. What is the microcontroller used in Arduino UNO?
a) ATmega328p
b) ATmega2560
c) ATmega32114
d) AT91SAM3x8E
37 Which of the following issues are considered in IoT?
a) security issue
b) reliablity issue
c) standard issue
d) all issues
38. WSN stands for
a) wired sensor network
b) wireless sensor network
c) wired service network
d) wireless service network
39. Who will use their own IoT business models?
a) paas
b) saas
c) iaas
d) service provider
40. What role does participatory sensing technology play in smart city
initiatives?
a) Enabling autonomous vehicles
b) Facilitating citizen engagement in data collection
c) Controlling street lighting remotely
d) Monitoring traffic congestion using fixed sensors
41. Which of the following is not an example of an IoT hardware platform?
a) Intel Core i7
b) Raspberry Pi
c) ESP8266
d) Arduino
42. What is the purpose of using actuators in IoT systems?
a) To sense environmental parameters
b) To process data locally
c) To convert digital signals into analog signals
d) To perform physical actions based on control signals
43. What distinguishes a wireless sensor network from traditional wired
sensor systems?
a) Higher data transmission speed
b) Lower installation cost
c) Greater reliability
d) Flexibility in deployment
44. Embedded platforms for IoT typically require:
a) High processing power
b) Large memory capacity
c) Low energy consumption
d) Compatibility with multiple operating systems
45. Which of the following is a common application of participatory sensing
technology?
a) Monitoring traffic flow using fixed sensors
b) Tracking wildlife using GPS collars
c) Collecting air quality data with smartphones
d) Controlling home appliances remotely
46. What is the main advantage of RFID technology in inventory
management?
a) Real-time location tracking
b) High-speed data transfer
c) Long battery life
d) Low cost
47. Actuators are devices that:
a) Sense physical quantities
b) Convert electrical signals into mechanical motion
c) Communicate wirelessly with other devices
d) Store data in digital format
48. Who coined the term “Internet of Things”?
a) Kevin Aston
b) John Wright
c) Edward Jameson
d) George Garton
49. Which hardware platform is often used for prototyping IoT devices due
to its simplicity and versatility?
a) Raspberry Pi
b) Arduino
c) ESP8266
d) Intel Core i7
50. Digital sensors differ from analog sensors in that they:
a) Are more expensive
b) Provide continuous output
c) Measure discrete quantities
d) Require less power
51. Embedded computing basics involve:
a) Using computers with large displays
b) Designing systems with small, specialized computers
c) Developing software for desktop PCs
d) Building servers for cloud computing
52. Participatory sensing technology involves:
a) Collecting data from fixed sensors
b) Involving users in data collection using their mobile devices
c) Transmitting data using RFID tags
d) Monitoring environmental conditions wirelessly
53. Which of the following is an example of an actuator?
a) Temperature sensor
b) RFID tag
c) Servo motor
d) Zigbee module
54. RFID technology is primarily used for:
a) Wireless communication between devices
b) Tracking and identification of objects
c) Measuring temperature and humidity
d) Generating electricity from ambient RF signals
55. What is the main purpose of sensor deployment in a wireless network?
a) To maximize the number of sensors deployed
b) To minimize interference between neighbouring nodes
c) To optimize the coverage area and data collection efficiency
d) To prioritize data packets based on their importance
56. Which MAC protocol divides time into fixed-size slots and assigns each
slot to a different node?
a) TDMA
b) CSMA
c) CDMA
d) FDMA
57. In wireless medium access, what is the term for the duration between
the start of transmission by a node and the time when the transmission
reaches all other nodes?
a) Propagation delay
b) Transmission time
c) Medium access delay
d) Latency
58. Node discovery is essential in sensor networks to:
a) Prevent unauthorized access to the network
b) Ensure accurate synchronization of sensor data
c) Establish communication links between neighbouring nodes
d) Maximize the network's data transmission speed
59. DSDV (Destination-Sequenced Distance Vector) is a routing protocol
that:
a) Uses a centralized controller to determine routing paths
b) Utilizes a distance vector algorithm with sequence numbers to avoid
loops
c) Assigns nodes to clusters based on their geographic location
d) Prioritizes nodes with higher energy levels for data transmission
60. Which routing protocol is based on the principle of flooding, where
each node forwards the data to all its neighbours?
a) LEACH
b) DSR
c) AODV
d) DSDV
61. LEACH (Low-Energy Adaptive Clustering Hierarchy) is a routing
protocol that:
a) Minimizes the number of hops between sensor nodes
b) Organizes sensor nodes into clusters to reduce energy consumption
c) Prioritizes data packets based on their importance
d) Uses geographic information to route packets
62. Which routing protocol is commonly used in wireless sensor networks
due to its efficiency in energy-constrained environments?
a) OSPF
b) RIP
c) AODV
d) LEACH
63. In a wireless sensor network, which of the following is a key
consideration during sensor deployment?
a) Maximizing data transmission speed
b) Minimizing energy consumption
c) Ensuring compatibility with all devices
d) Maximizing the number of sensors deployed
64. What does CSMA/CA stand for?
a) Carrier Sense Multiple Access/Collision Avoidance
b) Collision Sense Multiple Access/Collision Avoidance
c) Carrier Sense Multiple Access/Collision Detection
d) Collision Sense Multiple Access/Collision Detection
65. In wireless communication, what is the term for the problem where
multiple devices attempt to access the medium simultaneously, leading to
collisions?
a) Medium contention
b) Channel congestion
c) Medium access control
d) Carrier sense multiple access
66. In home automation, what is a common example of an IoT-enabled
device for security purposes?
a) Smart refrigerator
b) Motion-sensing security camera
c) Automated sprinkler system
d) Smart TV
67. What is a key benefit of using IoT in healthcare applications?
a) Increased manual intervention
b) Decreased patient monitoring
c) Improved patient outcomes through remote monitoring
d) Limited access to medical data
68. How does IoT contribute to improving efficiency in the transportation
industry?
a) By increasing traffic congestion
b) By optimizing logistics and route planning
c) By reducing the need for vehicle maintenance
d) By limiting access to real-time data
69. In surveillance applications, IoT devices are often used for:
a) Monitoring environmental conditions
b) Controlling household appliances
c) Tracking wildlife migration
d) Monitoring security cameras
70. What is a key benefit of using IoT in industrial applications?
a) Increased manual labour
b) Decreased efficiency
c) Enhanced predictive maintenance
d) Limited scalability
71. n which industry is IoT used for inventory management and supply
chain optimization?
a) Construction
b) Transportation
c) Hospitality
d) Retail
72. What is a common example of home automation technology?
a) Automated manufacturing processes
b) Industrial robots
c) Smart thermostats
d) Industrial control systems
73. In the context of IoT, what is "edge computing"?
a) Computing done on a central server
b) Computing done on the edge of the network
c) Computing done in the cloud
d) Computing done on smartphones
74. Which protocol is commonly used for secure IoT device
communication?
a) HTTP
b) MQTT
c) FTP
d) HTTPS
75. How does IoT contribute to big data?
a) By reducing the amount of data generated
b) By generating high-volume, high-velocity data
c) By encrypting data
d) By decreasing data storage needs
76. Which layer of the IoT architecture is responsible for collecting data
directly from the environment?
a) Perception Layer
b) Network Layer
c) Application Layer
d) Business Layer
77. In the IoT ecosystem, what role does the Application Layer play?
a) Data collection
b) Data transmission
c) Providing user-specific services
d) Data storage
78. What is the main function of the Network Layer in IoT architecture?
a) Connecting physical devices
b) Data analysis
c) Providing security
d) Facilitating communication between devices and servers
79. In an IoT ecosystem, what is the purpose of a Middleware?
a) To increase the processing power of devices
b) To facilitate communication between different layers of the architecture
c) To store large amounts of data
d) To protect data from unauthorized access
80. What is the primary purpose of using protocols like MQTT or CoAP in
IoT?
a) To encrypt data
b) To increase data transmission speed
c) To enable lightweight data exchange
d) To create a digital twin
81. Which protocol is specifically designed for constrained devices and
networks in the IoT?
a) MQTT
b) CoAP
c) HTTP
d) FTP
82. In the context of IoT, what is the main advantage of using edge
computing over cloud computing for data processing?
a) Lower costs
b) Higher security
c) Reduced latency in data processing
d) More data storage options
83. An IoT application fails to receive data from sensors. What is a likely
issue to investigate in the architecture?
a) Sensor malfunction
b) Network layer congestion
c) Application layer overload
d) All of the above
84. In an IoT ecosystem, if devices from different manufacturers fail to
communicate, what should be examined first?
a) Power supply to devices
b) Interoperability standards
c) The Internet connection
d) The application code
85. What is the primary function of communication protocols in IoT?
a) To provide physical connections between devices
b) To encrypt all data
c) To standardize the format and sequencing of messages
d) To store data
86. What is the primary advantage of using IPv6 over IPv4 in IoT?
a) Larger address space
b) Faster data transfer speeds
c) More efficient routing
d) Enhanced security
87. What distinguishes Bluetooth Low Energy (BLE) from classic Bluetooth
in the context of IoT?
a) Higher data transfer speeds
b) Longer range
c) Lower power consumption
d) Support for more simultaneous connections
88. How does the Zigbee protocol benefit IoT applications?
a) By providing high data transfer speeds
b) By ensuring interoperability among devices
c) By offering long-range connectivity
d) By enabling direct Internet access
89. Which coding structure is commonly used with MQTT to minimize
data packet size for IoT communications?
a) XML
b) JSON
c) Binary
d) HTML
90. Which sensor type is commonly used to measure temperature in IoT
devices?
a) Infrared sensor
b) Ultrasonic sensor
c) Thermocouple
d) Photocell
91. Which device is used to detect the presence or absence of an object?
a) Temperature sensor
b) Pressure sensor
c) Proximity sensor
d) Humidity sensor
92. What type of sensor is typically used for measuring humidity?
a) Barometric pressure sensor
b) Hygrometer
c) Gyroscope
d) Accelerometer
93. What is the primary purpose of data analytics in IoT?
a) To increase data storage costs
b) To reduce the efficiency of IoT devices
c) To derive meaningful insights from collected data
d) To complicate system architectures
94. Which technology is primarily used for real-time data processing in
IoT?
a) Cloud computing
b) Edge computing
c) Data warehousing
d) Blockchain
95. In the context of IoT, how are RESTful APIs typically used?
a) To perform complex calculations on IoT devices
b) To enable synchronous communication between devices
c) To provide a standard way to interact with web services
d) To encrypt data transmissions
96. How does IoT contribute to water management in smart cities?
a) By increasing water usage in residential areas
b) By decreasing water treatment efficiency
c) By monitoring and controlling water distribution and usage, reducing
waste
d) By eliminating the need for water recycling facilities
97. How do smart grids in smart cities utilize IoT?
a) By restricting electricity usage during peak hours
b) By using IoT to monitor and adjust electricity distribution based on real-
time demand, improving efficiency and reliability
c) By eliminating renewable energy sources
d) By increasing electricity costs for residents
98. What programming concept is crucial for managing asynchronous
communication between IoT devices in smart cities?
a) Recursion
b) Synchronous function calls
c) Event-driven programming
d) Loop unrolling
99. When optimizing an IoT system for low-power consumption, what
emerging technology should be considered for efficient communication
between devices?
a) Li-Fi technology
b) Bluetooth Low Energy (BLE)
c) Zigbee
d) NFC
100. Which protocol interacts asynchronously over UDP?
a) HTTP
b) CoAP
c) MQTT
d) TCP/IP
ANSWERS
1.c 2.a 3.d 4.a 5.c 6.b 7.d 8.c 9.c 10.b
11.b 12.c 13.c 14.b 15.b 16.c 17.c 18.b 19.c 20.b
21.b 22.d 23.b 24.d 25.c 26.b 27.c 28.c 29.b 30.c
31.c 32.b 33.c 34.d 35.a 36.a 37.d 38.b 39.d 40.b
41.a 42.d 43.d 44.c 45. c 46.a 47.b 48.a 49.b 50.c
51.b 52.b 53.c 54.b 55.c 56.a 57.a 58.c 59.b 60.b
61.b 62. d 63.b 64.a 65.a 66.b 67.c 68.b 69.d 70.c
71.d 72.c 73.b 74.d 75.b 76.a 77.c 78.d 79.b 80.c
81.b 82.c 83.b 84.b 85.c 86.a 87.c 88.b 89.c 90.c
91.c 92.b 93.c 94.b 95.c 96.c 97.b 98.c 99.b 100.b