Internet of Things - IOT Multiple Choice Questions (MCQs) with Correct Answers | APDaga Tech

Internet of Things - IOT Multiple Choice Questions (MCQs) with Correct Answers | APDaga Tech
These are some simple Multiple Choice Questions (MCQs) on the topic of Internet of Things (IOT) with the correct solution with it.

You can have a look through it just to check/verify your theory knowledge in IOT domain. 

Check out the FREE Internet of Things (IOT) Tutorials here with hands-on experiments on Arduino, NodeMCU & Raspberry Pi boards.
[ With SourceCode ready to download for free ]




  1. Is MQTT a Standard?
    • Yes
    • No



  2. IANA stands for:
    • a. Internal Assessment Numerical Access
    • b. Internet Association Numbers Authority
    • c. International Aid for Network Automation
    • d. Internet Assigned Numbers Authority



  3. Standard port number for secure MQTT is:
    • a. 1883
    • b. 8000
    • c. 8883
    • d. 8888



  4. Is CoAP a IETF standard?
    • True
    • False



  5. Bluetooth 5.0 promises:
    • a. 4x Speed, 2x Range, 2x Data
    • b. 6x Speed, 3x Range, 3x Data
    • c. 2x Speed, 4x Range, 8x Data
    • d. 3x Speed, 4x Range, 8x Data



    Check-out our free tutorials on IOT (Internet of Things):




  6. Terms SSL and TLS stand for:
    • a. Secure Socket Layers and Transport Layer Session
    • b. Secure Socket Layers and Transport Layer Security
    • c. Secure Socket Layout and Transport Level Session
    • d. Session Socket Layers and Transport Layer Session



  7. Which one out of these is not a data link layer technology:
    • a. Bluetooth
    • b. UART
    • c. WiFi
    • d. HTTP



  8. Which transport layer protocols is used by DHCP?
    • a. RSVP
    • b. TCP
    • c. DCCP
    • d. UDP



  9. Which layer is called a port layer in OSI model:
    • a. Session
    • b. Application
    • c. Presentation
    • d. Transport



  10. What is a firewall in computer networks:
    • a. A system designed to prevent unauthorized access
    • b. A web browser
    • c. The physical boundary of network
    • d. The Network Operating System



  11. Router operate at ............ layer of OSI reference model?
    • a. Layer 2 (Data Link)
    • b. Layer 3 (Network)
    • c. Layer 1 (Physical)
    • d. Layer 4 (Transport)



  12. Each IP packet must contain:
    • a. Only Destination IP Address
    • b. Only Source IP Address
    • c. None of Above
    • d. Source and destination IP Addresses



  13. Which one of this is not a networking device:
    • a. Router
    • b. Switch
    • c. Bridge
    • d. Traffic Analyzer



  14. What is the standard length of MAC address:
    • a. 16 bits
    • b. 32 bits
    • c. 48 bits
    • d. 64 bits



  15. What is the use of Ping command:
    • a. To know network speed
    • b. None of the above
    • c. To test a host on the network is reachable
    • d. To test storage device



  16. What is Secure Shell (SSH):
    • a. A router
    • b. A firewall
    • c. A network protocol
    • d. Python Shell



  17. What does VNC stand for:
    • a. Various Network computers
    • b. Virtual Network Computing
    • c. None of the above
    • d. Virtual Network Communication



  18. What is the purpose of bin directory in Linux environment:
    • a. Contains essential device files
    • b. Contains essential binary commands
    • c. Containing configuration files
    • d. Contains user home directories



  19. What is Inter Integrated Communication(I2C):
    • a. An application layer protocol
    • b. A networking communication protocol for multi-master support
    • c. An OS for distributed network communication
    • d. A cellular communication protocol



  20. How many wires does SPI protocol use:
    • a. 2
    • b. 3
    • c. 1
    • d. 4



  21. What does LTE stand for:
    • a. Long Term Errors
    • b. Long Term Evolution
    • c. Lengthy Terminal Estimation
    • d. Long Term Estimates



  22. Which one out of these is not LPWAN technologies:
    • a. SigFox
    • b. WiFi
    • c. NB-IoT
    • d. LoRa



  23. Frequency band used by 802.11 ah standard is:
    • a. 60 GHz
    • b. 2.4 GHz
    • c. Sub 1 GHz
    • d. 5 GHz



  24. Fuzzy Logic is a form of:
    • a. Hexa state logic
    • b. Two-valued logic
    • c. Binary set logic
    • d. Many valued logic



  25. _________ involves predicting a response with meaningful magnitude, such as quantity sold, stock price, or return on investment.
    • a. Summarization
    • b. Clustering
    • c. All of the mentioned
    • d. Regression



  26. Which of the following  language is preferred for IoT analytics ?
    • a. Python
    • b. S
    • c. R
    • d. All of the mentioned



  27. Which one is simplest form of analytics
    • a. Predictive
    • b. Descriptive
    • c. All of the mentioned
    • d. Prescriptive



  28. The method by which companies analyze customer data or other types of information in an effort to identify patterns and discover relationships between different data elements is often referred to as:
    • a. Customer data management
    • b. Data mining
    • c. Data digging
    • d. None of the above



  29. A collection of lines that connects several devices is called ..............
    • a. Bus
    • b. Cable
    • c. Power line
    • d. Transmission Line



  30. A start bit in UART communication is always:
    • a. 1
    • b. Neither of these
    • c. 0



  31. Machine learning is
    • a. The selective acquisition of knowledge through the use of manual programs
    • b. The autonomous acquisition of knowledge through the use of manual programs
    • c. The selective acquisition of knowledge through the use of computer programs
    • d. The autonomous acquisition of knowledge through the use of computer programs



  32. HTTP resources are located by
    • a. unique resource locator
    • b. unique resource identifier
    • c. none of the mentioned
    • d. uniform resource identifier



  33. What is the TCP name for a transport service access point
    • a. none of the mentioned
    • b. node
    • c. pipe
    • d. port



  34. A Denial of Service attack is:
    • a. Connection flooding
    • b. Bandwidth flooding
    • c. All of the mentioned
    • d. Vulnerability attack



  35. A packet sniffer is 
    • a. Active receiver
    • b. Both of the mentioned
    • c. Passive receiver
    • d. None of the mentioned



  36. IPSec provides security at:
    • a. Physical Layer
    • b. Network Layer
    • c. Transport Layer
    • d. Session Layer



  37. WPA is a security mechanism in
    • a. WiFi
    • b. Cloud
    • c. Bluetooth
    • d. Ethernet



  38. Network topology with a central hub or switch is
    • a. Mesh
    • b. Token ring
    • c. Star
    • d. Token bus



  39. Internet domain name and hostname are translated into IP address by
    • a. Domain name system
    • b. Domain name database
    • c. Router
    • d. Domain information system



  40. Which protocol allows user at one site to establish connection to another site and pass keystroke from local to remote host:
    • a. Telnet
    • b. FTP
    • c. IP
    • d. HTTP



  41. How many times setup function runs in Arduino IDE:
    • a. None of the above
    • b. 10
    • c. 2
    • d. 1



  42. How many times loop function runs in Arduino IDE:
    • a. 4
    • b. forever
    • c. 1
    • d. 5



  43. What error occurs when you execute?
    x = abc
    • a. NameError
    • b. SyntaxError
    • c. ValueError
    • d. TypeError



  44. PWM stands for:
    • a. None of the above
    • b. Pulse Width Mode
    • c. Pulse With Modulation
    • d. Pulse Width Modulation



  45. Raspbian is:
    • a. Assembler
    • b. Language
    • c. Compiler
    • d. OS



  46. CGI stands for:
    • a. Common Gateway Interest
    • b. Common Gateway Interrupt
    • c. Common Gate Interference
    • d. Common Gateway Interface



  47. MQTT is:
    • a. Based on client-server architecture
    • b. Based on publish-subscribe architecture
    • c. Based on both of the above
    • d. Based on none of the above



  48. What is the access point (AP) in wireless LAN?
    • a. none of the mentioned
    • b. wireless devices itself
    • c. both (a) and (b)
    • d. device that allows wireless devices to connect to a wired network



  49. In wireless ad-hoc network
    • a. none of the mentioned
    • b. access point is not required
    • c. nodes are not required
    • d. access point is must



  50. Which multiple access technique is used by IEEE 802.11 standard for wireless LAN?
    • a. ALOHA
    • b. CSMA/CA
    • c. CDMA
    • d. none of the mentioned



  51. Which is the correct operator for power(x^y)?
    • a. x^y
    • b. x^^y
    • c. x**y
    • d. None of the mentioned



  52. What is WPA?
    • a. wi-fi protected access
    • b. wired process access
    • c. wired protected access
    • d. wi-fi process access



  53. The answer of 2+3L is:
    • a. 5.0
    • b. 5L
    • c. 5
    • d.  Error



  54. An interconnected collection of piconet is called
    • a. micronet
    • b. scatternet
    • c. mininet
    • d. none of the mentioned



  55. In a piconet, there can be up to _____ parked nodes in the net.
    • a. 511
    • b. 63
    • c. 255
    • d. 127



  56. Secure shell (SSH) network protocol is used for
    • a. remote command-line login
    • b. remote command execution
    • c. all of the mentioned
    • d. secure data communication



  57. The network layer concerns with
    • a. bits
    • b. frames
    • c. none of the mentioned
    • d. packets



  58. Ethernet frame consists of
    • a. none of the mentioned
    • b. IP address
    • c. both (a) and (b)
    • d. MAC address



  59. What is internet?
    • a. interconnection of local area networks
    • b. a vast collection of different networks
    • c. a single network
    • d. none of the mentioned



  60. DNS database contains
    • a. hostname aliases
    • b. hostname-to-address records
    • c. all of the mentioned
    • d. name server records


--------------------------------------------------------------------------------

Click here to see solutions for all Machine Learning Coursera Assignments.
&
Click here to see more codes for Raspberry Pi 3 and similar Family.
&
Click here to see more codes for NodeMCU ESP8266 and similar Family.
&
Click here to see more codes for Arduino Mega (ATMega 2560) and similar Family.


Feel free to ask doubts in the comment section. I will try my best to answer it.
If you find this helpful by any mean like, comment and share the post.
This is the simplest way to encourage me to keep doing such work.

Thanks & Regards,
-Akshay P Daga

2 Comments

Post a Comment
Previous Post Next Post