Deck 19: Internet Of Things (IoT) and Networking Terminology
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
Play
Full screen (f)
Deck 19: Internet Of Things (IoT) and Networking Terminology
1
IBM's Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .
A)web sphere
B)tivoli
C)nebula
D)altix
A)web sphere
B)tivoli
C)nebula
D)altix
tivoli
2
Cloud system from SGI is functionally considered as an _.
A)on-demand cloud computing service
B)on-demand cloud storage service
C)on-demand cloud accessing service
D)on-demand
A)on-demand cloud computing service
B)on-demand cloud storage service
C)on-demand cloud accessing service
D)on-demand
on-demand cloud computing service
3
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.
A)nebula cloud
B)cyclone cloud
C)force.com cloud
D)cern cloud
A)nebula cloud
B)cyclone cloud
C)force.com cloud
D)cern cloud
nebula cloud
4
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform
A)load setting facility
B)load sharing facility
C)load setting faculty
D)load assigning faculty
A)load setting facility
B)load sharing facility
C)load setting faculty
D)load assigning faculty
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
A mashup cloud can be designed by utilizing the Scalability of AWS and of GAE platforms
A)accessibility
B)mobility
C)agility
D)scalability
A)accessibility
B)mobility
C)agility
D)scalability
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
The Cloudlets have a ownership unlike that of Clouds.
A)centralized
B)decentralized
C)global
D)none of the above
A)centralized
B)decentralized
C)global
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.
A)htc
B)hpc
C)hcc
D)hac
A)htc
B)hpc
C)hcc
D)hac
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
Performance metrics for HPC/HTC systems include :
A)multitasking scalability
B)security index
C)cost effectiveness
D)all of the above
A)multitasking scalability
B)security index
C)cost effectiveness
D)all of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
[?=n/Ttotal=n?[kTo+Te(n,m)] The above equation calculates the value of which of the following?
A)scalability
B)throughput
C)availability
D)effectiveness
A)scalability
B)throughput
C)availability
D)effectiveness
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
refers to an increase in the performance by the addition of more resources along the service layers
A)horizontal scalability
B)vertical scalability
C)diagonal scalability
D)none of the above
A)horizontal scalability
B)vertical scalability
C)diagonal scalability
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry
A)gps
B)cloud
C)iot
D)rfid
A)gps
B)cloud
C)iot
D)rfid
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
RFID stand for .
A)rangeable frequency identification
B)radio fragment identification
C)radio frequency identification
D)rangeable fragment identification
A)rangeable frequency identification
B)radio fragment identification
C)radio frequency identification
D)rangeable fragment identification
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
The architecture of IoT consists of different layers including which of the following? i. Application Layerii. Sensing Layeriii. Combination Layeriv. Network Layer
A)i, ii, iv
B)i, iii, iv.
C)ii, iii, iv.
D)ii, iii, iv
A)i, ii, iv
B)i, iii, iv.
C)ii, iii, iv.
D)ii, iii, iv
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
tags needs an external source to wake up the battery.
A)acitve rfid
B)passive rfid
C)battery-assisted passive rfid
D)battery-assisted active rfid
A)acitve rfid
B)passive rfid
C)battery-assisted passive rfid
D)battery-assisted active rfid
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor
A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
Even with two-factor authentication, users may still be vulnerable to attacks.
A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not the component of IoT Endpoint
A)sensor
B)gateway
C)communication module
D)mcu
A)sensor
B)gateway
C)communication module
D)mcu
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following makes sure that data is not changed when it not supposed to be?
A)integrity
B)availability
C)confidentiality
D)accounting
A)integrity
B)availability
C)confidentiality
D)accounting
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following terms indicates that information is to be read only by those people for whom it is intended?
A)availability
B)accounting
C)integrity
D)confidentiality
A)availability
B)accounting
C)integrity
D)confidentiality
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
DCS is a
A)distributed control system
B)data control system
C)data column system
D)distributed column system
A)distributed control system
B)data control system
C)data column system
D)distributed column system
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
RFID stands for?
A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
M2M is a term introduced by
A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
Smart Dust can be used to measure the
A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
Request field is present in which message format?
A)request message
B)response message
C)both request and response
D)neither request nor response
A)request message
B)response message
C)both request and response
D)neither request nor response
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
CoAP provides which of the following requirements?
A)multicast support and simplicity
B)low overhead and multicast support
C)simplicity and low overhead
D)multicast support, low over head, and simplicity
A)multicast support and simplicity
B)low overhead and multicast support
C)simplicity and low overhead
D)multicast support, low over head, and simplicity
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
CoAP is a specialized protocol.
A)web transfer
B)power
C)application
D)resource
A)web transfer
B)power
C)application
D)resource
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
What is the full form of WLAN?
A)wide local area network
B)wireless local area network
C)wireless land access network
D)wireless local area node
A)wide local area network
B)wireless local area network
C)wireless land access network
D)wireless local area node
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?
A)ieee 802.16
B)ieee 802.3
C)ieee 802.11
D)ieee 802.15
A)ieee 802.16
B)ieee 802.3
C)ieee 802.11
D)ieee 802.15
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is not a characteristic of a ZigBee network?
A)low power consumption
B)easy installation.
C)high data rates.
D)unlicensed radio bands.
A)low power consumption
B)easy installation.
C)high data rates.
D)unlicensed radio bands.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?
A)ieee 802.11.
B)ieee 802.15.1.
C)ieee 802.15.3.
D)ieee 802.15.4.
A)ieee 802.11.
B)ieee 802.15.1.
C)ieee 802.15.3.
D)ieee 802.15.4.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following layers are defined by the ZigBee stack?
A)transport layer
B)physical layer.
C)application support sub-layer.
D)medium access layer
A)transport layer
B)physical layer.
C)application support sub-layer.
D)medium access layer
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.
A)cross-site scoring scripting
B)cross-site request forgery
C)two-factor authentication
D)cross-site scripting
A)cross-site scoring scripting
B)cross-site request forgery
C)two-factor authentication
D)cross-site scripting
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
Representational State Transfer (REST) is the standard interface between
A)two machines in a lan
B)http client and user
C)http client and servers
D)none of the above
A)two machines in a lan
B)http client and user
C)http client and servers
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the full form of XMPP?
A)extension messaging and presence protocol
B)extensible messaging and presence protocol
C)extension messaging and privacy protocol
D)extensible messaging and privacy protocol
A)extension messaging and presence protocol
B)extensible messaging and presence protocol
C)extension messaging and privacy protocol
D)extensible messaging and privacy protocol
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
In case of , the GPS works as a receiver, not a transmitter.
A)active tracking
B)passive tracking
C)assisted tracking
D)receiver tracking
A)active tracking
B)passive tracking
C)assisted tracking
D)receiver tracking
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system
A)cloud-physical system
B)cyber-space system
C)cyber-physical system
D)none of the above
A)cloud-physical system
B)cyber-space system
C)cyber-physical system
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
The number of binding of a node to other actors of the graph in the graph representation of a network is called as .
A)node degree
B)path length
C)social circle
D)bridge
A)node degree
B)path length
C)social circle
D)bridge
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
is the degree to which nodes have a common set of connections to other nodes
A)structural hole
B)structural equivalence
C)structural cohesion
D)none of the above
A)structural hole
B)structural equivalence
C)structural cohesion
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck