Internet Of Thing MCQ With Answersheet BCA Eight semester 2019 batch exam held on 2024 sep 18
Subject Internet of thing
Batch 2019
BCATU
i. Which of the following is NOT a domain-specific IOT?
a) Home Automation
b) Machine Learning
c) Energy Management
d) Retail Logistics
The correct answer is:
b) Machine Learning
ii.Which technology is NOT typically associated with IOT?
a)RFID
b)Bluetooth Low Energy (BLE)
c) Blockchain
d) HTTP
The correct answer is
c) Blockchain
ili.Which type of sensor measures occupancy and motion?
a) Acoustic sensor
b) Camera
c) Biosensor
d) Position sensor
The correct answer is:
a) Acoustic sensor
iv.What is the difference between active and passive sensors?
a) Active sensors require an external power source, while passive sensors do not.
b) Active sensors measure temperature, while passive sensors measure pressure.
C)Passive sensors emit energy, while active sensors absorb energy.
d) Passive sensors require external power, while active sensors do not.
The correct answer is:
a) Active sensors require an external power source, while passive sensors do not.
V.What is the main purpose of data analytics in loT?
a) To visualize data.
b) To store data in the cloud.
c) To derive insights from data collected by loT devices.
d) To build hardware components for loT.
The correct answer is:
c) To derive insights from data collected by IoT devices.
vi.Which of the following technologies is essential for processing large amounts of loT data?
a) HTML
b) XML
c) CSS
d) Big Data Analytics
The correct answer is:
d) Big Data Analytics
vil.Which of these is NOT a component of network analytics in loT?
a) Data Collection
b) Data Processing
c) Data Display
d) Data Encryption
The correct answer is:
d) Data Encryption
vili.Which of the following is crucial for loT cloud services?
a) Physical Security b) Data Warehousing
c) Video Streaming d) Communication API
The correct answer is:
d) Communication API
ix.What should be prioritized in loT security practices?
a) Fast data processing
b) High bandwidth network
c) Strong encryption methods
d) Low power consumption
The correct answer is:
c) Strong encryption methods
x.loT devices are particularly vulnerable due to:
a) Their limited computing power.
c) Their high power consumption.
b) Their large storage capacity.
d) Their advanced user interfaces.
The correct answer is:
a) Their limited computing power.