Exam 19: Internet Of Things (IoT) and Networking Terminology

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

[?=n/Ttotal=n?[kTo+Te(n,m)] The above equation calculates the value of which of the following?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

Which of the following terms indicates that information is to be read only by those people for whom it is intended?

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

D

CoAP provides which of the following requirements?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

D

RFID stands for?

(Multiple Choice)
4.9/5
(43)

What is the full form of WLAN?

(Multiple Choice)
4.7/5
(28)

Smart Dust can be used to measure the

(Multiple Choice)
4.8/5
(30)

Which of the following is not a characteristic of a ZigBee network?

(Multiple Choice)
4.8/5
(41)

In case of , the GPS works as a receiver, not a transmitter.

(Multiple Choice)
4.9/5
(33)

  refers to an increase in the performance by the addition of more resources along the service layers

(Multiple Choice)
4.9/5
(25)

  is the degree to which nodes have a common set of connections to other nodes

(Multiple Choice)
4.8/5
(32)

Which of the following is the full form of XMPP?

(Multiple Choice)
4.9/5
(36)

CoAP is a specialized protocol.

(Multiple Choice)
4.9/5
(42)

  is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

(Multiple Choice)
4.9/5
(30)

Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

(Multiple Choice)
4.8/5
(29)

  is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

(Multiple Choice)
4.9/5
(40)

The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.

(Multiple Choice)
4.9/5
(42)

The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

(Multiple Choice)
4.9/5
(30)

Which of the following is not the component of IoT Endpoint

(Multiple Choice)
4.8/5
(31)

_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

(Multiple Choice)
4.8/5
(35)

M2M is a term introduced by

(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 38
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)