Deck 19: Internet Of Things (IoT) and Networking Terminology

Full screen (f)
exit full mode
Question
IBM's Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .

A)web sphere
B)tivoli
C)nebula
D)altix
Use Space or
up arrow
down arrow
to flip the card.
Question
Cloud system from SGI is functionally considered as an _.

A)on-demand cloud computing service
B)on-demand cloud storage service
C)on-demand cloud accessing service
D)on-demand
Question
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A)nebula cloud
B)cyclone cloud
C)force.com cloud
D)cern cloud
Question
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform

A)load setting facility
B)load sharing facility
C)load setting faculty
D)load assigning faculty
Question
A mashup cloud can be designed by utilizing the Scalability of AWS and   of GAE platforms

A)accessibility
B)mobility
C)agility
D)scalability
Question
The Cloudlets have a ownership unlike that of Clouds.

A)centralized
B)decentralized
C)global
D)none of the above
Question
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.

A)htc
B)hpc
C)hcc
D)hac
Question
Performance metrics for HPC/HTC systems include :

A)multitasking scalability
B)security index
C)cost effectiveness
D)all of the above
Question
[?=n/Ttotal=n?[kTo+Te(n,m)] The above equation calculates the value of which of the following?

A)scalability
B)throughput
C)availability
D)effectiveness
Question
  refers to an increase in the performance by the addition of more resources along the service layers

A)horizontal scalability
B)vertical scalability
C)diagonal scalability
D)none of the above
Question
  is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

A)gps
B)cloud
C)iot
D)rfid
Question
RFID stand for .

A)rangeable frequency identification
B)radio fragment identification
C)radio frequency identification
D)rangeable fragment identification
Question
The architecture of IoT consists of different layers including which of the following? i. Application Layerii. Sensing Layeriii. Combination Layeriv. Network Layer

A)i, ii, iv
B)i, iii, iv.
C)ii, iii, iv.
D)ii, iii, iv
Question
  tags needs an external source to wake up the battery.

A)acitve rfid
B)passive rfid
C)battery-assisted passive rfid
D)battery-assisted active rfid
Question
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
Question
Even with two-factor authentication, users may still be vulnerable to attacks.

A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Question
Which of the following is not the component of IoT Endpoint

A)sensor
B)gateway
C)communication module
D)mcu
Question
Which of the following makes sure that data is not changed when it not supposed to be?

A)integrity
B)availability
C)confidentiality
D)accounting
Question
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)availability
B)accounting
C)integrity
D)confidentiality
Question
DCS is a  

A)distributed control system
B)data control system
C)data column system
D)distributed column system
Question
RFID stands for?

A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Question
M2M is a term introduced by

A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Question
Smart Dust can be used to measure the

A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Question
Request field is present in which message format?

A)request message
B)response message
C)both request and response
D)neither request nor response
Question
CoAP provides which of the following requirements?

A)multicast support and simplicity
B)low overhead and multicast support
C)simplicity and low overhead
D)multicast support, low over head, and simplicity
Question
CoAP is a specialized protocol.

A)web transfer
B)power
C)application
D)resource
Question
What is the full form of WLAN?

A)wide local area network
B)wireless local area network
C)wireless land access network
D)wireless local area node
Question
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A)ieee 802.16
B)ieee 802.3
C)ieee 802.11
D)ieee 802.15
Question
Which of the following is not a characteristic of a ZigBee network?

A)low power consumption
B)easy installation.
C)high data rates.
D)unlicensed radio bands.
Question
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)ieee 802.11.
B)ieee 802.15.1.
C)ieee 802.15.3.
D)ieee 802.15.4.
Question
Which of the following layers are defined by the ZigBee stack?

A)transport layer
B)physical layer.
C)application support sub-layer.
D)medium access layer
Question
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)cross-site scoring scripting
B)cross-site request forgery
C)two-factor authentication
D)cross-site scripting
Question
Representational State Transfer (REST) is the standard interface between

A)two machines in a lan
B)http client and user
C)http client and servers
D)none of the above
Question
Which of the following is the full form of XMPP?

A)extension messaging and presence protocol
B)extensible messaging and presence protocol
C)extension messaging and privacy protocol
D)extensible messaging and privacy protocol
Question
In case of , the GPS works as a receiver, not a transmitter.

A)active tracking
B)passive tracking
C)assisted tracking
D)receiver tracking
Question
  is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A)cloud-physical system
B)cyber-space system
C)cyber-physical system
D)none of the above
Question
The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A)node degree
B)path length
C)social circle
D)bridge
Question
  is the degree to which nodes have a common set of connections to other nodes

A)structural hole
B)structural equivalence
C)structural cohesion
D)none of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/38
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Internet Of Things (IoT) and Networking Terminology
1
IBM's Blue Cloud uses a special software for monitoring of virtual cluster operations and acts as a provisioning manager is known as .

A)web sphere
B)tivoli
C)nebula
D)altix
tivoli
2
Cloud system from SGI is functionally considered as an _.

A)on-demand cloud computing service
B)on-demand cloud storage service
C)on-demand cloud accessing service
D)on-demand
on-demand cloud computing service
3
NASA created can be fifty percent more energy efficient as it turns off the computers on the network to make cloud computing efficient.

A)nebula cloud
B)cyclone cloud
C)force.com cloud
D)cern cloud
nebula cloud
4
To establish scalability for the analysis of huge research data, CERN uses LSF i.e. a grid and workload management solution of cloud computing platform

A)load setting facility
B)load sharing facility
C)load setting faculty
D)load assigning faculty
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
5
A mashup cloud can be designed by utilizing the Scalability of AWS and   of GAE platforms

A)accessibility
B)mobility
C)agility
D)scalability
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
6
The Cloudlets have a ownership unlike that of Clouds.

A)centralized
B)decentralized
C)global
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
7
The Data-Intensive Scalable Computing(DISC) utilizes a data-center clusters to gather and maintain data.

A)htc
B)hpc
C)hcc
D)hac
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
8
Performance metrics for HPC/HTC systems include :

A)multitasking scalability
B)security index
C)cost effectiveness
D)all of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
9
[?=n/Ttotal=n?[kTo+Te(n,m)] The above equation calculates the value of which of the following?

A)scalability
B)throughput
C)availability
D)effectiveness
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
10
  refers to an increase in the performance by the addition of more resources along the service layers

A)horizontal scalability
B)vertical scalability
C)diagonal scalability
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
11
  is the technology used to search tagged objects and mobile devices with the help of browsing an IP address or using the database entry

A)gps
B)cloud
C)iot
D)rfid
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
12
RFID stand for .

A)rangeable frequency identification
B)radio fragment identification
C)radio frequency identification
D)rangeable fragment identification
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
13
The architecture of IoT consists of different layers including which of the following? i. Application Layerii. Sensing Layeriii. Combination Layeriv. Network Layer

A)i, ii, iv
B)i, iii, iv.
C)ii, iii, iv.
D)ii, iii, iv
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
14
  tags needs an external source to wake up the battery.

A)acitve rfid
B)passive rfid
C)battery-assisted passive rfid
D)battery-assisted active rfid
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
15
Types of Zigbee devices are available as follows: i. ZigBee Coordinatorii. ZigBee Routeriii. ZigBee End Deviceiv. ZigBee Accessor

A)i, ii, iii
B)i, ii, iii, iv
C)ii, iii, iv
D)i, ii, iv
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
16
Even with two-factor authentication, users may still be vulnerable to attacks.

A)scripting
B)cross attack
C)man-in-the-middle
D)radiant
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is not the component of IoT Endpoint

A)sensor
B)gateway
C)communication module
D)mcu
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following makes sure that data is not changed when it not supposed to be?

A)integrity
B)availability
C)confidentiality
D)accounting
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following terms indicates that information is to be read only by those people for whom it is intended?

A)availability
B)accounting
C)integrity
D)confidentiality
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
20
DCS is a  

A)distributed control system
B)data control system
C)data column system
D)distributed column system
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
21
RFID stands for?

A)random frequency identification
B)radio frequency identification
C)random frequency information
D)radio frequency information
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
22
M2M is a term introduced by

A)iot service providers
B)fog computing service providers
C)telecommunication service providers
D)none of these
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
23
Smart Dust can be used to measure the

A)temperature of the industrial lathe machine
B)heat inside a computer's cpu
C)chemical in the soil
D)strength of a solid material
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
24
Request field is present in which message format?

A)request message
B)response message
C)both request and response
D)neither request nor response
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
25
CoAP provides which of the following requirements?

A)multicast support and simplicity
B)low overhead and multicast support
C)simplicity and low overhead
D)multicast support, low over head, and simplicity
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
26
CoAP is a specialized protocol.

A)web transfer
B)power
C)application
D)resource
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
27
What is the full form of WLAN?

A)wide local area network
B)wireless local area network
C)wireless land access network
D)wireless local area node
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
28
Which of the following specifies a set of media access control (MAC) and physical layer specifications for implementing WLANs?

A)ieee 802.16
B)ieee 802.3
C)ieee 802.11
D)ieee 802.15
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is not a characteristic of a ZigBee network?

A)low power consumption
B)easy installation.
C)high data rates.
D)unlicensed radio bands.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
30
Which of the following IEEE standards provides the lowest level of the ZigBee software stack?

A)ieee 802.11.
B)ieee 802.15.1.
C)ieee 802.15.3.
D)ieee 802.15.4.
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following layers are defined by the ZigBee stack?

A)transport layer
B)physical layer.
C)application support sub-layer.
D)medium access layer
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
32
_ is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated.

A)cross-site scoring scripting
B)cross-site request forgery
C)two-factor authentication
D)cross-site scripting
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
33
Representational State Transfer (REST) is the standard interface between

A)two machines in a lan
B)http client and user
C)http client and servers
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is the full form of XMPP?

A)extension messaging and presence protocol
B)extensible messaging and presence protocol
C)extension messaging and privacy protocol
D)extensible messaging and privacy protocol
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
35
In case of , the GPS works as a receiver, not a transmitter.

A)active tracking
B)passive tracking
C)assisted tracking
D)receiver tracking
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
36
  is an embedded system which meshes the computing process with the physical world in the form of an interactive as well as intelligent system

A)cloud-physical system
B)cyber-space system
C)cyber-physical system
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
37
The number of binding of a node to other actors of the graph in the graph representation of a network is called as .

A)node degree
B)path length
C)social circle
D)bridge
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
38
  is the degree to which nodes have a common set of connections to other nodes

A)structural hole
B)structural equivalence
C)structural cohesion
D)none of the above
Unlock Deck
Unlock for access to all 38 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 38 flashcards in this deck.