1.
Transport layer is which layer in OSI model?
2.
to convert low self esteem to healthy one you need to ?
3.
what is the java extension file used in IOT?
4.
Self- actualization is the process where by individuals?
5.
A____ is the component that executes a program in an IOT system?
6.
IOT is based on.......... technology?
7.
____ is the result of one's own evaluation based on many factor?
8.
which of these is used as a form of greetings for business people?
9.
The original IEEE 802 ,MAC address comes from?
10.
which of the following is threat to IOT device?
11.
Smart phones can be used in IOT setup with ...... application categories?
12.
Bits from physical layer are converted into frames by the ?
13.
which of the following is a good password example ?
15.
___ considers personaliy as a certain style which is peculiar to the individual and is determined by the characteristic organization of mental trends complexes emotions and sentiments?
16.
A wireless network uses ............ waves to transmit signals?
17.
Botnet is often used to launch ___attack?
18.
The ___ filtering is a security measure on various wireless networks?
19.
The term bot comes from robot an internet bot may also known as?
20.
.............. means being specific definite and vivid?
21.
_____ considers personality in terms of the status of the person in the group like how he/ she consider his/ her conecption about his role in the group pf which he/ she is a member.?
22.
Advantages (s) of Arduino ...?
23.
which protocol is a network layer protocol ?
25.
which of the following can not be considered an IOT device?
26.
Some of the compile errors are?
27.
what word war-l-ara orgonization introduced decentrialized publicity " drives' as a strategy to mobilize u.s public opinion to support the war?
28.
what public relations pioneer is credited with being the first practitioner to insist on a place at the management table?
29.
which of the following statement (S) are true about serial communication?
30.
which type of elements helps in streaming XMPP?
31.
Dictionary attacks is a kind of ?
32.
The OSI layer that arranges signals into logical units of information called frames?
33.
which symbol is used in Arduino to calculate module?
34.
Microcontroller used in Arduino UNO prototyping board is?
35.
The different wireless standards used in cellular networks ?
36.
to secure your data on IOT devices?
37.
which is not an IOT platform?
38.
UDP and TCP are called _____ protocols?
39.
what is mandatary for an ip packet to contain ?
41.
What does CGI stands for?
42.
The whole concept of achieving success begins with how you?
43.
which of the following entities cannot used for libel?
44.
how many wired does the SPI protocol use?
46.
Communication is the task of imparting?
47.
elements of self esteem are?
48.
To easily interface add on modules with Arduino we can use?
49.
End to end connection is established by.... protocol of the TCP/ IP suite?
50.
The temperature and humidity sensor values are printed in ____?
51.
The poor security practices could include (S)?
52.
personality is the combination of factors?
53.
The ____ layer provides a security based connection?
54.
which of the following statement true about a sketch ?
55.
what is artificial intelligence?
56.
which one out of these is not a data link layer technology?
57.
which type of cable has glass center core?
58.
self esteem is important because?
59.
WOT reduces the_____ of HTTP?
60.
______is a relatively enduring pattern of thoughts, feelings and behavior which differentiate person from each other?
61.
The ___ transportation brings some new control?
62.
personality is an individual aspect of culture whereas is a collective aspect of personality?
63.
In which message format is the status line present ?
64.
According to davis, personality is a psychic phenomenon which is ?
66.
The network layer protocol is present in the ?
67.
the RFID technology consists of ?
68.
This output signal is feedback so that it subtract from the input signal?
69.
the following is (are) non- verbal communication?
71.
all code in an Arduino sketch is processed from___?
72.
which of the following "bit" defines the address bit in the control register?
74.
which law restricts corporate communications for publicly traded companies before and during the period that new securities are being registered?
75.
which layer of the OSI model does data compression ?
76.
when speaking to business associates or customers always open the conversation to questions and.........?
77.
what is the standard form of LLN?
78.
The RFID is a useful IOT Architecture layer of the perception layer for?
79.
which statements (S) are true about a brute force attack?
80.
MAC address is used as___?
81.
it is control system that has only one input and one output ?
83.
Almost all statement written in arduino language must end with a __?
84.
____ is the self concept is what we think about the self?
85.
_____nis the extent of one's belief in its own ability to complete the task and reach towards its goals?
86.
The HC 05 module can operated in__?
87.
______ of an individual is the source of mental health?
88.
_____ is a security mechanism used in WIFI?
89.
which of the following is not a short range wireless network ?
90.
Environment in which we live also effect on culture and the geographical environment sometimes determines cultural variablility is?
91.
The inner core of an optical fiber is .......... in composition ?
93.
The default method (s) in Arduino program is are?
94.
the document that is used to communicate within the organization is called?
95.
self- esteem reflects a person's subjective evaluation of his or her own worth?
96.
what type of interface is used by fingerprint sensors to collect data?
100.
which one of the following is not an IOT device ?