1.Arduino is an?
(a) open source programmable circuit board
(b) proprietary programmable circuit board
(c) open source non programmable circuit board
(d) None of the above
ans. open source programmable circuit board
2.Arduino was introduced in?
(a) 2003
(b)2004
(c) 2005
(d) 2006
ans. 2005
3. Arduino was introduced by?
(a) Steve Jobs
(b) Massimo Banzi
(c) Nakumo Yamamuto
(d) Sundar pichai
ans. Massimo Banzi
4. one of the most popular Arduino boards is ?
(a) Arduino Due milanove
(b)Arduino Diecimila
(c) Arduino N G Rev. C
(d) Arduino Uno
ans. Arduino Uno
5. A R E F stands for?
(a) Analog Reference
(b) Anchor Reference
(c) Arduino Reference
(d) None of the above
ans. Analog Reference
6. The programming language used in Arduino is primarily?
(a) Fortran
(b) C
(c) Python
(d) Java
ans. C
7. This device allows you to prototype your Arduino project without having to permanently solder the circuit together?
(a) Crumb board
(b) bread board
(c) slice board
(d) loaf board
ans. slice board
8. Once the circuit has been created on the breadboard you’ ll need to upload the program known as a?
(a) drawing
(b) painting
(c) sketch
(d) none of the above
ans. sketch
9. IDE stands for
(a) Internal Development Environment
(b) Inter Development Environment
(c) internet work Development Environment
(d)Integrated Development Environment
ans. Integrated Development Environment
10. Every Arduino sketch has two main parts to the program?
(a) void setup(), void loop ()
(b) void setup(), void main ()
(c) void main ()void loop ()
(d)void setup(), void event ()
ans. void setup(), void loop ()
11. It is defined as the characteristics sets of behaviours cognitions and emotional patterns that evolve from biological and environmental factors?
(a) Behaviour
(b) personality
(c) trait
(d) sense
ans. personality
12. personality is identified by an accumulation of many factors known as ?
(a) personality determinants
(b) personality identifiers
(c) personality finder
(d) none of the above
ans. personality determinants
13. The things that occur around a person on a regular basis determine how that person will behave and perceive themselves These experiences are known as ?
(a) surrounding experiences
(b) environmental experiences
(c) social experiences
(d) none of the above
ans. social experiences
14. Heredity refers to those factors that were determined at?
(a) adulthood
(b) childhood
(c) teenage
(d) conception
ans. conception
15. How an individual consciously knows and understands their own character feelings motives and desires?
(a) Awareness
(b) self- awareness
(c) knowing
(d) recognizing
ans.self- awareness
16. The behaviours that we repeat routinely and often automatically?
(a) Habit
(b) Behaviour
(c) Heredity
(d) none of the above
ans. Habit
17. Understanding your own feelings, what causes them and how they impact your thoughts and actions is?
(a) psychological awareness
(b) self- awareness
(c) emotional self awareness
(d)awareness
ans. emotional self awareness
18. the force within you that drives you to do things
(a) psychological awareness
(b) self- awareness
(c) emotional self awareness
(d)awareness
ans. awareness
19. There are two main types of motivators?
(a) interior & exterior
(b) intrinsic & extrinsic
(c) inner & outer
(d) none of the above
ans. intrinsic & extrinsic
20. The ability to control one’s feelings and overcome one’s weaknesses It is the ability to control and motivate yourself stay on track and do what is right?
(a) psychological awareness
(b)self- awareness
(c)self discipline
(d) self- motivation
ans. self discipline
21. process of identifying any individual?
(a) Auditing
(b) Authorisation
(c) Authentication
(d) accounting
ans. Authentication
22. process of keeping track of user’sactivity?
(a) Authentication
(b) Authoring
(c)Authorisation
(d)accounting
ans. accounting
23. Secret words or numbers used for protection of devices is called?
(a)Bio metric Data
(b) passwords
(c) private data
(d) backup
ans. passwords
24. The process of converting data into a format that cannot be read by another user?
(a) Encryption
(b) decryption
(c) locking
(d) registering
ans. Encryption
25. which concept determines what resources users can access after they log on ?
(a) Auditing
(b) actuation
(c) Authentication
(d) Access control
ans. Access control
26. The ______ hack is one of the most famous IoT security attack?
(a) Mirai botnet
(b) cipher
(c) stuxnet
(d) none of the above
ans. Mirai botnet
27. What is the first line of defence when setting up a network?
(a) configure authentication
(b) physically secure a network
(c)configure ACL
(d) configure encryption
ans. physically secure a network
28. what kind of electronic document contains a public-key?
(a) PIN
(b) PAN
(c) Digital certificates
(d) Biometrics
ans. Digital certificates
29. what type of attack tries to guess password by trying common words?
(a) brute force attack
(b) main in the middle attack
(c)smurf attack
(d) dictionary attack
ans. dictionary attack
30. which of the following is not a correct way to secure communication layer?
(a)cloud initiated communication
(b) TLS/SSL
(B) IPS (Intrusion prevention system)
(d) Firewall
ans. cloud initiated communication