- THE NUMBER OF ELEMENTS IN THE OPEN IOT ARCHITECTURE?
A) 6 ELEMENTS
B) 7 ELEMENTS
C) 7 ELEMENTS
D) 3 ELEMENTS
ANS 7 ELEMENTS
2. GLOBAL SENSOR NETWORK IS BUILT FOR_____?
A) REDUCING COST AND TIME FOR DEVELOPMENT
B) REDUCING COST AND INCREASING TIME FOR DEVELOPMENT
C) INCREASING COST AND INCREASING TIME FOR DEVELOPMENT
D) INCREASING COST AND DECREASING TIME FOR DEVELOPMENT
ANS.REDUCING COST AND TIME FOR DEVELOPMENT
3. WHAT IS THE SENSOR/ PROTOCOL USED IN GSN?
A) HTTP PROTOCOL
B) COAP PROTOCOL
C) M Q T T PROTOCOL
D) XMPP PROTOCOL
ANS.COAP PROTOCOL
4. INTERNET OF THINGS NEEDS A LOT OF NETWORK CONNECTION WHAT IS THE PROPOSED “WHITE SPACE” RADIO STANDARD CALLED?
A) BLUETOOTH
B) WIMAX
C) WEIGHTLESS
D) ZIGBEE
ANS.WEIGHTLESS
5. _____ IS A POPULAR IP ADDRESS AND PORT SCANNER?
A) CAIN AND ABEL
B) SNORT
C) ANGRY IP SCANNER
D) QUALYS GUARD
ANS.ANGRY IP SCANNER
6. ______ IS A WEB APPLICATION ASSESSMENT SECURITY TOOL?
A) LC4
B) WEBLNSPECT
C) ETTERCAP
D) QUALYS GUARD
ANS. WEB LNSPECT
7. ______ SCANS TCP PORTS AND RESOLVES DIFFERENT HOST NAMES?
A) SUPER SCAN
B) SNORT
C) ETTERCAP
D) QUALYS GUARD
ANS. SUPER SCAN
8. WHICH OF THE BELOW MENTIONED TOOL IS USED FOR WI-FI HACKING?
A) WIRESHARK
B) NESSUS
C) AIRCRACK – NG
D) SNORT
ANS.AIRCRACK – NG
9. WHICH OF THE FOLLOWING IS NOT AN EXAMPLE OF PRESENTATION LAYER ISSUSES?
A) POOR HANDLING OF UNEXPECTED INPUT CAN LEAD TO THE EXECUTION OF ARBITRARY INSTRUCTIONS
B) UNINTENTIONAL OR ILL- DIRECTED USES OF SUPERFICIALLY SUPPLIED INPUT
C) CRYPTOGRAPHIC FLAWS IN THE SYSTEM MAY GET EXPLOITED TO EVADE PRIVACY
D) WEAK OR NON- EXISTENT AUTHENTICATION MECHANISMS
ANS.WEAK OR NON- EXISTENT AUTHENTICATION MECHANISMS
10. A TYPE OF VR ENVIRONMENT IN WHICH SUBJECTS ARE VISUALLY ISOLATED FROM THE REAL ENVIRONMENT?
A) IMMERSIVE
B) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS. IMMERSIVE
11. IN THIS TYPE OF VR ENVIRONMENT THE THREE DIMENSIONAL SCENE IS CONSIDERED AS A PART OF THE PHYSICAL ENVIRONMENT?
A) IMMERSIVE
B) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS. NON IMMERSIVEJ
12. IN THIS TYPE OF VR ENVIRONMENT THE SUBJECTS CAN PERFORM BOTH IN THE REAL AND VIRTUAL ENVIRONMENT?
A) IMMERSIVE
B) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS. SEMI IMMERSIVE
13. TERM TO DESCRIBE THE EXTENT TO WHICH A USER CAN MODIFY FORM AND CONTENT OF A MEDIATED ENVIRONMENT?
A) VIVIDNESS
B) RICHNESS
C) INTERACTIVITY
D) MAPPING
ANS. INTERACTIVITY
14. IT IS A MEDIATED ENVIRONMENT WHICH CREATES THE SENSATION IN A USER OF BEING PRESENT IN A ( PHYSICAL ) SURROUNDING?
A) WWW
B) VR
C) HND
D) GUI
ANS VR
15. THE PERFORMANCE OF AN AGENT CAN BE IMPROVED BASED ON THIS?
A) OBSERVE
B) LEARN
C) IMPROVISE
D) IMPLEMENT
ANS.LEARN
16. FACE RECOGNITION SYSTEM IS BASED ON ___?
A) APPLIED AI
B) PARALLEL AI
C) SERIAL AI
D) STRONG AI
ANS.APPLIED AI
17. A HARDWARE BASED SYSTEM THAT HAS AUTONOMY SOCIAL ABILITY AND REACTIVITY?
A) AI
B) AUTONOMOUS AGENT
C) AGENCY
D) BEHAVIOR ENGINEERING
ANS.AUTONOMOUS AGENT
18. A METHODOLOGY USED TO DEVELOP BEHAVIOR BASED AUTONOMOUS AGENTS?
A) DESCRIPTORS
B) BEHAVIOR ENGINEERING
C) BEHAVIOR MODELING
D) AUTO ENGINEERING?
ANS BEHAVIOR ENGINEERING
19_______ IS A PARADIGM OF DISTRIBUTED COMPUTING TO PROVIDE THE CUSTOMERS ON-DEMAND UTILITY BASED COMPUTING SERVICE?
A) REMOTE SENSING
B) REMOTE INVOCATION
C) CLOUD COMPUTING
D) PRIVATE COMPUTING
ANS.CLOUD COMPUTING
20. A NETWORK OF PHYSICAL OBJECTS OR THINGS EMBEDDED WITH ELECTRONICS OR SOFTWARE?
A) AI
B) ML
C) IOT
D) INTERNET
ANS. IOT
