1.THE NUMBER OF ELEMENTS IN THE OPEN IOT ARCHITECTURE?
A) 6 ELEMENTS
B) 8 ELEMENTS
C) 7 ELEMENTS
D) 3 ELEMENTS
ANS. 7 ELEMENTS
2. GLOBAL SENSOR NETWORK IS BUILT FOR___?
A) REDUCING COST AND TIME FOR DEVELOPMENT
B) REDUCING COST AND INCREASING TIME FOR DEVELOPMENT
C) INCREASING COST AND INCREASING TIME FOR DEVELOPMENT
D) INCREASING COST AND DECREASING TIME FOR DEVELOPMENT
ANS.REDUCING COST AND TIME FOR DEVELOPMENT
3. WHAT IS THE SENSOR/PROTOCOL USED IN GSN?
A) HTTP PROTOCOL
B) CoAP PROTOCOL
C) MQTT PROTOCOL
D) XMPP PROTOCOL
ANS. CoAP PROTOCOL
4.INTERNET OF THINGS NEEDS A LOT OF NETWORK CONNECTION WHAT IS THE PROPOSED ” WHITE SPACE” RADIO STANDARD CALLED?
A) BLUETOOTH
B) WIMAX
C) WEIGHTLESS
D) ZIGBEE
ANS. WEIGHTLESS
5. ______ IS A POPULAR IP ADDRESS AND PORT SCANNER?
A) CAIN AND ABEL
B) SNORT
C) ANGRY IP SCANNER
D) ETTERCAP
ANS ANGRY IP SCANNER
6. _____ IS A WEB APPLICATION ASSESSMENT SECURITY TOOL?
A) LC4
B) WEBLNSPECT
C) ETTERCAP
D) QUALYS GUARD
ANS. WEBLNSPECT
7. ____ SCANS TCP PORTS AND RESOLVES DIFFERENT HOST NAMES?
A) SUPER SCAN
B) SNORT
C) ETTER CAP
D)QUALYS GUARD
ANS.SUPER SCAN
8. WHICH OF THE BELOW MENTIONED TOOL IS USED FOR WI-FI HACKING?
A) WIRE SHARK
B) NESSUS
C) AIRCRACK-NG
D) SNORT
ANS.AIRCRACK-NG
9.WHICH OF THE FOLLOWING IS NOT AN EXAMPLE OF PRESENTATION LAYER ISSUES?
A) POOR HANDLING OF UNEXPECTED INPUT CAN LEAD TO THE EXECUTION OF ARBITRARY
B) UNINTENTIONAL OR ILL-DIRECTED USE OF SUPERFICIALLY SUPPLIED INPUT
C) CRYPTOGRAPHIC FLAWS IN THE SYSTEM MAY GET EXPLOITED TO EVADE PRIVACY
D) WEAK OR NON- EXISTENT AUTHENTICATION MECHANISMS
ANS. WEAK OR NON- EXISTENT AUTHENTICATION MECHANISMS
10. A TYPE OF VR ENVIRONMENT IN WHICH SUBJECTS ARE VISUALLY ISOLATED FROM THE REAL ENVIRONMENT?
A) IMMERSIVE
B) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS.IMMERSIVE
11. IN THE TYPE OF VR ENVIRONMENT, THREE DIMENSIONAL SCENE IS CONSIDERED AS A PART OF THE PHYSICAL ENVIRONMENT?
A)IMMERSIVE
B) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS. NON IMMERSIVE
12. IN THIS TYPE OF VR ENVIRONMENT, THE SUBJECTS CAN PERFORM BOTH IN THE REAL AND VIRTUAL ENVIRONMENT?
A) IMMERSIVE
B ) SEMI IMMERSIVE
C) NON IMMERSIVE
D) AUGMENTED
ANS. SEMI IMMERSIVE
13. A TERM TO DESCRIBE THE EXTENT TO WHICH A USER CAN MODIFY FORM AND CONTENT OF A MEDIATED ENVIRONMENT?
A) VIVIDNESS
B) RICHNESS
C) INTERACTIVITY
D) MAPPING
ANS. INTERACTIVITY
14. IT IS A MEDIATED ENVIRONMENT WHICH CREATES THE SENSATION IN A USER OF BEING PRESENT IN A (PHYSICAL ) SURROUNDING?
A) WWW
B) VR
C) HMD
D) GUI
ANS.VR
15. THE PERFORMANCE OF AN AGENT CAN BE IMPROVED BASED ON THIS?
A) OBSERVE
B )LEARN
C) IMPROVISE
D) IMPLEMENT
ANS.LEARN
16. FACE RECOGNITION SYSTEM IS BASED ON ______?
A) APPLIED AI
B) PARALLEL AI
C) SERIAL AI
D) STRONG AI
ANS. APPLIED AI
17. A HARDWARE BASED SYSTEM THAT HAS AUTONOMY SOCIAL ABILITY AND REACTIVITY?
A)AI
B) AUTONOMOUS AGENT
C) AGENCY
D) BEHAVIOR ENGINEERING
ANS. AUTONOMOUS AGENT
18. A METHODOLOGY USED TO DEVELOP BEHAVIOR BASED AUTONOMOUS AGENTS?
A) DESCRIPTORS
B) BEHAVIOR ENGINEERING
C) BEHAVIOR MODELING
D) AUTO ENGINEERING
ANS. BEHAVIOR ENGINEERING
19. ________ IS A PARADIGM OF DISTRIBUTED COMPUTING TO PROVIDE THE CUSTOMERS ON DEMAND UTILITY BASED COMPUTING SERVICE?
A) REMOTE SENSING
B)REMOTE INVICATION
C)CLOUD COMPUTING
D ) PRIVATE COMPUTING
ANS. CLOUD COMPUTING
20. A NETWORK OF PHYSICAL OBJECTS OR THINGS EMBEDDED WITH ELECTRONICS OR SOFTWARES?
A AI
B) ML
C) IOT
D) INTERNET
ANS. IOT
