2.
which symbol is used in Arduino to calculate module?
3.
which protocol is a network layer protocol ?
4.
____ is the result of one's own evaluation based on many factor?
6.
the following is (are) non- verbal communication?
7.
Botnet is often used to launch ___attack?
8.
Communication is the task of imparting?
9.
Smart phones can be used in IOT setup with ...... application categories?
10.
what public relations pioneer is credited with being the first practitioner to insist on a place at the management table?
11.
which of the following "bit" defines the address bit in the control register?
12.
which of the following statement (S) are true about serial communication?
13.
The RFID is a useful IOT Architecture layer of the perception layer for?
14.
______is a relatively enduring pattern of thoughts, feelings and behavior which differentiate person from each other?
15.
The ___ filtering is a security measure on various wireless networks?
17.
all code in an Arduino sketch is processed from___?
19.
The temperature and humidity sensor values are printed in ____?
20.
what is the java extension file used in IOT?
21.
Self- actualization is the process where by individuals?
22.
personality is the combination of factors?
23.
Advantages (s) of Arduino ...?
24.
The original IEEE 802 ,MAC address comes from?
25.
According to davis, personality is a psychic phenomenon which is ?
26.
WOT reduces the_____ of HTTP?
27.
self- esteem reflects a person's subjective evaluation of his or her own worth?
28.
which of the following entities cannot used for libel?
29.
Almost all statement written in arduino language must end with a __?
30.
This output signal is feedback so that it subtract from the input signal?
32.
A____ is the component that executes a program in an IOT system?
33.
it is control system that has only one input and one output ?
34.
.............. means being specific definite and vivid?
35.
A wireless network uses ............ waves to transmit signals?
36.
which is not an IOT platform?
37.
which statements (S) are true about a brute force attack?
38.
which of the following is not a short range wireless network ?
39.
The default method (s) in Arduino program is are?
40.
IOT is based on.......... technology?
41.
how many wired does the SPI protocol use?
42.
The poor security practices could include (S)?
43.
The different wireless standards used in cellular networks ?
44.
The OSI layer that arranges signals into logical units of information called frames?
45.
which type of elements helps in streaming XMPP?
46.
which one of the following is not an IOT device ?
48.
The inner core of an optical fiber is .......... in composition ?
49.
What does CGI stands for?
50.
Transport layer is which layer in OSI model?
51.
The network layer protocol is present in the ?
52.
The ___ transportation brings some new control?
53.
___ considers personaliy as a certain style which is peculiar to the individual and is determined by the characteristic organization of mental trends complexes emotions and sentiments?
54.
which law restricts corporate communications for publicly traded companies before and during the period that new securities are being registered?
55.
UDP and TCP are called _____ protocols?
56.
In which message format is the status line present ?
57.
Bits from physical layer are converted into frames by the ?
58.
_____ is a security mechanism used in WIFI?
59.
what is the standard form of LLN?
60.
which of the following can not be considered an IOT device?
61.
which type of cable has glass center core?
63.
which of the following is a good password example ?
64.
End to end connection is established by.... protocol of the TCP/ IP suite?
65.
to secure your data on IOT devices?
66.
To easily interface add on modules with Arduino we can use?
68.
the RFID technology consists of ?
69.
_____nis the extent of one's belief in its own ability to complete the task and reach towards its goals?
70.
elements of self esteem are?
71.
the document that is used to communicate within the organization is called?
72.
which one out of these is not a data link layer technology?
73.
what type of interface is used by fingerprint sensors to collect data?
74.
Some of the compile errors are?
75.
what word war-l-ara orgonization introduced decentrialized publicity " drives' as a strategy to mobilize u.s public opinion to support the war?
76.
which of the following is threat to IOT device?
77.
MAC address is used as___?
78.
______ of an individual is the source of mental health?
79.
The whole concept of achieving success begins with how you?
81.
The term bot comes from robot an internet bot may also known as?
82.
self esteem is important because?
83.
which of these is used as a form of greetings for business people?
85.
_____ considers personality in terms of the status of the person in the group like how he/ she consider his/ her conecption about his role in the group pf which he/ she is a member.?
86.
when speaking to business associates or customers always open the conversation to questions and.........?
87.
personality is an individual aspect of culture whereas is a collective aspect of personality?
89.
Dictionary attacks is a kind of ?
90.
The HC 05 module can operated in__?
91.
Microcontroller used in Arduino UNO prototyping board is?
92.
which of the following statement true about a sketch ?
94.
____ is the self concept is what we think about the self?
95.
Environment in which we live also effect on culture and the geographical environment sometimes determines cultural variablility is?
96.
which layer of the OSI model does data compression ?
97.
to convert low self esteem to healthy one you need to ?
98.
what is mandatary for an ip packet to contain ?
99.
The ____ layer provides a security based connection?
100.
what is artificial intelligence?