MCQs: Emerging Trends – Unit 2 Internet of Things (IoT)

These notes are provided by Study Shades Classes, Latur (KAZI A. S. M.)

Explore key concepts from Emerging Trends in Computer and Information Technology with focused MCQs on Internet of Things. Perfect for diploma polytechnic students to test and strengthen their knowledge with quick questions and answers.

Unit 2 - Internet Of Things

1. What are the undesirable properties of knowledge?

  • a) Voluminous
  • b) Difficult to characterize
  • c) Variability
  • d) All of the above
View Answer
d) All of the above

2. Morphological Segmentation

  • a) Does Discourse Analysis
  • b) Separate words into individual morphemes and identify the class of the morphemes
  • c) Is an extension of propositional logic
  • d) None
View Answer
b) Separate words into individual morphemes and identify the class of the morphemes

3. How many types of entities are there in knowledge representation?

  • a) Facts
  • b) Symbols
  • c) Both A and B
  • d) None
View Answer
c) Both A and B

4. How many types of entities are there in knowledge representation?

  • a) Facts
  • b) Symbols
  • c) Both A and B
  • d) None
View Answer
c) Both A and B

5. What are the properties of a good knowledge representation system?

  • a) Representation Adequacy
  • b) Inferential Adequacy
  • c) Inferential Efficiency
  • d) All of these
View Answer
d) All of these

6. Natural Language Processing (NLP) is field of

  • a) Computer Science
  • b) Artificial Intelligence
  • c) Linguistics
  • d) All of the mentioned
View Answer
d) All of the mentioned

7. What is Artificial intelligence?

  • a) Putting your intelligence into Computer
  • b) Programming with your own intelligence
  • c) Making a Machine intelligent
  • d) Putting more memory into Computer
View Answer
c) Making a Machine intelligent

8. Artificial Intelligence has its expansion in the following application.

  • a) Planning and Scheduling
  • b) Game Playing
  • c) Robotics
  • d) All of the above
View Answer
d) All of the above

9. The characteristics of the computer system capable of thinking, reasoning and learning is known is

  • a) machine intelligence
  • b) human intelligence
  • c) artificial intelligence
  • d) virtual intelligence
View Answer
c) artificial intelligence

10. The first AI programming language was called:

  • a) BASIC
  • b) FORTRAN
  • c) IPL
  • d) LISP
View Answer
d) LISP

11. The first widely-used commercial form of Artificial Intelligence (Al) is being used in many popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs. It allows machines to handle vague information with a deftness that mimics human intuition. What is the name of this AI?

  • a) Boolean logic
  • b) Human logic
  • c) Fuzzy logic
  • d) Functional logic
View Answer
c) Fuzzy logic

12. What is the term used for describing the judgmental or commonsense part of problem solving?

  • a) Heuristic
  • b) Critical
  • c) Value based
  • d) Analytical
View Answer
a) Heuristic

13. Which kind of planning consists of successive representations of different levels of a plan?

  • a) hierarchical planning
  • b) non-hierarchical planning
  • c) project planning
  • d) All of the above
View Answer
a) hierarchical planning

14. What was originally called the "imitation game" by its creator?

  • a) The Turing Test
  • b) LISP
  • c) The Logic Theorist
  • d) Cybernetics
View Answer
a) The Turing Test

15. PROLOG is an AI programming language which solves problems with a form of symbolic logic known as predicate calculus. It was developed in 1972 at the University of Marseilles by a team of specialists. Can you name the person who headed this team?

  • a) Alain Colmerauer
  • b) Nicklaus Wirth
  • c) Seymour Papert
  • d) John McCarthy
View Answer
a) Alain Colmerauer

16. An AI technique that allows computers to understand associations and relationships between objects and events is called:

  • a) heuristic processing
  • b) cognitive science
  • c) relative symbolism
  • d) pattern matching
View Answer
a) heuristic processing

17. The field that investigates the mechanics of human intelligence is:

  • a) history
  • b) cognitive science
  • c) psychology
  • d) sociology
View Answer
b) cognitive science

18. What is the name of the computer program that simulates the thought processes of human beings?

  • a) Human logic
  • b) Expert reason
  • c) Expert system
  • d) Personal information
View Answer
d) Personal information

19. What is the name of the computer program that contains the distilled knowledge of an expert?

  • a) Data base management system
  • b) Management information System
  • c) Expert system
  • d) Artificial intelligence
View Answer
d) Artificial intelligence

20. Claude Shannon described the operation of electronic switching circuits with a system of mathematical logic called:

  • a) LISP
  • b) XLISP
  • c) Boolean algebra
  • d) neural networking
View Answer
c) Boolean algebra

21. What of the following is considered to be a pivotal event in the history of AI.

  • a) 1949, Donald O, The organization of Behavior.
  • b) 1950, Computing Machinery and Intelligence.
  • c) 1956, Dartmouth University Conference Organized by John McCarthy
  • d) 1961, Computer and Computer Sense.
View Answer
c) 1956, Dartmouth University Conference Organized by John McCarthy

22. High-resolution, bit-mapped displays are useful for displaying:

  • a) clearer characters
  • b) graphics
  • c) more characters
  • d) All of the above
View Answer
c) more characters

23. A bidirectional feedback loop links computer modelling with:

  • a) artificial science
  • b) heuristic processing
  • c) human intelligence
  • d) cognitive science
View Answer
d) cognitive science

24. Which of the following have people traditionally done better than computers?

  • a) recognizing relative importance
  • b) finding similarities
  • c) resolving ambiguity
  • d) All of the above
View Answer
d) All of the above

25. The explanation facility of an expert system may be used to:

  • a) construct a diagnostic model
  • b) expedite the debugging process
  • c) explain the system's reasoning process
  • d) both b and c
View Answer
d) both b and c

26. Strong Artificial Intelligence is

  • a) the embodiment of human intellectual capabilities within a computer.
  • b) a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.
  • c) the study of mental faculties through the use of mental models implemented on a computer.
  • d) All of the mentioned
View Answer
b) a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.

27. Which Nobel Laureate is also known as the Father of Artificial Intelligence?

  • a) Herbert A. Simon
  • b) Howard Aiken
  • c) Charles Babbage
  • d) Alan Turing
View Answer
a) Herbert A. Simon

28. Weak AI is

  • a) the embodiment of human intellectual capabilities within a computer.
  • b) a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.
  • c) the study of mental faculties through the use of mental models implemented on a computer.
  • d) All of the above
View Answer
c) the study of mental faculties through the use of mental models implemented on a computer.

29. Who is considered to be the "father" of artificial intelligence?

  • a) Fisher Ada
  • b) John McCarthy
  • c) Allen Newell
  • d) Alan Turning
View Answer
b) John McCarthy

30. A.M. turing developed a technique for determining whether a computer could or could not demonstrate the artificial Intelligence. Presently, this technique is called

  • a) Turing Test
  • b) Algorithm
  • c) Boolean Algebra
  • d) Logarithm
View Answer
a) Turing Test

31. Which of these schools was not among the early leaders in AI research?

  • a) Dartmouth University
  • b) Harvard University
  • c) Massachusetts Institute of Technology
  • d) Stanford University
View Answer
b) Harvard University

32. A certain Professor at the Stanford University coined the word 'artificial intelligence' in 1956 at a conference held at Dartmouth college. Can you name the Professor?

  • a) David Levy
  • b) John McCarthy
  • c) Joseph Weizenbaum
  • d) Hans Berliner
View Answer
b) John McCarthy

33. Strong AI is

  • a) the embodiment of human intellectual capabilities within a computer.
  • b) a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.
  • c) the study of mental faculties through the use of mental models implemented on a computer.
  • d) All of the above
View Answer
a) the embodiment of human intellectual capabilities within a computer.

34. MQTT stands for _____________

  • a) MQ Telemetry Things
  • b) MQ Transport Telemetry
  • c) MQ Transport Things
  • d) MQ Telemetry Transport
View Answer
d) MQ Telemetry Transport

35. MQTT is _________ protocol.

  • a) Machine to Machine
  • b) Internet of Things
  • c) Machine to Machine and Internet of Things
  • d) Machine Things
View Answer
c) Machine to Machine and Internet of Things

36. Which protocol is lightweight?

  • a) MQTT
  • b) HTTP
  • c) CoAP
  • d) SPI
View Answer
a) MQTT

37. Artificial Intelligence is a branch of Science which deals with helping machines find solutions to complex problems in a more human-like fashion.

  • a) Artificial Intelligence
  • b) Internet of Things
  • c) Embedded System
  • d) Cyber Security
View Answer
a) Artificial Intelligence

38. IANA stands for:

  • a) Internal Assessment Numerical Access
  • b) Internet Association Numbers Authority
  • c) International Aid for Network Automation
  • d) Internet Assigned Numbers Authority
View Answer
d) Internet Assigned Numbers Authority

39. Standard port number for secure MQTT is:

  • a) 1883
  • b) 8000
  • c) 8883
  • d) 8888
View Answer
c) 8883

40. ___________ specifies the function that will be called when the client disconnects.

  • a) Callback
  • b) Error
  • c) Connect
  • d) Disconnect
View Answer
d) Disconnect

41. __________ specifies the function that will be called when a successful re-connection is completed.

  • a) Callback
  • b) Error
  • c) Connect
  • d) Reconnect
View Answer
d) Reconnect

42. __________ Specifies the function that will be called when a successful connection with the PubNub cloud.

  • a) Callback
  • b) Error
  • c) Connect
  • d) Reconnect
View Answer
c) Connect

43. What Bigdata collects?

  • a) Human generated data
  • b) Sensor data
  • c) Machine generated data
  • d) Device data
View Answer
a) Human generated data

44. Which one is not an element?

  • a) People
  • b) Process
  • c) Security
  • d) Things
View Answer
a) People

45. Which one out of these is not a data link layer technology:

  • a) Bluetooth
  • b) UART
  • c) WiFi
  • d) HTTP
View Answer
d) HTTP

46. What is the standard length of MAC address:

  • a) 16 bits
  • b) 32 bits
  • c) 48 bits
  • d) 64 bits
View Answer
c) 48 bits

47. __________ specifies the function that will be called when there is a new message received from the channel.

  • a) Reconnect
  • b) Error
  • c) Connect
  • d) Callback
View Answer
d) Callback

48. __________ specifies the function that will be called on an error event.

  • a) Callback
  • b) Error
  • c) Connect
  • d) Reconnect
View Answer
b) Error

49. What is the java extension file in IoT?

  • a) .jar
  • b) .c
  • c) .exe
  • d) .py
View Answer
a) .jar

50. Do we run our program in the same computer where we have written?

  • a) TRUE
  • b) FALSE
  • c) May or may not
  • d) Cannot be determined
View Answer
c) May or may not

51. Publish command message is sent from _________

  • a) Only publisher to broker
  • b) Only broker to publisher
  • c) Publisher to broker and broker to publisher
  • d) Server to client
View Answer
c) Publisher to broker and broker to publisher

52. The message is sent to the input queue of a message flow that contains a _________

  • a) Subscriber
  • b) Server
  • c) Publication node
  • d) Client
View Answer
d) Client

53. ROSTOPIC uses _________ at the command line for representing the content of the message.

  • a) YAML_syntax
  • b) rostopic bw
  • c) rostopic delay
  • d) rostopic echo
View Answer
a) YAML_syntax

54. rostopic delay will provide delay for ___________

  • a) Topics which has header
  • b) Topics which has tail
  • c) Topics which has tail and head
  • d) To all topics
View Answer
a) Topics which has header

55. Which command finds out the topic?

  • a) rostopic bw
  • b) rostopic delay
  • c) rostopic echo
  • d) rostopic find
View Answer
d) rostopic find

56. What IoT collects?

  • a) Human generated data
  • b) Sensor data
  • c) Machine generated data
  • d) Device data
View Answer
c) Machine generated data

57. Which requires data stream management?

  • a) Bigdata
  • b) IOT
  • c) Bigdata & IoT
  • d) Device data
View Answer
b) IOT

58. Which requires Edge analytics?

  • a) Bigdata
  • b) IoT
  • c) Bigdata & IoT
  • d) Device data
View Answer
b) IoT

59. The IoT operates at ___________ scale.

  • a) Machine
  • b) Human
  • c) Device
  • d) Sensor
View Answer
a) Machine

60. One way to see observations addressing IoT analytics is?

  • a) 4-Tier Analytics
  • b) 2-Tier Analytics
  • c) 1-Tier Analytics
  • d) 3-Tier Analytics
View Answer
d) 3-Tier Analytics

61. Which tier Performs individual wind turbine real time performance?

  • a) 3-Tier Analytics
  • b) 2-Tier Analytics
  • c) 1-Tier Analytics
  • d) 4-Tier Analytics
View Answer
c) 1-Tier Analytics

62. Which tier performs predicts maintenance?

  • a) 3-Tier Analytics
  • b) 2-Tier Analytics
  • c) 1-Tier Analytics
  • d) 4-Tier Analytics
View Answer
b) 2-Tier Analytics

63. Which tier is data lake enabled core analytics platform?

  • a) 4-Tier Analytics
  • b) 2-Tier Analytics
  • c) 1-Tier Analytics
  • d) 3-Tier Analytics
View Answer
d) 3-Tier Analytics

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top