Internet of Things Prime Interview Question-Answer

Q.1 Arduino board has which of the following components?

       A. Microcontroller

       B. Crystal oscillator

       C. USB connector

       D. All the options

Ans : All the options


Q.2 An IoT Thing is _____________.

       A. A device to interact with other devices

       B. An entity with a unique identifier

       C. A device to control objects

Ans : A device to interact with other devices


Q.3 The following are IoT platforms, except _________.

       A. KAA

       B. Watson IoT

       C. Zoho connect

       D. Carriots

Ans : Zoho connect


Q.4 IoT uses HTTP protocol in the _________ layer.

       A. Network

       B. Perception

       C. Application

       D. All the options

Ans : All the options


Q.5 The word IoT was coined by ____________.

       A. Steve Jobs

       B. Bill Gates

       C. Kevin Ashton

Ans : Kevin Ashton


Q.6 A fog extends cloud to the ___________.

       A. Application to process logic

       B. Storage of processed data

       C. Things that process and act on data

       D. Hardware for executing boot loading

Ans : Things that process and act on data


Q.7 IoT is an abbreviation of _____________.

       A. Insulation of Terminals

       B. Inter-Operated Technology

       C. Intel Operating Technology

       D. Internet of Things

Ans : Inter-Operated Technology


Q.8 IIoT stands for _________.

       A. Informed Internet of Things

       B. Intimate Internet of Things

       C. Intel Internet of Things

       D. Industrial Internet of Things

Ans : Industrial Internet of Things


Q.9 An IoT architecture comprises of ___________.

       A. Devices

       B. Protocols

       C. Analytics

       D. All the options

Ans : Devices


Q.10 IoT architecture should be _____________.

       A. Homogeneous

       B. Heterogeneous

       C. Both the options

       D. None of the options

Ans : Homogeneous


Q.11 Internet of Things is a system of interconnected computing devices.

       A. True

       B. False

Ans : True


Q.12 An IoT application is designed to adapt to the given situation dynamically.

       A. True

       B. False

Ans : True


Q.13 IoT infrastructure should support __________.

       A. Anytime, Anywhere

       B. Anywhere, Anyone

       C. Anytime, Anywhere and Anyone

Ans : Anytime, Anywhere and Anyone


Q.14 The following are IoT protocols, except _________.

       A. ZigBee

       B. 6LowPAN

       C. BLE

       D. WAN

Ans : BLE


Q.15 The main challenge of the communication layer is _________.

       A. Device identification

       B. Low power consumption

       C. Both the options

       D. None of the options

Ans : Device identification


Q.16 In a IoT architecture, the ____________ layer collects data from the environment.

       A. Perception

       B. Application

       C. Processing

       D. Transpion

Ans : Perception


Q.17 Which of the following is an example of an IoT application?

       A. Wearable device to monitor blood glucose level

       B. Manufacturing Bolt using CNC machine

       C. Bank web page to monitor customer experience

Ans : Manufacturing Bolt using CNC machine


Q.18 CoAP is a _______________.

       A. lightweight fast HTTP

       B. low process range protocol

       C. long range protocol

       D. high speed protocol

Ans : long range protocol


Q.19 The following are IoT applications, except __________.

       A. A mobile app monitors the web activity of a user

       B. A mobile app to control an air conditioner

       C. A mobile app to control the transport system

       D. A wearable device monitors the blood pressure of the patient

Ans : A wearable device monitors the blood pressure of the patient


Q.20 MQTT ______________.

       A. Is a lightweight protocol

       B. Is based on TCP/IP protocol

       C. Uses publish/subscribe model

       D. All the options

Ans : All the options


Q.21 The unique identifier of an IoT device helps ___________.

       A. To connect, communicate and monitor the device

       B. To apply security controls

       C. To upload data in cloud

Ans : To apply security controls


Q.22 ____________ is a specialized web transfer protocol for use with constrained nodes and networks in IoT.

       A. MQTT

       B. TCP/IP

       C. CoAP

       D. UDP

Ans : CoAP


Q.23 The following are interfaces of Raspberry Pi, except _________.

       A. NFC

       B. HDMI port

       C. WiFi

       D. USB

Ans : NFC


Q.24 Raspberry Pi is a low-cost general-purpose computer.

       A. True

       B. False

Ans : True


Q.25 Edge computing helps to reduce the latency time of processing information.

       A. True

       B. False

Ans : True


Q.26 Arduino is a microcontroller.

       A. True

       B. False

Ans : True


Q.27 Sensors and Actuators are also known as ____________.

       A. Inductors

       B. Power sources

       C. Transducers

       D. None of the options

Ans : Transducers


Q.28 Peer to Peer Computing means ____________.

       A. Enabling a web of things

       B. Interconnected objects communicating between each other

       C. Both the options

       D. None of the options

Ans : Interconnected objects communicating between each other


Q.29 Which of the following is a benefit of Edge/Fog computing?

       A. Security risk

       B. Decreased processing time

       C. Increased throughput

       D. Faster response time

Ans : Decreased processing time


Q.30 Identify the challenges of an IoT architecture.

       A. Security and privacy

       B. Connectivity

       C. Both the options

       D. None of the options

Ans : Both the options


Q.31 Application layer is responsible for ___________.

       A. Collecting data from the environment

       B. Applying business logic for a given requirement

       C. Both the options

       D. None of the options

Ans : Both the options


Q.32 Identify the non-IoT device from the given options.

       A. Microsoft surface laptop

       B. Amazon echo

       C. Belkin WeMo smart light switch

       D. August smart lock

Ans : Microsoft surface laptop


Q.33 Arduino board can withstand a maximum voltage of _________.

       A. 5V

       B. 20V

       C. 15V

       D. 2V

Ans : 20V


Q.34 Which of the following option(s) are security method(s) used to prevent access of sensitive information from unauthorized users.

       A. Authentication

       B. Encryption

       C. Both

       D. None of the above

Ans : Encryption


Leave a Comment