Which communication technology is often used in smart home IoT devices?ZigbeeFTPDNSSMTPA) ZigbeeZigbee is a low-power, wireless communication standard for IoT.
Which layer of IoT architecture involves data analysis and decision-making?Perception layerNetwork layerApplication layerProcessing layerD) Processing layerThe processing layer handles storage, analysis, and decision-making.
A smart thermostat is an example of IoT in:HealthcareSmart homeIndustrial IoTSmart citiesB) Smart homeThermostats are common IoT devices for homes.
Which challenge is most critical for IoT devices?AestheticsSecurityLarge displaysPortabilityB) SecurityIoT devices often face attacks due to limited security measures.
Which IoT protocol works on a publish/subscribe model?CoAPMQTTHTTPDNSB) MQTTMQTT allows lightweight publish/subscribe communication.
Which protocol is most common in IoT devices?MQTTCoAPSMTPTelnetA) MQTTMQTT is lightweight and optimized for low-power IoT devices.
Smart homes use IoT mainly for:GamingAutomationBrowsingDatabasesB) AutomationIoT enables device automation like lights, AC, and security systems.
In IoT, CoAP is based on:UDPTCPHTTPFTPA) UDPCoAP is a lightweight protocol using UDP for constrained devices.
Which IoT device identifies objects using radio signals?SensorRFIDActuatorGatewayB) RFIDRFID tags transmit data using radio frequency.
IoT edge devices perform:Centralized computingLocal processingOnly storageNoneB) Local processingEdge devices reduce latency by processing data locally.
The "thing" in IoT refers to:Physical objects with sensors/actuatorsOnly computersMobile phones onlyInternet routersA) Physical objects with sensors/actuatorsIoT connects real-world objects to the internet.
Edge computing in IoT means:Processing data near devicesAlways storing in the cloudUsing only centralized serversIgnoring latencyA) Processing data near devicesEdge computing reduces latency by analyzing data close to source.
Smart homes are an example of:Industrial IoTConsumer IoTHealthcare IoTMilitary IoTB) Consumer IoTDevices like smart lights and thermostats fall under consumer IoT.
Which is a security risk in IoT?Default weak passwordsRedundant data storageEdge analyticsEnergy efficiencyA) Default weak passwordsMany IoT devices ship with insecure default credentials.
Which layer in IoT architecture deals with data transmission?Application layerNetwork layerPerception layerBusiness layerB) Network layerNetwork layer manages communication between devices.
RFID in IoT is primarily used for:Location tracking and identificationData encryptionImage processingAI computationA) Location tracking and identificationRFID tags identify and track objects wirelessly.
Which protocol is most energy-efficient for IoT devices?CoAPHTTP) FTPSMTPA) CoAPCoAP is lightweight and optimized for constrained IoT devices.
Smart farming using IoT monitors:Soil moisture, temperature, irrigationOnly fertilizersNetwork routingCloud billsA) Soil moisture, temperature, irrigationIoT sensors optimize farming processes.
IoT devices are vulnerable mainly because:Limited computational resources for securityToo much encryptionRedundant firewallsExcess bandwidthA) Limited computational resources for securitySmall devices often lack robust security mechanisms.
IoT devices commonly use which low-power communication protocol?FTPMQTTHTTPPOP3B) MQTTLightweight protocol designed for IoT messaging.
Which layer of IoT architecture involves physical sensors?Application layerPerception layerNetwork layerMiddlewareB) Perception layerThis layer captures real-world data.
A major IoT security challenge is:Lack of programming languagesWeak authentication in devicesAbsence of cloudToo many protocolsB) Weak authentication in devicesLow-power devices often lack robust security.
Which standard is used for short-range IoT communication?ZigbeeSMTPDNSTelnetA) ZigbeeZigbee is optimized for low-power, short-range IoT.
The “thing” in IoT refers to:Only sensorsAny device connected to the internetComputers onlyHumansB) Any device connected to the internetIoT connects devices for data exchange.
Which layer ensures secure communication in IoT?Physical layerApplication layerSecurity layerNetwork layerD) Network layerNetwork layer handles encryption and authentication.
IoT analytics focuses on:: Device salesPredictive insights from sensor dataReducing connectivityLimiting automationB) Predictive insights from sensor dataIoT analytics finds useful patterns in collected data.
The “thing” in IoT refers to:Any connected deviceMobile appDatabaseOnly sensorsA) Any connected deviceAnything that collects/transmits data.
MQTT protocol is used for:High-speed gamingLightweight IoT messagingFile downloadsVideo streamingB) Lightweight IoT messagingDesigned for low bandwidth environments.
An IoT gateway’s purpose is:To store backupsBridge devices to cloudAdd encryption only Manage mobile appsB) Bridge devices to cloudIt aggregates and forwards sensor data.
IoT security challenges include:Limited device resources Strong encryption onlyNo IP addressingFast networksA) Limited device resourcesSmall devices can’t handle complex encryption.
Edge computing in IoT reduces:Device countCloud dependency and latency Data accuracyDevice costsB) Cloud dependency and latencyProcessing near the source improves real-time response.
A sensor that detects human presence via body heat is:GPSPIR RFIDGyroscopeB) PIRPassive Infrared Sensors detect motion through heat changes.
The main goal of IoT gateways is:Device authenticationBridging devices and the cloudPower managementFile storageB) Bridging devices and the cloudGateways handle local aggregation and secure data transmission.
IPv6 benefits IoT by:Faster Wi-FiLarger address spaceEnhanced encryptionLower latencyB) Larger address spaceSupports billions of IoT devices globally.
What does an IoT gateway do?Stores filesConnects local devices to the cloud Encrypts emailsProvides UIB) Connects local devices to the cloudGateways manage data traffic between IoT devices and cloud platforms.
Which layer in IoT architecture includes sensors?ApplicationNetworkPerceptionData LayerC) PerceptionThe perception layer detects environmental changes using sensors.
Which technology enables location tracking in IoT?RFID HDMI DNSPOP3A) RFIDRadio-frequency identification tracks and identifies objects wirelessly.
Which cloud service is widely used for IoT data management?AWS IoT CoreGoogle Cloud StorageGitHubDropboxA) AWS IoT CoreAWS IoT Core enables secure connection and management of IoT devices.
Which of the following best defines IoT?Network of connected devicesArtificial IntelligenceCloud serviceBlockchain applicationA) Network of connected devicesIoT connects devices to collect and exchange data.
IoT sensors primarily convert physical signals into:Heat Digital data ImagesTextB) Digital dataSensors detect and digitize environmental changes.
The main concern in IoT is:Graphics SecurityColor correctionBandwidthB) SecurityIoT systems are prone to data breaches and unauthorized access.
Edge computing in IoT means:Cloud processingProcessing data near source Data encryptionCentralized storageB) Processing data near sourceEdge computing reduces latency by local data handling.
A smart thermostat is an example of:Cloud computingIoT deviceEmbedded compiler MainframeB) IoT deviceIt collects and transmits temperature data for remote control.
Which cloud platform is widely used for IoT solutions?AWS IoT CorePhotoshopJupyterOracle SQL DeveloperA) AWS IoT CoreAWS IoT Core manages connected devices and data flow.
IoT primarily connects:Computers onlyPeopleDevices and sensors ApplicationsC) Devices and sensorsIoT networks physical objects to collect and share data.
In IoT, edge devices are used for:Central data storageLocal processing near data sourcesCloud backupEncryption onlyB) Local processing near data sourcesEdge computing reduces latency by analyzing data locally.
RFID technology is mainly used for:Device heatingObject identification Energy storageNetwork encryptionB) Object identificationRFID tags help identify and track physical objects wirelessly.
A common IoT security challenge is:High processing powerWeak authenticationLow scalabilityOverheatingB) Weak authenticationMany IoT devices lack strong password or encryption standards.
In IoT, what does “interoperability” mean?Devices sharing powerDevices working seamlessly togetherDevices sharing storage Devices using the same protocolB) Devices working seamlessly togetherInteroperability allows different IoT devices and systems to communicate effectively.
What type of network is most commonly used for smart home IoT devices?EthernetZigbeeSatelliteVPNB) ZigbeeZigbee is a low-power, short-range communication protocol ideal for smart home environments.
Edge computing in IoT helps by:Sending all data to the cloudProcessing data locallySlowing down computationEncrypting networksB) Processing data locallyEdge computing reduces latency by handling computations near the data source.
What type of sensor measures environmental humidity?GyroscopeHygrometerAccelerometerMagnetometerB) HygrometerHygrometers are used in IoT devices for monitoring moisture levels in the environment.
The MQTT protocol in IoT is used for:Streaming videoMessaging between devicesFile transfersData encryptionB) Messaging between devicesMQTT is a lightweight publish/subscribe protocol ideal for IoT communications.
A “smart thermostat” is an example of:Industrial IoTConsumer IoTGovernment IoTAgricultural IoTB) Consumer IoTConsumer IoT includes household devices like smart thermostats, bulbs, and locks.
What is the function of an actuator in IoT?Collects dataTransmits packetsPerforms physical actionsStores dataC) Performs physical actionsActuators convert digital commands into real-world actions (e.g., turning a valve or motor).
Which layer handles sensor data collection in IoT architecture?Application layerPerception layerNetwork layerData layerB) Perception layerIt consists of sensors and devices that collect environmental data.
Which of these is an IoT platform?AndroidThingSpeakPhotoshopReactB) ThingSpeakIt allows IoT devices to collect, analyze, and visualize sensor data.
What is the primary security challenge in IoT?Big dataDevice heterogeneityData privacyLarge screensC) Data privacyMany devices collect sensitive information that must be protected.
Which communication technology is common in smart homes?ZigbeeWiresharkJenkinsHTMLA) ZigbeeZigbee provides low-power wireless communication for IoT devices.
In IoT, “thing” refers to:Any connected device Only sensorsOnly routersOnly softwareA) Any connected deviceIt includes sensors, actuators, and everyday objects linked to networks.
Which layer handles data transmission in IoT architecture?ApplicationPerception NetworkMiddlewareC) NetworkThe network layer transmits sensed data to cloud or storage systems.
Edge computing in IoT improves:LatencyCost Network expansionEnergy lossA) LatencyEdge processing performs computations near the data source to reduce delay.
RFID technology is used for:AuthenticationTracking and identificationCommunicationImage processingB) Tracking and identificationRadio Frequency Identification tags identify and track objects wirelessly.
IoT devices mostly communicate using:SMTPPOP3 ICMPNoneD)NoneMQTT is a lightweight protocol for IoT message transmission.
An example of an IoT application in healthcare is:Cloud backupWearable heart monitorSQL databaseVR headsetB) Wearable heart monitorWearables collect and transmit patient health data via IoT networks.
Which of the following is a challenge for IoT?Low connectivitySecurity and privacyHigh power efficiencyCentralized controlB) Security and privacyIoT networks are vulnerable due to massive connectivity and data exchange.