0% found this document useful (0 votes)
8 views7 pages

Document

The document presents a quiz on Internet of Things (IoT) concepts, covering key characteristics, components, and applications of IoT devices. It includes questions on sensors, actuators, communication protocols, cloud services, and security concerns related to IoT. The correct answers highlight the importance of data sharing, device connectivity, and security measures in IoT systems.

Uploaded by

Bhush Rust
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views7 pages

Document

The document presents a quiz on Internet of Things (IoT) concepts, covering key characteristics, components, and applications of IoT devices. It includes questions on sensors, actuators, communication protocols, cloud services, and security concerns related to IoT. The correct answers highlight the importance of data sharing, device connectivity, and security measures in IoT systems.

Uploaded by

Bhush Rust
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

1.

Which of the following is a key characteristic of IoT


devices?
A. They operate without requiring a network connection.
B. They collect and share data over the internet.
C. They are only used for industrial purposes.
D. They do not interact with other devices.

Correct Answer:
B. They collect and share data over the internet

2. Which of the following is NOT a component of IoT?


A. Sensors
B. Actuators
C. Operating Systems
D. Cloud Services
Answer: C

3. What is the role of a sensor in an IoT system?


A. Act on data received from the internet
B. Collect data from the environment
C. Store data for long-term analysis
D. Process data into actionable insights
Answer: B
4. Which communication protocol is commonly used in IoT
devices?
A. HTTP
B. MQTT
C. FTP
D. SNMP
Answer: B

5. What is the purpose of an IoT gateway?


A. To provide power to IoT devices
B. To connect IoT devices to the internet
C. To store large amounts of data
D. To program IoT devices
Answer: B

6. Which technology is commonly used for IoT wireless


communication?
A. Wi-Fi
B. Bluetooth
C. Zigbee
D. All of the above
Answer: D
7. Which of the following is a cloud service used for IoT?
A. Google Drive
B. Microsoft Azure IoT Hub
C. Dropbox
D. Amazon Prime
Answer: B

8. What is an actuator in an IoT system?


A. A device that senses environmental data
B. A device that performs actions based on received
commands
C. A device that processes data
D. A communication module
Answer: B

9. What is a common use of IoT in smart homes?


A. Real-time weather forecasting
B. Remote control of lights and appliances
C. Online shopping automation
D. Self-repairing electrical wiring
Answer: B

10. Which of the following devices is an example of IoT?


A. A smartphone
B. A smart thermostat
C. A laptop
D. A desktop computer
Answer: B

11. Which of the following is a popular IoT application in


agriculture?
A. Smart irrigation systems
B. Autonomous cars
C. Health monitoring wearables
D. Online banking
Answer: A

12. Which sector commonly uses IoT for predictive


maintenance?
A. Retail
B. Manufacturing
C. Education
D. Entertainment
Answer: B

13. Which of the following is an IoT application in


healthcare?
A. Fitness trackers
B. Autonomous wheelchairs
C. Remote patient monitoring
D. All of the above
Answer: D

14. What is the role of IoT in smart cities?


A. Managing traffic and parking
B. Optimizing energy usage
C. Enhancing public safety
D. All of the above
Answer: D

15. In IoT, what does “M2M” stand for?


A. Machine-to-Machine
B. Mobile-to-Mobile
C. Medium-to-Medium
D. Management-to-Management
Answer: A

16. What is the main security concern in IoT?


A. Lack of sensors
B. Insufficient storage space
C. Data breaches and hacking
D. High energy consumption
Answer: C

17. Which of the following is a challenge in IoT


implementation?
A. Limited scalability
B. Data privacy concerns
C. Interoperability between devices
D. All of the above
Answer: D

18. Why is data encryption important in IoT?


A. To increase device speed
B. To protect sensitive data from unauthorized access
C. To reduce data size
D. To improve battery life
Answer: B

19. What type of IoT devices are most vulnerable to cyber-


attacks?
A. Devices with strong security protocols
B. Devices without regular firmware updates
C. Devices with user authentication
D. None of the above
Answer: B
20. What does the term “edge computing” mean in IoT?
A. Processing data on centralized servers only
B. Processing data at or near the source of data
generation
C. Storing all data in the cloud
D. Sending all data to users directly
Answer: B

21. What is the main privacy concern for users of IoT


devices?
A. Device overheating
B. Unauthorized data collection and sharing
C. High cost of maintenance
D. Frequent device disconnection
Answer: B

22. Which IoT security measure focuses on protecting


device-to-cloud communication?
A. Physical device protection
B. Data encryption during transmission
C. Authentication of cloud providers
D. Regular hardware updates
Answer: B

You might also like