Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
CSS
Javascript
Python
Practical Questions
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
Set
25
See Explanation !
1
Monitor target of the smart ___includes sensor objects in the power link.
स्मार्ट ___ के मॉनिटर लक्ष्य में पावर लिंक में सेंसर ऑब्जेक्ट शामिल हैं।
Perception Layer
Smart Network Layer
Smart Application Layer
Data Layer
Next Question
25
See Explanation !
2
The WIMAX uses _____ standard specification.
WIMAX _____ मानक विनिर्देश का उपयोग करता है।
IEEE 802.16d
IEEE 802.16g
IEEE 802.11
Both A and B
Previous Question
Next Question
25
See Explanation !
3
AVR microcontrollers are based on which type of architecture?
AVR माइक्रोकंट्रोलर किस प्रकार के आर्किटेक्चर पर आधारित होते हैं?
CISC
Harvard RISC
x86
ARM
Previous Question
Next Question
25
See Explanation !
4
Which of the following is not an element of threat modelling?
निम्नलिखित में से कौन खतरे के मॉडलिंग का एक तत्व नहीं है?
Asset
Vulnerability
Threat
Time
Previous Question
Next Question
25
See Explanation !
5
Which layer in the TCP/IP stack is equivalent to the Transport layer of the OSI model
TCP/IP स्टैक में कौन सी लेयर OSI मॉडल की ट्रांसपोर्ट लेयर के बराबर है
application
Transport
Internet
Network Access
Previous Question
Next Question
25
See Explanation !
6
Self-esteem reflects a person's subjective. evaluation of his or her own worth.
आत्म - सम्मान किसी व्यक्ति के व्यक्तिपरक को दर्शाता है। उसके स्वयं के मूल्य का मूल्यांकन।
Mental
Emotional
Physical
Social
Previous Question
Next Question
25
See Explanation !
7
Which Arduino board has the largest number of input/output pins?
किस Arduino बोर्ड में इनपुट/आउटपुट पिन की सबसे बड़ी संख्या है?
Arduino Uno
Arduino Mega
Arduino Nano
Arduino Leonardo
Previous Question
Next Question
25
See Explanation !
8
What is a private key
एक निजी कुंजी क्या है
A key on your key chain
A key given to the public
A key not to be given to the public
A key that opens a secret door
Previous Question
Next Question
25
See Explanation !
9
What is the order decided by a processor or the CPU of a controller to execute an instruction?
निर्देश निष्पादित करने के लिए एक प्रोसेसर या नियंत्रक के सीपीयू द्वारा क्या आदेश तय किया जाता है?
decode,fetch,execute
execute,fetch,decode
fetch, execute,decode
fetch,decode, execute
Previous Question
Next Question
25
See Explanation !
10
Which of the following is used to reprogram a Bootloader in IoT devices?
IoT उपकरणों में बूटलोडर को फिर से प्रोग्राम करने के लिए निम्नलिखित में से किसका उपयोग किया जाता है?
VHDL programming
IDE
ICSP
PSCD
Previous Question
Next Question
25
See Explanation !
11
The handshake that conveys confidence is:
हाथ मिलाने से आत्मविश्वास का संचार होता है:
Limp
Firm
Loose
None of these
Previous Question
Next Question
25
See Explanation !
12
Tagging Things
चीजों को टैग करना
RFID and NFC
Digital Watermarking
QR Code
All of the above
Previous Question
Next Question
25
See Explanation !
13
Identity the challenge coming under securing the information.
जानकारी हासिल करने के दौरान आने वाली चुनौती की पहचान करें।
Security
Signaling
Power Consumption
Presence Detection
Previous Question
Next Question
25
See Explanation !
14
What is the equation of Internet of things?
चीजों के इंटरनेट का समीकरण क्या है?
Physical object + Controller, sensor and actuator + internet
Controller sensor and actuator + internet
physical object + Internet
physical object+controller+internet.
Previous Question
Next Question
25
See Explanation !
15
publish() arguments method accepts arbitrary publish
पब्लिश करें() तर्क विधि मनमाने ढंग से पब्लिश स्वीकार करती है
True
False
May be
None of these
Previous Question
Next Question
25
See Explanation !
16
Which of these statements regarding sensors is TRUE?
सेंसर के संबंध में इनमें से कौन सा कथन सत्य है?
sensors are input devices
sensors can be analog as well as digital
sensors respond to some external stimuli
All of these
Previous Question
Next Question
25
See Explanation !
17
In IoT, what does the term "Fog Computing" refer to?
IoT में, "फॉग कंप्यूटिंग" शब्द का क्या अर्थ है?
Processing data on the cloud server
Processing data on the IoT device itself
Decentralized processing at the network edge
Transmitting data over a foggy environment
Previous Question
Next Question
25
See Explanation !
18
_________ are the characteristics of IOT
_________ IOT की विशेषताएं हैं
Intelligence, scalable
Security
Heterogeneity
All of the above
Previous Question
Next Question
25
See Explanation !
19
Reports are usually utilized to present the outcome of:
रिपोर्ट का उपयोग आमतौर पर इन परिणामों को प्रस्तुत करने के लिए किया जाता है:
Experiment
Inquiry
Investigation
All of these
Previous Question
Next Question
25
See Explanation !
20
Which layer of IOT architecture is known as Middleware Layer
IOT आर्किटेक्चर की किस लेयर को मिडलवेयर लेयर के रूप में जाना जाता है
Application Layer
Processing Layer
Transport Layer
Perception Layer
Previous Question
Next Question
25
See Explanation !
21
Personal computers use______
पर्सनल कम्प्यूटर्स
Microprocessor
DC Motor
Sensor
None of these
Previous Question
Next Question
25
See Explanation !
22
What risks and challenges should be considered in the internet?
इंटरनेट में किन जोखिमों और चुनौतियों पर विचार किया जाना चाहिए?
Privacy and Security
Energy consumption
Network congestion
All of the above
Previous Question
Next Question
25
See Explanation !
23
Environment in which we live also effect on culture and the geographical environment sometimes determines cultural variablility is ____ .
जिस वातावरण में हम रहते हैं वह संस्कृति और भौगोलिक वातावरण पर भी प्रभाव डालता है, कभी - कभी सांस्कृतिक परिवर्तनशीलता निर्धारित करता है ____ ।
Ecological enviroment
Social environment
Physical environment
Cultural enviroment
Previous Question
Next Question
25
See Explanation !
24
Which IoT protocol is commonly used for device discovery and interaction in constrained environments, such as low-power, low-bandwidth networks?
निम्न - शक्ति, निम्न - बैंडविड्थ नेटवर्क जैसे सीमित वातावरण में डिवाइस की खोज और बातचीत के लिए आमतौर पर किस IoT प्रोटोकॉल का उपयोग किया जाता है?
HTTP
CoAP
MQTT
UDP (User Datagram Protocol)
Previous Question
Next Question
25
See Explanation !
25
MQTT stands for :
MQTT का अर्थ है :
Message Queue Telegram Transport
Message Queue Telemetry Transport
Message Queuing Telemetry Transport
Message Queuing Telegram Transport
Previous Question