250+ TOP MCQs on XMPP Protocol and Answers

IOT Multiple Choice Questions on “XMPP Protocol”.

1. XMPP Full form is ________
a) Extensible Messaging and Presence Protocol
b) Extensible Module and presence protocol
c) Extensible Messaging and Presence Protocol
d) Extensible Messaging and Presence Protocol

Answer: a
Clarification: XMPP is used in IOT which covers XMPP core, XMPP addressing, XMPP server and XMPP client communication. XMPP is the short form of Extensible Messaging and Presence Protocol.

2. XMPP is used for streaming which type of elements?
a) XPL
b) XML
c) XHL
d) MPL

Answer: b
Clarification: XMPP is an open protocol for streaming XML elements in order to exchange messages and presence information in close to real time.

3. XMPP creates _________ identity.
a) device
b) email
c) message
d) data

Answer: a
Clarification: XMPP creates a device identity also called a Jabber ID. In MQTT, identities are created and managed separately in broker implementations.

4. XMPP supports __________
a) Structured data
b) Foundation
c) Federation
d) Jabber ID

Answer: c
Clarification: XMPP supports federation, meaning devices from different manufactures connected to different platforms can talk to each other with a standard communication protocol.

5. Which protocol has a quality of service?
a) XMPP
b) HTTP
c) CoAP
d) MQTT

Answer: a
Clarification: MQTT has different levels of quality of services. This flexibility is not available in XMPP.

6. The original transport protocol for XMPP.
a) FCP
b) TCP
c) MCP
d) HCP

Answer: b
Clarification: The original and native transport protocol for XMPP is Transmission Control Protocol (TCP), using open ended XML stream over long-lived TCP connections.

7. Which XMPP core describes client server messaging?
a) RFC 6122
b) RFC 4854
c) RFC 6120
d) RFC 3923

Answer: c
Clarification: RFC 6120, Extensible Messaging and Presence Protocol (XMPP): core, which describes client-server messaging using two open-ended XML streams.

8. XMPP uses ________ architecture.
a) Decentralized client-server
b) Centralized client-server
c) Message
d) Public/subscriber

Answer: a
Clarification: The XMPP uses a decentralized client-server architecture where clients do not talk directly to one another, but there is no central server.

9. XMPP implementation uses ________
a) CoAP
b) Gaming
c) Email
d) Polling

Answer: d
Clarification: Most XMPP implementations use polling, or checking for updates only on demand. A protocol called BOSH lets server push messages.

10. XMPP feature such as federation across domains used to implement the Internet of Things.
a) True
b) False

Answer: a
Clarification: XMPP features such as federation across domains, public/subscriber, authentication and its security even for mobile endpoints are being used to implement the Internet of Things.

11. The architecture of the XMPP network is similar to __________
a) Chat box
b) Web browser
c) Gaming
d) Email

Answer: d
Clarification: The architecture of the XMPP network is similar to email; anyone can run their own XMPP server and there is no central master server.

12. Does XMPP have text based communication.
a) True
b) False

Answer: b
Clarification: Since XML is text based, normal XMPP has a higher network overhead compared to purely binary solution. This issue is being addressed by the experimental XEP -0322.

13. In XMPP In band binary data format is __________
a) High
b) Very high
c) Limited
d) Ultra high

Answer: c
Clarification: Binary data must be first base64 encoded before it can be transmitted in band. Therefore, any significant amount of binary data is best transmitted out of band, using in band message to coordinate.

14. IRC stands for __________
a) Internet Reduce Chat
b) Interconnection Relay Chat
c) Internet Relay Chat
d) Interconnect Reduce Chat

Answer: c
Clarification: The XMPP extension for multi user chat can be seen a competitor to Internet Relay Chat, although IRC is far simpler, has far fewer features, and is far widely used.

15. SIP stands for ___________
a) Session Initiation Protocol
b) Session Internet Protocol
c) Simple Initiation Protocol
d) Session Internet Protocol

Answer: a
Clarification: XMPP has often regarded as a competitor to simple, based on Session Initiation Protocol, as the standard protocol for instant messaging and presence notification.

250+ TOP MCQs on FOG Computing and Answers

IOT Multiple Choice Questions on “FOG Computing”.

1. Fog computing is also known as fogging.
a) False
b) True

Answer: b
Clarification: Fog computing or fog networking is also known as fogging, is an architecture that uses one or more collaborative end-user clients or near-user devices to carry out a substantial amount of storage, communication, control.

2. Fog computing can be perceived in ___________ and ____________
a) Big data and Cloud systems
b) Big data and IoT
c) Cloud systems and IoT
d) Big data, Cloud systems and IoT

Answer: a
Clarification: Fog computing can be perceived both in large cloud systems and big data structures, making reference to the growing difficulties in accessing information objectively.

3. Fog computing has ____________ and ____________ plane.
a) Control and data
b) Control and Barcode
c) Barcode and Data
d) Data and cloud

Answer: a
Clarification: Fog networking consists of a control plane and Data plane. For example, on the data plane, fog computing enables computing services to reside at the edge of the network as opposed to servers in a data center.

4. Which of the following computing emphasizes proximity to end user?
a) Mist computing
b) Cloud computing
c) Edge computing
d) Fog computing

Answer: d
Clarification: Compared to cloud computing, fog computing emphasizes proximity to end user and client objectives, dense geographical distribution and local resource pooling.

5. QoS stands for ____________
a) Quality of storage
b) Quality of service
c) Quality of security
d) Quality of swarms

Answer: c
Clarification: Quality of service is the description or measurement of the overall performance of a service, such as telephony or computer network or a cloud computing service, particularly the performance seen by the users of the network.

6. Does fog support IoT concepts.
a) True
b) False

Answer: a
Clarification: Fog networking supports the Internet of Things concept, in which most of the devices used by humans on a daily basis will be connected to each other.

7. ____________ is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network to protect strategic military assets.
a) SPANAR
b) SPAWAR
c) APWANR
d) SPANAR

Answer: b
Clarification: SPAWAR, is prototyping and testing a scalable. Secure Distribution Tolerant Mesh Network to protect strategic military assets, both stationary and mobile.

8. AIDC stands for ____________
a) Automated Identification Data Carriers
b) Automobile Identification Data Carriers
c) Automated Identification Data Computing
d) Automated Identification Device Carriers

Answer: a
Clarification: ISO/IEC 20248 provides whereby the data of objects identified by edge computing using Automated Identification Data Carriers a Barcode and/or RFID tag, can be read, interpreted, verified and made available into the fog and on the edge even the AIDC tag has moved on.

9. ____________ practice of using a network of remote servers hosted on the Internet of store.
a) Mist Computing
b) Fog computing
c) Cloud computing
d) Mobile cloud computing

Answer: c
Clarification: Cloud computing is the practice of using a network of remote servers hosted on the Internet of store, manage, and process data, rather than a local server or a personal computer.

10. Which computing can be heavy weight and dense form of computing power?
a) Mobile Cloud computing
b) Fog computing
c) Mist computing
d) Cloud computing

Answer: d
Clarification: Cloud computing is the practice of using a network of remote servers hosted on the Internet of store, manage, and process data, rather than a local server or a personal computer. Cloud computing can be heavyweight and dense form of computing power.

11. ____________ Computing is the extension of cloud computing.
a) Mobile cloud computing
b) Mist computing
c) Fog computing
d) Cloud computing

Answer: c
Clarification: Fog computing refers to extending cloud computing to the edge of an enterprise’s network. Fog computing facilitates the operation of computer, storage, and networking services between end devices and computing data centers.

12. ____________ computing is medium weighted.
a) Mobile cloud computing
b) Cloud computing
c) Mist computing
d) Fog computing

Answer: d
Clarification: Fog computing is a medium weight and intermediate level of computing power.

13. ____________ are rudimentary form of computing.
a) Mist computing
b) Fog computing
c) Mobile cloud computing
d) Cloud computing

Answer: a
Clarification: Mist computing is a rudimentary form of computing power that resides directly within the network fabric at the extreme edge of the network fabric.

14. _____________ is a lightweight computing.
a) Cloud computing
b) Mobile cloud computing
c) Mist computing
d) Fog computing

Answer: c
Clarification: Mist computing is a lightweight and rudimentary form of computing power that resides directly within the network fabric at the extreme edge of the network fabric.

250+ TOP MCQs on Handling Sensor Request and Answers

IOT Multiple Choice Questions on “Handling Sensor Request”.

1. HelloWeb is an example of ____________ server.
a) HTTP
b) MQTP
c) SMTP
d) CoAP

Answer: a
Clarification: HelloWeb is an example of an HTTP server, but it does not use any sensors or actuators.

2. ________ will show how to handle GET request to a sensor resources.
a) Monitor
b) VoltageMonitor
c) Voltage
d) Voltage-Monitor

Answer: c
Clarification: VoltageMonitor, shows how to handle GET request to a sensor resource, more specially one that represent some voltage.

3. Can we use any web browser as client.
a) True
b) False

Answer: a
Clarification: You can use any web browser as a client to inspect the current voltage. After all, a web browser is basically an engine for initiating GET request.

4. An HTTP server manages ____________
a) Websites
b) Devices
c) Resources
d) Sensors

Answer: c
Clarification: An HTTP server manages resources. In this example, a resource is provided that has the meaning, “actual voltage value, as measured by a sensor attached to the board”.

5. A resource that contains an actual value is called as ________
a) Potential variable
b) Measured variable
c) Resource variable
d) Physical variable

Answer: b
Clarification: A resource that contains an actual value is called a measured variable. A measured variable changes its value over time, depending on a physical process.

6. When the user turns the potentiometer’s knob, the value is changed.
a) True
b) False

Answer: a
Clarification: When the user physically turns the potentiometer’s knob, the measured variable changes its value accordingly. This means that subsequent GET request to the same resource may yield different responses.

7. A resource with measured variable will reflect ________
a) Potential phenomenon
b) Resource phenomenon
c) Measured phenomenon
d) Physical phenomenon

Answer: d
Clarification: A resource with measured variable will reflect a physical phenomenon as it currently is. The resource is updated with new sensor values from time to time.

8. What should an URL contain?
a) ASCII values
b) Digits
c) Characters
d) ASCII values, digits, and characters

Answer: d
Clarification: You can use any URL as long you use ASCII letters, digits, and Characters. For example, the URL /root/sensor/analog/I would look like:
http://192.168.5.100/root/sensor/analog/1.

9. For reading the current voltage ________ library class is used.
a) Digital sensor
b) Analog sensor
c) Actuator
d) Potential sensor

Answer: a
Clarification: For reading the current voltage, library class Analog Sensor that wraps an analog input port in an object that provides the method HandleGet.

10. Variable voltage Sensor is an instance of Analog Sensor.
a) True
b) False

Answer: a
Clarification: For reading the current voltage, library class Analog Sensor that wraps an analog input port in an object that provides the method HandleGet.
Variable voltage Sensor is an instance of Analog Sensor, initialized with pinA1.

11. Which property makes it possible for the analog sensor object to convert the integer input?
a) MinValue
b) MaxValue
c) Either MinValue or MaxValue
d) Both MinValue and MaxValue

Answer: d
Clarification: Properties MinValue and MaxValue make it possible for the analog sensor object to convert the integer input of the analog input port to a value in the given range.

12. What is the range of analog input port?
a) 0 to 3
b) 0 to 3.3
c) 0 to 4
d) 0 to 4.5

Answer: b
Clarification: Properties MinValue and MaxValue make it possible for the analog sensor object to convert the integer input of the analog input port to a value in the given range, in this case it is between 0.0 to 3.3.

13. ________ is used to provide an object of type MeasuredVariable.
a) HandleRequest
b) RequetHandle
c) Handle_Request
d) Handle-Request

Answer: a
Clarification: In the WebServer initialization, We use the request handler HandleRequest provided by an object of type MeasuredVariable. A MeasuredVariable object has a property FromSensor.

14. When a client makes a GET request for /voltage/actual, the request is passed to ________
a) MeasuredVariable
b) HandleRequest
c) Measured Variable’s HandleRequest
d) HandleRequest’s MeasuredVariable

Answer: c
Clarification: When a client makes a GET request for /voltage/actual, the request is passed to Measured Variable’s HandleRequest method. When this happens, the MeasuredVariable object first calls FromSensor.

15. Delegate properties must be compatible with the delegate types they represent.
a) True
b) False

Answer: a
Clarification: FromSensor is a property to which you can assign a method I.e., a C#delegate property. Delegate properties must be compatible with the delegate types they represent.

250+ TOP MCQs on SOA Based Architecture and Answers

IOT Multiple Choice Questions on “SOA Based Architecture”.

1. What happens when service providers change their operating system and communication protocols?
a) Inoperability and complexity arises
b) Only complexity arises
c) Only Inoperability arises
d) Nothing arises

Answer: a
Clarification: Complexity arises when service providers change their operating system and communication protocols, which results in inoperability. Service providers use standard protocols and conventional interfaces to facilitate information among diverse services.

2. In SOA, Service is termed as __________
a) Software service
b) Network service
c) Business service
d) Developer service

Answer: c
Clarification: Services are termed as business services. They are self-contained and logical.

3. Are SOA components loosely coupled.
a) True
b) False

Answer: a
Clarification: They are loosely coupled. That means every service is self-contained and exists alone logically.

4. The SOA architecture is divided into how many layers?
a) 5 layers
b) 2 layers
c) 7 layers
d) no layers ie., only one layer

Answer: b
Clarification: The first which has direct relevance to the business as it carries out business functions. The second layer is the technical layer which talks about managing computer resources like a database, web server etc.

5. Which layer in SOA delivers messages between applications?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

Answer: a
Clarification: ESB is a group of components/ software which helps us to send and receive messages between the disparate applications. It is usually shown as a huge plump pipe in the architecture.

6. Which block is the central reference of meta-data for services?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

Answer: c
Clarification: SOA registry is like a reference database of services. It describes what each service does, where they are located, and how they can communicate.

7. Which block ties work flow and SOA registry?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) Accounting package
d) SOA supervisor

Answer: b
Clarification: Service broker reads the work flow and takes services from the SOA registry and ties them together. Service brokers are normally middleware like EAI(Enterprise Application Integration) products.

8. Which blocks deals with performance issues?
a) ESB(Enterprise Service Bus)
b) Service Broker
c) SOA registry
d) SOA supervisor

Answer: d
Clarification: SOA supervisor is a traffic cop ensuring do not having issues. It deals with performance issues of the system so that appropriate service levels are met. If any of the services have performance problems it sends messages to the proper infrastructure to fix the issue.

9. What are the three terminologies on which SOA service stands__________
a) Contract, Address and Building
b) Contract, Address and Service
c) Service, Contract and Building
d) Service, Building and Address

Answer: a
Clarification: Contract-It describes parameters and return values for a method.
Address-It is a URL which points to the location of the service.
Building-It determines how the communication is done.

10. Which standard is preferable to achieve SOA?
a) Software service
b) Business service
c) Network service
d) Web service

Answer: d
Clarification: In SOA we need services to be loosely coupled. A web service communicates using the SOAP protocol which is XML based, Which is very loosely coupled.

11. SOA stands for _____________
a) Solution Oriented Architecture
b) Sector Oriented Architecture
c) Service Oriented Architecture
d) Source Oriented Architecture

Answer: c
Clarification: Service Oriented Architecture (SOA) approach traditionally used to couple functionality of heavyweight corporate IT systems, are becoming application to embedded real world devices.

12. ________ is used to describe a perceived, quickly growing set of web based applications.
a) Web 4.0
b) Web 3.5
c) Web 2.0
d) Web 4.5

Answer: c
Clarification: Web 2.0 to describe a perceived, quickly growing set of web based applications. A topic that has experienced extensive coverage involves the relationship between Web 2.0 and service oriented architectures.

13. ________ is the philosophy of encapsulating application logic in services.
a) API
b) SOA
c) Both SOA and API
d) Neither SOA and API

Answer: b
Clarification: SOA is the philosophy of encapsulating application logic in services with a uniformly defined interface and making these publicly available via discovery mechanisms.

14. ________ are a modern interpretation of service oriented architectures used to build distributed software systems.
a) SOA
b) API
c) Microservices
d) Web 2.0

Answer: c
Clarification: Microservices is a modern interpretation of service oriented architectures used to build distributed software systems. Services in the microservice architecture are processes.

15. Services in a microservice architecture are _________ that communicates with each other over the network.
a) Microservices
b) SOA
c) API
d) Processes

Answer: d
Clarification: Services in the microservice architecture are processes that communicate with each other over the network in order to fulfill a goal. These services use technology agnostic protocols.

250+ TOP MCQs on IoT Devices and Answers

IOT Multiple Choice Questions on “IoT Devices”.

1. What is the use of Thermostat in Nest Thermostat E?
a) Save energy
b) Show the use of energy
c) Supports in some devices only
d) Won’t work at some conditions

Answer: a
Clarification: The thermostat controls half of our energy bills. Independent studies shows that Nest saved people an average of 10% to 20% on heating and 15% on cooling.

2. What is the main function of Nest Thermostat E?
a) Change the temperature only when we are at home
b) Reduce the energy used
c) Change the temperature from anywhere
d) Powers off when a person is not present

Answer: c
Clarification: Its energy saving feature can help in save from day one. And with the nest app we can change the temperature from anywhere-the beach, the office or the bed.

3. It displays when you are close.
a) True
b) False

Answer: a
Clarification: The frosted display blends into the background. It shows only when your close, and fades into the background when you walk away.

4. Does HomePod allow voice controlling?
a) True
b) False

Answer: a
Clarification: HomePod is a smart speaker that focuses on playing music and allows users to control the device via voice using Siri.

5. Function of huge light bulb?
a) To reduce energy and to control lightning
b) To create lighting scenes based on your favourite photos
c) To reduce energy and to create lighting scenes based on your favourite photos and to control lightning
d) To controlling lightning and to create lighting scenes based on your favourite photos

Answer: c
Clarification: A single bridge will let you control up to 50 bulbs and you will be able to create lighting scenes based on your favourite photos. Obviously, the lightning is controlling from your smart phone or tablet. They are said to help use of 80% less energy than our traditional bulbs.

6. What is the drawback of using Lockitron?
a) Wastage of more energy
b) Supports in some devices only
c) Won’t work at some conditions
d) Tough installation

Answer: b
Clarification: Lockitron is a device which ensures key less entry inside our home using our home. We can also monitor to see if the door is locked. And if not it will send a notification when it is unlocked. The drawback is that it will work only with iphone 4s or iphone 5.

7. Sonos is a system that uses ________ wireless speakers.
a) Wifi
b) Hifi
c) Zigbee
d) Bluetooth

Answer: b
Clarification: Sonos is a system of Hifi wireless speakers and audio components that combines all your music collections, radio or podcasts in a single app.

8. What is the facility Sonos provides?
a) It provides high quality 3D audio
b) Can here only to a restricted area
c) Call connectivity
d) Choose to play what you want in different rooms

Answer: d
Clarification: We can choose to play what you want in different rooms by using a dedicated wireless network. Sonos has got a wide collection of products for music fans, from speakers to sound bars, so head.

9. Smart Fitness clothing mainly has which device?
a) Battery
b) Bluetooth
c) Sensors
d) Internet

Answer: c
Clarification: Each garment has a built in sensor which measures muscle activity using electromyography. This information is relayed to the “IRON MAN” hub, which we can attach to our leg or chest.

10. What are Revolv means?
a) In built programming of all devices
b) Movement of device
c) A simple robot
d) Bringing all devices under a single command

Answer: d
Clarification: Revolv is a platform that brings more devices together under a single command centre. We can control the lightning in our room our Apple TV, heating and much more.

250+ TOP MCQs on Network Layer and Answers

IOT Multiple Choice Questions on “Network Layer”.

1. Which level is the network layer in the OSI model?
a) Third level
b) Fourth level
c) Second level
d) Fifth layer

Answer: a
Clarification: The network layer is the third level of the open system interconnection model and the layer that provides data routing paths for network communication.

2. Data in network layer is transferred in the form of ____________
a) Layers
b) Packets
c) Bytes
d) Bits

Answer: b
Clarification: Data is transferred in the form of packets via logical network paths in an ordered format controlled by the network layer.

3. The network layer is considered as the _______ of the network layer.
a) backbone
b) packets
c) bytes
d) bits

Answer: a
Clarification: The network layer is considered as the backbone of the network layer. It selects and manages the best logical path for data transfer between nodes.

4. The network layer contains which hardware device?
a) Routers, Bridges
b) Bridges only
c) Bridges and switches
d) Routers, Bridges and Switches

Answer: d
Clarification: This layer contains hardware devices such as routers, bridges, firewalls, and switches, but it actually creates a logical image of the most efficient communication rout and implements it with a physical medium.

5. Network layer protocol exits in _________
a) Host
b) Switches
c) Packets
d) Bridges

Answer: a
Clarification: Network layer protocols exits in every host or router. The router examines the header fields of all the IP packets that pass through it.

6. What are the common protocols associated with the network layer?
a) Address Resolution Protocol
b) Reverse Address Resolution Protocol
c) Internet protocol
d) Neighbour Discovery Protocol

Answer: c
Clarification: Internet protocol and Netware IPX/SPX are the most common protocols associated with the network layer.

7. The network layer responds to request from which layer?
a) Transport layer
b) Data layer
c) Application layer
d) Session layer

Answer: a
Clarification: In OSI model, we are having 7 layers in which the network layer responds to request from the layer above it called Transport Layer.

8. The network layer issues request to which layer?
a) Transport layer
b) Data layer
c) Application layer
d) Session layer

Answer: b
Clarification: In OSI model, we are having 7 layers in which the network layer issues request to the layer below it called Data Link Layer.

9. IP is connectionless.
a) True
b) False

Answer: a
Clarification: IP is connectionless, is that a data packet can travel from a sender to a receiver without the recipient having to send an acknowledgment connection-oriented protocols exits at other, higher layers of the OSI model.

10. Does network layer in TCP/IP and OSI Model are same.
a) True
b) False

Answer: b
Clarification: The TCP/IP Internet layer is in fact only a subset of functionality of the network layer. It describes only one type of network architecture, the Internet.

11. What are called routers?
a) The devices that operates at session layer
b) The devices that operates at data layer
c) The devices that operates at application layer
d) The devices that operates at network

Answer: d
Clarification: The network interconnection devices that operate at the network layer are usually called routes, which at this point should hopefully come as no surprise to you.

12. ICMP stands for __________
a) Internet Coordinate Message Protocol
b) Internet Control Message Protocol
c) Interconnect Control Message Protocol
d) Interconnect Coordinate Message Protocol

Answer: b
Clarification: The Internet Protocol is the key network layer protocol that implements the TCP/IP Protocol suites. Since IP is the protocol that provides the mechanism for delivering datagrams, between devices, it is designed to be relatively basic, and to function with few “bell and whistles”.

13. Packets will be transferred in how many types?
a) 5 types
b) 4 types
c) 2 types
d) 3 types

Answer: d
Clarification: Routing deals with determining how packet will routed (transferred) from source to destination. It can of three types : 1. Static
2. Dynamic
3. Semi Dynamic.

14. DDP stands for _________
a) Datagram Delivery Protocol
b) Device Delivery Protocol
c) Datagram Device Protocol
d) Device Datagram Protocol

Answer: a
Clarification: Datagram Delivery Protocol is a member of the AppleTalk networking protocol suite. Its main responsibility is for socket to socket delivery of datagram over an AppleTalk network.

15. RIP stands for ________
a) Reduced Information Protocol
b) Routing Internet Protocol
c) Routing Information Protocol
d) Reduced Internet Protocol

Answer: c
Clarification: The Routing Information Protocol is one of the oldest distance vector routing protocols which employ the hop count as a routing metric.