QUIZ ON : INTERNET OF THINGS AND ITS APPLICATIONS - SECURITY AND FUTURE OF IOT ECOSYSTEM

SECURITY AND FUTURE OF IOT ECOSYSTEM

00:00:00

Which of these is not true about recursion?

Option A. It’s easier to code some real-world problems using recursion than non-recursive equivalent
Option B. Recursive functions are easy to debug
Option C. Recursive calls take up a lot of memory
Option D. Programs using recursion take longer time than their non-recursive equivalent
True Answer B

Explanation :
Recursive functions may be hard to debug as the logic behind recursion may be hard to follow.

Which of these is not true about recursion?

Question No# : 01 out of 20



IP address of a packet is normally analysed by

Option A. CPU
Option B. Router
Option C. Modem
Option D. Hub
True Answer B

Explanation :

IP address of a packet is normally analysed by

Question No# : 02 out of 20



Which network was connected with ARPANET to create the Internet?

Option A. NSFNET
Option B. BSFNET
Option C. LAN
Option D. WWW
True Answer A

Explanation :

Which network was connected with ARPANET to create the Internet?

Question No# : 03 out of 20



Which symbol is not used in the name of the file?   

Option A. @
Option B. #
Option C. *
Option D. !
True Answer C

Explanation :

Which symbol is not used in the name of the file?   

Question No# : 04 out of 20



A structure can contain pointer to itself.

Option A. TRUE
Option B. FALSE
Option C.
Option D.
True Answer A

Explanation :

A structure can contain pointer to itself.

Question No# : 05 out of 20

Internet can be defined as

Option A. Interconnection of Computers
Option B. Interconnection of Peripherals
Option C. Interconnection of Networks
Option D. Interconnection of Devices
True Answer C

Explanation :

Internet can be defined as

Question No# : 06 out of 20



Designing the problem

Option A. Testing
Option B. Debugging
Option C. logical error
Option D. Algorithm
True Answer D

Explanation :

Designing the problem

Question No# : 07 out of 20

Which built-in method removes the last element from an array and returns that element?

Option A. last()
Option B. get()
Option C. pop()
Option D. None of these
True Answer C

Explanation :
pop() method removes the last element from an array and returns that element.

Which built-in method removes the last element from an array and returns that element?

Question No# : 08 out of 20

The sleep function (under the time module) is used to ___________

Option A. Pause the code for the specified number of seconds
Option B. Return the specified number of seconds, in terms of milliseconds
Option C. Stop the execution of the code
Option D. Return the output of the code had it been executed earlier by the specified number of seconds
True Answer A

Explanation :
The sleep function (under the time module) is used to pause the code for the specified number of seconds. The number of seconds is taken as an argument by this function.

The sleep function (under the time module) is used to ___________

Question No# : 09 out of 20



The __________level programming interface for the Apple implementation of OpenGL.

Option A. CSS
Option B. CGL
Option C. SGML
Option D. HTML
True Answer B

Explanation :

The __________level programming interface for the Apple implementation of OpenGL.

Question No# : 10 out of 20



Print button on the Quick Access toolbar will print the entire document using the default setting

Option A. TRUE
Option B. FALSE
Option C.
Option D.
True Answer A

Explanation :

Print button on the Quick Access toolbar will print the entire document using the default setting

Question No# : 11 out of 20



Which of the following substances is not miscible with water?

Option A. Milk
Option B. Honey
Option C. Alcohol
Option D. Oil
True Answer D

Explanation :
Except oil, all the given substances is miscible with water. Miscibility is the property of substances to mix in all proportions forming a homogeneous solution.

Which of the following substances is not miscible with water?

Question No# : 12 out of 20

Which of the following is not an external threat to a computer or a computer network

Option A. Ignorance
Option B. Trojan horses
Option C. Adware
Option D. Crackers
True Answer A

Explanation :

Which of the following is not an external threat to a computer or a computer network

Question No# : 13 out of 20



Umang app launched by

Option A. RBI
Option B. UPI
Option C. NPCI
Option D. NEFT
True Answer C

Explanation :

Umang app launched by

Question No# : 14 out of 20



A student wrote two context-free grammars G1 and G2 for generating a single C-like array declaration. The dimension of the array is at least one. For example,
int a[10][3];
The grammars use D as the start symbol, and use six terminal symbols int ; id [ ] num.
Grammar G1




Grammar G2




Which of the grammars correctly generate the declaration mentioned above? a single C-like array declaration. The dimension of the array is at least one. For example,

Option A. Both G1 and G2
Option B. Only G1
Option C. Only G2
Option D. Neither G1 nor G2
True Answer A

Explanation :
Both G1 & G2 generates the string: int a[10] [3]; You may use LMD, RMD or parse tree to derive the string.

A student wrote two context-free grammars G1 and G2 for generating a single C-like array declaration. The dimension of the array is at least one. For example,
int a[10][3];
The grammars use D as the start symbol, and use six terminal symbols int ; id [ ] num.
Grammar G1




Grammar G2




Which of the grammars correctly generate the declaration mentioned above? a single C-like array declaration. The dimension of the array is at least one. For example,

Question No# : 15 out of 20



Web pages are uniquely defined using

Option A. IP addresses
Option B. URL
Option C. Domain
Option D. File name
True Answer B

Explanation :

Web pages are uniquely defined using

Question No# : 16 out of 20



In Excel, which one denoted a range from B1 through E5

Option A. B1 - E5
Option B. B1:E5
Option C. B1 to E5
Option D. B1$E5
True Answer B

Explanation :

In Excel, which one denoted a range from B1 through E5

Question No# : 17 out of 20



Which is a not category of language?

Option A. Low lavel language
Option B. Medium level language
Option C. High level language
Option D. None
True Answer B

Explanation :

Which is a not category of language?

Question No# : 18 out of 20



Assume that a merge sort algorithm in the worst case takes 30 seconds for an input of size 64. Which of the following most closely approximates the maximum input size of a problem that can be solved in 6 minutes?

Option A. 256
Option B. 512
Option C. 1024
Option D. 2048
True Answer B

Explanation :

 Time complexity of merge sort is Θ (n Log n)
c * 64Log64 is 30
c * 64 * 6 is 30
c is 5/64
For time 6 minutes
5/64* n Log n = 6*60
n Log n = 72*64 = 512 * 9
n = 512

Assume that a merge sort algorithm in the worst case takes 30 seconds for an input of size 64. Which of the following most closely approximates the maximum input size of a problem that can be solved in 6 minutes?

Question No# : 19 out of 20

Level One Connectivity is also known as _____________ access.

Option A. Network
Option B. Dial up
Option C. Internet
Option D. Gateway
True Answer D

Explanation :

Level One Connectivity is also known as _____________ access.

Question No# : 20 out of 20