IOT201

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/226

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

227 Terms

1
New cards

One way to share information with supply chain partners is wireless _________, which is the science of measuring physical phenomena such as temperature, volume, or an on/off condition at a remote point and transmitting the value to a distant recorder or observer

A.RFID

B.mobilization

C.osmosis

D.telemetry

D.telemetry

2
New cards

WiMax and 3G wireless mobile technologies offer telemedicine application opportunities that include all of the following EXCEPT:

A.Reduced threat of malpractice suits because there is no hands-on interaction between the remote physician and the patient.

B.Prescriptions can be transferred electronically to the appropriate pharmacy for a no-wait pick-up by the patient.

C.Real-time consultation between a patient in one location and a medical specialist in another.

D.Wearable heart monitors linked to a cell phone can automatically contact doctors or family members at the first sign of health problems.

A.Reduced threat of malpractice suits because there is no hands-on interaction between the remote physician and the patient.

3
New cards

All of the following about RFID are true EXCEPT:

A.An RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic at a range of up to 100 feet

B.An RFID tag includes an antenna and a chip with information about the item

C.An RFID reader contains a radio transmitter and receiver

D.An RFID tag remains inactive until radio frequency energy from the tag's radio transmitter hits its antenna, giving the chip enough power to emit a 96-bit string of information

A.An RFID tag can hold 20 times the amount of information a bar code can hold, and the tag can be read through cardboard, wood, and plastic at a range of up to 100 feet

4
New cards

Digital Signature is

A.Scanned Signature on Computer

B.Code number of the sender

C.Public Key Encryption

D.Software to recognize signature

D.Software to recognize signature

5
New cards

The method(s) of payment for online consumers are

A.Electronic cash

B.Credit/debit

C.Electronic checks

D.All of the above

D.All of the above

6
New cards

Which of the following statements are INCORRECT about company-centric marketplaces?

A.They are marketplaces which focus on a single company's purchasing needs or selling needs.

B.They are generally public entities owned by that company.

C.They support for buying needs (many to one, or buy-side).

D.They support for selling needs (one to many, or sell-side).

B.They are generally public entities owned by that company.

7
New cards

As in e-commerce, m-commerce B2C applications are concentrated in each of the following areas EXCEPT:

A.retail shopping for products and services

B.telecommunications

C.targeted advertising

D.providing content for a fee through mobile portals

B.telecommunications

8
New cards

All of the following about wireless wide area networks (WWAN) are true EXCEPT:

A.The single WWAN network standard insures compatibility of handsets within and between countries.

B.Most WWANs are cellular phone networks.

C.At the center of each cell is a base station transceiver or cell tower that is used to send and receive signals to and from mobile devices operating within the cell.

D.When a device is turned on, a SIM card inside the device identifies itself to the WWAN.

A.The single WWAN network standard insures compatibility of handsets within and between countries.

9
New cards

Which of the following is an example of edutainment?

A.Two or more students sharing music over the Internet

B.An online science fiction game whose object is to blast as many aliens as possible in a 60 second round

C.A community college providing an online college course on digital media

D.An online game that uses colorful characters to teach young children about numbers

D.An online game that uses colorful characters to teach young children about numbers

10
New cards

Which of the following statements about blogs is not true?

A.A blog is a personal Web site, open to the public, in which the owner expresses his or her feelings or opinions.

B.Blogs became very popular after the September 11, 2001 terrorist attacks when people were looking for as many sources of information as possible and for personal connections to the tragedy.

C.Blogs are limited to one-way communication.

D.The most common types of blogs are professional blogs.

C.Blogs are limited to one-way communication.

11
New cards

P2P systems have all of the following key characteristics EXCEPT:

A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications.

B.The users' computers can act as both clients and servers.

C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.

D.They support cross-networking protocols such as SOAP or XML-RPC, which enables a program on one computer to execute a program on a server computer.

C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities.

12
New cards

More and more people are willing to pay for digital music, as shown by the success of ________.

A.Napster

B.Kazaa

C.Apple's iTunes

D.P2P

C.Apple's iTunes

13
New cards

All of the following are examples of e-government EXCEPT:

A.a company sells army and navy surplus supplies at auction over the Internet.

B.a contractor submits an application for a building permit using a city hall Web site.

C.an unemployed worker consults a Web site operated by the state employment department to learn about job openings in his city.

D.a state purchasing officer places an online order for office supplies from an e-catalog sent to her by a national office supply store.

A.a company sells army and navy surplus supplies at auction over the Internet.

14
New cards

A(n) _____ is a computer system capable of integrating, storing, editing, analyzing, sharing, and displaying spatial information.

A.geographical information system

B.global positioning system

C.l-commerce system

D.on-star system

A.geographical information system

15
New cards

Which of the following statements about blogs is not true?

A.A blog is a personal Web site, open to the public, in which the owner expresses his or her feelings or opinions

B.Blogs became very popular after the September 11, 2001 terrorist attacks when people were looking for as many sources of information as possible and for personal connections to the tragedy

C.Blogs are limited to one-way communication

D.The most common types of blogs are professional blogs

C.Blogs are limited to one-way communication

16
New cards

P2P systems have all of the following key characteristics EXCEPT:

A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications

B.The users' computers can act as both clients and servers

C.The overall system is well integrated, but lacks tools for easy creation of content or for adding functionalities

D.They support cross-networking protocols such as SOAP or XML-RPC, which enables a program on one computer to execute a program on a server computer

A.They provide for real-time access to other users through techniques such as instant messaging and multichannel collaboration applications

17
New cards

The tasks of KM include each of the following EXCEPT:

A.creating knowledge repositories where knowledge can be stored and retrieved easily

B.enhancing a knowledge environment in order to conduct more effective knowledge creation, transfer, and use

C.restricting knowledge access to prevent its transfer between individuals

D.managing knowledge as an asset so as to increase the effective use of knowledge assets over time

C.restricting knowledge access to prevent its transfer between individuals

18
New cards

_______ involves using various computer-based tools and techniques to analyze transaction data and generate new ideas

A.Knowledge creation

B.Knowledge capture

C.Knowledge classification

D.Knowledge management

A.Knowledge creation

19
New cards

Most universities use e-learning:

A.exclusively in reaching students who couldn't otherwise attend classes.

B.only when forced by administrators to use it as a way to recruit distant students or reduce costs.

C.as a total replacement for traditional classrooms.

D.as a supplementary channel to traditional classrooms.

D.as a supplementary channel to traditional classrooms.

20
New cards

One initiative underway that could lead to widespread support for the introduction of RFID is the _____, which identifies the manufacturer, producer, version, and serial number of each item and does not require line-of-sight contact to be read.

A.Electronic Product Code

B.Universal Product Code

C.Smart Product Network

D.Sensor Network

A.Electronic Product Code

21
New cards

Wal-Mart and Levi Strauss collaborate on demand forecasting in order to optimize the flow of materials along the supply chain. This is an example of:

A.reducing design cycle time

B.APS (Advanced Planning and Scheduling)

C.CPFR (Collaborative Planning, Forecasting and Replenishment)

D.reducing product development time

C.CPFR (Collaborative Planning, Forecasting and Replenishment)

22
New cards

A major block in the widespread implementation of collaborative commerce is:

A.the theory of collaborative commerce hasn't been proven effective in real-world applications.

B.the technology needed isn't available.

C.collaborative commerce is extremely expensive.

D.the lack of universally accepted standards.

D.the lack of universally accepted standards.

23
New cards

When you have a potential IoT idea you want to develop properly, what must you first define?

A.Its Unique Value Proposition

B.Problem it sets out to solve

C.Route to market

D.How it will work

B.Problem it sets out to solve

24
New cards

What is used to uniquely identify devices connected to the Internet?

A.gateway address

B.IP address

C.device name

D.URL

B.IP address

25
New cards

What data security concerns do IoT devices pose?

A.The device being hijacked to harm another device or system

B.Because they are small and low powered, they can't carry much software including security software leaving them open to data theft or disruption

C.The devices being small and embedded into objects makes them easily vandalised or stolen

B.Because they are small and low powered, they can't carry much software including security software leaving them open to data theft or disruption

26
New cards
27
New cards
28
New cards

Which function in the Arduino IDE is used to set any pin in output or input state?

A.digitalWrite

B.delay

C.pinMode

D.analogRead

C.pinMode

29
New cards

How many PWM pins are present in the Arduino UNO?

A.1

B.3

C.6

D.9

C.6

30
New cards

What among the following is an example of external interrupt for the Arduino?

A.Button

B.Resistor

C.LED

D.Capacitor

A.Button

31
New cards

What will be the correct syntax to make a digital pin (say D2) as an output pin?

A.pinMode(2,output)

B.pinMode(2,Output)

C.pinMode(2,OUTPUT)

D.pinmode(2,OUTPUT)

C.pinMode(2,OUTPUT)

32
New cards

Which of the following digital pins can be used in Arduino Nano/Uno to give interrupt?

A.D2

B.D6

C.D4,D5

D.D2,D3

D.D2,D3

33
New cards

What is the size of EEPROM of the Arduino UNO?

A.1 KB

B.2 KB

C.4 KB

D.8 KB

A.1 KB

34
New cards

Which function in the Arduino is used to start the serial communication using the COM port?

A.Serial.available()

B.Serial.begin()

C.serial.begin()

D.setup()

B.Serial.begin()

35
New cards

The action that will be performed using this switch case will be:switch (2): {case 1: digitalWrite(11,HIGH); case 2: analogRead(A3)}

A.D11 will become HIGH

B.Analog value of A3 will be read

C.D11 will become LOW

D.None of the other

B.Analog value of A3 will be read

36
New cards

While taking the input from the user in Arduino, which of these function is used in Sketch?

A.Serial.print

B.Serial.println

C.Serial.available

D.None of the other

C.Serial.available

37
New cards

What is the Tinkercad Circuits?

A.Its a just s software to create games

B.Tinkercad is a free online collection of software tools that help people create and simulation circuits.

C.Its a software for playing and create games.

D.None of the other

B.Tinkercad is a free online collection of software tools that help people create and simulation circuits.

38
New cards

How do you zoom in on Tinkercad?

A.Spacebar

B.Use the arrows on the keyboard

C.Use the scroll wheel

D.Right Click

C.Use the scroll wheel

39
New cards

A photoresistor is an electronic component whose electrical resistance _______ when it is exposed to light.

A.changes

B.increases

C.doesn't change

A.changes

40
New cards

What does this syntax mean? myservo.attach(9)

A.Connect the control wire 9 to GND pin

B.Connect the control wire for 9 seconds

C.Connect the control wire to 9 volts

D.Connect the control wire to digital pin 9

D.Connect the control wire to digital pin 9

41
New cards

In remote control terms, IR stands for what?

A.indirect radio

B.infrared

C.inside remote

D.instant reception

B.infrared

42
New cards

Infrared remote controls use what to carry signals between the remote control and the device it controls?

A.radio waves

B.sound

C.light

C.light

43
New cards

Infrared signals can be used for ______.

A.(a) long-range communication

B.(b) short-range communication

C.Both (a) and (b)

D.None of the other

B.(b) short-range communication

44
New cards

Which sensor is LM35?

A.Pressure sensor

B.Humidity sensor

C.Temperature sensor

D.Touch sensor

C.Temperature sensor

45
New cards

LM35 provides _______ Volt for each degree count?

A.1

B.0.01

C.0.001

D.10

B.0.01

46
New cards

What is the main purpose of the SRF05 sensor?

A.Water level sensor

B.Sound intensity sensor

C.Ranging sensor

D.Temperature sensor

C.Ranging sensor

47
New cards

What is the purpose of the pin named ECHO of HC-SR04 sensor?

A.Allows the ultrasonic sound wave to be sent from the sensor.

B.Provides the information that the ultrasonic sound wave is returned.

C.Allows the sensor to be fed with energy.

D.Provides the chassis connection of the sensor.

B.Provides the information that the ultrasonic sound wave is returned.

48
New cards

What does the AREF pin on the Arduino UNO?

A.Used to trigger a interrupt.

B.Reference voltage for analog inputs.

C.To reset the microcontroller.

D.Provides 8-bit PWM signal.

B.Reference voltage for analog inputs.

49
New cards

What pins can the Arduino UNO board communicate with the computer?

A.PWM pins

B.ADC pins

C.I2C pins

D.UART pins

D.UART pins

50
New cards

What case is called serialEvent() interrupt?

A.Serial port shuts down.

B.When data is sent from the serial port.

C.When data comes from the serial port.

D.When the voltage is applied to the Arduino.

C.When data comes from the serial port.

51
New cards

Each computer has its own Internet search engine.

A.True

B.False

B.False

52
New cards

What does CRM stand for?

A.Customer Research Management

B.Customer Relationship Management

C.Customized Research Management

D.Customer Research Metrics

B.Customer Relationship Management

53
New cards

How has e-commerce revolutionized business?

A.It has allowed businesses to utilize new avenues of advertising, selling, and distribution.

B.It attempts to level the playing field.

C.It transcends geographic boundaries.

D.All of the above

D.All of the above

54
New cards

A _____ allows customers to continue browsing after selecting each item they wish to purchase

A.Shopping Cart

B.Forms-based interface

C.SSL connection

D.Virtual memory

A.Shopping Cart

55
New cards

Which of the following is NOT a standard used in E-Commerce?

A.EDI

B.XML

C.SETI

D.X12

C.SETI

56
New cards

Which of the following is NOT the characteristics of consumer when studying about EC Consumer Behavior Model?

A.Age

B.Gender

C.E-mail

D.Education

C.E-mail

57
New cards

Mechanism to protect private networks from outside attack is

A.Firewall

B.Antivirus

C.Digital signature

D.Formatting

A.Firewall

58
New cards

While making payment using electronic check, credit and debit cards, the server authenticates the customers and verifies with the bank that funds are adequate before purchase

A.True

B.False

A.True

59
New cards

A computer communication technology that provides a way to interconnect multiple computer across short distance is

A.LAN

B.WAN

C.MAN

D.Wireless network

A.LAN

60
New cards

DNS is

A.The distributed hierarchical naming system

B.The vertical naming system

C.The horizontal naming system

D.The client server system

C.The horizontal naming system

61
New cards

Which of the following is a technology constraint from the e-commerce macro-environment?

A.Propensity for consumers to purchase online.

B.Opt-in to e-mail required to avoid SPAM

C.Likelihood of fraudulent transactions

D.Taxation at source of purchase

C.Likelihood of fraudulent transactions

62
New cards

In E-Commerce, HTTPS is a communication protocol that uses

A.Public key encryption

B.Secret key encryption

C.Private key encryption

D.Data key encryption

A.Public key encryption

63
New cards

The concept of electronic cash is to execute payment by

A.Credit Card

B.ATM Card

C.Using computers over network

D.Cheque

C.Using computers over network

64
New cards

A chemical manufacturer has transactions that are predominantly:

A.business to consumer.

B.consumer to consumer.

C.consumer to business

D.business to business

C.consumer to business.

65
New cards

A B2B reverse auction is:

A.the same as a seller auction.

B.intended to reduce the price by increasing competition from suppliers.

C.always run through a B2B marketplace.

D.both the second and third answers above.

B.intended to reduce the price by increasing competition from suppliers.

66
New cards

A computer system that permits multiple users to run programs at same time

A.Real time system

B.Multi programming system

C.Time sharing system

D.Multi tasking system

D.Multi tasking system

67
New cards

The mercantile process model consists of the following phase(s):

A.The pre-purchase phase

B.Purchase consummation phase

C.Post-purchase Interaction phase

D.All of the above

D.All of the above

68
New cards

The most serious disadvantage of e-auctions is:

A.the risk of fraud.

B.Logistics.

C.unreliable auction software.

D.payment delays.

A.the risk of fraud.

69
New cards

Many companies use intermediaries or trading assistants instead of implementing e-auctions themselves for each of the following reasons EXCEPT:

A.The company name is not widely recognized.

B.To bring many more buyers to the auction.

C.To avoid tax and legal fees.

D.Costs of auction intermediaries or assistants are less than the costs of physical auctions.

C.To avoid tax and legal fees.

70
New cards

All of the following are potential benefits from auctions to sellers EXCEPT:

A.auctions can broaden the customer base and reduce cycle time.

B.sellers receive valuable price sensitivity information.

C.sellers are always anonymous.

D.sellers can liquidate large quantities of obsolete items very quickly.

C.sellers are always anonymous.

71
New cards

Select the correct answer from the choices below which is corresponding with the following statement in STRATEGIC PLANNING TOOLS" : It is a methodology that surveys external opportunities and threats and relates them to internal strengths and weaknesses.

A.SWOT analysis

B.strategy map

C.balanced scorecard

D.BCG matrix

A.SWOT analysis

72
New cards

A major shortcoming with authentication services is:

A.two different authenticators may come up with different opinions regarding the authenticity and description of a given item.

B.it is impossible to tell whether many items are reproductions or genuine.

C.dishonest authenticators are the primary sources of fraud on the Internet.

D.most auction sites forbid the use of authentication services.

A.two different authenticators may come up with different opinions regarding the authenticity and description of a given item.

73
New cards

_____ work best with many buyers and many sellers.

A.Bartering

B.Dynamic exchanges

C.Forward auctions

D.Reverse auctions

A.Bartering

74
New cards

The services provided through location-based m-commerce focus on key factors which include all of the following EXCEPT:

A.Geocaching, or determining the topography of an area.

B.Navigation, or plotting a route from one location to another.

C.Tracking, or monitoring the movement of a person or thing.

D.Timing, or determining the precise time at a specific location

A.Geocaching, or determining the topography of an area.

75
New cards

Infrastructures that "support" the wireless connection are:

A.network access points, mobile communications server switches, and cellular transmitters and receivers.

B.WAP gateways, GPS locators, and GPS satellites.

C.PDAs, smartphones, and portable computers.

D.web servers, mobile devices, and microbrowsers.

A.network access points, mobile communications server switches, and cellular transmitters and receivers.

76
New cards

A ______ is suitable for mobile users who need to make very short-range device-to-device wireless connections within a small space, such as a single room, and most commonly with Bluetooth.

A.personal area network

B.local area network

C.wireless area network

D.metropilitan area network

A.personal area network

77
New cards

You are walking near a coffee shop and suddenly your cell phone beeps with a message: "Come inside and get a free biscotti with any purchase." This is an example of:

A.permission marketing

B.location-based advertising

C.customer relationship management

D.m-commerce

C.customer relationship management

78
New cards

A resistor's first three colour bands are brown, green and red. What is its value?

A.1500 ohms

B.250 ohms

C.2000 ohms

D.510 ohms

A.1500 ohms

79
New cards

Which colour represents the digit 6 in the resistor colour code?

A.red

B.blue

C.pink

D.green

B.blue

80
New cards

Which of these colours is NOT used in the resistor value colour code?

A.black

B.turquoise

C.white

D.violet

B.turquoise

81
New cards

A micro-controller is...

A.small CPU made of transistors and conductors of heat and sound sensor

B.portable circuits capable of making other circuits

C.small computer on a single integrated circuit containing a processor core, memory, and programmable input/output peripherals

D.small chip made of silver

A.small CPU made of transistors and conductors of heat and sound sensor

82
New cards

What does GPIO stand for?

A.General Purpose Inner Outer Propeller

B.General Purpose Interested Old People

C.General Purpose Input Output Pins

D.General Purpose Input Output Processor

C.General Purpose Input Output Pins

83
New cards

Before your program "code" can be sent to the board, it needs to be converted into instructions that the board understands. This process is called...

A.Stop

B.Create Sketch

C.Compile

D.Serial Monitor

C.Compile

84
New cards

This shows you what the IDE is currently doing and is also where error messages display if you make a mistake in typing your program. (often called a syntax error)

A.Sketch Editor

B.Text Console

C.Line Number

D.Serial Monitor

B.Text Console

85
New cards

This shows you what line number your cursor is on. It is useful since the compiler gives error messages with a line number.

A.Sketch Editor

B.Text Console

C.Line Number

D.Serial Monitor

C.Line Number

86
New cards

A function is a series of programming statements that can be called by name. Which command is called once when the program starts:

A.loop()

B.(output)

C.setup()

D.(input)

C.setup()

87
New cards

A function is a series of programming statements that can be called by name. Which command is called repetitively over and over again as long as the Arduino has power.

A.loop()

B.(output)

C.setup()

D.(input)

A.loop()

88
New cards

A function is a series of programming statements that can be called by name. Which command delays the LED by a number of milliseconds is.

A.loop()

B.delay()

C.setup()

D.stop()

B.delay()

89
New cards

What is this line of code: // the loop function runs over and over again forever

A.A statement

B.A single line comment

C.A function definition

D.A bowl of cereal

B.A single line comment

90
New cards

What is this line of code: void loop() {

A.A statement

B.A single line comment

C.Part of a function definition

D.A banana

C.Part of a function definition

91
New cards

Which pin has a built-in LED?

A.Pin 13

B.Pin 10

C.Pin 8

D.Pin 7

A.Pin 13

92
New cards

What are two two main types of Arduino pins?

A.Digital and analog.

B.Digital and modulation.

C.Pulse and analog.

A.Digital and analog.

93
New cards

If you make a voltage divider circuit with R1 = 10K and R2 = 10K, and your Vin is 12V, what will be your Vout?

A.12V

B.10V

C.6V

D.5V

C.6V

94
New cards

How many bits are there in a byte?

A.256

B.8

C.16

D.10

B.8

95
New cards

On a breadboard, where do you put a DIP package?

A.In the middle of the board

B.On the bottom side of the board

C.In the power rails

D.With the potato chips

A.In the middle of the board

96
New cards

What is the nominal voltage of 6 AAA batteries connected in parallel?

A.6V

B.9V

C.12V

D.1.5V

D.1.5V

97
New cards

This is an unsigned data type that occupies 1 byte of memory. Same as the byte datatype. It encodes numbers from 0 to 255.

A.highByte()

B.unsigned char

C.unsigned long

D.volatile

B.unsigned char

98
New cards

This is used to include outside libraries in your sketch. This gives the programmer access to a large group of standard C libraries (groups of pre-made functions), and also libraries written especially for Arduino.

A.#include

B.break

C.void

D.#define

A.#include

99
New cards

This clears (writes a 0 to) a bit of a numeric variable.

A.bitClear

B.sizeof()

C.pinMode

D.#include

A.bitClear

100
New cards

The void keyword is used only in function declarations. It indicates that the function is expected to return no information to the function from which it was called.

A.HIGH

B.void

C.pin

D.LOW

B.void