Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
IoT Architecture
Set 3
25
See Explanation !
1
During embedded design, which design considers both hardware and software
एम्बेडेड डिज़ाइन के दौरान, जो डिज़ाइन हार्डवेयर और सॉफ़्टवेयर दोनों पर विचार करता है
Memory Design
Software/ hardware Design
Platform-based Design
Peripheral Design
Next Question
25
See Explanation !
2
Identify the polite method of beginning a business letter.
एक व्यावसायिक पत्र शुरू करने की विनम्र विधि की पहचान करें।
We are forced to refuse
We demand to know from you
We find it difficult to believe
We appreciate your prompt reply
Previous Question
Next Question
25
See Explanation !
3
How to research and enquire about the company?
कंपनी के बारे में शोध और पूछताछ कैसे करें?
Website
Company Directories
Annual Report
All of these
Previous Question
Next Question
25
See Explanation !
4
Which of the following is the property of embedded C language?
निम्नलिखित में से कौन सी एम्बेडेड C भाषा की संपत्ति है?
Hardware independent
Used for web applications
Used with limited resources
Used for native development
Previous Question
Next Question
25
See Explanation !
5
What is the number of elements in open loT architecture?
ओपन लॉट आर्किटेक्चर में तत्वों की संख्या कितनी है?
Four
Five
Six
Seven
Previous Question
Next Question
25
See Explanation !
6
What is the process to check whether previous stages of reading have been followed properly ?
यह जांचने की प्रक्रिया क्या है कि पढ़ने के पिछले चरणों का ठीक से पालन किया गया है या नहीं ?
Survey
Question
Reading
Review
Previous Question
Next Question
25
See Explanation !
7
Most sensors have what type of transfer function?
अधिकांश सेंसर में किस प्रकार का स्थानांतरण कार्य होता है?
Zero
Infinity
Linear
Non-linear
Previous Question
Next Question
25
See Explanation !
8
Functions can pass information in which of the following ways ?
फ़ंक्शंस निम्नलिखित में से किन तरीकों से जानकारी पास कर सकते हैं?
Value
Reference
Stack
Both (A) and (B)
Previous Question
Next Question
25
See Explanation !
9
How can you throw an error with preprocessor directives to Arduino Compiler, forcing to stop compilation ?
आप Arduino कंपाइलर को प्री - प्रोसेसर निर्देशों के साथ एक त्रुटि कैसे फेंक सकते हैं, संकलन को रोकने के लिए मजबूर कर सकते हैं?
#warning
#stop
#cut
#error
Previous Question
Next Question
25
See Explanation !
10
What is the feeling of competence to cope with life's challenges and of being worthy of happiness called
जीवन की चुनौतियों का सामना करने और खुशी के योग्य होने की योग्यता की भावना को क्या कहा जाता है
Arrogance
Self-esteem
Self-efficacy
Wishful thinking
Previous Question
Next Question
25
See Explanation !
11
Which of the following devices are specifically being used for converting serial to parallel and from parallel to serial respectively?
निम्नलिखित में से किस उपकरण का उपयोग क्रमशः क्रमशः सीरियल को समानांतर और समानांतर से क्रमशः परिवर्तित करने के लिए किया जा रहा है?
microcontroller
timers
counters
registers
Previous Question
Next Question
25
See Explanation !
12
How should the tone of a speaker be like?
वक्ता का स्वर कैसा होना चाहिए?
Loud
Clear
Low
Soft
Previous Question
Next Question
25
See Explanation !
13
The process of assessment of the speaker's content while listening is called
सुनने के दौरान वक्ता की सामग्री के मूल्यांकन की प्रक्रिया को कहा जाता है
Critical listening
Dialogic listening
Comprehensive listening
Systematic listening
Previous Question
Next Question
25
See Explanation !
14
In the loT network, Secure Shell (SSH) is:
LoT नेटवर्क में, Secure Shell (SSH) है:
Gateway
Secure network protocol
Router
Firewall
Previous Question
Next Question
25
See Explanation !
15
In IoT, Transport layer set up connections without handshakes/acknowledgements using:
IoT में, ट्रांसपोर्ट लेयर ने निम्नलिखित का उपयोग करके हैंडशेक/पावती के बिना कनेक्शन स्थापित किए:
UDP
TCP
FTP
HTTP
Previous Question
Next Question
25
See Explanation !
16
These applications take data or input from various devices and convert it into viable actions or clear patterns for human analysis
ये एप्लिकेशन विभिन्न उपकरणों से डेटा या इनपुट लेते हैं और इसे मानव विश्लेषण के लिए व्यवहार्य कार्यों या स्पष्ट पैटर्न में परिवर्तित करते हैं
Real Time Analytics
Data Collection
Device Integration
Real Time Collection
Previous Question
Next Question
25
See Explanation !
17
Which of the following is NOT a data type?
निम्नलिखित में से कौन सा एक डेटा प्रकार नहीं है?
sbit
dbit
bit
unsigned int
Previous Question
Next Question
25
See Explanation !
18
Which of the following is the key to an effective presentation ?
निम्नलिखित में से कौन एक प्रभावी प्रस्तुति की कुंजी है?
Image
Styles
Limited words and key phrases
Layouts
Previous Question
Next Question
25
See Explanation !
19
The scope that hacker can use to break into a system is called as
हैकर जिस स्कोप का उपयोग किसी सिस्टम में घुसने के लिए कर सकता है, उसे.........................
Attack surface
Defense
Principle of least privilege
Risk mitigation
Previous Question
Next Question
25
See Explanation !
20
allow data processing close to device.
डिवाइस के करीब डेटा प्रोसेसिंग की अनुमति दें।
Edge Computing
Cloud Computing
Fog Computing
Grid Computing
Previous Question
Next Question
25
See Explanation !
21
A good presenter and communicator should
एक अच्छे प्रेजेंटर और कम्युनिकेटर को
Follow good sequencing of ideas
Manage time properly
Clear doubts
All of these
Previous Question
Next Question
25
See Explanation !
22
Which of these may convey arrogance?
इनमें से कौन सा अहंकार व्यक्त कर सकता है?
Shoulder shrug
Jointed fingertips
Hands swinging loosely
Pointed finger
Previous Question
Next Question
25
See Explanation !
23
The process of removing certain band of frequencies from a signal while permitting other is called as
अन्य को अनुमति देते समय सिग्नल से आवृत्तियों के कुछ बैंड को हटाने की प्रक्रिया को कहा जाता है
Attenuation
Distortion
Filtering
None of the above
Previous Question
Next Question
25
See Explanation !
24
Which one is not Leading Cloud Services for IoT Deployments?
आईओटी परिनियोजन के लिए कौन सी क्लाउड सेवा अग्रणी नहीं है?
AWS
IBM Watson
Microsoft Azure
Google Drive
Previous Question
Next Question
25
See Explanation !
25
Which of the following layer is called a port layer in OSI model?
OSI मॉडल में निम्नलिखित में से किस परत को पोर्ट लेयर कहा जाता है?
Application
Presentation
Session
Transport
Previous Question