Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
CSS
Javascript
Python
Practical Questions
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
Set
25
See Explanation !
1
At which layer of OSI model, router works
OSI मॉडल की किस परत पर, राउटर काम करता है
Transport layer
Session layer
Datalink layer
Network layer
Next Question
25
See Explanation !
2
Personifications of strength and violence are considered as gentier.
ताकत और हिंसा के व्यक्तित्व को अधिक विनम्र माना जाता है।
feminine
masculine
Comman
neuter
Previous Question
Next Question
25
See Explanation !
3
Which layer in the TCP/IP stack is equivalent to the Datalink layer of the OSI model
TCP/IP स्टैक में कौन सी लेयर OSI मॉडल की Datalink लेयर के बराबर है
Application
host-to-host
Internet
Network Access
Previous Question
Next Question
25
See Explanation !
4
Which law restricts corporate communications for publicly traded companies before and during the peirod that new securities are being registered?
कौन सा कानून पीरॉड से पहले और उसके दौरान सार्वजनिक रूप से कारोबार करने वाली कंपनियों के लिए कॉर्पोरेट संचार को प्रतिबंधित करता है कि नई प्रतिभूतियों को पंजीकृत किया जा रहा है?
Securities Act of 1933
Sarbones-Oxley Act of 2002
Investment Advisers Act of1940
Investment Comporny Act of 1934
Previous Question
Next Question
25
See Explanation !
5
Converting digital bits into an electrical, radio, or optical signal takes place at Which Layer of OSI Model
डिजिटल बिट्स को इलेक्ट्रिकल, रेडियो या ऑप्टिकल सिग्नल में कनवर्ट करना OSI मॉडल की किस लेयर पर होता है
Application Layer
Network Layer
Session Layer
Physical Layer
Previous Question
Next Question
25
See Explanation !
6
DHT22 sensor is used to sense:
DHT22 सेंसर का उपयोग यह समझने के लिए किया जाता है:
Obstacles
Resistance
Position
Humidity
Previous Question
Next Question
25
See Explanation !
7
Global Sensor Network is built for _____
ग्लोबल सेंसर नेटवर्क _____ के लिए बनाया गया है
Reducing cost and time for development
Reducing cost and increasing time for development
Increasing cost and increasing time for development
Increasing cost and decreasing time for development
Previous Question
Next Question
25
See Explanation !
8
_____ pins are known as digital pins in Arduino.
Arduino में _____ पिन को डिजिटल पिन के रूप में जाना जाता है।
10
11
12
13
Previous Question
Next Question
25
See Explanation !
9
Which of the following layers of the OSI model is responsible for translating data formats in IoT communication?
ओएसआई मॉडल की निम्नलिखित में से कौन सी परतें आईओटी संचार में डेटा प्रारूपों का अनुवाद करने के लिए जिम्मेदार हैं?
Data Link Layer
Presentation Layer
Network Layer
Transport Layer
Previous Question
Next Question
25
See Explanation !
10
WPA is a security mechanism in
WPA एक सुरक्षा तंत्र है
Wifi
Cloud
Bluetooth
Ethernet
Previous Question
Next Question
25
See Explanation !
11
The hack, is one of the most famous IOT security attack.
हैक, सबसे प्रसिद्ध IOT सुरक्षा हमले में से एक है।
Mirai botnet
cipher
Ethernet
Stuxnet
Previous Question
Next Question
25
See Explanation !
12
What is the primary purpose of a power-efficient microcontroller in IoT devices?
IoT उपकरणों में एक शक्ति - कुशल माइक्रोकंट्रोलर का प्राथमिक उद्देश्य क्या है?
Enhance device aesthetics
Reduce device weight
Extend battery life
Increase device speed
Previous Question
Next Question
25
See Explanation !
13
Which of the following is not a sensor in IoT?
निम्नलिखित में से कौन IoT में सेंसर नहीं है?
BMP280
DHT11
Photoresistor
LED
Previous Question
Next Question
25
See Explanation !
14
What is the architecture of PIC microcontrollers?
पीआईसी माइक्रोकंट्रोलर की वास्तुकला क्या है?
RISC (Reduced Instruction Set Computer)
CISC (Complex Instruction Set Computer)
ARM Cortex-M
PowerPC
Previous Question
Next Question
25
See Explanation !
15
Which layer of the OSI model is responsible for managing end-to-end communication and data integrity in IoT systems?
आईओटी सिस्टम में एंड - टू - एंड संचार और डेटा अखंडता के प्रबंधन के लिए ओएसआई मॉडल की कौन सी परत जिम्मेदार है?
Data Link Layer
Transport Layer
Application Layer
Network Layer
Previous Question
Next Question
25
See Explanation !
16
What is the equivalent of the OSI model's Physical and Data Link Layers in the TCP/IP model?
टीसीपी/आईपी मॉडल में ओएसआई मॉडल की भौतिक और डेटा लिंक परतों के बराबर क्या है?
Application Layer
Internet Layer
Network Interface Layer
Transport Layer
Previous Question
Next Question
25
See Explanation !
17
A wireless network uses _____ waves to transmit signals.
एक वायरलेस नेटवर्क संकेतों को संचारित करने के लिए _____ तरंगों का उपयोग करता है।
Radio
Microwave
Sound
Mechanical
Previous Question
Next Question
25
See Explanation !
18
communication represents two or more devices that directly connect and communicate between one another. ...
संचार दो या दो से अधिक उपकरणों का प्रतिनिधित्व करता है जो सीधे एक दूसरे के बीच कनेक्ट और संवाद करते हैं। ...
Device to Cloud
Device to Gateway
Backend Data Sharing
Device-to-device
Previous Question
Next Question
25
See Explanation !
19
What is the purpose of a tilt sensor in an IoT-based earthquake detection system?
IoT - आधारित भूकंप पहचान प्रणाली में झुकाव सेंसर का उद्देश्य क्या है?
Measure air pressure
Detect changes in humidity
Monitor angular position or tilt
Measure light intensity
Previous Question
Next Question
25
See Explanation !
20
What is the advantage of MQTT over HTTP?
HTTP पर MQTT का क्या लाभ है?
More Secure
Lightweight
Both A and B
None
Previous Question
Next Question
25
See Explanation !
21
In which of these, more than one candidate is interviewed?
इनमें से किसमें, एक से अधिक उम्मीदवारों का साक्षात्कार लिया जाता है?
The behavioural interview
The stress interview
The group interview
The audition
Previous Question
Next Question
25
See Explanation !
22
Which IoT security measure focuses on verifying the identity of a user or device before granting access?
कौन सा IoT सुरक्षा उपाय एक्सेस देने से पहले उपयोगकर्ता या डिवाइस की पहचान सत्यापित करने पर केंद्रित है?
Authentication
Authorization
Encryption
Firewalls
Previous Question
Next Question
25
See Explanation !
23
In IoT communication, a sensor sending temperature data to a central server is an example of which mode?
IoT संचार में, एक केंद्रीय सर्वर को तापमान डेटा भेजने वाला सेंसर किस मोड का एक उदाहरण है?
Simplex
Half-Duplex
Full-Duplex
Multiplex
Previous Question
Next Question
25
See Explanation !
24
Which is false about microcontroller?
माइक्रोकंट्रोलर के बारे में क्या गलत है?
Microcontrollers are used to execute a single task within an application.
It consists of CPU, RAM, ROM, I/O ports.
Its power consumption is high because it has to control the entire system.
It is built with CMOS technology.
Previous Question
Next Question
25
See Explanation !
25
What is the function of the "Smudge Tool" in Photoshop 7?
फ़ोटोशॉप 7 में "स्मज टूल" का फ़ंक्शन क्या है?
Blurring the edges of an image
Smoothing or blending colors in an image
Adding text to images
Applying artistic filters
Previous Question