Syllabus
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2025
New!
2024
New!
2023
New!
2022
New!
2021
New!
2020
New!
2019
New!
2018
New!
2017
New!
2016
New!
2015
New!
2014
New!
2013
New!
2012
New!
2011
New!
Assignments
HTML
CSS
Javascript
Python
Practical Questions
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
Set
25
See Explanation !
1
_____ are the characteristics of IOT.
_____ IOT की विशेषताएं हैं।
Intelligence, Scalable
Security
Heterogeneity
All of the above
Next Question
25
See Explanation !
2
The hack, is one of the most famous IOT security attack.
हैक, सबसे प्रसिद्ध IOT सुरक्षा हमले में से एक है।
Mirai botnet
cipher
Ethernet
Stuxnet
Previous Question
Next Question
25
See Explanation !
3
Each IP packet must contain:
प्रत्येक IP पैकेट में ये चीज़ें होनी चाहिए:
Only Destination IP Address
Only Source IP Address
Source and destination IP addresses
None of the Above
Previous Question
Next Question
25
See Explanation !
4
Which of the following process is used to keep track of user's activity
उपयोगकर्ता की गतिविधि पर नज़र रखने के लिए निम्नलिखित में से किस प्रक्रिया का उपयोग किया जाता है
Authentication
Authoring
Authorization
Accounting
Previous Question
Next Question
25
See Explanation !
5
The process of assessment of the speaker's content while listening is called
सुनने के दौरान वक्ता की सामग्री के मूल्यांकन की प्रक्रिया को कहा जाता है
Critical listening
Dialogic listening
Comprehensive listening
Systematic listening
Previous Question
Next Question
25
See Explanation !
6
The process of building loT hardware and devices enhanced with smart sensors and embedded system using many of the shell components like sensors, circuits and microcontrollers is called?
कई शेल घटकों जैसे सेंसर, सर्किट और माइक्रोकंट्रोलर का उपयोग करके स्मार्ट सेंसर और एम्बेडेड सिस्टम के साथ बढ़ाया गया एलओटी हार्डवेयर और उपकरणों के निर्माण की प्रक्रिया को कहा जाता है?
Prototyping
Casting
Protocasting
Protocal Typing
Previous Question
Next Question
25
See Explanation !
7
What is the primary purpose of a Digital Signal Processor (DSP) in IoT devices?
IoT उपकरणों में डिजिटल सिग्नल प्रोसेसर (DSP) का प्राथमिक उद्देश्य क्या है?
Process analog signals
Provide internet connectivity
Perform digital signal processing tasks
Control power consumption
Previous Question
Next Question
25
See Explanation !
8
What does the "Quick Mask Mode" in Adobe Photoshop 7 allow you to do?
Adobe Photoshop 7 में "क्विक मास्क मोड" आपको क्या करने देता है?
Apply quick filters to an image
Create selections using a red overlay
Change the image resolution
Adjust the canvas size
Previous Question
Next Question
25
See Explanation !
9
If you didn't know the recipient's name, how would you close the letter?
यदि आपको प्राप्तकर्ता का नाम नहीं पता था, तो आप पत्र को कैसे बंद करेंगे?
With love
Yours sincerely
Yours faithfully
Affectionately yours
Previous Question
Next Question
25
See Explanation !
10
Which technology used by Sigfox
Sigfox द्वारा किस तकनीक का उपयोग किया जाता है
Ulta Narrow Band (UNB)
Universal Narrow Band (UNB)
Global Narrow Band (GNB)
Local Narrow Band (LNB)
Previous Question
Next Question
25
See Explanation !
11
Application are of 8051 Microcontroller
आवेदन 8051 माइक्रोकंट्रोलर के हैं
Medical Equipment
Aeronautical and space
Defense System
All of the above
Previous Question
Next Question
25
See Explanation !
12
_________ is a IoT system design which depicts how actually the components should be arranged to complete a particular function
_________ एक IoT सिस्टम डिज़ाइन है जो दर्शाता है कि वास्तव में किसी विशेष फ़ंक्शन को पूरा करने के लिए घटकों को कैसे व्यवस्थित किया जाना चाहिए
Logical design
physical design
both of these
none of these
Previous Question
Next Question
25
See Explanation !
13
Secure shell (SSH) network protocol is used for
सिक्योर शेल (SSH) नेटवर्क प्रोटोकॉल का उपयोग किसके लिए किया जाता है
remote command-line login
remote command execution
secure data communication
All of the mentioned
Previous Question
Next Question
25
See Explanation !
14
Microcontroller is the brain of IOT devices.
माइक्रोकंट्रोलर IOT उपकरणों का मस्तिष्क है।
True
False
May be True or False
None of the Above
Previous Question
Next Question
25
See Explanation !
15
The method of communication in which data transmission takes place in either directions, but one at a time
संचार की वह विधि जिसमें डेटा ट्रांसमिशन किसी भी दिशा में होता है, लेकिन एक समय में एक
Full duplex
Half duplex
Simplex
None of these
Previous Question
Next Question
25
See Explanation !
16
What does p prefer to in ATmega328p?
ATmega328p में p क्या पसंद करता है?
Production
Pico Power
Power Pico
Programmable on chip
Previous Question
Next Question
25
See Explanation !
17
Which of the following is the basic functions of a timer?
टाइमर के बुनियादी कार्य निम्नलिखित में से कौन से हैं?
Control the compare, capture mode
Act as a counter
Provide a time delay
All of these
Previous Question
Next Question
25
See Explanation !
18
With respect to the body language, the handshake conveys the confidence is
बॉडी लैंग्वेज के संबंध में, हैंडशेक यह विश्वास व्यक्त करता है कि
Firm
Limp
Loose
Incomplete knowledge
Previous Question
Next Question
25
See Explanation !
19
______ used in personal computer.
______ का उपयोग पर्सनल कंप्यूटर में किया जाता है।
Microprocessor
Microcontroller
DC Motor
None of these
Previous Question
Next Question
25
See Explanation !
20
Privacy protection solution was proposed with KP-ABE and CP-ABE
केपी - एबीई और सीपी - एबीई के साथ गोपनीयता सुरक्षा समाधान प्रस्तावित किया गया था
True
False
May be
None of these
Previous Question
Next Question
25
See Explanation !
21
What is the function name for turn on led in Arduino?
Arduino में एलईडी चालू करने के लिए फ़ंक्शन का नाम क्या है?
Digitalwrite()
Digitalread()
digitalWrite()
digitalRead()
Previous Question
Next Question
25
See Explanation !
22
What is IOT?
IOT क्या है?
Network of physical embedded with sensors.
Network of Virtual objects
Network of objects in the ring structure.
Network of sensors
Previous Question
Next Question
25
See Explanation !
23
What does "interrupt" mean in microcontroller operations?
माइक्रोकंट्रोलर ऑपरेशंस में "इंटरप्ट" का क्या मतलब है?
Pausing the system for a power-saving mode
A signal to stop the microcontroller completely
A signal that temporarily halts the current task to execute a higher-priority task
A function to reset the microcontroller
Previous Question
Next Question
25
See Explanation !
24
A microcontroller sometimes abbreviated as
एक माइक्रोकंट्रोलर को कभी - कभी संक्षेप में
μm
uC
MCU
All Of The Above
Previous Question
Next Question
25
See Explanation !
25
Which IoT security measure involves creating a secure tunnel for transmitting data over an untrusted network?
किस IoT सुरक्षा उपाय में एक अविश्वसनीय नेटवर्क पर डेटा संचारित करने के लिए एक सुरक्षित सुरंग बनाना शामिल है?
Authentication
Authorization
VPN (Virtual Private Network)
Encryption
Previous Question