Iot PDF
Iot PDF
Iot PDF
a. It provides the smallest change in the input that a sensor is capable of Sensing
b. It is the difference between the standard value and the value produced by Sensor
c. It is the deviation of sensor value curve from a particular straight line
d. It represents the correctness of the output compared to a superior system
Answer: (a)
2. What is the general operating voltage range of commercial sensors which are available for
circuit enthusiasts and hobbyists?
a. 3.3 to 5 V
b. 4.5 to 8 V
c. 3.5 to 12 V
d. 3.3 to 8 V
Answer: (a)
EL
Justification: Please refer to page 185 (Section 8.2.6 – Operating Voltage) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al.”.
PT
Answer: (d)
a. ALOHA
b. CSMA-CA
c. CSMA-CD
d. None of the above
Answer: (b)
Justification: Please refer to Slide 6 of Lecture 2 of Week 1
a. 950 KHz
b. 868 MHz
c. 902-928 MHz
d. 2.4 GHz
Answer: (a)
Answer: (d)
EL
Justification: Please refer to Slide 18 of Lecture 2 of Week 1
PT
a. 63
b. 127
c. 255
d. 512
Answer: (b)
a. Healing
b. Multi-hop
c. Adaptation
d. Reduction
Answer: (a)
Justification: Please refer to Slide 5 of Lecture 3 of Week 1
a. Home/Office Automation
b. System for Smart Security and Surveillance
c. Systems for Smart Energy Management
d. Automation in large scale complex industries
Answer: (d)
a. Wireless HART
b. ZigBee
c. Bluetooth
d. Z-Wave
Answer: (c)
EL
Justification: Please refer to Slide 12 of Lecture 3 of Week 1
PT
Answer: (c)
12. Which of the following work groups extend the integration of the IoT devices from network to
service level.
a. 6LoWPAN
b. ROLL
c. CoRE
d. None of the above
Answer: (c)
Justification: Please refer to Slide 7 of Lecture 4 of Week 1
a. Resource utilization
b. Data timeliness
c. Data availability
d. All of the above
Answer: (d)
14. Which IoT networking protocol supports caching capabilities to improve the response time
and reduce bandwidth consumption?
a. MQTT
b. XMPP
c. CoAP
d. AMQP
EL
Answer: (c)
a. DDS RTPS
b. IEEE 1888
c. AMCP
d. CoAP
Answer: (a)
1. Which industrial revolution is coined as “The second Machine Age” by Prof. Erik Brynjolfsson
and Andrew McAfee of MIT?
Answer: (d)
PT
Answer: (c)
a. Justification: Please refer to page 31 (Section - Third Industrial Revolution) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al”.
a. Intergalactic travels
b. Clothes connected to the internet
c. Mars Exploration
d. AI with human emotions
Answer: (b)
a. Renewable energy
b. Low toxic gas emission
c. Low-waste production
d. High value products
Answer: (c)
Answer: (d)
6. How many different categories of countries are there based on population growth?
a. 2
b. 3
c. 4
d. 5
Answer: (b)
Answer: (c)
Answer: (d)
PT
N
Answer: (d)
10. Which of the following cannot be considered as a medium of getting smart and connected?
a. Embedded Systems
b. Cloud computing
c. Manufacturing system
d. Sensors
Answer: (c)
11. What are the four key attributes of smart business models?
Answer: (d)
a. Physical layer is responsible for collecting and acquiring data from object or
environment.
PT
Answer: (d)
13. ___________ is a flexible system that can self-optimize performance across a broader
network, self-adapt to and learn from new conditions in real or near-real time, and autonomously
run entire production processes.
Answer: (c)
a. Smart engineering
b. Smart machines
c. Data analysis
d. Smart ideas
Answer: (d)
15. Which of the following is/are the use(s) of Big Data analytics in smart factories?
Answer: (d)
PT
N
a. They are devices having information processing systems embedded into them.
b. They are typically confined to a single device
c. They are networked set of embedded systems
d. All of the above
Answer: (c)
Answer: (a)
a. They are the integration of sensors and actuators with a processor and a communication
module.
b. They are universal sensors which can sense a wide range of different stimuli.
c. They are the kind of sensors which do not require a power source to operate.
d. All of the above
Answer: (a)
a. Google Drive
b. Outlook
c. Backblaze
d. ProWork Flow
Answer: (d)
5. State true or false — “PLM handles a product completely, from single part of the product to
entire portfolio of that product”.
a. True
b. False
Answer: (a)
EL
Justification: Please refer to Slide 9 of Lecture 2 of Week 3
PT
a. 3
N
b. 4
c. 5
d. 6
Answer: (c)
a. Augmented Reality
b. Virtual Reality
c. Both (a) and (b)
d. Neither (a) nor (b)
Answer: (a)
Answer: (d)
a. Marker-based
b. Markerless
c. Projection Based
N
d. Superimposition Based
Answer: (b)
10. Which VR type uses head-mounted displays and motion-detecting devices to simulate
user’s experiences?
a. Fully-immersive simulations
b. Semi-immersive simulations
c. Non-immersive simulations
d. Both (a) and (b)
Answer: (a)
a. False
b. True
Answer: (a)
Justification: Please refer to page 256 (Subsection - Supervised learning) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al.”.
12. A computer program without AI uses __________ method whereas computer program with
AI uses _______ method
a. Large database and algorithmic search, Large knowledge base and heuristic search
b. Large knowledge base and heuristic search, Large database and algorithmic search
c. Large knowledge base and algorithmic search, Large database and heuristic search
d. None of the above
Answer: (a)
EL
Justification: Please refer to Slide 5 of Lecture 4 of Week 3
PT
Answer: (c)
Answer: (a)
a. It indicates the data which have no restriction over the input data formats.
b. It indicates velocity of generation of data.
c. It indicates the data whose meaning is constantly changing.
d. It indicates biasness in the data, unusualness and noise in data.
Answer: (d)
Answer: (d)
Justification: Refer to slide 2 of lecture 1 from week 4
Answer: (b)
Justification: Refer to slide 6 of lecture 1 from week 4
Answer: (b)
Justification: Refer to slide 7 of lecture 1 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Answer: (a)
Justification: Refer to slide 8 of lecture 1 from week 4
5. What is a malware?
(a) A computer program which is used to disturb the computer user, such as computer
viruses, spyware etc.
(b) A computer program which breaks security policy to get critical information, which is
typically secured.
(c) A computer program which provides a facility to the attacker in which the attacker
locks the user’s computer files by using an encryption and demand some money to unlock them.
(d) None of the above
Answer: (a)
Justification: Refer to slide 11 of lecture 1 from week 4
Answer: (d)
Justification: Refer to slide 20 of lecture 1 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
7. What are the three key differences between IIoT and Automation?
(a) Connectivity, advanced analytics, and IT tools and methodologies
(b) Ubiquitous sensing, advanced analytics, and IT tools and methodologies
(c) Advance sensing, connectivity, and IT tools and methodologies
(d) Ubiquitous sensing, connectivity, and advanced analytics
Answer: (b)
Justification: Refer to slide 3 of lecture 2 from week 4
Answer: (a)
Justification: Refer to slide 22 of lecture 2 from week 4
9. Which one of the following digital industrial companies coined the term, Industrial Internet?
(a) Siemens Global
(b) General Electric
(c) Accenture
(d) Digital Industry
Answer: (b)
Justification: Refer to slide 2 of lecture 3 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
10. The ______________ started with the invention of internal combustion engines and
electricity
(a) First Stage of the Industrial Revolution
(b) Second Stage of the Industrial Revolution
(c) Third Stage of the Industrial Revolution
(d) Fourth Stage of the Industrial Revolution
Answer: (b)
Justification: Refer to slide 6 of lecture 3 from week 4
Answer: (d)
Justification: Refer to slide 20 of lecture 3 from week 4
12. The emergence of ______ system will replace the isolated systems
(a) Edge-based
(b) Cloud-based
(c) Real-time
(d) All of the above
Answer: (b)
Justification: Refer to slide 23 of lecture 3 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Answer: (d)
Justification: Refer to slide 22 of lecture 4 from week 4
Answer: (a)
Justification: Refer to slide 23 of lecture 4 from week 4
Answer: (c)
Justification: Refer to slides 30 and 22 of lecture 4 from week 4
1. Lumada is an IoT platform with advanced AI-based analytics. Which of the following
companies created Lumada?
(a) Boeing
(b) Hitachi
(c) Amazon
(d) Google
Answer: (b)
Justification: Refer to slide 8 of lecture 1 from week 5
2. Which type of reference architecture for IIoT enables quick device-to-device integrations,
automated data delivery of applications within the buses, isolation of hierarchical subsystems,
and integrations of sensors and actuators ??
(a) Three-tier IIoT architecture
(b) Layered Databus IIoT architecture
(c) Gateway-based IIoT architecture
(d) Virtual IIoT architecture
Answer: (b)
Justification: Refer to pages 114-117 from the book Introduction to Industrial Internet of Things
and Industry 4.0.
Answer: (c)
Justification: Refer to slide 4 of lecture 2 from week 5
4. Which of the following properties is/are part of the Outcome-based Business Model ?
(a) Customers are relieved from the responsibilities of ownership and maintenance.
(b)Businesses deliver to the customer the outcome that the product/service provides.
(c) It reduces the negotiation cycle.
(d) All of the above
Answer: (d)
Justification: Refer to slides 16, 17 of lecture 2 from week 5
5. In which of the business models does businesses virtually consolidate and share their IoT-
enabled assets among multiple customers or with other business entities in exchange of revenue?
(a)Asset-Sharing Model.
(b) Outcome-based Model.
(c) Subscription Model.
(d) None of the above
Answer: (a)
Justification: Refer to slides 12-19 of lecture 2 from week 5
Answer: (a)
Justification: Refer to slides 23 24 of lecture 2 from week 5
Answer: (d)
Justification: Refer to slides 25, 26 of lecture 3 from week 5
9. Which one of the following is/are core competency(ies) of the Cloud-based IIoT business
model?
(a) Platform
(b) Data
(c) Software infrastructure
(d) All of the above
Answer: (c)
Justification: Refer to slide 9 of lecture 3 from week 5
Answer: (a)
Justification: Refer to pages 123, 124 from the book Introduction to Industrial Internet of Things
and Industry 4.0.
Answer: (b)
Justification: Refer to slide 7 of lecture 4 from week 5
13. Which of the following is/are not part of the IIRA Framework?
(a) Stakeholder
(b) Viewpoint
(c) Architecture Frame
(d) Position Frame
Answer: (d)
Justification: Refer to slides 10-12 of lecture 4 from week 5
14. How many viewpoints are there in the IIRA?
(a) 6
(b) 4
(c) 5
(d) 3
Answer: (b)
Justification: Refer to slide 2 of lecture 5 from week 5
Answer: (c)
Justification: Refer to slide 11 of lecture 5 from week 5
1. What are the befits of using sensor in industrial applications?
a. Real-time monitoring
b. Improving visibility
c. Remote diagnosis
d. All of the above
Answer: (d)
Answer: (a)
3. ADXL335 sensor can generate the magnitude and direction of the acceleration. True or
false?
a. True
b. False
Answer: (a)
Answer: (c)
a. Torque
b. Acceleration
c. Magnetostrictive
d. None of the above
Answer: (c)
6. MOS is one of the electrical variations of gas sensing methods. What is the full form of MOS?
Answer: (a)
Answer: (d)
a. Clock synchronization
b. Periodic I/O data transfer
c. Local Area Network of field devices
d. All of the above
Answer: (a)
Answer: (b)
a. 10
b. 8
c. 5
d. 254
Answer: (a)
11. Which of the following methods is used by EtherCat for bit error recognition?
a. Hamming code
b. CRC checksum
c. Parity check
d. Binary check
Answer: (b)
Answer: (a)
a. 512
b. 215
c. 125
d. 251
Answer: (a)
Answer: (c)
a. 30-300 GHz
b. 30-300 KHz
c. 30-300 MHz
d. 30-300 Hz
Answer: (a)
a. 12 bytes
b. 140 bytes
c. 100 bits
d. 257 bytes
Answer: (a)
Answer: (c)
3. Which of the following libraries is used to work with LoRA along with NodeMCU?
a. DHT Sensor Library
b. MESH library
c. Radiohead library
d. Stepper library
Answer: (c)
a. IEEE 802.3.4
b. IEEE 802.15.4
c. IEEE 804.15.4
d. IEEE 805.3.4
Answer: (b)
Answer: (d)
a. NodeMCU
b. LoRa
c. Xbee
d. Bluetooth
Answer: (c)
Answer: (d)
Answer: (a)
9. Middleware is a software layer between infrastructure layer and application layer IIoT. True or
false?
a. True
b. False
Answer: (a)
Answer: (b)
a. Batch analytics
b. Runtime analytics
c. Both a and b
d. None of the above
Answer: (c)
12. Industrial rechargeable sensor network uses ____________ for grid-based routing and
charging. Fill in the blanks.
a. Proactive algorithm
b. Reactive algorithm
c. Genetic algorithm
d. TCAM
Answer: (a)
Answer: (a)
14. How many types of control loops are there in industrial control system?
a. Two
b. Four
c. Three
d. Six
Answer: (b)
15. Which of the following types of industrial control systems is used for a highly distributed
industrial plant?
a. SCADA
b. PLC
c. DCS
d. None of the above
Answer: (c)
Answer: (d)
(a) True
(b) False
Answer: (a)
3. Volume, veracity, velocity are the characteristics of which of the following entity?
(a) SDN
(b) Image processing
(c) Big data
(d) Machine learning
Answer: (c)
Answer: (b)
Answer: (b)
Answer: (a)
Answer: (c)
Answer: (c)
9. Select the machine learning-base IIoT application(s) used in the retail sector?
Answer: (c)
Answer: (c)
Answer: (b)
Answer: (c)
(a) MindSphere
(b) Microsoft Azure
(c) DropBox
(d) All of the above
Answer: (c)
(a) Achievable
(b) Meaningful
(c) Affordable
(d) All of the above
Answer: (d)
15. Which of the following is/are the limitation(s) of cloud-based approaches in IIoT?
Answer: (d)
Answer: (d)
Justification: Refer to slide 2 of lecture 1 from week 9
2. Organize the elements of fog computing architecture in ascending order of data processing
delay.
(a) Industrial end devices, Fog devices, and Cloud
(b) Industrial end devices, Cloud, and Fog devices
(c) Cloud, Industrial end devices, and Fog Devices
(d) None of the above
Answer: (a)
Justification: Refer to slide 4 of lecture 1 from week 9
Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 9.
4. What are the advantages of using fog-based architecture in the smart grid and power industry?
(a) Dynamic demand of appliances
(b) Bi-directional communication between the consumer and supplier
(c) Advanced metering infrastructure for bi-directional communication
(d) All of the above
Answer: (d)
Justification: Refer to slide 10 of lecture 1 from week 9
5. Select the advantages of fog-based architecture in the oil and gas industry.
(a) Offering real-time advanced operation
(b) Detection of unusual events
(c) Step by step automation
(d) All of the above
Answer: (d)
Justification: Refer to slide 13 of lecture 1 from week 9
Answer: (a)
Justification: Refer to slide 12 of lecture 2 from week 9
7. Which of the following option is correct?
(a) e1071: Network analysis tools
(b) rpart: Regression tree etc
(c) nnet: Fuzzy clustering, support vector machine, naïve bayes classifier etc
(d) randomForest: Feedforward neural network etc
Answer: (b)
Justification: Refer to slide 14 of lecture 2 from week 9
Answer: (d)
Justification: Refer to slide 18 of lecture 2 from week 9
9. Which of the following options is/are valid for the Julia programming language?
(a) Use println() is used to print
(b) Variables can be assigned without defining the type
(c) Assigning strings
(d) All of the above
Answer: (d)
Justification: Refer to slides 19 and 20 of lecture 2 from week 9
10. Select the correct cloud computing service model (s).
(a) Infrastructure-as-a-Service
(b) Sensing-as-a-Service
(c) Communication-as-a-Service
(d) All of the above
Answer: (d)
Justification: Refer to slide 3 of lecture 3 from week 9
11. Which of the following properties is /are valid for a data center network?
(a) Stable
(b) Secure
(c) Reliable
(d) All of the above.
Answer: (d)
Justification: Refer to slide 4 of lecture 4 from week 9
Answer: (d)
Justification: Refer to slide 2 of lecture 5 from week 9
13. Which of the following aspects is/are true for SDN?
(a) Rule placement
(b) Controller placement
(c) Security
(d) All of the above
Answer: (d)
Justification: Refer to slide 5 of lecture 5 from week 9
Answer: (d)
Justification: Refer to slide 11 of lecture 5 from week 9
Answer: (d)
Justification: Refer to Page 318 of Section 17.4 (Mining Industry) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. What does the abbreviation, TSCH, stands for?
(a) Time slotted channel hopping
(b) Time scheduling channel hopping
(c) Time scheduled communication hopping
(d) None of the above
Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 10
Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 10
Answer: (d)
Justification: Refer to slide 8 of lecture 1 from week 10.
4. In which layer, Software-Defined 6TiSCH supports the slicing mechanism?
(a) Layer 2
(b) Layer 1
(c) Layer 3
(d) Layer 4
Answer: (a)
Justification: Refer to slide 9 of lecture 1 from week 10.
Answer: (b)
Justification: Refer to slide 10 of lecture 1 from week 10.
Answer: (d)
Justification: Refer to slide 12 of lecture 1 from week 10.
7. What is/are the basic step(s) of the IIoT security risk management?
(a) Avoiding risks
(b) Mitigating risks
(c) Outsourcing, accepting, and balancing residual risks
(d) All of the above
Answer: (d)
Justification: Refer to slide 8 of lecture 2 from week 10.
8. Select the correct cyber attacker class(es) from the following options.
(a) Outsourced firms
(b) Internal unethical employees
(c) Organized crime groups
(d) All of the above
Answer: (d)
Justification: Refer to slide 9 of lecture 2 from week 10
9. Which of the following attack vector(s) is/are applicable in the application layer?
(a) Data spoofing
(b) SQL injection
(c) All of the options
(d) Reversal attack
Answer: (c)
Justification: Refer to slide 12 of lecture 2 from week 10.
10. The different type(s) of IIoT attack vectors in the physical layer is/are ________.
(a) DoS or DDoS
(b) Replay attack
(c) Reversal attack
(d) None of the above
Answer: (d)
Justification: Refer to slide 14 of lecture 2 from week 10.
11. The different type(s) of IIoT attack vectors in the network layer is/are ________.
(a) Data spoofing
(b) Reversal attack
(c) None of the options
(d) Impersonation attack
Answer: (c)
Justification: Refer to slide 13 of lecture 2 from week 10.
Answer: (d)
Justification: Refer to slide 3 of lecture 4 from week 10
13. Kuka is a ________.
(a) A German robotics maker company
(b) A German toy maker company
(c) A German mining company
(d) None of the above
Answer: (a)
Justification: Refer to slide 8 of lecture 4 from week 10
14. What is/are the benefit(s) of maintaining transparency in the supply chain?
(a) Availability of real-time data about products
(b) Easier to find inefficiencies
(c) Easier to meet food safety regulations
(d) All of the above
Answer: (d)
Justification: Refer to slide 5 of lecture 5 from week 10
15. What is/are the major challenge(s) associated with the healthcare?
(a) Avoidable medical errors
(b) Increasing age of the population
(c) Costly hospitals and clinics
(d) All of the above
Answer: (d)
Justification: Refer to Page 280 of Section 14.1 (Introduction) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. What is/are the challenges associated with healthcare?
(a) Populations are aging all over the world
(b) Different diseases are increasing
(c) Expenditure of hospitals and medical clinic are increasing
(d) All of the above
Answer: (d)
Justification: Refer to slide 3 of lecture 1 from week 11
2. The number of persons aged 60 years or over is expected to increase more than ________
during 2017-2050.
(a) Double
(b) Triple
(c) Quadruple
(d) Quintuple
Answer: (a)
Justification: Refer to slide 4 of lecture 1 from week 11
3. Which of the following factor(s) is/are considered in authentication in the context of software
security?
(a) Identification of user
(b) Verification of credentials entered (local or remote)
(c) Protection of resources
(d) All of the above
Answer: (d)
Justification: Refer to slide 8 of lecture 4 from week 11.
4. The key factor(s) of software security in the context of plant security and safety is/are
________.
(a) Integrity
(b) Authentication
(c) Availability
(d) All of the above
Answer: (d)
Justification: Refer to slide 6 of lecture 4 from week 11.
Answer: (d)
Justification: Refer to slide 6 of lecture 5 from week 11.
Answer: (d)
Justification: Refer to slide 11 of lecture 5 from week 11.
7. Which parameter is monitored by the device developed by Dexcom?
(a) ECG
(b) Blood
(c) Glucose
(d) Respiration rates
Answer: (c)
Justification: Refer to slide 10 of lecture 1 from week 11.
8. “Asthma is lifelong disease, can be controlled, not cured” ____ state whether the following
statement is true or false.
(a) True
(b) False
Answer: (a)
Justification: Refer to slide 15 of lecture 1 from week 11
Answer: (a)
Justification: Refer to slide 15 of lecture 1 from week 11.
10. Select the correct option (s) from the below.
(a) Google Fit: Keeps track of different physical activities
(b) Health Assistant: Keeps track of health condition
(c) Fingerprint Thermometer: Determine body temperature from the fingerprint
(d) All of the above
Answer: (d)
Justification: Refer to slide 17 of lecture 1 from week 11.
11. Which of the following feature(s) act(s) as the drivers of IIoT in a power plant?
(a) Low cost powerful chips
(b) Standardization with IPV6
(c) Standardization with software technology
(d) All of the above
Answer: (d)
Justification: Refer to slide 3 of lecture 2 from week 11.
12. Which option(s) is/are included in the power flow of a smart grid?
(a) Generation
(b) Transmission
(c) Distribution and consumption
(d) All of the above
Answer: (d)
Justification: Refer to slide 8 of lecture 2 from week 11
13. Inventory management activity entails ________.
(a) Controlling, overseeing, and ordering
(b) Storage
(c) Determine supply for sale
(d) All of the above
Answer: (d)
Justification: Refer to slide 2 of lecture 3 from week 11
Answer: (d)
Justification: Refer to slide 3 of lecture 5 from week 11
15. The IoT-based remote patient health monitoring system is more ________.
(a) Robust
(b) Costly
(c) Secure
(d) All of the above
Answer: (a)
Justification: Refer to Page 279 of Section 14.1 (Introduction) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. The integration of IoT with industry ________
(a) Maximizes profit
(b) Minimizes profit
(c) Does not affect profit optimization
(d) All of the above
Answer: (a)
Justification: Refer to slide 2 of lecture 1 from week 12
2. Which of the following type(s) of analytics is/are used in the oil and gas industry workflow?
(a) Predictive
(b) Prescriptive
(c) Diagnostic
(d) None of the above
Answer: (a)
Justification: Refer to slide 5 of lecture 1 from week 12
3. IoT in the oil and gas industry improves operational excellence by using ________
maintenance.
(a) Predictive
(b) Prescriptive
(c) Diagnostic
(d) Descriptive
Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 12.
4. IoT increases customer loyalty by ________.
(a) Connecting business and car
(b) Smart application
(c) Monitoring energy consumption profiles
(d) All of the above
Answer: (d)
Justification: Refer to slide 8 of lecture 1 from week 12.
Answer: (c)
Justification: Refer to slide 3 of lecture 3 from week 12.
Answer: (c)
Justification: Refer to slide 2 of lecture 3 from week 12.
7. IoT helps the chemical industry by ________.
(a) Reducing energy expenses
(b) Minimizing supply chain risk
(c) Improving logistics
(d) All of the above
Answer: (d)
Justification: Refer to slide 11 of lecture 1 from week 12.
Answer: (a)
Justification: Refer to slide 12 of lecture 1 from week 12
9. Which of the following option(s) is/are true for IoT sensors in the pharmaceutical industry?
(a) Deployed in production areas
(b) Access huge data of different manufacturing departments
(c) Able to control the areas remotely
(d) All of the above
Answer: (d)
Justification: Refer to slide 18 of lecture 1 from week 12.
10. Which of the following factor(s) is/are detected by IoT in the pharmaceutical industry?
(a) Adverse Drugs Reaction (ADR)
(b) Effects of pharmaceutical excipients
(c) Allergies
(d) All of the above
Answer: (d)
Justification: Refer to slide 19 of lecture 1 from week 12.
Answer: (c)
Justification: Refer to slide 2 of lecture 2 from week 12.
12. Which of the following option correctly defines the first generation of UAVs?
(a) Fundamental Remote Control UAVs of different forms
(b) Static design, fixing camera mount, still photography, video recording, and manual
steering control
(c) Added two-axis gimbals, essential safety models. HD video, assisted guiding
(d) Transformable designs with 360°gimbals, high quality video or higher-value
instrumentation, improved piloting modes
Answer: (a)
Justification: Refer to slide 4 of lecture 2 from week 12
13. In which area(s), UAV-based systems can be used?
(a) Agriculture
(b) Construction Sites
(c) Mining
(d) All of the above
Answer: (d)
Justification: Refer to slide 5 of lecture 2 from week 12
14. Which of the following point(s) need to be considered for all industrial case studies?
(a) Transformation of existing processes for Industry 4.0 adoption
(b) Assessment of existing processes
(c) Target objectives
(d) All of the above
Answer: (d)
Justification: Refer to slide 5 of lecture 3 from week 12
15. UAVs use recorded infrared, hyperspectral, and ultraviolet images to ________.
(a) Monitor crop health
(b) Analyze soil quality
(c) Both a and b
(d) None of the above
Answer: (c)
Justification: Refer to Page 95 of Section 4.4.5 (Applications of Industry 4.0) of the book
“Introduction to Industrial Internet of Things and Industry 4.0”.