Iot PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 59

1. In the context of static characteristics of a sensor, which of the following signifies resolution?

a. It provides the smallest change in the input that a sensor is capable of Sensing
b. It is the difference between the standard value and the value produced by Sensor
c. It is the deviation of sensor value curve from a particular straight line
d. It represents the correctness of the output compared to a superior system

Answer: (a)

Justification: Please refer to Slide 9 of Lecture 1 of Week 1

2. What is the general operating voltage range of commercial sensors which are available for
circuit enthusiasts and hobbyists?

a. 3.3 to 5 V
b. 4.5 to 8 V
c. 3.5 to 12 V
d. 3.3 to 8 V

Answer: (a)
EL
Justification: Please refer to page 185 (Section 8.2.6 – Operating Voltage) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al.”.
PT

3. Which of the following actuators produce linear displacement?


N

a. Manual Linear Actuator


b. Fluid Power Linear Actuator
c. Electric Linear Actuator
d. All of the above

Answer: (d)

Justification: Please refer to Slide 24, 26, 29 of Lecture 1 of Week 1

4. IEEE 802.15.4 uses ____________ protocol for data transmission.

a. ALOHA
b. CSMA-CA
c. CSMA-CD
d. None of the above

Answer: (b)
Justification: Please refer to Slide 6 of Lecture 2 of Week 1

5. Which of the following is not an operating frequency of ZigBee?

a. 950 KHz
b. 868 MHz
c. 902-928 MHz
d. 2.4 GHz

Answer: (a)

Justification: Please refer to Slide 11 of Lecture 2 of Week 1

6. What is/are the role(s) of adaptation layer in 6LoWPAN?

a. Packet fragmentation & packet reassembly


b. Compression of header
c. Routing of data link layer
d. All the above

Answer: (d)
EL
Justification: Please refer to Slide 18 of Lecture 2 of Week 1
PT

7. Maximum payload allowed in wireless HART is ______ bytes?


N

a. 63
b. 127
c. 255
d. 512

Answer: (b)

Justification: Please refer to Slide 25 of Lecture 2 of Week 1

8. Radio dead-spots can be bypassed using a process called _____.

a. Healing
b. Multi-hop
c. Adaptation
d. Reduction

Answer: (a)
Justification: Please refer to Slide 5 of Lecture 3 of Week 1

9. In which application domain does ISA 100.11a is primarily used?

a. Home/Office Automation
b. System for Smart Security and Surveillance
c. Systems for Smart Energy Management
d. Automation in large scale complex industries

Answer: (d)

Justification: Please refer to Slide 10 of Lecture 3 of Week 1

10. Which wireless communication technology is based on Ad-hoc Piconets?

a. Wireless HART
b. ZigBee
c. Bluetooth
d. Z-Wave

Answer: (c)
EL
Justification: Please refer to Slide 12 of Lecture 3 of Week 1
PT

11. What does the abbreviation, NFC, stands for?


N

a. New Frequency communication


b. Near Frequency communication
c. Near Field communication
d. Non-Friendly communication

Answer: (c)

Justification: Please refer to Slide 20 of Lecture 3 of Week 1

12. Which of the following work groups extend the integration of the IoT devices from network to
service level.

a. 6LoWPAN
b. ROLL
c. CoRE
d. None of the above

Answer: (c)
Justification: Please refer to Slide 7 of Lecture 4 of Week 1

13. QoS policies for IoT Network includes _______.

a. Resource utilization
b. Data timeliness
c. Data availability
d. All of the above

Answer: (d)

Justification: Please refer to Slide 12 of Lecture 4 of Week 1

14. Which IoT networking protocol supports caching capabilities to improve the response time
and reduce bandwidth consumption?

a. MQTT
b. XMPP
c. CoAP
d. AMQP
EL
Answer: (c)

Justification: Please refer to Slide 12 of Lecture 5 of Week 1


PT

15. Which IoT networking protocol is used in the Military?


N

a. DDS RTPS
b. IEEE 1888
c. AMCP
d. CoAP

Answer: (a)

Justification: Please refer to Slides 23 of Lecture 5 of Week 1


NPTEL Online Certification Courses In-
dian Institute of Technology Kharagpur

Introduction To Industry 4.0 And


Industrial Internet Of Things
Assignment- Week 2

1. Which industrial revolution is coined as “The second Machine Age” by Prof. Erik Brynjolfsson
and Andrew McAfee of MIT?

a. First Industrial Revolution


b. Second Industrial Revolution
c. Third Industrial Revolution
d. Fourth Industrial Revolution
EL

Answer: (d)
PT

Justification: Please refer to Slide 6 of Lecture 1 of Week 2


N

2. Automation in manufacturing system, computers, the Internet, and usage of renewable


energies are some of the advancement in technologies, which took place during the _______.

a. First Industrial Revolution


b. Second Industrial Revolution
c. Third Industrial Revolution
d. Fourth Industrial Revolution

Answer: (c)

a. Justification: Please refer to page 31 (Section - Third Industrial Revolution) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al”.

3. Which of the following is/are probable tipping points in 2025?

a. Intergalactic travels
b. Clothes connected to the internet
c. Mars Exploration
d. AI with human emotions

Answer: (b)

Justification: Please refer to Slide 22 of Lecture 1 of Week 2

4. Which of the following is provided in a sustainable Industry?

a. Renewable energy
b. Low toxic gas emission
c. Low-waste production
d. High value products

Answer: (c)

Justification: Please refer to Slide 2 of Lecture 2 of Week 2

5. Which of the following is an example of Information and Communication Technology (ICT)?


EL

a. Enterprise Resource Planning (ERP)


PT

b. Global Positioning System (GPS)


N

c. Radio Frequency Identification (RFID) system


d. All of the above

Answer: (d)

Justification: Please refer to Slide 7 of Lecture 2 of Week 2

6. How many different categories of countries are there based on population growth?

a. 2
b. 3
c. 4
d. 5

Answer: (b)

Justification: Please refer to Slide 20 of Lecture 2 of Week 2


7. Which of the following is an optimistic view of population growth?

a. Enhances the economic growth


b. Consumes most of the economic investments in safety, need for schools, hospitals,
universities
c. Increases globalization issue such as trade and commerce
d. None of the above

Answer: (c)

Justification: Please refer to Slide 22 of Lecture 2 of Week 2

8. Which company developed Lean Production System?

a. Hyundai Motor Company


b. Honda Motor Company
c. Kia Corporation
d. Toyota motor corporation
EL

Answer: (d)
PT
N

Justification: Please refer to Slide 2 of Lecture 3 of Week 2

9. Why should companies implement lean approach?

a. Increase product quality


b. Improved lead times
c. Cost efficient
d. All of the above

Answer: (d)

Justification: Please refer to Slide 16 of Lecture 3 of Week 2

10. Which of the following cannot be considered as a medium of getting smart and connected?

a. Embedded Systems
b. Cloud computing
c. Manufacturing system
d. Sensors

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 4 of Week 2

11. What are the four key attributes of smart business models?

a. Value addition, revenue enhancements, and technologies


b. Value proposition, revenue centralization, and technologies
c. Value addition, revenue streams, and emerging trends
d. Value proposition, revenue streams, and technologies

Answer: (d)

Justification: Please refer to Slide 12 of Lecture 4 of Week 2

12. Which of the following statements are correct?


EL

a. Physical layer is responsible for collecting and acquiring data from object or
environment.
PT

b. Digital layer processes the data.


N

c. Physical layer is equipped with micro-controllers and sensors.


d. All of the above

Answer: (d)

Justification: Please refer to Slides 20, 21, 22 of Lecture 4 of Week 2

13. ___________ is a flexible system that can self-optimize performance across a broader
network, self-adapt to and learn from new conditions in real or near-real time, and autonomously
run entire production processes.

a. Lean production system


b. Automation system
c. Smart factory
d. Smart city

Answer: (c)

Justification: Please refer to Slide 2 of Lecture 5 of Week 2


14. Which of the following is not a component of smart factory?

a. Smart engineering
b. Smart machines
c. Data analysis
d. Smart ideas

Answer: (d)

Justification: Please refer to Slide 5 of Lecture 5 of Week 2

15. Which of the following is/are the use(s) of Big Data analytics in smart factories?

a. Improving value streams


b. Future prediction
c. Key Performance Indicator
d. All of the above
EL

Answer: (d)
PT
N

Justification: Please refer to Slide 19 of Lecture 5 of Week 2


NPTEL Online Certification Courses In-
dian Institute of Technology Kharagpur

Introduction To Industry 4.0 And


Industrial Internet Of Things
Assignment- Week 03

1. Which of the following is true regarding Cyber-Physical Systems?

a. They are devices having information processing systems embedded into them.
b. They are typically confined to a single device
c. They are networked set of embedded systems
d. All of the above

Answer: (c)

Justification: Please refer to Slide 5 of Lecture 1 of Week 3


EL
2. What are the 5 Cs in the CPS “5C architecture” for Industry 4.0?

a. Connection, Conversion, Cyber, Cognition, Configuration


PT

b. Connection, Communication, Cyber, Cognition, Configuration


c. Connection, Communication, Cyber, Carrier, Configuration
d. Connection, Conversion, Cyber, Cognition, Carrier
N

Answer: (a)

Justification: Please refer to Slide 12 of Lecture 1 of Week 3

3. What are Smart Sensors?

a. They are the integration of sensors and actuators with a processor and a communication
module.
b. They are universal sensors which can sense a wide range of different stimuli.
c. They are the kind of sensors which do not require a power source to operate.
d. All of the above

Answer: (a)

Justification: Please refer to Slide 21 of Lecture 1 of Week 3


4. Which of the following is an example of Collaboration platform?

a. Google Drive
b. Outlook
c. Backblaze
d. ProWork Flow

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 2 of Week 3

5. State true or false — “PLM handles a product completely, from single part of the product to
entire portfolio of that product”.

a. True
b. False

Answer: (a)
EL
Justification: Please refer to Slide 9 of Lecture 2 of Week 3
PT

6. In PLM, how many phases does a product lifecycle have?

a. 3
N

b. 4
c. 5
d. 6

Answer: (c)

Justification: Please refer to Slide 12 of Lecture 2 of Week 3


7. ____________________ is direct/indirect views of physical world environments which are
“augmented” with computer-generated superimposed images

a. Augmented Reality
b. Virtual Reality
c. Both (a) and (b)
d. Neither (a) nor (b)

Answer: (a)

Justification: Please refer to Slide 4 of Lecture 3 of Week 3

8. What are the four different types of Augmented Reality?

a. Marker-Based, Markerless, Fully-immersive, Semi-immersive


b. Marker-Based, Markerless, Non-immersive, Superimposition Based
c. Marker-Based, Non-immersive, Fully-immersive, Semi-immersive
d. Marker-Based, Markerless, Projection Based, Superimposition Based

Answer: (d)

Justification: Please refer to Slide 9 of Lecture 3 of Week 3


EL
9. ________ augmented reality is commonly utilized for mapping directions.
PT

a. Marker-based
b. Markerless
c. Projection Based
N

d. Superimposition Based

Answer: (b)

Justification: Please refer to Slide 10 of Lecture 3 of Week 3

10. Which VR type uses head-mounted displays and motion-detecting devices to simulate
user’s experiences?

a. Fully-immersive simulations
b. Semi-immersive simulations
c. Non-immersive simulations
d. Both (a) and (b)

Answer: (a)

Justification: Please refer to Slide 22 of Lecture 3 of Week 3


11. State true or false — “Linear regression, logistic regression, random forest, decision tree are
some of the most popular unsupervised learning algorithms”.

a. False
b. True

Answer: (a)

Justification: Please refer to page 256 (Subsection - Supervised learning) of the book
“Introduction to Industrial Internet of Things and Industry 4.0 by Misra et. al.”.

12. A computer program without AI uses __________ method whereas computer program with
AI uses _______ method

a. Large database and algorithmic search, Large knowledge base and heuristic search
b. Large knowledge base and heuristic search, Large database and algorithmic search
c. Large knowledge base and algorithmic search, Large database and heuristic search
d. None of the above

Answer: (a)
EL
Justification: Please refer to Slide 5 of Lecture 4 of Week 3
PT

13. Which of the following is correct?


N

a. Machine Learning ⊆ Deep Learning ⊆ Artificial Intelligence


b. Deep Learning ⊆ Artificial Intelligence ⊆ Machine Learning
c. Deep Learning ⊆ Machine Learning ⊆ Artificial Intelligence
d. Artificial Intelligence ⊆ Machine Learning ⊆ Deep Learning

Answer: (c)

Justification: Please refer to Slide 8 of Lecture 4 of Week 3


14. Big data consists of ____________.

a. Both structured and non-structured data


b. Only structured data
c. Only non-structured data
d. None of the above

Answer: (a)

Justification: Please refer to Slide 2 of Lecture 5 of Week 3

15. What does the word “veracity” indicate in Big Data?

a. It indicates the data which have no restriction over the input data formats.
b. It indicates velocity of generation of data.
c. It indicates the data whose meaning is constantly changing.
d. It indicates biasness in the data, unusualness and noise in data.

Answer: (d)

Justification: Please refer to Slide 11 of Lecture 5 of Week 3


EL
PT
N
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

Introduction To Industry 4.0 And Industrial Internet Of Things


Assignment 4
TYPE OF QUESTION: MCQ
Number of questions: 15 Total mark: 15 × 1 = 15

1. Protection of internet-connected systems from cyber-attacks is known as _______.


(a) Network security
(b) Internet security
(c) Web security
(d) Cybersecurity

Answer: (d)
Justification: Refer to slide 2 of lecture 1 from week 4

2. In which category of countermeasure does an application firewall fall?


(a) Hardware
(b) Software
(c) Both (a) and (b)
(d) None of the above

Answer: (b)
Justification: Refer to slide 6 of lecture 1 from week 4

3. State true or false — “Cybersecurity is recognized as a subset of information security”.


(a) True
(b) False

Answer: (b)
Justification: Refer to slide 7 of lecture 1 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

4. Which of the following is/are correct regarding network security?


(a) It provides protection from unofficial access, improper use, fault, deletion, demolition
(b) It is an analytical action which categorizes information benefits.
(c) It ensures the protection of applications from outer threats.
(d) All of the above

Answer: (a)
Justification: Refer to slide 8 of lecture 1 from week 4

5. What is a malware?
(a) A computer program which is used to disturb the computer user, such as computer
viruses, spyware etc.
(b) A computer program which breaks security policy to get critical information, which is
typically secured.
(c) A computer program which provides a facility to the attacker in which the attacker
locks the user’s computer files by using an encryption and demand some money to unlock them.
(d) None of the above

Answer: (a)
Justification: Refer to slide 11 of lecture 1 from week 4

6. What is SDCMA stand for?


(a) Software-Defined Cloud Management Architecture
(b) Software-Developed Cloud Manufacturing Architecture
(c) Software-Developed Cloud Management Architecture
(d) Software-Defined Cloud Manufacturing Architecture

Answer: (d)
Justification: Refer to slide 20 of lecture 1 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

7. What are the three key differences between IIoT and Automation?
(a) Connectivity, advanced analytics, and IT tools and methodologies
(b) Ubiquitous sensing, advanced analytics, and IT tools and methodologies
(c) Advance sensing, connectivity, and IT tools and methodologies
(d) Ubiquitous sensing, connectivity, and advanced analytics

Answer: (b)
Justification: Refer to slide 3 of lecture 2 from week 4

8. What is the role of optimum scheduling in transportation & logistics?


(a) It provides good customer services by reducing cancellation and delays.
(b) It provides better safety to both the on boarded passengers and machines.
(c) It reduces maintenance expenses.
(d) It enhances end-to-end automation.

Answer: (a)
Justification: Refer to slide 22 of lecture 2 from week 4

9. Which one of the following digital industrial companies coined the term, Industrial Internet?
(a) Siemens Global
(b) General Electric
(c) Accenture
(d) Digital Industry

Answer: (b)
Justification: Refer to slide 2 of lecture 3 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

10. The ______________ started with the invention of internal combustion engines and
electricity
(a) First Stage of the Industrial Revolution
(b) Second Stage of the Industrial Revolution
(c) Third Stage of the Industrial Revolution
(d) Fourth Stage of the Industrial Revolution

Answer: (b)
Justification: Refer to slide 6 of lecture 3 from week 4

11. Why is outage a huge problem in power industries?


(a) Because the service provided by any power industry is very large.
(b) Because power lines and other equipment are not mobile.
(c) Because replacing a broken equipment is hard.
(d) Because locating a broken power line or equipment is not an easy task.

Answer: (d)
Justification: Refer to slide 20 of lecture 3 from week 4

12. The emergence of ______ system will replace the isolated systems
(a) Edge-based
(b) Cloud-based
(c) Real-time
(d) All of the above

Answer: (b)
Justification: Refer to slide 23 of lecture 3 from week 4
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur

13. Which of the following is a sensors technology manufacturer?


(a) NVDIA
(b) General Electric
(c) Intel
(d) Honeywell

Answer: (d)
Justification: Refer to slide 22 of lecture 4 from week 4

14. What are the three main modules in PLC architecture?


(a) CPU, power supply, and I/O
(b) Sensors, processor, and actuation
(c) Sensors, CPU, and power supply
(d) Sensors, CPU, and network

Answer: (a)
Justification: Refer to slide 23 of lecture 4 from week 4

15. Which of the following is not an actuators technology manufacturer?


(a) MOOG
(b) SPAT
(c) ADAFRUIT
(d) ZABER

Answer: (c)
Justification: Refer to slides 30 and 22 of lecture 4 from week 4
1. Lumada is an IoT platform with advanced AI-based analytics. Which of the following
companies created Lumada?
(a) Boeing
(b) Hitachi
(c) Amazon
(d) Google

Answer: (b)
Justification: Refer to slide 8 of lecture 1 from week 5

2. Which type of reference architecture for IIoT enables quick device-to-device integrations,
automated data delivery of applications within the buses, isolation of hierarchical subsystems,
and integrations of sensors and actuators ??
(a) Three-tier IIoT architecture
(b) Layered Databus IIoT architecture
(c) Gateway-based IIoT architecture
(d) Virtual IIoT architecture

Answer: (b)
Justification: Refer to pages 114-117 from the book Introduction to Industrial Internet of Things
and Industry 4.0.

3. Values for customer segments in a Business Model can be categorized as ___________.


(a) Qualitative
(b) Quantitative
(c) Both a and b
(d) None of the above

Answer: (c)
Justification: Refer to slide 4 of lecture 2 from week 5

4. Which of the following properties is/are part of the Outcome-based Business Model ?
(a) Customers are relieved from the responsibilities of ownership and maintenance.
(b)Businesses deliver to the customer the outcome that the product/service provides.
(c) It reduces the negotiation cycle.
(d) All of the above

Answer: (d)
Justification: Refer to slides 16, 17 of lecture 2 from week 5

5. In which of the business models does businesses virtually consolidate and share their IoT-
enabled assets among multiple customers or with other business entities in exchange of revenue?
(a)Asset-Sharing Model.
(b) Outcome-based Model.
(c) Subscription Model.
(d) None of the above

Answer: (a)
Justification: Refer to slides 12-19 of lecture 2 from week 5

6. What is/are the challenges of implementing IoT-as-a-Service?


(a) Product compatibility
(b) Better customer relation
(c) Reduced licensing cost
(d) None of the above

Answer: (a)
Justification: Refer to slides 23 24 of lecture 2 from week 5

7. Platform-as-a-Service is a type of_______________.


(a) Cloud-based IIoT business model
(b) Service-oriented IIoT business model
(c) Process-oriented business model
(d) None of the above
Answer: (a)
Justification: Refer to slide 7 of lecture 3 from week 5

8. What is/are the challenges(s) of IIoT business model?


(a)Lack of interoperability
(b) Data privacy and security
(c) Increased cost
(d) All of the above

Answer: (d)
Justification: Refer to slides 25, 26 of lecture 3 from week 5

9. Which one of the following is/are core competency(ies) of the Cloud-based IIoT business
model?
(a) Platform
(b) Data
(c) Software infrastructure
(d) All of the above

Answer: (c)
Justification: Refer to slide 9 of lecture 3 from week 5

10. Which of the following defines IIRA?


(a) It is a standard architecture for IIoT systems
(b) It is a business model for IIoT
(c) It is a factory manufacturing IoT products
(d) It is the fourth stage of the Industrial Revolution
Answer: (a)
Justification: Refer to slide 2 of lecture 4 from week 5

11. What is the function of leading KPI?


(a) Leading KPI is used to predict the economy
(b) Leading KPI is used to measure the changes in economy after it has begun
(c) Leading KPI is used as a technical indicator of the economy after it has begun
(d) Leading KPI captures the number of fatalities for OSH

Answer: (a)
Justification: Refer to pages 123, 124 from the book Introduction to Industrial Internet of Things
and Industry 4.0.

12. What is Industrial Internet Consortium?


(a) A for-profit organization for promotion of open standards
(b) A non-profit organization for promotion of open standards
(c) A software platform
(d) All of the above

Answer: (b)
Justification: Refer to slide 7 of lecture 4 from week 5

13. Which of the following is/are not part of the IIRA Framework?
(a) Stakeholder
(b) Viewpoint
(c) Architecture Frame
(d) Position Frame

Answer: (d)
Justification: Refer to slides 10-12 of lecture 4 from week 5
14. How many viewpoints are there in the IIRA?
(a) 6
(b) 4
(c) 5
(d) 3

Answer: (b)
Justification: Refer to slide 2 of lecture 5 from week 5

15. What is Role in context of the Usage viewpoint of IIRA?


(a) Describes the functional component of the task maps.
(b) Coordination of specific tasks
(c) Set of capacities assumed by an entity or organization
(d) All of the above

Answer: (c)
Justification: Refer to slide 11 of lecture 5 from week 5
1. What are the befits of using sensor in industrial applications?

a. Real-time monitoring
b. Improving visibility
c. Remote diagnosis
d. All of the above

Answer: (d)

Justification: Please refer to Slide 5,6 of Lecture 1 of Week 6

2. What is the function of LM 35 sensor?

a. Analog temperature monitoring


b. Digital temperature monitoring
c. Analog humidity monitoring
d. Digital humidity monitoring

Answer: (a)

Justification: Please refer to Slide 15 of Lecture 1 of Week 6

3. ADXL335 sensor can generate the magnitude and direction of the acceleration. True or
false?

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 19 of Lecture 1 of Week 6


4. MQ-2 sensor is used for measuring the concentration of which of the following gases ?

a. Helium, Argon, Neon


b. Nitrogen, Hydrogen, Oxygen
c. LPG, Propane Hydrogen
d. All of the above

Answer: (c)

Justification: Please refer to Slide 20 of Lecture 1 of Week 6

5. ________ sensor is used to measure time-varying stresses and strains in ferromagnetic


materials?

a. Torque
b. Acceleration
c. Magnetostrictive
d. None of the above

Answer: (c)

Justification: Please refer to Slide 21 of Lecture 1 of Week 6

6. MOS is one of the electrical variations of gas sensing methods. What is the full form of MOS?

a. Metal Oxide Semiconductors


b. Metal Oxide Sensing
c. Monitoring Olfactory Sensor
d. Moisture Onsite Sensing

Answer: (a)

Justification: Please refer to Slide 3 of Lecture 2 of Week 6


7. What is/are the requirements of industrial communication?
a. Real-time communication
b. Low latency
c. Low jitter
d. All of the above

Answer: (d)

Justification: Please refer to Slide 2 of Lecture 3 of Week 6

8. Industrial Ethernet is used in scenarios that require ___.

a. Clock synchronization
b. Periodic I/O data transfer
c. Local Area Network of field devices
d. All of the above

Answer: (a)

Justification: Please refer to Slide 2 of Lecture 3 of Week 6

9.Profinet in industrial communication is based on which of the following technologies?


a. Fieldbus
b. Industrial Ethernet
c. Profibus
d. DeviceNet

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 3 of Week 6


10. How many active connections or sockets are supported by ModBus-TCP, simultaneously?

a. 10
b. 8
c. 5
d. 254

Answer: (a)

Justification: Please refer to Slide 7 of Lecture 3 of Week 6

11. Which of the following methods is used by EtherCat for bit error recognition?

a. Hamming code
b. CRC checksum
c. Parity check
d. Binary check

Answer: (b)

Justification: Please refer to Slide 11 of Lecture 3 of Week 6

12. What is the full form of Profinet?

a. Process Field Network


b. Public Field Network
c. Process Full Network
d. Private Field Networking

Answer: (a)

Justification: Please refer to slide 17 of Lecture 3 of Week 6.


13. What is the maximum number of subscribers supported by the Interbus?

a. 512
b. 215
c. 125
d. 251

Answer: (a)

Justification: Please refer to Slides 8 of Lecture 4 of Week 6

14. Select the statement that best describes Tactile Internet.

a. It enables haptic communication


b. It enables real-time transmission of touch, sense and actuation
c. Both a and b
d. None of the above

Answer: (c)

Justification: Please refer to Slide 15 of Lecture 5 of Week 6

15. What is the frequency spectrum for mmWave communication?

a. 30-300 GHz
b. 30-300 KHz
c. 30-300 MHz
d. 30-300 Hz

Answer: (a)

Justification: Please refer to Slide 26 of Lecture 5 of Week 6.


1. What is the maximum payload of a SIGFOX message?

a. 12 bytes
b. 140 bytes
c. 100 bits
d. 257 bytes

Answer: (a)

Justification: Please refer to Slide 5 of Lecture 1 of Week 7

2. Which of the following modulation techniques is used by LoRA?

a. Frequency-hopping Spread Spectrum Modulation


b. Direct-sequence Spread Spectrum Modulation
c. Chirp Spread Spectrum Modulation
d. Time-hopping Spread Spectrum Modulation

Answer: (c)

Justification: Please refer to Slide 4 of Lecture 1 of Week 7

3. Which of the following libraries is used to work with LoRA along with NodeMCU?
a. DHT Sensor Library
b. MESH library
c. Radiohead library
d. Stepper library

Answer: (c)

Justification: Please refer to Slide 14 of Lecture 1 of Week 7


4. Which of the following protocols is used in the physical and MAC layer of the Zigbee
communication protocol?

a. IEEE 802.3.4
b. IEEE 802.15.4
c. IEEE 804.15.4
d. IEEE 805.3.4
Answer: (b)

Justification: Please refer to Slide 5 of Lecture 2 of Week 7

5. What is a coordinator device in Zigbee network?

a. It is a device to relay information to other nodes in the network


b. It is a node to generate power for the other nodes in the network
c. It is only connected to the parent node with no data relaying
d. It is the root of the network and acts as a bridge between different networks

Answer: (d)

Justification: Please refer to Slide 6 of Lecture 2 of Week 7

6. XCTU is a software is for configuration of which of the following devices?

a. NodeMCU
b. LoRa
c. Xbee
d. Bluetooth

Answer: (c)

Justification: Please refer to Slide 8 of Lecture 2 of Week 7


7. What is/are the characteristic(s) of IIoT data?

a. Correlation in space, time and other dimensions


b. Temporal and causal relationships in data
c. Polymorphism
d. All of the above

Answer: (d)

Justification: Please refer to Slide 3 of Lecture 3 of Week 7

8. What is the function of Rule-based engine in Complex Event Processing (CEP)?

a. Extract causal and temporal patterns using predefined rules


b. Provides services according to device functionality
c. Handle single data stream at a time
d. Batch processing

Answer: (a)

Justification: Please refer to Slide 5 of Lecture 3 of Week 7

9. Middleware is a software layer between infrastructure layer and application layer IIoT. True or
false?

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 7 of Lecture 3 of Week 7


10. What are the different types of business processing analytics?

a. Industrial, private, public


b. Descriptive, prescriptive, predictive
c. Actuation and sensing
d. Predictive, visualization, actuation

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 3 of Week 7

11. What type of analytics is supported by MIDAS: IoT/M2M platform?

a. Batch analytics
b. Runtime analytics
c. Both a and b
d. None of the above

Answer: (c)

Justification: Please refer to Slides 11 of Lecture 3 of Week 7

12. Industrial rechargeable sensor network uses ____________ for grid-based routing and
charging. Fill in the blanks.

a. Proactive algorithm
b. Reactive algorithm
c. Genetic algorithm
d. TCAM

Answer: (a)

Justification: Please refer to Slide 27 of Lecture 4 of Week 7


13. What are the 4 major components of an industrial control system?

a. Set points, process variables, controllers, and manipulating variables


b. Data plane, control plane, variables, and controllers
c. Set points, dynamic points, variables, and controllers
d. Feedback loop, controllers, variables, and actuation

Answer: (a)

Justification: Please refer to Slide 3 of Lecture 5 of Week 7

14. How many types of control loops are there in industrial control system?

a. Two
b. Four
c. Three
d. Six

Answer: (b)

Justification: Please refer to Slide 4 of Lecture 5 of Week 7

15. Which of the following types of industrial control systems is used for a highly distributed
industrial plant?

a. SCADA
b. PLC
c. DCS
d. None of the above

Answer: (c)

Justification: Please refer to Slides 7 of Lecture 5 of Week 7


1. Which of the following is not a part of IIoT analytics ?

(a) Real time data analysis


(b) Dynamic operations optimization
(c) Prognostic maintenance
(d) Renewable energy

Answer: (d)

Justification: Please refer to Slide 4 of Lecture 1 of Week 8

2. Prescriptive analytics is one of the categories of IIoT analytics. True or False?

(a) True
(b) False

Answer: (a)

Justification: Please refer to Slide 5 of Lecture 1 of Week 8

3. Volume, veracity, velocity are the characteristics of which of the following entity?

(a) SDN
(b) Image processing
(c) Big data
(d) Machine learning

Answer: (c)

Justification: Please refer to Slide 7 of Lecture 1 of Week 8

4. Feature engineering is absent in which of the following tools or algorithms?

(a) Machine learning


(b) Deep learning
(c) Both a and b
(d) Clustering

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 1 of Week 8


5. What is the purpose of diagnostic analytics ?

(a) Detect irregular behavior of assets quickly in the timescale of milliseconds


(b) Identify the root cause of an anomaly in the timescale of minutes
(c) Inform about remaining useful life of an asset
(d) None of the above

Answer: (b)

Justification: Please refer to Slide 10 of Lecture 1 of Week 8

6. How many different categories of clustering are there?

(a) 2, hard and soft clustering


(b) 2, long and short clustering
(c) 2, labeled and unlabelled clustering
(d) No categories

Answer: (a)

Justification: Please refer to Slide 8 of Lecture 2 of Week 8

7. Fuzzy c-Means Clustering can be used when -

(a) Data points may belong to more than one clusters


(b) Faster clustering is required
(c) Both a and b
(d) Data points strictly belong to only one cluster

Answer: (c)

Justification: Please refer to Slide 9 of Lecture 2 of Week 8


8. Which of the following statements is/are true about linear regression?

(a) It is an unsupervised learning algorithm


(b) It is used to label the data
(c) It is use for prediction of values
(d) All of the above

Answer: (c)

Justification: Please refer to Slide 11 of Lecture 2 of Week 8

9. Select the machine learning-base IIoT application(s) used in the retail sector?

(a) Drug discovery


(b) Product recommendation
(c) Dynamic price setup
(d) All of the above

Answer: (c)

Justification: Please refer to Slide 22 of Lecture 2 of Week 8

10. Select the correct statement.

(a) Artificial intelligence is a subset of machine learning


(b) Machine learning is a subset of deep learning
(c) Machine learning is a subset of artificial intelligence
(d) Artificial intelligence is a subset of deep learning

Answer: (c)

Justification: Please refer to Slides 3,4 of Lecture 3 of Week 8


11. What does deep in deep learning refer to?

(a) Number of visible neurons


(b) Number of hidden layers
(c) Number of deep neurons
(d) Number of deep layers

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 3 of Week 8

12. What is/are the critical requirement(s) of deep learning applications?

(a) Large amount of data.


(b) High quality data.
(c) Both a and b.
(d) Small amount of data

Answer: (c)

Justification: Please refer to Slide 14 of Lecture 3 of Week 8

13. Which of the following is/are example(s) of Software-as-a-Service?

(a) MindSphere
(b) Microsoft Azure
(c) DropBox
(d) All of the above

Answer: (c)

Justification: Please refer to Slides 8, 9, 10 of Lecture 4 of Week 8


14. What is/are the characteristic(s) of Good SLA?

(a) Achievable
(b) Meaningful
(c) Affordable
(d) All of the above

Answer: (d)

Justification: Please refer to Slide 13 of Lecture 5 of Week 8

15. Which of the following is/are the limitation(s) of cloud-based approaches in IIoT?

(a) Unlimited storage


(b) Interoperability
(c) Cost efficient
(d) Higher latency

Answer: (d)

Justification: Please refer to Slide 17 of Lecture 5 of Week 8


1. What are the advantages of using fog computing in IIoT?
(a) Consistent release of data from sensors and machines
(b) Need for immediate action and quick response
(c) Data may be critical as well as time-sensitive
(d) All of the above

Answer: (d)
Justification: Refer to slide 2 of lecture 1 from week 9

2. Organize the elements of fog computing architecture in ascending order of data processing
delay.
(a) Industrial end devices, Fog devices, and Cloud
(b) Industrial end devices, Cloud, and Fog devices
(c) Cloud, Industrial end devices, and Fog Devices
(d) None of the above

Answer: (a)
Justification: Refer to slide 4 of lecture 1 from week 9

3. Which of the following is/are the characteristic(s) of fog-enabled IIoT?


(a) Real-time monitoring and visualization
(b) Shrinkable processing architecture
(c) Increased overall cost
(d) All of the above

Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 9.
4. What are the advantages of using fog-based architecture in the smart grid and power industry?
(a) Dynamic demand of appliances
(b) Bi-directional communication between the consumer and supplier
(c) Advanced metering infrastructure for bi-directional communication
(d) All of the above

Answer: (d)
Justification: Refer to slide 10 of lecture 1 from week 9

5. Select the advantages of fog-based architecture in the oil and gas industry.
(a) Offering real-time advanced operation
(b) Detection of unusual events
(c) Step by step automation
(d) All of the above

Answer: (d)
Justification: Refer to slide 13 of lecture 1 from week 9

6. Which of the following data type is used in the R programming language?


(a) Logical
(b) Float
(c) Double
(d) String

Answer: (a)
Justification: Refer to slide 12 of lecture 2 from week 9
7. Which of the following option is correct?
(a) e1071: Network analysis tools
(b) rpart: Regression tree etc
(c) nnet: Fuzzy clustering, support vector machine, naïve bayes classifier etc
(d) randomForest: Feedforward neural network etc

Answer: (b)
Justification: Refer to slide 14 of lecture 2 from week 9

8. Why is Julia programming used?


(a) Open source
(b) Distributed computation and parallelism possible
(c) Support efficiently Unicode
(d) All of the above

Answer: (d)
Justification: Refer to slide 18 of lecture 2 from week 9

9. Which of the following options is/are valid for the Julia programming language?
(a) Use println() is used to print
(b) Variables can be assigned without defining the type
(c) Assigning strings
(d) All of the above

Answer: (d)
Justification: Refer to slides 19 and 20 of lecture 2 from week 9
10. Select the correct cloud computing service model (s).
(a) Infrastructure-as-a-Service
(b) Sensing-as-a-Service
(c) Communication-as-a-Service
(d) All of the above

Answer: (d)
Justification: Refer to slide 3 of lecture 3 from week 9

11. Which of the following properties is /are valid for a data center network?
(a) Stable
(b) Secure
(c) Reliable
(d) All of the above.

Answer: (d)
Justification: Refer to slide 4 of lecture 4 from week 9

12. What is SDN?


(a) Restructuring the current network infrastructure for improved network management
(b) It is not a new technology – rather reshaping the current network architecture
(c) Control and data planes are decoupled from the traditional forwarding devices
(d) All of the above.

Answer: (d)
Justification: Refer to slide 2 of lecture 5 from week 9
13. Which of the following aspects is/are true for SDN?
(a) Rule placement
(b) Controller placement
(c) Security
(d) All of the above

Answer: (d)
Justification: Refer to slide 5 of lecture 5 from week 9

14. Select the correct application (s) of SDN.


(a) WSN management
(b) IoT applications
(c) IIoT applications
(d) All of the above

Answer: (d)
Justification: Refer to slide 11 of lecture 5 from week 9

15. The mining industry uses ________ to load/unload mining materials.


(a) Conveyer-belt
(b) Roller
(c) Drum
(d) None of the above

Answer: (d)
Justification: Refer to Page 318 of Section 17.4 (Mining Industry) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. What does the abbreviation, TSCH, stands for?
(a) Time slotted channel hopping
(b) Time scheduling channel hopping
(c) Time scheduled communication hopping
(d) None of the above

Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 10

2. Which type of communication is used in time slotted channel hopping?


(a) Deterministic communication
(b) Non-deterministic communication
(c) Predictive communication
(d) None of the above

Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 10

3. What is/are the objective (s) satisfied in the IETF 6TiSCH?


(a) Unreliable link – low power and lossy network
(b) Control overhead due to message exchange between SDN controller and devices
(c) Increased jitter
(d) All of the above

Answer: (d)
Justification: Refer to slide 8 of lecture 1 from week 10.
4. In which layer, Software-Defined 6TiSCH supports the slicing mechanism?
(a) Layer 2
(b) Layer 1
(c) Layer 3
(d) Layer 4

Answer: (a)
Justification: Refer to slide 9 of lecture 1 from week 10.

5. μSDN incorporates features for minimizing ________ overhead.


(a) Data
(b) Controller
(c) Transmission
(d) All of the above

Answer: (b)
Justification: Refer to slide 10 of lecture 1 from week 10.

6. SD-Edge IIoT architecture comprises of ________.


(a) Cluster head
(b) Industrial cloud
(c) Edge network
(d) All of the above

Answer: (d)
Justification: Refer to slide 12 of lecture 1 from week 10.
7. What is/are the basic step(s) of the IIoT security risk management?
(a) Avoiding risks
(b) Mitigating risks
(c) Outsourcing, accepting, and balancing residual risks
(d) All of the above

Answer: (d)
Justification: Refer to slide 8 of lecture 2 from week 10.

8. Select the correct cyber attacker class(es) from the following options.
(a) Outsourced firms
(b) Internal unethical employees
(c) Organized crime groups
(d) All of the above

Answer: (d)
Justification: Refer to slide 9 of lecture 2 from week 10

9. Which of the following attack vector(s) is/are applicable in the application layer?
(a) Data spoofing
(b) SQL injection
(c) All of the options
(d) Reversal attack

Answer: (c)
Justification: Refer to slide 12 of lecture 2 from week 10.
10. The different type(s) of IIoT attack vectors in the physical layer is/are ________.
(a) DoS or DDoS
(b) Replay attack
(c) Reversal attack
(d) None of the above

Answer: (d)
Justification: Refer to slide 14 of lecture 2 from week 10.

11. The different type(s) of IIoT attack vectors in the network layer is/are ________.
(a) Data spoofing
(b) Reversal attack
(c) None of the options
(d) Impersonation attack

Answer: (c)
Justification: Refer to slide 13 of lecture 2 from week 10.

12. What is/are the benefit(s) of making factory smart?


(a) Reduced changeover time
(b) Reduced production time
(c) Flexibility and easy management
(d) All of the above

Answer: (d)
Justification: Refer to slide 3 of lecture 4 from week 10
13. Kuka is a ________.
(a) A German robotics maker company
(b) A German toy maker company
(c) A German mining company
(d) None of the above

Answer: (a)
Justification: Refer to slide 8 of lecture 4 from week 10

14. What is/are the benefit(s) of maintaining transparency in the supply chain?
(a) Availability of real-time data about products
(b) Easier to find inefficiencies
(c) Easier to meet food safety regulations
(d) All of the above

Answer: (d)
Justification: Refer to slide 5 of lecture 5 from week 10

15. What is/are the major challenge(s) associated with the healthcare?
(a) Avoidable medical errors
(b) Increasing age of the population
(c) Costly hospitals and clinics
(d) All of the above

Answer: (d)
Justification: Refer to Page 280 of Section 14.1 (Introduction) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. What is/are the challenges associated with healthcare?
(a) Populations are aging all over the world
(b) Different diseases are increasing
(c) Expenditure of hospitals and medical clinic are increasing
(d) All of the above

Answer: (d)
Justification: Refer to slide 3 of lecture 1 from week 11

2. The number of persons aged 60 years or over is expected to increase more than ________
during 2017-2050.
(a) Double
(b) Triple
(c) Quadruple
(d) Quintuple

Answer: (a)
Justification: Refer to slide 4 of lecture 1 from week 11

3. Which of the following factor(s) is/are considered in authentication in the context of software
security?
(a) Identification of user
(b) Verification of credentials entered (local or remote)
(c) Protection of resources
(d) All of the above

Answer: (d)
Justification: Refer to slide 8 of lecture 4 from week 11.
4. The key factor(s) of software security in the context of plant security and safety is/are
________.
(a) Integrity
(b) Authentication
(c) Availability
(d) All of the above

Answer: (d)
Justification: Refer to slide 6 of lecture 4 from week 11.

5. What is/are the scope(s) of IoT in the facility management?


(a) Accessing new insights
(b) Implementing new technologies
(c) Addressing cost barriers
(d) All of the above

Answer: (d)
Justification: Refer to slide 6 of lecture 5 from week 11.

6. Which resource(s) is/are optimized in the IoT-based facility management system?


(a) Manpower
(b) Assets
(c) Technology
(d) All of the above

Answer: (d)
Justification: Refer to slide 11 of lecture 5 from week 11.
7. Which parameter is monitored by the device developed by Dexcom?
(a) ECG
(b) Blood
(c) Glucose
(d) Respiration rates

Answer: (c)
Justification: Refer to slide 10 of lecture 1 from week 11.

8. “Asthma is lifelong disease, can be controlled, not cured” ____ state whether the following
statement is true or false.
(a) True
(b) False

Answer: (a)
Justification: Refer to slide 15 of lecture 1 from week 11

9. Which of the following parameter(s) is/are monitored by ADAMM?


(a) Asthma
(b) Blood pressure
(c) Body temperature
(d) Oxygen saturation level

Answer: (a)
Justification: Refer to slide 15 of lecture 1 from week 11.
10. Select the correct option (s) from the below.
(a) Google Fit: Keeps track of different physical activities
(b) Health Assistant: Keeps track of health condition
(c) Fingerprint Thermometer: Determine body temperature from the fingerprint
(d) All of the above

Answer: (d)
Justification: Refer to slide 17 of lecture 1 from week 11.

11. Which of the following feature(s) act(s) as the drivers of IIoT in a power plant?
(a) Low cost powerful chips
(b) Standardization with IPV6
(c) Standardization with software technology
(d) All of the above

Answer: (d)
Justification: Refer to slide 3 of lecture 2 from week 11.

12. Which option(s) is/are included in the power flow of a smart grid?
(a) Generation
(b) Transmission
(c) Distribution and consumption
(d) All of the above

Answer: (d)
Justification: Refer to slide 8 of lecture 2 from week 11
13. Inventory management activity entails ________.
(a) Controlling, overseeing, and ordering
(b) Storage
(c) Determine supply for sale
(d) All of the above

Answer: (d)
Justification: Refer to slide 2 of lecture 3 from week 11

14. What is/are the component(s) of a facility management system?


(a) Buildings
(b) Finance
(c) People
(d) All of the above

Answer: (d)
Justification: Refer to slide 3 of lecture 5 from week 11

15. The IoT-based remote patient health monitoring system is more ________.
(a) Robust
(b) Costly
(c) Secure
(d) All of the above

Answer: (a)
Justification: Refer to Page 279 of Section 14.1 (Introduction) of the book “Introduction to
Industrial Internet of Things and Industry 4.0”.
1. The integration of IoT with industry ________
(a) Maximizes profit
(b) Minimizes profit
(c) Does not affect profit optimization
(d) All of the above

Answer: (a)
Justification: Refer to slide 2 of lecture 1 from week 12

2. Which of the following type(s) of analytics is/are used in the oil and gas industry workflow?
(a) Predictive
(b) Prescriptive
(c) Diagnostic
(d) None of the above

Answer: (a)
Justification: Refer to slide 5 of lecture 1 from week 12

3. IoT in the oil and gas industry improves operational excellence by using ________
maintenance.
(a) Predictive
(b) Prescriptive
(c) Diagnostic
(d) Descriptive

Answer: (a)
Justification: Refer to slide 7 of lecture 1 from week 12.
4. IoT increases customer loyalty by ________.
(a) Connecting business and car
(b) Smart application
(c) Monitoring energy consumption profiles
(d) All of the above

Answer: (d)
Justification: Refer to slide 8 of lecture 1 from week 12.

5. Which of the following option(s) is/are included in a case study?


(a) A small geographical area
(b) A very limited number of individuals
(c) Both a and b
(d) All of the above

Answer: (c)
Justification: Refer to slide 3 of lecture 3 from week 12.

6. Which of the following point(s) is/are true for a case study?


(a) Provides in-depth knowledge about the topic
(b) Provides clarity of concepts regarding the research topic
(c) Both a and b
(d) None of the above

Answer: (c)
Justification: Refer to slide 2 of lecture 3 from week 12.
7. IoT helps the chemical industry by ________.
(a) Reducing energy expenses
(b) Minimizing supply chain risk
(c) Improving logistics
(d) All of the above

Answer: (d)
Justification: Refer to slide 11 of lecture 1 from week 12.

8. In the context of "IoT in Chemical Industry," the predictive maintenance ________.


(a) Reduces equipment breakdown
(b) Increases equipment breakdown
(c) Does not affect equipment breakdown
(d) All of the above

Answer: (a)
Justification: Refer to slide 12 of lecture 1 from week 12

9. Which of the following option(s) is/are true for IoT sensors in the pharmaceutical industry?
(a) Deployed in production areas
(b) Access huge data of different manufacturing departments
(c) Able to control the areas remotely
(d) All of the above

Answer: (d)
Justification: Refer to slide 18 of lecture 1 from week 12.
10. Which of the following factor(s) is/are detected by IoT in the pharmaceutical industry?
(a) Adverse Drugs Reaction (ADR)
(b) Effects of pharmaceutical excipients
(c) Allergies
(d) All of the above

Answer: (d)
Justification: Refer to slide 19 of lecture 1 from week 12.

11. UAVs connected to IoT ________.


(a) Can be programmed once
(b) Cannot be programmed
(c) Can be programmed multiple times
(d) None of the above

Answer: (c)
Justification: Refer to slide 2 of lecture 2 from week 12.

12. Which of the following option correctly defines the first generation of UAVs?
(a) Fundamental Remote Control UAVs of different forms
(b) Static design, fixing camera mount, still photography, video recording, and manual
steering control
(c) Added two-axis gimbals, essential safety models. HD video, assisted guiding
(d) Transformable designs with 360°gimbals, high quality video or higher-value
instrumentation, improved piloting modes

Answer: (a)
Justification: Refer to slide 4 of lecture 2 from week 12
13. In which area(s), UAV-based systems can be used?
(a) Agriculture
(b) Construction Sites
(c) Mining
(d) All of the above

Answer: (d)
Justification: Refer to slide 5 of lecture 2 from week 12

14. Which of the following point(s) need to be considered for all industrial case studies?
(a) Transformation of existing processes for Industry 4.0 adoption
(b) Assessment of existing processes
(c) Target objectives
(d) All of the above

Answer: (d)
Justification: Refer to slide 5 of lecture 3 from week 12

15. UAVs use recorded infrared, hyperspectral, and ultraviolet images to ________.
(a) Monitor crop health
(b) Analyze soil quality
(c) Both a and b
(d) None of the above

Answer: (c)
Justification: Refer to Page 95 of Section 4.4.5 (Applications of Industry 4.0) of the book
“Introduction to Industrial Internet of Things and Industry 4.0”.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy