Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

151.

The term break derives from ___________ signaling.(a) Current loop(b) Voltage loop(c) Power loop(d) Current and Power loopThis question was posed to me in an interview for job.The question is from UART Protocol in division Internet Principles of IOT

Answer» CORRECT CHOICE is (a) Current LOOP

The best I can EXPLAIN: The term break derives from current loop SIGNALING, which was the traditional signaling used for teletypewriters.
152.

Master transmits means _________(a) Master node is sending data to a slave(b) Master node is receiving data from slave(c) Slave node is transmitting data to master(d) Slave node is sending data to masterI have been asked this question in a job interview.The query is from I2C Protocol in chapter Internet Principles of IOT

Answer»

The correct answer is (a) Master node is sending data to a slave

The EXPLANATION: There may be FOUR potential modes of operation for a given bus device, although most devices only use a single role and its TWO modes:

-> Master TRANSMIT – Master node is sending data to a slave

-> Maser receive – Master node is receiving data from slave

-> Slave transmit – lave node is transmitting data to master

-> Slave receive – Slave node is sending data to master.

153.

Secure digital card application uses which protocol?(a) UART(b) SPI(c) I2C(d) USARTI had been asked this question at a job interview.This question is from SPI Protocol in section Internet Principles of IOT

Answer»

Right ANSWER is (b) SPI

For explanation: The typical applications of SPI protocol are secure DIGITAL cards and liquid crystal DISPLAYS.

154.

Which error occurs when the receiver can’t process the character?(a) Overrun error(b) Underrun error(c) Framing error(d) Break conditionThis question was addressed to me during an interview.My question is based upon UART Protocol in chapter Internet Principles of IOT

Answer»

Correct option is (a) Overrun ERROR

Easy explanation: An over run error occur when the receiver cannot process the character that just came in before the next one arrives. If the CPU or DMA controller does not SERVICE the UART QUICKLY enough and the buffer BECOME full, an over run will occur, and incoming will be LOST.

155.

MAC addresses are used as ________(a) Network addresses(b) IP address(c) Hardware address(d) Burned in addressI got this question during an online exam.This question is from MAC Address in portion Internet Principles of IOT

Answer» RIGHT OPTION is (a) Network addresses

Easiest explanation: MAC address is used as a network address for most IEEE 802 network technologies, including ETHERNET and Wi-Fi. Logically, MAC addresses are used in the media access control protocol sub layer of the OSI model.
156.

What translates IP address into MAC address?(a) Organizationally Unique Identifier(b) Address Resolution Protocol(c) Network Interface Card(d) Burned In AddressI have been asked this question by my school principal while I was bunking the class.I want to ask this question from MAC Address in portion Internet Principles of IOT

Answer»

The correct answer is (c) Network Interface Card

The best explanation: A MAC address is GIVEN to an adapter when it is manufactured. It is hardwired or hard-coded ONTO your computer’s NIC and it is UNIQUE to it. Something called the ARP (Address Resolution Protocol) translates an IP address into MAC address.

157.

What is the format of IP address?(a) 34 bit(b) 64 bit(c) 16 bit(d) 32 bitThe question was posed to me by my school principal while I was bunking the class.I need to ask this question from IP Address in portion Internet Principles of IOT

Answer»

The CORRECT option is (d) 32 bit

The explanation: The FORMAT of an IP address is a 32-bit numeric address written as FOUR numbers separated by periods. Each number can be zero to 255. For EXAMPLE, 1.160.10.240 could be an IP address.

158.

Transport layer receives data in the form of __________(a) Packets(b) Byte streams(c) Bits stream(d) Both packets and Byte streamThe question was asked in exam.My doubt is from Transport Layer in division Internet Principles of IOT

Answer»

The correct option is (b) BYTE streams

The explanation is: Some applications PREFER to receive byte stream INSTEAD of packets; the transport layer allows for the TRANSMISSION of byte-orientated data stream if REQUIRED.

159.

Packets will be transferred in how many types?(a) 5 types(b) 4 types(c) 2 types(d) 3 typesI got this question by my college director while I was bunking the class.This interesting question is from Network Layer in chapter Internet Principles of IOT

Answer»

The CORRECT choice is (d) 3 types

For explanation: Routing deals with determining how packet will routed (TRANSFERRED) from SOURCE to DESTINATION. It can of three types : 1. Static

2. Dynamic

3. Semi Dynamic.

160.

What are the common protocols associated with the network layer?(a) Address Resolution Protocol(b) Reverse Address Resolution Protocol(c) Internet protocol(d) Neighbour Discovery ProtocolThe question was asked in an online interview.My enquiry is from Network Layer in portion Internet Principles of IOT

Answer»

Correct answer is (c) INTERNET PROTOCOL

Explanation: Internet protocol and Netware IPX/SPX are the most common protocols ASSOCIATED with the network LAYER.

161.

In XMPP In band binary data format is __________(a) High(b) Very high(c) Limited(d) Ultra highThe question was posed to me in exam.My query is from XMPP Protocol in division Internet Principles of IOT

Answer»

Right choice is (c) Limited

Best explanation: BINARY data must be FIRST base64 encoded before it can be TRANSMITTED in band. Therefore, any SIGNIFICANT amount of binary data is best transmitted out of band, using in band message to coordinate.

162.

CoAP feels very much like HTTP.(a) True(b) FalseThe question was asked by my school teacher while I was bunking the class.Question is taken from CoAP Protocol in section Internet Principles of IOT

Answer» CORRECT choice is (a) True

The explanation: From a developer point of VIEW, CoAP FEELS very MUCH like HTTP. Obtaining a value from a SENSOR is not much different from obtaining a value from a Web API.
163.

CoAP does not provide any security.(a) True(b) FalseI had been asked this question at a job interview.This is a very interesting question from CoAP Protocol topic in chapter Internet Principles of IOT

Answer»

Correct option is (b) False

Best explanation: The Internet of Things cannot SPREAD as long as it can be exploited by hackers willy-nilly. CoAP does not just pay lip service to security, it actually provides strong security. CoAP’s DEFAULT choice of DTLS parameters is equivalent to 3072-bit RSA keys, yet still RUNS fine on the SMALLEST nodes.

164.

CoAP is designed for use between devices on the same constrained network.(a) True(b) FalseThis question was addressed to me during an interview for a job.I'm obligated to ask this question of CoAP Protocol topic in division Internet Principles of IOT

Answer» RIGHT CHOICE is (a) True

To elaborate: CoAP is designed for use between devices on the same constrained network (e.g., low-power, LOSSY networks), between devices and GENERAL nodes on the INTERNET, and between devices on different constrained networks both joined by an internet.
165.

SPI uses how many lines?(a) 4 lines(b) 1 line(c) 3 lines(d) 2 linesThe question was asked in an interview.Asked question is from SPI Protocol in chapter Internet Principles of IOT

Answer»

Correct answer is (d) 2 lines

Explanation: SPI USES separate clock and data lines, along with a SELECT LINE to choose the device we wish to TALK to.

166.

CoAP provides which of the following requirements?(a) Multicast support and simplicity(b) Low overhead and multicast support(c) Simplicity and low overhead(d) Multicast support, Low over head, and simplicityI had been asked this question by my college professor while I was bunking the class.Question is from CoAP Protocol in division Internet Principles of IOT

Answer»

Right CHOICE is (d) Multicast support, Low over head, and simplicity

The explanation is: Multicast, low overhead, and simplicity are extremely important for INTERNET of Things (IoT) and Machine-to-Machine (M2M) devices, which tend to be deeply EMBEDDED and have much less MEMORY and power supply than TRADITIONAL internet devices have.

167.

The secondary implementation uses a fixed second clock divided which is divided by ______________(a) 4(b) 8(c) 32(d) 16I have been asked this question in an international level competition.Question is from USART Protocol in portion Internet Principles of IOT

Answer»

Right option is (d) 16

The explanation is: The STANDARD implementation USES a prescalar from any CLOCK source and a fixed second clock divider which is USUALLY a divided by 16.

168.

What is the timing of X?(a) 1/32 to 1/64 times of BRCKL(b) 1/42 to 1/63 times of BRCKL(c) 1/32 to 1/63 times of BRCKL(d) 1/32 to 1/56 times of BRCKLI got this question during an internship interview.The query is from USART Protocol in chapter Internet Principles of IOT

Answer»

The correct ANSWER is (C) 1/32 to 1/63 times of BRCKL

To elaborate: The timing of x is 1/32 to 1/63 of BRCLK, but at least BRCLK, DEPENDING on the division on the division RATE of the baud rate generation.

169.

During receiving operation what does URXD have?(a) Positive edge(b) Negative edge(c) Level edge(d) Either raising or falling edgeThis question was addressed to me in an interview.My question is taken from USART Protocol in division Internet Principles of IOT

Answer»

The correct answer is (a) POSITIVE EDGE

The explanation is: The RECEIVE operation is INITIATED by the RECEIPT of a valid start bit. It consists of a negative edge at URXD, followed by the taking of majority vote from three samples, where 2 of the samples must be zero.

170.

What does UART contain?(a) Parallel register(b) Shift register(c) Clock(d) Parallel shift registerThe question was posed to me in an online interview.I'd like to ask this question from UART Protocol topic in section Internet Principles of IOT

Answer» CORRECT OPTION is (b) Shift register

To EXPLAIN I WOULD say: UART contains a shift register, which is the fundamental method of conversion between serial and parallel forms.