Home
O Level
M1 R5: Information Technology Tools and Network Basics
Introduction to Computers
Office Automation Tools
Internet and Web Technologies
Networking Fundamentals
M2 R5: Web Designing and Publishing
HTML
CSS
Javascript
Web Hosting And Publishing
M3 R5: Programming and Problem Solving through Python
Introduction to Programming
Python Programming
Data Structures in Python
File Processing in Python
M4 R5: Internet of Things (IoT) and Its Applications
Introduction to IoT
IoT Architecture
IoT Applications
IoT Security and Challenges | Soft Skills
Other Courses
Under Graduate Courses
BA
BCA
B.COM
Post Graduate Courses
MCA
MBA
M.COM
MA
M.SC.(MATHS)
MSW
Institutional Courses
DCA
ADCA
DFA
DOAP
TALLY PRIME
JAVA
PYTHON
CCA
C Languages
Job Oriented Courses
Digital Marketing
Full Stack Development
Data Science
Cybersecurity and Ethical Hacking
Blockchain Development
Cloud Computing
Artificial Intelligence (AI) and Machine Learning
Government Courses
CCC
O LEVEL
A LEVEL
Mock Test
M1 R5: Information Technology Tools and Network Basics
M2 R5: Web Designing and Publishing
M3 R5: Programming and Problem Solving through Python
M4 R5: Internet of Things (IoT) and Its Applications
Old Papers
2024
New!
Assignments
HTML
New!
CSS
New!
Javascript
New!
Python
New!
Log in
Sign Up
O Level Papers!
M4 R5: Internet of Things (IoT) and Its Applications
Set
25
See Explanation !
1
The scope that hacker can use to break into a system is called as
हैकर जिस स्कोप का उपयोग किसी सिस्टम में घुसने के लिए कर सकता है, उसे.........................
Attack surface
Defense
Principle of least privilege
Risk mitigation
Next Question
25
See Explanation !
2
Bluetooth low Energy is commonly known as:
ब्लूटूथ लो एनर्जी को आमतौर पर निम्न के रूप में जाना जाता है:
Bluetooth 4.0
Bluetooth 4.1
Bluetooth 4.2
Bluetooth 4.3
Previous Question
Next Question
25
See Explanation !
3
New device ID Should be a globally unique identifier
नई डिवाइस आईडी एक वैश्विक रूप से अद्वितीय पहचानकर्ता होनी चाहिए
True
False
May be
None of these
Previous Question
Next Question
25
See Explanation !
4
What is the processor used by ARM7?
ARM7 द्वारा उपयोग किया जाने वाला प्रोसेसर क्या है?
8-bit CISC
8-bit RISC
32-bit CISC
32-bit RISC
Previous Question
Next Question
25
See Explanation !
5
ISM stand for
ISM का मतलब है
Industrial, Scientific and Medical
Information, Scientific and Medical
Industrial, Science and Medical
Industrial, Scientific and Medicine
Previous Question
Next Question
25
See Explanation !
6
What is the primary function of a proximity sensor in an IoT device?
IoT डिवाइस में प्रॉक्सिमिटी सेंसर का प्राथमिक कार्य क्या है?
Measure temperature
Detect nearby objects
Monitor air quality
Measure humidity
Previous Question
Next Question
25
See Explanation !
7
What is the purpose of the MQTT broker in an IoT system?
IoT सिस्टम में MQTT ब्रोकर का उद्देश्य क्या है?
Store and manage IoT devices
Control the flow of messages between devices
Provide power to IoT devices
Encrypt IoT data
Previous Question
Next Question
25
See Explanation !
8
The pre-built circuit boards that fits on the top of Arduino or any other development board are known as
Arduino या किसी अन्य विकास बोर्ड के शीर्ष पर फिट होने वाले पूर्व - निर्मित सर्किट बोर्ड को............ के रूप में जाना जाता है
Vero board
FRC connectors
shields
breadboard
Previous Question
Next Question
25
See Explanation !
9
DNS Database contains
DNS डेटाबेस में शामिल है
hostname aliases
hostname-to-address records
name server records
All of the Above
Previous Question
Next Question
25
See Explanation !
10
Interpersonal communication is a process that involves only sending verbal and non verbal messages.
पारस्परिक संचार एक ऐसी प्रक्रिया है जिसमें केवल मौखिक और गैर - मौखिक संदेश भेजना शामिल है।
True
False
May be
None of these
Previous Question
Next Question
25
See Explanation !
11
The property of any conductor that opposes the flow of electric current through it is known as
किसी भी कंडक्टर की संपत्ति जो इसके माध्यम से विद्युत प्रवाह के प्रवाह का विरोध करती है, के रूप में जाना जाता है
Capacitance
Resistance
Inductance
None of these
Previous Question
Next Question
25
See Explanation !
12
How many pins are there in 8085 Microprocessor?
8085 माइक्रोप्रोसेसर में कितने पिन हैं?
30
35
40
45
Previous Question
Next Question
25
See Explanation !
13
The level shifter converts the voltage levels between RS-232 and transistor. transistor logic.
लेवल शिफ्टर RS -232 और ट्रांजिस्टर के बीच वोल्टेज के स्तर को परिवर्तित करता है। ट्रांजिस्टर लॉजिक।
True
False
May be
None of these
Previous Question
Next Question
25
See Explanation !
14
At which layer of OSI model, router works
OSI मॉडल की किस परत पर, राउटर काम करता है
Transport layer
Session layer
Datalink layer
Network layer
Previous Question
Next Question
25
See Explanation !
15
______________is a program which enters computer system by secretly attaching itself with valid computer program and later steals information.
______________ एक ऐसा प्रोग्राम है जो अपने आप को वैध कंप्यूटर प्रोग्राम से गुप्त रूप से जोड़कर कंप्यूटर सिस्टम में प्रवेश करता है और बाद में जानकारी चुराता है।
Phishing
Surfing
Trojan horse
Wamp
Previous Question
Next Question
25
See Explanation !
16
ICT stands for _____ .
ICT का अर्थ _____ है।
Information and Communication Technology
Internet and Communication Technology
Internet and Communication of Things
Information and Communication of Things
Previous Question
Next Question
25
See Explanation !
17
Unguided transmission media in IoT refers to:
IoT में अनियंत्रित ट्रांसमिशन मीडिया को संदर्भित करता है:
Data transmission through physical cables
Wireless communication through air or space
Data transmission within confined pathways
Only underwater communication
Previous Question
Next Question
25
See Explanation !
18
In Which of the following ARM processors virtual memory is present?
निम्नलिखित में से किस ARM प्रोसेसर में वर्चुअल मेमोरी मौजूद है?
ARM7DI
ARM7TDMI-S
ARM7TDMI
ARM7EJ-S
Previous Question
Next Question
25
See Explanation !
19
In the context of IoT, what does the term "Digital Lock" refer to?
IoT के संदर्भ में, "डिजिटल लॉक" शब्द का क्या अर्थ है?
A lock operated by a digital key
Securing digital files in the cloud
A type of encryption algorithm
An authentication mechanism for IoT devices
Previous Question
Next Question
25
See Explanation !
20
Which of the following sensor is non contact type sensor that detects the presence of an object?
निम्नलिखित में से कौन सा सेंसर नॉन कॉन्टैक्ट टाइप सेंसर है जो किसी ऑब्जेक्ट की उपस्थिति का पता लगाता है?
Proximity sensor
Temperature sensor
light sensor
Pressure sensor
Previous Question
Next Question
25
See Explanation !
21
Which of the following is a key component of an RFID system?
निम्नलिखित में से कौन आरएफआईडी प्रणाली का एक प्रमुख घटक है?
Antenna
Transponder (RFID Tag)
Reader
All of the above
Previous Question
Next Question
25
See Explanation !
22
Closed loop control also known as
बंद लूप नियंत्रण के रूप में भी जाना जाता है
Non-feedback control system
Feedback control system
Open Control System
None of These
Previous Question
Next Question
25
See Explanation !
23
The document that is used to communicate within the organization is called
संगठन के भीतर संवाद करने के लिए उपयोग किए जाने वाले दस्तावेज़ को कहा जाता है
letter
memo
e-mail
telex
Previous Question
Next Question
25
See Explanation !
24
What is the effect of performing AND operation of R with 0xFE ?
0xFE के साथ R के प्रदर्शन और संचालन का क्या प्रभाव है ?
Setting a selected bit of R
Clearing a selected bit of R
Complement selected bit of R
None of these
Previous Question
Next Question
25
See Explanation !
25
What does RFID stand for?
RFID से क्या तात्पर्य है?
Remote Frequency Identification
Radio Frequency Identification
Random Frequency Identification
Real-time Frequency Identification
Previous Question