Intro to IoT Final Exam Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

A company requires using a secure encrypted internet connection when connecting to the corporate network form outside the company. Which technology should be used when employees travel and use a laptop?

VPN

What are three attributes of data that would indicate that it may be big data?

Volume; Velocity, and Variety

Fog Computing

An architecture that utilizes edge devices for data pre-processing and storage.

What is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?

Arduino

What are some examples of data types that would be classified as personally identifiable information (PII)?

Bank account, Birth Date, Phone Number, Credit card or Social Security #, etc.

Which type of institutions do malicious web pages often look like?

Banks or Financial Institutions

Which technology is used as a visual programming tool to create a program by connecting colored blocks?

Blockly

Distributed Processing

Breaks large volumes of data into smaller pieces which are processed by computers in different locations.

What are two things that all digital devices need in order to work?

Data and Computer Programming

Which two skills help with IoT prototyping?

Design and Programming/Coding

What is a key feature of assurance element of the internet-based networking model?

End to end verification of network behavior.

While

Execute a block of code while a condition is true.

What are 3 benefits of cloud computing?

Flexibility/ Efficiency/Shares and Stores Data

What are two requirements to connect a smart device to a home wireless network?

IP/SSID and Home-gateway

What is the largest network in existence?

Internet

Which describes global variables in programming languages?

It happens anywhere in the program.

Which type of network consists of wired computers in a college classroom?

LAN(Local Area Network)

Which technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data?

Machine Learning

What limits the types of different objects that can become intelligent sensors on the IoT?

Our Imagination

What are two areas of physical security within a data center?

Outside and Inside the facility

Which type of network is the connection between Bluetooth headset and a vehicle?

PAN(Personal Area Network)

What device provides auto discovery services for smart devices that are connected to the network?

Packet Tracer

Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the network before.

Prototyping is the process of creating a walking model of a product or system.

What are two features of automation?

Reduces and eliminates human intervention/ and it is self driven.

For

Repeat the execution of a specific block of code for a specific number of times.

Which security best practice involves defining company rules, job duties, and expectations?

Security Policy

Mined data can be visualized through the use of charts. What are the criteria that can be used to determine the best chart selection?

The number of variables shown and things you need to compare.

What is the purpose of Packet Tracer?

To create a simulation and visualize a real network.

What is the purpose of data analytics?

To further new information.

True or False? Comma-separated values (CVS), JSON, and XML are all tools that can be used to manipulate structured data.

True

True or False? With AI, smart devices can modify processes and settings on the fly in response to changes on the network.

True

How is data that has been collected through sources such as web pages, audio, or tweet categorized?

Unstructured Data

What is used to provide IoT sensors with access to the network?

Smart Devices

Hadoop

A comprehensive ecosystem of open-source software for big data management.

What is the core component of Intent-Based Networking?

AI

Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions?

AI(Artificial Intelligence)

If-Then

Allows the code to make a decision.

Which character is used within a search engine to gather data efficiently by placing the character before and after the name of a particular person?

"____"

What are two characteristics of the Python programming language?

1) Beautiful is better that ugly 2) Explicit is better than implicit

Cloud Service

A collection of data center or connected servers that provide anywhere anytime access to data and applications.


Conjuntos de estudio relacionados

Psych Quiz Questions Ch. 8, 9, & 10

View Set

Funds P.u. chp 27 Safety, Security, and Emergency Preparedness

View Set

Exam Fundamentals VS/Assessment what I remember is on the test and most likely the right answers

View Set