2018-2019 Intro to IoT Mid-Term Exam Review
Which two data types would be classified as personally identifiable information (PII)? (Choose two.)
1) Facebook photographs 2) vehicle identification number
What are three benefits of cloud computing? (Choose three.)
1) It streamlines the IT operations of an organization by subscribing only to needed services. 2) It eliminates or reduces the need for onsite IT equipment, maintenance, and management. 3) It enables access to organizational data anywhere and at any time.
What are two requirements to connect a smart device to a home wireless network? (Choose two.)
1) SSID 2) IP addressing
What are two characteristics of the Python programming language? (Choose two.)
1) The code is easy to read. 2) It runs without conversion to machine-language.
What are two features of automation? (Choose two.)
1) a process that is self-driven 2) a process that eventually eliminates the need for human intervention
What are two things that all digital devices need in order to work? (Choose two.)
1) computer program 2) data
Which two types of institutions do malicious web pages often look like? (Choose two.)
1) financial 2) bank
What are the two areas of physical security within a data center?
1) inside 2) outside
Mined data can be visualized through the use of charts. Select two criteria that can be used to determine the best chart selection. (Choose two.)
1) number of variables to be shown 2) items requiring comparison
Which two skills help with IoT prototyping? (Choose two.)
1) programming 2) design
What are three attributes of data that would indicate that it may be big data? (Choose three.)
1) variety 2) velocity 3) volume
Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions?
AI
What is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?
Arduino
Which technology is used as a visual programming tool to create a program by connecting colored blocks?
Blockly
Which type of network consists of wired computers in a college classroom?
LAN
Which technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data?
ML
Which type of network is the connection between a Bluetooth headset and a vehicle?
PAN
Which statement describes global variables in programming languages?
They can be used within any function of a program.
Comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate structured data.
True
With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.
True
A company requires using a secure encrypted internet connection when connecting to the corporate network from outside the company. Which technology should be used when employees travel and use a laptop?
VPN
cloud services
a collection of data centers or connected servers that provide anywhere anytime access to data and applications
Hadoop
a comprehensive ecosystem of open-source software for big data management
What is used to provide IoT sensors with access to the network?
a microcontroller
If-Then
allow the code to make decisions
fog computing
an architecture that utilizes edge devices for data preprocessing and storage
What is the core component of Intent-Based Networking?
artificial intelligence
distributed processing
breaks large volumes of data into smaller pieces which are processed by computers in different locations
Which security best practice involves defining company rules, job duties, and expectations?
developing a security policy
What is a key feature of the assurance element of the intent-based networking model?
end-to-end verification of network-wide behavior
While
execute a block of code while a condition is true
What device provides auto discovery services for smart devices that are connected to the network?
home gateway
What limits the types of different objects that can become intelligent sensors on the Internet of Things?
our imagination
Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the network before?
prototyping
Which character is used within a search engine to gather data efficiently by placing the character before and after the name of a particular person?
quotation mark (")
For
repeat the execution of a specific block of code for a specific number of times
What is the largest network in existence?
the internet
What is the purpose of data analytics?
to gain new insights from data
What is the purpose of Packet Tracer?
to simulate and visualize one or more networks
How is data that has been collected through sources such as web pages, audio, or tweets categorized?
unstructured data