Introduction to IoT Final Exam study Guide

Ace your homework & exams now with Quizwiz!

33. What are two things that all digital devices need in order to work? (Choose two.)

-Data -computer program

6. A company requires using a secure encrypted internet connection when connecting to the corporate network from outside the company. Which technology should be used when employees travel and use a laptop?

VPN

15. What is used to provide IoT sensors with access to the network?

a microcontroller

8. What is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?

Arduino

26. Which technology is used as a visual programming tool to create a program by connecting colored blocks?

Blockly

repeat the execution of a specific block of code for a specific number of times

For

a comprehensive ecosystem of open-source software for big data management

Hadoop

22. Which type of network consists of wired computers in a college classroom?

LAN

24. Which technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data?

ML

11. Which type of network is the connection between a Bluetooth headset and a vehicle?

PAN

3. Which statement describes global variables in programming languages?

They can be used within any function of a program.

12. True or False? Comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate structured data.

True

7. Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions?

AI

30. What are two requirements to connect a smart device to a home wireless network? (Choose two.)

-IP addressing -SSID

29. What are three benefits of cloud computing? (Choose three.)

-It enables access to organizational data anywhere and at any time. -It streamlines the IT operations of an organization by subscribing only to needed services. -It eliminates or reduces the need for onsite IT equipment, maintenance, and management.

1. What are two characteristics of the Python programming language? (Choose two.)

-It runs without conversion to machine-language. -The code is easy to read. Explanation: A compiled computer language is a computer language that compiles its programs into a set of machine-language instructions, whereas an interpreted programming language allows for an interpretation of the instructions directly without first compiling them into machine language.

31. What are two features of automation? (Choose two.)

-a process that is self-driven -a process that eventually eliminates the need for human intervention

19. Which two types of institutions do malicious web pages often look like? (Choose two.)

-financial -bank

27. What are the two areas of physical security within a data center?

-inside -outside

23. Mined data can be visualized through the use of charts. Select two criteria that can be used to determine the best chart selection. (Choose two.)

-items requiring comparison -number of variables to be shown

25. Which two skills help with IoT prototyping? (Choose two.)

-programming -design

18. Which two data types would be classified as personally identifiable information (PII)? (Choose two.)

-vehicle identification number -Facebook photographs

2. What is the core component of Intent-Based Networking?

artificial intelligence Explanation: Artificial intelligence will allow Intent-Based Networking to automatically configure network device across the network to fulfill network requirements based on the intent of those requirements.

a process that turns raw data into meaningful information using patterns and relationships in data sets

cloud computing

a collection of data centers or connected servers that provide anywhere access to data and applications

cloud services

16. Which security best practice involves defining company rules, job duties, and expectations?

developing a security policy

Breaks large volumes of data into smaller pieces which are processed by computers in different locations

distributed processing

13. What is a key feature of the assurance element of the intent-based networking model?

end-to-end verification of network-wide behavior

an architecture that utilizes edge devices for data preprocessing and storage

fog computing

35. What device provides auto discovery services for smart devices that are connected to the network?

home gateway

allow the code to make decisions

if, then

10. What limits the types of different objects that can become intelligent sensors on the Internet of Things?

our imagination

21. Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the network before?

prototyping

14. Which character is used within a search engine to gather data efficiently by placing the character before and after the name of a particular person?

quotation mark (")

4. What is the largest network in existence?

the internet

20. What is the purpose of data analytics?

to gain new insights from data

28. What is the purpose of Packet Tracer?

to simulate and visualize one or more networks

34. True or False? With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.

true

5. How is data that has been collected through sources such as web pages, audio, or tweets categorized?

unstructured data

17. What are three attributes of data that would indicate that it may be big data? (Choose three.)

volume variety velocity

execute a block of code while a condition is true

while


Related study sets

business ethics and social responsibility

View Set

Chapter 5 Introduction to the Nursing Process

View Set

800-171 CUI Controls (124 Controls)

View Set

Technology&Trade - The Ricardian Model

View Set

Chapter 15 Questions - Anxiety and Obsessive-Compulsive Disorders

View Set

Chapter 14: Telephone Techniques

View Set