FREL2 PRELIM EXAM - Set01

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

COLEGIO DE DAGUPAN

Arellano St., Dagupan City


PRELIM EXAMINATION
FREL2 FREE ELECTIVE 2
PLEASE WRITE YOUR NAME HERE ↓
Instructions: Name: _____________________________________
Turn off your cell phone/s. Use of CP is not allowed during exam. Course, Year and Block: _______________________
Write ALL YOUR ANSWERS legibly on your TEST BOOKLET. Subject Code & Description: ___________________
Use blue or black pen only. Strictly: NO ERASURE. ___________________________________________
READ and FOLLOW the DIRECTIONS carefully! Date: ______________________________________

SET A

True/False
Indicate whether the statement is true or false.

1. Digital Sensors produce an analog output i.e. a continuous output signal with respect to the quantity being measured.
2. Analog Sensors, work with discrete or digital data. The data in digital sensors, which is used for conversion and transmission,
is digital in nature.
3. A Transmissive Type IR Sensor, the IR Transmitter (usually an IR LED) and the IR Detector (usually a Photo Diode) are
positioned adjacent to each other facing the object so that when an object passes between them, the sensor detects the object.
4. In a Reflective Type IR Sensor, the transmitter and the detector are positioned facing each other. When an object comes in
front of the sensor, the sensor detects the object.
5. An Ultrasonic Sensor is a non-contact type device that can be used to measure distance as well as velocity of an object.
6. Proximity Sensors can be implemented using different techniques like Optical (like Infrared or Laser), Ultrasonic, Hall
Effect, Capacitive, etc.
7. Businesses need to process huge amounts of data. This requires less amounts of processing power, sophisticated software and
human analytical skills.
8. IT governance is a catchall category for the daily work of an IT department. This includes providing tech support, network
maintenance, security testing and device management duties.
9. Physiological and behavioral characteristics are used to identify an individual and the science behind this is known as
Biometrics.
10. Some of the means of detection used in sensors are Electric, Biological, Chemical, Radioactive etc.

Multiple Choice
Choose the letter that best completes the statement or answers the following statements. Write your answers in UPPERCASE form.

1. Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices
to communicate in a standard fashion?
a. Security
b. Privacy
c. Compliance
d. Interoperability

2. Which one of the following is NOT a market driver for the Internet of Things (IoT)?
a. Smaller and faster computing
b. Growth of cloud computing
c. Global adoption of non-IP networking
d. Advancement in data analytics

3. Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the
system, hosted at the vendor's site, using a web browser. Which service delivery model is Kaira's company using?
a. Platform as a Service (PaaS)
b. SaaS (SaaS)
c. Communications as a Service (CaaS)
d. Infrastructure as a Service (IaaS)

4. Which one of the following is NOT an example of store-and-forward messaging?


a. Telephone call
b. Voicemail
c. Unified messaging
d. Email

5. Gwen's company is planning to accept credit cards over the Internet. Which one of the following governs this type of activity
and includes provisions that Gwen should implement before accepting credit card transactions?
a. Health Insurance Portability and Accountability Act (HIPAA)
b. Family Educational Rights and Privacy Act (FERPA)

/adfortin PRELIM EXAMINATION Page 1 of 5


Education is a key to success!
COLEGIO DE DAGUPAN
Arellano St., Dagupan City
PRELIM EXAMINATION
FREL2 FREE ELECTIVE 2
c. Communications Assistance for Law Enforcement Act (CALEA)
d. Payment Card Industry Data Security Standard (PCI DSS)

6. Ron is the IT director at a medium-sized company and is constantly bombarded by requests from users who want to select
customized mobile devices. He decides to allow users to purchase their own devices. Which type of policy should Ron
implement to include the requirements and security controls for this arrangement?
a. Privacy
b. Acceptable use
c. Bring Your Own Device (BYOD)
d. Data classification

7. Which scenario presents a unique challenge for developers of mobile applications?


a. Applying encryption to network communications
b. Selecting multiple items from a list
c. Obtaining Internet Protocol (IP) addresses
d. Using checkboxes

8. With the use of Mobile IP, which device is responsible for keeping track of mobile nodes (MNs) and forwarding packets to
the MN's current network?
a. Home agent
b. Foreign agent
c. Care of address
d. Correspondent note

9. Which action is the best step to protect Internet of Things (IoT) devices from becoming the entry point for security
vulnerabilities into a network while still meeting business requirements?
a. Applying security updates promptly
b. Turning IoT devices off when not in use
c. Removing IoT devices from the network
d. Using encryption for communications

10. From a security perspective, what should organizations expect will occur as they become more dependent upon the Internet
of Things (IoT)?
a. Security risks will decrease.
b. Security risks will increase.
c. Security risks will stay the same.
d. Security risks will be eliminated.

11. It is defined as an input device which provides an output (signal) with respect to a specific physical quantity (input).
a. Bluetooth
b. Wi-Fi
c. Sensor
d. Infrared

12. The main technological difference that distinguishes 3G technology from 2G technology is the use of
a. circuit switching for data transmission.
b. half-duplex mode
c. full-duplex mode
d. packet switching for data transmission.

13. 4G LTE data transfer speed can reach peak download of


a. 100 Mbit/s, peak upload 50 Mbit/s
b. 1000 Mbit/s, peak upload of 100Mbit/s
c. 1500 Mbit/s, peak upload of 1000Mbit/s
d. 2000 Mbit/s, peak upload of 1500Mbit/s

14. WiMAX offers peak data rates of


a. 64 Mbit/s downlink and 28 Mbit/s uplink
b. 128 Mbit/s downlink and 56 Mbit/s uplink
c. 256 Mbit/s downlink and 84 Mbit/s uplink
d. 512 Mbit/s downlink and 96 Mbit/s uplink

15. It is a computer network, and it allows communication between computer devices close to a person.
a. WAN
b. VPN
c. PAN
d. LAN

/adfortin PRELIM EXAMINATION Page 2 of 5


Education is a key to success!
COLEGIO DE DAGUPAN
Arellano St., Dagupan City
PRELIM EXAMINATION
FREL2 FREE ELECTIVE 2

16. The network technology which is based on transmission are


a. VPN, and WAN
b. PAN, and MAN
c. LAN, and VPN
d. P2P and Multipoint

17. The main elements of LAN mainly include the following.


a. Peripheral devices like printers, scanners, etc.
b. Cables like twisted pair, optical fiber, and coaxial cables are used as backbone cables due to their high bandwidth
capacity.
c. Nodes/PC/computer/Host/server/workstation
d. All of the above

18. Which is not a WAN Element


a. The elements of WAN are bridge, router, and gateway
b. The bridge is a device, used to connect related otherwise different LANs.
c. Network Interface Card
d. Gateway is one kind of device, used to connect networks by using various types of architectures.

19. When the data is transmitted from a large information system to a small information system is known as
a. network architecture
b. network technology
c. network topology
d. network diagram

20. It includes a set of rules, formats & procedures to communicate with two or many devices through a network.
a. Network Security
b. Network Scalability
c. Network Topology
d. Network protocol

Identification.
Provide the best answer for each of the given statements. Write your answers in SMALL CASE format.

1. It offers the maximum performance of device connectivity regardless of the circumstances

2. Providing the user an insight into the workings of the whole system and offering ways to interact with it, the main task of the
application layer is to visualize the information received from the software and present it in a user-friendly way.

3. It is concern about deploying the IoT Platform technology in order to give the possibility to be deployed in the cloud or, in an
on-site server to ensure greater privacy of data.

4. This criterion includes the encryption of the information transmitted between the devices and the server via a variety of
communication channels, the control of user access as well as the ownership of the processed data.

5. These are machines, sensors, actuators or other connected gear intended to perform given actions.

6. An element of IoT which allows connected devices to 'talk' about what they sense or where they are.

7. Hosted in the cloud or on an on-site server, the software collects the data sent by the devices, analyses it and makes
independent decisions about actions to be performed within the IoT system.

8. Based on telecommunication networks, this is the channel through which the devices ‘talk’ to one another and communicate
with / receive commands from the server/cloud.

9. It is a type of sensor which require an external excitation signal or a power signal.

10. It refers to handling of a variety of hardware and software communication protocols which is essential in every professional
IoT deployment.

11. This is essential for all developers who need to customize some of the functions of the device and its applications or, on the
contrary, develop additional modules.

12. An indispensable element of the IoT which considers any objects we can imagine.

/adfortin PRELIM EXAMINATION Page 3 of 5


Education is a key to success!
COLEGIO DE DAGUPAN
Arellano St., Dagupan City
PRELIM EXAMINATION
FREL2 FREE ELECTIVE 2

13. The IoT element which allows the things the ability to 'think' and act.

14. It is an IoT element which enables the end user to interact and takes control when the self-management capabilities of the
system are exhausted.

15. It is a type of sensor which do not require any external power signal and directly generates output response.

Enumeration.
Specify the answers for each of the given set of statements.

A. Three primary pillars of responsibility for an IT department:


1.
2.
3.

B. Factors that may affect the performance of a given IoT platform


1.
2.
3.

C. Three fingerprint patterns


1.
2.
3.

D. Commonly used Biometrics and Biometric Sensors


1.
2.
3.
4.
5.
6.

E. Key features of IoT platform


1.
2.
3.
4.
5.

F. The four indispensable elements of the Internet of Things


1.
2.
3.
4.

G. Needs that current and future IT specialists will be working on


1.
2.
3.
4.

H. Two types of Biometric operations that can be performed using the images captured by Biometric Sensors
1.
2.

/adfortin PRELIM EXAMINATION Page 4 of 5


Education is a key to success!
COLEGIO DE DAGUPAN
Arellano St., Dagupan City
PRELIM EXAMINATION
FREL2 FREE ELECTIVE 2
Prepared By:

ARNALDY D. FORTIN, MBA, MCS


SITE INSTRUCTOR

/adfortin PRELIM EXAMINATION Page 5 of 5


Education is a key to success!

You might also like