NPTEL Introduction to Industry 4.0 and Industrial Internet of Things Week 11 Assignment Answers 2024
1. IloT-enabled healthcare infrastructure can facilitate the monitoring of patient’s health conditions remotely. State true or false.
a. True
b. False
Answer :- For Answers Click Here
2. develops continuous glucose monitoring devices. Fill in the blanks.
a. Dexcom
b. iHealth BP5
c. Kinsa smart thermometer
d. ADAMM Intelligent Asthma Monitoring device
Answer :- For Answers Click Here
3. ___________is an example of a wireless ECG monitoring device. Fill in the blanks.
a. QardioCore
b. Dexcom
c. Health BP 5
d. Kinsa smart thermometer
Answer :-
4. “ADAMM Intelligent Asthma Monitoring device predicts pre symptoms of asthma
attack from the body temperature, cough rate, heart rate.” State true or false.
a. True
b. False
Answer :-
5. Which of the following represents the benefits of the digital power plant?
a. Decreased efficiency
b. Increased cost
C. Improvement in performance
d. Increase in energy requirement
Answer :- c
6. _________is a communication network that covers in-home loT devices using Zigbee and 6LowPan. Fill in the blanks.
a. Home area network
b. Neighborhood area network
c. Field area network
d. Wide area network
Answer :- For Answers Click Here
7. Which of the following statements is incorrect about Barcodes?
a. Barcodes are printed on paper and plastic, which makes them vulnerable
b. Barcodes need to be in the Line of Sight of the readers
c. Multiple barcodes can be read at a time
d. Barcodes cannot contain any added information
Answer :-
8. Which of the following options is false about the Semi-Passive tags?
a. Has an onboard battery to power the IC
b. Does not have any active transmitter
c. Relies on backscattering
d. Depends on signals from the reader for power
Answer :-
9. Which of the following problem(s) can be eliminated by using RFID tags?
a. Data inconsistency
b. Human errors
c. Data scattering
d. All of the above
Answer :-
10. What is/are the necessity/necessities to render software security?
a. Prevent stealing of valuable information
b. Prevent corrupt behavior of software
c. Provide protection from Denial of Service (DoS) attacks
d. All of the above
Answer :- For Answers Click Here
11. Which of the following options is false about the integrity of software security?
a. Assurance of an uncorrupted data
b. Correct functioning even under malicious attack
c. Ignore consistency, accuracy, and trustworthiness of data over its entire life cycle
d. Assurance that data is not altered by unauthorized people
Answer :- c
12. “Network Security does not maintain usability and integrity of network and data.”
State true or false.
a. True
b. False
Answer :-
13. What does VPN stand for?
a. Virtual Private Network
b. Virtual Public Network
c. Versatile Private Network
d. Versatile Public Network
Answer :-
14. Which of the following can be achieved by applying loT in Facility Management?
a. Monitor alarms, smoke detectors, and other life safety systems remotely
b. Real-time information about emergency
c. Efficient supply management
d. All of the above
Answer :- d
15. Active RFID tags are classified as______________ and ________ Fill in the blanks.
a. Transponders, beacons
b. Transponders, eigen
c. Transmitter, eigen
d. None of the above
Answer :- For Answers Click Here