Match the cloud computing term with the description
Match the Blockly logic blocks to the function.
Match the description with the apropriate electronics term.
What is an example of cloud computing?
What is used to uniquely identify devices connected to the Internet?
What is the formula used to measure the force that drives current?
What are two examples of fixed costs in business finance? (Choose two.)
What function is performed by an actuator?
What are two functions supported by a data link layer protocol? (Choose two.)
What is the key difference between an open-loop control system and a closed-loop control system?
What is used by a RESTful system to represent resources to external systems?
What are three examples of computer programs? (Choose three.)
In the Linux shell, which character is used between two commands to instruct the shell to combine and execute these two commands in sequence?
Which two technologies are considered 4th generation cellular-based technologies that commonly require monthly payments to connect IoT devices? (Choose two.)
Which security method can be used to secure the management plane within a network device?
What is the purpose of a sequence diagram?
What is Fog computing?
What are the three categories of components that make up a network infrastructure? (Choose three.)
A company plans to add many more devices as part of an IoT solution. What is one of the challenges this company will face because of this rapid growth of digitization?
What is a recommended security action to take when using off-the-shelf IoT devices?
Which two blocks in the Business Model Canvas describe business finances? (Choose two.)
Which term is used to describe the rate at which data is generated when referring to big data?
Which two computer languages are examples of compiled programming languages? (Choose two.)
Which component in Linux is responsible for interacting directly with the device hardware?
How do cloud services extend IoT functionality?
What is an example of data in motion?
Which technology type describes a refrigerator that has become part of a botnet that is attacking businesses?
A threat actor uses a newly discovered vulnerability to access the home wireless router of a user. The threat actor then changes the password for the wireless network served by the router and causes all wireless devices to lose connectivity. Which factor of smart home security is affected by this attack?
Which technology type includes industrial control sytems such as SCADA?
What uses a solenoid to actuate electric devices?
What is an electronic circuit?
A company plans to develop IoT solutions for both horizontal and vertical markets. What is the major difference in designing solutions for different industries?
What is represented by a diamond symbol in a flowchart?
What are three of the six core components in the Cisco IoT system? (Choose three.)
What are two emerging data protocols used within IoT networks? (Choose two.)
What are two challenges that are associated with the rapid growth of IoT? (Choose two.)
What are three potential vulnerabilities related to attacks toward the memory of an IoT device? (Choose three.)
What are three variables used by DREAD? (Choose three.)
What are three items that should be included in the documentation describing the components of the IoT system at each layer? (Choose three.)
A manufacturing organization is generating a large amount of data via their IoT sensors. At which location should the data be processed if it is to be processed close to the ground where the IoT sensors are connected to the network?
In the context of the importance of security in IoT networks, which model provides a common framework for understanding the placement of various standards and protocols in an IoT system?
Last changed2 years ago