Internet of Things and its Applications

Question & Answer



Question : 1

What is Things in loT? 




Answer :

Things IoT device that individuals can use to combine sensors such as accelerometers, to gyroscopes, and magnetometers with other Sensors that measure temperature, humidity pressure, and light in order to collect personally interesting data. home security system that comes with a combination of temperature, motion, light and humidity sensors.



Question : 2

What is Things in  IoT? 



Answer :

Things- IoT device that individuals can use to combine sensors such as accelerometers, gyroscopes, magnetometers with other sensors that measure temperature, humidity, pressure, and light in order to collect personally interesting data. For example, a home security system that comes with a combination of temperature, motion, light, and humidity sensors.



Question : 3

What do you mean by IoT?



Answer :

IoT stands for Internet of Things. It is concept that refers to connections between physical devices like vehicles, home appliances, and other items embedded in electronics such as sensors, software which enables these things to connect, collect and exchange data. So, Internet of Things refers to everything in day to day life which is accessed or connected through the Internet.



Question : 4

Explain any two features of IoT.



Answer :

The two features of IoT are :
Connectivity: It refers to establish a proper connection between all the things of IoT platform it may be server or cloud.
Analyzing: It comes to real-time analyzing the data collected and use them to build effective business intelligence.



Question : 5

What do you mean by Wearable devices? 



Answer :

Wearable devices are the small electronic devices that can be worn on arms, neck, head, feet etc. These devices are not only the part of IoT system, but they enable access for improved productivity.



Question : 6

Differentiate between Data and Big Data.



Answer :

Data refers to the quantities, characters, or symbols on which operations are performed by a computer, which may be stored and transmitted in the form of electrical signals and recorded on magnetic, optical or mechanical recording media.
Big Data is also data with large size. It is a term used to describe a collection of data that is large in size and yet growing with time. Examples of Big Data are BSE stock exchange data, Social media data such as photo and video uploads, message exchanges, putting comments etc.



Question : 7

What are the important components of an Internet of Things?



Answer :

The important components that exist in the Internet of Things are as follows:
Hardware: This will make physical items responsive and give them functionality to store records and responds to instructions.
Software: It allows the facts collection such as storing, processing, manipulating and instructing.
Infrastructure: Infrastructure which consists of protocols and technologies which allow two bodily gadgets to exchange information.



Question : 8

What does Big Data Analytics mean?



Answer :

The term Big Data analytics refers to the strategy of analyzing large volumes of data, or big data. The large amount of data which grouped a wide variety of sources, including social network, videos, digital images, sensors and sales transactions record is called Big Data. The main purpose in analyzing all this data is to uncover patterns and connections that might otherwise be invisible, and that might provide valuable insights about the users who created it.



Question : 9

Why is big data analytics is important?



Answer :

The most important advantages of Big Data analysis is, it helps organizations harness their data and use it to identify new opportunities.  With the help of this, companies lead to smarter business, more efficient operations, higher profits and happier customers.



Question : 10

What is Cloud?



Answer :

A cloud is an amalgamation of hardware, network, services, storage and interfaces that aid in delivering computing as a service. It has three users:

  1. End users: The end users is the one who uses the services provided by the cloud.
  2. Business management users: The business management user in the cloud takes the responsibility of the data and the services provided by the cloud.
  3. Cloud service provider: The cloud service provider is the one who takes car or is responsible for the maintenance of the IT assets of the cloud. It acts as a common center for its users to fulfill their computing needs.


Question : 11

What are the basic characteristic of cloud computing?



Answer :

The four basic characteristic of cloud computing are given as follows:

  1. Elasticity and scalability.
  2. Self-Service provisioning and automatic de-provisioning.
  3. Standardized interfaces.
  4. Billing self-service based usage model.


Question : 12

Which short note on Bluetooth.



Answer :

Bluetooth is also a Short-range communication technology useful for communication between two devices up to almost 100 m in range. It works similarly to the master-slave based architecture. It is designed for low consumption of power. The most common used applications are home automation, communication with peripherals etc.



Question : 13

What are the advantages of Bluetooth?



Answer :

Advantages of bluetooth are:

  1. It is cheap and Easy to install.
  2. It is wireless and makes connecting to different devices convenient.


Question : 14

What are the disadvantages of Bluetooth?



Answer :

Disadvantages of bluetooth are:

  1. It only allows short range communication between devices.
  2. It can only connect two devices at once.


Question : 15

Write Pros and Cons of WiFi.



Answer :

Poss of WiFi are:

  1. Universal smartphone compatibility.
  2. Affordable, Well protected and controlled.

Cons of WiFi are:

  1. Relatively high power usage


Question : 16

Write application area of RFID tag.



Answer : RFID (Radio Frequency Identification) devices are wireless microchips used for tagging objects for automated identification. RFID was designed specifically so devices without batteries could send a signal. In most systems, one side of an RFID system is powered, creating a magnetic field, which induces an electric current in the chip. this creates a system with enough power to send data wirelessly over and over again. Because of this, RFID tags are used for shipping and tracking purposes.

Question : 17

Compare BLE and NFC.



Answer :

BLE and NFC are both short-range communication technologies that are integrated into mobile phones.

(a) Speed: BLE is faster
(b) Transfer: BLE has higher transfer rate.
(c) Power: NFC consumes less power.
(d) Pairing: NFC does not require pairing.
(e) Time: NFC takes less time to set up.
(f) Connection: Automatically established for NFC.



Question : 18

What is the abbreviation of MQTT and what is its purpose?



Answer :

MQTT stands for Message Queue Telemetry Transport. It provides the connectivity between applications and users at one end, network and communications at the other end.



Question : 19

Differentiate between LiFi and WiFi technologies.



Answer :

Basic difference between LiFi and WiFi technologies are:

  1. LiFi stands for Light Fidelity and WiFi stands for Wireless Fidelity.
  2.  LiFi Uses light as medium for data communication with the help of LED bulbs where as WiFi uses Elecro-magnetic waves at various radio frequencies for data communication withthe help of WiFi router.
  3. LiFi is an optical communication technology where as WiFi is a radio communication technology.
  4. LiFi do not have any intereference issues similar to radio frequency waves where as WiFi will have intereference issues from nearby access points(routers).
  5. In LiFi, light does not pass through the walls and hence will provide a much secure data trasfer.
    In WiFi, RF signal passess through the walls and hence there is a need to employ techniques to achieve secure data transfer.


Question : 20

 What is LoRaWAN?



Answer :

LoRaWAN (Long Range Wide Area Network), a Protocol for wide area networks, it's designed to support huge networks, such as smart cities, with millions of Low-power devices.



Question : 21

What is the purpose of NFC?



Answer :

NFC, short for Near Field Communication, is a short range wireless RFID technology that makes use of interacting electromagnetic radio fields instead of the typical direct radio transmissions used by technologies such as Bluetooth. NFC is a short-range, low-power wireless way to transfer small amounts of data between devices.



Question : 22

Write pros and cons of NFC.



Answer :

Pros of NFC are:

  1. Offers a low-speed Connection with extremely simple setup.
  2. NFC has a short range and supports encryption.

Cons of NFC are:

  1. Short range might not be feasible in many situations.
  2. NFC is an expensive technology.


Question : 23

Differentiate between MQTT and DDS protocols.



Answer :

MQTT is optimized for centralized data collection and analysis-connecting sensors and mobile devices to applications running in a data center. All communication routes through this centralized broker.
DDS is optimized for distributed processing-directly connecting sensors, devices and applications to each other without any dependence on centralized IT infrastructure.
DDS is decentralized.



Question : 24

Explain smart parking IoT application.



Answer :

In smart parking, it is possible to easily locate parking spots nearby. Parking lots have sensors, which let a server know about their usage. Once a driver queries the server with his/her GPS location, he/she is guided to the nearest parking lot with free slots.



Question : 25

Discuss in detail Smart City application of IoT.



Answer :

Smart city is the city with thousands of sensors for smart traffic, smart water management applications, and smart parking system etc. Smart transportation is implemented using a network of sensors, centralized analysis, and smart traffic lights. The reason why it is so popular is that it tries to remove the discomfort and problems of people who live in cities. IoT solutions offered in the smart city area solve various city-related problems comprising of traffic, reduce air and noise pollution and help make cities safer.



Question : 26

What is an IoT ecosystem?



Answer :

IoT ecosystem is like a community that consists of data and monetary flows that helps in connecting enterprises and vendors together. This new chain of development is the best way to connect companies together. Even in future, the companies will be offering the IoT ecosystem similar to risk management and cyber security.
The IoT ecosystem includes all those technologies that enable consumers, businesses, and governments to connect, control and derive value from their connected objects in diverse environments, including manufacturing, agriculture, transportation, smart cities, construction, oil, and gas. 



Question : 27

Write short note on cloud computing.



Answer :

Cloud computing is an infrastructure of shared resources (such as service, networks, and software applications and services) that allow users to scale up their data management and processing abilities while keeping the costs low. A cloud vendor invests in and maintains the cloud infrastructure; a user pays for only the resources and applications he wishes to use.



Question : 28

What is Big data?



Answer :

Big data is a term popularly used to describe large data sets that cannot be handled efficiently by traditional data management systems. In addition to the large volume, the concept of big data also refers to the variety of data sets i.e., structured and unstructured as well as the velocity or the rate at which the data are incoming.



Question : 29

What is Internet Protocol (IP)?



Answer :

Internet Protocol (IP) is an open network protocol that provides unique addresses to various devices connected to the Internet. There are two versions of IP: IP version 4 (IPv4) and IPv6.
IP version 4 (IPv4) is an older version of the Internet Protocol (IP) whereas IPv6 is a most recent version.



Question : 30

What is the Internet of Everything ? What are its elements ?



Answer :

The Internet of Everything is the intelligent connection of people, process, data, and things. 
The elements of the Internet of Everything are Human beings, Procedure, Things and Information.



Question : 31

Name a few IoT protocols.



Answer :

A few IoT protocols are:
XMPP: Extensible Messaging and Presence Protocol.
AMQP: Advanced Message Queuing Protocol.
CoAP: Constrained Application Protocol.
MQTT: Message Queue Telemetry Transport.
DDS: Data Distribution Service.



Question : 32

Explain service models of cloud computing.



Answer :

Service models of cloud computing are:

  1. Infrastructure-as-a-Service (IaaS): It is supply an on-demand environment for developing, testing, delivering and managing software applications.
  2. Platform-as-a-Service (PaaS): This type of solution allow you to rent cloud infrastructure and an IoT platform all from a single technology provider. Also, there might be ready-to-use IoT solutions (IoT cloud services) offered by the provider, built and hosted on its infrastructure.
  3. Software-as-a-Service (SaaS): This method is used for delivering software applications over the internet, on demand and typically on a subscription basis. IoT applications are pre-built software-as-a-service (SaaS) applications that can analyze and present captured IoT sensor data to business users via dashboards.


Question : 33

What is fog computing ? Who has coined it ?



Answer :

Fog computing is a type of network architecture (i.e., how the systems are connected within a network and to the Internet) that links cloud computing (storage of data and programs over the Internet) to the Internet of Things (IoT). The term fog computing (or fogging) was coined by Cisco in 2014.



Question : 34

What is fog node?



Answer :

The device with network connection, storage and computing feature is known as fog node. Examples include switches, controllers, routers, servers, cameras and so on.



Question : 35

How fog computing decreases the band-width used?



Answer :

The fog node is located in a smart router or gateway device, allows fog data to be processed on this smart device, so that only the necessary data gets further transmitted to the cloud, and decreases the bandwidth used.



Question : 36

Write Pros of Fog computing.



Answer :

The pros of fog computing are:

  1. Fog is geographically closer to users and is able to provide instant responses.
  2. Loss of connection is impossible due to multiple interconnected channels.


Question : 37

Explain with the examples how IoT conserves energy and saves money?



Answer :
  •       IoT-based real-time monitoring  systems brings optimum use of energy and saves money. For example, thermostats enable people to remotely monitor and control the temperature of their heating and cooling systems. The advantage of using a smart thermostat, is that we can over-ride the scheduled programming to raise and lower the temperature remotely.

  • Similar to thermostats, smart water heaters enable us to raise and lower the water temperature in our tank from anywhere we have an internet connection. For example , suppose we take a shower every night at 9:00 p.m. We can program our hot water heater to start heating the tank at 8:00 p.m. so that by the time we need it, the water is nice and hot. The rest of the day, the hot water heater is turned off.

  •        Sensors integrate with the lighting system in order to turn lights on or off depending on the presence of people in the room. A smart lighting system will notify us via text messaging if a light was left on. The energy savings of a smart lighting system can be very significant.
  •        A smart grid basically promises to extract information on the behaviors of consumers and electricity suppliers in an automated fashion in order to improve the efficiency, economics, and reliability of electricity distribution. 






Question : 38

Write the key differences between Fog Computing and Cloud Computing.



Answer :

Key difference between cloud and fog computing are:

  • Cloud architecture is centralized and consists of large data centers that can be located around the globe, a thousand miles away from client devices. Fog architecture is distributed and consists of millions of small nodes located as close to client devices as possible.
  • In cloud computing, data processing takes place in remote data centers. Fog processing and storage are done on the edge of the network close to the source of information.
  • The cloud consists of a few large server nodes. Fog includes millions of small nodes.
  • The performs short-term edge analysis due to instant responsiveness, while the cloud aims for long-term deep analysis due to slower responsiveness.
  • Fog provides low latency, where as cloud provide high latency.
  • Fog is a more secure system then the cloud due to its distributed architecture.
  • Fog is the layer between the cloud and the devices like computer, laptop, mobile etc. As Fog acts as a mediator, it is less time consuming to transfer the data. When there is no layer then cloud needs to communicate directly to the end devices which take more time than using Fog computing. 


Question : 39
Why do you connect the wire mesh conductor of a coaxial cable to the ground?


Answer :

In order to avoid the interference caused by the electromagnetic noise. the voltage induced by electromagnetic interference (EMI) is sent to earth by grounding the outer conductor of a coaxial cable.



Question : 40

What are the advantages of Optical fiber?



Answer :

The advantages of Optical fiber are:

  • It can handle much higher bandwidth than copper. Due to the low attenuation, repeaters are needed only about every 30 km on fiber lines versus about every 5 km for copper.
  • Fiber is not affected by power surges, electromagnetic interference or power failures. It is not even affected by corrosive chemicals in the air, making it ideal for factory environments where electrical interference is very high.
  • Fiber cable is lighter than copper cable. One thousand twisted pair copper cables of 1 km long weigh 8000 kg. But fibers have more capacity and weigh only 100 kg, which greatly reduces the need for expensive mechanical support systems that must be maintained.
  • Fibers do not leak light and are quite difficult to top. This gives them excellent security against potential wire-tappers.
  • Write one advantage and disadvantage of Microware Transmission. 




Question : 41

Write one advantage and disadvantage of Microwave Transmission.



Answer :

Advantage of Microware Transmission is:

  • Carries 1000's of voice channels at the same time.
    Disadvantage of Microware Transmission is:
  • It is very costly.


Question : 42

Write one advantage and disadvantage of Satellite Microware 



Answer :

Advantages of satellite Microware

  • A single microware relay station which is visible from any point.
    Disadvantages of Satellite Microwave.
  • Cost of launching satellite is very expensive.


Question : 43

Write one application of Infrared Waves.



Answer :

Infrared waves has established standards for using these signals for communication between devices such as keyboards, mouse, PCs and printers.



Question : 44

Write advantage of Unshielded Twisted Pair Cable.



Answer :

Advantages of Unshielded Twisted Pair Cable are:

  • Installation is easy.
  • Higher grades of UTP are used in LAN technologies like Ethernet.
  • Flexible and Cheap.


Question : 45

Write disadvantages of Unshielded Twisted Pair Cable.



Answer :

Disadvantages of Unshielded Twisted Pair Cable are:

  • Bandwidth is low when compared with Coaxial Cable.
  • Provides less protection from interference.


Question : 46

Write advantages and disadvantages of shielded Twisted Pair Cable.



Answer :

Advantages of Shielded Twisted Pair Cable are:

  • Easy to install and can be used for Analog or Digital transmission.
  • Higher capacity than unshielded twisted pair.
  • Eliminates crosstalk.
    Disadvantages of Shielded Twisted Pair Cable are:
  • Difficult to manufacture
  • Heavy


Question : 47

Write short note on Application layer of OSI stack.



Answer :

The data to be transmitted is obtained from this layer with the help of various applications such as web, ftp, telnet etc, these applications will have data in different formats such as binary, ASCII, EBCDIC etc.



Question : 48

What is the usage of transport Layer?



Answer :

It does flow control, fragmentation, reassembly of the data to be transmitted or received.



Question : 49

Write short note on TCP.



Answer :

TCP is a connection-oriented transport protocol. TCP provides end-to-end reliable services. Each TCP connection has only two endpoints. The data transmitted over a TCP connection is error-free, not lost, not duplicated, and arrives in order. TCP provides functions such as timeout and retransmission management, window management, traffic control, and congestion control to ensure that TCP provides reliable services. 



Question : 50

Write important characteristics for IOT Protocols.



Answer :

The important characteristics for IOT Protocols are:

  • Speed: Amount of data that can be transferred/second.
  • Latency: amount of time a message takes to be transferred.
  • Power consumption.
  • Security
  • Availability of software stacks.


Question : 51

Why MQTT is considered better than HTTP in IoT?



Answer :

HTPP is the best known protocol that powers the Web (WWW). However because of the high protocol overhead HTPP is not likely to be a major IOT protocol. MQTT (Message Queuing Telemetry Transport) has emerged as the main IOT messaging protocol because it is lightweight and easy to use.



Question : 52

Write disadvantage of Coaxial Cable.



Answer :

Disadvantage of Coaxial Cable are:

  • It tends to be more ridged and more difficult to bend around tight corners.
  • It has a tendency to pick up signals around it unless shielded.
  • Imperfect shielded can cause a grounded loop.
  • For the most part 10 base 2 is about as fast as you will ever get on a coaxial cable without special circumstances.
  • It is ancient and being phased out phased out except for special use by cable companies and some telecoms.


Question : 53

Write advantages of Coaxial cable.



Answer :

Advantages of Coaxial Cable are:

  • It can be used for both analog and digital transmission.
  • It offers higher bandwidth as compared to twisted pair cable and can span longer distances.
  • Because of better shielding in coaxial cable, loss of single or attenuation is less.
  • Better shielding also offers good noise immunity.
  • It is relatively inexpensive as compared to optical fibers.
  • It has lower error rates as compared to twisted pair.
  • It is not as easy to tap as twisted pair because copper wire is contained in plastic jacket. 


Question : 54

What are advantages of wired network?



Answer :
  • Reliability: Ethernet connections have been in existence much longer than Wi-Fi technology, which makes it much more reliable. They are less prone to dropped connections and are more reliable.
  • Speed: Wired connections are less affected by local factors like walls, floors, cabinets, length of the room, interference from other electronic devices etc. This enables wired connectivity to be much faster then wireless.


Question : 55

Write one advantage and disadvantage of wireless network.



Answer :

Advantage

Scalable:  Wireless networks do not require any hardware installations. They typically involve configurations and be up and running in a short time. They can also be extended very easily.

Disadvantage

Slower speed: When dealing with real-time data, it is imperative that data is transmitted and available as fast as possible. Wireless networks are susceptible to increased latency and signal interference that impacts the speed and consistency of the data. 



Question : 56

Why don you connect the wire mesh conductor of a coaxial cable to the ground?



Answer :

 In order to avoid the interference caused by the  electromagnetic noise. The voltage induced by electromagnetic interference (EMI) is sent to earth by grounding the outer conductor of a coaxial cable.



Question : 57

Mention the various components of signal loss in a typical fiber optic link.



Answer :

Losses are due to the following reasons:

  1. Absorption and attenuation of the cable because the cladding is not completely opaque. So, some of the light energy is absorbed into the cladding.
  2. Large losses result from the physical connections that bring light sources and detectors into alignment with the fiber cable.
  3. Losses also occur between the splices which are the connectors that attach two cables together.
  4. Misalignment of the light source to cable causes loss of light energy. The misalignments are reduced by precise fittings coupling and splices and by carefully following the connecting processes given by the manufacturer.
  5. Loss of light also occurs because of bends in laying the cable.


Question : 58

Describe how losses occur due to the bends in fiber optic cables.



Answer :

Bends in the fiber cause reflected and refracted rays to change directions. This can increase the absorption loss and distort the light pattern at the receiving end. 



Question : 59

What is the resulting effect on the light signal due to scattering?



Answer :

The effect of scattering is to attenuate the light energy as the ray travels through the core.



Question : 60

Write short note on Terrestrial microwave link



Answer :

Terrestrial microwave link

  1. Construction: Consists of directional parabolic antennas. Both antennas are on the ground.
  2. Range of operation: With in line of sight. Repeaters are needed for higher range of communication. Relay towers are used to extend the range
  3. Frequency range: 4 to 6 GHz and 21 to 23 GHz.
  4. Cost: Compared to satellite communication, the cost is low.
  5. Bandwidth and capacity: Data rates are from 1 to 10 Mbps.  


Question : 61

Explain types of control loops.



Answer :

Types of control loops are:

There are two main types of control loops:
Open loops, which operate with human input, and closed loops, which are fully autonomous. Some loops can be switched between closed and open modes. When open, a switchable loop is manually controlled and when closed it is fully automated.

Open-loop and closed-loop control
In an open-loop control system, the control action from the controller is independent of the process variable. An example of this is a central heating boiler controlled only by a timer. The control action is the switching on or off of the boiler. The process variable is the building temperature. This controller operates the heating system for a constant time regardless of the temperature of the building.

In a closed-loop control system, the control action from the controller is dependent on the desired and actual process variable. In the case of the boiler analogy, this would utilize a thermostat to monitor the building temperature, and feed back a signal to ensure the controller output maintains the building temperature close to that set on the thermostat. A closed loop controller has a feedback loop which ensures the controller exerts a control action to control a process variable at the same value as the setpoint. For this reason, closed-loop controllers are also called feedback controllers.



Question : 62

Write short notes on the following: STP, Coaxial cable, Twisted-pair wire



Answer :

They are available in different varieties.

  • Category 3 twisted pairs consist of two insulated wires gently twisted together. Four such pairs are typically grouped together in a plastic sheath for protection and to keep the eight wires together. Effect of noise due to (Electromagnetic Interference (EMI) is comparatively low because of shielding Being thin in size, the wires are likely to break.

  • Coaxial cable consists of a stiff copper wire as the core surrounded by insulating material. The signal is transmitted by the inner copper wire and it is electrically shielded by the outer sleeve. Effect of noise due to (Electromagnetic Interference (EMI) is very low. Can support up to tens of Mbps at a distance of several thousand feet. Emits very low radiation and causes less interference with the communication equipment.

  • Two insulated copper wires twisted together in a helical shape. The copper conductors are typically about 1 mm thick. Transmission of electromagnetic energy along the wires. Least expensive than coaxial cable. Attenuation is high because of the electromagnetic radiation of energy. Being the oldest method of data communication, ample trained man-power is available to maintain the twisted pair cables.


Question : 63

Write short notes on the following:

(a) Microcontrollers
(b) Microprocessors
(c) DC Motors
(d) Embedded System
(e) Sensor



Answer :
  • Microcontrollers (embedded processors) are  processors (or specialized microprocessors) that have many peripherals to interact with real-word sensors and actuators. Microcontrollers are typically employed in scenarios that must have low power consumption, operate fan-less, thus must have low power dissipation Also, often micro-controllers run relatively simpler set of instructions.

  • Microprocessors (Application processors) usually are for general-purpose applications, and rarely have many peripheral interconnect options. They target high performance applications, focus on computational power, and thus come with multiple level of caches, have very high clock speeds, have less to worry about power dissipation and power consumption. Often, they have little or no onboard RAM.

  • DC motors, which move at variable speeds. In DC motors, the coil of wire (rotor) assembly rotates in an attempt to align itself with the stator assembly but is prevented by a part known as the commutator. At the precise moment, the commutator switches the rotor field while the stator assembly remains stationary. This provides the means to control speed and positioning.

  • An embedded system can be thought of as a computer hardware system having software embedded in it. An embedded system can be an independent system or it can be a part of a large system. An embedded system is a microcontroller or microprocessor based system which is designed to perform a specific task. For example, a fine  alarm is an embedded system; it will sense only smoke.

  • The sensor can be defined as a device which can be used to sense / detect the physical quantity like force, pressure, strain, light etc and then convert it into desired output like the electrical signal to measure the applied physical quantity.


Question : 64

Write short note on Thermistor.



Answer :

A thermistor can be used to detect the variation in temperature. It has a negative temperature coefficient that means when the temperature increases the resistance decreases. So, the thermistor's resistance can be varied with the rise in temperature which causes more current flow through it. This change in current flow can be used to determine the amount of change in temperature. An application for thermistor is, it is used to detect the rise in temperature and control the leakage current in a transistor circuit which helps in maintaining its stability. Thermistor is used to control the DC fan automatically.



Question : 65

Difference between Microprocessor and Microcontroller are:



Answer :

Difference between Microprocessor and Microcontroller are:

  • Microprocessor widely used in the computer system. And microcontroller is used in embedded system.
  • Microprocessor is used in Personal Computers whereas Micro Controller is used in an embedded system.
  • The microprocessor uses Von Neumann architecture where data and program present in the same memory module. The microcontroller uses Harvard architecture. In this module. Data and program get stored in separate memory.
  • Microprocessor requires external components to operate. So, the Cost of the microprocessor is higher than the microcontroller.
  • Microprocessor consists of only a Central Processing Unit, whereas Micro Controller contains a CPU, Memory, I / O all integrated into one chip.
  • Microprocessor uses an external bus to interface to RAM, ROM, and other peripherals, on the other hand, Microcontroller uses an internal controlling bus.
  • Microprocessor is complicated and expensive, with a large number of instruction to process but Microcontroller is inexpensive and straightforward with fewer instructions to process. 


Question : 66

What are the application areas of Microprocessors?



Answer :

Microprocessors are mainly used of devices like:

  • Calculators
  • Accounting system
  • Games machine
  • Military applications 
  • Computation systems


Question : 67

What are the application areas of Microcontroller?



Answer :

Microcontrollers are mainly used in devices like:

  • Mobile phones
  • Automobiles
  • CD / DVD players
  • Washing machines
  • Security alarms
  • Microwave oven 
  • Mp3 players
  • Cameras


Question : 68

Differentiate between 8051 and AVR Controllers.



Answer :

Differentiate between 8051 and AVR controllers are:

  • 8051s are 8-bit controllers based on CISC architecture, AVRs are 8-bit controllers based on RISC architecture.
  • 8051 consumes more power than AVR microcontroller.
  • In 8051, we can program easily than the AVR microcontroller.
  • The speed of AVR is more than the 8051 microcontroller.


Question : 69

What is transducer?



Answer :

Any device converting signals of one kind to signals of a different kind is a transducer i.e., a transducer is a device which converts one physical quantity to another from of physical quantity, e.g., acceleration to voltage or voltage to pressure.



Question : 70

What is sensor?



Answer :

A sensor is a device that is used to detect changes in any physical quantity like temperature, speed, flow, level, pressure, etc. Any changes in the input quantity will be detected by a sensor and reflected as changes in output quantity.



Question : 71

"A transducer is more general than a sensor." Comment. 



Answer :

A sensor is a device which can quantitatively measure a certain physical quantity. A transducer is a device which converts one physical quantity to another from of physical quantity, e.g., acceleration to voltage or voltage to pressure. Therefore, a transducer can be a sensor when it is used to measure a certain physical quantity. But the transducer can also be an actuator when the (electrical) input is converted to, for example, force. So a transducer is more general than a sensor.



Question : 72

Explain Sensor and Actuators with example.



Answer :

Sensor are devices that responds to a physical quantity with a signal and Actuators are devices that respond to signals with physical movement (or similar action) can be considered as transducers.
For example, a Microphone is a Sensor, which converts sound waves into electrical signals and a Loudspeaker is an Actuator, which converts electrical signal into audio signals.



Question : 73

What is Clock speed ?



Answer :

The clock speed determines how many instruction per second the processor can execute. Usually clock speed is in MHz (Mega Hertz) or GHz (Giga Hertz).



Question : 74

Write short note on Thermocouple.



Answer :

Thermocouple is a temperature sensor that can detect the variation in temperature. In its construction, two different metals are joined construction, two different metals are joined together to form a junction. Its main principle is when the junction. Of two different metals are heated or exposed to high temperatures a potential across their terminals varies. So, the varying potential can be further used to measure the amount of change in temperature.



Question : 75

Discuss important features of a RISC microprocessor.



Answer :

 RISC (Reduced Instruction Set Computer)

  • RISC architecture was developed by realizing that instead of using full set of instructions, only the frequently used instructions are sufficient.
  • In this architecture, the instructions are small and highly optimized.
  • RISC processors are used where execution time of the instruction should be less and cost of development is less.
  • The ARM devices are based on ARM architecture which is a subset of RISC.

 



Question : 76

Discuss important features of a CISC microprocessor.



Answer :
  • CISC architecture consists of full set of instructions that are complex, larger, have more computational power and so on.
  • A single CISC instruction can be used to execute several low-level operations, multistep operations and multiple addressing modes.
  • The execution time of these instructions is long. Intel's X86 is an example of CISC architecture.


Question : 77

Write properties of EPIC processor.



Answer :

EPIC (Explicitly Parallel Instruction Computing) is a computer architecture that combines the best feature of RISC and CISC.
A EPIC processor has the following properties:

  • EPIC does not use fixed with instruction, rather aims at parallel processing of instructions.
  • Programs must be written using sequential semantics with explicitly laid out parallelism.
  • It uses a bundle of complex instructions that in addition to basic instruction also contain information on how to run the instruction in parallel with other instructions.


Question : 78

What are Advantages and Disadvantages of Microcontroller?



Answer :
  • Lower cost because many elements of the processor are contained within the one chip resulting in lower chip cost.
  • Lower power consumption.
  • Integrating all consumption onto one chip enables processor to be optimised for a given application.
    Disadvantages of Microcontroller are:
  • Less flexibility because all components are integrated into the one chip.
  • Limited performance because the size of memory is limited by what can be accommodated on the chip.
  • MCUs tend to be application specific so the choice may be limited.

 



Question : 79

How does Microprocessor work?



Answer :

There are five important components in a microprocessor. They are Arithmetic and Logic Unit (ALU), Control Unit, Registers, Instruction Decoder and Bus. Microprocessor holds the number of instruction. Every instruction consists of multiple steps such as fetch, decode, executes and store. While running instruction in the microprocessor, it executes multiple steps as Fetch the input, Decode instruction, Execute instruction, Store result back in the memory. Here, Instruction gets fetched and input is given externally using I / O components. The microprocessor executes an instruction. The result gets stored in the externally connected memory unit.



Question : 80

What are the criteria for choosing a microcontroller are?



Answer :

Criteria for choosing a microcontroller are:

  • The first and foremost criterion in choosing a microcontroller is that it must meet the task at hand efficiently and cost effectively.
  • In analyzing the needs of a microcontroller based project, we must first see whether an 8-bit, 16-bit, or 32-bit microcontroller can best handle the computing needs of the task most effectively.
  • Power consumption especially critical for battery-powered products.
  • The amount of RAM and ROM on chip.
  • The number of I/O pins and the timer on the chip.
  • The highest speed that the microcontroller supports.


Question : 81

Write some application areas of AVR Microcontroller.



Answer :

Application areas of AVR Microcontroller are:

  • Robotics and Embedded systems
  • Bio-medical equipment
  • Automobiles and security system
  • Temperature, light sensing and Fire detection devices
  • Industrial automation devices


Question : 82

How Active sensors is different from Passive sensors?



Answer :

Active sensors are those which require an external excitation signal or a power signal. Passive sensors, on the other hand, do not require any external power signal and directly generates output response.



Question : 83

Explain Passive Transducers with example.



Answer :

In Passive Transducers, the energy from the input is directly converted into the output. For example, a Thermocouple is a passive transducer, where the heat energy, which is absorbed from input, is converted into electrical signal (voltage).



Question : 84

Define computer architecture.



Answer :

Computer architecture is defined as the functional operation of the individual hardware unit in a computer system and the flow of information among the control of units.



Question : 85

Write short notes an the following: Resistor: Resistor, Breadboard, VIN, Servo Moto, DC motor



Answer :

 A resistor is  a passive electrical component with the primary function to limit the flow of electric current.

A breadboard is a temporary circuit board for testing and prototyping circuits, no soldering is done on the board, this mean it is faster and easier to prototype circuits.

The input voltage to the Arduino / Genuino board when it is using an external power source (as opposed to 5 volts from the USB connection or other regulated power source). We can supply voltage through this pin, or, if supplying voltage via the power jack, access it through this pin.

A Servo Motor is a small device that has an output shaft. This shaft can be positioned to specific angular positions by sending the servo a coded signal. As long as the coded signal exists on the input line, the servo will maintain the angular position of the shaft. If the coded signal changes. Servos are extremely useful in robotics.

A DC motor (Direct Current motor) is the most common type of motor. DC motors normally have just two leads, one positive and one negative. If you connect these two leads directly to a battery, The motor will rotate. If you switch the leads, the motor will rotate in the opposite direction.



Question : 86

What is the use of setup() function?



Answer :

The setup() function is called when a sketch starts. Use it to initialize variables, pin modes, start using libraries, etc. The setup() function will only run once, after each powerup or reset of the Arduino board.



Question : 87

What is text editor? What is its file extension?



Answer :

It is used for writing the required code. The sketch is written in the text editor and is then saved with the extension .ino.



Question : 88

What is Pulse Width Modulation?



Answer :

Pulse Width modulation or PWM is a common technique used to vary the width of the pulses. PWM has many applications such as controlling servos and speed controllers, limiting the effective power of motors and LEDs.



Question : 89

What are Libraries?



Answer :

Libraries are simply a collection of code that helps us to interface the hardware with any peripheral devices such as sensors, modules, shields, etc. easily. We can use built-in functions of the libraries to make a coding project much more comfortable.



Question : 90

What is the purpose of the /* and */ character pairs?



Answer :

This sequence of characters marks the start and end of a multiline comment in a program.



Question : 91

Discuss the role of PWM pins in Arduino UNO.



Answer :

PWM stands for Pulse Width Modulation technique, is used to convert the digital signal into an analog by varying the width of the Pulse. The PWM pins are used for giving the desired analog output. They are used to set the LED brightness or to run Stepper or Servo Motor or anything which require analog inputs.

Digital control is used to create a square wave, a signal switched between  on and off. This on-off pattern can simulate voltages in between full on (5 Volts) and off (0 Volts) by changing the portion of the time the signal spends on versus the time that the signal spends off. The duration of “on time” is called the pulse width. To get varying analog values, we change, or modulate, that pulse width. If we repeat this on-off pattern fast enough with an LED for example, the result is as if the signal is a steady voltage between 0 and 5v controlling the brightness of the LED. 



Question : 92

What is an Infrared sensor?



Answer :

An Infrared sensor is an electronic device, that emits in order to sense some aspects of the surroundings. An IR sensor can measure the heat of an object as well detects the motion. These types of sensors measures only infrared radiation, rather than emitting it that is called as a passive IR sensor. 



Question : 93

Can an IR sensor detect humans?



Answer :

Yes, the Passive Infrared (PIR) sensor is used to detect the presence of human.



Question : 94

What is the use of  break and continue?



Answer : The break and continue statements are often used within loops structures. A break statement sends program control to the statement that immediately follows the closing brace of loop body. The continue statement immediately sends program control to the test conditions of the loop.

Question : 95

What is bootloader?



Answer :

Bootloader, is basically the initial piece of code which runs whenever any microcontroller is powered up or resets. It can be used to setup the microcontroller or provide limited ability to update the main program's code.



Question : 96

How setup() is different from loop()?



Answer :

setup() is called once in the program when a sketch starts after power-up. It is used to initialize variables, input and output pin modes, and other libraries needed in the sketch.

loop() is used after setup() been called, function loop() is executed repeatedly in the main program. It controls the board until the board is powered off or is reset.



Question : 97

How many digital pins are there on the UNO board?



Answer :

It has 14 digital pins input / output pins of which 6 can be used as PWM output.



Question : 98

What is the application area of LilyPad board?



Answer :

LilyPad was creatively designed with large connecting pads and a flat back to allow them to be sewn into clothing with conductive thread.



Question : 99

What is difference between Verify / Compile and Upload?



Answer :

Verify/Compile: It checks the errors present in your sketch and informs you about the memory space occupied by the variables in the console area.
Upload: It automatically compiles and loads the code (binary file) into the selected Arduino hardware through the configured Port.




Question : 100

What is outpane?



Answer :

The bottom of the main screen is described as an Output Pane that mainly highlights the compilation status of the running code: the memory used by the code, and errors occurred in the program. We need to fix those errors before we intend to upload the hex file into our Arduino Module.



Question : 101

What is the role of Serial Monitor?



Answer :

The Serial Monitor allows your computer to connect serially with the Arduino. this is important because it takes data that our Arduino is receiving from sensors and other devices and displays it in real-time on our computer.



Question : 102

What is serial plotter?



Answer :

Arduino Serial Plotter is another component of the Arduino IDE, which allows us to generate a real-time graph of our serial data. The serial plotter makes it much easier for us to analyze our data through a visual display.



Question : 103

What is the use of modulo operator?



Answer :

The remainder operator (or modulo operator) is used to find the remainder after the division of two numbers. The percentage sign (%) is used as the modulo operator.



Question : 104

What is the function of keyword void in function declaration?



Answer :

Void may be used to declare functions that do not return a value. thus, functions with no return value will have a new type void.



Question : 105

Differentiate between local and global variables.



Answer : A local variable is one that defined within a function. The scope of a local variable is limited to the function in which it is defined. The life of local variable is limited to the function. Global variable is defined outside the function block. The scope of global variable is throughout the program. The life of global variable is throughout the program.

Question : 106

 What do you mean by function prototyping? What are its advantages?



Answer :

A function prototyping is a declaration of a function that tells the program about the type of the value returned by the function and the number and type of each argument. The advantage of function prototyping is that it enables a compiler to compare each use of function with the prototype to determine whether the function is invoked properly or not. The number and types of arguments can be easily compared and any wrong number or type of the argument is reported.



Question : 107

What is the role of Serial.begin()?



Answer :

Everything begins with the Serial.begin() function. This function in the setup() routine is executed only once, that is, when the Arduino is starting.



Question : 108

What is the purpose of crystal oscillator?



Answer :

The crystal oscillator helps Arduino in dealing with time issues. On each tick, the microcontroller performs one operation, for example, addition, subtraction, etc. the clock is controlled by an external 16MHZ Crystal Oscillator.



Question : 109

What is SPI (Serial Peripheral Interface) Pins?



Answer :

The SPI pins are 10, 11, 12, 13 namely SS, MOSI, MISO, SCK. These pins support SPI communication using the SPI library. SPI bus is a system for serial communication, which uses up to four conductors. One conductor is used for data receiving, one for data sending, one for synchronization and one alternatively for selecting a device to communicate with. It is a full duplex connection, which means that the data is sent and received simultaneously. SPI uses the following four wires:



Question : 110

What is the use of Serial Pins?



Answer :

Serial Pins are the pins have special functions like pins 0 & 1, which acts as a transmitter and receiver respectively. TX and RX indicates the data being transmitted or received the data being transmitted or received over the USB communication.



Question : 111

What is difference between tone() and no Tone()?



Answer :

tone() sends a square wave on a pin, used for buzzers / speakers to play tones. You can specify the pin, and the frequency. It works on both digital and analog pins.
no Tone() stops the tone() generated wave on a pin.



Question : 112

What is an HC-05 Bluetooth Module? What are its advantages.



Answer :

HC-05 Bluetooth is a wireless communication protocol; it is used in two devices as a sending and receiving the information. The HC-05 Bluetooth modules are easy to use and simple, its price is low and these types of modules are interfaced with the Arduino, Rasberry Pi, and Microcontroller through the serial UART interface.



Question : 113

What is the SI Unit of Resistor?



Answer :

The SI unit of resistor is Ohm.



Question : 114

What is the use of delay() function?



Answer :

It accepts a single integer (or number) argument. This number represents the time (measured in milliseconds).



Question : 115

What is the use of micros() function?



Answer :

The micros() function returns the number of microseconds from the time, the Arduino board begins running the current program.



Question : 116

What is difference between entry controlled loop and exit controlled loop?



Answer :

In an entry-controlled loop, the loop control condition is evaluated at the entry point of the loop. However, in an exit-controlled loop, the loop control condition is evaluated at the exit point of the loop. 
If the loop control condition is false in the beginning, the entry-controlled loop is never executed, however, the exit-controlled loop would be executed at least once.



Question : 117

What is ISR? Can we pass any parameter and return a value from the ISR?



Answer :

ISR refers to the Interrupt Service Routines. These are procedures stored at specific memory addresses which are called when a certain type of interrupt occurs.

ISR returns nothing and not allow to pass any parameter. An ISR is called when a hardware or software event occurs, it is not called by the code, so that's the reason no parameters are passed into an ISR.



Question : 118

Write short note on Global Variables and Local Variables.



Answer :

Global variables: Global Variables, as the name suggests, are Global to the program i.e. they can be accessed anywhere in the program.
Local Variables: Local Variables, in contrast to Global Variables, are confined to their respective function.



Question : 119

What is Main Function ?



Answer :

Every C or Embedded C program has one main function, from where the execution of the program begins.



Question : 120

What is the difference between unsigned int and signed int in C?



Answer :

A signed integer can store both the positive and negative values. An unsigned integer can only store the positive value.

For example,

Assuming the size of the integer is 2 bytes.
signed int- 32768 to +32767
unsigned int 0 to 65535



Question : 121

When does the keyword const mean?



Answer :

A const is only a qualifier, it changes the behavior of a variable and makes an object read-only type. When we want to make an object re ad-only type, then we have to declare it as const.

const int iData = 0



Question : 122

Discuss Arduino Uno Board Power Supply.



Answer :

The Arduino Uno power supply can be done with the help of a USB cable or an external power supply. The external power supplies mainly include AC to DC adapter otherwise a battery. The adapter can be connected to the Arduino Uno by plugging into the power jack of the Arduino board. Similarly, the battery leads can be connected to the Vin pin and the GND pin of the POWER connector. The suggested voltage range will be 7 volts to 12 volts.



Question : 123

Define Encryption and why it is used?



Answer :

It is a process of converting the data of file into an unreadable format to protect the data from attack. It is being widely used in an organization to secure their data.



Question : 124

 Write short notes on the following:

(a) Malware
(b) Phishing 
(c) Active Attack
(d) Vulnerability
(e) Cryptography



Answer :
  • Malware (malicious software) are the software programs designed to damage or do other unwanted actions on a computer system. Some examples of malware include viruses, worms, trojan horses, and spyware. Malware can cause havoc on the computer hard drive by deleting files or directory information.
  • Phishing is an attempt of acquiring sensitive information, such as usernames, passwords, and credit card details, by hacker in an electronic communication.
  • Modification of messages being transmitted, capturing authentication sequences and obtaining extra privileges, creation of false messages etc. are a few active attacks. Active attacks are difficult to prevent because they require protection of all communication facilities and paths at all times. But one can detect and recover from the disruptions caused by them.
  • Vulnerabilities are weaknesses in a system or its design that allow an intruder to execute commands, access unauthorized data, and/ or conduct denial-of-service attacks.
  • Cryptography is technique of securing information and communications through use of codes so that only those person for whom the information is intended can understand it and process it. Thus preventing unauthorized access to information.


Question : 125

What are the key terms of Security?



Answer :

The key terms for security are Confidentiality, Integrity and Availability. It is also known as CIA. These three things are considered to be the most important components of the security. Confidentiality means protecting the information and the information remain between the client and organization, and not sharing the information with other people.
Integrity means the reliability and trusted data, trusted data, which refers to real and accurate data. Availability refers to access information from the specified location.




Question : 126

What is Blockchain?



Answer :

It is an incorruptible digital ledger of economic transactions that can be programmed to record not only financial transactions but virtually everything of value. In simple terms, it is a decentralized distributed database of immutable records that are managed by a group of computers but not owned by any single entity. It is stored as a database or a flat-file.



Question : 127

How does blockchain work?



Answer :

It is consists of immutable records of data called blocks with are linked using cryptography. It is nothing but a process to encrypt and secure data communication from third parties in reading private messages. Once the data has been recorded, it will not be changed. It works like a digital notary with timestamps to avoid tampering of information. 



Question : 128

What do you mean by Encryption?



Answer :

It is a process of converting the data of file into an unreadable format to protect the data from attack. It is being widely used in an organization to secure their data.



Question : 129
  How will you make your smart home more secure?


Answer :

To make your smart home more secure do the following:

  • Give your router a name: Don't stick with the name the manufacture gave it - it might identify the make or model. Give it an unusual name.
  • Change default usernames and passwords: Cybercriminals probably already know the default passwords that come with many IoT products. That makes it easy for them to access your IoT devices and, potentially, the information on them. So, change default usernames and passwords. Use unique, complex password made up of letters, numbers, and symbols.
  • Keep your software up-to-date: Mobile security is important, since you may connect to your smart home through mobile devices. Your IoT device makers also may sent you updates- or you might have to visit their websites to check for them. Be sure to download updates and apply them to your device to help stay safe.


Question : 130

How will you make a password strong?



Answer :

A strong password must:

  • Be eight characters long (characters which include uppercase A-Z, lower case a-z; numbers 0-9; symbols found on the keyboard and spaces which include' ~ ! @ # $ % ^ & * ( ) _ - + = { } [ ] \ | : ; " ' < > , . ? / )
  • Not contain user, real or company name.
  • Not contain a complete word and be different from previous passwords.




Question : 131

What is difference between Trojan horse and Worm? 



Answer :

A Trojan horse is a term used to describe malware that appears, to the user, to perform a desirable function but, facilitates unauthorized access to the user's computer system.  A computer worn is a self - replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any user intervention.



Question : 132

What is DNS spoofing?



Answer :

Domain Name Server (DNS) poisoning or spoofing is a type of cyber- attack that exploits system vulnerabilities in the domain name server to divert traffic away from legitimate servers and directs it towards fake ones.



Question : 133

What is Brute Force Attack?



Answer :

A Brute Force Attack is the simplest method to gain access to a site or server (or anything that is password protected). It tries various combinations of usernames and passwords again and again until it gets in. The longer the password, the more combinations that will need to be tested. However, If the password is weak it could merely take seconds with hardly any effort.



Question : 134

What is Ransomware?



Answer :

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.



Question : 135

What is Botnet?



Answer :

Botnets consists of many bots working together, may be used to gain unauthorized access to computer systems and infect computers . For Example, The attack used the Mirai IoT Botnet, Taking control of over 600,000 IoT devices to flood Dyn with traffic in a massive DDoS attack. The devices seemed to be mostly routers and IP cameras. IP cameras are frequently targeted IoT devices.



Question : 136

List few tips to identify phishing.



Answer :

Few tips to identify the phishing are as follows:

  • Do not trust the display name.
  • Look at the content of the email, but do not click it.
  • Do not give away any personal information.


Question : 137

Discuss goal of Brute Force Attack.



Answer :

Goal of Brute Force Attack are as follows:

  • Theft of personal information such as passwords, passphrases and other information used to access online accounts and network resources.
  • Collect credentials to sell to third parties.
  • Defacement of website and other information in the public domain that could damage the reputation of the organization.
  • Redirecting domain to sites holding malicious content.


Question : 138

How IoT and AI are used to track Endangered Species?



Answer :

There are many animals that are endangered or going extinct in various countries So Wild Track's footprint identification technique (FIT) uses IoT and AI algorithms to identify the species, individual, age and gender of an animal from its unique footprint.



Question : 139

What is Passive Attack?



Answer :

Eavesdropping on or monitoring of transmissions is known as passive attack. The goal of eavesdropping is to obtain that information which is being transmitted. Passive attacks are difficult to detect (if they accur) but they can be prevented.



Question : 140

Write Pros and Cons of Symmetric cryptography algorithms.



Answer :

Pros: Faster than asymmetric cryptography.
Cons: Difficult to distribute and protect the shared secret key securely.



Question : 141

Write Pros and Cons of Asymmetric cryptography algorithms.



Answer :

Pros: Easy to manage, scalable
Cons: Difficult to distribute and protect the shared secret key securely.



Question : 142

List some IoT security Weaknesses.



Answer :

Some IoT Security Weaknesses are:

  • Weak, Guessable, or Hardcoded Passwords.
  • Insecure Network services.
  • Use of Insecure or Outdated Components.
  • Lack of Secure Update Mechanism.


Question : 143

List some applications of AI.



Answer :

Some applications of AI are:

  • Natural language processing
  • Chatbots
  • Sales prediction
  • Self-driving card
  • Facial expression recognition
  • Image tagging


Question : 144

Write short notes on the following:

(a) Stress
(b) Attitude
(c) Time management



Answer :

(a) Stress is an emotional / bodily reaction to physical, psychological or emotional demands.
(b) It is defined as response to people, place, things or events in life. Basically, a person's viewpoint, mind set and belief makes an attitude.
(c) Time management is a kind of planning and exercising conscious control over the amount of time spent on the specific activities, to increase effectiveness, efficiency or productivity.



Question : 145

 What is Personality?



Answer :

Personality is the constant pattern of thinking, feeling and acting. It may be considered as a combination of individual thought, characteristics, behaviours, attitude or it is the product of special interaction in group life as every person living in society has different traits such as skin, color, weight, etc.



Question : 146

What do you mean by an Attitude?



Answer :

Attitude is a psychological construct, or its a mental and emotional entity which inheres in, or characterizes a person. It is an acquired state through experiences. It is an individual's predisposed state of mind regarding a value and it is precipitated through a responsive expression toward a person, place, thing, or event which influences individual's thought and action. An attitude is a persistent tendency which is to feel and then behave in a particular way toward some object.



Question : 147

Define Gestures.



Answer :

 It is a from of non-verbal communication in which body actions communicates a particular message, either with or without speech. Gestures includes the movement of the hands, face, 0r other parts of the body.



Question : 148

How will you develop a positive personality?



Answer :

To develop a positive personality:

  • Have a Positive Outlook in Life.
  • Entertain Positive Thoughts.
  • Maintain a Positive Attitude.


Question : 149

What are causes of Stress?



Answer :

Causes of Stress are:

  • Expectations of others or which we place on yourself.
  • Physical environment, which include noise, movement etc.
  • Internal environment such as academic pressure, frustration, social life, etc.


Question : 150

What are different ways to manage stress?



Answer :

 Ways to manage stress are:

  • Add balance to life.
  • Know your strength and weakness.
  • Exercise regularly.


Question : 151

How stress effects our Health?



Answer :

When we are in a stressful situation, we may notice that our muscles tense, and we start sweating. This kind of stress is short-term and temporary or acute stress, and our body usually recovers quickly from it.



Question : 152

What are different elements of Communication?



Answer :

Different elements of Communication are Connection, Sender / Encoder, Message, Medium, Recipient / Decoder and Feedback.



Question : 153

Write any two main objectives of communication.



Answer :

The main objectives of communication are:

  • Conveying the right message: The main objective of communication is to pass on the right message to one side individual, i.e., to the individual for whom it is implied.
  • Effectiveness of policies: The organization defines policies and projects to manage the workforce. These should be conveyed appropriately to the individuals who are truly responsible for the execution of work to accomplish the organizational objectives.


Question : 154

Explain different types of attitude.



Answer :

There are three types of attitude:

  • Positive attitude: Individual will pay attention to the good in people. Situation, event, etc. They will not consider a mistake or failure as a hurdle but as an opportunity. They learn from mistake and move forward in life.
  • Negative attitude: Individual will ignore the good and pay attention to the bad in people, situation, events, etc. They also complain about changes, rather than adapting to the changing environment. They blame their failure on others.
  • Neutral attitude: individual do not give enough importance to situations or events. They ignore the problem, leaving, it for someone else to solve. They do not feel the need to change.


Question : 155

Define Etiquettes. What are good Etiquettes?



Answer :

Etiquettes is a code of behaviour which delineates expectations for social behaviour according to contemporary conventional norms within a society, social class, or group.

good etiquettes are:

  • Hold doors open for other people
  • Speak polity
  • Listen to another person
  • Don't speak loud on your cell phone.


Question : 156

What are two main approaches to the study of personality?



Answer :

The two main approaches to the study of personality are:

(a) Psychological: It considers personality as a certain style which is peculiar to the individual and is determined by the characteristic organization of mental trends,  complexes, emotions and sentiments. The psychological approach enables a person to understand the phenomena of personality disorganization and the role of wishes, of mental conflict.

(b) sociological: It considers personality in terms of the status of the person in the group, like how he / she consider his/ her conception about his role in the group of which he / she is a member. Basically, what others think of us also plays a very important role the formation of our personality.



Question : 157

What are the characteristics of personality?



Answer :

The characteristics of personality are:

(a) It is not related only to body structure, but it includes both the structure and dynamics.

(b) It is unique for every individual.

(c) It expresses consistency and regularity.

(d) It is defined in terms of behaviour.



Question : 158

What are factors of Personality?



Answer :

Personality is the combination of four factors:

(a) Physical Environment: Environment in which we live also effect on culture and the geographical environment sometimes determines cultural variability. Also, physical environment determines the cultural development and the culture in turn determines personality, so the relationship between personality and environment becomes clear.

(b) Heredity: Similarities in man's personality is due to his common heredity. Every human group inherits the same general set of biological needs and capacities which explain some of our similarities in personality. Man, originates from the union of male and female germ cells into a single cell which is formed at the moment of conception.

(c) Culture: Personality is the subjective aspect of culture and regarded as two sides of the same coin. Personality is an individual aspect of culture, whereas culture is a collective aspect of personality."

(d) Particular Experiences: Personality can also be determined by the particular and unique experiences. There are two types of experiences one which is from continuous association with one's group, and the other arise suddenly. The people who meet daily has a major influence on personality. The personality of parents affect more a child's personality.





Question : 159

Explain any two determinants which affects personality.



Answer :

The determinants which affects personality are:

(a) Self-Awareness: Self-awareness is the capacity that a person has to introspect, it includes gaining an understanding of and insight into one's strengths, qualities, weakness, defects, ideas, thoughts, beliefs, ideals, responses, reactions, attitude, emotions and motivations.

(b) Self-Discipline: It is the suppression of base desires, which is understood as a from of self-control restraint and control. Discipline is when one uses reason to determine the best course of action regardless of one's desires, which may be the opposite of excited. 



Question : 160

a)      Why Self Esteem Is important?



Answer :

Self Esteem is important because it impact on life and choice of an individual. Self-value of an individual is the  source of mental health. Self Esteem is the idea which you have about yourself like how valuable and important you think you are. It is the result of one’s own evaluation based on many factors. It involves self-beliefs, emotions such as accomplishment, depression, pride and humiliation as gathered or accumulated in our own mind.



Question : 161

What is self-motivation?



Answer :

a)     It is an ability to do what needs to be done, without the influence from other people or situations. People with self-motivation can find a reason and strength to complete a task without giving up.
It is the force which drives you to do things. Self-motivation is a key life skill of personal development and an emotional intelligence.



Question : 162

Explain different types of Vertical Communication.



Answer :

a)     Vertical communication is of the following two types:

  D  Downward Communication: the communication by top hierarchy with their subordinates is called downward communication. This communication includes orders, rules, information, Policies, instructions, etc. The chief advantage of the downward communication is that the subordinates get useful timely information, which helps them in their work performance. 

         Upward Communication: This is quit the reverse of the downward communication. This flow from the subordinates to the superiors. The subject matter of this communication includes suggestions, reactions, reports, complaints, etc. This sort of communication helps the superiors in taking decisions.





















Question : 163

“Writing skills are an important part of communication” Comment.



Answer :

a)    Writing is a form of communication which allows people to put their feelings and ideas on paper, to organize their knowledge and beliefs into convincing arguments, and to convey meaning through well-constructed text.
Writing skills are an important part of communication, as good writing skills allow you to communicate your message with clarity and ease to a far larger audience than through face-to-face or telephone conversations. You might be called upon to write a report, plan or strategy at work; write a grant application or press release within a volunteering role. A well written CV or resume with no spelling or grammatical mistake is essential if you want a new job.



Question : 164

What are the general guidelines for effective employment interview?



Answer :

General guidelines for effective employment interview are:

  • Be prepared for the interview: Just as the interviewer has to plan out the event in advance, so has the interviewee to be prepared for it. As he / she has no control over the event, he / she has to be more careful at every step. He / she has to face an interviewer or a board of interviewers. He / she must, therefore, be very clear about the purpose of the event.

  • Has a presentable appearance: Everybody appreciates a pleasant personality. As in the case of a presentation, so in an interview, the concerned person’s appearance is a part of the message. Since an interview is a formal occasion, the interviewee must be formally dressed. Anyone having conventional standards of neatness is likely to have definite advantage over one casually dressed for an interview. 

  • Show interest by making effective use of body language: Keeping eye-to-eye contact with the interviewer at once shows that the interviewee is genuinely interested in the event and keen to participate in it. He /she should also sit in a correct, confident posture, straight, balanced and not stiff in the chair offered. The hands should be neatly locked on the lap or comfortably placed on the arms of the chair.



CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online Exam Quiz O Level NIELIT Study material and Quiz Bank SSC Railway TET UPTET Question Bank career counselling in allahabad Best Website and Software Company in Allahabad Website development Company in Allahabad