1. TCP and UDP are called ________
Correct Answer is : Transport protocols
2. Security based connection is provided by which layer?
Correct Answer is : Transport layer
3. TCP is the standard protocol with std no?
4. Using which method in transport layer data integrity can be ensured?
Correct Answer is : Checksum
5. Buffer overrun can be reduced by using what?
Correct Answer is : Flow control
6. Transport layer can identify the symptoms of overload nodes using _________
Correct Answer is : Traffic control
7. Transport layer receives data in the form of __________
Correct Answer is : Byte streams
8. Transport layer is which layer in OSI model?
Correct Answer is : Fourth layer
9. Congestion control can control traffic entry into a telecommunications network, so to avoid _________
Correct Answer is : Congestive collapse
10. FCP stands for _________
Correct Answer is : Fiber Channel Protocol
11. UDP packets are called as _________
Correct Answer is : Datagrams
12. _________ do not provide end to end communication.
13. ARQ stands for __________
Correct Answer is : Automatic Repeat Request
14. We need to invest in storage and prepossessing capacity to perform _________
Correct Answer is : IoT analytics
15. IoT analytics was proposed by _________
Correct Answer is : Intel
16. How can we publish data in Intel IoT?
Correct Answer is : By creating an account
17. The page displays the sum of the last hour observations for all the registered devices.
18. Each device has a globally unique identifier known as _________
Correct Answer is : accountid
19. With one account in Intel IoT Analytics, how many devices can be connected?
Correct Answer is : Infinite
20. _________ setting that can be modified on a device.
Correct Answer is : Actuator