IOT Questions and Answers – Application of Fog Computing

This set of IOT Multiple Choice Questions & Answers (MCQs) focuses on “Application of Fog Computing”.

1. Fog computing is utilized to _________ all debris into a single platform.
a) Integrate
b) Store
c) Task
d) Flexible
View Answer

Answer: a
Explanation: Some tasks require large amount of computation and storage, eg., real time video analytics, are infeasible due to the limited capacity of hardware. To solve these problems, fog computing is utilized to integrate all debris into a single platform.

2. OpenFog Consortium defines and extends the application of _______ computing.
a) Mist computing
b) Edge computing
c) Cloud computing
d) Mobile Cloud computing
View Answer

Answer: b
Explanation: OpenFog Consortium defines and extends the application of fog computing or also known as Edge Computing.

3. Cloud computing must work _______ with fog computing to provide a seamless end to end customer experiences.
a) Seamlessly
b) Scalable
c) Control
d) Multiple services
View Answer

Answer: a
Explanation: Cloud computing must work seamlessly with fog computing to provide a seamless end to end customer experiences, said Antunes.
advertisement
advertisement

4. Fog computing works well in cloud based _______ panel
a) Cloud
b) Data
c) Control
d) Fog
View Answer

Answer: c
Explanation: Fog computing works well in a cloud based control plane to provide control and broader insight across a large numbers of nodes.

5. Challenges can be addressed within a single IoT network by _______
a) Fog node
b) Cloud node
c) Data
d) Control
View Answer

Answer: a
Explanation: Large cities face challenges from traffic congestion, public safety, high energy use. These challenges can be addressed within a single IoT network by installing a network of fog node.
Sanfoundry Certification Contest of the Month is Live. 100+ Subjects. Participate Now!

6. Lack of broadband _______ and connectivity is a major issue in establishing smart cities.
a) Storage
b) Bandwidth
c) Address
d) Services
View Answer

Answer: b
Explanation: A lack of broadband bandwidth and connectivity is a major issue in establishing smart cities. While most of the modern cities have one or more cellular networks providing adequate coverages.

7. Fog computing addresses security, data encryption.
a) True
b) False
View Answer

Answer: a
Explanation: Fog computing addresses security, data encryption and distributed analytics requirements.
advertisement

8. Building automation demonstrates the need for _______
a) Edge intelligence
b) Sensors
c) Control function
d) Local operations
View Answer

Answer: a
Explanation: Building automation demonstrates the need for edge intelligence and localized processing.

9. A commercial building may contain mainly _______ component.
a) Memory
b) Fog node
c) Cloud nodes
d) Sensors
View Answer

Answer: d
Explanation: A commercial building may contain thousands of sensors to measure various building operating parameters: temperature, keypad readers and parking space occupancy.
advertisement

10. Who will do actions if it is needed?
a) Fog node
b) Fog computing
c) Devices
d) Controller
View Answer

Answer: b
Explanation: Data from sensors must be analyzed to see if actions are needed, such as triggering a fire alarm if smoke is sensed. Fog computing allows for autonomous local operations for optimized control function.

11. Fog node is ___________
a) Floor
b) Wing
c) Individual room
d) Floor, Wing and Individual room
View Answer

Answer: d
Explanation: Each floor, wing or even individual room could contain its own fog node that is responsible for performing emergency monitoring and response functions.

12. Fog computing works with cloud computing.
a) False
b) True
View Answer

Answer: b
Explanation: Fog computing works with cloud computing, so the long term history of building operational telemetry and control actions can be aggregated and uploaded to the cloud.

13. What is OpenFog?
a) Software
b) Device
c) Derived from fog computing
d) Architecture
View Answer

Answer: d
Explanation: The OpenFog architecture specifies a secure end to end computer environment between the cloud and the fog nodes that connect to IoT devices.

14. IoT devices use _______ for security.
a) Cloud
b) Software
c) Immutable root of trust
d) Fognode
View Answer

Answer: c
Explanation: These devices use a hardware-based immutable root of trust, which can be attested by software agents running throughout the infrastructure.

15. Fog computing allows for latency sensitive distributed surveillance that maintains privacy.
a) True
b) False
View Answer

Answer: a
Explanation: Fog computing allows for latency sensitive distributed surveillance that maintains privacy because privacy concerns must be addressed when using a camera as a sensor.

Sanfoundry Global Education & Learning Series – IOT.

To practice all areas of IOT, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.