Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.
Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.
Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which layer is CoAP? A. control layer B. transport layer C. service layer D. application layer
C. service layer
C. service layer
See lessCoAP is specialized for A. internet applications B. device applications C. wireless applications D. wired applications
A. internet applications
A. internet applications
See lessRequest field is present in which message format? A. request message B. response message C. both request andresponse D. neither request norresponse
A. request message
A. request message
See lessRequest field is present in which message format? A. request message B. response message C. both request andresponse D. neither request norresponse
A. request message
A. request message
See lessOut of the following which is not element of threat modelling A. asset B. vulnerability C. threat D. time
D. time
D. time
See lessIn threat modeling, what methodology used to perform risk analysis A. dread B. owasp C. stride D. dar
A. dread
A. dread
See lessSmart Dust can be used to measure the A. temperature of theindustrial lathe machine B. heat inside a computer’s cpu C. chemical in the soil D. strength of a solid material
C. chemical in the soil
C. chemical in the soil
See lessWhich of these statements regarding sensors is TRUE? A. sensors are input devices. B. sensors can be analog as well as digital C. sensors respond to some external stimuli. D. all of these
D. all of these
D. all of these
See lessM2M is a term introduced by A. iot service providers B. fog computingservice providers C. telecommunicationservice providers D. none of these
C. telecommunicationservice providers
C. telecommunicationservice providers
See lessWhich of the following is not involved in working of IoT? A. rfid B. sensor C. nano tech D. server
D. server
D. server
See less