Skip to main content

INTRODUCTION TO INTERNET OF THINGS: Assignment 12



All the best for your NPTEL exams guys:-



1. If all the data points are same, statistical dispersion becomes –
 
 
 
 
2. The desirable characteristics of an IoT sensor node are
 
 
 
 
3. Long term trend tracking and preventive care in IoT healthcare is possible due to
 
 
 
 
4. Activity monitoring in smart homes:
 
 
 
 
5. Network-based activity recognition is:
 
 
 
 
6. Which of these is a feature of qualitative data analytics?
 
 
 
 
7. Which is true?
 
 
 
 
8. ANOVA is applied
 
 
 
 
9. Which of the following can be the reasons for packet drop in IoT network?
 
 
 
 
10. The types of ANOVA are:
 
 
 
 
11. Wearables can be used for:
 
 
 
 
12. Wearable-based activity monitoring can be used for:
 
 
 
 
13. Which of these is true is case of network based activity monitoring?
 
 
 
 
14. What is the network topology of Ambusens WBAN devices?
 
 
 
 
15. Which of these sensors can be most cheaply used for basic activity monitoring in wearables?
 
 
 
 

Comments

Popular posts from this blog

How to activate window 10 and office 2019 using KMS Digital Activation Tool

KMS & Digital & Online Activation Suite 5.9 Full[Techy Things]     SUPPORTED MICROSOFT PRODUCTS: Vista Pro / Enterprise Window 7 Pro / Enterprise Windows 8 / 8.1 / 10 (All versions) Windows Server 2008/2012/2012 R2 / 2016 (all editions) Office 2010/2013/2016/2019/2021(BETA) versions. Click Here  to download KMS DIGITAL ACTIVATION TOOL 2019:- Turn off Anti Virus or Window Defender firewall for some time. Extract folder and In case of any password Enter :-2018 Open  KMS_Suite . Give admin permission by clicking yes .     Then this  Dialog box  will appear:-      In this Application it has many methods of Activating office and Window .     But we will activate it by using KMS INJECT METHOD.  PRESS 1 TO GIVE COMMAND:-                                         ...

HOW TO GET PROTECTED FROM PHISSING HACKING

How to protect against phishing scams facebookShareLinkText   twitterShareLinkText   linkedInShareLinkText A tech support scam is a form of Internet fraud that is currently gaining momentum on the Internet. The scam implements  social engineering  and fear tactics in order to get the victim to take the bait. There are three main ways this scam is executed- via cold calls, pop-up messages on the computer and incorrect search engine results. Cold Calls Tech support cold calls are when an individual calls the target, claiming to be from a reputable company and states that they have found malware on the computer. The criminal will then try to get the user to install a type of remote desktop software under the pretext of removing the infestation, which would allow the attacker access to the computer in order to install real malware. In addition to attempting to install malware on the machine, these scammers will often ask for a fee to fi...