--> Sayadasite: DIGITAL FLUENCY MCQ MODULE 1 WITH ANSWER

Multiple Ads

Search

Menu Bar

DIGITAL FLUENCY MCQ MODULE 1 WITH ANSWER

All questions are mandatory
1.     The process of training a Neural Net is:
a)     Model -> Train -> Training Data -> Prediction -> Test and Update
b)     Train -> Model - >Prediction -> Test and Update
c)      Training Data -> Model -> Predict -> Test mool Update
2.     A bot that can determine whether a bug is exploitable is called:
a)     Medecision
b)     Automatic Exploit Generation
c)      Hal
3.     In the case of Machine Learning, the algorithm needs to be told how to make an accurate prediction by providing it with more information, whereas, in the case of Deep Learning, the algorithm is able to learn that through its own Data Processing.
a)     True
b)     False
4.     Just like the PC, Internet and Cloud Computing, AI is also a disruptive technology.
a)     True
b)     False
5.     In the Healthcare Industry, AI has disrupted:
a)     Medical Imaging
b)     Surgery
c)      Physiological Diagnosis
6.     In Machine Learning, decisions are based on the type of algorithm selected.
a)     True
b)     False
7.     Which type of Neural Network is used by Stock Market Indices?
a)     LSVM
b)     NSTM
c)    
  LSTM
8.     Naïve Bayes Classifier algorithm is useful for predicting class of the test dataset.
a)     True
b)     False
9.     Which of the following Machine Learning Algorithms is a learning method that interacts with its environment by producing actions and and discovering errors or rewards?
a)     Supervised Learning
b)     Semi Supervised Learning
c)      Reinforcement Learning
10.   Unsupervised Machine Learning algorithms are used when the information used to train is neither classified nor labeled.
a)     True
b)     False
11.   The more layers there are in a Neural Network, the higher is its ability to approximate more complex functions.
a)   
  True
b)     False
12.    The most basic type of an ANN is called:
a)    
 Feedforward Neural Network
b)     Recurrent Neural Network
c)      Boltzmann Machine Network
13.  Which of these tools can help you build your Convolutional Neural Network?
a)     Tensorflow
b)     Premier Pro
c)      Silverlight
 
14.  In a Deep Learning System, each connection between Neurons is associated with a:
a)     Length
b)     Weight
c)      Function
15.  The network evaluates how good its prediction was through_________
a)     Cost function
b)     Loss function
c)      Bias parameters
d)     Back propagation
16.  "Companies that see significant impact from advanced analytics are purposeful about where they intend to win in analytics."
a)     
True
b)     False
17.  A centralized repository that allows you to store all your structured, unstructured and semi-structured data at any scale is called a:
a)     Dataset
b)     Database
c)  
    Data Lake
d)     Data Warehouse
18.  Which algorithm allows you to reduce the dimension of the data while losing the least amount of information?
a)     Decision Trees
b)     K-Means Clustering
c)      Recurrent Neural Networks
d)     Principal Component Analysis
19.  Clustering (or cluster analysis) is the task of breaking up a set of objects into groups called clusters.
a)     True
b)     False
20.  Which type of analytics describes or summarizes existing data to understand what is going on or what has happened?
a)     Descriptive Analytics
b)     Diagnostic Analytics
c)      Predictive Analytics
d)     Prescriptive Analytics
21.  Which one of the following is NOT a key component of DBMS?
a)     Runtime Database Manager
b)     Equitable Manager 
c)      Database Manager
22.  RDBMSes store Data in the form of tables, with most commercial Relational Database Management Systems using:
a)     SQL 
b)     Apache
c)      WorkFusion
23.  The table format used in RDBMSes is easy to understand but does not provide an organized and structural manner through which entries are matched by firing queries.
a)     True
b)     False
24.  Which is an open source relational database management system (RDBMS) with a client-server model?
a)     Oracle 
b)     MySQL
c)      MS-Access
25.  MongoDB supports ad-hoc queries and document-based queries.
a)     True
b)     False
26.  In Canada, credit union _____ is exploring the possibility of wealth management apps, displayed on car windscreens, for passengers to review their portfolios while being driven to their destination
a)     Redshore
b)     Blueshore
c)      Deepshore
d)     None of the above
27.  ______ are also beneficial for the elderly, providing monitoring that can help seniors to remain at home comfortably and safely, rather than moving to a nursing home or requiring 24/7 home care
a)     Robotics
b)     Analytics
c)      Domotics
d)     None of the above
28.  Which is the first stage in every IoT architecture?
a)     Sensors and actuators
b)     Internet getaways and Data Acquisition Systems
c)      Edge IT
d)     Data center and cloud
29.  IoT devices are naturally vulnerable to ________ threats
a)     Sensors
b)     Heterogeneity
c)      Security
d)     Connectivity
30.  IoT is a paradigm that involves ubiquitous presence in the environment
a)     True
b)     False
31.  What are copies of the physical objects that are accurate enough to let their owners experiment and predict the operation of their assets called?
a)     Digital Sons
b)     Digital Siblings
c)      Digital Twins
32.  Which of the following IIoT elements can be used in factories to tackle manufacturing challenges, such as machine failure, problems in control systems, etc.? A. Installing sensors throughout the factory to monitor production flow in real time to eliminate waste B. Creating predictive models based on the data gathered with the help of IoT devices
a)     Only A
b)     Only B
c)      Both A and B
33.  Which of the following are the biggest users of IIoT? A. Automotive Fleet Management            B. Manufacturing C. Media and Entertainment
a)     A and B
b)     B and C
c)      A and C
34.  DDoS attacks are real threats to IIoT.
a)     True
b)     False
 
35.  What are the risks associated with industrial IoT?
a)     Ransomware infections denying access to critical systems.
b)     Not much awareness about internet and smart devices.
c)      Loss Of employment by skilled workers.
36.  Which of the following are the top benefits of IIoT in manufacturing? A. Improvement of operational performance B. Ensuring safety and compliance C. Increasing flexibility and agility
a)     A and B
b)     A, B and C
c)      B and C
37.  Which one of these are not one of the big names in the FinTech cloud computing sector?
a)     Amazon Web Services
b)     Microsoft Silverlight
c)      Google Virtual Cloud
d)     Microsoft Azure
38.  The resilience of Cloud deployments:
a)     Increases Uptime
b)     Simplifies Disaster Recovery
c)      Both of the above
39.  An example of PaaS is:
a)     Rackspace Cloud
b)     Mosso
c)      Amazon EC2
d)     Gmail
40.  Which cloud service model is the most widely used in the world?
a)     SaaS
b)     PaaS
c)      IaaS
d)     All of them
41.  Amazon Elastic MapReduce offers a _______ framework to process large amounts of data.
a)     R
b)     Hadoop
c)      Python
d)     None of the above.
42.  SaaS is also known as hosted software or on-demand software.
a)     True
b)     False
43.  The PaaS service delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.
a)     True
b)     False
44.  Grunge Computing is about moving local computing to local devices in a highly distributed system, typically as a layer around a cloud computing core.
a)     True
b)     False
45.  iPaaS offerings in the cloud from which providers let users implement data mapping, transformations is/are:
a)     Apache Spark
b)     Dell Boomi
c)      WorkFusion
 
46.  Infrastructure as a Service and Hardware as a Service are two completely different things.
a)     True
b)     False
47.  ____________ uses software and hardware methods to tackle external threats that can arise in the development stage of an application
a)     Disaster Recovery
b)     Application Security
c)      Information Security
d)     Endpoint Security
48.  Critical Infrastructure does not include
a)     Electricity Grid
b)     Water Purification
c)      Traffic Lights
d)     Cooking Gas Lines
49.  The full form of SEG is
a)     Secure Email Gateway
b)     Secure Ecommerce Gateway
c)      Security Email Gateway
d)     Secure Email Gate
50.  Application security uses software and hardware methods to tackle external threats
a)     True
b)     False 51.  Who alongside the FDA recently launched a joint initiative to “increase coordination in dealing with threats related to medical devices?
a)     HHS
b)     DHS
c)      LHS
d)     AHS
52.  Hackers are always looking for opportunities to invade privacy and steal data that’s of crucial importance
a)     True
b)     False
53.  A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems
a)     True
b)     False
54.  One of the easiest ways your information can become hacked is through easy-to-guess passwords
a)     True
b)     False
55.  Which attack involves using IP spoofing and the ICMP to saturate a target network with traffic?
a)     Smurf attack
b)     Teardrop attack
c)      Replay attack
56.  Botnets are the millions of systems infected with malware under hacker control in order to carry out DDoS attacks
a)     True
b)     False
 
 
 
   

No comments: