--> Sayadasite: DIGITAL FLUENCY MCQ MODULE 1

Multiple Ads

Search

Menu Bar

DIGITAL FLUENCY MCQ MODULE 1

Module1:Emerging Technologies (BACK)

 

1.   Artificial Intelligence, Machine Learning, Deep Learning

 

1.      AI stands for ____________

 

a)                 Aircraft Intelligent

 

b)                Artificial Intelligence

 

c)                   Aerial Intelligence

 

d)                Advanced Internet

2.      What is Artificial intelligence?

 

a)               Putting your intelligence into Computer

 

b)              Programming with your own intelligence

 

c)                 Making a Machine intelligent

 

d)              Playing a Game

3.      Who is the father of Artificial Intelligence?

 

a)               Charles Babbage

 

b)              Alan Turing

 

c)                 John McCarthy

 

d)              Bill Gates

4.      In the Healthcare Industry, AI has disrupted:

 

a)                 Medical Imaging

 

b)                Surgery

 

c)                   Physiological Diagnosis

 

d)                None of the above

5.      Which programming language is used for AI?

 

a)                 Python

 

b)                LISP

 

c)                   PROLOG

 

d)                All the above

6.      The characteristics of the computer system capable of thinking, reasoning and learning is known is

 

a)                 Machine Intelligence

 

b)                Human Intelligence

 

c)                   Artificial Intelligence

 

d)                Virtual Intelligence

7.      What is the full form of “ML”?

 

a)                 Machine Learning

 

b)                Machine Looking

 

c)                   Mechanic Link

 

d)                Many Learning

 

8.      The process of training a Neural Net is:

 

a)                 Model -> Train -> Training Data -> Prediction -> Test and Update

 

b)                Train -> Model - >Prediction -> Test and Update

 

c)                   Training Data -> Model -> Predict -> Test and Update

 

d)                Training Data -> Predict -> Test and Update -> Model

9.      A bot that can determine whether a bug is exploitable is called:

 

a)                 Medecision

 

b)                Automatic Exploit Generation

 

c)                   Hal

 

d)                None of the above

10.                  Which type of Neural Network is used by Stock Market Indices?

 

a)                 LSVM

 

b)                NSTM

 

c)                   LSTM

 

d)                ANSI

11.                  Which of the following Machine Learning Algorithms is a learning method that interacts with its environment by producing actions and and discovering errors or rewards?

 

a)                 Supervised Learning

 

b)                Semi Supervised Learning

 

c)                   Reinforcement Learning

 

d)                None of the above

12.                  The most basic type of an ANN is called:

 

a)                 Feedforward Neural Network

 

b)                Recurrent Neural Network

 

c)                   Boltzmann Machine Network

 

d)                None of the above

13.                  In a Deep Learning System, each connection between Neurons is associated with a:

 

a)                 Length

 

b)                Weight

 

c)                   Function

 

d)                Loop

14.                  The network evaluates how good its prediction was through_________.

 

a)                 Cost function.

 

b)                Loss function

 

c)                   Bias parameters

 

d)                Back propagation

15.                  What is the term used for describing the judgmental or common-sense part of problem solving?

 

a)                 Heuristic

 

b)                Critical

 

c)                   Value based

 

d)                Analytical

 

16.                  An AI technique that allows computers to understand associations and relationships between objects and events is called:

 

a)                 Heuristic Processing

 

b)                Cognitive Science

 

c)                   Relative Symbolism

 

d)                Pattern Matching

17.                  The field that investigates the mechanics of human intelligence is:

 

a)                 History

 

b)                Cognitive Science

 

c)                   Psychology

 

d)                Sociology

18.                  What is the full form of “DL”?

 

a)                 Deep Learning

 

b)                Depth Learning

 

c)                   Drone Launching

 

d)                Drive Loading

19.                  Machine learning is a subset of ................

 

a)                 Deep Learning

 

b)                Artificial Intelligence

 

c)                   Data Learning

 

d)                None of the above

20.                  Who is the father of Machine Learning?

 

a)                 Geoffrey Hill

 

b)                Geoffrey Chaucer

 

c)                   Geoffrey Everest Hinton

 

d)                None of the above

21. ................... algorithms enable the computers to learn from data, and even improve themselves,

 

without being explicitly programmed.

 

a)                 Deep Learning

 

b)                Machine Learning

 

c)                   Artificial Intelligence

 

d)                None of the above

22.                  Real-Time decisions, Game AI, Learning Tasks, Skill acquisition, and Robot Navigation are applications of

 

a)                 Reinforcement Learning

 

b)                Supervised Learning: Classification

 

c)                   Unsupervised Learning: Regression

 

d)                None of the above

23.                  Common classes of problems in machine learning is ..............

 

a)                 Clustering

 

b)                Regression

 

c)                   Classification

 

d)                All of the above

 

24.                  RNNs stands for?

 

a)                 Receives neural networks

 

b)                Report neural networks

 

c)                   Recording neural networks

 

d)                Recurrent neural networks

25.                  Application of machine learning methods to large databases is called

 

a)                 Data Mining.

 

b)                Artificial Intelligence

 

c)                   Big Data Computing

 

d)                Internet Of Things

26.                  Which of the following is the best machine learning method?

 

a)                 Scalable

 

b)                Accuracy

 

c)                   Fast

 

d)                All of the above

27.                  Which of the following is an example of deep learning?

 

a)                 Self-driving cars

 

b)                Pattern recognition

 

c)                   Natural language processing

 

d)                All of the above

28.                  For an image classification task, which of the following deep learning algorithm is best suited?

 

a)                 Recurrent Neural Network

 

b)                Multi-Layer Perceptron

 

c)                   Convolution Neural Network

 

d)                All of the above

29.                  Which of the following makes a neural network non-linear?

 

a)                 Convolution function

 

b)                B. Batch gradient descent

 

c)                   Rectified linear unit

 

d)                All of the above

30.                  What is true about Machine Learning?

 

a)                 Machine Learning (ML) is that field of computer science

 

b)                ML is a type of artificial intelligence

 

c)                   ML is a field of AI consisting of learning algorithms

 

d)                All of the Above

 

2.         Database Management for Data Science, Big Data Analytics

1.                  Data science is the process of diverse set of data through?

 

a)     organizing data

 

b)    processing data

 

c)       analysing data

 

d)    All of the above

2.                  What is abbreviation of DBMS?

 

a)     Data Base Management system

 

b)    Data base mining source

 

c)       Data Base Management Schema

 

d)    Data Base Manipulation Schema

3.                  A centralized repository that allows you to store all your structured, unstructured and semi-structured data at any scale is called a:

 

a)     Dataset

 

b)    Database

 

c)       Data Lake

 

d)    Data Warehouse

4.                  Which algorithm allows you to reduce the dimension of the data while losing the least amount of information?

 

a)     Decision Trees

 

b)    K-Means Clustering

 

c)       Recurrent Neural Networks

 

d)    Principal Component Analysis

5.                  Which type of analytics describes or summarizes existing data to understand what is going on or what has happened?

 

a)     Descriptive Analytics

 

b)    Diagnostic Analytics

 

c)       Predictive Analytics

 

d)    Prescriptive Analytics

6.                  RDBMS’s store Data in the form of tables, with most commercial Relational Database Management Systems using:

 

a)     SQL

 

b)    Apache

 

c)       Workfusion

 

d)    None of the above

 

7.                  Which is an open-source relational database management system (RDBMS) with a client-server model?

 

a)     Oracle

 

b)    MySQL

 

c)       MS-Access

 

d)    None of the above

 

8.                  In computers, a ____ is a symbolic representation of facts or concepts from which information may be obtained with a reasonable degree of confidence.

 

a)     Data

 

b)    Knowledge

 

c)       Program

 

d)    Algorithm

9.                  Which of the following are Benefits of Big Data Processing?

 

a)     Cost Reduction

 

b)    Time Reductions

 

c)       Smarter Business Decisions

 

d)    All of the mentioned above

10.      Data that does not conform to a data model or data schema is known as ______.

 

a)     Structured data

 

b)    Unstructured data

 

c)       Semi-structured data

 

d)    All of the mentioned above

11.      Amongst which of the following is/are not Big Data Technologies?

 

a)     Apache Hadoop

 

b)    Apache Spark

 

c)       Apache Kafka

 

d)    Apache Pytarch

12.      Amongst which of the following can be considered as the main source of unstructured data.

 

a)     Twitter

 

b)    Facebook

 

c)       Webpages

 

d)    All of the mentioned above

13.      MongoDB is a ____ database.

 

a)     SQL

 

b)    DBMS

 

c)       NoSQL

 

d)    RDBMS

14.      What are the different features of Big Data Analytics?

 

a)     Open source

 

b)    Scalability

 

c)       Data recovery

 

d)    All the above

15.      According to analysts, for what can traditional IT systems provide a foundation when they're integrated with big data technologies like Hadoop?

 

a)     Big data management and data mining

 

b)    Data warehousing and business intelligence

 

c)       Management of Hadoop clusters

 

d)    Collecting and storing unstructured data

16.      What are the 7 V's of big data?

 

a)     Volume, Velocity

 

b)    Variety, Variability

 

c)       Veracity, Visualization, and Value.

 

d)    All of the above

17.      ________ has the world’s largest Hadoop cluster.

 

a)     Google

 

b)    LinkedIn

 

c)       Facebook

 

d)    IBM

18.      The primary characteristics of Big Data are ________

 

a)     Volume

 

b)    Variety

 

c)       Value

 

d)    All of the above

19.      Advantages of Big Data are _______.

 

a)     Big data analysis derives innovative solutions.

 

b)    Big data analysis helps in understanding and targeting customers.

 

c)       It helps in optimizing business processes.

 

d)    All of the above

3.   Internet of Things (IoT) and Industrial Internet of Things (IIoT)

1.                  IoT stands for?

 

a)     Introduction of Things

 

b)    Internet of Things

 

c)       Internet of Tracking

 

d)    Interaction of Things

2.                  The term "Internet of Things" was coined by?

 

a)     Kevin Ashton

 

b)    Guido van Rossum

 

c)       IBM

 

d)    Ross Ihaka

3.                  Which of the following category is used for business to consumer process?

 

a)     Group IoT

 

b)    Community IoT

 

c)       Industrial IoT

 

d)    Personal IoT

4.                  IIoT stands for __________

 

a)     Industrial Internet of Things

 

b)    Internet Internet of Things

 

c)       Intelligence Internet of Things

 

d)    Internal Internet of Things

5.                  Which is the first stage in every IoT architecture?

 

a)     Sensors and actuators

 

b)    Internet getaways and Data Acquisition Systems

 

c)       Edge IT

 

d)    Data center and cloud

6.                  IoT devices are naturally vulnerable to ________ threats

 

a)     Sensors

 

b)    Heterogeneity

 

c)       Security

 

d)    Connectivity

7.                  ______ are also beneficial for the elderly, providing monitoring that can help seniors to remain at home comfortably and safely, rather than moving to a nursing home or requiring 24/7 home care

 

a)     Robotics

 

b)    Analytics

 

c)       Domotics

 

d)    None of the above

 

8.                  What is the full form of IaaS?

 

a)     Internet as a Software

 

b)    Internet as a Service

 

c)       Infrastructure as a Software

 

d)    Infrastructure as a Service

9.                  What is the full form of PaaS?

 

a)     Platform as a service

 

b)    Product as a software

 

c)       People as a service

 

d)    Press as software

10.      What is the full form of SaaS?

 

a)     Software as a Service

 

b)    Source as a service

 

c)       Special as a software

 

d)    Shift as a software

11.      What are the risks associated with industrial IoT?

 

a)     Ransomware infections denying access to critical systems.

 

b)    Not much awareness about internet and smart devices.

 

c)       Loss Of employment by skilled workers.

 

d)    None of the above

12.      Which of the following are the biggest users of IoT?

A. Automotive Fleet Management

 

B. Manufacturing

 

C. Media and Entertainment

 

a)                 A and B

 

b)                B and C

 

c)                   A and C

 

d)                A, B and C

13.      Which of the following are the top benefits of IIoT in anufacturing?

A. Improvement of operational performance

B. Ensuring safety and compliance

C. Increasing flexibility and agility

 

a)                 A and B

 

b)                A, B and C

 

c)                   B and C

 

d)                A and C

14.      Which of the following is the way in which an IoT device is associated with data?

 

a)     Internet

 

b)    Cloud

 

c)       Automata

 

d)    Network

15.      An IoT network is a collection of ______ devices.

 

a)     Signal

 

b)    Machine to Machine

 

c)       Interconnected

 

d)    Network to Network

16.      What is the main purpose of WoT (Web of Things) in the IoT?

 

a)     Improve the usability and interoperability

 

b)    Reduce the security

 

c)       Complex the development

 

d)    Increase the cost

17.      What is the role of Big Data in IoT's Smart Grid architecture?

 

a)     Filter the data

 

b)    Locked the data

 

c)       Store data

 

d)    None of the these

18.      What is the full form of IANA?

 

a)     Inter-Assessment-Number-Access

 

b)    Internet-Association-Numbers-Authority

 

c)       International-Aid-for-Network-Authority

 

d)    Internet-Assigned-Numbers-Authority

19.      __________attacks are real threats to IIoT.

 

a)     Distributed Denial-of-Service (DDoS)

 

b)    Worms

 

c)       Ransomware

 

d)    Virus

20.      Which of the following is true?

 

a)     IIoT is not eqivalent to IoT

 

b)    IIoT is independent of IoT

 

c)       IIoT is dependent on some features of IoT

 

d)    None of these

 

4.    Cloud computing and its service models

1.                  What is Cloud Computing?

 

a)     Cloud Computing means providing services like storage, servers, database, networking, etc

 

b)    Cloud Computing means storing data in a database

 

c)       Cloud Computing is a tool used to create an application

 

d)    None of the mentioned

2.                  Who is the father of cloud computing?

 

a)     Sharon B. Codd

 

b)    Edgar Frank Codd

 

c)       J.C.R. Licklider

 

d)    Charles Bachman

 

3.                  Which of the following are the features of cloud computing?

 

a)     Security

 

b)    Availability

 

c)       Large Network Access

 

d)    All of the mentioned

 

4.                  Which of the following is a type of cloud computing service?

 

a)     Service-as-a-Software

 

b)    Software-and-a-Server

 

c)       Software-as-a-Service

 

d)    Software-as-a-Storage

5.                  Which one of these are not one of the big names in the FinTech cloud computing sector?

 

a)     Amazon Web Services

 

b)    Microsoft Silverlight

 

c)       Google Virtual Cloud

 

d)    Microsoft Azure

6.                  The resilience of Cloud deployments:

 

a)     Increases Uptime

 

b)    Simplifies Disaster Recovery

 

c)       Both a and b

 

d)    None of the above

7.                  An example of PaaS is:

 

a)     Rackspace Cloud

 

b)    Mosso

 

c)       Amazon EC2

 

d)    Gmail

8.                  Which cloud service model is the most widely used in the world?

 

a)     SaaS

 

b)    PaaS

 

c)       IaaS

 

d)    All of them

9.                  Amazon Elastic MapReduce offers a _______ framework to process large amounts of data.

 

a)     R

 

b)    Hadoop

 

c)       Python

 

d)    None of the above.

10.      ________is also known as hosted software or on-demand software

 

a)     SaaS

 

b)    PaaS

 

c)       IaaS

 

d)    None

11.      The __________ service delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.

 

a)     SaaS

 

b)    PaaS

 

c)       IaaS

 

d)    None

12.      What does the word Cloud represent in cloud computing?

 

a)     Internet

 

b)    Wireless

 

c)       Data

 

d)    Disk

13.      Public cloud is also called as _______.

 

a)     Paas – platform as a service

 

b)    Iaas - infrastructure as a service

 

c)       Saas – software as a service

 

d)    Haas - hardware as a service

14.      Which technique is used in creating cloud computing?

 

a)     Transubstantiation

 

b)    Virtualization

 

c)       Insubordination

 

d)    Cannibalization

15.      A private cloud is ________.

 

a)     It is a cloud maintained within an enterprise data center.

 

b)    It can be accessible by anyone

 

c)       It is offered offline

 

d)    All the above

16.      Amazon uses ________as a cloud platform.

 

a)     AWS

 

b)    Azure

 

c)       Opera

 

d)    Gdrive

 


5.       Cyber Security and Types of cyber attack

1.                  What is Cyber Security?

 

a)     Cyber Security provides security against malware

 

b)    Cyber Security provides security against cyber-terrorists

 

c)       Cyber Security protects a system from cyber attacks

 

d)    All of the mentioned

2.                  Who is the father of computer security?

 

a)     August Kerckhoffs

 

b)    Bob Thomas

 

c)       Robert

 

d)    Charles

3.                  Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

 

a)     Cyber attack

 

b)    Computer security

 

c)       Cryptography

 

d)    Digital hacking

4.                  Which of the following is a type of cyber security?

 

a)     Cloud Security

 

b)    Network Security

 

c)       Application Security

 

d)    All of the above

5.                  What are the features of cyber security?

 

a)     Compliance

 

b)    Defense against internal threats

 

c)       Threat Prevention

 

d)    All of the above

6.                  Which of the following is a component of cyber security?

 

a)     Internet Of Things

 

b)    AI

 

c)       Database

 

d)    Attacks

7.                  ____________ uses software and hardware methods to tackle external threats that can arise in the development stage of an application

 

a)     Disaster Recovery

 

b)    Application Security

 

c)       Information Security

 

d)    Endpoint Security

 

8.                  Critical Infrastructure does not include

 

a)     Electricity Grid

 

b)    Water Purification

 

c)       Traffic Lights

 

d)    Cooking Gas Lines

9.                  The full form of SEG is:

 

a)     Secure Email Gateway

 

b)    Secure Ecommerce Gateway

 

c)       Security Email Gateway

 

d)    Secure Email Gate

10.      Which attack involves using IP spoofing and the ICMP to saturate a target network with traffic?

 

a)     Smurf attack

 

b)    Teardrop attack

 

c)       Replay attack

 

d)    None of the above

11.      Which of the following is a type of cyber-attack?

 

a)     Phishing

 

b)    SQL Injections

 

c)       Password Attack

 

d)    All of the above

12.      Which of the following is defined as an attempt to harm, damage or cause threat to a system or network?

 

a)     Digital crime

 

b)    Threats

 

c)       System hijacking

 

d)    Cyber Attack

13.      What is the existence of weakness in a system or network is known as?

 

a)     Attack

 

b)    Exploit

 

c)       Vulnerability

 

d)    Threat

14.      Which of the following is an internet scam done by cyber-criminals where the user is convinced digitally to provide confidential information?

 

a)     MiTM attack

 

b)    Phishing attack

 

c)       Website attack

 

d)    DoS attack

15.      Which of the following DDoS in mobile systems wait for the owner to trigger the cyber-attack?

 

a)     Botnets

 

b)    Programs

 

c)       Virus

 

d)    Worms

 

16.      Which of the following can diminish the chance of data leakage?

 

a)     Steganography

 

b)    Chorography

 

c)       Cryptography

 

d)    Authentication

17.      The full form of Malware is ________

 

a)     Malfunctioned Software

 

b)    Multipurpose Software

 

c)       Malicious Software

 

d)    Malfunctioning of Security

18.      _____________ is a code injecting method used for attacking the database of a system / website.

 

a)     HTML injection

 

b)    SQL Injection

 

c)       Malicious code injection

 

d)    XML Injection

19.      When there is an excessive amount of data flow, which the system cannot handle, _____ attack takes place.

 

a)     Database crash attack

 

b)    DoS (Denial of Service) attack

 

c)       Data overflow Attack

 

d)    Buffer Overflow attack

20.      These are a collective term for malicious spying programs used for secretly monitoring someone’s activity and actions over a digital medium.

 

a)     Malware

 

b)    Remote Access Trojans

 

c)       Keyloggers

 

d)    Spyware

21.      Which of the following is considered as the unsolicited commercial email?

 

a)     Virus

 

b)    Malware

 

c)       Spam

 

d)    All of the above

22.      _______ is a type of software designed to help the user's computer detect viruses and avoid them.

 

a)     Malware

 

b)    Adware

 

c)       Antivirus

 

d)    Both B and C

23.      Which one of the following usually used in the process of Wi-Fi-hacking?

 

a)     Aircrack-ng

 

b)    Wireshark

 

c)       Norton

 

d)    All of the above

 

24.      To protect the computer system against the hacker and different kind of viruses, one must always keep _________ on in the computer system.

 

a)     Antivirus

 

b)    Firewall

 

c)       VLC player

 

d)    Script

25.      Hackers usually used the computer virus for ______ purpose.

 

a)     To log, monitor each and every user's stroke

 

b)    To gain access the sensitive information like user's Id and Passwords

 

c)       To corrupt the user's data stored in the computer system

 

d)    All of the above

26.      Which type of the following malware does not replicate or clone them self's through infection?

 

a)     Rootkits

 

b)    Trojans

 

c)       Worms

 

d)    Viruses

27.      Which of the following known as the oldest phone hacking techniques used by hackers to make free calls?

 

a)     Phreaking

b)    Phishing

 

c)       Cracking

 

d)    Spraining

28.      ____________ is a famous technological medium for the spread of malware, facing problems of spam, & phishing attacks.

 

a)     Cloud

 

b)    Pen drive

 

c)       Website

 

d)    Email

29.      Unsolicited Bulk E-mails (UBI) are called __________

 

a)     SMS

 

b)    MMS

 

c)       Spam emails

 

d)    Malicious emails

30.      Which one of the following is/are a type of antivirus program?

 

a)     Quick heal

 

b)    Mcafee

 

c)       Kaspersky

 

d)    All of the above

 

 

 

 

 

 

 

 

 

 

No comments: