Module1:Emerging Technologies (BACK)
1.
Artificial Intelligence, Machine
Learning, Deep Learning
1.
AI
stands for ____________
a)
Aircraft
Intelligent
b)
Artificial Intelligence
c)
Aerial
Intelligence
d)
Advanced Internet
2.
What
is Artificial intelligence?
a)
Putting your
intelligence into Computer
b)
Programming with
your own intelligence
c)
Making a Machine intelligent
d)
Playing a Game
3.
Who
is the father of Artificial Intelligence?
a)
Charles Babbage
b)
Alan Turing
c)
John McCarthy
d)
Bill Gates
4.
In
the Healthcare Industry, AI has disrupted:
a)
Medical Imaging
b)
Surgery
c)
Physiological
Diagnosis
d)
None of the above
5.
Which
programming language is used for AI?
a)
Python
b)
LISP
c)
PROLOG
d)
All the above
6.
The
characteristics of the computer system capable of thinking, reasoning and
learning is known is
a)
Machine
Intelligence
b)
Human
Intelligence
c)
Artificial Intelligence
d)
Virtual
Intelligence
7.
What
is the full form of “ML”?
a)
Machine Learning
b)
Machine Looking
c)
Mechanic Link
d)
Many Learning
8.
The
process of training a Neural Net is:
a)
Model -> Train
-> Training Data -> Prediction -> Test and Update
b)
Train -> Model
- >Prediction -> Test and Update
c)
Training Data -> Model -> Predict -> Test and
Update
d)
Training Data
-> Predict -> Test and Update -> Model
9.
A
bot that can determine whether a bug is exploitable is called:
a)
Medecision
b)
Automatic Exploit Generation
c)
Hal
d)
None of the above
10.
Which
type of Neural Network is used by Stock Market Indices?
a)
LSVM
b)
NSTM
c)
LSTM
d)
ANSI
11.
Which of the following Machine Learning Algorithms is a learning
method that interacts with its environment by producing actions and and
discovering errors or rewards?
a)
Supervised
Learning
b)
Semi Supervised
Learning
c)
Reinforcement Learning
d)
None of the above
12.
The
most basic type of an ANN is called:
a)
Feedforward Neural Network
b)
Recurrent Neural
Network
c)
Boltzmann Machine
Network
d)
None of the above
13.
In
a Deep Learning System, each connection between Neurons is associated with a:
a)
Length
b)
Weight
c)
Function
d)
Loop
14.
The
network evaluates how good its prediction was through_________.
a)
Cost function.
b)
Loss function
c)
Bias parameters
d)
Back propagation
15.
What
is the term used for describing the judgmental or common-sense part of problem
solving?
a)
Heuristic
b)
Critical
c)
Value based
d)
Analytical
16.
An AI technique that allows computers to understand associations
and relationships between objects and events is called:
a)
Heuristic Processing
b)
Cognitive Science
c)
Relative
Symbolism
d)
Pattern Matching
17.
The
field that investigates the mechanics of human intelligence is:
a)
History
b)
Cognitive Science
c)
Psychology
d)
Sociology
18.
What
is the full form of “DL”?
a)
Deep Learning
b)
Depth Learning
c)
Drone Launching
d)
Drive Loading
19.
Machine
learning is a subset of ................
a)
Deep Learning
b)
Artificial Intelligence
c)
Data Learning
d)
None of the above
20.
Who
is the father of Machine Learning?
a)
Geoffrey Hill
b)
Geoffrey Chaucer
c)
Geoffrey Everest Hinton
d)
None of the above
21. ................... algorithms
enable the computers to learn from data, and even improve themselves,
without being explicitly programmed.
a)
Deep Learning
b)
Machine Learning
c)
Artificial
Intelligence
d)
None of the above
22.
Real-Time
decisions, Game AI, Learning Tasks, Skill acquisition, and Robot Navigation are
applications of
a)
Reinforcement Learning
b)
Supervised
Learning: Classification
c)
Unsupervised
Learning: Regression
d)
None of the above
23.
Common
classes of problems in machine learning is ..............
a)
Clustering
b)
Regression
c)
Classification
d)
All of the above
a)
Receives neural
networks
b)
Report neural
networks
c)
Recording neural networks
d)
Recurrent neural networks
25.
Application
of machine learning methods to large databases is called
a)
Data Mining.
b)
Artificial
Intelligence
c)
Big Data
Computing
d)
Internet Of
Things
26.
Which
of the following is the best machine learning method?
a)
Scalable
b)
Accuracy
c)
Fast
d)
All of the above
27.
Which
of the following is an example of deep learning?
a)
Self-driving cars
b)
Pattern
recognition
c)
Natural language
processing
d)
All of the above
28.
For
an image classification task, which of the following deep learning algorithm is
best suited?
a)
Recurrent Neural
Network
b)
Multi-Layer
Perceptron
c)
Convolution Neural Network
d)
All of the above
29.
Which
of the following makes a neural network non-linear?
a)
Convolution
function
b)
B. Batch gradient
descent
c)
Rectified linear unit
d)
All of the above
30.
What
is true about Machine Learning?
a)
Machine Learning
(ML) is that field of computer science
b)
ML is a type of
artificial intelligence
c)
ML is a field of
AI consisting of learning algorithms
d)
All of the Above
2.
Database Management for Data Science,
Big Data Analytics
1.
Data
science is the process of diverse set of data through?
a) organizing data
b) processing data
c)
analysing data
d)
All of the above
2.
What
is abbreviation of DBMS?
a)
Data Base Management system
b) Data base mining source
c)
Data Base
Management Schema
d) Data Base Manipulation Schema
3.
A centralized repository that allows you to store all your
structured, unstructured and semi-structured data at any scale is called a:
a) Dataset
b) Database
c)
Data Lake
d) Data Warehouse
4.
Which algorithm allows you to reduce the dimension of the data
while losing the least amount of information?
a) Decision Trees
b) K-Means Clustering
c)
Recurrent Neural Networks
d)
Principal Component Analysis
5.
Which type of analytics describes or summarizes existing data to
understand what is going on or what has happened?
a)
Descriptive Analytics
b) Diagnostic Analytics
c)
Predictive
Analytics
d) Prescriptive Analytics
6.
RDBMS’s store Data in the form of tables, with most commercial
Relational Database Management Systems using:
a)
SQL
b) Apache
c)
Workfusion
d) None of the above
7.
Which is an open-source relational database management system
(RDBMS) with a client-server model?
a) Oracle
b)
MySQL
c)
MS-Access
d) None of the above
8.
In computers, a ____ is a symbolic representation of facts or
concepts from which information may be obtained with a reasonable degree of
confidence.
a)
Data
b) Knowledge
c)
Program
d) Algorithm
9.
Which
of the following are Benefits of Big Data Processing?
a) Cost Reduction
b) Time Reductions
c)
Smarter Business
Decisions
d) All of the
mentioned above
10.
Data
that does not conform to a data model or data schema is known as ______.
a) Structured data
b)
Unstructured data
c)
Semi-structured
data
d) All of the mentioned above
11.
Amongst
which of the following is/are not Big Data Technologies?
a) Apache Hadoop
b) Apache Spark
c)
Apache Kafka
d)
Apache Pytarch
12.
Amongst
which of the following can be considered as the main source of unstructured
data.
a) Twitter
b) Facebook
c)
Webpages
d)
All of the mentioned above
13.
MongoDB
is a ____ database.
a) SQL
b) DBMS
c)
NoSQL
d) RDBMS
14.
What
are the different features of Big Data Analytics?
a) Open source
b) Scalability
c)
Data recovery
d)
All the above
15.
According to analysts, for what can traditional IT systems
provide a foundation when they're integrated with big data technologies like
Hadoop?
a)
Big data management and data mining
b) Data warehousing and business intelligence
c)
Management of
Hadoop clusters
d) Collecting and storing unstructured data
16.
What
are the 7 V's of big data?
a) Volume, Velocity
b) Variety, Variability
c)
Veracity,
Visualization, and Value.
d)
All of the above
17.
________
has the world’s largest Hadoop cluster.
a) Google
b) LinkedIn
c)
Facebook
d) IBM
18.
The
primary characteristics of Big Data are ________
a) Volume
b) Variety
c)
Value
d)
All of the above
19.
Advantages
of Big Data are _______.
a) Big data analysis derives innovative solutions.
b) Big data analysis helps in understanding and targeting
customers.
c)
It helps in
optimizing business processes.
d)
All of the above
3.
Internet of Things (IoT) and Industrial
Internet of Things (IIoT)
1.
IoT
stands for?
a) Introduction of Things
b)
Internet of Things
c)
Internet of
Tracking
d) Interaction of Things
2.
The
term "Internet of Things" was coined by?
a)
Kevin Ashton
b) Guido van Rossum
c)
IBM
d) Ross Ihaka
3.
Which
of the following category is used for business to consumer process?
a) Group IoT
b) Community IoT
c)
Industrial IoT
d) Personal IoT
4.
IIoT
stands for __________
a)
Industrial Internet of Things
b) Internet Internet of Things
c)
Intelligence
Internet of Things
d) Internal Internet of Things
5.
Which
is the first stage in every IoT architecture?
a)
Sensors and actuators
b) Internet getaways and Data Acquisition Systems
c)
Edge IT
d) Data center and cloud
6.
IoT
devices are naturally vulnerable to ________ threats
a) Sensors
b) Heterogeneity
c)
Security
d) Connectivity
7.
______ are also beneficial for the elderly, providing monitoring
that can help seniors to remain at home comfortably and safely, rather than
moving to a nursing home or requiring 24/7 home care
a) Robotics
b) Analytics
c)
Domotics
d) None of the above
8.
What
is the full form of IaaS?
a) Internet as a Software
b) Internet as a Service
c)
Infrastructure as
a Software
d)
Infrastructure as a Service
9.
What
is the full form of PaaS?
a)
Platform as a service
b) Product as a software
c)
People as a
service
d) Press as software
10.
What
is the full form of SaaS?
a)
Software as a Service
b) Source as a service
c)
Special as a
software
d) Shift as a software
11.
What
are the risks associated with industrial IoT?
a)
Ransomware infections denying access to critical
systems.
b) Not much awareness about internet and smart devices.
c)
Loss Of
employment by skilled workers.
d) None of the above
12.
Which of the following are the biggest users of IoT?
A. Automotive Fleet
Management
B. Manufacturing
C. Media and Entertainment
a)
A and B
b)
B and C
c)
A and C
d)
A, B and C
13.
Which of the following are the top benefits of IIoT in anufacturing?
A. Improvement of
operational performance
B. Ensuring safety and
compliance
C. Increasing
flexibility and agility
a)
A and B
b)
A, B and C
c)
B and C
d)
A and C
14.
Which
of the following is the way in which an IoT device is associated with data?
a) Internet
b)
Cloud
c)
Automata
d) Network
15.
An
IoT network is a collection of ______ devices.
a) Signal
b) Machine to Machine
c)
Interconnected
d) Network to Network
16.
What
is the main purpose of WoT (Web of Things) in the IoT?
a)
Improve the usability and interoperability
b) Reduce the security
c)
Complex the
development
d) Increase the cost
17.
What
is the role of Big Data in IoT's Smart Grid architecture?
a) Filter the data
b) Locked the data
c)
Store data
d) None of the these
18.
What
is the full form of IANA?
a) Inter-Assessment-Number-Access
b) Internet-Association-Numbers-Authority
c)
International-Aid-for-Network-Authority
d)
Internet-Assigned-Numbers-Authority
19.
__________attacks
are real threats to IIoT.
a)
Distributed Denial-of-Service (DDoS)
b) Worms
c)
Ransomware
d) Virus
20.
Which
of the following is true?
a) IIoT is not eqivalent to IoT
b) IIoT is independent of IoT
c)
IIoT is dependent on some features of IoT
d) None of these
4.
Cloud computing and its service models
1.
What
is Cloud Computing?
a)
Cloud Computing means providing services like storage,
servers, database, networking, etc
b) Cloud Computing means storing data in a database
c)
Cloud Computing
is a tool used to create an application
d) None of the mentioned
2.
Who
is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c)
J.C.R. Licklider
d) Charles Bachman
3.
Which
of the following are the features of cloud computing?
a) Security
b) Availability
c)
Large Network
Access
d) All of the
mentioned
4.
Which
of the following is a type of cloud computing service?
a) Service-as-a-Software
b) Software-and-a-Server
c)
Software-as-a-Service
d) Software-as-a-Storage
5.
Which
one of these are not one of the big names in the FinTech cloud computing
sector?
a) Amazon Web Services
b)
Microsoft Silverlight
c)
Google Virtual
Cloud
d) Microsoft Azure
6.
The
resilience of Cloud deployments:
a) Increases Uptime
b) Simplifies Disaster Recovery
c)
Both a and b
d) None of the above
7.
An
example of PaaS is:
a) Rackspace Cloud
b)
Mosso
c)
Amazon EC2
d) Gmail
8.
Which
cloud service model is the most widely used in the world?
a)
SaaS
b) PaaS
c)
IaaS
d) All of them
9.
Amazon
Elastic MapReduce offers a _______ framework to process large amounts of data.
a) R
b)
Hadoop
c)
Python
d) None of the above.
10.
________is
also known as hosted software or on-demand software
a)
SaaS
b) PaaS
c)
IaaS
d) None
11.
The __________ service delivery model allows a customer to rent
virtualized servers and associated services used to run existing applications,
or to design, develop, test, deploy and host applications.
a) SaaS
b)
PaaS
c)
IaaS
d) None
12.
What
does the word Cloud represent in cloud computing?
a)
Internet
b) Wireless
c)
Data
d) Disk
13.
Public
cloud is also called as _______.
a) Paas – platform as a service
b) Iaas - infrastructure as a service
c)
Saas – software as a service
d) Haas - hardware as a service
14.
Which
technique is used in creating cloud computing?
a) Transubstantiation
b)
Virtualization
c)
Insubordination
d) Cannibalization
15.
A
private cloud is ________.
a)
It is a cloud maintained within an enterprise data
center.
b) It can be accessible by anyone
c)
It is offered
offline
d) All the above
16.
Amazon
uses ________as a cloud platform.
a)
AWS
b) Azure
c)
Opera
d) Gdrive
5.
Cyber Security and Types of cyber attack
1.
What
is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against
cyber-terrorists
c)
Cyber Security
protects a system from cyber attacks
d)
All of the mentioned
2.
Who
is the father of computer security?
a)
August Kerckhoffs
b) Bob Thomas
c)
Robert
d) Charles
3.
Which of the following is defined as an attempt to steal, spy,
damage or destroy computer systems, networks, or their associated information?
a)
Cyber attack
b) Computer security
c)
Cryptography
d) Digital hacking
4.
Which
of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c)
Application
Security
d)
All of the above
5.
What
are the features of cyber security?
a) Compliance
b) Defense against internal threats
c)
Threat Prevention
d)
All of the above
6.
Which
of the following is a component of cyber security?
a)
Internet Of Things
b) AI
c)
Database
d) Attacks
7.
____________ uses software and hardware methods to tackle
external threats that can arise in the development stage of an application
a) Disaster Recovery
b)
Application Security
c)
Information
Security
d) Endpoint Security
8.
Critical
Infrastructure does not include
a) Electricity Grid
b) Water Purification
c)
Traffic Lights
d)
Cooking Gas Lines
9.
The
full form of SEG is:
a)
Secure Email Gateway
b) Secure Ecommerce Gateway
c)
Security Email
Gateway
d) Secure Email Gate
10.
Which
attack involves using IP spoofing and the ICMP to saturate a target network
with traffic?
a)
Smurf attack
b) Teardrop attack
c)
Replay attack
d) None of the above
11.
Which
of the following is a type of cyber-attack?
a) Phishing
b) SQL Injections
c)
Password Attack
d)
All of the above
12.
Which of the following is defined as an attempt to harm, damage
or cause threat to a system or network?
a) Digital crime
b) Threats
c)
System hijacking
d)
Cyber Attack
13.
What
is the existence of weakness in a system or network is known as?
a) Attack
b) Exploit
c)
Vulnerability
d) Threat
14.
Which of the following is an internet scam done by
cyber-criminals where the user is convinced digitally to provide confidential
information?
a) MiTM attack
b)
Phishing attack
c)
Website attack
d) DoS attack
15.
Which
of the following DDoS in mobile systems wait for the owner to trigger the
cyber-attack?
a)
Botnets
b) Programs
c)
Virus
d) Worms
16.
Which
of the following can diminish the chance of data leakage?
a)
Steganography
b) Chorography
c)
Cryptography
d) Authentication
17.
The
full form of Malware is ________
a) Malfunctioned Software
b) Multipurpose Software
c)
Malicious Software
d) Malfunctioning of Security
18.
_____________
is a code injecting method used for attacking the database of a system /
website.
a) HTML injection
b)
SQL Injection
c)
Malicious code
injection
d) XML Injection
19.
When there is an excessive amount of data flow, which the system
cannot handle, _____ attack takes place.
a) Database crash attack
b) DoS (Denial of Service) attack
c)
Data overflow
Attack
d)
Buffer Overflow attack
20.
These are a collective term for malicious spying programs used
for secretly monitoring someone’s activity and actions over a digital medium.
a) Malware
b) Remote Access Trojans
c)
Keyloggers
d)
Spyware
21.
Which
of the following is considered as the unsolicited commercial email?
a) Virus
b) Malware
c)
Spam
d) All of the above
22.
_______
is a type of software designed to help the user's computer detect viruses and
avoid them.
a) Malware
b) Adware
c)
Antivirus
d) Both B and C
23.
Which
one of the following usually used in the process of Wi-Fi-hacking?
a)
Aircrack-ng
b) Wireshark
c)
Norton
d) All of the above
24.
To protect the computer system against the hacker and different
kind of viruses, one must always keep _________ on in the computer system.
a)
Antivirus
b) Firewall
c)
VLC player
d) Script
25.
Hackers
usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's
Id and Passwords
c)
To corrupt the
user's data stored in the computer system
d)
All of the above
26.
Which
type of the following malware does not replicate or clone them self's through
infection?
a) Rootkits
b)
Trojans
c)
Worms
d) Viruses
27.
Which of the following known as the oldest phone hacking
techniques used by hackers to make free calls?
a) Phreaking
b) Phishing
c)
Cracking
d) Spraining
28.
____________ is a famous technological medium for the spread of
malware, facing problems of spam, & phishing attacks.
a) Cloud
b) Pen drive
c)
Website
d)
Email
29.
Unsolicited
Bulk E-mails (UBI) are called __________
a) SMS
b) MMS
c)
Spam emails
d) Malicious emails
30.
Which
one of the following is/are a type of antivirus program?
a) Quick heal
b) Mcafee
c)
Kaspersky
d)
All of the above
No comments:
Post a Comment