--> Sayadasite: DIGITAL FLUENCY MCQ MODULE 1

Multiple Ads

Search

Menu Bar

DIGITAL FLUENCY MCQ MODULE 1

1. The process of training a Neural Net is:

a)     Model -> Train -> Training Data -> Prediction -> Test and Update

b)     Train -> Model - >Prediction -> Test and Update

c)      Training Data -> Model -> Predict -> Test and Update

2.     A bot that can determine whether a bug is exploitable is called:

a)     Medecision

b)     Automatic Exploit Generation

c)      Hal

3.     In the case of Machine Learning, the algorithm needs to be told how to make an accurate prediction by providing it with more information, whereas, in the case of Deep Learning, the algorithm is able to learn that through its own Data Processing.

a)     True

b)     False

4.     Just like the PC, Internet and Cloud Computing, AI is also a disruptive technology.

a)     True

b)     False

5.     In the Healthcare Industry, AI has disrupted:

a)     Medical Imaging

b)     Surgery

c)      Physiological Diagnosis

6.     In Machine Learning, decisions are based on the type of algorithm selected.

a)     True

b)     False

7.     Which type of Neural Network is used by Stock Market Indices?

a)     LSVM

b)     NSTM

c)      LSTM

8.     Naïve Bayes Classifier algorithm is useful for predicting class of the test dataset.

a)     True

b)     False

9.     Which of the following Machine Learning Algorithms is a learning method that interacts with its environment by producing actions and and discovering errors or rewards?

a)     Supervised Learning

b)     Semi Supervised Learning

c)      Reinforcement Learning

10.   Unsupervised Machine Learning algorithms are used when the information used to train is neither classified nor labeled.

a)     True

b)     False

11.   The more layers there are in a Neural Network, the higher is its ability to approximate more complex functions.

a)     True

b)     False

12.    The most basic type of an ANN is called:

a)     Feedforward Neural Network

b)     Recurrent Neural Network

c)      Boltzmann Machine Network

13.  Which of these tools can help you build your Convolutional Neural Network?

a)     Tensorflow

b)     Premier Pro

c)      Silverlight

 

14.  In a Deep Learning System, each connection between Neurons is associated with a:

a)     Length

b)     Weight

c)      Function

15.  The network evaluates how good its prediction was through_________

a)     Cost function

b)     Loss function

c)      Bias parameters

d)     Back propagation

16.  "Companies that see significant impact from advanced analytics are purposeful about where they intend to win in analytics."

a)     True

b)     False

17.  A centralized repository that allows you to store all your structured, unstructured and semi-structured data at any scale is called a:

a)     Dataset

b)     Database

c)      Data Lake

d)     Data Warehouse

18.  Which algorithm allows you to reduce the dimension of the data while losing the least amount of information?

a)     Decision Trees

b)     K-Means Clustering

c)      Recurrent Neural Networks

d)     Principal Component Analysis

19.  Clustering (or cluster analysis) is the task of breaking up a set of objects into groups called clusters.

a)     True

b)     False

20.  Which type of analytics describes or summarizes existing data to understand what is going on or what has happened?

a)     Descriptive Analytics

b)     Diagnostic Analytics

c)      Predictive Analytics

d)     Prescriptive Analytics

21.  Which one of the following is NOT a key component of DBMS?

a)     Runtime Database Manager

b)     Equitable Manager 

c)      Database Manager

22.  RDBMSes store Data in the form of tables, with most commercial Relational Database Management Systems using:

a)     SQL 

b)     Apache

c)      WorkFusion

23.  The table format used in RDBMSes is easy to understand but does not provide an organized and structural manner through which entries are matched by firing queries.

a)     True

b)     False

 

24.  Which is an open source relational database management system (RDBMS) with a client-server model?

a)     Oracle 

b)     MySQL

c)      MS-Access

25.  MongoDB supports ad-hoc queries and document-based queries.

a)     True

b)     False

26.  In Canada, credit union _____ is exploring the possibility of wealth management apps, displayed on car windscreens, for passengers to review their portfolios while being driven to their destination

a)     Redshore

b)     Blueshore

c)      Deepshore

d)     None of the above

27.  ______ are also beneficial for the elderly, providing monitoring that can help seniors to remain at home comfortably and safely, rather than moving to a nursing home or requiring 24/7 home care

a)     Robotics

b)     Analytics

c)      Domotics

d)     None of the above

28.  Which is the first stage in every IoT architecture?

a)     Sensors and actuators

b)     Internet getaways and Data Acquisition Systems

c)      Edge IT

d)     Data center and cloud

29.  IoT devices are naturally vulnerable to ________ threats

a)     Sensors

b)     Heterogeneity

c)      Security

d)     Connectivity

30.  IoT is a paradigm that involves ubiquitous presence in the environment

a)     True

b)     False

31.  What are copies of the physical objects that are accurate enough to let their owners experiment and predict the operation of their assets called?

a)     Digital Sons

b)     Digital Siblings

c)      Digital Twins

32.  Which of the following IIoT elements can be used in factories to tackle manufacturing challenges, such as machine failure, problems in control systems, etc.? A. Installing sensors throughout the factory to monitor production flow in real time to eliminate waste B. Creating predictive models based on the data gathered with the help of IoT devices

a)     Only A

b)     Only B

c)      Both A and B

33.  Which of the following are the biggest users of IIoT?

A. Automotive Fleet Management            B. Manufacturing         C. Media and Entertainment

a)     A and B

b)     B and C

c)      A and C

34.  DDoS attacks are real threats to IIoT.

a)     True

b)     False

35.  What are the risks associated with industrial IoT?

a)     Ransomware infections denying access to critical systems.

b)     Not much awareness about internet and smart devices.

c)      Loss Of employment by skilled workers.

36.  Which of the following are the top benefits of IIoT in manufacturing? A. Improvement of operational performance B. Ensuring safety and compliance C. Increasing flexibility and agility

a)     A and B

b)     A, B and C

c)      B and C

37.  Which one of these are not one of the big names in the FinTech cloud computing sector?

a)     Amazon Web Services

b)     Microsoft Silverlight

c)      Google Virtual Cloud

d)     Microsoft Azure

38.  The resilience of Cloud deployments:

a)     Increases Uptime

b)     Simplifies Disaster Recovery

c)      Both of the above

39.  An example of PaaS is:

a)     Rackspace Cloud

b)     Mosso

c)      Amazon EC2

d)     Gmail

40.  Which cloud service model is the most widely used in the world?

a)     SaaS

b)     PaaS

c)      IaaS

d)     All of them

41.  Amazon Elastic MapReduce offers a _______ framework to process large amounts of data.

a)     R

b)     Hadoop

c)      Python

d)     None of the above.

42.  SaaS is also known as hosted software or on-demand software.

a)     True

b)     False

43.  The PaaS service delivery model allows a customer to rent virtualized servers and associated services used to run existing applications, or to design, develop, test, deploy and host applications.

a)     True

b)     False

44.  Grunge Computing is about moving local computing to local devices in a highly distributed system, typically as a layer around a cloud computing core.

a)     True

b)     False

 

45.  iPaaS offerings in the cloud from which providers let users implement data mapping, transformations is/are:

a)     Apache Spark

b)     Dell Boomi

c)      WorkFusion

46.  Infrastructure as a Service and Hardware as a Service are two completely different things.

a)     True

b)     False

47.  ____________ uses software and hardware methods to tackle external threats that can arise in the development stage of an application

a)     Disaster Recovery

b)     Application Security

c)      Information Security

d)     Endpoint Security

48.  Critical Infrastructure does not include

a)     Electricity Grid

b)     Water Purification

c)      Traffic Lights

d)     Cooking Gas Lines

49.  The full form of SEG is

a)     Secure Email Gateway

b)     Secure Ecommerce Gateway

c)      Security Email Gateway

d)     Secure Email Gate

50.  Application security uses software and hardware methods to tackle external threats

a)     True

b)     False

51.  Who alongside the FDA recently launched a joint initiative to “increase coordination in dealing with threats related to medical devices?

a)     HHS

b)     DHS

c)      LHS

d)     AHS

52.  Hackers are always looking for opportunities to invade privacy and steal data that’s of crucial importance

a)     True

b)     False

53.  A cyber attack is any type of offensive action that targets computer information systems, infrastructures, computer networks or personal computer devices, using various methods to steal, alter or destroy data or information systems

a)     True

b)     False

54.  One of the easiest ways your information can become hacked is through easy-to-guess passwords

a)     True

b)     False

55.  Which attack involves using IP spoofing and the ICMP to saturate a target network with traffic?

a)     Smurf attack

b)     Teardrop attack

c)      Replay attack

 

56.  Botnets are the millions of systems infected with malware under hacker control in order to carry out DDoS attacks

a)     True

b)     False

No comments: