Module
2: Applications of Emerging Technologies (BACK)
Applications of Artificial Intelligence
1. Self-driving cars usually use Limited
Memory technology to:
a)
Store data
b)
Automate
c)
Detect Motion
d)
None of the above
2. Which of these is NOT an application of
AI?
a)
Language
Translation
b)
Voice Recognition
c)
Robotics
d)
Obtain massive training data sets
3. Which of the following are examples of
Weak AI?
a)
Siri & Alexa
b)
Advanced Chess
Programs
c)
Siri, Alexa & Advanced Chess Programs
d)
None of the above
4. Predictive maintenance, an application
of AI, prevents unplanned downtime.
a)
True
b) False
5. What are the main goals of AI?
a)
To Create Expert
Systems
b)
To Implement
Human Intelligence in Machines
c)
Both A and B
d)
None of the Above
6. Which of the following is not the type
of AI?
a)
Reactive machines
b)
Unlimited memory
c)
Theory of mind
d)
Self-awareness
7. Which of the following is an application
of AI?
a)
Gaming
b)
Expert Systems
c)
Vision Systems
d)
All of the above
8. Which of the following is not a stage of
AI?
a)
Predictive
analytics
b)
Diagnostic
analytics
c)
Cognitive analytics
d)
All of the above
Applications of Big Data Analytics
1.
Which
type of analytics ensures that the path is predicted for the future course of
action?
a)
Predictive Analytics
b) Prescriptive Analytics
c)
Diagnostic
Analytics
d) None of the above
2.
Customer
Segmentation and Differential Pricing Strategy can be easily achieved
through_______
a)
Big Data Analytics
b) Web pages
c)
Browsers
d) Hardware’s
3.
Which data analysis fails to cope with the advent of Big Data
which is essentially huge data, both structured and unstructured?
a)
Traditional
b) New
c)
Low
d) None of the above
4.
Healthcare big data refers to ___________________ consumer,
patient, physical, and clinical data that is too vast or complex to be
understood by traditional means of data processing.
a) Collecting
b) Analyzing
c)
Leveraging
d)
All of the above
5.
Which
of the following are example(s) of Real Time Big Data Processing?
a) Complex Event Processing (CEP) platforms
b) Stock market data analysis
c)
Bank fraud
transactions detection
d)
both (a) and (c)
6.
Data
analysis is the process of:
a) Examining data to find facts
b) Relationships,
c)
Patterns,
insights and/or trends.
d)
All the above
Applications of Internet of Things
1.
Which
service permits the changes to the IoT services?
a)
Update
b) Registered service status
c)
Enable from
suspension
d) Enable
2.
What
is the component of an IoT system that executes a program?
a) Sensor
b)
Microcontroller
c)
Actuator
d) Digital to analog converter
3.
You're
hosting a party in your home and your guests have arrived. The smart security
camera will
a) Detect the number of people who have entered the home, report to the AI
Control Center and automatically turn on the lights
b) Wait to receive the instructions from the owner of the
house to turn on the lights
c)
Both a and b
d) None of the above
4.
The
latest advances of Technology have tremendous potential to:
a) Impact the jobs of the people
b)
Benefit people by Increasing efficiency and reducing
waste
c)
Both a and b
d) None of the above
5.
___________ is a network of Internet-linked devices, vehicles,
and appliances that can collect and share data without the need of human
interaction
a)
Internet of things
b) Web browsers
c)
Search engines
d) Google
6.
IoT
gateway must provide __________
a)
Protocol abstraction
b) Data storage
c)
Security with
hardware
d) Simple and fast installation
Applications of Cloud Computing
1. ............. is the essential concept
related to Cloud?
a) Reliability
b)
Abstraction
c)
Productivity
d) None of the above
2.
The
Private cloud is a –
a) A cloud service inaccessible to anyone but the
cultural elite
b) Standard cloud service offered via the Internet
c)
Cloud architecture maintained within an enterprise
data centre.
d) All of the above
3.
Which
one of the following is a model for cloud computing?
a) County
b)
Public
c)
Ethernet
d) Topology
4.
Cloud
Computing can store a tremendous amount of data which can also help:
a)
Big Data Analytics
b) Action Items
c)
Cloud Networks
d) None of the above
5.
Cloud
Computing architect also depends on:
a)
Information, Technology, and Application
b) Information, Bandwidth, and Application
c)
Type, Security,
and Application
d) None of the above
6.
_________is
believed to facilitate greater collaboration and enhance the learning
opportunities.
a)
Cloud Computing
b) IoT
c)
Hacking
d) Big data
1.
Which
of the following option is used to protect data and passwords?
a) Authorization
b) Authentication
c)
Encryption
d) Non-repudiation
2.
Which
of the following is the first computer virus?
a)
Creeper
b) Sasser
c)
Blaster
d) All of the above
3.
Firewalls
are used to protect______
a) Fire attacks
b) Virus attacks
c)
Unauthorised access
d) Data driven attacks
4.
The
easiest way for attackers to gain network access is to:
a)
Leverage existing vulnerabilities
b) Creating new vulnerabilities
c)
Send Spam mails
d) None of the above
5.
Which
of the following is the recommended security standard for electronic payment
processing?
a) COBIT
b) HIPAA rules
c)
PCI DSS
d) None
No comments:
Post a Comment