--> Sayadasite: DIGITAL FLUENCY MCQ MODULE 2

Multiple Ads

Search

Menu Bar

DIGITAL FLUENCY MCQ MODULE 2

Module 2: Applications of Emerging Technologies (BACK)

 

Applications of Artificial Intelligence

 

1.  Self-driving cars usually use Limited Memory technology to:

 

a)            Store data

 

b)            Automate

 

c)              Detect Motion

 

d)            None of the above

2.  Which of these is NOT an application of AI?

 

a)             Language Translation

 

b)            Voice Recognition

 

c)              Robotics

 

d)           Obtain massive training data sets

3.  Which of the following are examples of Weak AI?

 

a)             Siri & Alexa

 

b)            Advanced Chess Programs

 

c)              Siri, Alexa & Advanced Chess Programs

 

d)            None of the above

4.  Predictive maintenance, an application of AI, prevents unplanned downtime.

 

a)     True

 

b)     False

5.  What are the main goals of AI?

 

a)             To Create Expert Systems

 

b)            To Implement Human Intelligence in Machines

 

c)              Both A and B

 

d)            None of the Above

6.  Which of the following is not the type of AI?

 

a)             Reactive machines

 

b)           Unlimited memory

 

c)              Theory of mind

 

d)            Self-awareness

7.  Which of the following is an application of AI?

 

a)             Gaming

 

b)            Expert Systems

 

c)              Vision Systems

 

d)           All of the above

8.  Which of the following is not a stage of AI?

 

a)             Predictive analytics

 

b)            Diagnostic analytics

 

c)              Cognitive analytics

 

d)            All of the above

 

Applications of Big Data Analytics

 

1.                  Which type of analytics ensures that the path is predicted for the future course of action?

 

a)     Predictive Analytics

 

b)    Prescriptive Analytics

 

c)       Diagnostic Analytics

 

d)    None of the above

2.                  Customer Segmentation and Differential Pricing Strategy can be easily achieved through_______

 

a)     Big Data Analytics

 

b)    Web pages

 

c)       Browsers

 

d)    Hardware’s

3.                  Which data analysis fails to cope with the advent of Big Data which is essentially huge data, both structured and unstructured?

 

a)     Traditional

 

b)    New

 

c)       Low

 

d)    None of the above

4.                  Healthcare big data refers to ___________________ consumer, patient, physical, and clinical data that is too vast or complex to be understood by traditional means of data processing.

 

a)     Collecting

 

b)    Analyzing

 

c)       Leveraging

 

d)    All of the above

5.                  Which of the following are example(s) of Real Time Big Data Processing?

 

a)     Complex Event Processing (CEP) platforms

 

b)    Stock market data analysis

 

c)       Bank fraud transactions detection

 

d)    both (a) and (c)

6.                  Data analysis is the process of:

 

a)     Examining data to find facts

 

b)    Relationships,

 

c)       Patterns, insights and/or trends.

 

d)    All the above

 

Applications of Internet of Things

 

1.                  Which service permits the changes to the IoT services?

 

a)     Update

 

b)    Registered service status

 

c)       Enable from suspension

 

d)    Enable

2.                  What is the component of an IoT system that executes a program?

 

a)     Sensor

 

b)    Microcontroller

 

c)       Actuator

 

d)    Digital to analog converter

3.                  You're hosting a party in your home and your guests have arrived. The smart security camera will

 

a)     Detect the number of people who have entered the home, report to the AI Control Center and automatically turn on the lights

 

b)    Wait to receive the instructions from the owner of the house to turn on the lights

 

c)       Both a and b

 

d)    None of the above

4.                  The latest advances of Technology have tremendous potential to:

 

a)     Impact the jobs of the people

 

b)    Benefit people by Increasing efficiency and reducing waste

 

c)       Both a and b

 

d)    None of the above

5.                  ___________ is a network of Internet-linked devices, vehicles, and appliances that can collect and share data without the need of human interaction

 

a)     Internet of things

 

b)    Web browsers

 

c)       Search engines

 

d)    Google

6.                  IoT gateway must provide __________

 

a)     Protocol abstraction

 

b)    Data storage

 

c)       Security with hardware

 

d)    Simple and fast installation

 

Applications of Cloud Computing

 

1.   ............. is the essential concept related to Cloud?

 

a)     Reliability

 

b)    Abstraction

 

c)       Productivity

 

d)    None of the above

2.                  The Private cloud is a –

 

a)     A cloud service inaccessible to anyone but the cultural elite

 

b)    Standard cloud service offered via the Internet

 

c)       Cloud architecture maintained within an enterprise data centre.

 

d)    All of the above

3.                  Which one of the following is a model for cloud computing?

 

a)     County

 

b)    Public

 

c)       Ethernet

 

d)    Topology

4.                  Cloud Computing can store a tremendous amount of data which can also help:

 

a)     Big Data Analytics

 

b)    Action Items

 

c)       Cloud Networks

 

d)    None of the above

5.                  Cloud Computing architect also depends on:

 

a)     Information, Technology, and Application

 

b)    Information, Bandwidth, and Application

 

c)       Type, Security, and Application

 

d)    None of the above

6.                  _________is believed to facilitate greater collaboration and enhance the learning opportunities.

 

a)     Cloud Computing

 

b)    IoT

 

c)       Hacking

 

d)    Big data

 

Applications of Cybersecurity

 

1.                  Which of the following option is used to protect data and passwords?

 

a)     Authorization

 

b)    Authentication

 

c)       Encryption

 

d)    Non-repudiation

2.                  Which of the following is the first computer virus?

 

a)     Creeper

 

b)    Sasser

 

c)       Blaster

 

d)    All of the above

3.                  Firewalls are used to protect______

 

a)     Fire attacks

 

b)    Virus attacks

 

c)       Unauthorised access

 

d)    Data driven attacks

4.                  The easiest way for attackers to gain network access is to:

 

a)     Leverage existing vulnerabilities

 

b)    Creating new vulnerabilities

 

c)       Send Spam mails

 

d)    None of the above

5.                  Which of the following is the recommended security standard for electronic payment processing?

 

a)     COBIT

 

b)    HIPAA rules

 

c)       PCI DSS

 

d)    None

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

No comments: