1. How
does Watson BEAT help music composers?
a) It is AI
enables and helps composers with different musical elements
b) It helps by
collecting data on their composed music and audience taste
c) It is helps
composers to compose and store their music on cloud
d) It helps
composers from securing their music against cyber theft
2. Identify the
professionals who can make use of IoT to improve their output. Select all that
apply.
a) Manufacturers
b) Healthcare
Professionals
c) Chefs
d) Agriculturists
3. Big data in
Healthcare can be used to improve care personalization and efficiency with
comprehensive patient profile.
a) True
b) False
4. Cloud computing
is used for business management applications, backup and recovery, anti-virus
applications but cannot be used for creative work like video making and
editing.
a) True
b) False
5. Statement 1: AI
can help manufacturing lower, or even reverse the adverse impact on
Environment. Statements 2: AI helps manufacturing with quality checks and
predicting maintenance costs.
a) Statement 1 is
correct
b) Statement 2 is
correct
c) Both the statements are
correct
d) Both the statements are incorrect
6. Which one of
these is NOT a Big Data Analytics tool?
a) Apache Hadoop
b) Packet Sniffers
c) CouchDB
d) Apache Spark
7. How is AI
helping in the healthcare industry? Select all that apply
a) Helps surgeons
with finer view during surgery
b) Helps pathologists in analyzing sample
tissues
c) Helps in for quicker and better
tools for medical
research
d) Helps nurses in
care of critically ill patients
8. Select the
commonly used cybersecurity Frameworks. Select all that apply.
a) NIST
Cybersecurity Framework
b) ISO 2000
c) CIS Controls
d) COBIT
9. Identify the
issues that can lead to ineffective communication. Select all that apply.
a) Being judgement
b) Mixing fun with
work
c) Lack of knowledge
and awareness
d) Having
negative emotions
e) Inadequate
listening skills
10. What are the correct steps to be
taken to simplify the complexity of
Cyber security?
a) Start with
Visibility → Understand your Vulnerabilities → Ensure
Data Veracity
b) Start with
understanding Vulnerability → Ensure Data Veracity → Assess
your Visibility
c) Start with
Visibility → Ensure Data Veracity → Understand
your Vulnerabilities
11. Cloud Computing in
e-commerce enables the e-commerce to increase which of these features? Select
all that apply
a) Scale
b) Speed
c) Cost
d) Human Resources
12. Being a good team player will help your
build support network.
a) True
b) False
13. What is the correct sequence of steps that your
should follow to solve a problem?
a) Generate
alternatives →Evaluate & Select one alternative → Fit
it to the problem → Implement it alternative → Implement
solutions
b) Gather
solutions → Define Problem → Check
suitability of solutions → Implement solutions.
c) Define the problem → Generate
alternatives → Evaluate & Select
14. What are the skills that you must develop
for creative thinking and design thinking?
a) Deeper
understanding of business & Processes
b) Empathy & contextual observation
c) Verbal &
Written Communication
d) Data analysis
& visualization skills
15. An invention that is neither practically
implementable nor creates meaningful impact in a market or society cannot be
called innovation.
a) True
b) False
16. Verbal,
non-verbal, interpersonal, and written skills are all part of developing
effective communication. However, listening skills are not required for this
purpose.
a) True
b) False
17. Select the right process of
design thinking.
a) Ideate → Empathize → Define → Prototype → Test
b) Empathize → Ideate → Define → Prototype → Test
c) Empathize → Define → Ideate → Prototype → Test
d) Define → Empathize → Prototype → Test → Ideate
18. Why should you work upon your communication
skills? Select all that apply.
a) It will get you
raise in salary
b) It will reduce
conflicts
c) It will
improve productivity
d) It will make you good team
player
19. Select the statement that
correctly defines Design Thinking.
a) Design thinking
is an approach that looks at creating products that can generate maximum
revenue
b) Design thinking is a human centered approach
that aims at creating products &
services that meets the need of the consumers
c) Design thinking
is an approach that helps in improving the technology by
borrowing from designer’s toolkit
20. What should you do to demonstrate that you
are listening? Select all that apply.
a) Pause for few
seconds after the other person has stopped speaking
b) Paraphrase to
confirm your understanding
c) Ask all
questions
d) Complete other
person’s sentences
e) Shake your head
if you do not agree while the other person is speaking
21. Which among these is NOT a Machine Learning
technique?
a) Decision Tree
Learning
b) Inductive Logic
Programming
c) Cognitive
Learning
d) Reinforcement Learning
22. Select the order of the Big Data
Analytics process
a) Information,
Data, Analysis, Insights
b) Data,
Information, Insight, Analysis
c) Data,
Information, Insights, Analysis
d) Data, Analysis,
Information, Insights
23. What is a Cloud Computing offering called in
which users are provided with access to resources such as servers, storage and
networks ?
a) Infrastructure
as Service (Iaas)
b) Platform as
Service (PaaS)
c) Software as
Service (SaaS)
24. Tools that are used for finding
patterns which are far too complex or numerous for a human programmer to
extract and teach the machine to recognize are called
a) Machine Learning
b) Artificial
Neural Networks
c) Deep Learning
d) Reinforcement
Learning
25. A system that provides anti-spam and
anti-malware protection is called _____
a) Intrusion
Prevention System
b) Secure E-mail
Gateway
c) End Point of
Protection
d) Security
Incident Management
26. Security is a concern for IoT but
not IIoT
a) True
b) False
27. According to industry experts, which out of the below mentioned
is NOT one of the ‘Five V’s of Big Data’.
a) Volume
b) Virtue
c) Velocity
d) Variety
e) Veracity
f) Value
28. A birthday attach is.
a) Attacks that use third-party web resources to
run scripts in the victim’s web browser or scriptable application
b) Attacks that
are made against hash algorithms that are used to verify the
integrity of a message, software or digital
signature
c) Attacks that occur through interception of
network traffic resulting in obtaining passwords, credit card numbers and other
confidential information
d) Attacks that overwhelm a system’s resources so
that it cannot respond to
service requests
29. What are the benefits
of IIoT.
a) Improving
Operational Effectiveness
b) Improving return
on investment
c) Increasing
flexibility and agility
d) Increasing top
line
30. A cyber threat that spreads from computer to
computer without any human action is called ____________.
a) Virus
b) Worm
c) Spam
d) Trojan Horse
1.Habits that you should
cultivate to enhance your verbal communication skills
a) Practice
Mindfulness
b) Talk
before listen
c) Spontaneous
speaking
d) Smiling
2.Verbal Communications are
descriptive and evaluative. Therefore, we need to make choices that are
appropriate when communicating verbally.
a) True
b) False
3.What are the goals of
verbal communication in the workplace? Select all that apply.
a) Resolve
b) Persuade
c) Inspire
d) Organize
4.Select the examples of
verbal communication for team members. Select all the apply.
a) Giving
credit to others
b) Conveying
messages concisely
c) Requesting
Feedback
d) Tailoring
messages for different audiences
5.Intrapersonal
communication cannot be considered as verbal communication as it is
communication with self.
a) True
b) False
6.IoT applications are
designed in such a way that they can replace doctors and psychologists.
a) True
b) False
7.Which health initiative
was launched by Tanzeem Choudhury of Cornell University to guide mobile health?
a) Precision
Behavioral Health Initiative
b) AI
Behavioral Initiative
c) Tanzeem
Behavioral Initiative
d) Diagnostic
Health Behavioral Initiative
8.Smart Wearables,
E-Therapy and Chatbots are few of the ways that IoT is helping us with our
Mental Health.
a) True
b) False
9.How does IoT help in
solving Mental Health problems? (Select all that apply.)
a) Closing
the gaps caused by distance or stigma
b) Helping
people get advice without using a computer or a phone
c) Improving
telehealth options
d) Enabling
doctors to make faster diagnosis
e) Making
mental health patients completely reliant on chatbots
10.The Mental Health
telemedicine platforms have seen a significant rise in the demand since the
start of the Pandemic.
a) True
b) False
1.Which of the following
Cloud Computing offering enables users to develop, manage and deliver
applications?
a) Infrastructure
as a service (IaaS)
b) Platform
as a service (PaaS)
c) Software
as a service (SaaS)
2.Which of these attacks is
a ‘Smurf attack’?
a) One
where the attacker exploits the use of the buffer space during a Transmission
Control Protocol session initialization handshake
b) One
where the attack causes the length and fragmentation offset fields in
sequential Internet Protocol (IP) packets to overlap one another on the
attacked host
c) One
where the attack involves use of IP spoofing and the ICMP to saturate a target
network with traffic
d) One
where the Botnets (millions of systems infected with malware) under hacker
control carry out DDoS attacks
3.Which of these is NOT a
shortcoming of the two traditional security methods, Risk Assessment and
Identifying Vulnerabilities, and Correlation Rules?
a) False
positives
b) Inability
to deal with unique events
c) Slower
incident response
d) Handle
Zero-Day Attacks
4.The primary purpose of
________ is to scale the scope of data and to make predictions of unavailable,
future or unseen data based on labeled sample data.
a) Supervised
Learning
b) Unsupervised
Learning
c) Semi-supervised
Learning
d) Reinforcement
Learning
5.Arrange the four stages
of IoT Architecture in right order.
a) Sensors
and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data
Center and Cloud
b) Sensors
and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition
Systems, Edge IT
c) Sensors
and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data
Center and Cloud
d) Sensors
and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and
Cloud, Edge IT
6._________ allows networks
to adjust their hidden layers of neurons in situations where the expected
outcome is not achieved.
a) Backpropagation
b) Feed
Forward Neural Network
c) Recurrent
Neural Network
d) Convolutional
Neural Network
7.________ uses the
classification process to identify data assets and clustering to group data
into distinct parts.
a) Supervised
Learning
b) Unsupervised
Learning
c) Semi-supervised
Learning
d) Reinforcement
Learning
8.Which of the following
neural networks are made up of neurons and have learnable weights and biases?
a) Feedforward
Neural Networks
b) Recurrent
Neural Networks
c) Convolutional
Neural Networks
d) Boltzmann
Machine Networks
e) Hopfield
Networks
9.Clustering and
Dimensionality reduction techniques are used in ________________.
a) Supervised
Machine Learning
b) Unsupervised
Machine Learning
c) Semi-supervised
Machine Learning
d) Reinforcement
Machine Learning
10.Artificial Intelligence
(AI) that exhibits and performs some aspect(s) of human intelligence extremely
well, however, lacks in other areas is called ________________.
a) Transparent
AI
b) Narrow
AI
c) Broad
AI
d) General
AI
11.Which of the following
is the Smart city that is utilizing the IoT technology to help its
residents?
a) Palo
Alto
b) Mumbai
c) Colorado
12.Which of the following
Internet of Things (IoT) enabled feature has not been incorporated by Kia
Motors in its new car?
a) AI
Voice Command
b) Auto
Collision Notification
c) Auto
Driving
13.State True or False:
"It is more important to frame your message rather than setting the
context while communicating."
a) True
b) False
14.Which of the following
is a major cause of passive thinking?
a) Rationalizing
b) Routine
c) Criticisms
15.State True or False:
"Mandating Collaboration in a team is a good idea to enhance
teamwork."
a) True
b) False
16.Which emerging
technology provides scalable architecture for business needs?
a) Cybersecurity
b) Robotic
Process Automation
c) Cloud
Computing
17.State True or False:
“Cloud services are disaster tolerant but expensive.”
a) True
b) False
18.Which of the following
are the benefits of Big Data in Healthcare? (Select all that apply.)
a) Prevention
of identification of patterns in health outcomes
b) Boost
marketing efforts with information about consumer, patient, and physician needs
and preferences
c) Create
a holistic, 360-degree view of consumers, patients, and physicians
19.Which of the following
is NOT a Big Data Analytics service or tool?
a) Apache
Storm
b) Talend
c) AWS
20.Divergent Thinking
focuses more on:
a) Generation
of multiple ideas and the connections between them
b) Generation
of a single idea
c) Narrowing
down multiple ideas into one solution
21.State True or False:
"Forming assumptions is a good step in the process of Creative Problem Solving."
a) True
b) False
22.What is a Cybersecurity
framework?
a) A
comprehensive set of guidelines that help organizations define cybersecurity
policies to assess their security posture and increase resilience in
the face of cyberattacks.
b) A
comprehensive set of guidelines that help organizations define cybersecurity
policies to assess their security risk due to usage of other technologies and
replace them with safer alternatives.
c) A
comprehensive set of guidelines that help organizations define cybersecurity
policies to assess the scope of the use of their digital set-up in the face of
cyberattacks and limit this usage to core users.
23.Which of the following
steps should be taken to make Cybersecurity effective in any establishment?
Select all that apply.
a) Block
the visibility of data assets on data centers and private clouds
b) Find
vulnerabilities across open-source code, third-party APIs and cloud-based
solutions
c) Ensure
data veracity
24.State True or False:
"The process of Design Thinking does not stop even after the deliverable
is complete.
a) True
b) False
25.State True or False:
"Iteration is a fundamental part of Design Thinking."
a) True
b) False
25.State True or False: “
Itaraction is a fundamental part of Design Thinking”
a) True
b) False
26.Which technology can
create a digital twin, which is a virtual representation of a factory, product,
or service?
a) Robotic
Process Automation
b) Artificial
Intelligence
c) Cloud
Computing
27.What of the following
are the examples of strong AI?
a) Data
Analytics and Data Visualization
b) Siri
and Alexa
c) Visual
Perception and Speech Recognition
28.State True or False:
"Prioritizing listening over speaking is an important aspect while
communicating."
a) True
b) False
29.Which of the following
methods will enable you to become an engaged listener? (Select all that apply.)
a) Focusing
fully on the speaker
b) Favouring
your right ear while listening
c) Ignoring
the non-verbal signals
d) Noting
down points during communication
30.State True or False:
"Skepticism is one of the major barriers to the process of Critical
Thinking."
a) True
b) False
1. The process of
training a Neural Net is:
a) Model ->
Train -> Training Data -> Prediction -> Test and Update
b) Train ->
Model - >Prediction -> Test and Update
c) Training
Data -> Model -> Predict -> Test and Update
2. A bot that can
determine whether a bug is exploitable is called:
a) Medecision
b) Automatic
Exploit Generation
c) Hal
3. In
the case of Machine Learning, the algorithm needs to be told how to make an
accurate prediction by providing it with more information, whereas, in the case
of Deep Learning, the algorithm is able to learn that through its own Data
Processing.
a) True
b) False
4. Just like the
PC, Internet and Cloud Computing, AI is also a disruptive technology.
a) True
b) False
5. In the
Healthcare Industry, AI has disrupted:
a) Medical
Imaging
b) Surgery
c) Physiological
Diagnosis.
1. In Machine
Learning, decisions are based on the type of algorithm selected.
a) True
b) False
2. Which type of
Neural Network is used by Stock Market Indices?
a) LSVM
b) NSTM
c) LSTM
3. Naïve Bayes
Classifier algorithm is useful for predicting class of the test dataset.
a) True
b) False
4. Which
of the following Machine Learning Algorithms is a learning method that
interacts with its environment by producing actions and and discovering errors
or rewards?
a) Supervised
Learning
b) Semi Supervised
Learning
c) Reinforcement
Learning
5. Unsupervised
Machine Learning algorithms are used when the information used to train is
neither classified nor labeled.
a) True
b) False
1. The more layers
there are in a Neural Network, the higher is its ability to approximate more
complex functions.
a) True
b) False
2. The
most basic type of an ANN is called:
a) Feed forward
Neural Network.
b) Recurrent Neural
Network
c) Boltzmann
Machine Network
3. Which of these
tools can help you build your Convolutional Neural Network?
a) Tensorflow.
b) Premier Pro
c) Silverlight
4. In a Deep
Learning System, each connection between Neurons is associated with a:
a) Length
b) Weight
c) Function
5. The network
evaluates how good its prediction was through
a) Cost function
b) Loss function.
c) Bias
parameters
d) Back propagation
1. "Companies
that see significant impact from advanced analytics are purposeful about where
they intend to win in analytics."
a) True
b) False
2. A centralized
repository that allows you to store all your structured, in structured and
semi- structured data at any scale is called a:
a) Dataset
b) Database
c) Data
Lake
d) Data Warehouse.
3. Which
algorithm allows you to reduce the dimension of the data while losing the least
amount of information?
a) Decision Trees
b) K-Means
Clustering
c) Recurrent
Neural Networks
d) Principal
Component Analysis
4. Clustering
(or cluster analysis) is the task of breaking up a set of objects into groups
called clusters.
a) True
b) False
5. Which
type of analytics describes or summarizes existing data to understand what is
going on or what has happened?
a) Descriptive
Analytics
b) Diagnostic
Analytics
c) Predictive
Analytics
d) Prescriptive
Analytics.
1. Which one of the
following is NOT a key component of DBMS?
a) Runtime Database
Manager
b) Equitable
Manager
c) Database
Manager
2. RDBMSes store
Data in the form of tables, with most commercial Relational Database Management
Systems using:
a) SQL
b) Apache
c) Work
Fusion
3. The
table format used in RDBMSes is easy to understand but does not provide an
organized and structural manner through which entries are matched by firing
queries.
a) True
b) False
4. Which
is an open source relational database management system (RDBMS) with a client-
server model?
a) Oracle
b) MySQL
c) MS-Access.
5. MongoDB supports
ad-hoc queries and document-based queries.
a) True
b) False
1. In Canada, credit
union is exploring the possibility of wealth
management apps, displayed on car windscreens,
for passengers to review their portfolios while being driven to their
destination
a) Redshore
b) Blueshore
c) Deepshore
d) None of the
above.
2. are
also beneficial for the elderly, providing monitoring that can help seniors to
remain at home comfortably and safely, rather than moving to a nursing home or
requiring 24/7 home car.
a) Robotics
Analytics
b) Domotics
c) None of
the above.
3. Which is the
first stage in every IoT architecture?
a) Sensors and
actuators
b) Internet
getaways and Data Acquisition Systems
c) Edge IT
d) Data center and
cloud.
4. IoT devices are naturally
vulnerable to____________ threats
a) Sensors
b) Heterogeneity
c) Security
d) Connectivity.
5. IoT is a
paradigm that involves ubiquitous presence in the environment
a) True
b) False
6. What are copies
of the physical objects that are accurate enough to let their owners experiment
and predict the operation of their assets called?
a) Digital Sons
b) Digital Siblings
c) Digital Twins
No comments:
Post a Comment