--> Sayadasite: DIGITAL FLUENCY IMPORTANT MCQ

Multiple Ads

Search

Menu Bar

DIGITAL FLUENCY IMPORTANT MCQ

1.     How does Watson BEAT help music composers?

a)     It is AI enables and helps composers with different musical elements

b)     It helps by collecting data on their composed music and audience taste

c)     It is helps composers to compose and store their music on cloud

d)     It helps composers from securing their music against cyber theft

2.     Identify the professionals who can make use of IoT to improve their output. Select all that apply.

a)     Manufacturers  

b)     Healthcare Professionals  

c)     Chefs

d)     Agriculturists

3.     Big data in Healthcare can be used to improve care personalization and efficiency with comprehensive patient profile.

a)     True

b)     False

4.     Cloud computing is used for business management applications, backup and recovery, anti-virus applications but cannot be used for creative work like video making and editing.

a)     True

b)     False  

5.     Statement 1: AI can help manufacturing lower, or even reverse the adverse impact on Environment. Statements 2: AI helps manufacturing with quality checks and predicting maintenance costs.

a)     Statement 1 is correct

b)     Statement 2 is correct

c)  Both the statements are correct          

d) Both the statements are incorrect

6.     Which one of these is NOT a Big Data Analytics tool?

a)     Apache Hadoop

b)     Packet Sniffers  

c)     CouchDB

d)     Apache Spark

7.     How is AI helping in the healthcare industry? Select all that apply

a)     Helps surgeons with finer view during surgery

b) Helps pathologists in analyzing sample tissues               

c)  Helps in for quicker and better tools for medical research                

d)     Helps nurses in care of critically ill patients

8.     Select the commonly used cybersecurity Frameworks. Select all that apply.

a)     NIST Cybersecurity Framework  

b)     ISO 2000

c)     CIS Controls  

d)     COBIT

9.     Identify the issues that can lead to ineffective communication. Select all that apply.

a)     Being judgement  

b)     Mixing fun with work

c)     Lack of knowledge and awareness  

d)     Having negative emotions

e)     Inadequate listening skills  

10. What are the correct steps to be taken       to simplify the complexity of Cyber security?

a)     Start with Visibility  Understand your Vulnerabilities  Ensure Data Veracity

b)     Start with understanding Vulnerability  Ensure Data Veracity  Assess your Visibility

c)     Start with Visibility  Ensure Data Veracity  Understand your Vulnerabilities

11. Cloud Computing in e-commerce enables the e-commerce to increase which of these features? Select all that apply

a)     Scale

b)     Speed  

c)     Cost

d)     Human Resources

12. Being a good team player will help your build support network.

a)     True

b)     False

13. What is the correct sequence of steps that your should follow to solve a problem?

a)     Generate alternatives Evaluate & Select one alternative  Fit it to the problem  Implement it alternative  Implement solutions

b)     Gather solutions  Define Problem  Check suitability of solutions  Implement solutions.

c)     Define the problem  Generate alternatives  Evaluate & Select  

14. What are the skills that you must develop for creative thinking and design thinking?

a)     Deeper understanding of business & Processes

b)     Empathy & contextual observation  

c)     Verbal & Written Communication

d)     Data analysis & visualization skills

15. An invention that is neither practically implementable nor creates meaningful impact in a market or society cannot be called innovation.

a)     True

b)     False

16.  Verbal, non-verbal, interpersonal, and written skills are all part of developing effective communication. However, listening skills are not required for this purpose.

a)     True

b)     False   

17.  Select the right process of design thinking.

a)     Ideate  Empathize  Define  Prototype  Test

b)     Empathize  Ideate  Define  Prototype  Test

c)     Empathize  Define  Ideate  Prototype  Test

d)     Define  Empathize  Prototype  Test  Ideate

18. Why should you work upon your communication skills? Select all that apply.

a)     It will get you raise in salary

b)     It will reduce conflicts  

c)     It will improve productivity  

d) It will make you good team player            

19.  Select the statement that correctly defines Design Thinking.

a)     Design thinking is an approach that looks at creating products that can generate maximum revenue

b)     Design thinking is a human centered approach that aims at creating products & services that meets the need of the consumers

c)     Design thinking is an approach that helps in improving the technology by

borrowing from designer’s toolkit

20. What should you do to demonstrate that you are listening? Select all that apply.

a)     Pause for few seconds after the other person has stopped speaking  

b)     Paraphrase to confirm your understanding  

c)     Ask all questions

d)     Complete other person’s sentences

e)     Shake your head if you do not agree while the other person is speaking

21. Which among these is NOT a Machine Learning technique?

a)     Decision Tree Learning

b)     Inductive Logic Programming

c)     Cognitive Learning

d) Reinforcement Learning

22.  Select the order of the Big Data Analytics process

a)     Information, Data, Analysis, Insights

b)     Data, Information, Insight, Analysis  

c)     Data, Information, Insights, Analysis

d)     Data, Analysis, Information, Insights

23. What is a Cloud Computing offering called in which users are provided with access to resources such as servers, storage and networks ?

a)     Infrastructure as Service (Iaas)

b)     Platform as Service (PaaS)

c)     Software as Service (SaaS)

24.  Tools that are used for finding patterns which are far too complex or numerous for a human programmer to extract and teach the machine to recognize are called

a)     Machine Learning

b)     Artificial Neural Networks  

c)     Deep Learning

d)     Reinforcement Learning

25. A system that provides anti-spam and anti-malware protection is called _____

a)     Intrusion Prevention System

b)     Secure E-mail Gateway  

c)     End Point of Protection

d)     Security Incident Management

26.  Security is a concern for IoT but not IIoT

a)     True

b)    False  

27. According to industry experts, which out of the below mentioned is NOT one of the ‘Five V’s of Big Data’.

a)     Volume

b)     Virtue  

c)     Velocity

d)     Variety

e)     Veracity

f)      Value

28. A birthday attach is.

a)     Attacks that use third-party web resources to run scripts in the victim’s web browser or scriptable application

b)     Attacks that are made against hash algorithms that are used to verify the

integrity of a message, software or digital signature              

c)     Attacks that occur through interception of network traffic resulting in obtaining passwords, credit card numbers and other confidential information

d)     Attacks that overwhelm a system’s resources so that it cannot respond to

service requests

29. What are the benefits of IIoT.

a)     Improving Operational Effectiveness  

b)     Improving return on investment

c)     Increasing flexibility and agility  

d)     Increasing top line

30. A cyber threat that spreads from computer to computer without any human action is called ____________.

a)     Virus

b)     Worm

c)     Spam

d)     Trojan Horse

1.Habits that you should cultivate to enhance your verbal communication skills

a)     Practice Mindfulness 

b)     Talk before listen

c)      Spontaneous speaking

d)     Smiling

2.Verbal Communications are descriptive and evaluative. Therefore, we need to make choices that are appropriate when communicating verbally.

a)     True

b)     False

3.What are the goals of verbal communication in the workplace? Select all that apply.

a)     Resolve

b)     Persuade

c)      Inspire

d)     Organize

4.Select the examples of verbal communication for team members. Select all the apply.

a)     Giving credit to others

b)     Conveying messages concisely

c)      Requesting Feedback

d)     Tailoring messages for different audiences

5.Intrapersonal communication cannot be considered as verbal communication as it is communication with self.

a)     True

b)     False

6.IoT applications are designed in such a way that they can replace doctors and psychologists.

a)     True

b)     False

7.Which health initiative was launched by Tanzeem Choudhury of Cornell University to guide mobile health?

a)     Precision Behavioral Health Initiative

b)     AI Behavioral Initiative

c)      Tanzeem Behavioral Initiative

d)     Diagnostic Health Behavioral Initiative

8.Smart Wearables, E-Therapy and Chatbots are few of the ways that IoT is helping us with our Mental Health.

a)     True

b)     False

9.How does IoT help in solving Mental Health problems? (Select all that apply.)

a)     Closing the gaps caused by distance or stigma

b)     Helping people get advice without using a computer or a phone

c)      Improving telehealth options

d)     Enabling doctors to make faster diagnosis

e)     Making mental health patients completely reliant on chatbots

10.The Mental Health telemedicine platforms have seen a significant rise in the demand since the start of the Pandemic.

a)     True

b)     False

1.Which of the following Cloud Computing offering enables users to develop, manage and deliver applications?

a)     Infrastructure as a service (IaaS)

b)     Platform as a service (PaaS)

c)      Software as a service (SaaS)

2.Which of these attacks is a ‘Smurf attack’?

a)     One where the attacker exploits the use of the buffer space during a Transmission Control Protocol session initialization handshake

b)     One where the attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host

c)      One where the attack involves use of IP spoofing and the ICMP to saturate a target network with traffic

d)     One where the Botnets (millions of systems infected with malware) under hacker control carry out DDoS attacks

3.Which of these is NOT a shortcoming of the two traditional security methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules?

a)     False positives

b)     Inability to deal with unique events

c)      Slower incident response

d)     Handle Zero-Day Attacks

4.The primary purpose of ________ is to scale the scope of data and to make predictions of unavailable, future or unseen data based on labeled sample data.

a)     Supervised Learning 

b)     Unsupervised Learning

c)      Semi-supervised Learning

d)     Reinforcement Learning

5.Arrange the four stages of IoT Architecture in right order.

a)     Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud

b)     Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems, Edge IT

c)      Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and Cloud

d)     Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud, Edge IT

6._________ allows networks to adjust their hidden layers of neurons in situations where the expected outcome is not achieved.

a)     Backpropagation 

b)     Feed Forward Neural Network

c)      Recurrent Neural Network

d)     Convolutional Neural Network

7.________ uses the classification process to identify data assets and clustering to group data into distinct parts.

a)     Supervised Learning

b)     Unsupervised Learning

c)      Semi-supervised Learning 

d)     Reinforcement Learning

8.Which of the following neural networks are made up of neurons and have learnable weights and biases?

a)     Feedforward Neural Networks

b)     Recurrent Neural Networks

c)      Convolutional Neural Networks 

d)     Boltzmann Machine Networks

e)     Hopfield Networks

9.Clustering and Dimensionality reduction techniques are used in ________________.

a)     Supervised Machine Learning 

b)     Unsupervised Machine Learning

c)      Semi-supervised Machine Learning

d)     Reinforcement Machine Learning

10.Artificial Intelligence (AI) that exhibits and performs some aspect(s) of human intelligence extremely well, however, lacks in other areas is called ________________.

a)     Transparent AI

b)     Narrow AI 

c)      Broad AI

d)     General AI

11.Which of the following is the Smart city that is utilizing the IoT technology to help its residents? 

a)     Palo Alto 

b)     Mumbai

c)      Colorado

12.Which of the following Internet of Things (IoT) enabled feature has not been incorporated by Kia Motors in its new car?

a)     AI Voice Command

b)     Auto Collision Notification

c)      Auto Driving

13.State True or False: "It is more important to frame your message rather than setting the context while communicating."

a)     True

b)     False

14.Which of the following is a major cause of passive thinking?

a)     Rationalizing 

b)     Routine

c)      Criticisms

15.State True or False: "Mandating Collaboration in a team is a good idea to enhance teamwork."

a)     True

b)     False

16.Which emerging technology provides scalable architecture for business needs?

a)     Cybersecurity 

b)     Robotic Process Automation

c)      Cloud Computing

17.State True or False: “Cloud services are disaster tolerant but expensive.”

a)     True

b)     False

18.Which of the following are the benefits of Big Data in Healthcare? (Select all that apply.)

a)     Prevention of identification of patterns in health outcomes

b)     Boost marketing efforts with information about consumer, patient, and physician needs and preferences

c)      Create a holistic, 360-degree view of consumers, patients, and physicians

19.Which of the following is NOT a Big Data Analytics service or tool?

a)     Apache Storm

b)     Talend

c)      AWS

20.Divergent Thinking focuses more on:

a)     Generation of multiple ideas and the connections between them

b)     Generation of a single idea

c)      Narrowing down multiple ideas into one solution

21.State True or False: "Forming assumptions is a good step in the process of Creative Problem Solving."

a)     True

b)     False

22.What is a Cybersecurity framework?

a)     A comprehensive set of guidelines that help organizations define cybersecurity policies to assess their security posture and increase resilience in the face of cyberattacks.

b)     A comprehensive set of guidelines that help organizations define cybersecurity policies to assess their security risk due to usage of other technologies and replace them with safer alternatives.

c)      A comprehensive set of guidelines that help organizations define cybersecurity policies to assess the scope of the use of their digital set-up in the face of cyberattacks and limit this usage to core users.

23.Which of the following steps should be taken to make Cybersecurity effective in any establishment? Select all that apply.

a)     Block the visibility of data assets on data centers and private clouds

b)     Find vulnerabilities across open-source code, third-party APIs and cloud-based solutions

c)      Ensure data veracity

24.State True or False: "The process of Design Thinking does not stop even after the deliverable is complete.

a)     True

b)     False

25.State True or False: "Iteration is a fundamental part of Design Thinking."

a)     True

b)     False

25.State True or False: “ Itaraction is a fundamental part of Design Thinking”

a)               True

b)               False

26.Which technology can create a digital twin, which is a virtual representation of a factory, product, or service? 

a)     Robotic Process Automation

b)     Artificial Intelligence

c)      Cloud Computing

27.What of the following are the examples of strong AI?

a)     Data Analytics and Data Visualization

b)     Siri and Alexa

c)      Visual Perception and Speech Recognition

28.State True or False: "Prioritizing listening over speaking is an important aspect while communicating."

a)     True

b)     False

29.Which of the following methods will enable you to become an engaged listener? (Select all that apply.)

a)     Focusing fully on the speaker

b)     Favouring your right ear while listening

c)      Ignoring the non-verbal signals

d)     Noting down points during communication

30.State True or False: "Skepticism is one of the major barriers to the process of Critical Thinking."

a)     True

b)     False

1.     The process of training a Neural Net is:

a)     Model -> Train -> Training Data -> Prediction -> Test and Update

b)     Train -> Model - >Prediction -> Test and Update

c)      Training Data -> Model -> Predict -> Test and Update

2.     A bot that can determine whether a bug is exploitable is called:

a)     Medecision

b)     Automatic Exploit Generation

c)      Hal

3.     In the case of Machine Learning, the algorithm needs to be told how to make an accurate prediction by providing it with more information, whereas, in the case of Deep Learning, the algorithm is able to learn that through its own Data Processing.

a)     True

b)     False

4.     Just like the PC, Internet and Cloud Computing, AI is also a disruptive technology.

a)     True

b)     False

5.     In the Healthcare Industry, AI has disrupted:

a)     Medical Imaging 

b)     Surgery

c)      Physiological Diagnosis.

1.     In Machine Learning, decisions are based on the type of algorithm selected.

a)     True

b)     False

2.     Which type of Neural Network is used by Stock Market Indices?

a)     LSVM

b)     NSTM

c)      LSTM

3.     Naïve Bayes Classifier algorithm is useful for predicting class of the test dataset.

a)     True

b)     False

4.     Which of the following Machine Learning Algorithms is a learning method that interacts with its environment by producing actions and and discovering errors or rewards?

a)     Supervised Learning

b)     Semi Supervised Learning

c)      Reinforcement Learning

5.     Unsupervised Machine Learning algorithms are used when the information used to train is neither classified nor labeled.

a)     True

b)     False

1.     The more layers there are in a Neural Network, the higher is its ability to approximate more complex functions.

a)     True

b)     False

2.        The most basic type of an ANN is called:

a)     Feed forward Neural Network.

b)     Recurrent Neural Network

c)      Boltzmann Machine Network

3.     Which of these tools can help you build your Convolutional Neural Network?

a)     Tensorflow.

b)     Premier Pro

c)      Silverlight

4.     In a Deep Learning System, each connection between Neurons is associated with a:

a)     Length

b)     Weight

c)      Function

5.     The network evaluates how good its prediction was through

a)     Cost function

b)     Loss function.

c)      Bias parameters

d)     Back propagationhttps://www.blogger.com/img/img-grey-rectangle.png

1.     "Companies that see significant impact from advanced analytics are purposeful about where they intend to win in analytics."

a)     True

b)     False

2.     A centralized repository that allows you to store all your structured, in structured and semi- structured data at any scale is called a:

a)     Dataset

b)     Database

c)      Data Lake

d)     Data Warehouse.

3.     Which algorithm allows you to reduce the dimension of the data while losing the least amount of information?

a)     Decision Trees

b)     K-Means Clustering

c)      Recurrent Neural Networks

d)     Principal Component Analysis 

4.     Clustering (or cluster analysis) is the task of breaking up a set of objects into groups called clusters.

a)     True 

b)     False

5.     Which type of analytics describes or summarizes existing data to understand what is going on or what has happened?

a)     Descriptive Analytics 

b)     Diagnostic Analytics

c)      Predictive Analytics

d)     Prescriptive Analytics.

1.     Which one of the following is NOT a key component of DBMS?

a)     Runtime Database Manager

b)     Equitable Manager 

c)      Database Manager

2.     RDBMSes store Data in the form of tables, with most commercial Relational Database Management Systems using:

a)     SQL 

b)     Apache

c)      Work Fusion

3.     The table format used in RDBMSes is easy to understand but does not provide an organized and structural manner through which entries are matched by firing queries.

a)     True

b)     False 

4.     Which is an open source relational database management system (RDBMS) with a client- server model?

a)     Oracle

b)     MySQL 

c)      MS-Access.

5.     MongoDB supports ad-hoc queries and document-based queries.

a)     True 

b)     False

1.  In Canada, credit union                  is      exploring        the      possibility        of     wealth

https://www.blogger.com/img/img-grey-rectangle.pngmanagement apps, displayed on car windscreens, for passengers to review their portfolios while being driven to their destination

a)     Redshore

b)     Blueshore

c)      Deepshore

d)     None of the above.

2.     https://www.blogger.com/img/img-grey-rectangle.png                 are also beneficial for the elderly, providing monitoring that can help seniors to remain at home comfortably and safely, rather than moving to a nursing home or requiring 24/7 home car.

a)     Robotics Analytics

b)     Domotics  

c)      None of the above.

3.     Which is the first stage in every IoT architecture?

a)     Sensors and actuators 

b)     Internet getaways and Data Acquisition Systems

c)      Edge IT

d)     Data center and cloud.

4.   IoT devices are naturally vulnerable to____________ threats

a)     Sensors

b)     Heterogeneity

c)      Security  

d)     Connectivity.

5.     IoT is a paradigm that involves ubiquitous presence in the environment

a)     True 

b)     False

6.     What are copies of the physical objects that are accurate enough to let their owners experiment and predict the operation of their assets called?

a)     Digital Sons

b)     Digital Siblings

c)      Digital Twins 

No comments: