Module 1: Emerging Technologies
1.
Artificial Intelligence, Machine
Learning, Deep Learning
1.
What
is Artificial intelligence?
a)
Putting your
intelligence into Computer
b)
Programming with
your own intelligence
c)
Making a Machine intelligent
d)
Playing a Game
2.
Who
is the father of Artificial Intelligence?
a)
Charles Babbage
b)
Alan Turing
c)
John McCarthy
d)
Bill Gates
3.
Which
programming language is used for AI?
a)
Python
b)
LISP
c)
PROLOG
d)
All the above
4.
What
is the full form of “ML”?
a)
Machine Learning
b)
Machine Looking
c)
Mechanic Link
d)
Many Learning
5.
Machine
learning is a subset of ................
a)
Deep Learning
b)
Artificial Intelligence
c)
Data Learning
d)
None of the above
6.
Which
of the following is an example of deep learning?
a)
Self-driving cars
b)
Pattern
recognition
c)
Natural language
processing
d)
All of the above
2.
Database Management for Data Science,
Big Data Analytics
1.
What
is abbreviation of DBMS?
a)
Data Base Management system
b) Data base mining source
c)
Data Base
Management Schema
d) Data Base Manipulation Schema
2.
Which is an open-source relational database management system
(RDBMS) with a client-server model?
a) Oracle
b)
MySQL
c)
MS-Access
3.
Amongst
which of the following can be considered as the main source of unstructured
data.
a) Twitter
b) Facebook
c)
Webpages
d)
All of the mentioned above
3.
Internet of Things (IoT) and Industrial
Internet of Things (IIoT)
1.
IoT
stands for?
a) Introduction of Things
b)
Internet of Things
c)
Internet of
Tracking
d) Interaction of Things
2.
IIoT
stands for
a)
Industrial Internet of Things
b) Internet Internet of Things
c)
Intelligence
Internet of Things
d) Internal Internet of Things
3. IoT devices are
naturally vulnerable to threats
a) Sensors
b) Heterogeneity
c)
Security
d) Connectivity
4.
What
is the full form of IaaS?
a) Internet as a Software
b) Internet as a Service
c)
Infrastructure as
a Software
d)
Infrastructure as a Service
5.
What
is the full form of PaaS?
a)
Platform as a service
b) Product as a software
c)
People as a
service
d) Press as software
6.
What
is the full form of SaaS?
a)
Software as a Service
b) Source as a service
c)
Special as a
software
d) Shift as a software
7.
Which
of the following is the way in which an IoT device is associated with data?
a) Internet
b)
Cloud
c)
Automata
d) Network
8. An IoT network is a
collection of devices.
a) Signal
b) Machine to Machine
c)
Interconnected
d) Network to Network
9.
What
is the role of Big Data in IoT's Smart Grid architecture?
a) Filter the data
b) Locked the data
c)
Store data
d) None of the these
10.
attacks
are real threats to IIoT.
a)
Distributed Denial-of-Service (DDoS)
b) Worms
c)
Ransomware
d) Virus
4.
Cloud computing and its service models
1.
What
is Cloud Computing?
a)
Cloud Computing means providing services
like storage, servers, database, networking, etc
b) Cloud Computing means storing data in a database
c)
Cloud Computing
is a tool used to create an application
d) None of the mentioned
2.
What
does the word Cloud represent in cloud computing?
a)
Internet
b) Wireless
c)
Data
d) Disk
3.
Which
technique is used in creating cloud computing?
a) Transubstantiation
b)
Virtualization
c)
Insubordination
d) Cannibalization
4. A private cloud is .
a)
It is a cloud maintained within an
enterprise data center.
b) It can be accessible by anyone
c)
It is offered
offline
d) All the above
5. Amazon uses as a cloud platform.
a)
AWS
b) Azure
c)
Opera
d) Gdrive
5.
Cyber Security and Types of cyber attack
1.
What
is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against
cyber-terrorists
c)
Cyber Security
protects a system from cyber attacks
d)
All of the mentioned
2.
Who
is the father of computer security?
a)
August Kerckhoffs
b) Bob Thomas
c)
Robert
d) Charles
3.
Which
of the following is a type of cyber security?
a) Cloud Security
b) Network Security
c)
Application
Security
d)
All of the above
4.
What
are the features of cyber security?
a) Compliance
b) Defense against internal threats
c)
Threat Prevention
d)
All of the above
5.
Which
of the following is a component of cyber security?
a)
Internet Of Things
b) AI
c)
Database
d) Attacks
6.
The full form of Malware is
a) Malfunctioned Software
b) Multipurpose Software
c)
Malicious Software
d) Malfunctioning of Security
7.
Which
of the following is considered as the unsolicited commercial email?
a) Virus
b) Malware
c)
Spam
d) All of the above
8.
is
a type of software designed to help the user's computer detect viruses and
avoid them.
a) Malware
b) Adware
|
c) |
Antivirus |
|
|
d) Both B and C |
||
9. |
|
|
is a famous technological medium for
the spread of malware, facing problems of |
spam, & phishing attacks.
a) Cloud
b) Pen drive
c)
Website
d)
Email
10.
Unsolicited
Bulk E-mails (UBI) are called
a) SMS
b) MMS
c)
Spam emails
d) Malicious emails
11.
Which
one of the following is/are a type of antivirus program?
a) Quick heal
b) Mcafee
c)
Kaspersky
d)
All of the above
Module 2: Applications of Emerging
Technologies
Applications
of Artificial Intelligence
1. Which of the following are examples of
Weak AI?
a)
Siri & Alexa
b)
Advanced Chess
Programs
c)
Siri, Alexa & Advanced Chess
Programs
d)
None of the above
2. Which of the following is an application
of AI?
a)
Gaming
b)
Expert Systems
c)
Vision Systems
d)
All of the above
Applications of Internet of Things
1.
What
is the component of an IoT system that executes a program?
a) Sensor
b)
Microcontroller
c)
Actuator
d) Digital to analog converter
2. |
|
|
is a network of Internet-linked
devices, vehicles, and appliances that can collect and |
|
share data without the need of human interaction |
||
|
a) |
Internet
of things |
|
|
b) |
Web browsers |
|
|
c) |
Search engines |
3.
IoT gateway must provide
a)
Protocol abstraction
b) Data storage
c)
Security with
hardware
d) Simple and fast installation
Applications
of Cloud Computing
1.
The
Private cloud is a –
a) A cloud service inaccessible to anyone but the
cultural elite
b) Standard cloud service offered via the Internet
c)
Cloud architecture maintained within an
enterprise data centre.
d) All of the above
2.
Which
one of the following is a model for cloud computing?
a) County
b)
Public
c)
Ethernet
d) Topology
3.
Cloud
Computing can store a tremendous amount of data which can also help:
a)
Big Data Analytics
b) Action Items
c)
Cloud Networks
d) None of the above
4.
Cloud
Computing architect also depends on:
a)
Information, Technology, and Application
b) Information, Bandwidth, and Application
c)
Type, Security,
and Application
d) None of the above
5.
is
believed to facilitate greater collaboration and enhance the learning
opportunities.
a)
Cloud Computing
b) IoT
c)
Hacking
d) Big data
Applications
of Cybersecurity
1.
Which
of the following option is used to protect data and passwords?
a) Authorization
b) Authentication
c)
Encryption
d) Non-repudiation
2.
Firewalls
are used to protect
a) Fire attacks
b) Virus attacks
c)
Unauthorised access
d) Data driven attacks
Module 3: Building Essential Skills
Beyond Technology
1.
Effective Communication Skills
1.
The
word 'Communication' has been derived from
a) Greek
b)
Latin
c)
German
d) French
2. The is the person who transmits the message.
a) Receiver
b) Driver
c)
Sender
d) Cleaner
3.
Which
of the following can be considered as part of digital Communication?
a) E-mails
b) WhatsApp messages.
c)
Facebook
messenger
d)
All of the above
4.
The
response to a sender's message is called
a) Food bank
b)
Feedback
c)
Look back
d) Backward
5. Our dress code is an
example of communication.
a) Verbal
b)
Nonverbal
c)
Written
d) Spoken
6.
communication
includes tone of voice body language, facial expressions etc.
a)
Nonverbal
b) verbal
c)
letter
d) notice
7.
Letter, e-mail telephone are
examples of
a)
Message
b)
Feedback
c)
Channel
d)
Encoding
8.
are
needed to communicate effectively with people.
a) Self-Management Skills
b)
Communication Skills
c)
ICT Skills
d) Time Management Skills
9. is/are elements of a communication
cycle.
a) Sender
b) Receiver
c)
Channel
d)
All of the above
10.
Which
of the following is the method of communication?
a) Face to Face
b) E-mail
c)
Notices/Posters
d)
All of the above
11.
includes
sounds, words, language, and speech.
a)
Verbal communication
b) Non-Verbal communication
c)
Both of the above
d) None of the above
12. Oral
communication ensures and .
a) Fluency; speed
b)
adequate attention; immediate response
c)
speedy
interaction; immediate response
d) speed; attention
13.
Choose
the correct example of oral communication.
a) Reports
b) Newspapers
c)
Face-to-face conversation
d) Notes
14.
is
the first enemy of communication.
a)
Noise
b) Clarity
c)
Politeness
d) Completeness
2.
Creative Problem Solving & Critical
Thinking
1.
What
is the first step to solving a problem?
a) Generating alternatives
b)
Defining the Problem
c)
Selecting
alternatives
d) Making a decision
2.
Strategies
for creative thinking include:
a) Never be afraid to ask any question, even those you
think may be silly.
b) Take risks and dream big.
c)
Force yourself to
do something old in a new way.
d)
All of the above
3.
Which
of the following can actually hinder your critical thinking goal.
a)
Intuitive judgment
b) Social environment
c)
Rational thinking
d) None of the above
4.
The
Functional Fixedness barrier is as a result of:
a) Unwarranted boundaries
b)
Not thinking creatively
c)
Emotional
weakness
d) None of the above
5.
A
major obstacle to creative thinking is called "homeostasis". It means
a) Fear Of Failure
b)
Striving For Constancy
c)
Fear of criticism
d) Lack of direction
6.
What
is the worst thing for a critical thinker?
a) A logical mind
b) An emotional mind
c)
Reaching to conclusion too soon.
d) None of the above
3.
Collaboration and Teamwork Skills
1.
What
is a Team?
a) A group of people working on different things.
b) A group of people where one member does all the work.
c)
A group of people
where one member makes all the decisions.
d)
A team is a small group of people
working together for a common purpose.
2. With
"teamwork", members create a strong sense of mutual .
a) honesty.
b) hygiene.
c)
commitment.
d)
friendship.
3. |
|
|
skills such as
writing, speaking and body language are important work |
|
|
ethics so that you can be clear in your messages to
others |
|||
|
a) |
Communication |
||
|
b) |
Catching |
||
|
c) |
Performance |
||
|
d) |
Mental |
||
4. |
|
|
|
is
important at work because you must be able to work with others, |
|
especially if you don’t always agree with them |
|||
|
a) |
Honesty |
||
|
b) |
Teamwork |
||
|
c) |
Appearance |
||
|
d) |
Caring |
5. It is important to have a
good to be successful in your career.
a)
attitude
b) clothes
c)
attendance
d) shoes
6.
Act
of working effectively with others to achieve a common goal
a) Teamwork
b)
Collaboration
c)
Skills
d) Personality Types
7.
What
personality trait do people in the health care need?
a) Change your mistakes b) patience
c) Always late d) selfish
8.
Which
of the following is a one of the most important aspects in any organization?
a)
Improving Internal employee
communication
b) Creating Silos
c)
Digital
Transformation
d) None of the above
9.
What
is a virtual team?
a) A team with one leader
b) A team that is created in one place
c)
A team that communicates with technology
d) A team with no structure
4.
Innovation & Design Thinking
1. shows the process of creating something
new.
a)
Innovation
b) Business model
c)
Modeling
d) Creative flexibility
2.
Process
innovation refers to:
a) the development of a new service.
b) the development of a new product.
c)
the implementation of a new or improved
production method.
d) the development of new products or services.
3.
is
a toolkit for an entrepreneur to solve complex problems for people.
a) One-on-one interviewing
b)
Design thinking
c)
Product
brainstorming
d) Social media
4.
Which
of the following are essential to the process of Innovation?
a) Learning, planning, and reasoning
b)
Learning, reflecting, and prototyping
c)
Learning,
resolving, and validating
d) None of the above
No comments:
Post a Comment