--> Sayadasite: Digital Fluency important questions part 1

Multiple Ads

Search

Menu Bar

Digital Fluency important questions part 1

1.     How does Watson BEAT help music composers?

a)        It is AI enables and helps composers with different musical elements

b)       It helps by collecting data on their composed music and audience taste

c)        It is helps composers to compose and store their music on cloud

d)       It helps composers from securing their music against cyber theft

2.     Identify the professionals who can make use of IoT to improve their output. Select all that apply.

a)        Manufacturers  

b)       Healthcare Professionals  

c)        Chefs

d)       Agriculturists

3.     Big data in Healthcare can be used to improve care personalization and efficiency with comprehensive patient profile.

a)        True

b)       False

4.     Cloud computing is used for business management applications, backup and recovery, anti-virus applications but cannot be used for creative work like video making and editing.

a)        True

b)       False

5.     Statement 1: AI can help manufacturing lower, or even reverse the adverse impact on Environment. Statements 2: AI helps manufacturing with quality checks and predicting maintenance costs.

a)        Statement 1 is correct

b)       Statement 2 is correct

c)  Both the statements are correct          

d) Both the statements are incorrect

6.     Which one of these is NOT a Big Data Analytics tool?

a)        Apache Hadoop

b)       Packet Sniffers

c)        CouchDB

d)       Apache Spark

7.     How is AI helping in the healthcare industry? Select all that apply

a)        Helps surgeons with finer view during surgery

b) Helps pathologists in analyzing sample tissues

c)  Helps in for quicker and better tools for medical research                        

d)       Helps nurses in care of critically ill patients

8.     Select the commonly used cybersecurity Frameworks. Select all that apply.

a)        NIST Cybersecurity Framework

b)       ISO 2000

c)        CIS Controls

d)       COBIT

9.     Identify the issues that can lead to ineffective communication. Select all that apply.

a)        Being judgement

b)       Mixing fun with work

c)        Lack of knowledge and awareness

d)       Having negative emotions

e)        Inadequate listening skills

10. What are the correct steps to be taken to simplify the complexity of Cyber security?

a)        Start with Visibility Understand your Vulnerabilities Ensure Data Veracity

b)       Start with understanding Vulnerability Ensure Data Veracity Assess your Visibility

c)        Start with Visibility Ensure Data Veracity Understand your Vulnerabilities

11. Cloud Computing in e-commerce enables the e-commerce to increase which of these features? Select all that apply

a)        Scale

b)       Speed  

c)        Cost

d)       Human Resources

12. Being a good team player will help your build support network.

a)        True

b)       False

13. What is the correct sequence of steps that your should follow to solve a problem?

a)        Generate alternatives Evaluate & Select one alternative Fit it to the problem Implement it alternative Implement solutions

b)       Gather solutions Define Problem Check suitability of solutions Implement solutions.

c)        Define the problem Generate alternatives Evaluate & Select  

14. What are the skills that you must develop for creative thinking and design thinking?

a)        Deeper understanding of business & Processes

b)       Empathy & contextual observation  

c)        Verbal & Written Communication

d)       Data analysis & visualization skills

15. An invention that is neither practically implementable nor creates meaningful impact in a market or society cannot be called innovation.

a)        True

b)       False

16.               Verbal, non-verbal, interpersonal, and written skills are all part of developing effective communication. However, listening skills are not required for this purpose.

a)        True

b)       False   

17.               Select the right process of design thinking.

a)        Ideate Empathize Define Prototype Test

b)       Empathize Ideate Define Prototype Test

c)        Empathize Define Ideate Prototype Test

d)       Define Empathize Prototype Test Ideate

18. Why should you work upon your communication skills? Select all that apply.

a)        It will get you raise in salary

b)       It will reduce conflicts  

c)        It will improve productivity  

d)   It will make you good team player     

19.               Select the statement that correctly defines Design Thinking.

a)        Design thinking is an approach that looks at creating products that can generate maximum revenue

b)       Design thinking is a human centered approach that aims at creating products & services that meets the need of the consumers

c)        Design thinking is an approach that helps in improving the technology by

borrowing from designer’s toolkit

20. What should you do to demonstrate that you are listening? Select all that apply.

a)        Pause for few seconds after the other person has stopped speaking  

b)       Paraphrase to confirm your understanding  

c)        Ask all questions

d)       Complete other person’s sentences

e)        Shake your head if you do not agree while the other person is speaking

21. Which among these is NOT a Machine Learning technique?

a)        Decision Tree Learning

b)       Inductive Logic Programming

c)        Cognitive Learning

d) Reinforcement Learning

22.               Select the order of the Big Data Analytics process

a)        Information, Data, Analysis, Insights

b)       Data, Information, Insight, Analysis  

c)        Data, Information, Insights, Analysis

d)       Data, Analysis, Information, Insights

23. What is a Cloud Computing offering called in which users are provided with access to resources such as servers, storage and networks ?

a)        Infrastructure as Service (Iaas)

b)       Platform as Service (PaaS)

c)        Software as Service (SaaS)

24.               Tools that are used for finding patterns which are far too complex or numerous for a human programmer to extract and teach the machine to recognize are called

a)        Machine Learning

b)       Artificial Neural Networks  

c)        Deep Learning

d)       Reinforcement Learning

25. A system that provides anti-spam and anti-malware protection is called _____

a)        Intrusion Prevention System

b)       Secure E-mail Gateway  

c)        End Point of Protection

d)       Security Incident Management

26.               Security is a concern for IoT but not IIoT

a)        True

b)      False  

27. According to industry experts, which out of the below mentioned is NOT one of the ‘Five V’s of Big Data’.

a)        Volume

b)       Virtue  

c)        Velocity

d)       Variety

e)        Veracity

f)          Value

28. A birthday attach is.

a)        Attacks that use third-party web resources to run scripts in the victim’s web browser or scriptable application

b)       Attacks that are made against hash algorithms that are used to verify the integrity

of a message, software or digital signature      

c)        Attacks that occur through interception of network traffic resulting in obtaining passwords, credit card numbers and other confidential information

d)       Attacks that overwhelm a system’s resources so that it cannot respond to service

requests

29. What are the benefits of IIoT.

a)        Improving Operational Effectiveness  

b)       Improving return on investment

c)        Increasing flexibility and agility  

d)       Increasing top line

30. A cyber threat that spreads from computer to computer without any human action is called ____________.

a)        Virus

b)       Worm

c)        Spam

d)       Trojan Horse

31. Habits that you should cultivate to enhance your verbal communication skills

a)               Practice Mindfulness 

b)              Talk before listen

c)                Spontaneous speaking

d)              Smiling

32.Verbal Communications are descriptive and evaluative. Therefore, we need to make choices that are appropriate when communicating verbally.

a)               True

b)              False

33.What are the goals of verbal communication in the workplace? Select all that apply.

a)               Resolve

b)              Persuade

c)                Inspire

d)              Organize

34.Select the examples of verbal communication for team members. Select all the apply.

a)               Giving credit to others

b)              Conveying messages concisely

c)                Requesting Feedback

d)              Tailoring messages for different audiences

35.Intrapersonal communication cannot be considered as verbal communication as it is communication with self.

a)               True

b)              False

36.IoT applications are designed in such a way that they can replace doctors and psychologists.

a)               True

b)              False

37.Which health initiative was launched by Tanzeem Choudhury of Cornell University to guide mobile health?

a)               Precision Behavioral Health Initiative

b)              AI Behavioral Initiative

c)                Tanzeem Behavioral Initiative

d)              Diagnostic Health Behavioral Initiative

38.Smart Wearables, E-Therapy and Chatbots are few of the ways that IoT is helping us with our Mental Health.

a)               True

b)              False

40.How does IoT help in solving Mental Health problems? (Select all that apply.)

a)               Closing the gaps caused by distance or stigma

b)              Helping people get advice without using a computer or a phone

c)                Improving telehealth options

d)              Enabling doctors to make faster diagnosis

e)              Making mental health patients completely reliant on chatbots

41.The Mental Health telemedicine platforms have seen a significant rise in the demand since the start of the Pandemic.

a)               True

b)              False

42.Which of the following Cloud Computing offering enables users to develop, manage and deliver applications?

a)               Infrastructure as a service (IaaS)

b)              Platform as a service (PaaS)

c)                Software as a service (SaaS)

43.Which of these attacks is a ‘Smurf attack’?

a)               One where the attacker exploits the use of the buffer space during a Transmission Control Protocol session initialization handshake

b)              One where the attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host

c)                One where the attack involves use of IP spoofing and the ICMP to saturate a target network with traffic

d)              One where the Botnets (millions of systems infected with malware) under hacker control carry out DDoS attacks

44.Which of these is NOT a shortcoming of the two traditional security methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules?

a)               False positives

b)              Inability to deal with unique events

c)                Slower incident response

d)              Handle Zero-Day Attacks

45.The primary purpose of ________ is to scale the scope of data and to make predictions of unavailable, future or unseen data based on labeled sample data.

a)               Supervised Learning 

b)              Unsupervised Learning

c)                Semi-supervised Learning

d)              Reinforcement Learning

46.Arrange the four stages of IoT Architecture in right order.

a)               Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud

b)              Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems, Edge IT

c)                Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and Cloud

d)              Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud, Edge IT

47._________ allows networks to adjust their hidden layers of neurons in situations where the expected outcome is not achieved.

a)               Backpropagation 

b)              Feed Forward Neural Network

c)                Recurrent Neural Network

d)              Convolutional Neural Network

48.________ uses the classification process to identify data assets and clustering to group data into distinct parts.

a)               Supervised Learning

b)              Unsupervised Learning

c)                Semi-supervised Learning 

d)              Reinforcement Learning

49.Which of the following neural networks are made up of neurons and have learnable weights and biases?

a)               Feedforward Neural Networks

b)              Recurrent Neural Networks

c)                Convolutional Neural Networks 

d)              Boltzmann Machine Networks

e)              Hopfield Networks

50.Clustering and Dimensionality reduction techniques are used in ________________.

a)               Supervised Machine Learning 

b)              Unsupervised Machine Learning

c)                Semi-supervised Machine Learning

Reinforcement Machine Learning

No comments: