1.
How does Watson BEAT help music composers?
a)
It is AI enables and helps
composers with different musical elements
b)
It helps by collecting data on their composed
music and audience taste
c)
It is helps composers to compose and store
their music on cloud
d)
It helps composers from securing their music
against cyber theft
2.
Identify the professionals who can make use of
IoT to improve their output. Select all that apply.
a)
Manufacturers
b) Healthcare Professionals
c)
Chefs
d) Agriculturists
3.
Big data in Healthcare can be used to improve
care personalization and efficiency with comprehensive patient profile.
a)
True
b)
False
4.
Cloud computing is used for business management
applications, backup and recovery, anti-virus applications but cannot be used
for creative work like video making and editing.
a)
True
b) False
5.
Statement 1: AI can help manufacturing lower,
or even reverse the adverse impact on Environment. Statements 2: AI helps
manufacturing with quality checks and predicting maintenance costs.
a)
Statement 1 is correct
b)
Statement 2 is correct
c) Both the
statements are correct
d) Both the statements are incorrect
6.
Which one of these is NOT a Big Data Analytics
tool?
a)
Apache Hadoop
b) Packet Sniffers
c)
CouchDB
d)
Apache Spark
7.
How is AI helping in the healthcare industry?
Select all that apply
a)
Helps surgeons with finer view during surgery
b) Helps pathologists in analyzing sample tissues
c) Helps in
for quicker and better tools for medical research
d)
Helps nurses in care of critically ill patients
8.
Select the commonly used cybersecurity
Frameworks. Select all that apply.
a) NIST Cybersecurity Framework
b)
ISO 2000
c) CIS Controls
d)
COBIT
9.
Identify the issues that can lead to
ineffective communication. Select all that apply.
a) Being judgement
b)
Mixing fun with work
c) Lack of knowledge and awareness
d) Having negative emotions
e) Inadequate listening skills
10. What are the correct steps to be taken to simplify the complexity of Cyber security?
a)
Start with Visibility → Understand
your Vulnerabilities → Ensure Data Veracity
b)
Start with understanding Vulnerability → Ensure Data Veracity → Assess your Visibility
c)
Start with Visibility → Ensure Data Veracity → Understand your Vulnerabilities
11. Cloud Computing in e-commerce enables the
e-commerce to increase which of these features? Select all that apply
a)
Scale
b)
Speed
c)
Cost
d)
Human Resources
12. Being a good team player will help your build support network.
a)
True
b)
False
13. What is the correct sequence of steps that your should follow
to solve a problem?
a)
Generate alternatives →Evaluate & Select one alternative → Fit it to the problem → Implement it alternative → Implement solutions
b)
Gather solutions → Define Problem → Check
suitability of solutions →
Implement solutions.
c)
Define the problem → Generate
alternatives → Evaluate & Select
14. What are the skills that you must develop for creative thinking
and design thinking?
a)
Deeper understanding of business &
Processes
b)
Empathy & contextual
observation
c)
Verbal & Written Communication
d)
Data analysis & visualization skills
15. An invention that is neither practically implementable nor
creates meaningful impact in a market or society cannot be called innovation.
a)
True
b)
False
16.
Verbal, non-verbal, interpersonal, and written
skills are all part of developing effective communication. However, listening
skills are not required for this purpose.
a)
True
b)
False
17.
Select the right process of design thinking.
a)
Ideate → Empathize → Define → Prototype → Test
b)
Empathize → Ideate → Define → Prototype → Test
c)
Empathize → Define → Ideate → Prototype → Test
d)
Define → Empathize →
Prototype → Test → Ideate
18. Why should you work upon your communication skills? Select all
that apply.
a)
It will get you raise in salary
b) It will reduce conflicts
c)
It will improve productivity
d) It will
make you good team player
19.
Select the statement that correctly defines
Design Thinking.
a)
Design thinking is an approach that looks at
creating products that can generate maximum revenue
b)
Design thinking is a human
centered approach that aims at creating products &
services that meets the need of the consumers
c)
Design thinking is an approach that helps in
improving the technology by
borrowing from designer’s toolkit
20. What should you do to demonstrate that you are listening?
Select all that apply.
a)
Pause for few seconds after the
other person has stopped speaking
b) Paraphrase to confirm your understanding
c)
Ask all questions
d)
Complete other person’s sentences
e)
Shake your head if you do not agree while the
other person is speaking
21. Which among these is NOT a Machine Learning technique?
a)
Decision Tree Learning
b)
Inductive Logic Programming
c)
Cognitive Learning
d) Reinforcement Learning
22.
Select the order of the Big Data Analytics
process
a)
Information, Data, Analysis, Insights
b) Data, Information, Insight, Analysis
c)
Data, Information, Insights, Analysis
d)
Data, Analysis, Information, Insights
23. What is a Cloud Computing offering called in which users are
provided with access to resources such as servers, storage and networks ?
a)
Infrastructure as Service (Iaas)
b)
Platform as Service (PaaS)
c)
Software as Service (SaaS)
24.
Tools that are used for finding patterns which
are far too complex or numerous for a human programmer to extract and teach the
machine to recognize are called
a)
Machine Learning
b) Artificial Neural Networks
c)
Deep Learning
d)
Reinforcement Learning
25. A system that provides anti-spam and anti-malware protection is
called _____
a)
Intrusion Prevention System
b) Secure E-mail Gateway
c)
End Point of Protection
d)
Security Incident Management
26.
Security is a concern for IoT but not IIoT
a)
True
27. According to industry
experts, which out of the below mentioned is NOT one of the ‘Five V’s of Big
Data’.
a)
Volume
b) Virtue
c)
Velocity
d)
Variety
e)
Veracity
f)
Value
28. A birthday attach is.
a)
Attacks that use third-party web
resources to run scripts in the victim’s web browser or scriptable application
b) Attacks that are made against hash algorithms that
are used to verify the integrity
of a message, software or digital signature
c)
Attacks that occur through
interception of network traffic resulting in obtaining passwords, credit card
numbers and other confidential information
d)
Attacks that overwhelm a system’s
resources so that it cannot respond to service
requests
29. What are the benefits of IIoT.
a)
Improving Operational
Effectiveness
b)
Improving return on investment
c)
Increasing flexibility and
agility
d)
Increasing top line
30. A cyber threat that spreads from computer to computer without
any human action is called ____________.
a)
Virus
b) Worm
c)
Spam
d)
Trojan Horse
31. Habits that you should cultivate to
enhance your verbal communication skills
a)
Practice
Mindfulness
b)
Talk before
listen
c)
Spontaneous
speaking
d)
Smiling
32.Verbal Communications are descriptive
and evaluative. Therefore, we need to make choices that are appropriate when
communicating verbally.
a)
True
b)
False
33.What are the goals of verbal
communication in the workplace? Select all that apply.
a)
Resolve
b)
Persuade
c)
Inspire
d)
Organize
34.Select the examples of verbal
communication for team members. Select all the apply.
a)
Giving credit to
others
b)
Conveying
messages concisely
c)
Requesting
Feedback
d)
Tailoring
messages for different audiences
35.Intrapersonal communication cannot be
considered as verbal communication as it is communication with self.
a)
True
b)
False
36.IoT applications are designed in such
a way that they can replace doctors and psychologists.
a)
True
b)
False
37.Which health initiative was launched
by Tanzeem Choudhury of Cornell University to guide mobile health?
a)
Precision
Behavioral Health Initiative
b)
AI Behavioral
Initiative
c)
Tanzeem
Behavioral Initiative
d)
Diagnostic Health
Behavioral Initiative
38.Smart Wearables, E-Therapy and
Chatbots are few of the ways that IoT is helping us with our Mental Health.
a)
True
b)
False
40.How does IoT help in solving Mental
Health problems? (Select all that apply.)
a)
Closing
the gaps caused by distance or stigma
b)
Helping
people get advice without using a computer or a phone
c)
Improving
telehealth options
d)
Enabling
doctors to make faster diagnosis
e)
Making mental
health patients completely reliant on chatbots
41.The Mental Health telemedicine
platforms have seen a significant rise in the demand since the start of the
Pandemic.
a)
True
b)
False
42.Which of the following Cloud
Computing offering enables users to develop, manage and deliver applications?
a)
Infrastructure as
a service (IaaS)
b)
Platform
as a service (PaaS)
c)
Software as a
service (SaaS)
43.Which of these attacks is a ‘Smurf
attack’?
a)
One where the
attacker exploits the use of the buffer space during a Transmission Control
Protocol session initialization handshake
b)
One where the
attack causes the length and fragmentation offset fields in sequential Internet
Protocol (IP) packets to overlap one another on the attacked host
c)
One
where the attack involves use of IP spoofing and the ICMP to saturate a target
network with traffic
d)
One where the
Botnets (millions of systems infected with malware) under hacker control carry
out DDoS attacks
44.Which of these is NOT a shortcoming
of the two traditional security methods, Risk Assessment and Identifying
Vulnerabilities, and Correlation Rules?
a)
False
positives
b)
Inability to deal
with unique events
c)
Slower incident
response
d)
Handle Zero-Day
Attacks
45.The primary purpose of ________ is to
scale the scope of data and to make predictions of unavailable, future or
unseen data based on labeled sample data.
a)
Supervised
Learning
b)
Unsupervised
Learning
c)
Semi-supervised
Learning
d)
Reinforcement
Learning
46.Arrange the four stages of IoT
Architecture in right order.
a)
Sensors
and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data
Center and Cloud
b)
Sensors and
Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition
Systems, Edge IT
c)
Sensors and
Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center
and Cloud
d)
Sensors and
Actuators, Internet Getaways and Data Acquisition Systems, Data Center and
Cloud, Edge IT
47._________ allows networks to adjust
their hidden layers of neurons in situations where the expected outcome is not
achieved.
a)
Backpropagation
b)
Feed Forward
Neural Network
c)
Recurrent Neural
Network
d)
Convolutional
Neural Network
48.________ uses the classification
process to identify data assets and clustering to group data into distinct
parts.
a)
Supervised
Learning
b)
Unsupervised
Learning
c)
Semi-supervised
Learning
d)
Reinforcement
Learning
49.Which of the following neural
networks are made up of neurons and have learnable weights and biases?
a)
Feedforward
Neural Networks
b)
Recurrent Neural
Networks
c)
Convolutional
Neural Networks
d)
Boltzmann Machine
Networks
e)
Hopfield Networks
50.Clustering and Dimensionality
reduction techniques are used in ________________.
a)
Supervised
Machine Learning
b)
Unsupervised
Machine Learning
c)
Semi-supervised
Machine Learning
Reinforcement Machine Learning
No comments:
Post a Comment