Uploaded by hodore8228

Digital 101 MCQ (1)

advertisement
Digital 101 MCQ
Attempt 1
All questions are mandatory:
1. AI is helping in the healthcare industry as follows: Helps pathologists in analysing
sample tissues AND Helps in for quicker and better tools for medical research
2. Define the problem-->Generate alternatives-->Evaluate & select is the correct
sequence of steps that you should follow to solve a problem.
3.Security is a concern for IoT but not for IIoT. False
4.Why should you work upon your communication skills: It will reduce conflicts AND It
will make you good team player AND It will improve productivity
5. The commonly used Cybersecurity Frameworks: CIS Controls AND NIST
Cybersecurity Framework
6.An invention that is neither practically implementable nor creates meaningful impact in a
market or society cannot be called innovation. True
7. Cognitive Learning is NOT a Machine Learning technique.
8. Statement 1: AI can help manufacturing lower, or even reverse the adverse impact on
Environment. Statement 2: AI helps manufacturing with quality checks and predicting
maintenance costs.
Both the statements are correct
9.Select the statement that correctly defines Design Thinking: Design thinking is a human
cantered approach that aims at creating products & services that meets the need of
the consumers.
10.A Birthday attack is: Attacks that are made against hash algorithms that are used to
verify the integrity of a message, software or digital signature
11.Verbal, non-verbal, interpersonal, and written skills are all part of developing effective
communication. However, listening skills are not required for this purpose. False
12. How does Watson BEAT help music composers? It is AI enabled and helps composers
with different musical elements
13.Being a good team player will help you build your support network. True
14. According to industry experts, virtue is NOT one of the 'Five V's of Big Data'.
1
15.What should you do to demonstrate that you are listening: Pause for few seconds after
the other person has stopped speaking AND Paraphrase to confirm your understanding
AND Ask questions
16.Identify the issues that can lead to ineffective communication: Lack of knowledge and
awareness AND Having negative emotions AND Being judgmental.
17. Infrastructure as a service (IaaS) is a cloud-computing offering called in which users
are provided with access to resources such as servers, storage and networks.
18.A cyber threat that spreads from computer to computer without any human action is called
Worm.
19.Cloud Computing is used for business management applications, backup and recovery,
anti-virus applications but cannot be used for creative work like video making and editing.
False
20. Empathy & contextual observation are the skills that you must develop for creative
thinking and design thinking.
21. Increasing flexibility and agility AND improving operational effectiveness are the
benefits of IIoT.
22.Identify the professionals who can make use of IoT to improve their output. Select all that
apply. Manufacturers, Agriculturists, Healthcare Professionals
23.Select the right process of design thinking. Empathize-->Define-->Ideate-->Prototype->Test
24. Packet Sniffers is NOT a Big Data Analytics tool.
25. Start with Visibility-->Understand your Vulnerabilities-->Ensure Data Veracity are
the correct steps to be taken to simplify the complexity of Cybersecurity.
26.Big data in Healthcare can be used to improve care personalization and efficiency with a
comprehensive patient profile. True
27.A system that provides anti-spam and anti-malware protection is called Secure E-Mail
Gateway.
28. The order of the Big Data Analytics process: Data, Analysis, Information, Insights.
29.Tools that are used for finding patterns which are far too complex or numerous for a
human programmer to extract and teach the machine to recognize are called Artificial
Neural Networks.
2
30.Cloud Computing in e-commerce enables e-commerce to increase Speed and Scale
features.
Attempt 2
All questions are mandatory:
1. The four stages of IoT Architecture in right order are: Sensors and Actuators, Internet
Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud
2. Handle Zero-Day Attacks is NOT a shortcoming of the two traditional security
methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules.
3. "Prioritizing listening over speaking is an important aspect while communicating." True
4. Semi-supervised Learning uses the classification process to identify data assets and
clustering to group data into distinct parts.
5. “One where the attack involves use of IP spoofing and the ICMP to
target network with traffic” attacks is a ‘Smurf attack’.
saturate a
6.The primary purpose of Supervised Learning is to scale the scope of data and to make
predictions of unavailable, future or unseen data based on labelled sample data.
7. Palo Alto is the Smart city that is utilizing the IoT technology to help its residents.
8. Convolutional Neural Networks are made up of neurons and have learnable weights and
biases.
9. Cloud Computing emerging technology provides scalable architecture for business needs.
10.Divergent Thinking focuses more on: Generation of multiple ideas and the connections
between them
11.Which of the following are the benefits of Big Data in Healthcare?
Create a holistic, 360-degree view of consumers, patients, and physicians
Boost marketing efforts with information about consumer, patient, and physician
needs and preferences
12. Routine is a major cause of passive thinking.
13. Visual Perception and Speech Recognition is the examples of strong AI.
14. "Scepticism is one of the major barriers to the process of Critical Thinking." False
3
15.Which of the following steps should be taken to make Cybersecurity effective in any
establishment? Find vulnerabilities across open-source code, third-party APIs and cloudbased solutions AND Ensure data veracity
16. "The process of Design Thinking does not stop even after the deliverable is complete."
True
17. AWS is NOT a Big Data Analytics service or tool.
18. "Mandating Collaboration in a team is a good idea to enhance teamwork." False
19.What is a Cybersecurity framework?
A comprehensive set of guidelines that help organizations define cybersecurity policies
to assess their security posture and increase resilience in the face of cyberattacks.
20.Which of the following methods will enable you to become an engaged listener?
Favouring your right ear while listening and Focusing fully on the speaker
21. "Iteration is a fundamental part of Design Thinking." True
22. Auto Driving Internet of Things (IoT) enabled feature has not been incorporated by Kia
Motors in its new car.
23.Artificial Intelligence (AI) that exhibits and performs some aspect(s) of human
intelligence extremely well, however, lacks in other areas is called Narrow AI.
24. “Cloud services are disaster tolerant but expensive.” False
25. Artificial Intelligence can create a digital twin, which is a virtual representation of a
factory, product, or service.
26. Backpropagation allows networks to adjust their hidden layers of neurons in situations
where the expected outcome is not achieved.
27.State True or False: "Forming assumptions is a good step in the process of Creative
Problem Solving." False
28.Clustering and Dimensionality reduction techniques are used in Unsupervised Machine
Learning.
29.State True or False: "It is more important to frame your message rather than setting the
context while communicating." False
30. Platform as a service (PaaS) Cloud Computing offering enables users to develop,
manage and deliver applications.
4
Download