Eti CH-1&3 MCQ
Eti CH-1&3 MCQ
Eti CH-1&3 MCQ
1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
D. Stanford University
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
Ans: A
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
1
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving? A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
Ans: B
2
A. History
B. cognitive science
C. psychology
D. sociology
Ans: B
8. A.M. turing developed a technique for determining whether a computer could or could not
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
Ans: A
A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans: C
3
D. Putting more memory into Computer
Ans: C
A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B
B. Game Playing
C. Robotics
Ans: D
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
A. BASIC
B. FORTRAN
C. IPL
D. LISP
4
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
A. Boolean logic
B. Human logic
C. Fuzzy logic
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions
to
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems
in
other areas.
5
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
6
B. ELIZA
D. None of above
Ans: C
A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C
A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B
A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
26. The concept derived from ________ level are propositional logic, tautology, predicate
A. Cognition level
7
B. Logic level
C. Functional level
D. All of above
Ans: B
27. PROLOG is an AI programming language which solves problems with a form of symbolic
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
30. ______ is used for AI because it supports the implementation of software that computes
8
with symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the
B. ELIZA
C. PROLOG
D. NLP
Ans: D
A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
9
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous
system
(CNS) in brain as control and computing devices is known as _____ of human being
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
10
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program
Ans: C
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
11
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
A. True
B. False
Ans: B
B. A set of computer programs that produce output that would be considered to reflect
C. The study of mental faculties through the use of mental models implemented on a computer
Ans: C
B. A set of computer programs that produce output that would be considered to reflect
C. The study of mental faculties through the use of mental models implemented on a computer
Ans: A
12
A. The embodiment of human intellectual capabilities within a computer.
Ans: A
B. A set of computer programs that produce output that would be considered to reflect
C. The study of mental faculties through the use of mental models implemented on a computer
Ans: D
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
B. General AI
C. Super AI
D. None of above
13
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
Ans: A
A. Narrow AI
B. General AI
C. Super AI
D. None of above
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
14
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
15
C. Theory of mind
D. None of above
Ans: A
A. Reactive machine
B. Limited memory
Ans: A
C. Theory of mind
D. None of above
Ans: A
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B
A. Reactive machine
B. Limited memory
C. Theory of mind
16
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
62. Which AI should understand the human emotions, people, and beliefs and be able to
interact
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D
A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C
Ans: A
Ans: C
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
17
C. Perl
D. Java script
Ans: C
67______________is a branch of science that deals with programing the systems in such a way
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
18
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
A. Machine learning
C. Deep learning
D. Robotics
Ans: B
A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D
Ans:D
19
2. IDIP stands for
Ans: A
G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based
on
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document
20
opens
C. Derivative works
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
A.1979
B.1984
C.1995
D.1989 Ans:
A.1960's
B.1970's
C.1980's
D.1990's Ans:
21
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
Ans: B
A. Accessing the system's directories viewing mode and navigating through the various systems
Ans: D
Ans: B
A. Preserving Evidence
22
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
F. Preservation phase
G. Survey phase
23
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
Ans:B
Ans: C
18. A set of instruction compiled into a program that perform a particular task is known as: A.
Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
B. A copy is made onto forensically sterile media. New media should always be used if
available.
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
24
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B
phase?
C. Review phase.
D. Deployment phase.
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of
improvement?
C. Review phase.
D. Deployment phase
Ans: C
A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made A.
Forensic
25
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B
Ans: B
A. Crime
B. Security
C: Digital Forensic
26
D: Evidence
Ans: D
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
D. All of above
E. None of above
Ans: D
D. All of above
E. None of above
Ans: D
27
D. To honor confidentially.
Ans: B
33. Which of following is a not unethical norm for Digital Forensics Investigation? A.
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
28
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
A. SIM
B. RAM C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics? A.
Acquisition.
B. Steganography. C.
Live analysis
D. Hashing.
And: B
A. e-mail harassment B.
Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D
A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and
analysis
29
B. Data carving
Ans: A
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
D. Deleting files.
Ans: C
30