0% found this document useful (0 votes)
16 views8 pages

ETI Question Bank Test

The document is a question bank for a class test on Artificial Intelligence and related topics, featuring multiple-choice questions covering historical events, definitions, programming languages, and ethical considerations in AI. It includes questions about key figures in AI, applications of AI, and technical concepts related to embedded systems and IoT. The test aims to assess knowledge on foundational AI concepts and their implications.

Uploaded by

sanskrutinile06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views8 pages

ETI Question Bank Test

The document is a question bank for a class test on Artificial Intelligence and related topics, featuring multiple-choice questions covering historical events, definitions, programming languages, and ethical considerations in AI. It includes questions about key figures in AI, applications of AI, and technical concepts related to embedded systems and IoT. The test aims to assess knowledge on foundational AI concepts and their implications.

Uploaded by

sanskrutinile06
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

ETI QUESTION BANK CLASS TEST- 1

1.Which of these schools was not among the early leaders in AI research?

A. Dartmouth University

B. Harvard University

C. Massachusetts Institute of Technology

D. Stanford University E. None of the above

2.DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:

A. Defense

B. Energy

C. Education

D. Justice

E. None of the above

3. The conference that launched the AI revolution in 1956 was held at:

A. Dartmouth

B. Harvard

C. New York

D. Stanford

E. None of the above

4. What is the term used for describing the judgmental or commonsense part of problem
solving?

A. Heuristic

B. Critical

C. Value based

D. Analytical

E. None of the above

5.What of the following is considered to be a pivotal event in the history of AI.

A. 1949, Donald O, The organization of Behavior.


B. 1950, Computing Machinery and Intelligence.

C. 1956, Dartmouth University Conference Organized by John McCarthy.

D. 1961, Computer and Computer Sense.

E. None of the above

6.What is Artificial intelligence?

A. Putting your intelligence into Computer

B. Programming with your own intelligence

C. Making a Machine intelligent

D. Putting more memory into Computer

7. The first AI programming language was called:

A. BASIC

B. FORTRAN

C. IPL

D. LISP

E. None of the above

8. Artificial Intelligence has its expansion in the following application.

A. Planning and Scheduling

B. Game Playing

C. Robotics

D. All of the above

9. The first AI programming language was called:

A. BASIC

B. FORTRAN

C. IPL

D. LISP

10. Who is a father of AI?


A. Alain Colmerauer

B. John McCarthy

C. Nicklaus Wirth

D. Seymour Papert

11. What is the term used for describing the judgmental or commonsense part of problem
solving?

A. Heuristic B. Critical C. Value based D. Analytical

12. Cognitive science related with _____

A. Act like human B. ELIZA

C. Think like human D. None of above

13. Communication between man and machine is related with ______

A. LISP B. ELIZA

C. All of above D. None of above

14. ELIZA created by _____

A. John McCarthy B. Steve Russell

C. Alain Colmerauer D. Joseph Weizenbaum

15. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.

A. Cognition level B. Gross level

C. Functional level D. All of above

16. Which of the following is an example for wireless communication interface?


A. RS-232C B. Wi-Fi
C. Bluetooth D. Both (B) and (C)

17. K-means, self-organizing maps, hierarchical clustering are the example of _____.

A. Supervised learning B. Unsupervised learning

C. Machine learning D. Deep learning

18. The characteristics of the computer system capable of thinking, reasoning and learning
are known is

A. machine intelligence B. human intelligence


C. artificial intelligence D. virtual intelligence

19. Machine learning invent by _____.

A. John McCarthy B. Nicklaus Wirth

C. Joseph Weizenbaum D. Arthur Samue

20. HTTP expands?


A. Hyper Text Transfer Protocol B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol D. Hyper Terminal Text Protocol

21. Embedded systems are_____

A. General purpose B. Special purpose

22. The first AI programming language was called:

A. BASIC B. FORTRAN

C. IPL D. LISP

23. The first mass produced embedded system is

A. Minuteman-I B. Minuteman-II

C. Autonetics D-17 D. Apollo Guidance Computer (AGC)

24. Which of the following is an (are) an intended purpose(s) of embedded systems?

A. Data collection B. Data processing

C. Data communication D. All of these E. None of these

25. Which of the following is not an example of a “small-scale embedded system”?


A. Electronic Barbie doll B. Simple calculator
C. Cell phone D. Electronic toy car
26. Which one is not element of IOT?
A. Proces B. Security

C. People D. Things

27. Which of this is not a computer crime?


A. e-mail harassment B. Falsification of data.
C. Sabotage. D. Identification of data
28. The first widely used commercial form of Artificial Intelligence (Al) is being used in
manypopular products like microwave ovens, automobiles and plug in circuit boards for
desktop PCs. What is name of AI?

A. Boolean logic B. Human logic


C. Fuzzy logic D. Functional logic

29. Does Raspberry Pi need external hardware?


A. True
B. False
30. Which of following are Unethical norms for Investigator?

A.Uphold any relevant evidence.


B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above
E. None of above
.31. TCP and UDP are called?
A. Application protocols B. Session protocols
C. Transport protocols D. Network protocols
.32. WSN stands for
A. Wide Sensor Network B. Wireless Sensor Network
C. Wired Sensor Network D. None of these
.33. Does Raspberry Pi need external hardware?
A. True
B. False
.34. Properties of IoT devices.
A. Sense
B. Send and receive data
C. Both A and B
D. None of above
.35. Which file is used to store the user entered password?
A. .exe
B. .txt
C. .iso
D. .sam

.36. Which of following is not general ethical norm for Investigator?

A. To contribute to society and human being.


B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.

.37. The ability to recover and read deleted or damaged files from a criminal’s computer is
an example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
38.ASIC chip is
A. Simple in design. B. Manufacturing time is less.

C. It is faster. D. Both A&C.

39. ASIC stands for

A. Application-System Integrated Circuits B. Application-Specific Integrated Circuits

C. Application-System Internal Circuits D. Application-Specific Internal Circuits

40. In microcontrollers, I2C stands for

A. Inter-Integrated Clock B. Initial-Integrated Clock

C. Intel-Integrated Circuit D. Inter-Integrated Circuit

41. ______________ is the smallest microcontrollers which can be programmed to perform a


large range of tasks.

A. PIC microcontrollers

B. ARM microcontrollers

C. AVR microcontrollers

D. ASIC microcontrollers

42. . When Federal Bureau Investigation program was created?

A.1979

B.1984

C.1995

D.1989

43. When the field of PC forensics began?

A.1960's

B.1970's

C.1980's

D.1990's

44. __________is the process of recording as much data as possible to create reports and
analysis on user input.

A. Data mining

B. Data carving
C. Meta data

D. Data Spoofing.

45. ________searches through raw data on a hard drive without using a file system.

A. Data mining

B. Data carving

C. Meta data

D. Data Spoofing.

46. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?

A. Formatting disk

B. Storing data

C. Finding configuration files.

D. Deleting files.

47. The sensed data communicated ___________________.

A. Cloud-based servers/storage. B. I/O interfaces.

C. Internet connectivity. D. None of the above

48. IOT devices are various types, for instance______________.

A. Wearable sensors. B. Smart watches.

C. LED lights. D. All of the above

49. ______________ is a collection of wired Ethernet standard for the link layer.

A. IEEE 802.3 B. IEEE 802.11

C. IEEE 802.16 D. IEEE 802.15.4

50.______ is a collection of WLAN communication standards.

A. IEEE 802.3 B. IEEE 802.11

C. IEEE 802.16 D. IEEE 802.15.4

51. The worldwide researchers are now focusing on developing machines with ___ AI.

A. Narrow AI B. General AI

C. Super AI D. None of above


52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.

A. Narrow AI B. General AI

C. Super AI D. None of above.

53.Machine can perform any task better than human with cognitive properties is known as
___ AI

. A. Narrow AI B. General AI

C. Super AI D. None of above

54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known
as ___ AI.

A. Narrow AI

B. General AI

C. Super AI

D. None of above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy