Emerging Trends in computer science
Emerging Trends in computer science
Unit Test: I
Courses: IF/CM6I
Name of Subject: Emerging Trends in Computer and Information Technology
Subject Code: 22618
Semester: VI
Unit 1: Artificial Intelligence
5. The characteristics of the computer system capable of thinking, reasoning and learning is
known as
a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence
6. What is the term used for describing the judgmental or common sense part of problem solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical
7. is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
a) Artificial Intelligence
b) Internet of Things
c) Embedded System
d) Cyber Security
8. In the goal is for the software to use what it has learned in one area to solve problems in
other areas.
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these
9. Computer programs that mimic the way the human brain processes information is called as
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these
10. A is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical
16. The concept derived from level are propositional logic, tautology, predicate
calculus, model, temporal logic.
a) Cognition level
b) Logic level
c) Functional level
d) All of above
17. that deals with the interaction between computers and humans using the natural
language
a) LISP
b) ELIZA
c) PROLOG
d) NLP
19. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on .
a) Logic
b) Computation logic
c) Cognition logic
d) All of above
20. model were developed and incorporated in machines which mimicked the
functionalities of human origin.
a) Functional model
b) Neural model
c) Computational model
d) None of above
21. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
a) Regular Grammar
b) Regular Expression
c) Regular Word
d) None of these
25. Weak AI is
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above
e) None of the above
26. Strong AI is
a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a computer
d) All of the above
e) None of the above
30. AI is a type of intelligence which could perform any intellectual task with efficiency like
human.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
31. The idea behind AI to make such a system which could be smarter and think like a
human by its own.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
32. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of .
a) Narrow AI
b) General AI
c) Super AI
d) None of above
Unit 2: Machine to Machine Communication
2. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
a) Bot to Bot(B2B)
b) Machine to Machine(M2M)
c) InterCloud
d) Skynet
11. refers to establish a proper connection between all the things of IOT.
a) Connectivity
b) Analyzing
c) Sensing
d) Active Engagement
12. IOT devices which have unique identities and can perform
a) Remote sensing
b) Actuating
c) Monitoring capabilities
d) All of the above
17. layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
18 layer is responsible for sending of IP datagrams from the source network to the
destination network.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
20. layer is responsible for error free, end to end delivery of data from source host to
destination host.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
21. The protocols that focus on process to process connections using ports
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
27. LR-WPANs standards from basis of specifications for high level communication protocol
such as .
a) Zigbee
b) Allsean
c) Tyrell
d) Microsoft's Azure
30 include LTE.
a) 2G
b) 3G
c) 4G
d) None of above
31. 802.3 is the standard for 10BASE5 Ethernet that uses cable as shared medium.
a) Twisted pair cable
b) Coaxial cable
c) Fiber optic cable
d) None of the above
33. is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
a) TCP
b) UDP
c) Transport layer
d) None of the above.