0% found this document useful (0 votes)
23 views69 pages

Multiple Choice Questions and Answers

The document contains multiple-choice questions related to Artificial Intelligence and Data Visualization, covering topics such as definitions, applications, types of AI, machine learning, and data representation techniques. It includes questions on key figures in AI, characteristics of AI systems, and the use of color scales in data visualization. The questions are designed for a unit test in the subject of Emerging Trends in Computer and Information Technology.

Uploaded by

prernasalunke04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views69 pages

Multiple Choice Questions and Answers

The document contains multiple-choice questions related to Artificial Intelligence and Data Visualization, covering topics such as definitions, applications, types of AI, machine learning, and data representation techniques. It includes questions on key figures in AI, characteristics of AI systems, and the use of color scales in data visualization. The questions are designed for a unit test in the subject of Emerging Trends in Computer and Information Technology.

Uploaded by

prernasalunke04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

Multiple Choice Questions and Answers

Unit Test: I
Courses: IF/CM6I
Name of Subject: Emerging Trends in Computer and Information Technology
Subject Code: 22618
Semester: VI
Unit 1: Artificial Intelligence

Artificial Intelligence MCQ


1. What is Artificial intelligence?
a) Putting your intelligence into Computer
b) Programming with your own intelligence
c) Making a Machine intelligent
d). Putting more memory into Computer

2. Who is a father of AI?


a) Alain Colmerauer
b) John McCarthy
c) Nicklaus Wirth
d) Seymour Papert

3. The first AI programming language was called:


a) BASIC
b) FORTRAN

PRACTICALKIDA.COM
c) IPL
d) LISP

4. Artificial Intelligence has its expansion in the following application.


a) Planning and Scheduling
b) Game Playing
c) Robotics
d) All of the above

5. The characteristics of the computer system capable of thinking, reasoning and learning is
known as ___________
a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence

6. What is the term used for describing the judgmental or common sense part of problem solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical

7. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
a) Artificial Intelligence
b) Internet of Things
c) Embedded System
d) Cyber Security
8. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

9. Computer programs that mimic the way the human brain processes information is called as
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

10. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical

11. ______ do not guarantee optimal/any solutions


a) Heuristic
b) Critical
c) Value based
d) Analytical

PRACTICALKIDA.COM
12. Cognitive science related with _____
a) Act like human
b) ELIZA
c) Think like human
d) None of above

13. _____ Model should reflect how results were obtained.


a) Design model
b) Logic model
c) Computational model
d) None of above

14. Communication between man and machine is related with ______


a) LISP
b) ELIZA
c) All of above
d) None of above

15. ELIZA created by _____


a) John McCarthy
b) Steve Russell
c) Alain Colmerauer
d) Joseph Weizenbaum

16. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
a) Cognition level
b) Logic level
c) Functional level
d) All of above

17. ______ that deals with the interaction between computers and humans using the natural
language
a) LISP
b) ELIZA
c) PROLOG
d) NLP

18. The core components are constituents of AI are derived from _____
a) Concept of logic
b) Cognition
c) Computation
d) All of above

19. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
a) Logic
b) Computation logic
c) Cognition logic
d) All of above

20. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
a) Functional model
PRACTICALKIDA.COM
b) Neural model
c) Computational model
d) None of above

21. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
a) Regular Grammar
b) Regular Expression
c) Regular Word
d) None of these

22. Human to Machine is _____ and Machine to Machine is ______.


a) Process, Process
b) Process, Program
c) Program, Hardware
d) Program, Program

23. Weak AI is also known as ____


a) Narrow AI
b) General AI
c) Neural AI
d) None of above

24. _____ AI is able to perform dedicated task.


a) Narrow AI
b) General AI
c) Neural AI
d) None of above

25. Weak AI is____________


a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above
e) None of the above

26. Strong AI is__________


a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a computer
d) All of the above
e) None of the above

27. Artificial intelligence is___________


a) The embodiment of human intellectual capabilities within a computer.
b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a computer
d) All of the above
e) None of the above
PRACTICALKIDA.COM
28. Apple siri is a good example of ______ AI.
a) Narrow AI
b) General AI
c) Neural AI
d) None of above

29. IBM Watson supercomputer comes under ____ AI.


a) Narrow AI
b) General AI
c) Neural AI
d) None of above

30. ____ AI is a type of intelligence which could perform any intellectual task with efficiency like
human.
a) Narrow AI
b) General AI
c) Super AI
d) None of above

31. The idea behind _________AI to make such a system which could be smarter and think like a
human by its own.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
32. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
a) Narrow AI
b) General AI
c) Super AI
d) None of above

33. __________AI is a type of intelligence which could perform any intellectual task with
efficiency like a human.
a) Narrow AI
b) General AI
c) Super AI
d) None of above

34. Machine can perform any task better than human with cognitive properties is known as
__________AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above

35. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
PRACTICALKIDA.COM
36. ____ AI is hypothetical concept of AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above

37. Which AI system not store memories or past experiences for future actions.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

38. Which machines only focus on current scenarios and react on it as per as possible best action.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

39. IBM’s deep blue system is example of ___.


a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

40.________machine can stores past experiences or some data for short period time .
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

41. Self-driving car is example of ____.


a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

42. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

43. Which machines will be smarter than human mind?


a) Reactive machine
b) Limited memory
c) Theory of mind
d) Self-Awareness

44. _________machines will have their own consciousness and sentiments


a) Reactive machine
b) Theory of mind
PRACTICALKIDA.COM
c) Self-Awareness
d) Both B and C

45. What is Machine learning?


a) The autonomous acquisition of knowledge through the use of computer programs
b) The autonomous acquisition of knowledge through the use of manual programs
c) The selective acquisition of knowledge through the use of computer programs
d) The selective acquisition of knowledge through the use of manual programs

46. Machine learning invent by _____.


a) John McCarthy
b) Nicklaus Wirth
c) Joseph Weizenbaum
d) Arthur Samuel

47______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

48. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning

49. K-means, self-organizing maps, hierarchical clustering are the example of _____.
a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning

50. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
a) Machine learning
b) Artificial neural networks
c) Deep learning
d) Robotics

Data Visualization and Data Storytelling MCQ


1. ………………is the graphical representation of information and data
a) Data Analysis
b) Data Visualization
c) Data Storytelling
d) Data engineering

2. What is the foremost objective of data visualization?


a)
b)
PRACTICALKIDA.COM
To convey complex data
To convey incomplete data
c) To convey data correctly
d) To make data more complex

3. Effective data visualization can help to:-


a) Reveal patterns, trends, and findings from an unbiased viewpoint.
b) Provide context, interpret results, and articulate insights.
c) Streamline data so your audience can process information.
d) All of the above
4. What is true about Data Visualization?
a) Data Visualization is used to communicate information clearly and efficiently to users by the
usage of information graphics such as tables and charts.
b) Data Visualization helps users in analyzing a large amount of data in a simpler way.
c) Data Visualization makes complex data more accessible, understandable, and usable.
d) All of the above

5..………… are values for which arbitrarily fine intermediates exist.


a) Continuous data values
b) date data values
c) Discrete data values
d) Categorical ordered data values
6……………type of variables is used to represent whole integers
a) Numerical continuous
b) Numerical discrete
c) Categorical ordered
d) Numerical integers

7. The combination of a set of position scales and their relative geometric arrangement is called a
…………………...
a) Cartesian system
b) Curved axes
c) Nonlinear axes
d) Coordinate system

8. The most widely used coordinate system for data visualization is the …………………..
a) Cartesian coordinates
b) Curved axes
c) Nonlinear axes
d) Polar coordinates

9. Which coordinate system can be useful for data of a periodic nature, such that data values at
one end of the scale can be logically joined to data values at the other end.

PRACTICALKIDA.COM
a)
b)
c)
Cartesian coordinates
Curved axes
Nonlinear axes
d) Polar coordinates
10. How data is represented in below figure?

a) Representation of Data on linear scales


b) Representation of Data on logarithmic scales
c) Representation of data on curved axes
d) Representation of data on Cartesian system
11. Which of the following is the use case for color in data visualization?
a) To distinguish groups of data from each other
b) To represent data values,
c) To highlight.
d) All of the above
12. What is the name of below given color scale?

a) Qualitative color scales


b) Sequential color scales
c) Accent color scales
d) None of the above

13. The ……………scale is a monochromatic scale that varies from dark to light blue.
a) The ColorBrewer Blues
b) Accent color scales
c) ColorBrewer Dark2
d) Ggplot2
14. Sequential color scale is used when ______.
a) Colors are used to distinguish discrete items.
b) Colors are used to represent data values.
c) Colors are used to highlight.
PRACTICALKIDA.COM
d) Colors are used to represent descriptive data

15. Which color scale is used to represent quantitative data values such as income, temperaature
or speed?
a) Sequential color scale
b) Accent color scale
c) Qaulitative color scale
d) None of the above

16. Accent color scale is used when ______.


a) Colors are used to distinguish discrete items.
b) Colors are used to represent data values.
c) Colors are used to highlight.
d) Colors are used to represent descriptive data

17. Qualitative color scale is used when ______.


a) Colors are used to distinguish discrete items.
b) Colors are used to represent data values.
c) Colors are used to highlight.
d) Colors are used to represent descriptive data
18. Which of the following is used to represent proportions?
a) Grouped bars
b) Dots
c) Histogram
d) Pie chart
19.Which is not used to represent distributions?
a) Stacked histogram
b) Sina plots
c) Strip charts
d) Stacked bars
20….…… can be a useful alternative to violin plots and are often useful when visualizing very
large numbers of distributions or changes in distributions over.
a) Ridgeline plots
b) Pie charts
c) Histogram
d) Density plot
21. ………………. assume that every level of one grouping variable can be combined with every
level of another grouping variable
a)
b)
c)
PRACTICALKIDA.COM
Tree maps
Mosiac plots
Stacked bars
d) Heat maps
22._________ provide the most intuitive visualizations of a distribution
a) Histograms
b) Density plots
c) Cumulative densities
d) Both a and b

23. Proportions can be visualized as __________


a) Pie charts
b) Side-by-side bars
c) Stacked bars
d) All of the Above

24. Data can be visualized using?


a) Graphs
b) Charts
c) Maps
d) All of the above

25. Which one of the following is a most basic and commonly used technique for visualization?
a) Line charts
b) Scatter plots
c) Population pyramids
d) Area charts

26. What is used in below image to represent data?

a) Bar graph
b) Histogram
c) Heat map
d) Polar coordinates

27.Which of the following graphical representation is correct?

PRACTICALKIDA.COM
a) b)

c) d)

28. The key element of data storytelling


a) Narrative
b) Visuals
c) Data
d) All of the Above
29……...................is what you do to understand the data and figure out what might be noteworthy
or interesting to highlight to others
a) Explanatory analysis
b) Exploratory analysis
c) Data analysis
d) Data storytelling
30. ………………………is a methodology for communicating information, tailored to a specific
audience, with a compelling narrative.
a) Data science
b) Artificial intelligence
c) Data storytelling
d) Data visualization
31. In data storytelling, internal and external stakeholders are ………..
a)Targeted audience
b) General audience
c) Specific audience
d) Data specific audience
32. which of the following is not benefit of data storytelling?
a) Providing a human touch to your data.
b) Offering value to your audience and industry.
c) Building credibility as an industry and topic thought leader.
d) To represent complex data values
33. In Storytelling, how will you communicate to your audience?
a) With live presentation
b) With a written document or email

PRACTICALKIDA.COM
c) With telephone call
d) Both a and b
Unit 2: Machine to Machine Communication

(Internet of Things) IoT MCQ


1. Term "the Internet of things" was coined by
a) Edward L. Schneider
b) Kevin Ashton
c) John H.
d) Charles Anthony

2. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
a) Bot to Bot(B2B)
b) Machine to Machine(M2M)
c) InterCloud
d) Skynet

3. What does “Things” in IoT refers to?


a) General device
b) Information
c) IoT devices
d) Object
4. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
a) Internet of Things
b) Network Interconnection
c) Object Determination
d) None of these

5. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
a) IOT (Internet of Things)
b) MQTT
c) COAP
d) SPI

6 _____ devices may support a number of interoperable communication protocols and


communicate with other device and also with infrastructure.
a) Artificial Intelligence
b) Machine Learning
c) Internet of Things
d) None of above

7. Which one is not element of IOT?


a) Process
b) People
c) Security
d) Things

PRACTICALKIDA.COM
8. IIOT stands for
a) Information Internet of Things
b) Industrial Internet of Things
c) Inovative Internet of Things
d) None of above

9. Name of the IOT device which is first recognized?


a) Smart Watch
b) ATM
c) Radio
d) Video Game

10. _____ is used by IOT


a) Radio information technology
b) Satellite
c) Cable
d) Broadband

11. _____________ refers to establish a proper connection between all the things of IOT.
a) Connectivity
b) Analyzing
c) Sensing
d) Active Engagement

12. IOT devices which have unique identities and can perform _____________
a) Remote sensing
b) Actuating
c) Monitoring capabilities
d) All of the above

13. The sensed data communicated ___________________.


a) Cloud-based servers/storage.
b) I/O interfaces.
c) Internet connectivity.
d) None of the above

14. IOT devices are various types, for instance______________.


a) Wearable sensors.
b) Smart watches.
c) LED lights.
d) All of the above

15. Properties of IoT devices.


a) Sense
b) Send and receive data
c) Both a and b
d) None of above

16. IoT devices are ____


a) Standard
b) Non-standard
c) Both
PRACTICALKIDA.COM
d) None

17. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer

18 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer

19. ___ layer perform the host addressing and packet routing.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer

20. _________layer is responsible for error free, end to end delivery of data from source host to
destination host.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer

21. The _______ protocols that focus on process to process connections using ports
a) Application layer
b) Transport layer
c) Network layer
d) Link layer

22. 6LOWPAN stands for


a) 6 LOW Personal Area Network
b) IPv6 LOW Personal Area Network
c) IPv6 over Low power wireless personal area network
d) None of above

23. ______________ is a collection of wired Ethernet standard for the link layer.
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

24______ is a collection of WLAN communication standards.


a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16

PRACTICALKIDA.COM
d) IEEE 802.15.4

25. ____ is a collection of wireless broadband standards (WiMax).


a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

26 ______ is a collection of standards for LR-WPANs.


a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

27. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
a) Zigbee
b) Allsean
c) Tyrell
d) Microsoft's Azure

28. ______ includes GSM and CDMA.


a) 2G
b) 3G
c) 4G
d) None of above

29. ______include UMTS and CDMA2000.


a) 2G
b) 3G
c) 4G
d) None of above

30 ______include LTE.
a) 2G
b) 3G
c) 4G
d) None of above

31. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
a) Twisted pair cable
b) Coaxial cable
c) Fiber optic cable
d) None of the above

32. IEEE 802.11 standards provide data rates ______________


a) 10 Gbit/s.
b) 1 Gbit/s
c) 1 Mb/s to up to 6.75 Gb/s
d) 250 Kb/s
PRACTICALKIDA.COM
33. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
a) TCP
b) UDP
c) Transport layer
d) None of the above.

35. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
a) HTTP
b) COAP
c) WebSocket
d) MQTT

37. Which one out of these is not a data link layer technology?
a) Bluetooth
b) UART
c) Wi-Fi
d) HTTP

38. What is size of the IPv6 Address?


a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits
39. MQTT stands for _____________
a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

40. MQTT is _________ protocol.


a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things

41. Which protocol is lightweight?


a) MQTT
b) HTTP
c) CoAP
d) SPI
Ans: A

42. ________ is an open application layer protocol for business messaging.


a) AMQP
b) DSS
c) MQTT
d) XMPP

PRACTICALKIDA.COM
43. XMPP is used for streaming which type of elements?
a) XPL
b) XML
c) XHL
d) MPL

44. CoAP uses____________ model


a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

45. Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP

46. TCP and UDP are called?


a) Application protocols
b) Session protocols
c) Transport protocols
d) Network protocols
47. _____ is a data-centric middleware standard for device-to-device and machine-to-machine
communication.
a) Data Distribution Serviced (DDS)
b) Advance Message Queuing Protocol (AMQP)
c) Extensible Messaging and Presence Protocol (XMPP)
d) Message Queue Telemetry Transport (MQTT)

48. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

49. ___ is a stateful communication model and server is aware of all open connection.
a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

51. REST APIs follow __________communication model.


a) Request-Response
b) Publish-Subscriber
c) Push-Pull
PRACTICALKIDA.COM
d) Exclusive Pair

51. Web Socket APIs follow _________ communication model

e) Request-Response
f) Publish-Subscriber
g) Push-Pull
h) Exclusive Pair

52 ____ sensors is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
a) Smoke Sensor
b) Temperature Sensor
c) IR Sensor
d) Motion Sensor

53 ____ sensor measure heat emitted by objects.


a) Smoke Sensor
b) Temperature Sensor
c) IR Sensor
d) Proximity Sensor

54. ___ detects the presence or absence of a nearby object without any physical contact.
a) Image sensor
b) Accelerometer sensors
c) IR sensor
d) Proximity sensors

55. Accelerometer sensors are used in______


a) Smartphones
b) Aircrafts
c) Both a and b
d) None of above

56. Image sensors are found in_______


a) Cameras
b) Night-vision equipment
c) Radars
d) All of above

57. Gas sensors are used to detect _____gases.


a) Toxic
b) Natural
c) Oxygen
d) Hydrogen

58. Devices that transforms electrical signals into physical movements


A. Sensors
B. Actuators
PRACTICALKIDA.COM
C. Switches
D. Display

59. _____allows rotor to continuously rotate in one direction.


a) DC Motor
b) Linear Actuator
c) Stepper Motor
d) Servo Motor

60. Linear actuators are used in________


a) Robotics
b) Turbines
c) Compressor
d) All of above

61. Solenoid is a specially designed ________


a) Actuator
b) Machine
c) Electromagnet
d) none of above

62 ____ is used latching, locking, triggering.


a) Solenoid
b) Relay
c) Linear Actuator
d) Servo motors
Introduction to 5G network MCQ
1. The ____________provide the connectivity for all components and physically separated
functions within the NGN
a) Transport functions
b) Access network functions
c) Gateway functions
d) Resource and admission control functions (RACF)

2. The _________ take care of end-user’s access to the network as well as Collecting and
aggregating the traffic coming from these accesses towards the
Core network.
a) Transport functions
b) Access network functions
c) Gateway functions
d) Resource and admission control functions (RACF)

3. __________ functions also perform QoS control mechanisms dealing directly


with user traffic, including buffer management, queuing and scheduling, packet
filtering, traffic classification, marking, policing, and shaping.
a) Transport functions
b) Access network functions
c) Gateway functions
d) Resource and admission control functions (RACF)

4. The __________ provide capabilities to interwork with end-user functions


PRACTICALKIDA.COM
and/or other networks, including other types of NGN and many existing
networks, such as the PSTN/ISDN, the public Internet, and so forth.
a. Transport functions
b. Access network functions
c. Gateway functions
d. Resource and admission control functions (RACF)

5.______________is arbitrator between service control function and transport function.


a. Resource and admission control function
b. Access network function
c. Gateway function
d. Service control function

6._____________receive content from the Application support function and service support
function.
a. Access network function
b. Gateway function
c. Service control function
d. Content delivery function

7._________is used for dynamic provision of IP addresses and user equipment configuration
parameters.
a. Network attachment control function
b. Access network functions
c. Gateway function
d. Service control function
8. Media Gateway controller known as_____________.
A. Soft switches
B. Call controller
C. Wireless call server or call agent
D. All of above

9. Media Gateway located in___________ layer of NGN.


a. Access Layer
b. Transport Layer
c. Control Layer
d. Service Layer

10.__________is responsible for functions such as media conversion circuit to packet, packet to
circuit.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway

11._________provides the signalling interface between the VoIP network and the PSTN
signalling network.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway

12.____________is deployed at the edge and core of a service provider’s network to control
PRACTICALKIDA.COM
signalling and media streams as they enter and exit the network.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway

13. __________is any IP-IP network border such as between a service provider and a customer or
between a service provider and an enterprise network.
a. Edge
b. Core
c. Access network
d. IP core network

14. __________is any IP-IP network border such as between two service providers.
a. Edge
b. Core
c. Access network
d. IP core network

15. The primary function of the _________is to provide routing and transport of IP packets.
a. Access network
b. IP core network
c. Media Server
d. Application Server
16.___________functions provide the capabilities to manage the NGN in order to provide NGN
services with the expected quality, security, and reliability.
a. Network attachment control function
b. Management functions
c. Gateway function
d. Service control function

17._____________is characteristic of 5G.


a. Broadband
b. Low latency
c. High Data Transfer speed
d. All of above

18. NGN is Layered Architecture having _____________ layers.


a.1
b.2
c.3
d.4

19. NGN Architecture supports_____ reference points.


a.1
b.2
c.3
d.4

20. _________ include resource and admission control functions, network attachment control
functions as well as mobility management and control functions.
PRACTICALKIDA.COM
a. Transport functions
b. Transport control functions
c. Access network functions
d. Gateway functions

21. _________provide endorsement of the user, auto-discovery of user equipment capabilities,


and other parameters.
a. Network attachment control functions
b. Access network functions
c. Transport functions
d. Gateway functions

22.___________ manages and sets standards with regard to the spectrum use.
a. FCC
b. IEEE
c. ETSI
d. WPC

23.____________ a leading standards organization that publishes standards that are adopted
across industries.
a. FCC
b. IEEE
c. ETSI
d. WPC
24. ________ another standards organization that has contributed many worldwide standards.
a. FCC
b. IEEE
c. ETSI
d. WPC

25.___________ With the FCC, defines how WLANs should operate from a regulatory
perspective, such as operating frequencies, antenna gain, and transmission power.
a. FCC
b. IEEE
c. ETSI
d. ITU-R

26.____________ Provides information resources related to WLANs with regard to industry


trends and usage.
a. FCC
b. IEEE
c. ETSI
d. WLANA

27. _________ is the National Radio Regulatory Authority responsible for frequency Spectrum
Management, including licensing and catering to the needs of all wireless users (Government and
Private) in India.
a. FCC
b. IEEE
c. ETSI
d. WPC
PRACTICALKIDA.COM
28. ______ mobile wireless communication network was analog and used for voice calls only.
a. 4G
b. 2G
c. 3G
d. 1G

29. _____________is a digital technology that supports text messaging.


a. 4G
b. 2G
c. 3G
d.1G

30. ____________mobile technology provided a higher data transmission rate, increased capacity,
and provide multimedia support.
a. 4G
b. 3G
c. 5G
d. 1G

31. __________integrates 3G with fixed internet to support wireless mobile internet, which is an
evolution to mobile technology, and it overcomes the limitations of 3G.
a. 4G
b. 3G
c. 5G
d.1G
32. ______is going to be a new revolution in the mobile market which has changed the means to
use cell phones within very high bandwidth.
a. 4G
b. 5G
c. 3G
d. 1G

33. _________receive a packet that is not labelled yet, insert a label (stack) in front of the packet,
and send it on a data link.
a. Ingress LSRs
b. Egress LSRs
c. Intermediate LSRs
d. None of the above

34. ______receive labelled packets, remove the label(s), and send them on a data link.
a. Ingress LSRs
b. Egress LSRs
c. Intermediate LSRs
d. None of the above

35. MPLS stands for________


a. Multi-protocol label switching
b. Multi-protocol layered switching
c. Multi-protocol level switching
d. None of the above

36. ______receive an incoming labeled packet, perform an operation on it, switch the
PRACTICALKIDA.COM
packet, and send the packet on the correct data link.
a. Ingress LSRs
b Egress LSRs
c. Intermediate LSRs
d. None of the above

37. What is the purpose of End-to-end QoS in NGN?


a. To control the quality of service on a per-application basis
b. To control the quality of service on a per-network basis
c. To provide high quality broadband communication
d. To limit the number of users on the network

38. What did 2G mobile networks define?


a) The transition to broadband access
b) The support of voice and text only
c) The use of kilobits-per-second data rates
d) The connection of machines, objects, and devices

39. Which of the following is a characteristic of 5G networks?


a) Low data transfer speed
b) High latency
c) Limited device capacity
d) Massive network capacity
40. What is the theoretical download speed of 5G networks?
a) 1Gbps
b) 5Gbps
c) 10-20Gbps
d) 100Gbps

41. What is the Next Generation Network (NGN)?


a. A circuit-switched network
b. A packet-based network
c. A satellite-based network
d. A fiber-optic network

42. What does NGN support in terms of service delivery?


a. Voice only services
b. Data only services
c. Multiple converged services
d. Broadcast-only services

43. What is the purpose of End-to-end QoS in NGN?


a. To control the quality of service on a per-application basis.
b. To control the quality of service on a per-network basis.
c. To provide high quality broadband communication.
d. To limit the number of users on the network.

44. What is the transport technology used in NGN?


a) MPLS
b) 3G WCDMA
PRACTICALKIDA.COM
c) FTTH
d) xDSL

45. What are the functions of the transport stratum?


a. Transport functions and access network functions
b. Transport functions and transport control functions
c. Access network functions and transport control functions
d. None of the above

46. What is the primary function of the IP core network in the NGN architecture?
a) To provide routing and transport of IP packets
b) To terminate SS7 links and provide MTP Level 1 and Level 2 functionality
c) To support the line side interface to the core IP network for use by phones and devices
d) To provide call logic and call control functions

47. Which of the following radio bands requires a license to use?


a) Short wave
b) Medium wave
c) Cellular phone
d) Industrial, Scientific, Medical

48. Which of the following is not a disadvantage of the 1G mobile communication system?
a) Poor voice quality due to interference
b) Poor battery life
c) Limited number of users and cell coverage
d) High security and difficulty in decoding calls
49. Which technology became the base standard for further development in wireless standards
after the introduction of the 2G mobile communication system?
a) Advanced Mobile Phone System (AMPS)
b) Nordic Mobile Phone System (NMTS)
c) Total Access Communication System (TACS)
d) Global System for Mobile communication (GSM)

50. Which mobile communication system supports video calling for the first time on mobile
devices?
a) 2G system
b) CDMA system
c) 3G system
d) None of the above

51. Which mobile communication system has limited features on mobile devices and limited
hardware capability?
a) 2G system
b) CDMA system
c) 3G system
d) None of the above

52. Which of the following is a disadvantage of the 3G system?


a) Lower data rate
b) Limited number of users and hardware capability
c) Higher bandwidth requirements to support higher data rate
d) Limited mobility

PRACTICALKIDA.COM
53. Which wireless technology is introduced in 4G system to enhance data rate and network
performance?
a) LTE
b) Wi-Fi
c) Bluetooth
d) 3G

54. What is a key feature of 5G technology?


a) Reduced latency in milliseconds
b) Compatibility with previous versions
c) Higher data rate up to 1Gbps
d) Complex modulation schemes

55. What is a disadvantage of the 4G system?


a) Wide deployment and upgrade is time consuming
b) Higher security and reliable network
c) Ultra-fast mobile internet up to 10Gbps
d) Expensive hardware and infrastructure
UNIT 3: Blockchain Technology MCQ
1. The blockchain technology is defined in the year_____
a) 1991
b) 1997
c) 1989
d) 1982

2. The blockchain technology was defined in 1991 by the research scientist.


a) Stuart Haber and W. Scott Stornetta
b) Philip Moynagh
c) Prof. Brian MacCraith
d) None of the above

3. Block chain system is developed using the concept of ______.


a) Cryptographically Secured chain
b) Demanding
c) Secure
d) Popular

4. In the year 2000, _________published theory of cryptographic secured


chains, plus ideas for implementation.
a) Stefan Konst
b) Stuart Haber and W. Scott Stornetta
c) Philip Moynagh
d) Prof. Brian MacCraith
PRACTICALKIDA.COM
5. In the year 2008, ___________________conceptualized the concept of “Distributed lockchain”
called as “A Peer to Peer Electronic Cash System”.
a) Satoshi Nakamoto
b) Stuart Haber and W. Scott Stornetta
c) Philip Moynagh
d) Prof. Brian MacCraith

6. Blockchain is a shared, _________, and open ledger of transactions.


a) Decentralized
b) Demanding
c) Popular
d) Secure

7.Blockchain______ is an append-only database and cannot be changed or altered.


a) ledger database
b) relational database
c) responsive database
d) all of the above

8. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies
b) Computer technology
c) Service technology
d) all of the above
9.The ____________has previous hash value set to 0 to indicate no data was processed before the
Genesis Block.
a) Genesis Block
b) Hash of Block
c) Pointer of block
d) all of the above

10. Blockchain is example of_________.


a) Decentralized distributed system
b) Centralized distributed system
c) Both a and b
d) None of the above

11. Every node on the blockchain network has an __________of the blockchain.
a) Identical copy
b) Different copy
c) Parallel copy
d) Opposite copy

12. A decentralized distributed system is one where there is “master” node.


a) True
b) False

13. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.
a) administrative rights
b) Network rights
PRACTICALKIDA.COM
c) Virtual rights
d) None of the above

14. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above

15. A centralized system suffer from many intrinsic limitations like_______


a) less stable
b) less secured.
c) scalability is difficult.
d) All of the above

16. Which block chain system is difficult to design and maintain, govern and impose to trust?
a) Centralized
b) Decentralized
c) Both a and b
d) None of the above

17.Advantages of decentralized system_________


a) More stable
b) Attack resistant
c) equal right to all nodes
d) All of the above
18. The blockchain technology is made of a __________architecture
a) Layered architecture
b) Chain architecture
c) Horizontal architecture
d) None of the above

19. In the application layer, you can find___________.


a) smart contracts
b) decentralized applications (DApps)
c) user interfaces (UIs) and chain code
d)All of the above

20. Application Layer is_______ layer of the block chain.


a) 2
b) 4
c) 3
d) 5

21._________ consists of services and application programming interfaces (APIs), client-side


programming constructs, scripting, development frameworks that offer other apps with access to
the blockchain network.
a) Application Layer
b) Execution Layer
c) Semantic Layer
d) Propagation Layer

22. Application Layer acts as the _________tool of the blockchain.


PRACTICALKIDA.COM
a) Front end
b) Back end
c) Database
d) Network

23. The _________execute the instructions of application in the Application Layer on all the
nodes in a blockchain network.
a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Propagation Layer

24. Semantic Layer also called as _______ of blockchain layer.


a) Logical Layer
b) Virtual Layer
c) Physical Layer
d) Basic Layer

25. Linking of block need to be defined on _________


a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Propagation Layer
26.A ___________ is used in the peer-to-peer communications between the nodes that allow them
to discover each other and get synchronized with another node in a network.
a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Propagation Layer

27. Which layer is responsible to make sure that all the nodes must get approve on a common
state of the shared ledger.
a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Consensus Layer

28. Consensus layer also deals with the__________ of the blockchain.


a) Safety and security
b) Sending and receiving
c) Uploading and downloading
d) All of the above

29. Which of these is not a limitation of centralized systems?


a) Trust issue
b) Security issue
c) Cost and time factor of transaction
d) Can scale up vertically after a certain limit.

30. What are advantages of decentralized systems over centralized systems?


PRACTICALKIDA.COM
a) Elimination of intermediaries trust issue
b) Easier and genuine verification of transactions
c) Increased security with lower cost
d) All of the above

31.What does P2P stand for?


a) Password to Password
b) Peer to Peer
c) Product to Product
d) Private Key to Public Key

32. What is a blockchain?


a) A Currency
b) A centralized ledger
c) A type of cryptocurrency
d) A distributed ledger on a peer-to-peer network

33.Who first proposed a blockchain-like protocol?


a. David Chaum
b. Dave Bayer
c. W. Scott Stornetta
d. Stephan const
34. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the
records of any digital asset transparent and unchangeable.
a) Secure
b) Popular
c) Demanding
d) Decentralized

35. What is a node?


a) A Blockchain
b) An exchange
c) A type of cryptocurrency
d) A computer on Blockchain network

36.Who created Bitcoin?


a) Elon Musk
b) Warren Buffett
c) Satoshi Nakamoto
d) Mark Zuckerberg

37. A blockchain is a type of?


a) Table
b) View
c) Database
d) Object

38.What are the benefits of blockchain technology?


a) Security and Speed
PRACTICALKIDA.COM
b) No hidden fees
c) Fraud control & Access levels
d) All of the above

39.What is a dApp?
a) A type of Cryptocurrency
b) A condiment
c) A type of blockchain
d) A decentralized application

40.What is a genesis block?


a) The first block of a Blockchain
b) A famous block that hardcoded a hash of the Book of Genesis onto the blockchain
c ) The first block after each block having
d) The second transaction of a Blockchain
Question Bank (I scheme)

Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence

1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B

2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A

PRACTICALKIDA.COM
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A

4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A

5. What of the following is considered to be a pivotal event in the history of AI.


A. 1949, Donald O, The organization of Behavior.
B. 1950, Computing Machinery and Intelligence.
C. 1956, Dartmouth University Conference Organized by John McCarthy.
D. 1961, Computer and Computer Sense.
E. None of the above
Ans: C
6. A certain Professor at the Stanford University coined the word 'artificial intelligence' in
1956 at a conference held at Dartmouth College. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
E. None of the above
Ans: B

7. The field that investigates the mechanics of human intelligence is:


A. History
B. cognitive science
C. psychology
D. sociology
E. None of the above
Ans: B

8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A

PRACTICALKIDA.COM
9. The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans: C

10. What is Artificial intelligence?


A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer
Ans: C

11. Who is a father of AI?


A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert
Ans: B

12. Artificial Intelligence has its expansion in the following application.


A. Planning and Scheduling
B. Game Playing
C. Robotics
D. All of the above
Ans: D

13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C

14. The first AI programming language was called:


A. BASIC
B. FORTRAN
C. IPL
D. LISP
Ans: C

15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic

PRACTICALKIDA.COM
D. Functional logic
Ans: C

16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A

18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C

20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

21. ______ do not guarantee optimal/any solutions


A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A

22. Cognitive science related with _____


A. Act like human

PRACTICALKIDA.COM
B. ELIZA
C. Think like human
D. None of above
Ans: C

23. _____ Model should reflect how results were obtained.


A. Design model
B. Logic model
C. Computational model
D. None of above
Ans: C

24. Communication between man and machine is related with ______


A. LISP
B. ELIZA
C. All of above
D. None of above
Ans: B

25. ELIZA created by _____


A. John McCarthy
B. Steve Russell
C. Alain Colmerauer
D. Joseph Weizenbaum
Ans: D
26. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
A. Cognition level
B. Logic level
C. Functional level
D. All of above
Ans: B

27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C

28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B

29. PROLOG, LISP, NLP are the language of ____

PRACTICALKIDA.COM
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A

30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A

32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D

33. The core components are constituents of AI are derived from


A. Concept of logic
B. Cognition
C. Computation
D. All of above
Ans: D

34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A

35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B

PRACTICALKIDA.COM
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A

37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B

38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C

39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A

40. Human to Machine is _____ and Machine to Machine is ______.


A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program
Ans: C

41. Weak AI is also known as ____


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

42. _____ AI is able to perform dedicated task.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

PRACTICALKIDA.COM
43. Narrow AI is performs multiple task at a time.
A. True
B. False
Ans: B

44. Weak AI is____________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: C

45. Strong AI is__________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: A

46. Artificial intelligence is___________


A. The embodiment of human intellectual capabilities within a computer.
B. A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
C. The study of mental faculties through the use of mental models implemented on a computer
D. All of the above
E. None of the above
Ans: D

47. Apple siri is a good example of ______ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

48. IBM Watson supercomputer comes under ____ AI.


A. Narrow AI
B. General AI
C. Neural AI
D. None of above
Ans: A

49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI

PRACTICALKIDA.COM
C. Super AI
D. None of above
Ans: B

50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B

52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

55. ____ AI is hypothetical concept of AI.


A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C

56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine

PRACTICALKIDA.COM
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

58. IBM’s deep blue system is example of ___.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A

59. Google Alpha Go is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
60. Which can stores past experiences or some data for short period time.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B

61. Self-driving car is example of ____.


A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: B [Car stores recent speed of nearby cars, distance of others car, speed limit, other
information to navigate the road]

62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C

63. Which machines will be smarter than human mind?

PRACTICALKIDA.COM
A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D

64. _________machines will have their own consciousness and sentiments


A. Reactive machine
B. Theory of mind
C. Self-Awareness
D. Both B & C
Ans: C

65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C

66. What is Machine learning?


A. The autonomous acquisition of knowledge through the use of computer programs
B. The autonomous acquisition of knowledge through the use of manual programs
C. The selective acquisition of knowledge through the use of computer programs
D. The selective acquisition of knowledge through the use of manual programs
Ans: A
67______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: A

68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A

69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B

70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.

PRACTICALKIDA.COM
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B

71. Machine learning invent by _____.


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel
Ans: D

Chapter-2 Internet of Things

1. Embedded systems are_____


A. General purpose
B. Special purpose
Ans: B

2. Embedded system is______


A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D
3. Which of the following is not true about embedded systems?
A. Built around specialized hardware
B. Always contain an operating system
C. Execution behavior may be deterministic
D. All of these
E. None of these
Ans: E

4. Which of the following is not an example of a “small-scale embedded system”?


A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C

5. The first recognized modern embedded system is


A. Apple computer
B. Apollo Guidance Computer (AGC)
C. Calculator
D. Radio navigation system
Ans: B

6. The first mass produced embedded system is


A. Minuteman-I
B. Minuteman-II

PRACTICALKIDA.COM
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C

7. Which of the following is an (are) an intended purpose(s) of embedded systems?


A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D

8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B

11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D

12. The instruction set of RISC processor is


A. Simple and lesser in number
B. Complex and lesser in number
C. Simple and larger in number
D. Complex and larger in number
Ans: A

13. Which of the following is true about CISC processors?


A. The instruction set is non-orthogonal
B. The number of general purpose registers is limited

PRACTICALKIDA.COM
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E

14. Main processor chip in computers is_______


A. ASIC
B. ASSP
C. CPU
D. CPLD
Ans: C

15. Processors used in many microcontroller products need to be______


A. high power
B. low power
C. low interrupt response
D. low code density
Ans: B

16. In microcontrollers, UART is acronym of_____


A. Universal Applied Receiver/Transmitter
B. Universal Asynchronous Rectified Transmitter
C. Universal Asynchronous Receiver/Transmitter
D. United Asynchronous Receiver/Transmitter
Ans: C
17. Which architecture is followed by general purpose microprocessors?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: B

18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

20. Harvard architecture allows:


A. Separate program and data memory
B. Pipe-ling

PRACTICALKIDA.COM
C. Complex architecture
D. All of the mentioned
Ans: D

21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A

22. Which of the following is an example for wireless communication interface?


A. RS-232C
B. Wi-Fi
C. Bluetooth
D. EEE1394
E. Both (B) and (C)
Ans: E

23. ARM stands for _________


A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A
24. What is the processor used by ARM7?
A. 8-bit CISC
B. 8-bit RISC
C. 32-bit CISC
D. 32-bit RISC
Ans: D

25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A

26. ARM processors where basically designed for _______


A. Main frame systems
B. Distributed systems
C. Mobile systems
D. Super computers
Ans: C

27. ASIC chip is


A. Simple in design.
B. Manufacturing time is less.
C. It is faster.

PRACTICALKIDA.COM
D. Both A&C.
Ans: C

28. ASIC stands for


A. Application-System Integrated Circuits
B. Application-Specific Integrated Circuits
C. Application-System Internal Circuits
D. Application-Specific Internal Circuits
Ans: B

29. In microcontrollers, I2C stands for


A. Inter-Integrated Clock
B. Initial-Integrated Clock
C. Intel-Integrated Circuit
D. Inter-Integrated Circuit
Ans: D

30. ______________ is the smallest microcontrollers which can be programmed to perform a


large range of tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A
31. _______________ was developed in the year 1996 by ATMEL Corporation
A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B

32. AVR stands for_____________________.


A. Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C

33. AVR microcontroller executes most of the instruction in _________________.


A. Single execution cycle.
B. Double execution cycle.
C. Both A& B
D. None of the above.
Ans: - A

34. Term "the Internet of things" was coined by


A. Edward L. Schneider
B. Kevin Ashton
C. John H.

PRACTICALKIDA.COM
D. Charles Anthony
Ans: B

35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B

36. What does “Things” in IoT refers to?


A. General device
B. Information
C. IoT devices
D. Object
Ans: C

37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A

39 _____ devices may support a number of interoperable communication protocols and


communicate with other device and also with infrastructure.
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. None of above
Ans: C

40. Which one is not element of IOT?


A. Process
B. People
C. Security
D. Things
Ans:C

41. IIOT stands for


A. Information Internet of Things

PRACTICALKIDA.COM
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B

42. Name of the IOT device which is first recognized?


A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B

43. _____ is used by IOT


A. Radio information technology
B. Satellite
C. Cable
D. Broadband
Ans:A

44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A

46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D

47. The sensed data communicated ___________________.


A. Cloud-based servers/storage.
B. I/O interfaces.
C. Internet connectivity.
D. None of the above
Ans: - A

48. IOT devices are various types, for instance______________.


A. Wearable sensors.
B. Smart watches.

PRACTICALKIDA.COM
C. LED lights.
D. All of the above
Ans: - D

49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A

50.______ is a collection of WLAN communication standards.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:B

51. ____ is a collection of wireless broadband standards (WiMax).


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:C
52 ___ is a collection of standards for LR-WPANs.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D

53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A

54. ______ includes GSM and CDMA.


A. 2G
B. 3G
C. 4G
D. None of above
Ans:A

55. ______include UMTS and CDMA2000.


A. 2G

PRACTICALKIDA.COM
B. 3G
C. 4G
D. None of above
Ans:B

56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C

57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C

60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B

61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A

62. 6LOWPAN stands for

PRACTICALKIDA.COM
A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C

63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B

64. IEEE 802.11 standards provide data rates ______________


A. 10 Gbit/s.
B. 1 Gbit/s
C. 1 Mb/s to up to 6.75 Gb/s
D. 250 Kb/s
Ans: - C

65. ________ of the following is a protocol related to IOT


A. Zigbee
B. 6LoWPAN
C. CoAP
D. All of the above
Ans: C
66. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.
A. TCP
B. UDP
C. Transport layer
D. None of the above.
Ans: - B

67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A

68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A

69. Which one out of these is not a data link layer technology?
A. Bluetooth

PRACTICALKIDA.COM
B. UART
C. Wi-Fi
D. HTTP
Ans: D

70. What is size of the IPv6 Address?


A. 32 bits
B. 64 bits
C. 128 bits
D. 256 bits
Ans: C

71. MQTT stands for _____________


A. MQ Telemetry Things
B. MQ Transport Telemetry
C. MQ Transport Things
D. MQ Telemetry Transport
Ans: D

72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C

74. Which protocol is lightweight?


A. MQTT
B. HTTP
C. CoAP
D. SPI
Ans: A

75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B

76. XMPP is used for streaming which type of elements?


A. XPL
B. XML
C. XHL

PRACTICALKIDA.COM
D. MPL
Ans: B

77. XMPP creates _________ identity.


A. Device
B. Email
C. Message
D. Data
Ans: A

78. XMPP uses ________ architecture.


A. Decentralized client-server
B. Centralized client-server
C. Message
D. Public/subscriber
Ans: A
79. What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency and Allows multiple concurrent
exchange.
Ans: D
80. HTTP expands?
A. Hyper Text Transfer Protocol
B. Hyper Terminal Transfer Protocol
C. Hyper Text Terminal Protocol
D. Hyper Terminal Text Protocol
Ans: A

81. CoAP is specialized in ___________


A. Internet applications
B. Device applications
C. Wireless applications
D. Wired applications
Ans: A

82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A

83. Data in network layer is transferred in the form of ____________


A. Layers
B. Packets
C. Bytes

PRACTICALKIDA.COM
D. Bits
Ans:B

84. Services provided by application layer?


A. Web chat
B. Error control
C. Connection services
D. Congestion control
Ans: A

85. TCP and UDP are called?


A. Application protocols
B. Session protocols
C. Transport protocols
D. Network protocols
Ans: C

86. Security based connection is provided by which layer?


A. Application layer
B. Transport layer
C. Session layer
D. Network layer
Ans: D
87. Using which layer in transport layer data integrity can be assured?
A. Checksum
B. Repetition codes
C. Cyclic redundancy checks
D. Error correction codes
Ans: A

88. Transport layer receives data in the form of?


A. Packets
B. Byte streams
C. Bits stream
D. both packet and Byte stream
Ans: B

89. The network layer is considered as the _______?


A. Backbone
B. packets
C. Bytes
D. bits
Ans: A

90. The network layer consists of which hardware devices?


A. Router
B. Bridges
C. Switches

PRACTICALKIDA.COM
D. All of the above
Ans: D

91. Network layer protocol exits in_____?


A. Host
B. Switches
C. Packets
D. Bridges
Ans: A

92. Which protocol has a quality of service?


A. XMPP
B. HTTP
C. CoAP
D. MQTT
Ans: A

93. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.
A. Data Distribution Serviced (DDS)
B. Advance Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans:A
94. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

96. Which is not an IoT communication model.


A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C

97. In Node MCU, MCU stands for_____.


A. Micro Control Unit
B. Micro Controller Unit

PRACTICALKIDA.COM
C. Macro Control Unit
D. Macro Controller Unit
Ans: B

98. REST is acronym for________


A. Representational State Transfer
B. Represent State Transfer
C. Representational State Transmit
D. Representational Store Transfer
Ans: A

99. WSN stands for


A. Wide Sensor Network
B. Wireless Sensor Network
C. Wired Sensor Network
D. None of these
Ans: B

100. Benefit of cloud computing services


A. Fast
B. Anywhere access
C. Higher utilization
D. All of the above
Ans: D
101. PaaS stands for_____
A. Platform as a Service
B. Platform as a Survey
C. People as a Service
D. Platform as a Survey
Ans: A

102. _________ as a Service is a cloud computing infrastructure that creates a development


environment upon which applications may be build.
A. Infrastructure
B. Service
C. Platform
D. All of the mentioned
Ans:C

103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A

104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit

PRACTICALKIDA.COM
b) workspace
c) workload
d) all of the mentioned
Ans:C

105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B

106._________ is the most refined and restrictive service model.


A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C

107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A

109. Zigbee specification are based on ______.


A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D

110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B

111. The process of collecting, organizing and collecting large sets of data called as
A. WSN

PRACTICALKIDA.COM
B. Cloud Computing
C. Big Data
D. None of above
Ans:C

112. Does Raspberry Pi need external hardware?


A. True
B. False
Ans.B

113. Does RPi have an internal memory?


A. True
B. False
Ans.A

114. What do we use to connect TV to RPi?


A. Male HDMI
B. Female HDMI
C. Male HDMI and Adapter
D. Female HDMI and Adapter
Ans.C

115. How power supply is done to RPi?


A. USB connection
B. Internal battery
C. Charger
D. Adapter
Ans.A

116. What is the Ethernet/LAN cable used in RPi?


A.Cat5
B.at5e
C. cat6
D . RJ45
Ans.D

117. Which instruction set architecture is used in Raspberry Pi?


A. X86
B. MSP
C. AVR
D. ARM
Ans: D

118. Does micro SD card present in all modules?


A. True
B. False
Ans: A

119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?

PRACTICALKIDA.COM
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A

120. ________ empowers IoT by bringing together everyday objects.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: B

121. The collection of data is achieved with ________ changes.


A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: C
122. The number of devices that need to be managed and that communicate with each other will
be much larger.
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: D
123. ________ in IoT as one of the key characteristics, devices have different hardware
platforms and networks.
A. Sensors
B. Heterogeneity
C. Security
D. Connectivity
Ans: B

124. Devices that transforms electrical signals into physical movements


A. Sensors
B. Actuators
C. Switches
D. Display
Ans: B

125. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B

126. DC motors converts electrical into ___ energy.


A. Mechanical

PRACTICALKIDA.COM
B. Wind
C. Electric
D. None
Ans: A

127. Linear actuators are used in________


A. Machine tools
B. Industrial machinery
C.both A and B
D.None
Ans: A

128. Solenoid is a specially designed ________


A. Actuator
B. Machine
C. Electromagnet
D. none of above
Ans: C

129. Stepper motors are_____


A. AC motors
B. DC motors
C. Electromagnets
D. None of above
Ans: B
130. Accelerometer sensors are used in______
A. Smartphones
B. Aircrafts
C. Both
D. None of above
Ans: C

131. Image sensors are found in_______


A. Cameras
B. Night-vision equipment
C. Sonars
D. All of above
Ans: D

132. Gas sensors are used to detect _____gases.


A. Toxic
B. Natural
C. Oxygen
D. Hydrogen
Ans: A

133. Properties of Arduino are:


A. Inexpensive
B. Independent
C. Simple

PRACTICALKIDA.COM
D. both A and C
Ans: D

134. Properties of IoT devices.


A. Sense
B. Send and receive data
C. Both A and B
D. None of above
Ans: C

135. IoT devices are ____


A. Standard
B. Non-standard
C. Both
D. None
Ans: B

136. What is the microcontroller used in Arduino UNO?


A. ATmega328p
B. ATmega2560
C. ATmega32114
D. AT91SAM3x8E
Ans: A
137. ___ is an open source electronic platform based on easy to used hardware and software.
A. Arduino
B. Uno
C. Raspberry Pi
D. Node
Ans:A

138 ____ is used latching, locking, triggering.


A. Solenoid
B. Relay
C. Linear Actuator
D. Servo motors
Ans:A

139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D

140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor

PRACTICALKIDA.COM
C. IR Sensor
D. Proximity Sensor
Ans:B

141. The measurement of humidity is


A. RH
B. PH
C. IC
D. None of aboved
Ans:A

142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D

143 ____ sensor measure heat emitted by objects.


A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Proximity Sensor
Ans:C
Chapter-3 Basics of Digital Forensics

1. Digital forensics is all of them except:


A. Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

2. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR)


A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D

4. Investigator should satisfy following points:


A. Contribute to society and human being.

PRACTICALKIDA.COM
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B

9. When the field of PC forensics began?


A.1960's
B.1970's
C.1980's
D.1990's
Ans: C

10. What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or
evidence in a court of law
Ans: B

PRACTICALKIDA.COM
11. Digital Forensics entails _____.
A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration and presentation of digital evidence
from systems and devices
Ans: D

12. Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity
B. It is the investigator’s job to determine someone’s guilt or innocence.
C. It is the investigator’s responsibility to accurately report the relevant facts of a case.
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
on only a “need to know”
Ans: B

13. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C
14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B

16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase

PRACTICALKIDA.COM
Ans:B

17. Computer forensics do not involve_____activity.


A. Preservation of computer data.
B. Exraction of computer data.
C. Manipulation of computer data.
D. Interpretation of computer data.
Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D

19. Which of following is not a rule of digital forensics?


A. An examination should be performed on the original data
B. A copy is made onto forensically sterile media. New media should always be used if
available.
C. The copy of the evidence must be an exact, bit-by-bit copy
D. The examination must be conducted in such a way as to prevent any modification of the
evidence.
Ans: A
20. To collect and analyze the digital evidence that was obtained from the physical investigation
phase, is the goal of which phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: B

21. To provide mechanism to an incident to be detected and confirmed is purpose of which


phase?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase.
Ans: D

22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C

23. ____________is known as father of computer forensic.


A. G. Palmar

PRACTICALKIDA.COM
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C

24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A

25. Who proposed End to End Digital Investigation Process (EEDIP)?


A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B

26. Which model of Investigation proposed by Carrier and Safford?


A. Extended Model of Cybercrime Investigation (EMCI)
B. Integrated Digital Investigation Process(IDIP)
C. Road Map for Digital Forensic Research (RMDFR)
D. Abstract Digital Forensic Model (ADFM)
Ans: B
27. Which of the following is not a property of computer evidence?
A. Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable.
Ans. D

28. _______can makes or breaks investigation.


A. Crime
B. Security
C: Digital Forensic
D: Evidence
Ans: D

29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A

30. Which of following are general Ethical norms for Investigator?


A. To contribute to society and human being.
B. To avoid harm to others.
C. To be honest and trustworthy.

PRACTICALKIDA.COM
D. All of above
E. None of above
Ans: D

31. Which of following are Unethical norms for Investigator?


A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. All of above
E. None of above
Ans: D

32. Which of following is not general ethical norm for Investigator?


A. To contribute to society and human being.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.
Ans: B

33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A

35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C

36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C

37. What are the important parts of the mobile device which used in Digital forensic?

PRACTICALKIDA.COM
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D

38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B

39. Which of this is not a computer crime?


A. e-mail harassment
B. Falsification of data.
C. Sabotage.
D. Identification of data
Ans. D

40. Which file is used to store the user entered password?


A. .exe
B. .txt
C. .iso
D. .sam
Ans: D
41. __________is the process of recording as much data as possible to create reports and analysis
on user input.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: A

42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B

43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C

PRACTICALKIDA.COM

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy