Multiple Choice Questions and Answers
Multiple Choice Questions and Answers
Unit Test: I
Courses: IF/CM6I
Name of Subject: Emerging Trends in Computer and Information Technology
Subject Code: 22618
Semester: VI
Unit 1: Artificial Intelligence
PRACTICALKIDA.COM
c) IPL
d) LISP
5. The characteristics of the computer system capable of thinking, reasoning and learning is
known as ___________
a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence
6. What is the term used for describing the judgmental or common sense part of problem solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical
7. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
a) Artificial Intelligence
b) Internet of Things
c) Embedded System
d) Cyber Security
8. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these
9. Computer programs that mimic the way the human brain processes information is called as
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these
10. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
a) Heuristic
b) Critical
c) Value based
d) Analytical
PRACTICALKIDA.COM
12. Cognitive science related with _____
a) Act like human
b) ELIZA
c) Think like human
d) None of above
16. The concept derived from ________ level are propositional logic, tautology, predicate
calculus, model, temporal logic.
a) Cognition level
b) Logic level
c) Functional level
d) All of above
17. ______ that deals with the interaction between computers and humans using the natural
language
a) LISP
b) ELIZA
c) PROLOG
d) NLP
18. The core components are constituents of AI are derived from _____
a) Concept of logic
b) Cognition
c) Computation
d) All of above
19. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
a) Logic
b) Computation logic
c) Cognition logic
d) All of above
20. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
a) Functional model
PRACTICALKIDA.COM
b) Neural model
c) Computational model
d) None of above
21. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
a) Regular Grammar
b) Regular Expression
c) Regular Word
d) None of these
30. ____ AI is a type of intelligence which could perform any intellectual task with efficiency like
human.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
31. The idea behind _________AI to make such a system which could be smarter and think like a
human by its own.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
32. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
33. __________AI is a type of intelligence which could perform any intellectual task with
efficiency like a human.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
34. Machine can perform any task better than human with cognitive properties is known as
__________AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
35. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
PRACTICALKIDA.COM
36. ____ AI is hypothetical concept of AI.
a) Narrow AI
b) General AI
c) Super AI
d) None of above
37. Which AI system not store memories or past experiences for future actions.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
38. Which machines only focus on current scenarios and react on it as per as possible best action.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
40.________machine can stores past experiences or some data for short period time .
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
42. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
47______________is a branch of science that deals with programing the systems in such a way
that they automatically learn and improve with experience
a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these
48. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning
49. K-means, self-organizing maps, hierarchical clustering are the example of _____.
a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning
50. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
a) Machine learning
b) Artificial neural networks
c) Deep learning
d) Robotics
7. The combination of a set of position scales and their relative geometric arrangement is called a
…………………...
a) Cartesian system
b) Curved axes
c) Nonlinear axes
d) Coordinate system
8. The most widely used coordinate system for data visualization is the …………………..
a) Cartesian coordinates
b) Curved axes
c) Nonlinear axes
d) Polar coordinates
9. Which coordinate system can be useful for data of a periodic nature, such that data values at
one end of the scale can be logically joined to data values at the other end.
PRACTICALKIDA.COM
a)
b)
c)
Cartesian coordinates
Curved axes
Nonlinear axes
d) Polar coordinates
10. How data is represented in below figure?
13. The ……………scale is a monochromatic scale that varies from dark to light blue.
a) The ColorBrewer Blues
b) Accent color scales
c) ColorBrewer Dark2
d) Ggplot2
14. Sequential color scale is used when ______.
a) Colors are used to distinguish discrete items.
b) Colors are used to represent data values.
c) Colors are used to highlight.
PRACTICALKIDA.COM
d) Colors are used to represent descriptive data
15. Which color scale is used to represent quantitative data values such as income, temperaature
or speed?
a) Sequential color scale
b) Accent color scale
c) Qaulitative color scale
d) None of the above
25. Which one of the following is a most basic and commonly used technique for visualization?
a) Line charts
b) Scatter plots
c) Population pyramids
d) Area charts
a) Bar graph
b) Histogram
c) Heat map
d) Polar coordinates
PRACTICALKIDA.COM
a) b)
c) d)
PRACTICALKIDA.COM
c) With telephone call
d) Both a and b
Unit 2: Machine to Machine Communication
2. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
a) Bot to Bot(B2B)
b) Machine to Machine(M2M)
c) InterCloud
d) Skynet
5. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
a) IOT (Internet of Things)
b) MQTT
c) COAP
d) SPI
PRACTICALKIDA.COM
8. IIOT stands for
a) Information Internet of Things
b) Industrial Internet of Things
c) Inovative Internet of Things
d) None of above
11. _____________ refers to establish a proper connection between all the things of IOT.
a) Connectivity
b) Analyzing
c) Sensing
d) Active Engagement
12. IOT devices which have unique identities and can perform _____________
a) Remote sensing
b) Actuating
c) Monitoring capabilities
d) All of the above
17. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
18 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
19. ___ layer perform the host addressing and packet routing.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
20. _________layer is responsible for error free, end to end delivery of data from source host to
destination host.
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
21. The _______ protocols that focus on process to process connections using ports
a) Application layer
b) Transport layer
c) Network layer
d) Link layer
23. ______________ is a collection of wired Ethernet standard for the link layer.
a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4
PRACTICALKIDA.COM
d) IEEE 802.15.4
27. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
a) Zigbee
b) Allsean
c) Tyrell
d) Microsoft's Azure
30 ______include LTE.
a) 2G
b) 3G
c) 4G
d) None of above
31. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
a) Twisted pair cable
b) Coaxial cable
c) Fiber optic cable
d) None of the above
35. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
a) HTTP
b) COAP
c) WebSocket
d) MQTT
37. Which one out of these is not a data link layer technology?
a) Bluetooth
b) UART
c) Wi-Fi
d) HTTP
PRACTICALKIDA.COM
43. XMPP is used for streaming which type of elements?
a) XPL
b) XML
c) XHL
d) MPL
45. Which protocol is used to link all the devices in the IoT?
a) TCP/IP
b) Network
c) UDP
d) HTTP
48. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.
a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair
49. ___ is a stateful communication model and server is aware of all open connection.
a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair
e) Request-Response
f) Publish-Subscriber
g) Push-Pull
h) Exclusive Pair
52 ____ sensors is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
a) Smoke Sensor
b) Temperature Sensor
c) IR Sensor
d) Motion Sensor
54. ___ detects the presence or absence of a nearby object without any physical contact.
a) Image sensor
b) Accelerometer sensors
c) IR sensor
d) Proximity sensors
2. The _________ take care of end-user’s access to the network as well as Collecting and
aggregating the traffic coming from these accesses towards the
Core network.
a) Transport functions
b) Access network functions
c) Gateway functions
d) Resource and admission control functions (RACF)
6._____________receive content from the Application support function and service support
function.
a. Access network function
b. Gateway function
c. Service control function
d. Content delivery function
7._________is used for dynamic provision of IP addresses and user equipment configuration
parameters.
a. Network attachment control function
b. Access network functions
c. Gateway function
d. Service control function
8. Media Gateway controller known as_____________.
A. Soft switches
B. Call controller
C. Wireless call server or call agent
D. All of above
10.__________is responsible for functions such as media conversion circuit to packet, packet to
circuit.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway
11._________provides the signalling interface between the VoIP network and the PSTN
signalling network.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway
12.____________is deployed at the edge and core of a service provider’s network to control
PRACTICALKIDA.COM
signalling and media streams as they enter and exit the network.
a. Access Gateway
b. Trunk Media Gateway
c. Signalling Gateway
d. Border Gateway
13. __________is any IP-IP network border such as between a service provider and a customer or
between a service provider and an enterprise network.
a. Edge
b. Core
c. Access network
d. IP core network
14. __________is any IP-IP network border such as between two service providers.
a. Edge
b. Core
c. Access network
d. IP core network
15. The primary function of the _________is to provide routing and transport of IP packets.
a. Access network
b. IP core network
c. Media Server
d. Application Server
16.___________functions provide the capabilities to manage the NGN in order to provide NGN
services with the expected quality, security, and reliability.
a. Network attachment control function
b. Management functions
c. Gateway function
d. Service control function
20. _________ include resource and admission control functions, network attachment control
functions as well as mobility management and control functions.
PRACTICALKIDA.COM
a. Transport functions
b. Transport control functions
c. Access network functions
d. Gateway functions
22.___________ manages and sets standards with regard to the spectrum use.
a. FCC
b. IEEE
c. ETSI
d. WPC
23.____________ a leading standards organization that publishes standards that are adopted
across industries.
a. FCC
b. IEEE
c. ETSI
d. WPC
24. ________ another standards organization that has contributed many worldwide standards.
a. FCC
b. IEEE
c. ETSI
d. WPC
25.___________ With the FCC, defines how WLANs should operate from a regulatory
perspective, such as operating frequencies, antenna gain, and transmission power.
a. FCC
b. IEEE
c. ETSI
d. ITU-R
27. _________ is the National Radio Regulatory Authority responsible for frequency Spectrum
Management, including licensing and catering to the needs of all wireless users (Government and
Private) in India.
a. FCC
b. IEEE
c. ETSI
d. WPC
PRACTICALKIDA.COM
28. ______ mobile wireless communication network was analog and used for voice calls only.
a. 4G
b. 2G
c. 3G
d. 1G
30. ____________mobile technology provided a higher data transmission rate, increased capacity,
and provide multimedia support.
a. 4G
b. 3G
c. 5G
d. 1G
31. __________integrates 3G with fixed internet to support wireless mobile internet, which is an
evolution to mobile technology, and it overcomes the limitations of 3G.
a. 4G
b. 3G
c. 5G
d.1G
32. ______is going to be a new revolution in the mobile market which has changed the means to
use cell phones within very high bandwidth.
a. 4G
b. 5G
c. 3G
d. 1G
33. _________receive a packet that is not labelled yet, insert a label (stack) in front of the packet,
and send it on a data link.
a. Ingress LSRs
b. Egress LSRs
c. Intermediate LSRs
d. None of the above
34. ______receive labelled packets, remove the label(s), and send them on a data link.
a. Ingress LSRs
b. Egress LSRs
c. Intermediate LSRs
d. None of the above
36. ______receive an incoming labeled packet, perform an operation on it, switch the
PRACTICALKIDA.COM
packet, and send the packet on the correct data link.
a. Ingress LSRs
b Egress LSRs
c. Intermediate LSRs
d. None of the above
46. What is the primary function of the IP core network in the NGN architecture?
a) To provide routing and transport of IP packets
b) To terminate SS7 links and provide MTP Level 1 and Level 2 functionality
c) To support the line side interface to the core IP network for use by phones and devices
d) To provide call logic and call control functions
48. Which of the following is not a disadvantage of the 1G mobile communication system?
a) Poor voice quality due to interference
b) Poor battery life
c) Limited number of users and cell coverage
d) High security and difficulty in decoding calls
49. Which technology became the base standard for further development in wireless standards
after the introduction of the 2G mobile communication system?
a) Advanced Mobile Phone System (AMPS)
b) Nordic Mobile Phone System (NMTS)
c) Total Access Communication System (TACS)
d) Global System for Mobile communication (GSM)
50. Which mobile communication system supports video calling for the first time on mobile
devices?
a) 2G system
b) CDMA system
c) 3G system
d) None of the above
51. Which mobile communication system has limited features on mobile devices and limited
hardware capability?
a) 2G system
b) CDMA system
c) 3G system
d) None of the above
PRACTICALKIDA.COM
53. Which wireless technology is introduced in 4G system to enhance data rate and network
performance?
a) LTE
b) Wi-Fi
c) Bluetooth
d) 3G
8. Blockchain is another layer on top of the Internet and can coexist with other
a) Internet technologies
b) Computer technology
c) Service technology
d) all of the above
9.The ____________has previous hash value set to 0 to indicate no data was processed before the
Genesis Block.
a) Genesis Block
b) Hash of Block
c) Pointer of block
d) all of the above
11. Every node on the blockchain network has an __________of the blockchain.
a) Identical copy
b) Different copy
c) Parallel copy
d) Opposite copy
13. A centralized system has a centralized control with all ____________and are easy to design,
maintain, enforce trust, and administrate.
a) administrative rights
b) Network rights
PRACTICALKIDA.COM
c) Virtual rights
d) None of the above
14. A centralized system has a centralized control with all administrative rights and are _______.
a) Easy to design and enforce trust
b) Administrate and maintain.
c) Enforce trust, and administrate
d) All of the above
16. Which block chain system is difficult to design and maintain, govern and impose to trust?
a) Centralized
b) Decentralized
c) Both a and b
d) None of the above
23. The _________execute the instructions of application in the Application Layer on all the
nodes in a blockchain network.
a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Propagation Layer
27. Which layer is responsible to make sure that all the nodes must get approve on a common
state of the shared ledger.
a) Execution Layer
b) Application Layer
c) Semantic Layer
d) Consensus Layer
39.What is a dApp?
a) A type of Cryptocurrency
b) A condiment
c) A type of blockchain
d) A decentralized application
Name of Subject: Emerging Trends in Computer and Information Technology Unit Test: I
Subject Code: 22618 Courses: IF/CM6I
Semester: VI
MULTIPLE CHOICE QUESTIONS AND ANSWERS
Chapter 1- Artificial Intelligence
1. Which of these schools was not among the early leaders in AI research?
A. Dartmouth University
B. Harvard University
C. Massachusetts Institute of Technology
D. Stanford University
E. None of the above
Ans: B
2. DARPA, the agency that has funded a great deal of American AI research, is part of the
Department of:
A. Defense
B. Energy
C. Education
D. Justice
E. None of the above
Ans: A
PRACTICALKIDA.COM
3. The conference that launched the AI revolution in 1956 was held at:
A. Dartmouth
B. Harvard
C. New York
D. Stanford
E. None of the above
Ans: A
4. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above
Ans: A
8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence,, Presently, this technique is called
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
E. None of the above
Ans: A
PRACTICALKIDA.COM
9. The first AI programming language was called:
A. BASIC
B. FORTRAN
C. IPL
D. LISP
E. None of the above
Ans: C
13. The characteristics of the computer system capable of thinking, reasoning and learning is
known is
A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence
Ans: C
15. The first widely used commercial form of Artificial Intelligence (Al) is being used in many
popular products like microwave ovens, automobiles and plug in circuit boards for desktop PCs.
What is name of AI?
A. Boolean logic
B. Human logic
C. Fuzzy logic
PRACTICALKIDA.COM
D. Functional logic
Ans: C
16. What is the term used for describing the judgmental or commonsense part of problem
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
17. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions
A. Artificial Intelligence
B. Internet of Things
C. Embedded System
D. Cyber Security
Ans: A
18. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: B
19. Computer programs that mimic the way the human brain processes information is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these
Ans: C
20. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.
A. Heuristic
B. Critical
C. Value based
D. Analytical
Ans: A
PRACTICALKIDA.COM
B. ELIZA
C. Think like human
D. None of above
Ans: C
27. PROLOG is an AI programming language which solves problems with a form of symbolic
logic known as ______.
A. Propositional logic
B. Tautology
C. Predicate calculus
D. Temporal logic
Ans: C
28. The ____ level contains constituents at the third level which are knowledge based system,
heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of above
Ans: B
PRACTICALKIDA.COM
A. Artificial Intelligence
B. Machine Learning
C. Internet of Things
D. Deep Learning
Ans: A
30. ______ is used for AI because it supports the implementation of software that computes with
symbols very well.
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
31. Symbols, symbolic expressions and computing with those is at the core of ______
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: A
32. ______ that deals with the interaction between computers and humans using the natural
language
A. LISP
B. ELIZA
C. PROLOG
D. NLP
Ans: D
34. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made
knowledge on _____.
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: A
35. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above
Ans: B
PRACTICALKIDA.COM
36. In 1960s, _____ pushed the logical formalism to integrate reasoning with knowledge.
A. Marvin Minsky
B. Alain Colmerauer
C. John McCarthy
D. None of above
Ans: A
37. Sensing organs as input, mechanical movement organs as output and central nervous system
(CNS) in brain as control and computing devices is known as _____ of human being
A. Information Control Paradigm
B. Information Processing Paradigm
C. Information Processing Control
D. None of above
Ans: B
38. _____ model were developed and incorporated in machines which mimicked the
functionalities of human origin.
A. Functional model
B. Neural model
C. Computational model
D. None of above
Ans: C
39. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________
A. Regular Grammar
B. Regular Expression
C. Regular Word
D. None of these
Ans: A
PRACTICALKIDA.COM
43. Narrow AI is performs multiple task at a time.
A. True
B. False
Ans: B
49. ____ AI is a type of intelligence which could perform any intellectual task with efficiency
like human.
A. Narrow AI
B. General AI
PRACTICALKIDA.COM
C. Super AI
D. None of above
Ans: B
50. The idea behind _________AI to make such a system which could be smarter and think like
a human by its own.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
51. The worldwide researchers are now focusing on developing machines with ___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: B
52. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech
recognition, and image recognition are the example of ____.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: A
53. Machine can perform any task better than human with cognitive properties is known as ___
AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
54. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
___ AI.
A. Narrow AI
B. General AI
C. Super AI
D. None of above
Ans: C
56. Which AI system not store memories or past experiences for future actions.
A. Reactive machine
PRACTICALKIDA.COM
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
57. Which machines only focus on current scenarios and react on it as per as possible best
action.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: A
62. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.
A. Reactive machine
B. Limited memory
C. Theory of mind
D. None of above
Ans: C
PRACTICALKIDA.COM
A. Reactive machine
B. Limited memory
C. Theory of mind
D. Self-Awareness
Ans: D
65. Which is not the commonly used programming language for AI?
A. PROLOG
B. LISP
C. Perl
D. Java script
Ans: C
68. Classifying email as a spam, labeling webpages based on their content, voice recognition are
the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: A
69. K-means, self-organizing maps, hierarchical clustering are the example of _____.
A. Supervised learning
B. Unsupervised learning
C. Machine learning
D. Deep learning
Ans: B
70. Deep learning is a subfield of machine learning where concerned algorithms are inspired by
the structured and function of the brain called _____.
PRACTICALKIDA.COM
A. Machine learning
B. Artificial neural networks
C. Deep learning
D. Robotics
Ans: B
PRACTICALKIDA.COM
C. Autonetics D-17
D. Apollo Guidance Computer (AGC)
Ans: C
8. Which of the following is (are) example(s) of embedded system for data communication?
USB Mass Storage device
A. Network router
B. Digital camera
C. Music player
D. All of these
E. None of these
Ans: B
9. What are the essential tight constraint/s related to the design metrics of an embedded system?
A. Ability to fit on a single chip
B. Low power consumption
C. Fast data processing for real-time operations
D .All of the above
Ans: D
10. A digital multi meter is an example of an embedded system for
A. Data communication
B. Monitoring
C. Control
D. All of these
E. None of these
Ans: B
11. Which of the following is an (are) example(s) of an embedded system for signal processing?
A. Apple iPOD (media player device)
B. SanDisk USB mass storage device
C. Both (A) and (B)
D. None of these
Ans: D
PRACTICALKIDA.COM
C. Instructions are like macros in c language
D. Variable length instructions
E. All of these
F. None of these
Ans: E
18. Which architecture involves both the volatile and the non-volatile memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
19. Which architecture provides separate buses for program and data memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A
PRACTICALKIDA.COM
C. Complex architecture
D. All of the mentioned
Ans: D
21. Which of the following processor architecture supports easier instruction pipelining?
A. Harvard
B. Von Neumann
C. Both of them
D. None of these
Ans: A
25. The main importance of ARM micro-processors is providing operation with ______
A. Low cost and low power consumption
B. Higher degree of multi-tasking
C. Lower error or glitches
D. Efficient memory management
Ans: A
PRACTICALKIDA.COM
D. Both A&C.
Ans: C
PRACTICALKIDA.COM
D. Charles Anthony
Ans: B
35. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?
A. Bot to Bot(B2B)
B. Machine to Machine(M2M)
C. InterCloud
D. Skynet
Ans: B
37. Interconnection of Internet and computing devices embedded in everyday objects, enabling
them to send and receive data is called_____________
A. Internet of Things
B. Network Interconnection
C. Object Determination
D. None of these
Ans: A
38. _____________ is a computing concept that describes the idea of everyday physical objects
being connected to the internet.
A. IOT (Internet of Things)
B. MQTT
C. COAP
D. SPI
Ans: -A
PRACTICALKIDA.COM
B. Industrial Internet of Things
C. Inovative Internet of Things
D. None of above
Ans:B
44. ______ consists of communication protocols for electronic devices, typically a mobile device
and a standard device.
A. RFID
B. MQTT
C. NFC
D. None of above
Ans:C
45. _____________ refers to establish a proper connection between all the things of IOT.
A. Connectivity
B. Analyzing
C. Sensing
D. Active Engagement
Ans: - A
46. IOT devices which have unique identities and can perform ________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D
PRACTICALKIDA.COM
C. LED lights.
D. All of the above
Ans: - D
49. ______________ is a collection of wired Ethernet standard for the link layer.
A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans: - A
53. LR-WPANs standards from basis of specifications for high level communication protocol
such as ___.
A. Zigbee
B. Allsean
C. Tyrell
D. Microsoft's Azure
Ans:A
PRACTICALKIDA.COM
B. 3G
C. 4G
D. None of above
Ans:B
56 ______include LTE.
A. 2G
B. 3G
C. 4G
D. None of above
Ans:C
57. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: - D
58 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans: C
59. ___ layer perform the host addressing and packet routing.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:C
60. _____________ protocols provide end to end message transfer capability independent of the
underlying network.
A. Network layer
B. Transport layer
C. Application layer
D. Link layer
Ans: - B
61. The ___ protocols define how the applications interface with the lower layer protocol to send
the data over the network.
A. Application layer
B. Transport layer
C. Network layer
D. Link layer
Ans:A
PRACTICALKIDA.COM
A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of above
Ans:C
63. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.
A. Twisted pair cable
B. Coaxial cable
C. Fiber optic cable
D. None of the above
Ans: - B
67. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP
resources.
A. HTTP
B. COAP
C. WebSocket
D. MQTT
Ans: A
68. The 10/100Mbit Ethernet support enables the board to connect to _________
A. LAN
B. MAN
C. WAN
D. WLAN
Ans: A
69. Which one out of these is not a data link layer technology?
A. Bluetooth
PRACTICALKIDA.COM
B. UART
C. Wi-Fi
D. HTTP
Ans: D
72. MQTT is better than HTTP for sending and receiving data.
A. True
B. False
Ans: A
73. MQTT is _________ protocol.
A. Machine to Machine
B. Internet of Things
C. Machine to Machine and Internet of Things
D. Machine Things
Ans: C
75 MQTT is:
A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B
PRACTICALKIDA.COM
D. MPL
Ans: B
82. Which protocol is used to link all the devices in the IoT?
A. TCP/IP
B. Network
C. UDP
D. HTTP
Ans: A
PRACTICALKIDA.COM
D. Bits
Ans:B
PRACTICALKIDA.COM
D. All of the above
Ans: D
95. ___ is a stateful communication model and server is aware of all open connection.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D
PRACTICALKIDA.COM
C. Macro Control Unit
D. Macro Controller Unit
Ans: B
103. _________ is a cloud computing service model in which hardware is virtualized in the
cloud.
A. IaaS
B. CaaS
C. PaaS
D. None of the mentioned
Ans:A
104. Which of the following is the fundamental unit of virtualized client in an IaaS deployment?
a) workunit
PRACTICALKIDA.COM
b) workspace
c) workload
d) all of the mentioned
Ans:C
105. ______ offering provides the tools and development environment to deploy applications on
another vendor’s application.
A. PaaS
B. IaaS
C. CaaS
D. All of the mentioned
Ans.B
107. _____ is suitable for IOT applications to have low latency or high throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D
108____ is a one of the most popular wireless technologies used by WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
110. ____ is a transformative computing paradigm that involves delivering applications and
services over the internet.
A. WSN
B. Cloud Computing
C. Big Data
D. None of above
Ans:B
111. The process of collecting, organizing and collecting large sets of data called as
A. WSN
PRACTICALKIDA.COM
B. Cloud Computing
C. Big Data
D. None of above
Ans:C
119. Which characteristics involve the facility the thing to respond in an intelligent way to a
particular situation?
PRACTICALKIDA.COM
A. Intelligence
B. Connectivity
C. Dynamic Nature
D. Enormous Scale
Ans: A
PRACTICALKIDA.COM
B. Wind
C. Electric
D. None
Ans: A
PRACTICALKIDA.COM
D. both A and C
Ans: D
139. ____detect the presence or absence of nearby object without any physical contact.
A. Smoke Sensor
B. Pressure Sensor
C. IR Sensor
D. Proximity Sensor
Ans:D
140____ sensors include thermocouples, thermistors, resistor temperature detectors (RTDs) and
integratd circuits (ICs).
A. Smoke Sensor
B. Temperature Sensor
PRACTICALKIDA.COM
C. IR Sensor
D. Proximity Sensor
Ans:B
142 ____ sensor is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.
A. Smoke Sensor
B. Temperature Sensor
C. IR Sensor
D. Motion Sensor
Ans:D
PRACTICALKIDA.COM
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D
5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A
6. More subtle because you are not aware that you are running these macros (the document opens
and the application automatically runs); spread via email
A. The purpose of copyright
B. Danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B
7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B
PRACTICALKIDA.COM
11. Digital Forensics entails _____.
A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration and presentation of digital evidence
from systems and devices
Ans: D
15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans:B
16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
F. Preservation phase
G. Survey phase
H. Documentation phase
I. Reconstruction phase
J. Presentation phase
PRACTICALKIDA.COM
Ans:B
18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
22. Which phase entails a review of the whole investigation and identifies area of improvement?
A. Physical crime investigation
B. Digital crime investigation.
C. Review phase.
D. Deployment phase
Ans: C
PRACTICALKIDA.COM
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C
24. ___________is well established science where various contribution have been made
A. Forensic
B. Crime
C. Cyber Crime
D. Evidence
Ans: A
29. __________ is software that blocks unauthorized users from connecting to your computer.
A. Firewall
B. Quick lauch
C. OneLogin
D. Centrify
Ans: A
PRACTICALKIDA.COM
D. All of above
E. None of above
Ans: D
33. Which of following is a not unethical norm for Digital Forensics Investigation?
A. Uphold any relevant evidence.
B. Declare any confidential matters or knowledge.
C. Distort or falsify education, training, credentials.
D. To respect the privacy of others.
Ans: D
34. What is called as the process of creation a duplicate of digital media for purpose of
examining it?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
Ans: A
35. Which term refers for modifying a computer in a way which was not originally intended to
view Information?
A. Metadata
B. Live analysis
C. Hacking
D. Bit Copy
Ans: C
36. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called?
A. Robotics
B. Simulation
C. Computer Forensics
D. Animation
Ans: C
37. What are the important parts of the mobile device which used in Digital forensic?
PRACTICALKIDA.COM
A. SIM
B. RAM
C. ROM.
D.EMMC chip
Ans: D
38. Using what, data hiding in encrypted images be carried out in digital forensics?
A. Acquisition.
B. Steganography.
C. Live analysis
D. Hashing.
And: B
42. ________searches through raw data on a hard drive without using a file system.
A. Data mining
B. Data carving
C. Meta data
D. Data Spoofing.
Ans: B
43. What is first step to Handle Retrieving Data from an Encrypted Hard Drive?
A. Formatting disk
B. Storing data
C. Finding configuration files.
D. Deleting files.
Ans: C
PRACTICALKIDA.COM