0% found this document useful (0 votes)
27 views15 pages

ETI-Question Bank-UT1

The document contains multiple choice questions related to Artificial Intelligence and the Internet of Things, designed for a unit test in an Emerging Trends in Computer and Information Technology course. It covers fundamental concepts, definitions, and applications of AI and IoT, including key figures, models, and protocols. Each question presents several answer options, testing the knowledge of students on these subjects.

Uploaded by

AFIFA SYED
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views15 pages

ETI-Question Bank-UT1

The document contains multiple choice questions related to Artificial Intelligence and the Internet of Things, designed for a unit test in an Emerging Trends in Computer and Information Technology course. It covers fundamental concepts, definitions, and applications of AI and IoT, including key figures, models, and protocols. Each question presents several answer options, testing the knowledge of students on these subjects.

Uploaded by

AFIFA SYED
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Multiple Choice Questions and Answers

Unit Test: I
Courses: CO6I
Name of Subject: Emerging Trends in Computer and Information Technology
Subject Code: 22618
Semester: VI
Unit 1: Artificial Intelligence Artificial Intelligence MCQ
1. What is Artificial intelligence?

a) Putting your intelligence into Computer


b) Programming with your own intelligence
c) Making a Machine intelligent
d) d). Putting more memory into Computer

2. Who is a father of AI?

a) Alain Colmerauer
b) John McCarthy
c) Nicklaus Wirth
d) Seymour Papert

3. The first AI programming language was called:

a) BASIC
b) FORTRAN
c) IPL
d) LISP

4. Artificial Intelligence has its expansion in the following application.

a) Planning and Scheduling


b) Game Playing
c) Robotics
d) All of the above

5. The characteristics of the computer system capable of thinking, reasoning and learning is known
as ___________

a) Machine intelligence
b) Human intelligence
c) Artificial intelligence
d) Virtual intelligence

6. What is the term used for describing the judgmental or common sense part of problem solving?

a) Heuristic
b) Critical
c) Value based
d) Analytical

7. ______ is a branch of computer science which deals with helping machines finds solutions to
complex problems in a more human like fashions

a) Artificial Intelligence
b) Internet of Things
c) Embedded System
d) Cyber Security
8. In ____ the goal is for the software to use what it has learned in one area to solve problems in
other areas.

a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

9. Computer programs that mimic the way the human brain processes information is called as

a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

10. A ____ is a rule of thumb, strategy, trick, simplification, or any other kind of device which
drastically limits search for solutions in large problem spaces.

a) Heuristic
b) Critical
c) Value based
d) Analytical

11. ______ do not guarantee optimal/any solutions

a) Heuristic
b) Critical
c) Value based
d) Analytical

12. Cognitive science related with _____

a) Act like human


b) ELIZA
c) Think like human
d) None of above

13. _____ Model should reflect how results were obtained.

a) Design model
b) Logic model
c) Computational model
d) None of above

14. Communication between man and machine is related with ______

a) LISP
b) ELIZA
c) All of above
d) None of above

15. ELIZA created by _____

a) John McCarthy
b) Steve Russell
c) Alain Colmerauer
d) Joseph Weizenbaum
16. The concept derived from ________ level are propositional logic, tautology, predicate calculus,
model, temporal logic.

a) Cognition level
b) Logic level
c) Functional level
d) All of above

17. ______ that deals with the interaction between computers and humans using the natural
language

a) LISP
b) ELIZA
c) PROLOG
d) NLP

18. The core components are constituents of AI are derived from _____

a) Concept of logic
b) Cognition
c) Computation
d) All of above

19. Aristotle’s theory of syllogism and Descartes and kant’s critic of pure reasoning made knowledge
on _____.

a) Logic
b) Computation logic
c) Cognition logic
d) All of above

20. _____ model were developed and incorporated in machines which mimicked the functionalities
of human origin.

a) Functional model
b) Neural model
c) Computational model
d) None of above

21. Chomsky’s linguistic computational theory generated a model for syntactic analysis through
__________

a) Regular Grammar
b) Regular Expression
c) Regular Word
d) None of these

22. Human to Machine is _____ and Machine to Machine is ______.

a) Process, Process
b) Process, Program
c) Program, Hardware
d) Program, Program

23. Weak AI is also known as ____

a) Narrow AI
b) General AI
c) Neural AI
d) None of above
24. _____ AI is able to perform dedicated task.

a) Narrow AI
b) General AI
c) Neural AI
d) None of above

25. Weak AI is____________

a) The embodiment of human intellectual capabilities within a computer.


b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a
computer
d) All of the above
e) None of the above

26. Strong AI is__________

a) The embodiment of human intellectual capabilities within a computer.

a) b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
b) The study of mental faculties through the use of mental models implemented on a computer
c) All of the above
d) None of the above

27. Artificial intelligence is___________

a) The embodiment of human intellectual capabilities within a computer.


b) A set of computer programs that produce output that would be considered to reflect
intelligence if it were generated by humans.
c) The study of mental faculties through the use of mental models implemented on a computer
d) All of the above
e) None of the above

28. Apple siri is a good example of ______ AI.

a) Narrow AI
b) General AI
c) Neural AI
d) None of above

29. IBM Watson supercomputer comes under ____ AI.

a) Narrow AI
b) General AI
c) Neural AI
d) None of above

30. ____ AI is a type of intelligence which could perform any intellectual task with efficiency like
human.

a) Narrow AI
b) General AI
c) Super AI
d) None of above
31. The idea behind _________AI to make such a system which could be smarter and think like a
human by its own.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

32. Playing chess, purchasing suggestions on e-commerce site, self-driving cars, speech recognition,
and image recognition are the example of ____.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

33. __________AI is a type of intelligence which could perform any intellectual task with efficiency
like a human.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

34. Machine can perform any task better than human with cognitive properties is known as
__________AI.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

35. Ability to think, puzzle, make judgments, plan, learn, communication by its own is known as
_________ AI.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

36. ____ AI is hypothetical concept of AI.

a) Narrow AI
b) General AI
c) Super AI
d) None of above

37. Which AI system not store memories or past experiences for future actions.

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

38. Which machines only focus on current scenarios and react on it as per as possible best action.

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above
39. IBM’s deep blue system is example of ___.

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

40.________machine can stores past experiences or some data for short period time .

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

41. Self-driving car is example of ____.

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

42. Which AI should understand the human emotions, people, and beliefs and be able to interact
socially like humans.

a) Reactive machine
b) Limited memory
c) Theory of mind
d) None of above

43. Which machines will be smarter than human mind?

a) Reactive machine
b) Limited memory
c) Theory of mind
d) Self-Awareness

44. _________machines will have their own consciousness and sentiments

a) Reactive machine
b) Theory of mind
c) Self-Awareness
d) Both B and C

45. What is Machine learning?

a) The autonomous acquisition of knowledge through the use of computer programs


b) The autonomous acquisition of knowledge through the use of manual programs
c) The selective acquisition of knowledge through the use of computer programs
d) The selective acquisition of knowledge through the use of manual programs

46. Machine learning invent by _____.

a) John McCarthy
b) Nicklaus Wirth
c) Joseph Weizenbaum
d) Arthur Samuel
47______________is a branch of science that deals with programing the systems in such a way that
they automatically learn and improve with experience

a) Machine Learning
b) Deep Learning
c) Neural Networks
d) None of these

48. Classifying email as a spam, labeling webpages based on their content, voice recognition are the
example of _____.

a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning

49. K-means, self-organizing maps, hierarchical clustering are the example of _____.

a) Supervised learning
b) Unsupervised learning
c) Machine learning
d) Deep learning

50. Deep learning is a subfield of machine learning where concerned algorithms are inspired by the
structured and function of the brain called _____.

a) Machine learning
b) Artificial neural networks
c) Deep learning
d) Robotics

Unit 2: (Internet of Things) IoT MCQ


1. Term "the Internet of things" was coined by
a) Edward L. Schneider
b) Kevin Ashton
c) John H.
d) Charles Anthony

2. The huge numbers of devices connected to the Internet of Things have to communicate
automatically, not via humans, what is this called?

a) Bot to Bot(B2B)
b) Machine to Machine(M2M)
c) InterCloud
d) Skynet

3. What does “Things” in IoT refers to?

a) General device
b) Information
c) IoT devices
d) Object

4. Interconnection of Internet and computing devices embedded in everyday objects, enabling them
to send and receive data is called_____________

a) Internet of Things
b) Network Interconnection
c) Object Determination
d) None of these
5. _____________ is a computing concept that describes the idea of everyday physical objects being
connected to the internet.

a) IOT (Internet of Things)


b) MQTT
c) COAP
d) SPI

6 _____ devices may support a number of interoperable communication protocols and communicate
with other device and also with infrastructure.

a) Artificial Intelligence
b) Machine Learning
c) Internet of Things
d) None of above

7. Which one is not element of IOT?

a) Process
b) People
c) Security
d) Things

8. IIOT stands for

a) Information Internet of Things


b) Industrial Internet of Things
c) Inovative Internet of Things
d) None of above

9. Name of the IOT device which is first recognized?

a) Smart Watch
b) ATM
c) Radio
d) Video Game

10. _____ is used by IOT

a) Radio information technology


b) Satellite
c) Cable
d) Broadband

11. _____________ refers to establish a proper connection between all the things of IOT.

a) Connectivity
b) Analyzing
c) Sensing
d) Active Engagement

12. IOT devices which have unique identities and can perform _____________

a) Remote sensing
b) Actuating
c) Monitoring capabilities
d) All of the above

13. The sensed data communicated ___________________.

a) Cloud-based servers/storage.
b) I/O interfaces.
c) Internet connectivity.
d) None of the above

14. IOT devices are various types, for instance______________.

a) Wearable sensors.
b) Smart watches.
c) LED lights.
d) All of the above

15. Properties of IoT devices.

a) Sense
b) Send and receive data
c) Both a and b
d) None of above

16. IoT devices are ____

a) Standard
b) Non-standard
c) Both
d) None

17. _____________ layer protocols determine how the data is physically sent over the network’s
physical layer or medium.

a) Application layer
b) Transport layer
c) Network layer
d) Link layer

18 _______ layer is responsible for sending of IP datagrams from the source network to the
destination network.

a) Application layer
b) Transport layer
c) Network layer
d) Link layer

19. ___ layer perform the host addressing and packet routing.

a) Application layer
b) Transport layer
c) Network layer
d) Link layer

20. _________layer is responsible for error free, end to end delivery of data from source host to
destination host.

a) Application layer
b) Transport layer
c) Network layer
d) Link layer

21. The _______ protocols that focus on process to process connections using ports

a) Application layer
b) Transport layer
c) Network layer
d) Link layer

22. 6LOWPAN stands for

a) 6 LOW Personal Area Network


b) IPv6 LOW Personal Area Network
c) IPv6 over Low power wireless personal area network
d) None of above

23. ______________ is a collection of wired Ethernet standard for the link layer.

a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

24______ is a collection of WLAN communication standards.

a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

25. ____ is a collection of wireless broadband standards (WiMax).

a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

26 ______ is a collection of standards for LR-WPANs.

a) IEEE 802.3
b) IEEE 802.11
c) IEEE 802.16
d) IEEE 802.15.4

27. LR-WPANs standards from basis of specifications for high level communication protocol such as
___.

a) Zigbee
b) Allsean
c) Tyrell
d) Microsoft's Azure

28. ______ includes GSM and CDMA.

a) 2G
b) 3G
c) 4G
d) None of above

29. ______include UMTS and CDMA2000.

a) 2G
b) 3G
c) 4G
d) None of above
30 ______include LTE.

a) 2G
b) 3G
c) 4G
d) None of above

31. 802.3 is the standard for 10BASE5 Ethernet that uses ___________ cable as shared medium.

a) Twisted pair cable


b) Coaxial cable
c) Fiber optic cable
d) None of the above

32. IEEE 802.11 standards provide data rates ______________

a) 10 Gbit/s.
b) 1 Gbit/s
c) 1 Mb/s to up to 6.75 Gb/s
d) 250 Kb/s

33. _______________ is useful for time-sensitive application that have very small data units to
exchange and do not want the overhead of connection setup.

a) TCP
b) UDP
c) Transport layer
d) None of the above.

35. ____________ protocol uses Universal Resource Identifiers (URIs) to identify HTTP resources.

a) HTTP
b) COAP
c) WebSocket
d) MQTT

37. Which one out of these is not a data link layer technology?

a) Bluetooth
b) UART
c) Wi-Fi
d) HTTP

38. What is size of the IPv6 Address?

a) 32 bits
b) 64 bits
c) 128 bits
d) 256 bits

39. MQTT stands for _____________

a) MQ Telemetry Things
b) MQ Transport Telemetry
c) MQ Transport Things
d) MQ Telemetry Transport

40. MQTT is _________ protocol.

a) Machine to Machine
b) Internet of Things
c) Machine to Machine and Internet of Things
d) Machine Things

41. Which protocol is lightweight?

a) MQTT b) HTTP c) CoAP d) SPI

42. ________ is an open application layer protocol for business messaging.

a) AMQP
b) DSS
c) MQTT
d) XMPP

43. XMPP is used for streaming which type of elements?

a) XPL b) XML c) XHL d) MPL

44. CoAP uses____________ model

a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

45. Which protocol is used to link all the devices in the IoT?

a) TCP/IP b) Network c) UDP d) HTTP

46. TCP and UDP are called?

a) Application protocols
b) Session protocols
c) Transport protocols
d) Network protocols

47. _____ is a data-centric middleware standard for device-to-device and machine-to-machine


communication.

a) Data Distribution Serviced (DDS)


b) Advance Message Queuing Protocol (AMQP)
c) Extensible Messaging and Presence Protocol (XMPP)
d) Message Queue Telemetry Transport (MQTT)

48. _____ is a bi-directional, fully duplex communication model that uses a persistent connection
between client and server.

a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

49. ___ is a stateful communication model and server is aware of all open connection.

a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

51. REST APIs follow __________communication model.

a) Request-Response
b) Publish-Subscriber
c) Push-Pull
d) Exclusive Pair

51. Web Socket APIs follow _________ communication model

e) Request-Response
f) Publish-Subscriber
g) Push-Pull
h) Exclusive Pair

52 ____ sensors is used for automatic door controls, automatic parking system, automated sinks,
automated toilet flushers, hand dryers.

a) Smoke Sensor
b) Temperature Sensor
c) IR Sensor
d) Motion Sensor

53 ____ sensor measure heat emitted by objects.

a) Smoke Sensor
b) Temperature Sensor
c) IR Sensor
d) Proximity Sensor

54. ___ detects the presence or absence of a nearby object without any physical contact.

a) Image sensor
b) Accelerometer sensors
c) IR sensor
d) Proximity sensors

55. Accelerometer sensors are used in______

a) Smartphones
b) Aircrafts
c) Both a and b
d) None of above

56. Image sensors are found in_______

a) Cameras
b) Night-vision equipment
c) Radars
d) All of above

57. Gas sensors are used to detect _____gases.

a) Toxic
b) Natural
c) Oxygen
d) Hydrogen

58. Devices that transforms electrical signals into physical movements

A. Sensors
B. Actuators
C. Switches
D. Display
59. _____allows rotor to continuously rotate in one direction.

a) DC Motor
b) Linear Actuator
c) Stepper Motor
d) Servo Motor

60. Linear actuators are used in________

a) Robotics
b) Turbines
c) Compressor
d) All of above

61. Solenoid is a specially designed ________

a) Actuator
b) Machine
c) Electromagnet
d) none of above

62 ____ is used latching, locking, triggering.

a) Solenoid
b) Relay
c) Linear Actuator
d) Servo motors

Unit 3: Basics of Digital Forensics

1. In RMDFR, _______________stage corresponds to freezing the crime scene.


a) Reporting b) Preservation c) Collection d) Examination
2. EMCI stands for
a) Enhanced Model of Cybercrime Information
b) Enhanced Model of Cybercrime Investigation
c) Extended Model of Cybercrime Information
d) Extended Model of Cybercrime Investigation
3. In IDIP, Physical Crime Investigation Phase includes further
a) 7 Phases b) 9 phases c) 6 Phases d) 8 Phases
4. International Organization on Computer Evidence (IOCE) was formed in
a) 1996 b) 1995 c) 1989 d) 1991
5. IDIP stands for
a) Integrated Digital Investigation Process b) Integrated Data Investigation Process
c) Integrated Digital Investigator Process d) Independent Digital Investigator Process
6. In RMDFR, ______________stage consists in a in-depth systematic search of evidence.
b) Reporting b) Preservation c) Collection d) Examination
7. AFDM stands for
e) Accurate Digital Forensic Model
f) Actual Digital Forensic Model
g) Abstract Digital Forensic Model
h) Approximate Digital Forensic Model
8. In IDIP, Physical Crime Investigation Phase includes further
a) 7 Phases b) 9 phases c) 6 Phases d) 8 Phases
9. In ________ NTERPOL Forensic Science symposium was apprehended.
a) 1996 b) 1995 c) 1998 d) 1991
10. _____________________made use of UML and case diagram to demonstrate all the phases and
its interaction with all investigators.
a) Kohn and Oliver b) John and Oliver
c) Ford and Kohn d) Ford and Oliver
11. In RMDFR, ______________stage recognizes an incident from indicators and determines its
type.
c) Reporting b) Identification c) Collection d) Examination
12. EEDIP stands for
i) End to Exact Digital Investigation Process
j) End to End Digital Investigation Process
k) Exact to Exact Digital Investigation Process
l) Exact to End Digital Investigation Process
13. The EMCI follows ______________ model as every activity occurs in sequence.
a) spiral b) incremental c) waterfall d) iterative
14. In ________ the first FBI Regional Computer Forensic Laboratory was recognized.
a) 1996 b) 2000 c) 1998 d) 2001
15. _____________________in digital forensic field can be defined as set of moral principles that
regulate the use of.
a) Standard b) Ethics
c) Etiquettes d) Manner
16. In RMDFR, ______________stage draw conclusions based on evidence found.
d) Reporting b) Analysis c) Collection d) Examination
17. EEDIP model is proposed by Stephenson comprises of six major mechanisms within framework
a) Kohn b) S. O. Ciardhuain c) Stephenson d) Oliver
18. The EMCI follows ______________ model as every activity occurs in sequence.
a) spiral b) incremental c) waterfall d) iterative
19. In ________, the FBI CART case load exceeds 6500 cases, examining 782 terabytes of
information.
a) 1996 b) 2000 c) 2003 d) 2001
20. Rule 1 of digital forensic states
a) An examination should never be performed on the original media.
b) A copy is made onto forensically sterile media. New media should always be
used if available.
c) The copy of the evidence must be an exact, bit-by-bit copy.
d) All of the above

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy