1. HOW MANY APPROACHES ARE THERE IN AI?
A) 1
B) 2
C) 3
D) 4
View Answer
D) 4
2. IBM’s deep blue system is example of .
A) Reactive machine
B) Limited memory
C) Theory of mind
D) None of above
View Answer
A) Reactive machine
3. Ability to think, puzzle, make judgments, plan, learn,
communication by its own is known as ____ AI.
A) Narrow AI
B) General AI
C) Super AI
D) None of above
View Answer
C) Super AI
4. Which AI system not store memories or past experiences
for future actions.
A) Reactive machine
B) Limited memory
C) Theory of mind
D) None of above
View Answer
A) Reactive machine
5. WHICH IS THE 2 CONCEPT OF AI?
A) DEEP LEARNING
B) NEURAL NETWORK
C) MACHINE LEARNING
D) NONE OF THE ABOVE
View Answer
A) DEEP LEARNING
6. IN FIRST DIMENSION CORE WHICH THEORY IS
USED?
A) COFNITION
B) KNOWLEDGE
C) INTERFACE
D) NONE OF THESE
View Answer
A) COFNITION
7. TYPES OF COMPOUND IN COMPONENTS OF AI?
A) INDUCTION
B) KNOWLEDGE BASED SYSTEM
C) KNOWLEDGE
D) PROPOSITION
View Answer
C) KNOWLEDGE
8. THE COMPONETS OF AI ARE DERIVED FROM?
A) LOGIC
B) CONGINITION
C) FUNCTION
D) ALL OF THE ABOVE
View Answer
D) ALL OF THE ABOVE
9. IS COARSE COMPONENTS PART OF
COMPONENTS OF AI?
A) True
B) False
C) ---
D) ----
View Answer
A) True
10. IN SECOND DIMENSION CORE WHICH THEORY
IS USED?
A) INTERFACE
B) KNOELEDGE
C) NLP
D) NONE OF THESE
View Answer
A) INTERFACE
11. HOW MANY CORE COMPONET ARE THERE IN
AI?
A) 19
B) 12
C) 13
D) 10
View Answer
D) 10
12. IN SECOND DIMENSION CORE WHICH THEORY
IS USED?
A) LOGIC
B) KNOWLEDGE
C) NLP
D) NONE OF THESE
View Answer
B) KNOWLEDGE
13. TYPES OF COARSE COMPONENTS IN AI?
A) SEARCH
B) KNOELEDGE
C) KNOWLEDGE BASED SYSTEM
D) NONE OF THESE
View Answer
C) KNOWLEDGE BASED SYSTEM
14. WHICH TECHNIQUE IS USE IN THINK LIKE
HUMANS?
A) HEURISTIC TECHNIQUE
B) GPS
C) CONGINITE SCIENCE
D) NONE OF THE ABOVE
View Answer
B) GPS
15. INDUCTION, PROPOSITION, TAUTOLOGY &
MODEL LOGIC OF CORE ARE INCLUDED IN WHICH
LEVEL?
A) COGNITION
B) FUNCTIONAL
C) LOGIC
D) NONE OF THESE
View Answer
C) LOGIC
16. ELIZA A PROGRAM THAT SIMULATE A
PSYCHOTHERAPIST WAS BASED ON WHICH
APPROACH?
A) THINL WELL
B) ACT WELL
C) THINK LIKE HUMAN
D) ACT LIKE HUMAN
View Answer
D) ACT LIKE HUMAN
17. TYPES OF CORE ARE?
A) KNOWLEDGE
B) REASONING
C) INDUCTION
D) SEARCH
View Answer
C) INDUCTION
18. Machine can perform any task better than human with
cognitive properties is known as ___ AI.
A) Narrow AI
B) General AI
C) Super AI
D) None of above
View Answer
C) Super AI
19. IN WHICH FIELD THE SCOPE OF AI IS?
A) ROBOTICS
B) GAMES PLAYING
C) SPEECH RECOGNITION
D) ALL THE ABOVE
View Answer
D) ALL THE ABOVE
20. WHICH IS THE 3 CONCEPT OF AI?
A) DEEP LEARNING
B) NEURAL NETWORK
C) MACHINE LEARNING
D) NONE OF THE ABOVE
View Answer
B) NEURAL NETWORK
21. Which AI should understand the human emotions,
people, and beliefs and be able to interact socially like
humans.
A) Reactive machine
B) Limited memory
C) Theory of mind
D) None of above
View Answer
C) Theory of mind
22. ___ machines will have their own consciousness and
sentiments
A) REACTIVE MACHINE
B) THEORY OF MIND
C) SELF-AWARENESS
D) BOTH B &C
View Answer
C) SELF-AWARENESS
23. What is Machine learning?
A)THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF
COMPUTERPROGRAMS
B)THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH THE USE OF
MANUALPROGRAMS
C)THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF
COMPUTERPROGRAMS
D)THE SELECTIVE ACQUISITION OF KNOWLEDGE THROUGH THE USE OF
MANUALPROGRAMS
View Answer
A) THE AUTONOMOUS ACQUISITION OF KNOWLEDGE THROUGH
THE USE OF COMPUTERPROGRAMS
24. Classifying email as a spam, labeling web pages based on
their content, voice recognitionare the example of ____ .
A) SUPERVISED LEARNING
B) UNSUPERVISED LEARNING
C) MACHINE LEARNING
D) DEEP LEARNING
View Answer
A) SUPERVISED LEARNING
25. Deep learning is a subfield of machine learning where
concerned algorithms are inspired by the structured and
function of the brain called .
A) MACHINE LEARNING
B) ARTIFICAL NEURAL NETWORKS
C) DEEP LEARNING
D) ROBOTICS
View Answer
B) ARTIFICAL NEURAL NETWORKS
26. Machine learning invent by .
A) JOHN MCCARTHY
B) NICKLAUS WIRTH
C) JOSEPH WEIZEN BAUM
D) ARTHUR SAMUEL
View Answer
D) ARTHUR SAMUEL
27. Computer programs that mimic the way the human
brain processes information is called as
A) NEURAL NETWORKS
B) MACHINE LEARNING
C) DEEP LEARNING
D) NONE OF THE ABOVE
View Answer
A) NEURAL NETWORKS
28. Cognitive science related with
A) ACT LIKE HUMAN
B) ELIZA
C) THINK LIKE HUMAN
D) NONE OF ABOVE
View Answer
C) THINK LIKE HUMAN
29. Communication between man and machine is related
with ____
A) LISP
B) ELIZA
C) ALL OF ABOVE
D) NONE OF ABOVE
View Answer
B) ELIZA
30. PROLOG is an AI programming language which solves
problems with a form of symbolic logic known as .
A) PROPOSITIONAL LOGIC
B) TAUTOLOGY
C) PREDICATE CALCULUS
D) TEMPORAL LOGIC
View Answer
C) PREDICATE CALCULUS
31. is used for AI because it supports the implementation of
software that computes with symbols very well.
A) LISP
B) ELIZA
C) PROLOG
D) NLP
View Answer
A) LISP
32. The core components are constituents of AI are derived
from
A) CONCEPT OF LOGIC
B) COGNITION
C) COMPUTATION
D) ALL OF ABOVE
View Answer
D) ALL OF ABOVE
33. In 1960s,____ pushed the logical formalism to integrate
reasoning with knowledge.
A) MARVIN MINSKY
B) ALAIN COLMERAUER
C) JOHN MCCARTHY
D) NONE OF ABOVE
View Answer
A) MARVIN MINSKY
34. The first recognized modern embedded system is
A) APPLE COMPUTER
B) APOLLO GUIDANCE COMPUTER(AGC)
C) CALCULATOR
D) RADIO NAVIGATION SYSTEM
View Answer
B) APOLLO GUIDANCE COMPUTER(AGC)
35. What are the essential tight constraint/s related to the
design metrics of an embedded system?
A) ABILITY TO FIT ON A SINGLE CHIP
B) LOW POWER CONSUMPTION
C) FAST DATA PROCESSING FOR REAL-TIME OPERATIONS
D) ALL OF THE ABOVE
View Answer
D) ALL OF THE ABOVE
36. The instruction set of RISC processors
A) SIMPLE AND LESSER IN NUMBER
B) COMPLEX AND LESSER IN NUMBER
C) SIMPLE AND LARGER IN NUMBER
D) COMPLEX AND LARGER IN NUMBER
View Answer
A) SIMPLE AND LESSER IN NUMBER
37. Embedded system is designed to accomplished the
purpose of combination of following task?
A) DATA COLLECTION
B) DATA COMMUNICATION
C) DATA PROCESSING
D) ALL THE ABOVE
View Answer
D) ALL THE ABOVE
38. Architecture of embedded system consist of?
A) TIMERS
B) INTERRUPT
C) SENSOR
D) ALL OF THE ABOVE
View Answer
C) SENSOR
39. For which purpose the sensor is used?
A) MEASURE THE PHYSICAL QUANTITY
B) TO COVERTS AN ELECTRIC SIGNAL
C) TO READ ELECTRIC SIGNAL
D) ALL OF THE ABOVE
View Answer
D) ALL OF THE ABOVE
40. AVR microcontroller executes most of the instruction in
A) SINGLE EXECUTION CYCLE
B) DOUBLE EXECUTION CYCLE
C) BOTH A&B
D) NONE OF THE ABOVE
View Answer
A) SINGLE EXECUTION CYCLE
41. Which one is not element of IOT?
A) PROCESS
B) PEOPLE
C) SECURITY
D) THINGS
View Answer
C) SECURITY
42. ____ is a collection of standards for LR-WPANs.
A) IEEE802.3
B) IEEE802.11
C. IEEE802.16
D. IEEE 802.15.4
View Answer
D. IEEE 802.15.4
43. LOWPAN stands for
A) 6 LOW PERSONAL AREA NETWORK
B) IPV6 LOW PERSONAL AREA NETWORK
C) IPV6 OVER LOW POWER WIRELESS PERSONAL AREA NETWORK
D) NONE OF ABOVE
View Answer
C) IPV6 OVER LOW POWER WIRELESS PERSONAL AREA NETWORK
44. XMPP is used for streaming which type of elements?
A) XPL
B) XML
C) XHL
D) MPL
View Answer
B) XML
45. ___ is a data-centric middleware standard for device-to-
device and machine-to machine communication.
A) DATA DISTRIBUTION SERVICED(DDS)
B) ADVANCE MESSAGE QUEUING PROTOCOL(AMQP)
C) EXTENSIBLE MESSAGING AND PRESENCE PROTOCOL(XMPP)
D) MESSAGE QUEUE TELEMETRY TRANSPORT(MQTT)
View Answer
A) DATA DISTRIBUTION SERVICED(DDS)
46. ___ is suitable for IOT applications to have low latency
or high throughput requirements.
A) REST
B) PUBLISH-SUBSCRIBER
C) PUSH-PULL
D) WEBSOCKET
View Answer
D) WEBSOCKET
47. Which characteristics involve the facility the thing to
respond in an intelligent way to a particular situation?
A) INTELLIGENCE
B) CONNECTIVITY
C) DYNAMIC NATURE
D) ENORMOUS SCALE
View Answer
A) INTELLIGENCE
48. In the past, the method for expressing an opinion has
been to frame a question based on available factual
evidence.
A) HYPOTHETICAL
B) NESTED
C) CHALLENGING
D) CONTRADICTORY
View Answer
A) HYPOTHETICAL
49. What is Digital Forensic?
A) PROCESS OF USING SCIENTIFIC KNOWLEDGE IN ANALYSIS AND
PRESENTATION OF EVIDENCE IN COURT
B) THE APPLICATION OF COMPUTER SCIENCE AND INVESTIGATIVE PROCEDURES
FOR A LEGAL PURPOSE INVOLVING THE ANALYSIS OF DIGITAL EVIDENCE AFTER
PROPER SEARCH AUTHORITY, CHAIN OF CUSTODY, VALIDATION WITH
MATHEMATICS, USE OF VALIDATED TOOLS, REPEATABILITY, REPORTING, AND
POSSIBLE EXPERT PRESENTATION
C) PROCESS WHERE WE DEVELOP AND TEST HYPOTHESES THAT ANSWER
QUESTIONS ABOUT DIGITAL EVENTS
D) USE OF SCIENCE OR TECHNOLOGY IN THE INVESTIGATION AND
ESTABLISHMENT OF THE FACTOR EVIDENCE IN A COURT OF LAW
View Answer
B) THE APPLICATION OF COMPUTER SCIENCE AND
INVESTIGATIVE PROCEDURES FOR A LEGAL PURPOSE INVOLVING
THE ANALYSIS OF DIGITAL EVIDENCE AFTER PROPER SEARCH
AUTHORITY, CHAIN OF CUSTODY, VALIDATION WITH
MATHEMATICS, USE OF VALIDATED TOOLS, REPEATABILITY,
REPORTING, AND POSSIBLE EXPERT PRESENTATION
50. Using what, data hiding in encrypted images be carried
out in digital forensics?
A) ACQUISITION
B) STEGANOGRAPHY
C) LIVE ANALYSIS
D) HASHING
View Answer
B) STEGANOGRAPHY