Sem5 MCQ
Sem5 MCQ
A. Artificial Intelligence
B. Intelligence
C. Artificial Intelligence
D. Rational Intelligence
1
Study of mind and its processes is called
A. Cognitive Science
B. Cognitive Psychology
C. Cognitive Process
D. Cognitive Relativism
2
A. Rational Agent
B. Intelligent Agent
C. AgentPrudent
D. Sagacious Agent
3
When we run a search forward from initial state and other backward from
the goal is called
A. Bidirectional search
B. Random search
C. Recursive BFS
D. BFS
6
11
12
c) user interface
13 d) all of the mentioned
16 The action of the Simple reflex agent completely depends upon __________
a) Perception history
b) Current perception
c) Learning theory
d) Utility functions
What among the following is/are the example of the intelligent agent/agents?
a) Human
b) Robot
c) Autonomous Spacecraft
17 d) All of the mentioned
Which instruments are used for perceiving and acting upon the environment?
a) Sensors and Actuators
b) Sensors
c) Perceiver
18 d) None of the mentioned
A. Gaming
B. Expert Systems
C. Vision Systems
22 D. All of the above
Specify the agent architecture name that is used to capture all kinds of
actions.
a) Complex
b) Relational
c) Hybrid
30 d) None of the mentioned
What will take place as the agent observes its interactions with the world?
a) Learning
b) Hearing
c) Perceiving
40 d) Speech
What will happen if the hypothesis space contains the true function?
a) Realizable
b) Unrealizable
c) Both Realizable & Unrealizable
43 d) None of the mentioned
In which of the following learning the teacher returns reward and punishment
to learner?
a) Active learning
b) Reinforcement learning
c) Supervised learning
49 d) Unsupervised learning
51
A perceptron is a ______________
a) Feed-forward neural network
b) Backpropagation algorithm
c) Backtracking algorithm
58 d) Feed Forward-backward algorithm
The network that involves backward links from output to the input and hidden
layers is called _________
a) Self organizing maps
b) Perceptrons
c) Recurrent neural networkkm
67 d) Multi layered perceptron
b) not pure
c) useful
d) useless
a. Neuron science
b. Maths
c. Computer Science
d. Geology
78
a. High Speed
c. Accuracy
a. Arthur Samule
c. John McCarthy
d. E. F. Codd
80
A. Acting Humanly
B. Acting Rationally
C. Thinking Humanly
D. Thinking Rationally
81
82
______________ program was used to solve the problem of inferring molecular
structure from
The information provided by a mass spectrometer
A. MYCIN
B. DENDRAL
C. SAINT
D. None of the given
A. Learning agent
B. Observing agent
C. Reflex agent
D. None of the mentioned
84
A. Deterministic
B. Rational
C. Partial
D. Stochastic
85
A. Manager
B. Goal Based Agent
C. Simple Reflex Agent
D. Smart Agent
86
A. Perception sequence
B. Agent function
C. Sensors and Actuators
D. Environment in which agent is performing
87
Which is not the commonly used programming language for AI?
A. PROLOG
B. Java
C. LISP
D. Perl
88
A. Acting Humanly
B. Acting Rationally
C. Thinking Humanly
D. Thinking Rationally
89
A. Percept
B. Environment
C. Action
D. Goal
90
A. Uninformed search
B. Informed search
C. Simple reflex search
D. Initial Search
91
A. Uninformed search
B. Blind Search
C. Informed Search
D. Classical Search
92
A. Knowledge
B. Performance measure
C. Database measure
D. Goal measure
94
A. Goal,Start
B. Goal,Problem
C. Path,Goal
D. Path,Problem
95
A. 2
B. 4
C. 5
D. 6
96
Which one of the following is not a part of process for solving problem using
AI?
A. FIFO
B. LIFO
C. FILO
D. Random
98
99
Multiagent environment is also called as ___________
A. Comutitive environment
B. Cooperative environment
C. Collective environment
D. Combine environment
A. John McCarthy
B. Fisher Ada
C. Allen Newell
D. Alan Turning
100
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
Paper 2 LinuxServer Administration
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
10
0
10
1
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10
9
11
0
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0
a) Hardware
b) Programmers
c)Software
2
Select the people who identify the document and verify the correctness of the
software…
a) Project manager
b) SQA team
c) Project team
a) Unit Testing
b) System Testing
c) Integration Testing
6
Who does Alpha testing?
a) Developer’s end
b) User’s end
a) Fix defect
b) Improve quality
c) Measure quality
a) No knowledge of system
a) Code
b) Design
c) Specification
10 d) other
11
When can customer says quality of the product is too good?
a) Software meets its defined specification
c) Detect defects
a) Error
b) Incident
c) Mistake
13 d) Defect
A) Acceptance testing
B) System Testing
C) Unit testing
14 D) Integration testing
15
What is the main purpose of integration testing?
A) Design errors
B) Interface errors
C) Procedure errors
D) None of the above
A) Statement testing
B) Path testing
B) Usability testing
C) Performance testing
17 D) Security testing
20
What is QA?
a) It is the measurement of degree to which a product satisfies the need
d) It is a corrective tool
a) Development of standards
c) Servicing
22 d) Material control
a) Verification
b) Software testing
c) Validation
23 d) Documentation
24
Which document that prescribes the requirements with which the product or
service has to confirm?
A. Reliability
B. Specification
C. Inspection
D. Audit
Which of the following correspond to the two questions 'Are we building the
A. Verification only
Which is a test case design technique that makes use of a knowledge of the
internal program logic?
C. Unit Testing
26 D. None of these
A. Statement coverage
B. Error guessing
27 D. Condition Coverage
28
Which of the following points includes in Test case?
A. Input
29
a) Inspection
b) Testing
c) Walk through
30 d) technical review
a) Developer
b) Designer
c) Tester
d) QA Team
For which of the following activity one needs to execute the product?
a) verification
b) validation
c) both
32 d) none
33
Which of the following is not the phase of SDLC?
A. System Analysis
B. Problem Definition
C. System Design
D. Feasibility Study
35
When Test cases are designed?
a) Test recording.
b) Test configuration.
c) Test planning.
d) Test specification
36
Which 0of the following statements about reviews is true?
a) Reviews should be performed on specifications, code, and test plans
b) Reviews are the least effective way of testing code.
c) Reviews are unlikely to find faults in test plans.
d) Reviews cannot be performed on user requirements specifications
37
Test Conditions are derived from
a) Test Design
b) Test Cases
c) Test Data
d) Specifications
38
Which of the following is false?
a) In a system two different failures may have different severities.
b) A fault need not affect the reliability of a system.
c) A system is necessarily more reliable after debugging for the removal of a fault.
d) Undetected errors may lead to faults and eventually to incorrect behavior.
39
What type of review requires formal entry and exit criteria, including metrics?
a) Management review
b) Inspection
c) Walkthrough
d) Post project review
41
Which of the following techniques is NOT a black box technique?
a) State transition testing
b) Syntax testing
c) LCSAJ
d) Boundary value analysis
42
43
44
45
Which is A testing which checks the internal logic of the program?
C. Inspection
47 D. A and B
Which are the following are the objective of formal technical reviews?
What all attendees can decide At the end of formal technical reviews?
49 E. A and D
50
A review report answers which three questions?
B. What defects were found, what caused defects, who was responsible
C. What was reviewed, who reviewed it, what were the findings
Who identifies, documents, and verifies that corrections have been made to the
software?
a) Project manager
b) Project team
c) SQA group
55 d) All of the mentioned
65 Select what is the primary objective of formal technical reviews to find during
the process so that after the release of the software they do not become the
defect…
a) failure
b) faults
c) errors
d) none of the mentioned
Select the people who identify the document and verifies the correctness of the
software…
a) Project manager
b) SQA team
c) Project team
66 d) All of the mentioned
a) 60,40
b) 70,30
c) 80,20
b)openchart
c)Gantt chart
d)close chart
a) Run chart
b) Bar chart
c) Control chart
a) Failure intensity
b) Testing time
c) Metrics
b) Control
c) Measure
d) Analyse
77
a) customer satisfaction
c) Skill enhancement
d)Environmental issues
78
Which process means identifying, locating and correcting the bugs usually by
running the program?
a) Testing
b) Debugging
c) Validating
82 d) Checking
The cyclomatic complexity V(G) of given flow graph can be computed as:
a) V (G) = E – N + 1
b) V (G) = E – N + 2
c) V (G) = N – E + 1
85 d) V (G) = N – E + 2
88
89
90
91
92
93
94
95
96
97
98
99
10
0
10
1
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10
9
11
0
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0
A. Cryptography
B. Cryptoanalysis
C. both (a) or (b)
1 D. neither (a) nor (b)
A. cipher
B. secret
C. key
A. Substitution
B. Transposition
C. 16
D. 18
a. block
b. stream
c. field
c. DES
d. AES
a. confidentiality
7 b. integrity
Message _______means that the receiver is ensured that the message is coming
from
c. authentication
b. nonrepudiation
A(n) ________ is a trusted third party that assigns a symmetric key to two
parties.
A. KDC
B. CA
C. KDD
10
A. force fully
B. With Permission
C. Without Permission
D . Both A and C
11
Intruder is ____.
A. Action
B. User
C System
D. Data
12
13
A. Insider
B. Outsider
D. Middle
14
D. Stack based.
15
A. Rules Based.
B. Action based
16 D. Stack based.
A. Anomaly detection.
B. Penetration identification.
17 D. Machine based
B. Function in system.
C. Variable in System.
d. Method in system
19
. Connection authentication is offered for ensuring that the remote host has the
likely Internet Protocol (IP) ___________ & _________
a) address, name
b) address, location
c) network, name
20 d) network, location
21
a) Handshake
b) FTP
c) Alert
d) UDP.
22
23 Which protocol is used to transmit error, bad records, system Negotiation failure
alerts to the peer entity?
a) Alert Protocol
b) Handshake Protocol
c) Upper-layer Protocol
Which protocol is used for the purpose of reproducing the pending state into the
Present state?
a) Alert Protocol
b) Handshake Protocol
c) Upper-Layer Protocol
24 d) Change Cipher Spec Protocol
d) Combination Assurances
26
Authority who is trusted to provide public key Certificate to Merchant, Card holder
and Payment gateway?
d) Combination Authority
27
a) Eavesdropping
b) MAC Spoofing
c) Wireless Hijacking
d) Phishing
a) Cyber-crime
b) Cyber Attack
c) System hijacking
d) Digital crime
29
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
30
a) Cracking
b) Cryptanalysis
c) Cryptography
d) Crypto-hacking
31
32 The process of disguising plaintext in such a way that its substance gets hidden
(into what is known as cipher-text) is called _________________
a) cryptanalysis
b) decryption
c) reverse engineering
d) encryption
a) Confidentiality
b) Data Integrity
c) Data Redundancy
d) Authentication
33
a) Rolling Cipher
b) Shift Cipher
c) Playfair Cipher
d) Block Cipher
36
a) Block Cipher
b) One-time pad
c) Hash functions
d) Vigenere Cipher
a) 12
b) 18
c) 9
d) 16
38
a) 128 Bits
b) 32 Bits
c) 64 Bits
d) 16 Bits
39
40
a) Masquerade attack
b) Modification of messages attack
c) Repudiation
d) Replay
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
10
0
10
1
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10
9
11
0
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0
Paper 5
1
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38 6
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68 Mi
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
10
0
10
1
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10
9
11
0
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0
__________ layer of OSI model is responsible for moving the packets from
source to destination.
a)Transport
b)Application
c)Data link
. d)Network
17 ANS)Network
Which layer is used to link the network support layers and user support
layers?
a) Session layer
b) Data link layer
c) Transport layer
d) Network layer
19 ANS)Transport layer
TCP/IP model does not have ______ layer but OSI model have this layer.
a) Session layer
b) Transport layer
c) Application layer
d) Network layer
20 ANS)Session layer
_______ protocol is used to get the physical address from the IP/logical
address.
a)ICMP
b)IGMP
c)RARP
d)ARP
25 ANS)ARP
30 A software that lies between the OS and the applications running on it.
a) Firmware
b) Middleware
c) Utility Software
d) Application Software
ANS) Middleware
RPC provides a _________ on the client side, a separate one for each
remote procedure.
a) Stub
b) Identifier
c) Name
d) Process identifier
35 ANS)Stub
37 __________ and _________ are the two different kinds of classes used in
RMI
a) Remote Classes,Synchronous Classes
b) Request Classes,Serializable Classes
c) Reference Classes,Serializable Classes
d) Remote Classes,Serializable Classes
ANS)Remote Classes,Serializable Classes
What is the correct syntax of the declaration which defines the XML version?
a) <xml version="A.0" />
b) <?xml version="A.0"?>
c) <?xml version="A.0" />
d) None of the above
42 ANS)<?xml version="A.0"?>
SOAP is
Services that may require their context to be preserved from one invocation
to the next are called
Which of the following WCF binding does not support reliable session?
a. wsHttpBinding b. netTcpBinding
56 c. basicHttpBinding d. wsDualHttpBinding
The standard method for storing data that can be transferred easily
from one machine or platform to another is _______.
A) XML
B) SOAP
C) WSDL
D) WCF
63
Data that is in _______ format can pass through many firewalls that
_______ cannot penetrate.
A) binary, text
B) text, binary
C) SOAP, WCF
D) WCF, SOAP
64
The information about the names of the methods, the parameters that
can be passed, and the values that are returned from the functions is
controlled in some Web services by a description specified in _______.
A) XML
B) SOAP
C) WSDL
D) WCF
66
A resource on the Web is uniquely identified by its URI, which means
_______.
A) Uniform Resource Identifier
B) Universal Registered Identifier
C) Uniform Registered Identifier
D) Universal Resource Identifier
67
You’ve created a new class in your .NET project that contains a wide
variety of operations grouped together to form part of a Server
Contract. You now need to add an attribute to the class to define it as a
service contract. Which attribute should you use?
A. OperationContractAttribute
B. DataMemberAttribute
C. DataContractAttribute
D. ServiceContractAttribute
72
To rename a Web Service you need to change only the name in the
Solution Explorer.
A) True
B) False
80
87
JSON stands for ____________________
88
89
a) Apache CFX
b) Jersey
c) RESTEasy
d) Sun
Ans : d) Sun
90
b) Data type
c) Message
d) All of above
92
The SOAP protocol can work any programming language based applications
on both
__________________ platform
93
B - Service Requestor
C - Service Registry
D - Service Locator
A- Struts Service
B- Web Service
C- Java Service
D- Browser Action
B- Authorization
C- Confidentiality
D- Integrity
Ans: C- Confidentiality
97 Ans: A- True
What is DISCO?
A- Data System
B- Data
C- Discovery
D- Distance
98 Ans: C- Discovery
B- MIME
C- SOAP
D-HTTP/GET
99 Ans: B- MIME
B- SOAP Footer
C- SOAP Envelope
D- SOAP Body
10
0 Ans: B- SOAP Footer
B- Server
C- Browser
D- None of these
B- Non- Persistent
C- Either a or b
D- None of these
10
6 Ans: A- Persistent
B- XML
C- UDDI
D- None of these
10
7 Ans: B- XML
B-XML
C-XSL
D-XSLT
10
8 Ans: B-XML
B- Programming Language
C- Services
D-internet
10
9 Ans: B- Programming Language
11 The Web services can not offer the application components like:
0 A- Currency Conversion
B- Weather Reports
C- The Language Translation
D- Web Browsers
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0
2D stand for
a Two-Dimensional
b Two-Diamond
c Two-Diagram
d All of the above
1
3D Vector Have
a XYZ Plane
b XY Plane
c Both a &b
d None of the above
2
GPU uses
a CPU
b Bus
c Serial card
d Graphics Card
4
Euler’s Rule Defined as
a Faces+Vertices=edges+2
b Faces+2Vertices=edges
c 2Faces+Vertices=2edges
d Faces+Vertices=2edges
5
If u · v > 0,
a. then the angle θ between the two vectors is less than 90 degrees
(i.e., the vectors make an acute angle).
b. the angle θ between the two vectors is greater than 90 degrees (i.e.,
the vectors make an obtuse angle).
c. then u ⊥ v (i.e., the vectors are orthogonal).
d. None of the above
11
12
13
a. linear interpolant
b. Non-Linear Interpolation
c. Cubic Interpolation
15 d. Trigonometric Interpolation
a. DirectX
b. DirectCompute
c. CPU
17 d. GPU
a. Face normal
b. Vertex normal
c. Surface normal
18 d. Normal
Which stage reads geometric data from memory & uses it to assemble
geometric primitives?
a. Tessellator stage
b. Output merger stage
c. Input assembler stage
21 d. Vertex shader stage
a. Front buffer
b. Shader
c. Depth buffering or z- buffering
22 d. Vertex buffer
23 The _________________ is a texture that does not contains image data but
contains depth information about a particular pixel.
a. Front buffer
b. Vertex buffer
c. Depth buffer
d. Back buffer
In _________________ the image color is computed once per pixel and that
color is replicated into all visible sub pixels that are covered by the polygon.
a. Sampling
b. Multisampling
c. Supersampling
24 d. subsampling
a. Sampling
b. Multisampling
c. Supersampling
25 d. subsampling
a. Rendering pipeline
b. Blending
c. Lighting
26 d. Texturing
Which stage reads geometric data like vertices and indices from memory and
uses it to gather geometric primitives like triangles, lines?
The difference between a triangle list and strip is that the triangle list may be
_____________, while a triangle strip assumes they are ____________.
a. Disconnected, connected
b. Connected, disconnected
c. Connected, distributed
28 d. Directed, undirected
29 After assembling the primitives the vertices are given to the __________.
a. Pixel Shader Stage
b. Vertex Shader Stage
c. Input Assembly Stage
d. Blending
Unity is ?
a. Game engine
b. Photo Editor
c. Gimp
d. ProBuilder
32
35
Cache means .
a. Speed up the game
b. Speedup processing
c. Speed uploading
46 d. speed down the game
The allows users to modify numeric values (such as position, rotation and
scale), drag and drop references of scene objects.
a. Render panel
b. Inspection Panel
c. Scripts
d. None
56
58
The “overdrawn” mode helps the user to profile the number of pixels being
rendered in the
.
a. Different area
b. Current section
c. Whole project
d. Same area
59
33. Pixel shader is a script that runs for each ___ after three vertices are
processed in a mesh’s triangle.
a. Fragments
b. Coordinates
c. Panel
d. Script
61
Capabilities of unity.
a. AAA game quality
b. Physics
c. 2D 3D support
d. All
63
25. The panel contains references to the objects that exist, or will exist,
when the application is ____.
a. https://docs.google.com/document/d/1GQW-
GGGoLYgw8dXuQPDf4c6MbJSapbP9dJCyulNUxms/edit#bookmark=id.p6qk
6m2nedxfCreated
b. Executed
c. Runs in debug
d. None
68
If light hits on rough surface, then the ray of the light scatter in different
random directions and it is called a_______________.
a. Ambient lighting
b. Spot lighting
c. Diffuse lighting
71 d. Specular lighting
In 2D-translation, a point (x, y) can move to the new position (x’, y’) by using the
equation:
a. x’=x+dx and y’=y+dx
b. x’=x+dx and y’=y+dy
c. X’=x+dy and Y’=y+dx
74 d. X’=x-dx and y’=y-dy
Unity calls this method 60 times per second (i.e 60 frames per second):
a. Update()
b. Start()
c. Init()
77 d. Run()
___________ allow game objects to act under the control of Physics Engine.
a. Animation
b. Rigid Body
c. Script
80 d. Controller
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
10
0
10
1
10
2
10
3
10
4
10
5
10
6
10
7
10
8
10
9
11
0
11
1
11
2
11
3
11
4
11
5
11
6
11
7
11
8
11
9
12
0
12
1
12
2
12
3
12
4
12
5
12
6
12
7
12
8
12
9
13
0
13
1
13
2
13
3
13
4
13
5
13
6
13
7
13
8
13
9
14
0
14
1
14
2
14
3
14
4
14
5
14
6
14
7
14
8
14
9
15
0