100% found this document useful (1 vote)
2K views4 pages

Digital Fluency Test-02

The document contains a 30 question digital fluency test covering topics like IoT architecture, security methods, machine learning techniques, artificial intelligence, cloud computing, communication skills, and more. Test takers are required to select the correct answer from multiple choice options for each question.

Uploaded by

Sanjeevene
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
2K views4 pages

Digital Fluency Test-02

The document contains a 30 question digital fluency test covering topics like IoT architecture, security methods, machine learning techniques, artificial intelligence, cloud computing, communication skills, and more. Test takers are required to select the correct answer from multiple choice options for each question.

Uploaded by

Sanjeevene
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

DIGITAL FLUENCY TEST - 02

1. Arrange the four stages of loT Architecture in right order.

A. Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems,
Edge IT
B. Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center
and Cloud
C. Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud,
Edge IT
D. Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and
Cloud

2. Which of these is NOT a shortcoming of the two traditional security methods, Risk
Assessment and Identifying Vulnerabilities, and Correlation Rules?

A. Handle Zero-Day Attacks


B. Slower incident response
C. Inability to deal with unique events
D. False positives

3. State True or False: "Prioritizing listening over speaking is an important aspect while
communicating."

A. True
B. False

4. …………..uses the classification process to identify data assets and clustering to group data into
distinct parts.

A. Semi-supervised Learning
B. Supervised Learning
C. Reinforcement Learning
D. Unsupervised Learning

5. Which of these attacks is a 'Smurf attack' ?

A. One where the attack causes the length and fragmentation offset fields in sequential Internet
Protocol (IP) packets to overlap one another on the attacked host
B. One where the Botnets (millions of systems infected with malware) under hacker control carry out
DDoS attacks
C. One where the attack involves use of IP spoofing and the ICMP to saturate a target network
with traffic
D. One where the attacker exploits the use of the buffer space during a Transmission Control
Protocol session initialization handshake

6.The primary purpose of …………….is to scale the scope of data and to make predictions of
unavailable, future or unseen data based on labeled sample data.

A. Reinforcement Learning
B. Supervised Learning
C. Unsupervised Learning
D. Semi-supervised Learning
7. Which of the following is the Smart city that is utilizing the loT technology to help its
residents?

A. Mumbai
B. Palo Alto
C. Colorado

8. Which of the following neural networks are made up of neurons and have learnable weights
and biases?

A. Hopfield Networks
B. Boltzmann Machine Networks
C. Feedforward Neural Networks
D. Convolutional Neural Networks
E. Recurrent Neural Networks

9. Which emerging technology provides scalable architecture for business needs?

A. Robotic Process Automation


B. Cloud Computing
C. Cybersecurity

10. Divergent Thinking focuses more on:

A. Generation of a single idea


B. Narrowing down multiple ideas into one solution
C. Generation of multiple ideas and the connections between them

11. Which of the following are the benefits of Big Data in Healthcare? (Select all that apply.)

A. Create a holistic, 360-degree view of consumers, patients, and physicians


B. Prevention of identification of patterns in health outcomes
C. Boost marketing efforts with information about consumer, patient, and physician needs and
preferences

12. Which of the following is a major cause of passive thinking?

A. Criticisms
B. Rationalizing
C. Routine

13. What of the following are the examples of strong Al?

A. Visual Perception and Speech Recognition


B. Data Analytics and Data Visualization
C. Siri and Alexa

14. State True or False: "Skepticism is one of the major barriers to the process of Critical
Thinking."

A. True
B. False

15. Which of the following steps should be taken to make Cybersecurity effective in any
establishment? (Select all that apply.)
A. Find vulnerabilities across open-source code, third-party APIs and cloud-based solutions
B. Ensure data veracity
C. Block the visibility of data assets on data centers and private clouds

16. State True or False: "The process of Design Thinking does not stop even after the
deliverable is complete."

A. True
B. False

17. Which of the following is NOT a Big Data Analytics service or tool?

A. Talend
B. AWS
C. Apache Storm

18. State True or False: "Mandating Collaboration in a team is a good idea to enhance
teamwork."

A. True
B. False

19. What is a Cybersecurity framework?

A. A comprehensive set of guidelines that help organizations define cybersecurity policies to assess
their security risk due to usage of other technologies and replace them with safer alternatives.
B. A comprehensive set of guidelines that help organizations define cybersecurity policies to assess the
scope of the use of their digital set-up in the face of cyberattacks and limit this usage to core users.
C. A comprehensive set of guidelines that help organizations define cybersecurity policies to
assess their security posture and increase resilience in the face of cyberattacks.

20. Which of the following methods will enable you to become an engaged listener? (Select all
that apply.)
A. Noting down points during communication
B. Ignoring the non-verbal signals
C. Favouring your right ear while listening
D. Focusing fully on the speaker

21. State True or False: "Iteration is a fundamental part of Design Thinking."

A. True
B. False

22. Which of the following Internet of Things (IoT) enabled feature has not been incorporated
by Kia Motors in its new car?

A. Auto Driving
B. Al Voice Command
C. Auto Collision Notification

23. Artificial Intelligence (Al) that exhibits and performs some aspect(s) of human intelligence
extremely well, however, lacks in other areas is called…………………………………

A. Broad Al
B. Transparent Al
C. General AI
D. Narrow Al

24. State True or False: "Cloud services are disaster tolerant but expensive."

A. True
B. False

25. Which technology can create a digital twin, which is a virtual representation of a factory,
product, or service?

A. Cloud Computing
B. Artificial Intelligence
C. Robotic Process Automation

26…………….allows networks to adjust their hidden layers of neurons in situations where the
expected outcome is not achieved.

A. Convolutional Neural Network


B. Backpropagation
C. Feed Forward Neural Network
D. Recurrent Neural Network

27. State True or False: "Forming assumptions is a good step in the process of Creative Problem
Solving."

A. True
B. False

28. Clustering and Dimensionality reduction techniques are used in …………………………

A. Reinforcement Machine Learning


B. Unsupervised Machine Learning
C. Supervised Machine Learning
D. Semi-supervised Machine Learning

29. State True or False: "It is more important to frame your message rather than setting the
context while communicating."

A. True
B. False

30. Which of the following Cloud Computing offering enables users to develop, manage and
deliver applications?

A. Software as a service (SaaS)


B. Infrastructure as a service (laaS)
C. Platform as a service (PaaS)

You might also like