Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
300 views
24 pages
Digital Fluency Notes MCQ
B.com NEP df important MCQ
Uploaded by
taahanaganur
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save digital fluency notes MCQ For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
300 views
24 pages
Digital Fluency Notes MCQ
B.com NEP df important MCQ
Uploaded by
taahanaganur
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save digital fluency notes MCQ For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save digital fluency notes MCQ For Later
You are on page 1
/ 24
Search
Fullscreen
waangaiure UuaverDiLy Skill Enhancement Course- Digital Fluency COMMON TO ALL COURSES QUESTION BANK PART-A Multiple choice questions on Artificial Intelligence 1) Artificial Intelligence is about _ a) Playing a game on Computer b) Making a machine Intelligent c) Programming on Machine with your Own Intelligence d) Putting your intelligence in Machine Answer: b 2) Who is known as the Father of AI? a) Fisher Ada b) Alan Turing ) John McCarthy ) Allen Newell Answer: ¢ 3) Select the most appropriate situation for that a blind search can be used. a) Real-life situation b) Small Search Space c) Complex game 4) All of the above Answer: b 4) The application/applications of Artificial Intelligence is/are a) Expert Systems b) Gaming c) Vision Systems d) All of the above Answer: d 5) If a robot is able to change its own trajectory as per the extemal conditions, then the robot considered as the a) Mobile b) Non-Servo c)Open Loop _ dd) Intelligent Answer: d 6) Which of the given language is not commonly used for Al? a) LISP b) PROLOG c) Python d) Perl Answer: d 7). A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence is known as the a) Boolean Algebra b) Turing Test ¢) Logarithm d) Algorithm Answer: b 8) The component ofan Expert system is___ a) Knowledge Base b) Inference Engine c) User Interface d) All of the above Answer: d9) Which algorithm is used in the Game tree to make decisions of Win/Lose’? a) Heuristic Search Algorithm b) DFSIBFS algorithm ¢) Greedy Search Algorithm d) Min/Max algorithm Answer: d 10). What is the full form of “AI”? a) Attificially Intelligent b) Artificial Intelligence c) Attificially Intelligence d) Advanced Intelligence Answer: b 11). Which of the following is the branch of Artificial Intelligence? a) Machine Learning b) Cyber forensics ¢) Full-Stack Developer d) Network Design Answer: a 12). Which of the following is a component of Artificial Intelligence? a) Leaming b)} Training c) Designing d) Puzzling Answer: a 13) Ways to achieve Al in real-life arc. : a) Machine Leaming b) Deep Learning c) Botha&b d) None of the above Answer: 14). The main tasks of an AI agent are. a) Input and Output b) Moment and Humanly Actions c) Perceiving, thinking, and acting on the environment d) None of the above Answer: ¢ 15). The best Al agent is one which. a) Needs user inputs for solving any problem b) Can solve a problem on its own without any human intervention c) Needa similar exemplary problem in its knowledge base d) All of the above Answer: b16. The process of training a Neutral Network is: a. Model — Train — Training Data — Test and Update. b. Train — Model — Prediction ~ Test and Update. c. Training Data — Model — Predict — Test and Update. d. Model — Train — Prediction — Test and Update. Ans: ¢ 17. Which of the following is not an application of artificial intelligence? a. Face recognition system b. Chatbots c. Natural language Processing d. DBMS Ans: d 18. Which of the following is an example of deep leaming? a. Self-driving cars b. Pattern recognition c. Natural language processing. All of the above Ans: d 19. Convolutional Neural Network is used in- ‘A. Image classification B, Text classification C. Computer vision D. All of the above Ans: d 20. What is machine learning ? A. Machine learning is the science of getting computers to act without being explicitly programmed. B. Machine Learning is a Form of Al that Enables a System to Learn from Data. C. Both A and B D. None of the above Ans:c 21. The categories in which Machine learning approaches can be traditionally categorized are ‘A. Supervised learning B. Unsupervised learning C. Reinforcement learning D. All of the above Ans: d 22. The Real-world machine leaming use cases are 5 A. Digital assistants B. Chatbots C. Fraud detection D. Alll of the above Ans: d 23. Which of the following is an advantage of artificial intelligence? a. Reduces the time taken to solve the problem b. Helps in providing security c. Have the ability to think hence makes the work easier d. All of the above Ans:d24. What the first layer in neural network is called? A. input layer B. output layer C. hidden layer D. None of the above Ans: a 25. is used as an input to the machine learning model for training and prediction purposes. a. Feature b. Feature Vector c. Both A and B d. None of the above Ans: b 26. In.a Deep Learning System, cach connection between Neurons is association with a: a. Length. b. Weight. c. Function. d. None of the Above Ans: b. 27. Apple's, Siri, Amazon's, Alexa, Microsoft Cortana and Google Assistant's are a. Digital Assistant’s B. Neural Networks C. Data Base Systems D. Machine Learning Tools Ans: a Multiple choice questions on Database management and Big Data Analytics 1) Which of the following is generally used for performing tasks like creating the structure of the relations, deleting relation? a) DML (Data Manipulation Language) b) Query c)Relational Scher d) DDL (Data Definition Language) Answer: d 2) Which of the following provides the ability to query information ffom the database and insert tuples into, delete tuples from, and modify tuples in the database” a) DML (Data Manipulation Language) b) DDL (Data Definition Language) c) Query d) Relational Schema Answer! a 3) A Database Management System is a type of software. a) It is a type of system software b) It is a kind of application software ©) Itis a kind of general software d) Both A and C Answer: a 5) Which of the following is the Big Data Analytic tool ? a) Apache Hadoop b) MongoDB_ c) Microsoft Azure d) All of the above Answer: d 6). What are the main components of Big Data? {2} MapReduce “(bHDES c) YARN d) All of these Answer: d7). What are the different features of Big Data Analytics? a) Open-Source { 5 Scalability (c} Data Recovery (d) All the above Answer: d 8). What are the four V’s of Big Data? (a) Volume (b) Velocity c) Variety’ ‘d) All thé above nswer: 9). The examination of large amounts of data to see what patterns or other useful information can be found is known as (a) Data examination {b) Information analysis } Big data analytics 'd) Data analysis Answer: ¢ 10). Big data analysis does the following except {a) Collects data ¢b) Spreads data ‘c) Organizes data (d) Analyzes data Answer: b 11). The new source of big data that will trigger a Big Data revolution in the years to come is (a) Business transactions 'b) Social media & Transactional data and sensor data (d) RDBMS Answer: ¢ 12) The word 'Big data’ was coined by ‘a) Roger Mougalas 'b) John Philips {c) Simon Woods {d) Martin Green Answer: a 13) Concerning the Forms of Big Data, which one of these is odd? (a) Structured (b) Unstructured ic) Processed Scmi-Structured Answer: c 14) Big Data applications benefit the media and entertainment industry by ® Predicting what the audience wants Ad targeting (c) Scheduling optimization (d) All of the above Answer: d 15). The feature of big data that refers to the quality of the stored data is a) Variety b) Volume c) Variability (d) Veracity Answer: d16. Data science is the process of diverse set of data through ? ‘A. organizing data B. processing data C. analysing data D. All of the above Ans: D 17. Which of the following language is used in Data science? AC BCH CR D. Ruby Ans: C 18, Unstructured data is not organized. A. TRUE B. FALSE C. Can be true or false D. Can not say Ans: A. 19. Which of the following is a data visualization method? A. Line B. Triangle C. Pie chart and Bar Chart D. ‘Pentagon Ans: C 20. RDBMS store data in the form of tables with most commercial RDBMS using. a. SQL B. Apache C. work fusion D. Mango DB Ans:A 21. Select the order of the Big Data Analytics process. a. Information, Data, Analysis, Insight b. Data , Information, Insight, Analysis c. Data, Insight, Analysis, Information d. Data, Analysis , Insight , Information 22. refers to the quality of information or data . Volume B. Variety C. Velocity D. Veracity is the process of taking row data, transforming it into to graphs, charts, images and videos. A. Datamining _B. Data visualisation C. Data warehouse _D. Data Analytics ‘Ans: B 2A. Which of the following is not Big Data tool? ‘A. Apache Hadoop B. Apache Kafka C. Apache Tomcat D. Apache Zookeeper Ans: C 25. The technology solution used to optimize and manage the storage and retrieval of data from databases is called A. Database management system B. Datastore management system C. Big data analytics D.1OT Ans: A26. Which one of the following is not included in four Vs of Big data analytics? a) Volume ) Veracity — c) Variety) Vicinity Ans: D 27. In the Healthcare Industry, AI has disrupted. A Medical imaging. B.Surgery. C.Physiological Diagnosis. D.None of these. Ans: A Multiple choice questions on Internet of things 1) How many numbers of the element in the open IoT architecture? a) Four elements b) Five elements c) Sixelements__d) Seven elements Answer: d) 2) Which of the following is the way in which an IoT device is associated with data? a) Internet —_b) Cloud c) Automata 4) Network Answer: b) 3) Which of the following IoT networks has a very short range? a) Short Network b) LPWAN c) SigFox d) Short-range Wireless Network ‘Answer: d) 4) What is the full form of the LPWAN? a) Low Protocol Wide Area Networkb) Low Power Wide Area Network c) Long Protocol Wide Area Networkd) Long Power Wide Area Network Answer: b) 5) An JoT network is a collection of devices. a) Signal b) Machine to Machine c) Interconnected d) Network to Network Answer: c) 6) Which one of the following is not an IoT device? a) Amazon echo voice controller b) Google Home c) Nest Smoke Alarm d) None of these Answer: d) 7) What is the main purpose of WoT (Web of Things) in the loT? a) Improve the usability and interoperability b) Reduce the security ©) Complex the development d) Increase the cost Answer: a) 8) What is the Arduino UNO? a). Software b). Hardware device c). Network — d). Protocol Answer: b)9) __allows the user to control electronic components. a) Android API. b) RETful API c) MQTT API d) CoAP API Answer: b) 10) Which of the following is not an application of loT? a) Wearables b) Smart Grid c) Arduino 4) Smart City Answer: c) 11) What is the real example of a smart grid device in loT? a) Mobile phone b) Television ©) Smart Speaker d) Smart Meters Answer: d) 12). What is the full form of ICT? a) InterConnect Technology b) Internet Connection Topology c) Information and Communication Technology d) Infer Communication Topology Answer: c) 13) Which of the following devices is used to measure the gases or liquid? a) Optical Sensor b) Gas Sensor c) Smoke Sensor d) Pressure sensor ‘Answer: d) 14). What is the full form of HDLC? a) Higher Data Level Communication b) Higher Data Link Communication c) High-level Data Link Control d) High Data Level Control Answer: c) 15). What is the full form of HART? a) Highway Application Remote Transport b) Highway Addressable Remote Transducer c) High Address Reduce Transport d) High Application Remote Transport ‘Answer: b) 16. are the applications of IOT a) House b) Virtual environment c) Regional office d) Allofthe above Ans: d)17. are the main components in JOT a) Low power embedded systems b) Cloud computing ¢) Availability of big data, networking connection d) Allof the above Ans: d) 18. are the characteristics of OT a) Intelligence, scalable b) Security c) Heterogeneity d) Allof the above Ans: d) 19. What is loT? a) network of physical objects embedded with sensors b) network of virtual objects c) network of objects in the ring structure d) network of sensors Ans: a 20. Which of the following category is used for business to consumer process? a, Group [oT b. Community loT c. Personal loT d. Industrial loT Answer : d) 21. Who coined the term IoT? a) IBM b) Kevin Ashton ¢) Ross thaka d) Guido van Rossum Ans: b) 22. HoT stands for . a. Intense Internet of Things b. Index Intemet of Technology c. Industrial Intemet of Things d. Incorporate Internet of Technology Ans: c) 23. Identify among the following which is not a fundamental component of loT system. a) User interface b) Sensors c) Transformer d) Connectivity and data processing Ans: c)24. Identify the protocol used to link all devices in IoT, a) UDP b) TCP/IP c) HTTP d) Network Ans: b) 25. The term “TCP/IP” stands for : a. Transmission Contribution protocol/ internet protocol. b. Transmission Control Protocol/ internet protocol. c. Transaction Control protocol/ internet protocol. d. Transmission control Protocol/ internet protocol. Ans: b. Multiple choice questions on Cloud Computing 1) What type of computing technology refers to services and applications that typically run ona distributed network through virtualized resources? a) Distributed Computingb) Cloud Computing c) Soft Computingd) Parallel Computing Answer: b) 2) Which one of the following options can be considered as the Cloud? a) Hadoopb) Intranet ) Web Applicationsd) All of the above Answer: a) 3) Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as resources to users. a) Realb) Cloud ©) Virtual ) none of the above Answer: c) 4) Which one of the following cloud concepts is related to sharing and pooling the resources? a) Polymorphism b) Virtualization c) Abstraction d) None of the above Answer: b) 5) Which one of the following statements is not true? a) The popularization of the Internet actually enabled most cloud computing systems. b) Cloud computing makes the long-held dream of utility asa payment possible for you, with an infinitely scalable, universally available system, pay what you use. c) Soft computing addresses a real paradigm in the way in which the system is deployed. d) All of the above Answer: ¢) 106) Which one of the following can be considered as a utility is a dream that dates from the beginning of the computing industry itself? a) Computing) Model c) Softwared) All of the mentioned Answer: a) 7) Which of the following is an essential concept related to Cloud? a) Reliabilityb) Abstraction ) Productivityd) All of the mentioned Answer: b) 8). Which one of the following is Cloud Platform by Amazon? a) Azure b) AWS c) Cloudera c) All the above Answer: b) 9). Which of the following statements is not true? a) Through cloud computing, one can begin with very small and become big in a rapid manner b) All applications benefit from deployment in the Cloud. c) Cloud computing is revolutionary, even though the technology it is built on is evolutionary. d) None of the above Answer: b) 10) Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc. a) Service Development b) Quality of service ¢) Plan Development d) Technical Service Answer: b) 11) Which of the following provides the Graphic User Interface (GUI) for interaction with the cloud? a) Client b) Client Infrastructure ©) Application d) Server Answer: b) 12) Which one of the following a technology works behind the cloud computing platform? a) Virtualization b) SOA (Service-Oriented Architecture) c) Grid Computing d) All of the above Answer: d) 1.13) Which of the following is the correct full form of SaaS? a) Storage-as-a-Service b) Server-as-a-Software c) Software-as-a-Service d) None of the above Answer: ¢) 14). Which of the following is a characteristic of the SaaS applications? 1a) SaaS applications are reliable b) SaaS applications are not customizable &) SaaS applications ae customizable d) Non-reliable Answer: c) 15) Which one of the following statements is not true about SaaS? a) SaaS applications are offered in all shapes and sizes. b) Allusers with a little knowledge or know how to operate a computer also know about the SaaS. c) SaaS software is not customizable. 4) None of the above Answer: d) 16. The response time and transit time is used to measure the ofa network. a. Security. b. Longevity. c. Reliability. d. Performance. Ans: d. 17. Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit? a. Reliability. b. Performance. c. Security. d. Longevity. Ans: d. 18. In the computer networks, the encryption techniques are primarily used for improving the Security. . Performance. Reliability. Longevity. Ansa: ¢ 19. Who is the father of cloud computing? a) Sharon B. Codd b) Edgar Frank Codd c) LCR. Licklider d) Charles Bachman Answer: ¢ pegs 1220. Which of the following is not a type of cloud server? a) Public Cloud Servers b) Private Cloud Servers c) Dedicated Cloud Servers d) Merged Cloud Servers ‘Ans: d) 21. Which of the following are the features of cloud computing? a) Security b) Availability c) Large Network Access d) All of the mentioned Answer: d 22. Which of the following is the application of cloud computing? a) Adobe b) Paypal c) Google G Suite d) All of the above Answer: d 23. Which of the following is an example of the cloud? a) Amazon Web Services (AWS) b) Dropbox c) Cisco WebEx d) All of the above Answer: d 24. Applications and services that run on a distributed network using virtualized resources is known as a) Parallel computing b) Soft computing c) Distributed computing d) Cloud computing Answer: d 25. Which of the following is the Cloud Platform provided by Amazon? a) AWS b) Cloudera c) Azure d) All of the mentioned Answer: a 26. Choose the correct IaaS provider among the following. a) EC2 b)-ECI c) ECIO d) Hybrid Answer: A 1327. Choose among the following, which are the characteristics of laaS. a). Highly scalable b) Flexible and dynamic platform c) Facilitates hardware access to many users d) All of the above Answer: D Multiple Choice question on Cyber Security 1) In which of the following, a person is constantly followed /chased by another person or group of several people? a) Phishing b)Bulling c) Stalking d) Identity theft Answer: ¢) 2). Which one of the following can be considered as the class of computer threats? a) Dos Attack b) Phishing” c) Soliciting —d) both a) and c) ‘Answer: a) 3). Which of the following is considered as the unsolicited commercial email? ‘a) Virus b) Malware c) Spam) all of the above Answer: c) 4)Which of the following usually observe cach activity on the intemet of the victim, gather all information in the background and send it someone else? a)Malware b) Spyware c) Adware —d) Alllof the above nswer: 5) - is a type of software designed to help the user to detect the viruses and avoid them. a) Malware b) Spyware c) Antivirus) Both b) and c) Answer: c) 6) Which one of the following is a type of antivirus program? a) Quick healb) Mcafee —_c) Kaspersky d) All of the above Answer: d) 7) It can be a software program or a hardware device that filters all data packets coming through the intemet ora network etc., it is known as the a) Antivirus b) Firewall c) Cookies d) Malware Answer: b) 8) Which of the following refers to stealing one's idea or invention of others and use it for their own benefits? a)Piracy —_b) Plagiarism c) Intellectual property rights d) All of the above Answer: d} 9) Which of the following refers to exploring the appropriate, cthical behaviors related to the online environment and digital media platform? a)Cyberlaw —b) Cyberethicsc) Cybersecurity _d) Cybersafety Answer: b} 1410) Which one of the following usually used in the process of Wi-Fi-hacking? a) Airerack-ng b) Wireshark c) Norton d) Allof the above Answer: a) 11) Insystem hacking, which of the following is the most crucial activity? a) Information gathering b) Covering tracks c) Cracking passwords d) None of the above Answer: c) 12). To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system. a) Antivirus b) Firewall ©) Vic player d) Script Answer: b) 13). Which of the following can be considered as the elements of cyber security? a) Application Security b) Operational Security c) Network Security d) Allofthe above Answer: d) 14) Which one of the following is also referred to as malicious software? a) Maliciousware b) Badware c) Ilegalware d) Malware Answer: d) 15) Hackers usually used the computer virus for purpose. a) To log, monitor each and every user's stroke b) To gain access the sensitive information like user's Id and Passwords c) To corrupt the user's data stored in the computer system d) Allofthe above Answer: 16. Which one of the following is a type of antivirus program? a. Quick Heal b. Mcafee. c. Kaspersky. d. All of the above. Answer: d. 1s17. Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform? a. Cyber Low. b. Cyber ethics. c. Cybersecurity. d. Cyber safety. Answer: b 18. Which one of the following refers to the technique used for verifying the integrity of the message? a. Digital Signature. b. Decryption algorithm. c. Protocol. d. Message Digest. Ans: d. 19. Which one of the following usually used in the process of Wi-Fi hacking? a. Aircrack-ng b. Wireshark. c. Norton Ans: a. 20. In ethical hacking and cyber security, there are types of scanning: al b. 2 c. 3 d. 4 Ans: c 21. Which of the following is not a type of scanning? a. Xmas Tree Scan. b. Cloud Scan. c. Null Scan. d. SYN Stealth. Ans: b. 22. In system hacking, which of the following is the most crucial activity? a. Information gathering. b. Covering tracks. c. Cracking passwords. d. None of the above. Ans: c. 1623. Which of the following are the types of scanning? a. Network, vulnerability, and port scanning. b. Port, network, and services. c. Client, Server, and network, d. None of the above. Ans: 24. To protect the computer system against the hacker and different king of viruses, one must always keep on in the computer system. a. Antivirus. b.Firewall. c. VLC Player. d. Script. Ans: b. 25. Which of the following can be considered as the clements of cyber security? a. Application Security. b. Operational Security. c. Network Security. d. All of the above. Ans: d. 26. Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? DDos and Derive-by Downloads. Malware &Malvertising. Phishing and Password attacks. d. All of the above. Ans: d. 2T. Which one of the following is also referred to as malicious software? a. Maliciousware. b. Badware. c. Illegalware. d. Malware. Ans: d. 28. Hackers usually used the computer virus for purpose. a. To log, monitor each and every user’s stroke. b. To gain access the sensitive information like user’s Id and Passwords. c. To corrupt the uscr’s data stored in the computer system. d. All of the above. Ans: d. 29. In Wi-Fi Security, which of the following protocol is more used? a. WPA. —b. WPA2. c.WPS. d. Both A and C Ans: b. e oP 7Multiple Choice question on Communication Module (Module -3) 1. Word communication is derived from Latin word A) Communicate B) Communicare C) Compute D) Computer Answer B 2. Types of words used for verbal communication? A) Acronyms B) Simple C) Technical D) Jargons Answer B 3. Which of the following shows a positive facial expression? A) Frowning while concentrating B) Maintaining eye contact C) Smiling continuously D) Rolling up your eyes Answer B 4. is a communication between small groups of individuals, typically in a face-to-face setting a. Inter-personal communication b. Intra Personal communication c. Mass communication d. None of these Answer A 5. Which of the following is not a component of effective communication? a. Source b. Message c. Channel d. Time Answer D 6. is the way in which a message or messages travel between source and receiver a. Source b. Message c. Channel d. Receive Answer C 187. The abilities to communicate properly are: Aj read B) write C) speak D)all of these Answer D 8. Which method is good for taking leave in the office. A) Website B) Posters C) e-mail D) business meetings Answer C 9. The word Commiinicare means in Latin. Ato deliver B) to share C) to present D) to sacrifice Answer B 10. To understand the message properly the receiver need to the message properly. A) transmit B) throw C) listen D) ignore Answer C 11. What is the final step in the communication cycle? A) Encoding B) Decoding C) Feedback D) Receiving Answer C 12. The process in which the receiver interprets and understands the message is called A) Decoding B) Encoding C) Feedback 1D) None of these Answer A 13. Which of the following is an example of oral communication? A) Newspapers B) Letters C) Phone call D) e-mail Answer C 1914. “Two girls talking over a phone” ~is an example of... A) interpesonal communication B) written communication C) small group communication D) public communication Answer A 15, Pointing finger to something is an example of. A Expressions B) Gestures ©) Body Language D) Para Language Answer B 16. The response to a sender’s message is called as Transmission a. b. Message c. Channel d. Feedback Answer D 17. Communication is a non-stop, a. Programme b. Plan c. Process d Play Answer C 18. Which of the following listens or understands the message? a. Receiver b. Channel c. Sender d. None of the above Answer A 19. An effective speaker is the one who is a. speaking appropriately whilst maintaining cye contact with the audience. b. using varied vocabulary. c. _using varied articulate speech to suit the need of the audience. d. —_Allof the above Answer D 20. is the ‘sharing’ of information between two or more individuals or within a group to reach a common understanding. a. Common b. Communication c. Writing d. Reading Answer B 2021. One can improve communication skill ‘A Pausing when required B Asking Open-ended questions a. Answer A only b, Answer B only c. Both A and B d. Neither A nor B Answer C 22. Choose the right order of steps to communicate effectively a. Aim, Message, Channel, audience, Story, Review b. audience, Aim, Message, Story, Channel, Review c. Aim, Audience, Message, Channel, story, Review d. Audience, Message, Aim, Story, Review, Channel Answer C 23. How not to speak So That People Want to Listen a. Gossip b. Complaining c. Negatively d. Alllof these Answer D 24, Choose the Correct abbreviation for HAIL in communication a. Honesty Authenticity Integrity Love b. Honesty, Authority Integrity Love c. Harmony, Authenticity, Integrity, Love d. Hearty, Appreciative, Indigenous, Limit Answer A 25. There are 6 steps that can be used for strategic communication. Five of them are Aim, Review, Message, Story and Audience. Which is the sixth step? a. Paths b. Channels c. Ways d. Feedback Answer B 26. When you're listening to others, pay as much attention to them as you can. Which of the following should you notice about the speaker? A. Their words. B, Quirks in their body language a. Only A b. Only B c. Both AandB d. None Answer C 2127. Which non-verbal aspect makes the most impact in verbal face-to-face communication? a. Eye Contact b. Professional Attire c. Communication Venue d. Language Answer A 28. A communication is anything that comes in the way of receiving and understanding messages that one sends to another to convey his ideas, thoughts, or any other kind of information a. Skill b. Barrier c. Channel d.None Answer B 29. Which of the following are barriers of effective communication? a. Disengagement b. Lack of focus and attention c. Cultural Difference d. All of these Answer D 30. Speech problem, impaired eyesight, or any physical illness are the example of which communication barrier a. Lack of Knowledge b. Being Judgmental c. Differences in perception d. Physical disability Answer D 31. Poor lighting is an example of, a. Physical barrier of communication b. Physiological barrier c. Technical Jargon d. none of these Answer A 32. Information Overload is a of communication a. Barrier b. Substitute c. Exception d. none of these Answer A. 2233. arise when two individuals in an organisation belong to different religion, states or countries. . Physical Barriers b. Cultural Barriers c. Perceptional barriers d. Emotional barriers p Answer B 34. To overcome and prevent communication challenge at work one can a. Maintain eye contact b. Request and provide feedback c. Focus on what the other person is saying d. All of these Answer D 35. Which of the following can be called a ‘perceptual’ barrier to communication? a. Negative feeling b. Cultural norms c. Pre-made assumptions d. none of the above Answer C 36. barrier include using of jargon, abbreviations and unfamiliar expression a. Language barrier b. Perception barrier c. Cultural Barriers d. Emotional barrier Answer A 37. is the person who notices and decodes and attaches some meaning to a message. a. Driver b. Sender c. Source d. Receiver Answer D 38 Your dress code is an example of a. Oral communication b. Written communication c. Non-verbal communication d. Spoken Answer C a39. At cach stage in the process of communication, there is a possibility of interference which may hinder the process. Such interference is known as ___. a. sender b. receiver c. barrier d. none of them Answer C 40.Weuse___and____in addition to words when we speak. a. words and gestures b. gestures and body language c. body language and posture d. posture and eye gazing Answer B 41.____ refers to pitch, loudness, duration, intonation and, tempo. a. touches b. prosody c. gestures d. haptics Answer B 42. Communication through ___ and ____is called verbal communication a. written material and gestures b. gestures and spoken words c. spoken words and written material d. body language and gestures Answer C
You might also like
Digital Fluency (Answer Key)
PDF
100% (4)
Digital Fluency (Answer Key)
48 pages
Who Is The Father of Artificial Intelligence?
PDF
No ratings yet
Who Is The Father of Artificial Intelligence?
74 pages
Business Computing MCQ
PDF
No ratings yet
Business Computing MCQ
9 pages
Question Bank - Digital Fluency
PDF
No ratings yet
Question Bank - Digital Fluency
27 pages
Sybca Bigdata MCQ
PDF
No ratings yet
Sybca Bigdata MCQ
47 pages
DIGITAL FLUENCY MCQ's-Material (Complete Syllabus)
PDF
No ratings yet
DIGITAL FLUENCY MCQ's-Material (Complete Syllabus)
37 pages
Sybca Bigdata MCQ
PDF
No ratings yet
Sybca Bigdata MCQ
7 pages
DWDM Unit - 1 MCQ: by Arpit Sharma 01629802018
PDF
No ratings yet
DWDM Unit - 1 MCQ: by Arpit Sharma 01629802018
27 pages
TYCS - Data Science MCQ
PDF
No ratings yet
TYCS - Data Science MCQ
6 pages
Big Data Question Bank
PDF
No ratings yet
Big Data Question Bank
26 pages
Software Engineering BCA 4th Sem Question Paper With Answers Marked
PDF
No ratings yet
Software Engineering BCA 4th Sem Question Paper With Answers Marked
12 pages
Data Science 100 MCQs
PDF
No ratings yet
Data Science 100 MCQs
16 pages
BI Module 4 Notes
PDF
No ratings yet
BI Module 4 Notes
31 pages
Question Bank - Unit 1
PDF
No ratings yet
Question Bank - Unit 1
5 pages
21cs502 Ai Unit-I Notes Short 42 Pges
PDF
No ratings yet
21cs502 Ai Unit-I Notes Short 42 Pges
42 pages
Ai Sanfoundry Artificial Intelligence MCQ
PDF
No ratings yet
Ai Sanfoundry Artificial Intelligence MCQ
130 pages
Chapter 6
PDF
No ratings yet
Chapter 6
20 pages
Cost Sheet Using Inheritance
PDF
No ratings yet
Cost Sheet Using Inheritance
7 pages
Important Questions and Answers of Big Data Course
PDF
No ratings yet
Important Questions and Answers of Big Data Course
4 pages
U.G. Department of Computer Applications N.G.M College 16 UBC 626 - Data Mining and Warehousing Multiple Choice Questions. (K1 Questions) Unit - I
PDF
No ratings yet
U.G. Department of Computer Applications N.G.M College 16 UBC 626 - Data Mining and Warehousing Multiple Choice Questions. (K1 Questions) Unit - I
11 pages
Introduction To Information Storage and Retrieval: Chapter Four: Indexing Structure
PDF
No ratings yet
Introduction To Information Storage and Retrieval: Chapter Four: Indexing Structure
34 pages
Cse357 MCQ
PDF
No ratings yet
Cse357 MCQ
28 pages
IR Models: - Why IR Models? - Boolean IR Model - Vector Space IR Model - Probabilistic IR Model
PDF
No ratings yet
IR Models: - Why IR Models? - Boolean IR Model - Vector Space IR Model - Probabilistic IR Model
46 pages
Ism QB
PDF
No ratings yet
Ism QB
23 pages
250+ TOP MCQs On Software Maintenance and Answers 2023
PDF
No ratings yet
250+ TOP MCQs On Software Maintenance and Answers 2023
6 pages
Data, Field, File and Record
PDF
100% (1)
Data, Field, File and Record
15 pages
UNIT I Unit V e Commerce 2 Marks
PDF
75% (4)
UNIT I Unit V e Commerce 2 Marks
21 pages
Distributed Database Transparency Features
PDF
No ratings yet
Distributed Database Transparency Features
6 pages
Untitled
PDF
No ratings yet
Untitled
13 pages
CHNM CTS2.0 NSQF-3.5
PDF
No ratings yet
CHNM CTS2.0 NSQF-3.5
52 pages
Bigdata-Bigdata (Set 1)
PDF
No ratings yet
Bigdata-Bigdata (Set 1)
11 pages
CS8691 Artificial Intelligence MCQ Quest
PDF
No ratings yet
CS8691 Artificial Intelligence MCQ Quest
47 pages
WORD MCQ With ANS OF AWP
PDF
No ratings yet
WORD MCQ With ANS OF AWP
30 pages
Iot PDF
PDF
No ratings yet
Iot PDF
59 pages
Dnyansagar Institute of Management and Research: 302: Decision Science - Mcqs
PDF
No ratings yet
Dnyansagar Institute of Management and Research: 302: Decision Science - Mcqs
67 pages
Unit I DM
PDF
No ratings yet
Unit I DM
27 pages
GKJ IT Sem-3
PDF
No ratings yet
GKJ IT Sem-3
42 pages
Cwipedia - in-eTI MCQ Emerging Trends in Computer Eng and Information Technology MCQ Chapter 1artificial Intelligen
PDF
No ratings yet
Cwipedia - in-eTI MCQ Emerging Trends in Computer Eng and Information Technology MCQ Chapter 1artificial Intelligen
13 pages
Data Warehousing and Data Mining
PDF
No ratings yet
Data Warehousing and Data Mining
84 pages
Business Intelligence Unit 2 Chapter 1
PDF
100% (1)
Business Intelligence Unit 2 Chapter 1
7 pages
Urban Street Cleanliness Assessment Using Mobile Edge Computing and Deep Learning
PDF
No ratings yet
Urban Street Cleanliness Assessment Using Mobile Edge Computing and Deep Learning
22 pages
8 Software Maintenance
PDF
No ratings yet
8 Software Maintenance
9 pages
T.Y.B.Sc.C.S. Sem VI Ethical Hacking Sample Quwstions
PDF
No ratings yet
T.Y.B.Sc.C.S. Sem VI Ethical Hacking Sample Quwstions
13 pages
MCQs On UNIT 4
PDF
No ratings yet
MCQs On UNIT 4
5 pages
Data Mining MCQ's Viva Questions
PDF
No ratings yet
Data Mining MCQ's Viva Questions
7 pages
BlockChain Sample Paper
PDF
No ratings yet
BlockChain Sample Paper
4 pages
Software Engineering
PDF
No ratings yet
Software Engineering
44 pages
Data Mining Introduction
PDF
No ratings yet
Data Mining Introduction
52 pages
Presentation On: Peter F. Drucker
PDF
No ratings yet
Presentation On: Peter F. Drucker
25 pages
Thecodingshef: Unit 4 Big Data MCQ Aktu
PDF
No ratings yet
Thecodingshef: Unit 4 Big Data MCQ Aktu
13 pages
MIS MCQs
PDF
No ratings yet
MIS MCQs
10 pages
MCQS For Virtualization
PDF
No ratings yet
MCQS For Virtualization
7 pages
MCQ All Unit
PDF
No ratings yet
MCQ All Unit
35 pages
MCQ On Mis 1
PDF
No ratings yet
MCQ On Mis 1
24 pages
Chapter 1 (1
PDF
No ratings yet
Chapter 1 (1
5 pages
C# Programming Solved MCQs (Set-6)
PDF
100% (1)
C# Programming Solved MCQs (Set-6)
6 pages
NN Question Bank VIISem
PDF
No ratings yet
NN Question Bank VIISem
42 pages
Ai QB
PDF
No ratings yet
Ai QB
28 pages
Digital Fluency - Question Bank
PDF
No ratings yet
Digital Fluency - Question Bank
36 pages
Vani Vidyalaya Senior Secondary and Junior College: Answer
PDF
No ratings yet
Vani Vidyalaya Senior Secondary and Junior College: Answer
7 pages