0% found this document useful (0 votes)
13 views5 pages

Week 8 Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

Week 8 Final

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

1. Which of the following statements is TRUE about unsupervised methods?

a. They require labeled data to function.


b. They find structure in the input data on their own.
c. They are always more accurate than supervised methods.
d. They are not at all useful for clustering tasks.

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 1 of Week 8

2. “Deployment of IIoT analytics typically consists of three steps - i) train a (predictive)


analytics model, ii) test and validate the model on previously unseen data, and iii)
deploy the model to make predictions on real (streaming) data.” State True or False.

a. True
b. False

Answer: (a)

Justification: Please refer to Slide 11 of Lecture 1 of Week 8

3. ___________ requires fine-tuning a trained model. This approach requires less


amount of data. Therefore, the time required for processing and computation may be
reduced from hours to minutes and from weeks to days. Fill in the blanks.

a. Transfer Learning
b. Decision Tree
c. Regression
d. Naïve Bayes

Answer: (a)

Justification: Please refer to the book: Introduction to Industry 4.0 and Industrial Internet of
Things, chapter no.-13, page no.-268
4. Which of the following is false about Reinforcement Learning?

a. There is an external supervisor to guide the agent.


b. There is a reward function which acts as feedback to the agent.
c. It builds a knowledge graph from the constant feedback of the corresponding
actions.
d. None of the above

Answer: (a)

Justification: Please refer to Slide 15-16 of Lecture 2 of Week 8

5. Which of the following machine learning techniques is used to identify similar groups
of data, coined as clustering?

a. Supervised
b. Unsupervised
c. Classification
d. Regression

Answer: (b)

Justification: Please refer to Slide 8 of Lecture 2 of Week 8

6. In ___________, one data point may belong to more than one cluster. Fill in the
blanks.

a. K-Means
b. Fuzzy c-Means
c. Naïve Bayes
d. Decision Tree

Answer: (b)

Justification: Please refer to Slide 9 of Lecture 2 of Week 8


7. “Machine learning is a subset of deep learning which can learn automatically by
finding the features of the object on its own.” State True or False.

a. True
b. False

Answer: (b)

Justification: Please refer to Slide 3 of Lecture 3 of Week 8

8. When does a deep learning model typically provide better accuracy?

a. When the amount of data is very limited


b. When the amount of data is huge
c. When data is unavailable
d. All of the above

Answer: (b)

Justification: Please refer to Slide 6 of Lecture 3 of Week 8

9. Which of the following can be achieved by deploying cloud in IIoT?

a. High computational speed for data monitoring and analytics


b. Scalable and secure services
c. Storage of huge amounts of data
d. All of the above

Answer: (d)

Justification: Please refer to Slide 5 of Lecture 4 of Week 8

10. Which of the following services can NOT be provided by utilizing cloud computing?

a. Software-as-a-Service
b. Platform-as-a-Service
c. Pivot-as-a-Service
d. Infrastructure-as-a-Service

Answer: (c)
Justification: Please refer to Slide 8-10 of Lecture 4 of Week 8

11. Which of the following is rendered by a Consumer IoT cloud platform?

a. A large number of data points


b. Modest security
c. Return on investment (ROI) sensitive
d. Quality of Service

Answer: (b)

Justification: Please refer to Slide 15 of Lecture 4 of Week 8

12. MindSphere is the cloud-based, open IoT operating system. Which of the following
features are supported by the MindSphere?
a. Security supports
b. Procurement and distribution
c. Automated exploitation of performance and intelligence
d. All of the above

Answer: (d)

Justification: Please refer to Slide 21 of Lecture 4 of Week 8

13. Which of the following is not a C3 IoT Platform tool?


a. Ex Machina
b. Data Explorer
c. Data Science Notebook
d. Type Developer

Answer: (d)

Justification: Please refer to Slide 4 of Lecture 5 of Week 8

14. “Cashify is an Industrial IoT platform that facilitates real-time monitoring and low-cost
solutions.” State true or false.
a. True
b. False

Answer: (b)
Justification: Please refer to Slide 12 of Lecture 5 of Week 8

15. Which of the following statements is false about fog computing?

a. An added layer between the edge and the cloud layer


b. A complete replacement of Cloud
c. Distributed at one level, centralized on the other
d. Intelligent in providing services like filtering, aggregation, and translation

Answer: (b)

Justification: Please refer to Slide 23 of Lecture 5 of Week 8

You might also like