Digital Fluency - Question Bank
Digital Fluency - Question Bank
7). A technique that was developed to determine whether a machine could or could
not demonstrate
the artificial intelligence is known as the
a) Boolean Algebra b) Turing Test
c) Logarithm d) Algorithm
Answer: b)
8) The component of an Expert system is
a) Knowledge Base b) Inference Engine
c) User Interface d) All of the above
Answer: d)
9) Which algorithm is used in the Game tree to make decisions of
Win/Lose?
a) Heuristic Search Algorithm
b) DFSIBFS algorithm
c) Greedy Search Algorithm
d) Min/Max algorithm
Answer: d)
10). What is the full form of “AI”?
a) Artificially Intelligent
b) Artificial Intelligence
c) Artificially Intelligence
d) Advanced Intelligence
Answer: b)
11). Which of the following is the branch of Artificial Intelligence?
a) Machine Learning
b) Cyber forensics
c) Full-Stack Developer
d) Network Design
Answer: a)
9). The examination of large amounts of data to see what patterns or other
useful
information can be found is known as
(a) Data examination
(b) Information analysis
(c) Big data analytics
(d) Data analysis
Answer: (c)
11). The new source of big data that will trigger a Big Data revolution in the
years to come is
(a) Business transactions
(b) Social media
(c) Transactional data and sensor data
(d) RDBMS
Answer: (c)
14) Big Data applications benefit the media and entertainment industry by
(a) Predicting what the audience wants
(b) Ad targeting
(c) Scheduling optimization
(d) All of the above
Answer: d)
15). The feature of big data that refers to the quality of the stored data is
______
(a) Variety
(b) Volume
(c) Variability
(d) Veracity
Answer: d)
Ans:A
25. The technology solution used to optimize and manage the storage
and retrieval of data from databases is called
A. Database management system B. Datastore management system
C. Big data analytics D. IOT
Ans: A
26. Which one of the following is not included in four Vs of Big data
analytics?
a) Volume b) Veracity c) Variety d) Vicinity
Ans: D
27. In the Healthcare Industry, AI has disrupted.
a. Medical imaging.
b. Surgery.
c. Physiological Diagnosis.
d. None of these.
Ans: a.
11) Which of the following provides the Graphic User Interface (GUI) for
interaction with the cloud?
a) Client
b) Client Infrastructure
c) Application
d) Server
Answer: b)
12) Which one of the following a technology works behind the cloud
computing platform?
a) Virtualization
b) SOA (Service-Oriented Architecture)
c) Grid Computing
d) All of the above
Answer: d)
10) Which one of the following usually used in the process of Wi-Fi-
hacking?
a) Aircrack-ng
b) Wireshark
c) Norton
d) All of the above
Answer: a)
12). To protect the computer system against the hacker and different kind
of viruses, one must always keep _________ on in the computer
system.
a) Antivirus
b) Firewall
c) Vlc player
d) Script
Answer: b)
13). Which of the following can be considered as the elements of cyber
security?
a) Application Security
b) Operational Security
c) Network Security
d) All of the above
Answer: d)
15) Hackers usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's Id and
Passwords
c) To corrupt the user's data stored in the computer system
d) All of the above
Answer: d)
16. Which one of the following is a type of antivirus program?
a. Quick Heal
b. Mcafee.
c. Kaspersky.
d. All of the above.
Ans: d. All of the above.
17. Which of the following refers to exploring the appropriate, ethical
behaviours related to the online environment and digital media
platform?
a. Cyber Low.
b. Cyber ethics.
c. Cybersecurity.
d. Cyber safety.
Ans: b. Cyber ethics.
18. Which one of the following refers to the technique used for
verifying the integrity of the message?
a. Digital Signature.
b. Decryption algorithm.
c. Protocol.
d. Message Digest.
Ans: d. Message Digest.
19. Which one of the following usually used in the process of Wi-Fi
hacking?
a. Aircrack-ng
b. Wireshark.
c. Norton
Ans: a. Aircrack-ng
20. In ethical hacking and cyber security, there are ___________ types
of scanning:
a. 1
b. 2
c. 3
d. 4
Ans: c. 3
21. Which of the following is not a type of scanning?
a. Xmas Tree Scan.
b. Cloud Scan.
c. Null Scan.
d. SYN Stealth.
Ans: b. Cloud Scan.
22. In system hacking, which of the following is the most crucial
activity?
a. Information gathering.
b. Covering tracks.
c. Cracking passwords.
d. None of the above.
Ans: c. Cracking passwords.
23. Which of the following are the types of scanning?
a. Network, vulnerability, and port scanning.
b. Port, network, and services.
c. Client, Server, and network.
d. None of the above.
Ans: a. Network, vulnerability, and port scanning.
24. To protect the computer system against the hacker and different
king of viruses, one must always keep __________ on in the
computer system.
a. Antivirus.
b. Firewall.
c. VLC Player.
d. Script.
Ans: b. Firewall.
25. Which of the following can be considered as the elements of cyber
security?
a. Application Security.
b. Operational Security.
c. Network Security.
d. All of the above.
Ans: d. All of the above.
26. Which of the following are famous and common cyber-attacks
used by hackers to infiltrate the user’s system?
a. DDos and Derive-by Downloads.
b. Malware &Malvertising.
c. Phishing and Password attacks.
d. All of the above.
Ans: d. All of the above.
27. Which one of the following is also referred to as malicious
software?
a. Maliciousware.
b. Badware.
c. Illegalware.
d. Malware.
Ans: d. Malware.
28. Hackers usually used the computer virus for __________ purpose.
a. To log, monitor each and every user’s stroke.
b. To gain access the sensitive information like user’s Id and
Passwords.
c. To corrupt the user’s data stored in the computer system.
d. All of the above.
Ans: d. All of the above.
29. In Wi-Fi Security, which of the following protocol is more used?
a. WPA.
b. WPA2.
c. WPS.
d. Both A and C
Ans: b. WPA2
12. The process in which the receiver interprets and understands the message
is called .............
A) Decoding
B) Encoding
C) Feedback
D) None of these
Answer A
13. Which of the following is an example of oral communication?
A) Newspapers
B) Letters
C) Phone call
D) e-mail
Answer C
14. “Two girls talking over a phone” – is an example of....
A) interpesonal communication
B) written communication
C) small group communication
D) public communication
Answer A
15. Pointing finger to something is an example of.....
A Expressions
B) Gestures
C) Body Language
D) Para Language
Answer B
25. There are 6 steps that can be used for strategic communication. Five of
them are Aim,
Review, Message, Story and Audience. Which is the sixth step?
a. Paths
b. Channels
c. Ways
d. Feedback
Answer B
26. When you’re listening to others, pay as much attention to them as you
can. Which of the following should you notice about the speaker? A. Their
words. B. Quirks in their body language
a. Only A
b. Only B
c. Both A and B
d. None
Answer C
27. Which non-verbal aspect makes the most impact in verbal face-to-face
communication?
a. Eye Contact
b. Professional Attire
c. Communication Venue
d. Language
Answer A
28. A communication _______is anything that comes in the way of receiving
and understanding messages that one sends to another to convey his ideas,
thoughts, or any other kind of information
a. Skill
b. Barrier
c. Channel
d. None
AnswerB
29. Which of the following are barriers of effective communication?
a. Disengagement
b. Lack of focus and attention
c. Cultural Difference
d. All of these
Answer D
30. Speech problem, impaired eyesight, or any physical illness are the
example of which communication barrier
a. Lack of Knowledge
b. Being Judgmental
c. Differences in perception
d. Physical disability
Answer D
31. Poor lighting is an example of _________
a. Physical barrier of communication
b. Physiological barrier
c. Technical Jargon
d. none of these
Answer A
37. _____________ is the person who notices and decodes and attaches some
meaning to a message.
a. Driver
b. Sender
c. Source
d. Receiver
Answer D