Question Bank 6
Question Bank 6
12. Extracting hidden insight from the existing data is called as ________.
a) Artificial Engineering b) Data Engineering
13. In rule based approach, the intelligence of the machine is defined by the _________.
a. Developer b) Humans c) Computer d) Both (a) and (b)
14. Which of the following is NOT an element of communication within the communication
process cycle?
a) Channel b) Receiver c) Sender d) Time
15. Which of the following is not an advantage of written communication?
a. Permanent Record
b. Easy Circulation
c. Meticulous Presentation
d. None of the above
16. ______ refers to focusing human efforts for maintaining a healthy body and mind
capable of better withstanding stressful situations.
a. Stress Management
b. Self Management
c. Yoga
d. Meditation
17. Through which of the following way does a computer cannot get infected with virus?
a. Infected Pen drive b. Internet c. Keyboard d. All of the above
18. Which communication is the most efficient way of communicating between two
personnel or groups?
a. Verbal b. Non-verbal c. Written d. All of the above
19. Which of the following is the stress causal agent?
a. Physical b. Mental c. Social d. All of the above
20. Which of the following technology predominantly used by Alexa?
a. Image recognition
b. Robotics
c. Speech recognition
d. All of the above
21. In ____ we provide the AI model for the correct answers ahead of time.
a. Unsupervised Learning
b. Supervised Learning
c. Transfer Learning
d. None of the above
22. Alan Turing coined the term Artificial Intelligence in ____ year.
a. 1956 b. 1976 c. 1960 d. 1950
23. Email filters are one of the most basic and initial applications of _______ domain.
a. Natural Language Processing(NLP)
b. Computer Vision (CV)
c. Data Sciences (DS)
d. None of the above
24. Unseen data from which predictions have to be made is called _____ data.
a. Testing data b. Training data c. Random data d. free source data
25. What is Problem Scoping?
a. Identifying a problem and having a vision to solve it.
b. Developing an algorithm for a problem solution.
c. Exploring the patterns out of the collected data sets.
d. All of the above.
26. Which of the following technology is based on the adaption of how the human brain
works?
a. Supercomputing
b. Smart technology
c. Super network
d. Neural networks
27. Which of the following is not a technique of data exploration?
29. Graphical representation of data required in a stage of the AI Project Cycle to___.
a. Quickly get a sense of the trends, relationships and patterns contained within the
data.
30. An alternative to WhatsApp is the ___________ app which does not collect any data
from us and is more ethical.
31. The core idea of Artificial Intelligence is building machines and algorithms which are
capable of performing computational tasks that would otherwise require_____________.
a. HD sensors and processors
b. Advanced programming skill
c. Human like brain functions
d. None
32. The unsupervised learning algorithm which can cluster the unknown data according to
the patterns or trends identified out of it.
a. Clustering b. Regression c. Classification d. None of these
33. Email filters is an application of ________
a) Computer Vision b) Data Science c) NLP d) None
34. What are the types of words we should use for verbal communication?
(a) Acronyms (b) Simple (c) Technical (d) Jargons
35. Which of these are examples of positive feedback?
(a) Excellent, your work has improved.
(b) I noticed your dedication towards the project.
(c) You are always doing it the wrong way.
(d) All of the above
36. Which of these are ways to overcome communication barriers?
(a) Respecting each other’s differences
(b) Using a translator
(c) Not communicating at all
(d) Using your own language for comfort
37. Which of these are ways to overcome communication barriers?
(a) Respecting each other’s differences
(b) Using a translator
(c) Not communicating at all
(d) Using your own language for comfort
38. Full form of VIRUS is _____.
a) Vital Information Resource Under Size.
b) Various Information Resource Under Seize.
c) Vital Information Resource Under Seize.
d) Various Input Resource Under Seize.
39. ___________operating system enables multiple users to work on the same computer at
different times or simultaneously.
a) Single user, single task
b) Real time
c) Multi user
d) Single user, multitask
40. _______ files are created when you are running computer programs.
a) Temporary b) Fire Wall c) Cookies d) None
41. ___________ is the shortcut key to copy a file/folder.
a) Ctrl+V b) Ctrl+X c) Ctrl+H d) Ctrl+c
42. ______ is not a symptom of VIRUS.
a) Computer restarts on its own.
b) Computer runs very slow.
c) Increase the processing speed.
d) There is change in the file size.
43. Press _______ option to empty recycle bin.
a) Restore b) Delete c) Both d) None
44. _______are small files which are stored on a user’s computer when you visit a website
on the internet.
a) Temporary b) Fire Wall c) Cookies d) None
45. _________ is a long horizontal bar present at the bottom of the screen.
a) Title Bar b) Task Bar c) Status Bar d) None
46. Virus infects ____________.
a) Both Software & Hardware
b) only Software
c) only Hardware
d) None
47. _____ is the place where we can group similar type of files.
a) Folder b) File c) Computer d) Recycle Bin
48. ________ operating system is used to control machinery, scientific instruments like
robots, in complex animations and computer controlled automated machines.
a ) Windows b) Unix c) Real Time d) distributed
49. _________a programmable device or software or a network security system that
monitors and controls incoming and outgoing network traffic based on user defined
security rules.