0% found this document useful (0 votes)
26 views7 pages

ETI

The document consists of a series of multiple-choice questions related to artificial intelligence, blockchain technology, and the Internet of Things (IoT). It covers fundamental concepts, key figures, and various applications within these fields. The questions address topics such as machine learning, decentralized systems, and data privacy.

Uploaded by

Surabhi Gharat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views7 pages

ETI

The document consists of a series of multiple-choice questions related to artificial intelligence, blockchain technology, and the Internet of Things (IoT). It covers fundamental concepts, key figures, and various applications within these fields. The questions address topics such as machine learning, decentralized systems, and data privacy.

Uploaded by

Surabhi Gharat
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

1. What is Artificial intelligence?

A. Putting your intelligence into Computer


B. Programming with your own intelligence
C. Making a Machine intelligent
D. Putting more memory into Computer

2. Who is the father of AI?


A. Alain Colmerauer
B. John McCarthy
C. Nicklaus Wirth
D. Seymour Papert

3. What is the term used for describing the judgmental or commonsense part of the
problem solving?
A. Heuristic B. Critical C.Value-based
D. Analytical E. None of the above

4. The characteristics of the computer system capable of thinking, reasoning and


learning is known as A. machine intelligence
B. human intelligence
C. artificial intelligence
D. virtual intelligence

5. In_____the goal is for the software to use what it has learned in one area to
solve problems in other areas.
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these

6. Computer programs that mimic the way the human brain processes information
is called as
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these

7. Cognitive science related with_____


A. Act like human
B. ELIZA
C. Think like human D. None of the above

8. The ______level contains constituents at the third level which are knowledge-
based system, heuristic search, automatic theorem proving, multi-agent system.
A. Cognition level
B. Gross level
C. Functional level
D. All of the above

9. Human to Machine is____and Machine to Machine is .


A. Process, Process
B. Process, Program
C. Program, Hardware
D. Program, Program

10.Machine learning is invented by___


A. John McCarthy
B. Nicklaus Wirth
C. Joseph Weizenbaum
D. Arthur Samuel

11. Narrow AI performs multiple tasks at a time.


A. True B. False

12. _____that deals with the interaction between computers and humans using the
natural language
A. LISP B. ELIZA
C. PROLOG D. NLP
13. The core components are constituents of AI are derived from
A. Concept of logic
B. Cognition
C. Computation D. All of the above
14. These machines only focus on current scenarios and react on it as per possible
best action
a. Reactive Machines
b. Limited Memory
c. Theory of Mind
d. Self-Awareness

15. In ______________ the goal is for the software to use what it has learned in
one area to solve problems in other areas. a. Machine learning
b. Deep learning
c. Neural networks
d. None of these

16. AI is able to perform a dedicated task.


A. Narrow AI B. General AI
C. Neural AI D. None of the above

17. Chomsky's linguistic computational theory generated a model for syntactic


analysis through
a. regular grammar
b. regular expression
c. regular word
d. none of these

18. Weak AI is also known as____


A. Narrow AI B. General AI
C. Neural AI D. None of the above

19. _____ Model should reflect how results were obtained.


A. Design model
B. Logic model
C. Computational model
D. None of above

20. Charles Babbage and Boole who demonstrate the power of _______
A. Logic
B. Computation logic
C. Cognition logic
D. All of above

21.______________is a branch of science that deals with programing the systems


in such a way that they automatically learn and improve with experience
A. Machine Learning
B. Deep Learning
C. Neural Networks
D. None of these

22._____ is an example of supervised learning.


A. Machine learning
B. Deep learning
C. Classifying emails as spam
D. Hierarchical clustering

23. Blockchain is_____?


A.Centralized ledger
B.distributed ledger on a peer to peer n/w
C.Currency
D.cryptocurrency

24. Which of the following is not a blockchain


component ? A. Ledger
B. wallet
C.certificate authority
D.Hash
25. What are the benefits of blockchain technology?
A.No hidden fees
B.Fraud control and Access level.
C.security and Speed
D.All of the above

26._____system does not have a centralized control and every node has equal
authority.
A.Centralized
B.Decentralized
C.Client server
D.Star Network

27.The first block of blockchain is called as?


A.Genesis Block
B.Transaction Block
C.Hash block
D.Famous block

28.Data visualization tools provide an accessible way to see and understand in data
A.trends
B.Outliers
C.Patterns
D.All of the above Page

29.Bitcoin and Ethereum are examples of?


A.Currency
B.Cryptocurrency
C.Cryptography
D. Algorithm

30.Bitcoin is created by?


A. Satoshi Nakarmoto
B. Salfedean Ammius
C.Vitalik Buterin
D.Ethereum

31.Node is defined as a ?
A.Blockchain
B.Table
C.An Exchange
D.A Computer on a Blockchain network

32.Which of the following statement is true about Blockchain?


A.Blockchain is peer to peer system with no third parties in between.
B.Blockchain is shared, decentralized and open ledger of transactions.
C.Blockchain technology was designed to enable true decentralization. D.All
of these

33______systems use security cameras and sensors (PIR sensors and door sensors)
to detect intrusion and raise alerts.
A.Smart Lighting
B.Smoke/Gas Detectors
C. Intrusion Detection
D.Smart Parking

34. _______-System is uses Sensors to determine moisture amount in soil

A.Green House control


B.Smart Irrigation
C.Weather Monitoring
D.River Flood Detection

35.______sensors are used in lot systems to monitor systems and devices that are
driven by pressure signals.

A.Smoke
B.Pressure
C.Gas
D.Humidity

36. 802.3 is the standard for 10BASE5 Ethernet that uses as a shared medium

A.Twisted pair cable.


B.Coaxial cable
C.Fiber optic cable
D.Copper wire

37. IOT devices which have unique identities and can perform
________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above

38._____________ layer protocols determine how the data is physically sent over
the network’s physical layer or medium.

A. Application layer
B. Transport layer
C. Network layer
D. Link layer

39.How does IoT affect user privacy?


A. IoT does not collect any personal data
B. IoT provides detailed personal data, even without active user participation
C. IoT only collects public information
D. IoT ensures complete anonymity of users

40.What is one key advantage of IoT in data collection?


A. It collects data only when users manually input it
B. It passively collects data with no improvement over traditional methods
C. It actively collects real-time data for accurate analysis
D. It restricts data collection to limited areas

You might also like