0% found this document useful (0 votes)
21 views14 pages

Eti QB

The document consists of multiple-choice questions covering topics in Artificial Intelligence, Internet of Things, and Digital Forensics. It includes questions about programming languages, memory storage technologies, and digital investigation processes. Each question is followed by answer options, testing knowledge in these fields.

Uploaded by

Diksha Lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views14 pages

Eti QB

The document consists of multiple-choice questions covering topics in Artificial Intelligence, Internet of Things, and Digital Forensics. It includes questions about programming languages, memory storage technologies, and digital investigation processes. Each question is followed by answer options, testing knowledge in these fields.

Uploaded by

Diksha Lokhande
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

UNIT 1-Artificial Intelligence

1. In LISP, the function returns the list that results after the first element is removed (the rest f the list), is
__________
a) car
b) last
c) cons
d) cdr

2. Which of the following contains the output segments of Artificial Intelligence programming?
a) Printed language and synthesized speech
b) Manipulation of physical object
c) Locomotion
d) All of the mentioned

3. LISP was created by?


a) John McCarthy
b) Marvin Minsky
c) Alan Turing
d) Allen Newell and Herbert Simon

4. Expert Ease was developed under the direction of __________


a) John McCarthy
b) Donald Michie
c) Lofti Zadeh
d) Alan Turing

5. An Artificial Intelligence system developed by Terry A. Winograd to permit an interactive dialogue about
a domain he called blocks-world.
a) SHRDLU
b) SIMD
c) BACON
d) STUDENT

6. MLMenu, a natural language interface for the TI Explorer, is similar to __________


a) Ethernet
b) NaturalLink
c) PROLOG
d) The Personal Consultant

7. Strong Artificial Intelligence is __________


a) the embodiment of human intellectual capabilities within a computer
b) a set of computer programs that produce output that would be considered to reflect intelligence if it
were generated by humans
c) the study of mental faculties through the use of mental models implemented on a computer
d) all of the mentioned
8. The traditional way to exit and LISP system is to enter __________
a) quit
b) exit
c) bye
d) ok

9. In which of the following situations might a blind search be acceptable?


a) real-life situation
b) complex game
c) small search space
d) all of the mentioned

10. What is Artificial intelligence?


a) Putting your intelligence into Computer
b) Programming with your own intelligence
c) Making a Machine intelligent
d) Playing a Game

11. Which search method takes less memory?


a) Depth-First Search
b) Breadth-First search
c) Optimal search
d) Linear Search

12. A heuristic is a way of trying __________


a) To discover something or an idea embedded in a program
b) To search and measure how far a node in a search tree seems to be from a goal
c) To compare two nodes in a search tree to see if one is better than the other is
d) All of the mentioned

13. How do you represent “All dogs have tails”?


a) x: dog(x) àhastail(x)
b) x: dog(x) àhastail(y)
c) x: dog(y) àhastail(x)
d) x: dog(x) àhasàtail(x)

14. Which is not a property of representation of knowledge?


a) Representational Verification
b) Representational Adequacy
c) Inferential Adequacy
d) Inferential Efficiency

15. What is the primary interactive method of communication used by humans?


a) reading
b) writing
c) speaking
d) all of the mentioned
16. Elementary linguistic units that are smaller than words are?
a) allophones
b) phonemes
c) syllables
d) all of the mentioned

17. In LISP, the atom that stands for “true” is _____________


a) t
b) ml
c) y
d) time

18. A mouse device may be _____________


a) electro-chemical
b) mechanical
c) optical
d) both mechanical and optical

19. An expert system differs from a database program in that only an expert system _____________
a) contains declarative knowledge
b) contains procedural knowledge
c) features the retrieval of stored information
d) expects users to draw their own conclusions

20. Arthur Samuel is linked inextricably with a program that played _____________
a) checkers
b) chess
c) cricket
d) football

21. Natural language understanding is used in _____________


a) natural language interfaces
b) natural language front ends
c) text understanding systems
d) all of the mentioned

22. Which of the following are examples of software development tools?


a) debuggers
b) editors
c) assemblers, compilers and interpreters
d) all of the mentioned

23. Which is the first AI programming language?


a) BASIC
b) FORTRAN
c) IPL(Inductive logic programming)
d) LISP
24. The Personal Consultant is based on?
a) EMYCIN
b) OPS5+
c) XCON
d) All of the mentioned

25. Nils Nilsson headed a team at SRI that created a mobile robot named _____________
a) Robotics
b) Dedalus
c) Shakey
d) Vax

26. An Artificial Intelligence technique that allows computers to understand associations and relationships
between objects and events is called _____________
a) heuristic processing
b) cognitive science
c) relative symbolism
d) pattern matching

27. The new organization established to implement the Fifth Generation Project is called _____________
a) ICOT (Institute for New Generation Computer Technology)
b) MITI (Ministry of International Trade and Industry)
c) MCC (Microelectronics and Computer Technology Corporation)
d) SCP (Strategic Computing Program)

28. What is the field that investigates the mechanics of human intelligence?
a) history
b) cognitive science
c) psychology
d) sociology

29. What is the name of the computer program that simulates the thought processes of human beings?
a) Human logic
b) Expert reason
c) Expert system
d) Personal information

30. What is the name of the computer program that contains the distilled knowledge of an expert?
a) Database management system
b) Management information System
c) Expert system
d) Artificial intelligence

31. Claude Shannon described the operation of electronic switching circuits with a system of
mathematical logic called _____________
a) LISP
b) XLISP
c) Neural networking
d) Boolean algebra
32. A computer program that contains expertise in a particular domain is called?
a) intelligent planner
b) automatic processor
c) expert system
d) operational symbolizer

33. What is the term used for describing the judgmental or commonsense part of problem solving?
a) Heuristic
b) Critical
c) Value based
d) Analytical

34. What was originally called the “imitation game” by its creator?
a) The Turing Test
b) LISP
c) The Logic Theorist
d) Cybernetics

35. Decision support programs are designed to help managers make _____________
a) budget projections
b) visual presentations
c) business decisions
d) vacation schedules

36. Programming a robot by physically moving it through the trajectory you want it to follow is called
_____________
a) contact sensing control
b) continuous-path control
c) robot vision control
d) pick-and-place control

37. The performance of an agent can be improved by __________


a) Learning
b) Observing
c) Perceiving
d) None of the mentioned

38. External actions of the agent is selected by __________


a) Perceive
b) Performance
c) Learning
d) Actuator

39. The action of the Simple reflex agent completely depends upon __________
a) Perception history
b) Current perception
c) Learning theory
d) Utility functions

40. Which of the following could be the approaches to Artificial Intelligence?


a) Strong Artificial Intelligence
b) Weak Artificial Intelligence
c) Applied Artificial Intelligence
d) All of the mentioned

41. An Artificial Neural Network Is based on?


a) Strong Artificial Intelligence approach
b) Weak Artificial Intelligence approach
c) Cognitive Artificial Intelligence approach
d) Applied Artificial Intelligence approach

42. The Face Recognition system is based on?


a) Strong Artificial Intelligence approach
b) Weak Artificial Intelligence approach
c) Cognitive Artificial Intelligence approach
d) Applied Artificial Intelligence approach

43. A completely automated chess engine (Learn from previous games) is based on?
a) Strong Artificial Intelligence approach
b) Weak Artificial Intelligence approach
c) Cognitive Artificial Intelligence approach
d) Applied Artificial Intelligence approach

44. A basic line following robot is based on __________


a) Strong Artificial Intelligence approach
b) Weak Artificial Intelligence approach
c) Cognitive Artificial Intelligence approach
d) Applied Artificial Intelligence approach

45. Which of the following task/tasks Artificial Intelligence could not do yet?
a) Understand natural language robustly
b) Web mining
c) Construction of plans in real time dynamic systems
d) All of the mentioned

46. What among the following is/are the example of the intelligent agent/agents?
a) Human
b) Robot
c) Autonomous Spacecraft
d) All of the mentioned

47. What is a Cybernetics?


a) Study of communication between two machines
b) Study of communication between human and machine
c) Study of communication between two humans
d) Study of Boolean values

48. What is the goal of artificial intelligence?


a) To solve real-world problems
b) To solve artificial problems
c) To explain various sorts of intelligence
d) To extract scientific causes

49. An algorithm is complete if ____________


a) It terminates with a solution when one exists
b) It starts with a solution
c) It does not terminate with a solution
d) It has a loop

50. Which is true regarding BFS (Breadth First Search)?


a) BFS will get trapped exploring a single path
b) The entire tree so far been generated must be stored in BFS
c) BFS is not guaranteed to find a solution if exists
d) BFS is nothing but Binary First Search
View Answer

51. What is a heuristic function?


a) A function to solve mathematical problems
b) A function which takes parameters of type string and returns an integer value
c) A function whose return type is nothing
d) A function that maps from problem state descriptions to measures of desirability

================================================================================
=======================
UNIT 2- INTERNET OF THINGS.

1. Which memory storage is widely used in PCs and Embedded Systems?


a) SRAM
b) DRAM
c) Flash memory
d) EEPROM

2. Which of the following memory technology is highly denser?


a) DRAM
b) SRAM
c) EPROM
d) Flash memory

3. Which is the storage element in DRAM?


a) inductor
b) capacitor
c) resistor
d) mosfet

4. Which one of the following is a storage element in SRAM?


a) capacitor
b) inductor
c) transistor
d) resistor

5. Which of the following is more volatile?


a) SRAM
b) DRAM
c) ROM
d) RAM

6. What is the size of a trench capacitor in DRAM?


a) 1 Mb
b) 4-256 Mb
c) 8-128 Mb
d) 64-128 Mb

7. Which of the following capacitor can store more data in DRAM?


a) planar capacitor
b) trench capacitor
c) stacked-cell
d) non-polar capacitor

8. In which of the memories, does the data disappear?


a) SRAM
b) DRAM
c) Flash memory
d) EPROM

9. Which of the following is the main factor which determines the memory capacity?
a) number of transistors
b) number of capacitors
c) size of the transistor
d) size of the capacitor

10. What does VRAM stand for?


a) video RAM
b) verilog RAM
c) virtual RAM
d) volatile RAM

11. What does TCR stand for?


a) temperature-compensated refresh
b) temperature-compensated recovery
c) texas CAS-RAS
d) temperature CAS-RAS

12. Which is the most basic non-volatile memory?


a) Flash memory
b) PROM
c) EPROM
d) ROM

13. Who has invented flash memory?


a) Dr.Fujio Masuoka
b) John Ellis
c) Josh Fisher
d) John Ruttenberg

14. Which of the following is serial access memory?


a) RAM
b) Flash memory
c) Shifters
d) ROM

15. Which is the early form of non-volatile memory?


a) magnetic core memory
b) ferrimagnetic memory
c) anti-magnetic memory
d) anti-ferromagnetic

16. Which of the following memories has more speed in accessing data?
a) SRAM
b) DRAM
c) EPROM
d) EEPROM

17. In which memory, the signals are multiplexed?


a) DRAM
b) SRAM
c) EPROM
d) EEPROM

18. How many main signals are used with memory chips?
a) 2
b) 4
c) 6
d) 8

19. What is the purpose of the address bus?


a) to provide data to and from the chip
b) to select a specified chip
c) to select a location within the memory chip
d) to select a read/write cycle

20. Which are the two main types of processor connection to the motherboard?
a) sockets and slots
b) sockets and pins
c) slots and pins
d) pins and ports

21. Which of the following has programmable hardware?


a) microcontroller
b) microprocessor
c) coprocessor
d) FPGA

22. Who invented TriMedia processor?


a) Intel
b) IBM
c) Apple
d) NXP Semiconductor

23. Which of the following have a 16 Mbytes addressed range?


a) PowerPC
b) M68000
c) DSP56000
d) TMS 320

24. Which of the following can destroy the accuracy in the algorithms?
a) delays
b) error signal
c) interrupt
d) mmu

25. How many numbers of ways are possible for allocating the memory to the modular blocks?
a) 1
b) 2
c) 3
d) 4

26. Which of the following is replaced with the absolute addressing mode?
a) relative addressing mode
b) protective addressing mode
c) virtual addressing mode
d) temporary addressing mode

27. What is the main purpose of the memory management unit?


a) address translation
b) large storage
c) reduce the size
d) provides address space

28. Which of the following provides stability to the multitasking system?


a) memory
b) DRAM
c) SRAM
d) Memory partitioning

29. Which of the following is used by the M68000 family?


a) M68000
b) 80386
c) 8086
d) 80286
30. What can be done for the fine grain protection of the processor?
a) add extra description bit
b) add error signal
c) add wait stage
d) remains unchanged

31. Which of the following technique is used by the UNIX operating system?
a) logical address memory
b) physical address memory
c) virtual memory technique
d) translational address

32. Which of the following consist two lines of legs on both sides of a plastic or ceramic body?
a) SIMM
b) DIMM
c) Zig-zag
d) Dual in-line

33. Which package has high memory speed and change in the supply?
a) DIP
b) SIMM
c) DIMM
d) zig-zag

34. Which is a subassembly package?


a) dual-in-line
b) zig-zag
c) simm
d) ceramic shell

35. What is the required voltage of DIMM?


a) 2V
b) 2.2V
c) 5V
d) 3.3V

36. Which memory package has a single row of pins?


a) SIMM
b) DIP
c) SIP
d) zig-zag

37. What is the access time of MCM51000AP10?


a) 100ns
b) 80ns
c) 60ns
d) 40ns
================================================================================
========================

UNIT 3-basics of digital forensics

1. Digital forensics is all of them except:


A. Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

2. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

3. Who proposed Road Map for Digital Forensic Research (RMDFR)


A. G.Gunsh.
B. S.Ciardhuain
C. J.Korn.
D. G.Palmar
Ans: D

4. The investigator should satisfy the following points:


A. Contribute to society and human beings.
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D

5. In the past, the method for expressing an opinion has been to frame a ____ question based on
available factual evidence.
A. Hypothetical
B. Nested
C. Challenging
D. Contradictory
Ans: A

6. More subtle because you are not aware that you are running these macros (the document opens and
the application automatically runs); spread via email
A. The purpose of the copyright
B. The danger of macro viruses
C. Derivative works
D. computer-specific crime
Ans: B

7. There are three c's in computer forensics. Which is one of the three?
A. Control
B. Chance
C. Chains
D. Core
Ans: A
8. When Federal Bureau Investigation program was created?
A.1979
B.1984
C.1995
D.1989
Ans: B

9. When the field of PC forensics began?


A.1960's
B.1970's
C.1980's
D.1990's
Ans: C

10. What is Digital Forensic?


A. Process of using scientific knowledge in analysis and presentation of evidence in court
B. The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, the chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
C. process where we develop and test hypotheses that answer questions about digital events
D. Use of science or technology in the investigation and establishment of the facts or
evidence in a court of law
Ans: B

11. Digital Forensics entails _____.


A. Accessing the system's directories viewing mode and navigating through the various systems
files and folders
B. Undeleting and recovering lost files
C. Identifying and solving computer crimes
D. The identification, preservation, recovery, restoration, and presentation of digital evidence
from systems and devices
Ans: D

12. Which of the following is FALSE?


A. The digital forensic investigator must maintain absolute objectivity
B. It is the investigator’s job to determine someone’s guilt or innocence.
C. It is the investigator’s responsibility to accurately report the relevant facts of a case.
D. The investigator must maintain strict confidentiality, discussing the results of an investigation
on only a “need to know”
Ans: B

13. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C

14. _______phase includes putting the pieces of a digital puzzle together and developing
investigative hypotheses
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: D

15. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: B

16. In _______phase investigator transfers the relevant data from a venue out of physical or
administrative control of the investigator to a controlled location
A. Preservation phase
B. Survey phase
C. Documentation phase
D. Reconstruction phase
E. Presentation phase
Ans: B

17. Computer forensics do not involve_____activity.


A. Preservation of computer data.
B. Extraction of computer data.
C. Manipulation of computer data.
D. Interpretation of computer data.
Ans: C

18. A set of instruction compiled into a program that perform a particular task is known as:
A. Hardware.
B.CPU
C. Motherboard
D. Software
Ans: D
================================================================================
==================

You might also like