Emerging Technologies MCQ
Emerging Technologies MCQ
Which emerging technology utilizes quantum bits (qubits) to perform calculations and solve complex proble
a) Artificial Intelligence
b) Blockchain
c) Quantum Computing
d) Internet of Things
2 2. What is the primary function of a neural lace, a technology often associated with brain-computer interfaces
a) Enhancing virtual reality experiences
b) Enabling direct communication with computers using thoughts
c) Improving wireless internet connectivity
d) Facilitating secure blockchain transactions
3 3. Which emerging technology aims to revolutionize transportation by using low-pressure tubes to propel pod
a) Hyperloop
b) Autonomous Vehicles
c) Vertical Takeoff and Landing (VTOL) aircraft
d) Drones
5 5. Which emerging technology involves the use of decentralized networks to store and manage data securely
a) Augmented Reality
b) Edge Computing
c) Fog Computing
d) Distributed Ledger Technology (DLT)
6 1. c) Quantum Computing
2. b) Enabling direct communication with computers using thoughts
3. a) Hyperloop
4. a) Gene editing
5. d) Distributed Ledger Technology (DLT)
==========================================================
8 2. IIoT is sophisticated.
a) True
b) False
Answer: b
9 3. What does design provide?
a) Technology
b) Ecosystem
c) Technology and ecosystem
d) Digital revolution
Answer: c
10 4. Which possibility ensures load balancing and peak levelling of energy consumption?
a) Transportation and logistics
b) Energy and utilities
c) Automotive
d) Connected supply chain
Answer: b
13 7. Which possibility provides inter connectivity between shop floor and top floor?
a) Transportation and logistics
b) Energy and utilities
c) Plant control flow operation
d) Connected supply chain
Answer: c
==========================================================
17 4._____ service provider delivers software and applications through the internet.
1. IaaS
2. PaaS
3. SaaS
4. All of above
Ans. 3.
18 5._____ manages all the services and supporting infrastructure off-site over the internet and shares it across m
1. Public cloud
2. Private cloud
3. Hybrid cloud
4. None of above
Ans. 1.
19 6. Google’s G suite, GitHub and Dropbox are the examples of ____ Cloud computing.
1. PaaS
2. IaaS
3. SaaS
4. None of above
Ans. 3.
25 3. Which cybersecurity measure is crucial for protecting IoT devices from unauthorized access?
A) Using default passwords
B) Implementing strong encryption
C) Ignoring software updates
D) Disabling firewalls
Answer: B) Implementing strong encryption
29 7. Which cloud deployment model provides dedicated resources for a single organization?
A) Public cloud
B) Private cloud
C) Hybrid cloud
D) Community cloud
Answer: B) Private cloud
30 8. What is a common challenge associated with the integration of IoT devices?
A) Interoperability issues
B) Standardized protocols
C) Excessive resource allocation
D) Limited scalability
Answer: A) Interoperability issues
32 10. Which encryption algorithm is commonly used to secure data transmission in IoT systems?
A) DES (Data Encryption Standard)
B) RSA (Rivest-Shamir-Adleman)
C) MD5 (Message Digest Algorithm 5)
D) AES (Advanced Encryption Standard)
Answer: D) AES (Advanced Encryption Standard)
======================================================
=========================================================
===============================================
CYBER SECURITY
49 BLOCKCHAIN
IOT
CLOUD COMPUTING
=================================================
Unit : 1
52 1. Identify the element which is not considered in the triad, according to the CIA.
A. Authenticity
B. Availability
C. Integrity
D. Confidentiality
Ans : D
Unit: 2
53 1. Bitcoin is a cryptocurrency, which is an application of Blockchain.
A. True
B. False
Ans: A) True
54 Unit : 3
1. What is the full form of IDE in Arduino IDE IoT software?
a) Intra Defence Environment
b) Intra Development Environment
c) Integrated Development Environment
d) Integrated Deployed Environment
Ans: C
55 Unit: 4
1. Which one of the following options can be considered as the Cloud?
A. Hadoop
B. Intranet
C. Web Applications
D. All of the mentioned
Ans: A
=======================================================
56 1.What is the name of the technology that is used to create virtual worlds?
a.Virtualization
b.Augmented Reality
c.Virtual Reality
d.Artificial Intelligence
Answer- a.Virtualization
57 2.What is the term used to describe the process of using computers to generate images that look like photogr
a.Rendering
b.Coding
c.Data Mining
d.Deep Learning
Answer- a.Rendering
58 3.Which of the following is a type of artificial intelligence that is designed to mimic human conversation?
a.Expert System
b.Machine Learning
c.Natural Language Processing
d.Robotics
Answer- b.JavaScript
60 5.__ gives users access to storage, networking, servers and other computing resources via the cloud.
a.PaaS
b.IaaS
c.SaaS
d.All of above
Answer- b.IaaS
61 6.___solutions are preferred for enhanced security and privacy by the users.
a.Public cloud
b.Private cloud
c.Hybrid cloud
d.None of above
Answer- b.Reducing
======================================================================
69 5. Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any di
Decentralized
Demanding
Secure
Popular
Answer: A) Decentralized
(A) 2
(B) 3
(C) 4
(D) 5
Answer: B) 3
71 7. In _________________ attacks, the attacker manages to get an application to execute an SQL query created
a) SQL injection
b) SQL
c) Direct
d) Application
Answer: a
72 8. A Website that allows users to enter text, such as a comment or a name, and then stores it and later display
a) Two-factor authentication
b) Cross-site request forgery
c) Cross-site scripting
d) Cross-site scoring scripting
Answer: c
======================================================
74 2. What is IoT?
A. network of physical objects embedded with sensors
B. network of virtual objects
C. network of objects in the ring structure
D. network of sensors
Ans - a
=================================================
a) Limited control
b) Decreased compliance
c) Improved data encryption
d) Restricted monitoring
Answer: c) Improved data encryption
84 6)Which of the following network devices is commonly used in IoT deployments to facilitate communication b
a) Router
b) Switch
c) Hub
d) Gateway
Answer: d) Gateway
=======================================================
a. .jar
b. .obj
c. .cpp
d. .exe
Ans:-A
2: In the Planning Phase, Which of the following is the correct step for performing the analysis?
Ans:A
4: Blockchain can perform user transactions without involving any third-party intermediaries.
a.With the help of the third party
b.Without involving any third party
c.Without involving any owned
d.Without involving any authenticated
Ans: B
====================================================
1.Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any dig
A. Decentralized
B. Demanding
C. Secure
D. Popular
Answer: A) Decentralized
2. Blockchain networks are much _____ and deal with no real single point of failure.
A. Simpler
B. Easier to scale
C. Convenient
D. Faster
Answer: B) Easier to scale
==========================================
1 )Which of the following communication protocols is commonly used in IoT devices for low-power, short-ran
a) Bluetooth
b) Wi-Fi
c) Ethernet
d) NFC
Ans: a) Bluetooth
3) Which layer of the cloud computing architecture is responsible for managing virtualized resources, such as
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Answer: a) Infrastructure as a Service (IaaS)
4) Which component of the cloud computing architecture provides users with access to applications and softw
a) Data Center
b) Virtualization Layer
c) Cloud Service Provider
d) Software as a Service (SaaS)
Answer: d) Software as a Service (SaaS)
7) What is a common security measure to protect web applications against cross-site scripting (XSS) attacks?
a) Encrypting all data transmitted over the network
b) Using strong passwords for user authentication
c) Validating and sanitizing user input
d) Implementing firewalls at the network perimeter
Answer: c) Validating and sanitizing user input
==================================================
02. What is the primary benefit of using hybrid cloud deployment models?
a) Lower cost compared to other deployment models
b) Enhanced security due to data redundancy
c) Increased flexibility and scalability
d) Simplified management and maintenance
03. Which cloud computing service model allows developers to build, deploy, and manage applications withou
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
04. Which cybersecurity principle ensures that data is accurate, consistent, and reliable?
a) Availability
b) Confidentiality
c) Integrity
d) Authentication
06. Which type of cyber attack involves exploiting vulnerabilities in software or hardware systems to gain una
a) Phishing attack
b) DDoS attack
c) Exploit attack
d) Ransomware attack
09. Which cybersecurity concept refers to the process of converting plaintext into ciphertext to secure data tr
a) Hashing
b) Digital signatures
c) Encryption
d) Key management
10. Which cloud computing deployment model offers resources shared among multiple organizations with a c
a) Public Cloud
b) Private Cloud
c) Hybrid Cloud
d) Community Cloud
Answers:
01. b) Low-latency data processing at the edge of the network
02. c) Increased flexibility and scalability
03. b) Platform as a Service (PaaS)
04. c) Integrity
05. b) To detect and remove malicious software from a computer system
06. c) Exploit attack
07. c) To protect data from unauthorized access by converting it into a ciphertext
08. c) Location factor
09. c) Encryption
10. d) Community Cloud
===========================================
4.Blockchain is a peer-to-peer _____________ distributed ledger technology that makes the records of any dig
A) Decentralized
B) Demanding
C) Secure
D) Popular
Answer: A
6.Which of the following is the way in which an IoT device is associated with data?
A) Internet
B) Cloud
C) Automata
D) Network
Answer:B
7.What is Cyber Security?
a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the mentioned
Answer: D
8.In which of the following, a person is constantly followed/chased by another person or group of several peo
A) Phishing
B) Bulling
C) Stalking
D) Identity theft
Answer: C
=============================================
=========================================================
A) Smartwatch
B) Andriod Phone
C) Laptop
D) Tubelight
Answer:- D
5) Full-Form of VNC:
A) Virtual network of computers
B) Very network of computers
C) Virtual network for communication
D) Virtual network computing
Answer:- D
==========================================
ans:b) MQTT
ans:a)On-Demand Computing
5)Which cloud service model provides access to virtualized hardware resources over the internet?
a) Platform as a Service (PaaS)
b) Infrastructure as a Service (IaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
ans:b) Infrastructure as a Service (IaaS)
========================================
5. Which cloud service model provides users with access to on-demand, virtualized computing resources?
a) Infrastructure as a Service (IaaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Everything as a Service (EaaS) (This is not a standard cloud service model)
Ans:- (a)
6. Security concerns are a major consideration when adopting cloud computing. What is a shared responsibili
a) The cloud provider is solely responsible for data security.
b) The user is solely responsible for data security.
c) Security responsibility is shared between the cloud provider and the user.
d) There is no shared responsibility model in cloud security.
Ans:- (c)
8. IoT devices often have limited processing power and memory. What is a potential security risk associated
a) Increased data storage capacity
b) Difficulty implementing robust security measures
c) Faster internet connection speeds
d) Improved user experience
Ans:- (b)
===============================================
7.Which of the following is a potential security concern associated with IoT devices?
a) Limited connectivity
b) Over-reliance on manual operation
c) Lack of encryption
d) Excessive battery consumption
Answer: c) Lack of encryption
==========================================
2._________is a code injecting method used for attacking the database of a system / website.
a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection
Answer: b
9.What is a blockchain?
a). A blockchain is a centralized digital ledger consisting of records called blocks.
b). A blockchain is a decentralized, distributed, digital ledger consisting of records called blocks.
c). A blockchain is a digital database consisting of records called class.
d). None of the above
Answer: b
=======================================================
6. Which emerging technology involves the use of algorithms and statistical models to enable computer system
a) Blockchain
b) Artificial Intelligence
c) Quantum Computing
d) Augmented Reality
7. What is the primary application of 3D printing technology in the medical field?
a) Manufacturing electronic devices
b) Creating prosthetic limbs
c) Developing virtual reality games
d) Designing autonomous vehicles
8. Which of the following technologies is associated with the concept of "smart cities," integrating IoT devices
a) Virtual Reality
b) Augmented Reality
c) Internet of Things
d) Blockchain
10. Which emerging technology involves the use of wearable devices to track and analyze physiological data fo
a) Blockchain
b) Edge Computing
c) Virtual Reality
d) Internet of Medical Things (IoMT)
Answers:
6. b) Artificial Intelligence
7. b) Creating prosthetic limbs
8. c) Internet of Things
9. b) Monitoring crop health
10. d) Internet of Medical Things (IoMT)
=======================================================
1. ____________ logs all the visits in log files which is located at <%systemroot%>\logfiles.
a) IIS
b) Microsoft Server
c) Linux
d) IAS
Ans-A
Ans-C
3.What is the full form of DHCP in IoT communication protocols?
a) Dynamic Host Communication Protocol
b) Domain Host Communication Protocol
c) Dynamic Host Control Protocol
d) Domain Host Control Protocol
Ans-A
4.Cloud computing is a concept that involves pooling physical resources and offering them as which sort of res
a) cloud
b) real
c) virtual
d) none of the mentioned
Ans-C
5.Which of the following is the most refined and restrictive cloud service model?
a) PaaS
b) IaaS
c) SaaS
d) CaaS
Ans-A
Ans-D
Ans-B
=======================================
3.What type of computing technology refers to services and applications that typically run on a distributed ne
Distributed Computing
Cloud Computing
Soft Computing
Parallel Computing
Ans :- cloud computing
4. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networ
a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking
Ans :- Cyber Attack
=======================================================
1. What is the primary goal of data loss prevention (DLP) systems in cybersecurity?
a) To monitor network traffic for suspicious activities
b) To prevent unauthorized access to a network
c) To protect sensitive data from being leaked or lost
d) To authenticate users accessing a network
Ans :c
2. Which type of cybersecurity attack involves impersonating a legitimate entity to deceive individuals or gain
a) Phishing attack
b) DDoS attack
c) Brute force attack
d) Man-in-the-middle attack
Ans :a
4. Which cloud computing service model offers users the ability to run application code without the need to m
a) Infrastructure as a Service(laaS)
b) Platform as a Service (PaaS)
c) Software as a Service (SaaS)
d) Function as a Service (FaaS)
Ans:d
5. Which cybersecurity principle ensures that systems and data are available and accessible when needed?
a) Integrity
b) Confidentiality
c) Availability
d) Authentication
Ans:c
================================================
3) _____is the primary factor in automation which we can save through IoT platform.
a) Cost
b) Time
c) Privacy
d) Security
Ans. b.
4) ____ gives users access to storage, networking, servers and other computing resources via the cloud.
a) PaaS
b) IaaS
c) SaaS
d) All of above
Ans. b.
6) In _____, the providers take care of security, operating systems, server software and backups.
a) IaaS
b) PaaS
c) SaaS
D) All of above
Ans. b.
7) _____ service provider delivers software and applications through the internet.
a) IaaS
b) PaaS
c) SaaS
d) All of above
Ans. c.
8) Google’s G suite, GitHub and Dropbox are the examples of ____ Cloud computing.
a) PaaS
b) IaaS
c) SaaS
d) None of above
Ans. c.
9) _____ manages all the services and supporting infrastructure off-site over the internet and shares it across
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) None of above
Ans. a.
10) _____solutions are preferred for enhanced security and privacy by the users.
a) Public cloud
b) Private cloud
c) Hybrid cloud
d) None of above
Ans. b.
Answer: (C)
Answer: (D)
Q3. The first step of research is:
(A) Selecting a problem
(B) Searching a problem
(C) Finding a problem
(D) Identifying a problem
Answer: (D)
Answer: (B)
Answer: (D)
Answer: (B)
Answer: (B)
Q9. The study in which the investigators attempt to trace an effect is known as:
(A) Survey Research
(B) Summative Research
(C) Historical Research
(D) ‘Ex-post Facto’ Research
Answer: (D)
Answer: (A)
Answer: (B)
Answer: (D)
Answer: (C)
Answer: (C)
Q15. Research problem is selected from the stand point of:
(A) Researcher’s interest
(B) Financial support
(C) Social relevance
(D) Availability of relevant literature
Answer: (C)
Answer: (D)
Q17. Research is
(A) Searching again and again
(B) Finding a solution to any problem
(C) Working in a scientific way to search for the truth of any problem
(D) None of the above
Answer: (C)
Answer: (D)
Q21. Which of the following is the first step in starting the research process?
(A) Searching sources of information to locate the problem.
(B) Survey of related literature
(C) Identification of the problem
(D) Searching for solutions to the problem
Answer: (C)
Q22. Which correlation coefficient best explains the relationship between creativity and intelligence?
(A) 1.00
(B) 0.6
(C) 0.5
(D) 0.3
Answer: (A)
Answer: (D)
Explanation: In experimental research, researchers deliberately manipulate one or more independent variable
Q24. The research which is exploring new facts through the study of the past is called
(A) Philosophical research
(B) Historical research
(C) Mythological research
(D) Content analysis
Answer: (B)
Answer: (A)
Answer: (D)
Explanation: Factorial analysis, specifically factorial analysis of variance (ANOVA), is used to investigate the eff
Q27. Which of the following is classified in the category of the developmental research?
(A) Philosophical research
(B) Action research
(C) Descriptive research
(D) All the above
Answer: (D)
Answer: (B)
Explanation: Action research is an approach to research that encompasses all the options mentioned. It is an a
Answer: (A)
Answer: (D)
Answer: (C)
Explanation: A research problem is considered feasible when it can be studied and investigated using appropr
Answer: (D)
Q33. When a research problem is related to heterogeneous population, the most suitable sampling method is
(A) Cluster Sampling
(B) Stratified Sampling
(C) Convenient Sampling
(D) Lottery Method
Answer: (B)
Explanation: When a research problem involves a heterogeneous population, stratified sampling is the most s
Answer: (C)
Explanation: Generalized conclusions based on a sample are achieved through statistical inference. It involves
Answer: (A)
Answer: (B)
Answer: (B)
Answer: (A)
Q39. Which of the following sampling method is appropriate to study the prevalence of AIDS amongst male an
(A) Cluster sampling
(B) Systematic sampling
(C) Quota sampling
(D) Stratified random sampling
Answer: (B)
Q40. The research that applies the laws at the time of field study to draw more and more clear ideas about th
(A) Applied research
(B) Action research
(C) Experimental research
(D) None of these
Answer: (A)
is used to investigate the effects of two or more independent variables on a dependent variable. It helps to determine whether there
options mentioned. It is an applied research method where researchers work collaboratively with practitioners or stakeholders to ad
nd investigated using appropriate research methods and resources. The presence of independent and dependent variables is not a fac
atified sampling is the most suitable sampling method. Stratified sampling involves dividing the population into subgroups or strata ba
atistical inference. It involves using sample data to make inferences or predictions about a larger population. Statistical inference help
ause-and-effect relationships and test hypotheses. This type of research often involves control groups and random assignment to ensu
s to determine whether there are significant differences or interactions among the independent variables and their combined effects
tioners or stakeholders to address immediate problems or issues in a real-world context. It is often conducted over a period of time, m
pendent variables is not a factor that determines the feasibility of a research problem. Instead, it is an essential component of a well-d
n into subgroups or strata based on certain characteristics or variables. Each stratum represents a relatively homogeneous subset of t
ion. Statistical inference helps researchers draw conclusions, estimate parameters, and test hypotheses about the population from wh
d random assignment to ensure the validity of the findings. Manipulation is an essential aspect of experimental research to assess the
ucted over a period of time, making it a longitudinal research approach. So, all the options (A) An applied research, (B) A research carr
sential component of a well-defined research problem that helps in formulating research questions or hypotheses. Feasibility depends
ely homogeneous subset of the population. Then, a random sample is taken from each stratum in proportion to its size or importance
about the population from which the sample was taken. It is a fundamental concept in statistics and plays a crucial role in various field
mental research to assess the impact of specific variables and draw conclusions about their influence on the outcome.
research, (B) A research carried out to solve immediate problems, and (C) A longitudinal research are correct when describing action
potheses. Feasibility depends on whether the research problem can be addressed and answered within the constraints of available tim
rtion to its size or importance in the population. This method ensures that the sample is representative of the diversity present in the
he constraints of available time, resources, and methods. Options (A), (B), and (D) are more relevant to the feasibility of a research pr
f the diversity present in the population and allows for more precise estimates of population parameters for each subgroup.
he feasibility of a research problem.