1)Apriori algorithm is ————— machine learning algorithm.
A: Un- Supervised
B : Supervised
C : Both of these
D : None of These
a. Unsupervised.
1)What is Artificial Intelligence?
a. Programming with your own intelligence
b. Putting your intelligence into Computer
c. Making a Machine intelligent
d. Playing a Game
c. Making a Machine intelligent
1)__________ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.
a: Network Security
b: Database Security
c: Information Security
d: Physical Security
c. Information security
1)___________ are the main components in IOT
a. Low power embedded systems
b. Cloud computing
c. Availability of big data, networking connection
d. All of the above
d. all of the above
1)Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as _______resources to users.
A. Real
B. Cloud
C. Virtual
D. none of the mentioned
C. Virtual
2)Which library from python is used for implementing machine learning algorithms?
A : Scikit-Learn
B : Pandas
C : Matplotlib
D : Numpy
a. Scikit-learn
2)The first AI programming language was called ____.
a. Python
b. IPL
c. LISP
d. Machine Language
b.IPL
2)What does OSI stand for in the OSI Security Architecture?
A: Open System Interface
B: Open Systems Interconnections
C: Open Source Initiative
D: Open Standard Interconnections
B: Open Systems Interconnections
2)The IPV4 developed in ________
a.1974
b.1980
c.2000
d. None of the above
a.1974
2)Cloud computing architecture is a combination of?
A. service-oriented architecture and grid computing
B. Utility computing and event-driven architecture.
C. Service-oriented architecture and event-driven architecture.
D. Virtualization and event-driven architecture
C. Service-oriented architecture and event-driven architecture.
3)A perfect negative correlation is signified by ————-
A : 1
B : -1
C : 0
D : 2
c.0
3)Which of the following is not a stage of Artificial Intelligence?
a. Predictive analytics
b. Diagnostic analytics
c. Cognitive analytics
d. All of the above
c. Cognitive analytics
3)Release of message contents and Traffic analysis are two types of __________ attacks.
A: Active Attack
B: Modification of Attack
C: Passive attack
D: DoS Attack
C: Passive attack
3)The IPV4 has a ____________ notation for addressing.
a. Dotted Decimals
b. Hexadecimals
c. Both a and b
d. None of the above
a. Dotted decimals
3)Which one of the following is a kind of technique that allows sharing the single physical instance of an application or the resources among multiple organizations/customers?
A. Virtualization
B. Service-Oriented Architecture
C. Grid Computing
D. Utility Computing
A. Virtualization
4)When there is no impact on one variable when increase or decrease on other variable then it is ————
A : Perfect correlation
B : No Correlation
C : Positive Correlation
D : Negative Correlation
b. No Correlation
4)Face recognition system is based on which AI?
a. Serial AI
b. Parallel AI
c. Applied AI
d. Strong AI
c. Applied AI
4)_________ is broadly known as CIA triad.
A: AIC (Authenticity, Integrity, Confidentiality)
B: AIN (Availability, Integrity, Non-repudiation)
C: NIC (Non-repudiation, Integrity, Confidentiality)
D: AIC (Availability, Integrity, Confidentiality)
D: AIC (Availability, Integrity, Confidentiality)
4)The header size is variable in __________.
a.IPV4
b.IPV6
c. Both a and b
d. none of the above
a.IPV4
4)Through which one of the following models, SaaS supports multiple users and offers a shared data model?
A. single-tenancy
B. multiple-instance
C. multi-tenancy
D. None of the above
C. multi-tenancy
5)Plot_number parameter from subplot() function can range from 1 to —–
A : nrows*ncols
B : max
C : nrows
D : ncols
a.nrows*ncols
5)Who is the father of Artificial Intelligence?
a. John McCarthy
b. Fisher Ada
c. Allen Newell
d. Alan Turning
a.John McCarthy
5)Which of the following is considered as the world's first antivirus program?
A: Creeper
B: Reaper
C: Tinkered
D: Ray Tomlinson
B: Reaper
5)The IOT is a ___________ based technology.
a. Software
b .Hardware
c. Both a and b
d. None of the above
c. both a and b
5) Which one of the following statements is wrong?
A. The use of the word "cloud" makes reference to the two essential concepts.
B. Cloud computing abstracts systems by pooling and sharing resources
C. Cloud computing is nothing more than the Internet.
D. All of the mentioned
B. Cloud computing abstracts systems by pooling and sharing resources