AI
IT
Cybersecurity
5G
100

Thinking about customer service, which of the following uses artificial intelligence (AI)?

1. FAQ webpage

2. An online survey to customers requesting feedback

3. A contact page with form to allow customers to share feedback

4. A chatbot that immediately answers customer questions

4. A chatbot that immediately answers customer questions

100

Which of the following should you do to restrict access to your files and devices?

1. Update software once a year.

2. Share passwords with colleagues you trust.

3. Have your staff members access passwords using open Wi-Fi.

4. Use multi-factor authentication.

4. Use multi-factor authentication.

100

Which GIT command is used to list modified files in working directory?

1. git show

2. git display

3. git status

4. git print

3. git status

100

What is primary function of a router?

1. Connectivity

2. Storage

3. Processing

4. Output

1. Connectivity

200

Why are we going for 5G?

1. It comes after 4G chronologically!

2. Because Captain Kirk said so

3. Support multiple industries

4. High data rate demands

3. Support multiple industries

4. High data rate demands

200

When using email, which of the following uses artificial intelligence (AI)?

1. The email service that marks email as read when user opens it.

2. The email service allowing the user to schedule an email at a specific time in the future.

3. The email service categorizing email as a spam.

4. The email service sorting emails by time and date.

3. The email service categorizing email as a spam.

200

Which is the best answer for which people in a business should be responsible for cybersecurity?

1. Business owners

2. IT specialists

3. Managers

4. All staff members

4. All staff members

200

What is purpose of a JSON format?

1. Universal format developed by someone called Jason.

2. JSON is a human-readable format for storing and transmitting data in web applications.

3. The format of files stored on a hard disk.

4. It is the way data is stored in GPU.

2. JSON is a human-readable format for storing and transmitting data in web applications.

300

What does NR stand for?

1. Nested Route

2. New Radio

3. NR Radio Access

4. Next Generation Radio

2. New Radio

300

An exception is __

A - Runtime error

B - Compile time error

C - Logical error

D - None of the above

A - Runtime error

300

Which technology is used to create virtual machine?

1. Docker

2. Kubernetes

3. VMWare

4. Hyper-V

3. VMWare

300

What is the disadvantage of private key encryption?

1. Slow performance

2. Not scalable

3. Difficult for key distribution

4. Fewer calculations

2. Not scalable

3. Difficult for key distribution

400

Index of an array starts from

1. One

2. Zero

3. Two

4. None of the above

2. Zero

400

When was 5G NR NSA standardized?

1. Release 13

2. Release 15

3. Release 1

4. Not done yet!

2. Release 15

400

What is the fundamental unit of quantum information?

1. Bit

2. M-bit

3. Qubit

4. Quad-bit

3. Qubit

400

When playing music, which of the following uses artificial intelligence (AI)?

1. Using Bluetooth to connect to wireless speakers

2. A playlist recommendation

3. Wireless internet connection to stream music

4. Shuffle play from chosen playlist

2. A playlist recommendation

500
What is generative AI?

1. AI that can generate existing content

2. AI that can create new image, text, audio, video

3. AI that can regenerate all content

4. None of the above

2. AI that can create new image, text, audio, video

500

What are benefits of using Mongo DB over MySQL?

1. MySQL is better than any database

2. Scalability, flexibility, user-friendliness, security

3. Performance is better with MySQL

4. It's difficult to compare them

2. Scalability, flexibility, user-friendliness, security

500

When the object of the first class is instantiated then which of the following is called?

1. Destructor

2. Constructor

3. Neither

4. Both

2. Constructor

500

Which GIT command is used to copy an entire code repository from a URL?

1. git copy [url]

2. git mkcopy [url]

3. git clone [url]

4. git uncopy [url]

3. git clone [url]