Internet of Things
Artificial Intelligence
Cyber Security
Data Science
Cloud Computing
100

1.How many elements are present in the open IoT architecture?

  1. Four elements
  2. Five elements
  3. Six elements
  4. Seven elements

d. Seven elements

100

1.Which of the given language is not commonly used for AI?

a. LISP

b. PROLOG

c. Python

d. Perl

d. Perl

100

1.What type of symmetric key algorithm using a streaming cipher to encrypt information?

a. RC4

b. Blowfish

c. SHA

d. MD5

a. RC4

100

1. Which of the following is not a application for data science?

a. Recommendation Systems
b. Image & Speech Recognition
c. Online Price Comparison
d. Privacy Checker

d. Privacy Checker

100

1. Who is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider
d) Charles Bachman 

c) J.C.R. Licklider

200

2.Which one of the following is not an IoT device?

  1. Amazon echo voice controller
  2. Google Home
  3. Nest Smoke Alarm
  4. None of these

d. None of these

200

2.Among the given options, which search algorithm requires less memory?

a. Optimal Search

b. Depth First Search

c. Breadth-First Search

d. Linear Search

b. Depth First Search

200

2. _____ is not a type of peer-to-peer cyber-crime?

a) MITM

b) Injecting Trojans to a target victim

c) Credit card details leak in the deep web

d) Phishing

d) Phishing

200

2.We write ______ in front of mean to let Python know that we want to activate the mean function from the Numpy library.

a. npm.
b. np.
c. ng.
d. ngm.

b. np.

200

2. Which of the following is correct?
a. Remote server applications are accessed via WS-+ services transmitted over XML messages using the SOAP protocol
b. A transaction that follows the SOAP rules is termed RESTful
c. REST stands for Representational State Transfer
d. None

c. REST stands for Representational State Transfer

300

3.Which of the following layers provides end-to-end communication in IoT?

  1. Logical layer
  2. Data link layer
  3. Transport layer
  4. Session layer

c. Transport layer

300

3.Which is the best way to go for Game playing problem?

    a) Linear approach

    b) Heuristic approach

    c) Stratified approach.

    d) Optimal approach

b) Heuristic approach

300

3.What type of attack uses a fraudulent server with a relay address?

a. NTLM

b. MITM

c. NetBIOS

d. SMB

b. MITM

300

3.Which of the following is the common goal of statistical modelling?

a. Inference

b. Summarizing

c. Subsetting

d. None of the above

a. Inference

300

3.The most refined and restrictive service model is _________
a. PaaS
b. IaaS
c. SaaS
d. None 

a. PaaS

400

4.Which of the following is the way in which an IoT device is associated with data?

a.Internet

b.Cloud          

c.Automata

d.Network

b.Cloud  

400

4.The total number of logical symbols in AI are ____________

  a) There are 3 logical symbols
  b) There are 5 logical symbols
  c) Number of logical symbols are based on the input
  d) Logical symbols are not used

 b) There are 5 logical symbols

400

4. “Cyberspace” was coined by ____________.

a. Richard Stallman

b. William Gibson

c. Andrew Tannenbaum

d. Scott Fahlman

b. William Gibson

400

4.Which of the following is a revision control system?

a. Git

b. Numpy

c. Scipy

d. Slidify

a. Git

400

4.The assigning of a network identity to a specific MAC address that allows systems to be discovered on networks is known as _____
a. Ethernet Hardware Addresses
b. Internet Hardware Addresses
c. Ethernet Software Addresses
d. All of the above 

a. Ethernet Hardware Addresses

500

5.What is the main purpose of WoT (Web of Things) in the IoT?

  1. Improve the usability and inter-operability
  2. Reduce the security
  3. Complex the development
  4. Increase the cost

a. Improve the usability and inter-operability

500

5.An AI agent perceives and acts upon the environment using________________.

a. Sensors

b. Perceiver

c. Actuators

d. Both a and c

d. Both a and c

500

5.The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?

a. Compromise recording

b. Psychological acceptability

c. Complete mediation

d. None of the above

c. Complete mediation

500

5. Which of the following function is a wrapper for different lattice plots to visualize the data?
a. levelplot
b. featurePlot
c. plotsample
d. none of the mentioned 

b. featurePlot

500

5. Which of the following statement is not correct?
a. The DMS module monitors network connections, provides firewall services, and allows the use of third-party switches
b. Physical computers can be single-host computers or a collection of clustered systems
c. The distributed power management (DPM) module, which is part of the DRS, may regulate system power usage
d. None of the above 

a. The DMS module monitors network connections, provides firewall services, and allows the use of third-party switches