1.How many elements are present in the open IoT architecture?
d. Seven elements
1.Which of the given language is not commonly used for AI?
a. LISP
b. PROLOG
c. Python
d. Perl
d. Perl
1.What type of symmetric key algorithm using a streaming cipher to encrypt information?
a. RC4
b. Blowfish
c. SHA
d. MD5
a. RC4
1. Which of the following is not a application for data science?
a. Recommendation Systems
b. Image & Speech Recognition
c. Online Price Comparison
d. Privacy Checker
d. Privacy Checker
1. Who is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider
d) Charles Bachman
c) J.C.R. Licklider
2.Which one of the following is not an IoT device?
d. None of these
2.Among the given options, which search algorithm requires less memory?
a. Optimal Search
b. Depth First Search
c. Breadth-First Search
d. Linear Search
b. Depth First Search
2. _____ is not a type of peer-to-peer cyber-crime?
a) MITM
b) Injecting Trojans to a target victim
c) Credit card details leak in the deep web
d) Phishing
d) Phishing
2.We write ______ in front of mean to let Python know that we want to activate the mean function from the Numpy library.
a. npm.
b. np.
c. ng.
d. ngm.
b. np.
2. Which of the following is correct?
a. Remote server applications are accessed via WS-+ services transmitted over XML messages using the SOAP protocol
b. A transaction that follows the SOAP rules is termed RESTful
c. REST stands for Representational State Transfer
d. None
c. REST stands for Representational State Transfer
3.Which of the following layers provides end-to-end communication in IoT?
c. Transport layer
3.Which is the best way to go for Game playing problem?
a) Linear approach
b) Heuristic approach
c) Stratified approach.
d) Optimal approach
b) Heuristic approach
3.What type of attack uses a fraudulent server with a relay address?
a. NTLM
b. MITM
c. NetBIOS
d. SMB
b. MITM
3.Which of the following is the common goal of statistical modelling?
a. Inference
b. Summarizing
c. Subsetting
d. None of the above
a. Inference
3.The most refined and restrictive service model is _________
a. PaaS
b. IaaS
c. SaaS
d. None
a. PaaS
4.Which of the following is the way in which an IoT device is associated with data?
a.Internet
b.Cloud
c.Automata
d.Network
b.Cloud
4.The total number of logical symbols in AI are ____________
a) There are 3 logical symbols
b) There are 5 logical symbols
c) Number of logical symbols are based on the input
d) Logical symbols are not used
b) There are 5 logical symbols
4. “Cyberspace” was coined by ____________.
a. Richard Stallman
b. William Gibson
c. Andrew Tannenbaum
d. Scott Fahlman
b. William Gibson
4.Which of the following is a revision control system?
a. Git
b. Numpy
c. Scipy
d. Slidify
a. Git
4.The assigning of a network identity to a specific MAC address that allows systems to be discovered on networks is known as _____
a. Ethernet Hardware Addresses
b. Internet Hardware Addresses
c. Ethernet Software Addresses
d. All of the above
a. Ethernet Hardware Addresses
5.What is the main purpose of WoT (Web of Things) in the IoT?
a. Improve the usability and inter-operability
5.An AI agent perceives and acts upon the environment using________________.
a. Sensors
b. Perceiver
c. Actuators
d. Both a and c
d. Both a and c
5.The web application like banking websites should ask its users to log-in again after some specific period of time, let say 30 min. It can be considered as an example of which cybersecurity principle?
a. Compromise recording
b. Psychological acceptability
c. Complete mediation
d. None of the above
c. Complete mediation
5. Which of the following function is a wrapper for different lattice plots to visualize the data?
a. levelplot
b. featurePlot
c. plotsample
d. none of the mentioned
b. featurePlot
5. Which of the following statement is not correct?
a. The DMS module monitors network connections, provides firewall services, and allows the use of third-party switches
b. Physical computers can be single-host computers or a collection of clustered systems
c. The distributed power management (DPM) module, which is part of the DRS, may regulate system power usage
d. None of the above
a. The DMS module monitors network connections, provides firewall services, and allows the use of third-party switches