Data Science
Artificial Intelligence
Cyber Security
Internet of things
Cloud Computing
100

1)Apriori algorithm is ————— machine learning algorithm.

A: Un- Supervised

B : Supervised

C : Both of these

D : None of These

a. Unsupervised.

100

1)What is Artificial Intelligence?

 a. Programming with your own intelligence

 b. Putting your intelligence into Computer

 c. Making a Machine intelligent

 d. Playing a Game

 c. Making a Machine intelligent

100

1)__________ is the practice and precautions taken to protect valuable information from unauthorized access, recording, disclosure or destruction.

a: Network Security

b: Database Security

c: Information Security

d: Physical Security

c. Information security

100

1)___________ are the main components in IOT

a. Low power embedded systems

b. Cloud computing

c. Availability of big data, networking connection

d. All of the above

d. all of the above

100

1)Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as _______resources to users.

A. Real

B. Cloud

C. Virtual

D. none of the mentioned

C. Virtual

200

2)Which library from python is used for implementing machine learning algorithms?

A : Scikit-Learn

B : Pandas

C : Matplotlib

D : Numpy

a. Scikit-learn

200

2)The first AI programming language was called ____.

a. Python

b. IPL

c. LISP

d. Machine Language

b.IPL

200

2)What does OSI stand for in the OSI Security Architecture?

A: Open System Interface

B: Open Systems Interconnections

C: Open Source Initiative

D: Open Standard Interconnections

B: Open Systems Interconnections

200

2)The IPV4 developed in ________

a.1974

b.1980

c.2000

d. None of the above

a.1974

200

2)Cloud computing architecture is a combination of?

A. service-oriented architecture and grid computing

B. Utility computing and event-driven architecture.

C. Service-oriented architecture and event-driven architecture.

D. Virtualization and event-driven architecture

C. Service-oriented architecture and event-driven architecture.

300

3)A perfect negative correlation is signified by ————-

A : 1

B : -1

C : 0

D : 2

c.0

300

3)Which of the following is not a stage of Artificial Intelligence?

a. Predictive analytics

 b. Diagnostic analytics

 c. Cognitive analytics

 d. All of the above

c.  Cognitive analytics

300

3)Release of message contents and Traffic analysis are two types of __________ attacks.

A: Active Attack

B: Modification of Attack

C: Passive attack 

D: DoS Attack

C: Passive attack

300

3)The IPV4 has a ____________ notation for addressing.

a. Dotted Decimals

b. Hexadecimals

c. Both a and b

d. None of the above

a. Dotted decimals

300

3)Which one of the following is a kind of technique that allows sharing the single physical instance of an application or the resources among multiple organizations/customers?

A. Virtualization

B. Service-Oriented Architecture

C. Grid Computing

D. Utility Computing

A. Virtualization

400

4)When there is no impact on one variable when increase or decrease on other variable then it is ————

A : Perfect correlation

B : No Correlation

C : Positive Correlation

D : Negative Correlation

b. No Correlation

400

4)Face recognition system is based on which AI?

a. Serial AI

b. Parallel AI

c. Applied AI

d. Strong AI

c. Applied AI

400

4)_________ is broadly known as CIA triad.

A: AIC (Authenticity, Integrity, Confidentiality)

B: AIN (Availability, Integrity, Non-repudiation)

C: NIC (Non-repudiation, Integrity, Confidentiality)

D: AIC (Availability, Integrity, Confidentiality)

D: AIC (Availability, Integrity, Confidentiality)

400

4)The header size is variable in __________.

a.IPV4

b.IPV6

c. Both a and b

d. none of the above

a.IPV4

400

4)Through which one of the following models, SaaS supports multiple users and offers a shared data model?

A. single-tenancy

B. multiple-instance

C. multi-tenancy

D. None of the above

C. multi-tenancy

500

5)Plot_number parameter from subplot() function can range from 1 to —–

A : nrows*ncols

B : max

C : nrows

D : ncols

a.nrows*ncols

500

5)Who is the father of Artificial Intelligence?

a. John McCarthy

b. Fisher Ada

c. Allen Newell

d. Alan Turning

a.John McCarthy

500

5)Which of the following is considered as the world's first antivirus program?

A: Creeper

B: Reaper

C: Tinkered

D: Ray Tomlinson

B: Reaper

500

5)The IOT is a ___________ based technology.

a. Software

b .Hardware

c. Both a and b

d. None of the above

c. both a and b

500

5) Which one of the following statements is wrong?

A. The use of the word "cloud" makes reference to the two essential concepts.

B. Cloud computing abstracts systems by pooling and sharing resources

C. Cloud computing is nothing more than the Internet.

D. All of the mentioned

B. Cloud computing abstracts systems by pooling and sharing resources