Quiz Q & A PDF
Quiz Q & A PDF
Quiz Q & A PDF
3. In case of Machine Learning, the algorithm needs to be told how to make an accurate
prediction by providing it with more information, whereas, in the case of Deep Learning,
the algorithm is able to learn that through its own Data Processing
• True
• False
4. Just like the PC, Internet & Cloud Computing, AI is also a disruptive technology
• True
• False
3. Naïve Bayes Classifier algorithm is useful for predicting class of the test dataset.
• True
• False
4. Which of the following Machine Learning Algorithms is a learning method that
interacts with its environment by producing actions & discovering errors or
rewards?
• Supervised Learning
• Semi Supervised Learning
• Reinforcement Learning
5. Unsupervised Machine Learning algorithms are used when the information used
to train is neither classified nor labeled.
• True
• False
1. The more layers there are in a Neural Network, the higher is its ability to
approximate more complex functions.
• True
• False
3. Which of these tools can help you build your Convolutional Neural Network?
• TensorFlow
• Premier Pro
• Silverlight
1. “Companies that see significant impact from advanced analytics are purposeful
about where they intend to win in analytics”.
• True
• False
2. A centralized repository that allows you to store all your structured, unstructured
& semi-structured data at any scale is called a:
• Dataset
• Database
• Data Lake
• Data Warehouse
3. Which algorithm allows you to reduce the dimension of the data while losing the
least amount of information?
• Decision Trees
• K-Means Clustering
• Recurrent Neural Networks
• Principal Component Analysis
4. Clustering (or cluster analysis) is the task of breaking up a set of objects into
groups called clusters.
• True
• False
2. RDBMSes store Data in the form of tables, with most commercial Relational
Database Management Systems using:
• SQL
• Apache
• WorkFusion
3. The table format used in RDBMes is easy to understand but does not provide an
organized & structural manner through which entries are matched by firing
queries.
• True
• False
2. _ _ _ _ _ _ _ are also beneficial for the elderly, providing monitoring that can help
seniors to remain at home comfortably & safely, rather than moving to a nursing
home or requiring 24/7 home care
• Robotics
• Analytics
• Domotics
• None of the above
• Only A
• Only B
• Both A and B
• A and B
• B and C
• A and C
• A and B
• A, B and C
• B and C
An Overview of Cloud Computing
1. Which one of these are not one of the big names in the FinTech cloud computing
sector?
• Amazon Web Services
• Microsoft Silverlight
• Google Virtual Cloud
• Microsoft Azure
4. Which cloud service model is the most widely used in the world?
• SaaS
• PaaS
• IaaS
• All of them
4. iPaaS offerings in the cloud from which providers let users implement data
mapping, transformation is/are:
• Apache Spark
• Dell Boomi
• Work Fusion
4. Application security uses software & hardware methods to tackle external threats
• True
• False
5. Who alongside the FDA recently launched a joint initiative to “increase coordination
in dealing with threats related to medical devices?
• HHS
• DHS
• LHS
• AHS
1. Hackers are always looking for opportunities to invade privacy & steal data that’s
crucial importance
• True
• False
2. A cyber attack is any type of offensive action that targets computer information
systems, infrastructures, computer networks or personal computer devices, using
various methods to steal, alter or destroy data or information systems
• True
• False
3. One of the easiest ways your information can become can become hacked is through
easy-to-guess passwords
• True
• False
4. Which attack involves using IP spoofing & the ICMP to saturate a target network
with traffic?
• Smurf attack
• Teardrop attack
• Replay attack
5. Botnets are the millions of systems infected with malware under hacker control in
order to carry out DDoS attacks
• True
• False
Module 2: Applications of Emerging Technologies
1. Big Data Analytics is a complete process of examining large sets of data through
varied tools & processes in order to discover unknown patterns, hidden
correlations, meaningful trends and other insights for making data-driven
decisions in the pursuit of better results.
• True
• False
2. Which type of analytics ensures that the path is predicted for the future course of
action?
• Predictive Analytics
• Prescriptive Analytics
• Diagnostic Analytics
3. Customer Segmentation and Differential Pricing Strategy can be easily achieved
through Big Data Analytics.
• True
• False
4. Which data analysis fails to cope with the advent of Big Data which is essentially
huge data, both structured and unstructured?
• Traditional
• New
• Low
5. Healthcare big data refers to collecting, analyzing & leveraging consumer, patient,
physical & clinical data that is too vast or complex to be understood by traditional
means of data processing.
• True
• False
Applications of IoT
1. You’re hosting a party in your home and your guests have arrived. The smart
security camera will
• Detect the number of people who have entered the home, report to the AI
Control Center and automatically turn on the lights
• Wait to receive the instructions from the owner of the house to turn on the lights
3. IoT can analyze mall traffic so that stores located in malls, can make the necessary
adjustments that enhance the customer’s shopping experience while reducing
overhead
• True
• False
4. The IoT is a network of Internet-linked devices, vehicles and appliances that can
collect and share data without the need of human interaction
• True
• False
1. Cloud Computing can store a tremendous amount of data which can also help:
• Big Data Analytics
• Action Items
• Cloud Networks
Applications of Cybersecurity
1. Prioritizing simple security strategies is the best way to defeat evolving security
threats
• True
• False
3. A cybersecurity framework can be any document that defines procedures and goals
to guide more detailed cybersecurity policies
• True
• False
4. Which of the following is the recommended security standard for electronic
payment processing?
• COBIT
• HIPAA rules
• PCI DSS
5. It’s impractical to use multiple cyber security solutions to address different threats
to your infrastructure
• True
• False
• Only A
• Only B
• Both A and B
• Only A
• Only B
• Both A and B
1. When you’re listening to others, pay as much attention to them as you can. Which
of the following should you notice about the speaker?
A. Their words
B. Quirks in their body language
• Only A
• Only B
• Both A and B
2. There are 6 steps that can be used for strategic communication. Five of them are
Aim, Review, Message, Story and Audience. Which is the sixth steps?
• Paths
• Channels
• Ways
3. There are 7 C’s of Communication. Six of them Clear, Concise, Concrete, Correct,
Coherent and Courteous. Which is the seventh one?
• Carefree
• Complete
• Codified
5. The ability to communicate with people is the most sought after skill in managers
and team members.
• True
• False
2. Environmental factors like room lighting and temperature can impede listening.
• True
• False
3. Identify the important factors that one should consider while trying to approach a
problem.
• Functionality and improvement
• Need and improvement
• Cause and effect
4. Which technique allows you to collect a number of ideas that can be a potential
solution to a problem and can be used in either a group or individual setting?
• Brainstorming
• Mind Mapping
• Synectics
5. Creative Problem Solving challenges a person to think beyond the conventional and
to avoid well-trodden, sterile paths of thinking.
• True
• False
3. Fear of failure or loss is not considered as one of the major obstacles to creative
thinking.
• True
• False
4. A major obstacle to creative thinking is called “homeostasis”. It means _ _ _ _ _ _ _
• Fear of failure
• Striving for constancy
• Fear of criticism
• Lack of direction
5. Failing to identify and take into consideration the human factor in the problem-
solving process will prevent the whole mechanism from reaching the desired final
goal.
• True
• False
• Only A
• Only B
• Both A and B
• Only A
• Only B
• Both A and B
• Only A
• Only B
• Both A and B
4. In a successful team, body language is focused on the speaker and members use
energetic gestures when talking.
• True
• False
5. In a successful team, employees collaborate with colleagues within the team and
not outside of it.
• True
• False
2. Lack of direction given to the team members in a remote team can lead to:
• Inefficient results
• Innovative results
• Effective results
3. An ideal digital collaboration tool is the one that brings the work to you, not the
other way around.
• True
• False
4. Which of the following is a one of the most important aspects in any organization?
• Improving Internal employee communication
• Creating Silos
• Digital Transformation
5. Creating a sense of community and synergy in any team is a must for success and
interdependence.
• True
• False
2. Feedback and test phase, in the Design Thinking process, is required because:
• It makes the process more impactful
• It allows one to eliminate the fine gap that exists between expectation and
reality
• It helps with the iteration process
5. Which of the following refers to knowing something without any kind of resoning?
• Analytical thinking
• Intuitive thinking
• Rational thinking