52
Multiple Choice Questions & Answers (MCQs) In LISP, the function returns the list that results after the first element is removed (the rest f the list), is __________ a) car b) last c) cons d) cdr Which of the following contains the output segments of Artificial Intelligence programming? a) Printed language and synthesized speech b) Manipulation of physical object c) Locomotion d) All of the mentioned LISP was created by? a) John McCarthy b) Marvin Minsky c) Alan Turing d) Allen Newell and Herbert Simon Expert Ease was developed under the direction of __________ a) John McCarthy b) Donald Michie c) Lofti Zadeh d) Alan Turing An Artificial Intelligence system developed by Terry A. Winograd to permit an interactive dialogue about a domain he called blocks-world. a) SHRDLU b) SIMD c) BACON d) STUDENT MLMenu, a natural language interface for the TI Explorer, is similar to __________ a) Ethernet b) NaturalLink c) PROLOG d) The Personal Consultant Strong Artificial Intelligence is __________ a) the embodiment of human intellectual capabilities within a computer

Multiple Choice Questions & Answers (MCQs) · Multiple Choice Questions & Answers (MCQs) In LISP, the function returns the list that results after the first element is removed (the

  • Upload
    others

  • View
    114

  • Download
    1

Embed Size (px)

Citation preview

  • Multiple Choice Questions & Answers (MCQs)

    In LISP, the function returns the list that results after the first element is removed (the rest f the

    list), is __________

    a) car

    b) last

    c) cons

    d) cdr

    Which of the following contains the output segments of Artificial Intelligence programming?

    a) Printed language and synthesized speech

    b) Manipulation of physical object

    c) Locomotion

    d) All of the mentioned

    LISP was created by?

    a) John McCarthy

    b) Marvin Minsky

    c) Alan Turing

    d) Allen Newell and Herbert Simon

    Expert Ease was developed under the direction of __________

    a) John McCarthy

    b) Donald Michie

    c) Lofti Zadeh

    d) Alan Turing

    An Artificial Intelligence system developed by Terry A. Winograd to permit an interactive

    dialogue about a domain he called blocks-world.

    a) SHRDLU

    b) SIMD

    c) BACON

    d) STUDENT

    MLMenu, a natural language interface for the TI Explorer, is similar to __________

    a) Ethernet

    b) NaturalLink

    c) PROLOG

    d) The Personal Consultant

    Strong Artificial Intelligence is __________

    a) the embodiment of human intellectual capabilities within a computer

  • b) a set of computer programs that produce output that would be considered to reflect

    intelligence if it were generated by humans

    c) the study of mental faculties through the use of mental models implemented on a computer

    d) all of the mentioned

    The traditional way to exit and LISP system is to enter __________

    a) quit

    b) exit

    c) bye

    d) ok

    In which of the following situations might a blind search be acceptable?

    a) real-life situation

    b) complex game

    c) small search space

    d) all of the mentioned

    . What is Artificial intelligence?

    a) Putting your intelligence into Computer

    b) Programming with your own intelligence

    c) Making a Machine intelligent

    d) Playing a Game

    Which search method takes less memory?

    a) Depth-First Search

    b) Breadth-First search

    c) Optimal search

    d) Linear Search

    A heuristic is a way of trying __________

    a) To discover something or an idea embedded in a program

    b) To search and measure how far a node in a search tree seems to be from a goal

    c) To compare two nodes in a search tree to see if one is better than the other is

    d) All of the mentioned

    How do you represent “All dogs have tails”?

    a) ۷x: dog(x) àhastail(x)

    b) ۷x: dog(x) àhastail(y)

    c) ۷x: dog(y) àhastail(x)

    d) ۷x: dog(x) àhasàtail(x)

    . Which is not a property of representation of knowledge?

    a) Representational Verification

  • b) Representational Adequacy

    c) Inferential Adequacy

    d) Inferential Efficiency

    A series of Artificial Intelligence systems, developed by Pat Langley to explore the role of

    heuristics in scientific discovery is ________

    a) RAMD

    b) BACON

    c) MIT

    d) DU

    A.M. turing developed a technique for determining whether a computer could or could not

    demonstrate the artificial Intelligence, Presently, this technique is called __________

    a) Turing Test

    b) Algorithm

    c) Boolean Algebra

    d) Logarithm

    A Personal Consultant knowledge base contain information in the form of __________

    a) parameters

    b) contexts

    c) production rules

    d) all of the mentioned

    Which approach to speech recognition avoids the problem caused by the variation in speech

    patterns among different speakers?

    a) Continuous speech recognition

    b) Isolated word recognition

    c) Connected word recognition

    d) Speaker-dependent recognition

    Which of the following, is a component of an expert system?

    a) inference engine

    b) knowledge base

    c) user interface

    d) all of the mentioned

    A computer vision technique that relies on image templates is __________

    a) edge detection

    b) binocular vision

    c) model-based vision

  • d) robot vision

    DARPA, the agency that has funded a great deal of American Artificial Intelligence research, is

    part of the Department of __________

    a) Defense

    b) Energy

    c) Education

    d) Justice

    . Which of these schools was not among the early leaders in Artificial Intelligence research?

    a) Dartmouth University

    b) Harvard University

    c) Massachusetts Institute of Technology

    d) Stanford University

    A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in 1956 at

    a conference held at Dartmouth college. Can you name the Professor?

    a) David Levy

    b) John McCarthy

    c) Joseph Weizenbaum

    d) Hans Berliner

    In LISP, the function (copy-list )

    a) returns a new list that is equal to by copying the top-level element of

    b) returns the length of

    c) returns t if is empty

    d) all of the mentioned

    Who is the “father” of artificial intelligence?

    a) Fisher Ada

    b) John McCarthy

    c) Allen Newell

    d) Alan Turning

    In 1985, the famous chess player David Levy beat a world champion chess program in four

    straight games by using orthodox moves that confused the program. What was the name of the

    chess program?

    a) Kaissa

    b) CRAY BLITZ

    c) Golf

    d) DIGDUG

  • . The explanation facility of an expert system may be used to __________

    a) construct a diagnostic model

    b) expedite the debugging process

    c) explain the system’s reasoning process

    d) expedite the debugging process & explain the system’s reasoning process

    A process that is repeated, evaluated, and refined is called __________

    a) diagnostic

    b) descriptive

    c) interpretive

    d) iterative

    Visual clues that are helpful in computer vision include __________

    a) color and motion

    b) depth and texture

    c) height and weight

    d) color and motion, depth and texture

    The conference that launched the AI revolution in 1956 was held at?

    a) Dartmouth

    b) Harvard

    c) New York

    d) Stanford

    Texas Instruments Incorporated produces a low-cost LISP machine called __________

    a) The Computer-Based Consultant

    b) The Explorer

    c) Smalltalk

    d) The Personal Consultant

    When a top-level function is entered, the LISP processor do(es)?

    a) It reads the function entered

    b) It evaluates the function and the function’s operands

    c) It prints the results returned by the function

    d) All of the mentioned

    One method of programming a computer to exhibit human intelligence is called modeling or

    __________

    a) simulation

    b) cognitization

    c) duplication

    d) psychic amelioration

  • Graphic interfaces were first used in a Xerox product called __________

    a) InterLISP

    b) Ethernet

    c) Smalltalk

    d) ZetaLISP

    The Al researcher who co-authored both the Handbook of Artificial Intelligence and The Fifth

    Generation is __________

    a) Bruce Lee

    b) Randy Davis

    c) Ed Feigenbaum

    d) Mark Fox

    Which of the following is being investigated as a means of automating the creation of a

    knowledge base?

    a) automatic knowledge acquisition

    b) simpler tools

    c) discovery of new concepts

    d) all of the mentioned

    The CAI (Computer-Assisted Instruction) technique based on programmed instruction is

    __________

    a) frame-based CAI

    b) generative CAI

    c) problem-solving CAI

    d) intelligent CAI

    A robot’s “arm” is also known as its __________

    a) end effector

    b) actuator

    c) manipulator

    d) servomechanism

    KEE is a product of __________

    a) Teknowledge

    b) IntelliCorpn

    c) Texas Instruments

    d) Tech knowledge

    In LISP, the function X (x). (2x+l) would be rendered as __________

    a) (lambda (x) (+(*2 x)l))

    b) (lambda (x) (+1 (* 2x)

  • c) (+ lambda (x) 1 (*2x))

    d) (* lambda(x) (+2×1)

    A natural language generation program must decide __________

    a) what to say

    b) when to say something

    c) why it is being used

    d) both what to say & when to say something

    The hardware features of LISP machines generally include __________

    a) large memory and a high-speed processor

    b) letter-quality printers and 8-inch disk drives

    c) a mouse and a specialized keyboard

    d) large memory and a high-speed processor & a mouse and a specialized keyboard

    In which of the following areas may ICAI programs prove to be useful?

    a) educational institutions

    b) corporations

    c) department of Defense

    d) all of the mentioned

    A network with named nodes and labeled arcs that can be used to represent certain natural

    language grammars to facilitate parsing.

    a) Tree Network

    b) Star Network

    c) Transition Network

    d) Complete Network

    What is Machine learning?

    a) The autonomous acquisition of knowledge through the use of computer programs

    b) The autonomous acquisition of knowledge through the use of manual programs

    c) The selective acquisition of knowledge through the use of computer programs

    d) The selective acquisition of knowledge through the use of manual programs

    Which of the factors affect the performance of learner system does not include?

    a) Representation scheme used

    b) Training scenario

    c) Type of feedback

  • d) Good data structures

    Different learning methods does not include?

    a) Memorization

    b) Analogy

    c) Deduction

    d) Introduction

    In language understanding, the levels of knowledge that does not include?

    a) Phonological

    b) Syntactic

    c) Empirical

    d) Logical

    A model of language consists of the categories which does not include?

    a) Language units

    b) Role structure of units

    c) System constraints

    d) Structural units

    What is a top-down parser?

    a) Begins by hypothesizing a sentence (the symbol S) and successively predicting lower level

    constituents until individual preterminal symbols are written

    b) Begins by hypothesizing a sentence (the symbol S) and successively predicting upper level

    constituents until individual preterminal symbols are written

    c) Begins by hypothesizing lower level constituents and successively predicting a sentence (the

    symbol S)

    d) Begins by hypothesizing upper level constituents and successively predicting a sentence (the

    symbol S)

    Among the following which is not a horn clause?

    a) p

    b) Øp V q

    c) p → q

    d) p → Øq

    The action ‘STACK(A, B)’ of a robot arm specify to _______________

    a) Place block B on Block A

    b) Place blocks A, B on the table in that order

  • c) Place blocks B, A on the table in that order

    d) Place block A on block B

    Which instruments are used for perceiving and acting upon the environment?

    a) Sensors and Actuators

    b) Sensors

    c) Perceiver

    d) None of the mentioned

    What is meant by agent’s percept sequence?

    a) Used to perceive the environment

    b) Complete history of actuator

    c) Complete history of perceived things

    d) None of the mentioned

    How many types of agents are there in artificial intelligence?

    a) 1

    b) 2

    c) 3

    d) 4

    What is the rule of simple reflex agent?

    a) Simple-action rule

    b) Condition-action rule

    c) Simple & Condition-action rule

    d) None of the mentioned

    What are the composition for agents in artificial intelligence?

    a) Program

    b) Architecture

    c) Both Program & Architecture

    d) None of the mentioned

    In which agent does the problem generator is present?

    a) Learning agent

    b) Observing agent

    c) Reflex agent

    d) None of the mentioned

  • Which is used to improve the agents performance?

    a) Perceiving

    b) Learning

    c) Observing

    d) None of the mentioned

    Which agent deals with happy and unhappy states?

    a) Simple reflex agent

    b) Model based agent

    c) Learning agent

    d) Utility based agent

    Which action sequences are used to achieve the agent’s goal?

    a) Search

    b) Plan

    c) Retrieve

    d) Both Search & Plan

    Which element in the agent are used for selecting external actions?

    a) Perceive

    b) Performance

    c) Learning

    d) Actuator

    What is Artificial intelligence?

    a) Putting your intelligence into Computer

    b) Programming with your own intelligence

    c) Making a Machine intelligent

    d) Playing a Game

    Which is not the commonly used programming language for AI?

    a) PROLOG

    b) Java

    c) LISP

    d) Perl

    Artificial Intelligence has its expansion in the following application.

    a) Planning and Scheduling

    b) Game Playing

    c) Diagnosis

  • d) All of the mentioned

    What is an ‘agent’?

    a) Perceives its environment through sensors and acting upon that environment through actuators

    b) Takes input from the surroundings and uses its intelligence and performs the desired

    operations

    c) A embedded program controlling line following robot

    d) All of the mentioned

    Agents behavior can be best described by ____________

    a) Perception sequence

    b) Agent function

    c) Sensors and Actuators

    d) Environment in which agent is performing

    Rational agent is the one who always does the right thing.

    a) True

    b) False

    Performance Measures are fixed for all agents.

    a) True

    b) False

    What is rational at any given time depends on?

    a) The performance measure that defines the criterion of success

    b) The agent’s prior knowledge of the environment

    c) The actions that the agent can perform

    d) All of the mentioned

    An omniscient agent knows the actual outcome of its actions and can act accordingly; but

    omniscience is impossible in reality. Rational Agent always does the right thing; but Rationality

    is possible in reality.

    a) True

    b) False

    The Task Environment of an agent consists of ____________

    a) Sensors

    b) Actuators

    c) Performance Measures

    d) All of the mentioned

  • What could possibly be the environment of a Satellite Image Analysis System?

    a) Computers in space and earth

    b) Image categorization techniques

    c) Statistical data on image pixel intensity value and histograms

    d) All of the mentioned

    Categorize Crossword puzzle in Fully Observable / Partially Observable.

    a) Fully Observable

    b) partially Observable

    c) All of the mentioned

    d) None of the mentioned

    The game of Poker is a single agent.

    a) True

    b) False

    Satellite Image Analysis System is (Choose the one that is not applicable).

    a) Episodic

    b) Semi-Static

    c) Single agent

    d) Partially Observable

    An agent is composed of ________

    a) Architecture

    b) Agent Function

    c) Perception Sequence

    d) Architecture and Program

    _________ allows us to control electronic components

    a) RETful API

    b) RESTful API

    c) HTTP

    d) MQTT

    MQTT stands for _____________

    a) MQ Telemetry Things

    b) MQ Transport Telemetry

    c) MQ Transport Things

    d) MQ Telemetry Transport

  • MQTT is better than HTTP for sending and receiving data.

    a) True

    b) False

    MQTT is _________ protocol.

    a) Machine to Machine

    b) Internet of Things

    c) Machine to Machine and Internet of Things

    d) Machine Things

    Which protocol is lightweight?

    a) MQTT

    b) HTTP

    c) CoAP

    d) SPI

    PubNub publishes and subscribes _________ in order to send and receive messages.

    a) Network

    b) Account

    c) Portal

    d) Keys

    By clicking which key the PubNub will display public, subscribe, and secret keys.

    a) Pane

    b) Demo Keyset

    c) Portal

    d) Network

    The messageChannel class declares the _________ class attribute that defines the key string.

    a) command_key

    b) command-key

    c) commandkey

    d) Key_command

  • _________ method saves the received arguments in three attributes.

    a) __Init

    b) Init__

    c) __Init__

    d) _init_

    _________ and _________ saves the publish and subscribe keys that we have generated with the

    PubNub Admin portal.

    a) public_key and subscribe_key

    b) Public-key and subscribe-key

    c) publickey and subscribekey

    d) Key_public and key_subscribe

    _________ specifies the function that will be called when there is a new message received from

    the channel.

    a) Reconnect

    b) Error

    c) Connect

    d) Callback

    _________ specifies the function that will be called on an error event.

    a) Callback

    b) Error

    c) Connect

    d) Reconnect

    _________ Specifies the function that will be called when a successful connection with the

    PubNub cloud.

    a) Callback

    b) Error

    c) Connect

    d) Reconnect

    _________ specifies the function that will be called when a successful re-connection is

    completed.

    a) Callback

    b) Error

    c) Connect

    d) Reconnect

  • ___________ specifies the function that will be called when the client disconnects.

    a) Callback

    b) Error

    c) Connect

    d) Disconnect

    What is the java extension file in IoT?

    a) .jar

    b) .c

    c) .exe

    d) .py

    Do we run our program in the same computer where we have written?

    a) True

    b) False

    c) May or may not

    d) Cannot be determined

    Publish command message is sent from _________

    a) Only publisher to broker

    b) Only broker to publisher

    c) Publisher to broker and broker to publisher

    d) Server to client

    The message is sent to the input queue of a message flow that contains a _________

    a) Subscriber

    b) Server

    c) Publication node

    d) Client

    Does user has authority for all topics.

    a) True

    b) False

    ROSTOPIC uses _________ at the command line for representing the content of the message.

    a) YAML_syntax

    b) rostopic bw

    c) rostopic delay

    d) rostopic echo

  • Which command displays the band width?

    a) rostopic hz

    b) rostopic delay

    c) rostopic echo

    d) rostopic bw

    rostopic delay will provide delay for ___________

    a) Topics which has header

    b) Topics which has tail

    c) Topics which has tail and head

    d) To all topics

    Which command displays messages published to a topic?

    a) rostopic bw

    b) rostopic delay

    c) rostopic echo

    d) rostopic hz

    Which command finds out the topic?

    a) rostopic bw

    b) rostopic delay

    c) rostopic echo

    d) rostopic find

    Publishing messages is handled through ________ Class.

    a) Client()

    b) Server()

    c) Publish()

    d) Batch()

    client() class provides ________ to create topics.

    a) Software

    b) Classes

    c) Methods

    d) Batch

    ________ method publishes messages to pub/sub.

    a) Client()

    b) Publish()

    c) Server()

    d) Batch()

  • How many arguments are accepted by publish()?

    a) 5 arguments

    b) 3 arguments

    c) 1 argument

    d) 2 arguments

    Does publish() method accepts arbitrary arguments.

    a) True

    b) False

    The topic in the publish method is in which form?

    a) Binomial form

    b) Canonical form

    c) Nominal form

    d) Message form

    The message in pub/sub is an opaque blob of ________

    a) Bits

    b) Bytes

    c) Word

    d) Nibble

    ________ error will show if we try to send text string instead of bytes.

    a) TypeError

    b) Error

    c) Linker error

    d) Compiler error

    What do we call string in python 2?

    a) Str

    b) Unicode

    c) Strs

    d) Unicades

    When you publish a message ________ is automatically created?

    a) Client

    b) Server

    c) Batch

    d) Server

  • When the batch is created, it begins a countdown that publishes the batch once sufficient time

    has elapsed.

    a) True

    b) False

    What is the time elapsed after a batch is created?

    a) 0.5 seconds

    b) 0.05 seconds

    c) 1.5 seconds

    d) 1 second

    Every call to publish() will return a class that conforms to the __________ interface.

    a) Batch

    b) Client

    c) Server

    d) Future

    IaaS stands for __________

    a) Infrastructure as a Service

    b) Infrastructure as a Software

    c) Internet as a Service

    d) Internet as a Software

    Mobile cloud computing at its simplest refers to an __________

    a) Intervention

    b) Internet

    c) Infrastructure

    d) Intervention & Internet

    Mobile Cloud applications move the __________ Power and __________ away from mobile

    phone and into cloud.

    a) Computing and internet

    b) Data storage and computing

    c) Computing and data storage

    d) Internet and computing

  • SaaS stands for __________

    a) Service as a Smartphone

    b) Service as a software

    c) Smartphone as a service

    d) Software as a Service

    __________ reduces the development and running cost of mobile applications on smartphone

    devices.

    a) Infrastructure

    b) Productive business

    c) Software

    d) Services

    PaaS stands as __________

    a) Platform as a Software

    b) Photo as a service

    c) Platform as a Service

    d) Photo as a Software

    The architecture of MCC is such that various mobile devices are connected to their respective

    mobile networks via __________

    a) Software

    b) Satellite

    c) Access point

    d) Base Station

    MCC stands for Mobile Cloud Computation.

    a) True

    b) False

    __________ is the minimum value which an application shall exceed to be offloaded.

    a) Static value

    b) Critical value

    c) Threshold value

    d) Dynamic value

    Offloading decision depends upon __________ to be offloaded.

    a) Size of application

    b) Threshold value

  • c) Critical value

    d) Dynamic value

    The part of the code which involves complex computations and requires more time to execute is

    referred to as __________

    a) Static session

    b) Threshold session

    c) Dynamic session

    d) Critical session

    In __________ offloading application is partitioned during development.

    a) Static offloading

    b) Dynamic offloading

    c) Threshold offloading

    d) Critical offloading

    __________ network environment means changing connection status.

    a) Static offloading

    b) Dynamic offloading

    c) Threshold offloading

    d) Critical offloading

    __________ is defined as delay between the offloading and final result.

    a) Latency rate

    b) Network Bandwidth

    c) Heterogeneity

    d) Migration Cost

    _____________ Depends upon the amount of the code being offloaded.

    a) Latency rate

    b) Network Bandwidth

    c) Heterogeneity

    d) Migration Cost

  • Which one of the following offers CPUs as integrated memory or peripheral interfaces?

    a) Microcontroller

    b) Microprocessor

    c) Embedded system

    d) Memory system

    Which of the following offers external chips for memory and peripheral interface circuits?

    a) Microcontroller

    b) Microprocessor

    c) Peripheral system

    d) Embedded system

    How many bits does an MC6800 family have?

    a) 16

    b) 32

    c) 4

    d) 8

    Which of the following is a 4-bit architecture?

    a) MC6800

    b) 8086

    c) 80386

    d) National COP series

    What is CISC?

    a) Computing instruction set complex

    b) Complex instruction set computing

    c) Complimentary instruction set computing

    d) Complex instruction set complementary

    How is the protection and security for an embedded system made?

    a) OTP

    b) IPR

    c) Memory disk security

    d) Security chips

    Which of the following possesses a CISC architecture?

    a) MC68020

    b) ARC

    c) Atmel AVR

    d) Blackfin

  • Which of the following is a RISC architecture?

    a) 80286

    b) MIPS

    c) Zilog Z80

    d) 80386

    Which one of the following is board based system?

    a) Data bus

    b) Address bus

    c) VMEbus

    d) DMA bus

    VME bus stands for

    a) Versa module Europa bus

    b) Versa module embedded bus

    c) Vertical module embedded bus

    d) Vertical module Europa bus

    Which of the following provides a buffer between the user and the low-level interfaces to the

    hardware?

    a) operating system

    b) kernel

    c) software

    d) hardware

    Which of the following enables the user to utilise the system efficiently?

    a) kernel

    b) operating system

    c) software

    d) hardware

    Which of the following can make the application program hardware independent?

    a) software

    b) application manager

    c) operating system

    d) kernel

    Which of the following speed up the testing process?

    a) kernel

    b) software

    c) application manager

    d) program debugging tools

  • Which of the following includes its own I/O routine?

    a) hardware

    b) kernel

    c) operating system

    d) application manager

    Which forms the heart of the operating system?

    a) kernel

    b) applications

    c) hardware

    d) operating system

    Which of the following locates a parameter block by using an address pointer?

    a) OS

    b) kernel

    c) system

    d) memory

    Which of the following are not dependent on the actual hardware performing the physical task?

    a) applications

    b) hardware

    c) registers

    d) parameter block

    Which of the following bus can easily upgrade the system hardware?

    a) control bus

    b) data bus

    c) VMEbus

    d) bus interface unit

    Which of the following is the first widely used operating system?

    a) MS-DOS

    b) windows XP

    c) android

    d) CP/M

  • Which of the following is an example of a single task operating system?

    a) android

    b) windows

    c) IOS

    d) CP/M

    Which of the following becomes a limiting factor while an application program has to be

    complete?

    a) memory

    b) peripheral

    c) input

    d) output

    Which of the following cannot carry implicit information?

    a) semaphore

    b) message passing

    c) threads

    d) process

    Which of the following works by dividing the processor’s time?

    a) single task operating system

    b) multitask operating system

    c) kernel

    d) applications

    Which of the following decides which task can have the next time slot?

    a) single task operating system

    b) applications

    c) kernel

    d) software

    Which of the following controls the time slicing mechanism in a multitasking operating system?

    a) kernel

    b) single tasking kernel

    c) multitasking kernel

    d) application manager

    Which of the following provides a time period for the context switch?

    a) timer

  • b) counter

    c) time slice

    d) time machine

    Which of the following can periodically trigger the context switch?

    a) software interrupt

    b) hardware interrupt

    c) peripheral

    d) memory

    Which interrupt provides system clock in the context switching?

    a) software interrupt

    b) hardware interrupt

    c) peripheral

    d) memory

    The special tale in the multitasking operating system is also known as

    a) task control block

    b) task access block

    c) task address block

    d) task allocating block

    Which of the following stores all the task information that the system requires?

    a) task access block

    b) register

    c) accumulator

    d) task control block

    Which of the following contains all the task and their status?

    a) register

    b) ready list

    c) access list

    d) task list

  • Which determines the sequence and the associated task’s priority?

    a) scheduling algorithm

    b) ready list

    c) task control block

    d) application register

    Which can control memory usage?

    a) operating system

    b) applications

    c) hardware

    d) kernel

    Which can control the memory sharing between the tasks?

    a) kernel

    b) application

    c) software

    d) OS

    Which of the following can implement the message passing and control?

    a) application software

    b) operating system

    c) software

    d) kernel

    How many types of messages are associated with the real-time operating system?

    a) 2

    b) 3

    c) 4

    d) 5

    Which of the following can carry information and control task?

    a) semaphore

    b) messages

    c) flags

    d) address message

    What are the essential tight constraint/s related to the design metrics of an embedded system?

    a. Ability to fit on a single chip

    b. Low power consumption

    c. Fast data processing for real-time operations

    d. All of the above

  • Which abstraction level under-go the compilation process by converting a sequential program

    into finite-state machine and register transfers while designing an embedded system?

    a. System

    b. Behaviour

    c. RT

    d. Logic

    Which characteristics of an embedded system exhibit the responsiveness to the assortments or

    variations in system's environment by computing specific results for real-time applications

    without any kind of postponement ?

    a. Single-functioned Characteristic

    b. Tightly-constraint Characteristics

    c. Reactive & Real time Characteristics

    d. All of the above

    Which of the following is not a type of cyber crime?

    a) Data theft

    b) Forgery

    c) Damage to data and systems

    d) Installing antivirus for protection

    Cyber-laws are incorporated for punishing all criminals only.

    a) True

    b) False

    Cyber-crime can be categorized into ________ types.

    a) 4

    b) 3

    c) 2

    d) 6

    Which of the following is not a type of peer-to-peer cyber-crime?

    a) Phishing

    b) Injecting Trojans to a target victim

    c) MiTM

  • d) Credit card details leak in deep web

    Which of the following is not an example of a computer as weapon cyber-crime?

    a) Credit card fraudulent

    b) Spying someone using keylogger

    c) IPR Violation

    d) Pornography

    Which of the following is not done by cyber criminals?

    a) Unauthorized account access

    b) Mass attack using Trojans as botnets

    c) Email spoofing and spamming

    d) Report vulnerability in any system

    What is the name of the IT law that India is having in the Indian legislature?

    a) India’s Technology (IT) Act, 2000

    b) India’s Digital Information Technology (DIT) Act, 2000

    c) India’s Information Technology (IT) Act, 2000

    d) The Technology Act, 2008

    In which year India’s IT Act came into existence?

    a) 2000

    b) 2001

    c) 2002

    d) 2003

    What is the full form of ITA-2000?

    a) Information Tech Act -2000

    b) Indian Technology Act -2000

    c) International Technology Act -2000

    d) Information Technology Act -2000

  • The Information Technology Act -2000 bill was passed by K. R. Narayanan.

    a) True

    b) False

    Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.

    a) 65

    b) 65-D

    c) 67

    d) 70

    What is the punishment in India for stealing computer documents, assets or any software’s

    source code from any organization, individual, or from any other means?

    a) 6 months of imprisonment and a fine of Rs. 50,000

    b) 1 year of imprisonment and a fine of Rs. 100,000

    c) 2 years of imprisonment and a fine of Rs. 250,000

    d) 3 years of imprisonment and a fine of Rs. 500,000

    What is the updated version of the IT Act, 2000?

    a) IT Act, 2007

    b) Advanced IT Act, 2007

    c) IT Act, 2008

    d) Advanced IT Act, 2008

    In which year the Indian IT Act, 2000 got updated?

    a) 2006

    b) 2008

    c) 2010

    d) 2012

    What type of cyber-crime, its laws and punishments does section 66 of the Indian IT Act holds?

    a) Cracking or illegally hack into any system

    b) Putting antivirus into the victim

    c) Stealing data

  • d) Stealing hardware components

    Accessing computer without prior authorization is a cyber-crimes that come under _______

    a) Section 65

    b) Section 66

    c) Section 68

    d) Section 70

    Cracking digital identity of any individual or doing identity theft, comes under __________ of IT

    Act.

    a) Section 65

    b) Section 66

    c) Section 68

    d) Section 70

    Accessing Wi-Fi dishonestly is a cyber-crime.

    a) True

    b) False

    Download copy, extract data from an open system done fraudulently is treated as _________

    a) cyber-warfare

    b) cyber-security act

    c) data-backup

    d) cyber-crime

    Any cyber-crime that comes under section 66 of IT Act, the accused person gets fined of around

    Rs ________

    a) 2 lacs

    b) 3 lacs

    c) 4 lacs

    d) 5 lacs

  • How many years of imprisonment can an accused person face, if he/she comes under any cyber-

    crime listed in section 66 of the Indian IT Act, 2000?

    a) 1 year

    b) 2 years

    c) 3 years

    d) 4 years

    Any digital content which any individual creates and is not acceptable to the society, it’s a cyber-

    crime that comes under _________ of IT Act.

    a) Section 66

    b) Section 67

    c) Section 68

    d) Section 69

    IT Act 2008 make cyber-crime details more precise where it mentioned if anyone publishes

    sexually explicit digital content then under ___________ of IT Act, 2008 he/she has to pay a

    legitimate amount of fine.

    a) section 67-A

    b) section 67-B

    c) section 67-C

    d) section 67-D

    If anyone publishes sexually explicit type digital content, it will cost that person imprisonment of

    _________ years.

    a) 2

    b) 3

    c) 4

    d) 5

    Using spy cameras in malls and shops to capture private parts of any person comes under

    _______ of IT Act, 2008.

    a) Section 66

    b) Section 67

    c) Section 68

  • d) Section 69

    Using spy cameras in malls and shops to capture private parts of any person comes under section

    67 of IT Act, 2008 and is punished with a fine of Rs. 5 Lacs.

    a) True

    b) False

    Using of spy cameras in malls and shops to capture private parts of any person comes under

    section 67 of IT Act, 2008 and is punished with imprisonment of ___________

    a) 2 years

    b) 3 years

    c) 4 years

    d) 5 years

    Misuse of digital signatures for fraudulent purposes comes under __________ of IT Act.

    a) section 65

    b) section 66

    c) section 71

    d) section 72

    Sending offensive message to someone comes under _____________ of the Indian IT Act

    ______

    a) section 66-A, 2000

    b) section 66-B, 2008

    c) section 67, 2000

    d) section 66-A, 2008

    Stealing of digital files comes under __________ of the Indian IT Act.

    a) section 66-A

    b) section 66-B

    c) section 66-C

    d) section 66-D

  • Section 79 of the Indian IT Act declares that any 3rd party information or personal data leakage

    in corporate firms or organizations will be a punishable offense.

    a) True

    b) False

    Which of the following attach is not used by LC4 to recover Windows password?

    a) Brute-force attack

    b) Dictionary attack

    c) MiTM attack

    d) Hybrid attacks

    ____________ is the world’s most popular vulnerability scanner used in companies for checking

    vulnerabilities in the network.

    a) Wireshark

    b) Nessus

    c) Snort

    d) WebInspect

    _____________ is a tool which can detect registry issues in an operating system.

    a) Network Stumbler

    b) Ettercap

    c) Maltego

    d) LANguard Network Security Scanner

    Network Stumbler is a Windows Wi-Fi monitoring tool.

    a) True

    b) False

    5. ToneLoc is abbreviated as __________

    a) Tone Locking

    b) Tone Locator

    c) Tone Locker

  • d) Tune Locator

    __________ is a debugger and exploration tool.

    a) Netdog

    b) Netcat

    c) Tcpdump

    d) BackTrack

    __________ is a popular command-line packet analyser.

    a) Wireshark

    b) Snort

    c) Metasploit

    d) Tcpdump

    ________________ is a platform that essentially keeps the log of data from networks, devices as

    well as applications in a single location.

    a) EventLog Analyser

    b) NordVPN

    c) Wireshark

    d) PacketFilter Analyzer

    ______________ is competent to restore corrupted Exchange Server Database files as well as

    recovering unapproachable mails in mailboxes.

    a) Outlook

    b) Nessus

    c) Mailbox Exchange Recovery

    d) Mail Exchange Recovery toolkit

    . ________________ helps in protecting businesses against data breaches that may make threats

    to cloud.

    a) Centrify

    b) Mailbox Exchange Recovery

    c) Nessus

  • d) Dashline

    advertisement

    __________ is a popular corporate security tool that is used to detect the attack on email with

    cloud only services.

    a) Cain and Abel

    b) Proofpoint

    c) Angry IP Scanner

    d) Ettercap

    _____________ helps in protecting corporate data, communications and other assets.

    a) Snort

    b) CipherCloud

    c) Burp Suit

    d) Wireshark

    _________ framework made cracking of vulnerabilities easy like point and click.

    a) .Net

    b) Metasploit

    c) Zeus

    d) Ettercap

    Nmap is abbreviated as Network Mapper.

    a) True

    b) False

    __________ is a popular tool used for discovering networks as well as in security auditing.

    a) Ettercap

    b) Metasploit

    c) Nmap

    d) Burp Suit

  • Which of this Nmap do not check?

    a) services different hosts are offering

    b) on what OS they are running

    c) what kind of firewall is in use

    d) what type of antivirus is in use

    Which of the following deals with network intrusion detection and real-time traffic analysis?

    a) John the Ripper

    b) L0phtCrack

    c) Snort

    d) Nessus

    Wireshark is a ____________ tool.

    a) network protocol analysis

    b) network connection security

    c) connection analysis

    d) defending malicious packet-filtering

    Which of the below-mentioned tool is used for Wi-Fi hacking?

    a) Wireshark

    b) Nessus

    c) Aircrack-ng

    d) Snort

    Aircrack-ng is used for ____________

    a) Firewall bypassing

    b) Wi-Fi attacks

    c) Packet filtering

    d) System password cracking

    _____________ is a popular IP address and port scanner.

    a) Cain and Abel

    b) Snort

  • c) Angry IP Scanner

    d) Ettercap

    _______________ is a popular tool used for network analysis in multiprotocol diverse network.

    a) Snort

    b) SuperScan

    c) Burp Suit

    d) EtterPeak

    ____________ scans TCP ports and resolves different hostnames.

    a) SuperScan

    b) Snort

    c) Ettercap

    d) QualysGuard

    ___________ is a web application assessment security tool.

    a) LC4

    b) WebInspect

    c) Ettercap

    d) QualysGuard

    Which of the following attack-based checks WebInspect cannot do?

    a) cross-site scripting

    b) directory traversal

    c) parameter injection

    d) injecting shell code

    ________ is a password recovery and auditing tool.

    a) LC3

    b) LC4

    c) Network Stumbler

    d) Maltego

  • L0phtCrack is formerly known as LC3.

    a) True

    b) False

    ___________ is a weakness that can be exploited by attackers.

    a) System with Virus

    b) System without firewall

    c) System with vulnerabilities

    d) System with a strong password

    _________ is the sum of all the possible points in software or system where unauthorized users

    can enter as well as extract data from the system.

    a) Attack vector

    b) Attack surface

    c) Attack point

    d) Attack arena

    ____________ is the cyclic practice for identifying & classifying and then solving the

    vulnerabilities in a system.

    a) Bug protection

    b) Bug bounty

    c) Vulnerability measurement

    d) Vulnerability management

    Risk and vulnerabilities are the same things.

    a) True

    b) False

    _____________ is a special type of vulnerability that doesn’t possess risk.

    a) Vulnerabilities without risk

    b) Vulnerabilities without attacker

    c) Vulnerabilities without action

    d) Vulnerabilities no one knows

  • A/An __________ is a piece of software or a segment of command that usually take advantage

    of a bug to cause unintended actions and behaviors.

    a) malware

    b) trojan

    c) worms

    d) exploit

    There are ________ types of exploit.

    a) 3

    b) 2

    c) 5

    d) 4

    Remote exploits is that type of exploits acts over any network to exploit on security

    vulnerability.

    a) True

    b) False

    ________ type of exploit requires accessing to any vulnerable system for enhancing privilege for

    an attacker to run the exploit.

    a) Local exploits

    b) Remote exploits

    c) System exploits

    d) Network exploits

    ___________ is a technique used by penetration testers to compromise any system within a

    network for targeting other systems.

    a) Exploiting

    b) Cracking

    c) Hacking

    d) Pivoting

  • A _________ is a software bug that attackers can take advantage to gain unauthorized access in a

    system.

    a) System error

    b) Bugged system

    c) Security bug

    d) System virus

    Security bugs are also known as _______

    a) security defect

    b) security problems

    c) system defect

    d) software error

    __________ is the timeframe from when the loophole in security was introduced till the time

    when the bug was fixed.

    a) Time-frame of vulnerability

    b) Window of vulnerability

    c) Time-lap of vulnerability

    d) Entry-door of vulnerability

    ISMS is abbreviated as __________

    a) Information Server Management System

    b) Information Security Management Software

    c) Internet Server Management System

    d) Information Security Management System

    A zero-day vulnerability is a type of vulnerability unknown to the creator or vendor of the

    system or software.

    a) True

    b) False

  • What is the ethics behind training how to hack a system?

    a) To think like hackers and know how to defend such attacks

    b) To hack a system without the permission

    c) To hack a network that is vulnerable

    d) To corrupt software or service using malware

    Performing a shoulder surfing in order to check other’s password is ____________ ethical

    practice.

    a) a good

    b) not so good

    c) very good social engineering practice

    d) a bad

    ___________ has now evolved to be one of the most popular automated tools for unethical

    hacking.

    a) Automated apps

    b) Database software

    c) Malware

    d) Worms

    Leaking your company data to the outside network without prior permission of senior authority

    is a crime.

    a) True

    b) False

    _____________ is the technique used in business organizations and firms to protect IT assets.

    a) Ethical hacking

    b) Unethical hacking

    c) Fixing bugs

    d) Internal data-breach

  • The legal risks of ethical hacking include lawsuits due to __________ of personal data.

    a) stealing

    b) disclosure

    c) deleting

    d) hacking

    Before performing any penetration test, through legal procedure, which key points listed below is

    not mandatory?

    a) Know the nature of the organization

    b) Characteristics of work done in the firm

    c) System and network

    d) Type of broadband company used by the firm

    An ethical hacker must ensure that proprietary information of the firm does not get leaked.

    a) True

    b) False

    After performing ____________ the ethical hacker should never disclose client information to

    other parties.

    a) hacking

    b) cracking

    c) penetration testing

    d) exploiting

    __________ is the branch of cyber security that deals with morality and provides different

    theories and a principle regarding the view-points about what is right and wrong.

    a) Social ethics

    b) Ethics in cyber-security

    c) Corporate ethics

    d) Ethics in black hat hacking

  • . ________ helps to classify arguments and situations, better understand a cyber-crime and helps

    to determine appropriate actions.

    a) Cyber-ethics

    b) Social ethics

    c) Cyber-bullying

    d) Corporate behaviour

    A penetration tester must identify and keep in mind the ___________ & ___________

    requirements of a firm while evaluating the security postures.

    a) privacy and security

    b) rules and regulations

    c) hacking techniques

    d) ethics to talk to seniors

    A ______________ tries to formulate a web resource occupied or busy its users by flooding the

    URL of the victim with unlimited requests than the server can handle.

    a) Phishing attack

    b) DoS attack

    c) Website attack

    d) MiTM attack

    During a DoS attack, the regular traffic on the target _____________ will be either dawdling

    down or entirely interrupted.

    a) network

    b) system

    c) website

    d) router

    The intent of a ______________ is to overkill the targeted server’s bandwidth and other

    resources of the target website.

    a) Phishing attack

    b) DoS attack

    c) Website attack

  • d) MiTM attack

    DoS is abbreviated as _____________________

    a) Denial of Service

    b) Distribution of Server

    c) Distribution of Service

    d) Denial of Server

    A DoS attack coming from a large number of IP addresses, making it hard to manually filter or

    crash the traffic from such sources is known as a _____________

    a) GoS attack

    b) PDoS attack

    c) DoS attack

    d) DDoS attack

    DDoS stands for _________________

    a) Direct Distribution of Server

    b) Distributed Denial of Service

    c) Direct Distribution of Service

    d) Distributed Denial of Server

    Instead of implementing single computer & its internet bandwidth, a ____________ utilizes

    various systems & their connections for flooding the targeted website.

    a) GoS attack

    b) PoS attack

    c) DDoS attack

    d) DoS attack

    There are ______ types of DoS attack.

    a) 2

    b) 3

    c) 4

  • d) 5

    Application layer DoS attack is also known as _______________

    a) Layer4 DoS attack

    b) Layer5 DoS attack

    c) Layer6 DoS attack

    d) Layer7 DoS attack

    ___________ is a type of DoS threats to overload a server as it sends a large number of requests

    requiring resources for handling & processing.

    a) Network Layer DoS

    b) Physical Layer DoS

    c) Transport Layer DoS

    d) Application Layer DoS

    Which of the following is not a type of application layer DoS?

    a) HTTP flooding

    b) Slowloris

    c) TCP flooding

    d) DNS query flooding

    Network layer attack is also known as ________________

    a) Layer3-4 DoS attack

    b) Layer5 DoS attack

    c) Layer6-7 DoS attack

    d) Layer2 DoS attack

    Which of the following do not comes under network layer DoS flooding?

    a) UDP flooding

    b) HTTP Flooding

    c) SYN flooding

    d) NTP Amplification

  • Which of the following do not comes under network layer DoS flooding?

    a) DNS amplification

    b) UDP flooding

    c) DNS query flooding

    d) NTP Amplification

    DDoS are high traffic events that are measured in Gigabits per second (Gbps) or packets per

    second (PPS).

    a) True

    b) False

    A DDoS with 20 to 40 Gbps is enough for totally shutting down the majority network

    infrastructures.

    a) True

    b) False

    ______________ is an internet scam done by cyber-criminals where the user is convinced

    digitally to provide confidential information.

    a) Phishing attack

    b) DoS attack

    c) Website attack

    d) MiTM attack

    In _______________ some cyber-criminals redirect the legitimate users to different phishing

    sites and web pages via emails, IMs, ads and spyware.

    a) URL Redirection

    b) DoS

    c) Phishing

    d) MiTM attack

  • Phishers often develop ______________ websites for tricking users & filling their personal data.

    a) legitimate

    b) illegitimate

    c) genuine

    d) official

    Which of the following type of data, phishers cannot steal from its target victims?

    a) bank details

    b) phone number

    c) passwords

    d) apps installed in the mobile

    Algorithm-Based Phishing was developed in the year __________

    a) 1988

    b) 1989

    c) 1990

    d) 1991

    ______________ was the first type of phishing where the phishers developed an algorithm for

    generating random credit card numbers.

    a) Algo-based phishing

    b) Email-based phishing

    c) Domain Phishing

    d) Vishing

    Email Phishing came into origin in the year __________

    a) 1990

    b) 2000

    c) 2005

    d) 2015

    _________________ type of phishing became very popular as if it has been sent from a

    legitimate source with a legitimate link to its official website.

  • a) Algo-based phishing

    b) Email-based phishing

    c) Domain Phishing

    d) Vishing

    _____________ refers to phishing performed over smart-phone by calling.

    a) Algo-based phishing

    b) Email-based phishing

    c) Domain Phishing

    d) Vishing

    _____________ = voice + phishing.

    a) Algo-based phishing

    b) Vishing

    c) Domain Phishing

    d) Email-based phishing

    Victims of phishing are mostly ___________________

    a) Tech enthusiast

    b) Professional computer engineers

    c) Lack of computer knowledge

    d) Lack of management skill

    ___________________ is usually targeted by nature where the emails are exclusively designed

    to target any exact user.

    a) Algo-based phishing

    b) Vishing

    c) Domain Phishing

    d) Spear phishing

    . ____________ or smishing is one of the simplest types of phishing where the target victims

    may get a fake order detail with a cancellation link.

    a) Algo-based phishing

  • b) SMS phishing

    c) Domain Phishing

    d) Spear phishing

    ________________ phishing is that type of phishing where the construction of a fake webpage is

    done for targeting definite keywords & waiting for the searcher to land on the fake webpage.

    a) Voice

    b) SMS

    c) Search engine

    d) Email

    Which of the following is not an example or type of phishing?

    a) Spear phishing

    b) Deceptive phishing

    c) Whaling

    d) Monkey in the Middle

    Which of the following is not an example or type of phishing?

    a) Tracking

    b) Vishing

    c) Smishing

    d) Pharming

    _____________ is data interception method used by hackers.

    a) Phishing

    b) DoS

    c) Sniffing

    d) MiTM

    Sniffing is also known as ___________________

    a) network-tapping

    b) wiretapping

    c) net-tapping

  • d) wireless-tapping

    _____________ are programs or devices that capture the vital information from the target

    network or particular network.

    a) Routers

    b) Trappers

    c) Wireless-crackers

    d) Sniffers

    Which of them is not an objective of sniffing for hackers?

    a) Fetching passwords

    b) Email texts

    c) Types of files transferred

    d) Geographic location of a user

    Which of the following tech-concepts cannot be sniffed?

    a) Router configuration

    b) ISP details

    c) Email Traffic

    d) Web Traffic

    Which of the following tech-concepts cannot be sniffed?

    a) Cloud sessions

    b) FTP passwords

    c) Telnet passwords

    d) Chat sessions

  • Which of the below-mentioned protocol is not susceptible to sniffing?

    a) HTTP

    b) SMTP

    c) POP

    d) TCP

    Which of the below-mentioned protocol is not susceptible to sniffing?

    a) NNTP

    b) UDP

    c) FTP

    d) IMAP

    There are __________ types of sniffing.

    a) 2

    b) 3

    c) 4

    d) 5

    Active sniffing is difficult to detect.

    a) True

    b) False

    Which of the following is not a sniffing tool?

    a) Wireshark

    b) Dude Sniffer

    c) Maltego

    d) Look@LAN

    A sniffer, on the whole turns your system’s NIC to the licentious mode so that it can listen to all

    your data transmitted on its division.

    a) True

    b) False

  • A ______________ on the whole turns your system’s NIC to the licentious mode so that it can

    listen to all your data transmitted on its division.

    a) Phishing site

    b) Sniffer tool

    c) Password cracker

    d) NIC cracker

    In _____________ sniffing, the network traffic is not only supervised & locked but also be can

    be altered in different ways to accomplish the attack.

    a) passive

    b) signal

    c) network

    d) active

    __________________ are those devices which can be plugged into your network at the hardware

    level & it can monitor traffic.

    a) Hardware sniffers & analyzers

    b) Hardware protocol analyzers

    c) Hardware protocol sniffers

    d) Hardware traffic sniffers and observers