You are on page 1of 41

Subject: - Advanced Unix Programming (177101)

BE - Computer

Q. Multiple Choice Questions Answer


No Key
1 Unix OS was first developed at --------. b)
a) Microsoft corp. USA b) AT & T Bell Labs, USA
c) IBM, USA d) Borland International, USA
2 Unix is written in-------. a)
a) C language b) Ada language
c) Perl language d) Pascal language
3 Which option of ls command used to view file inode number? d)
a) –l b) –o c) –a d) –i
4 Which one shows the name of the operating system? c)
a) uname –n b) uname -r
c) uname –o d) uname –m
5 Unix is a ------------. c)
a) Single User, Single tasking OS
b) Single User, Multi-tasking OS
c) Multi-User, Multi- tasking OS
d) None
6 Shell Program is stored in a file called------. b)
a) Unix b) sh c) Dd d) Cc
7 Which shell offers a command history feature? c)
a) C shell
b) Visual shell
c) Bourne shell
d) Korn shell
8 Unix Command can be typed in -------. a)
a) Lower case b) Upper case
c) Both the cases d) None
9 The close system call can return ------. d)
a) 0 b) -1 c) 1 d) 0 or -1
10 Which command can be used to delete a file? c)
a)del b) remove c) rm d) delete
11 Which command can introduce clock delay? a)
a) sleep b) wait c) suspend d) delay
12 In Unix, every process has entry in the -------. b)
a) Thread table b) Process table
c) Page table d) Program table
13 getuid() fuction returns---------. b)
a) Process ID b) User ID
c) Group ID d) None of the above
14 What is Signal? c)
a) Change the execution mode of the program from user mode to
kernel mode.
b) It is an executable file residing on disk in a directory
c) Signals are a technique used to notify a process that some
condition has occurred.
d) All of the above
15 Which of the following system call is used for closing a file? c)
a) open
b) lseek
c) close
d) write
16 Which of the following is not a unix command? d)
a) Cd b) rm c) pwd d) del
17 The getgid() function returns---------. c)
a) Error Id
b) User Id
c) Group ID
d) All of above
18 Signals are handled using which system call? b)
a) read b) signal c) both d) none
19 When we are executing a shell script the shell acts as ------- a)
a) An interpreter b) A compiler
c) An operating system d) None of the above
20 Which command is used to terminate a process d)
a) Shutdown b) Haltsys
c) Cancel d) Kill
21 Which of the following system call is used for writing to the file? d)
a) open b) lseek
c) close d) write
22 The function sync is normally called periodically, every -----, from b)
a system daemon, often called update.
a) 20 seconds b) 30 seconds
c) 40 seconds d) 60 seconds
23 The -------- system call is used for positioning the offset pointer. d)
a) read b) write
c) open d) lseek.
24 Which of the following offset is used with lseek system call to set b)
the offset pointer to the end of the file?
a) SEEK_SET b) SEEK_END
c) SEEK_CUR d) SEEK_CR
25 For reading input, which of the following system call is used? c)
a) write b) rd
c) read d) change
26 Which of the following system call is used for opening or creating c)
a file?
a) read b) write
c) open d) close
27 There are ------- modes of opening a file. b)
a) 4 b) 3 c) 2 d) 1
28 Which of the following mode is used for opening a file in both c)
reading and writing?
a) O_RDONLY b) O_WRONLY
c) O_RDWR d) O_WDR

29 Which library function is used for printing error messages? a)


a) strerror b) stderror
c) strer d) ptrerro
30 What the perror ( ) function does? b)
a) Work same as scanf()
b) function produces an error message on the standard error device
c) prints the garbage value assigned by the
d) None of the above
31 We can also duplicate the file descriptor using ___ b)
a) dup1 b) dup2
c) exevr d) exec
32 Which of the following system call is used for duplicating file a)
descriptor?
a) dup b) decr
c) exec d) execv
33 For changing the time stamps, _____ system call is invoked. b)
a) atime
b) utime
c) mtime
d) ch
34 Two filenames are automatically created whenever a new directory a)
is created ----.
a) dot and dot-dot b) hash and hash-hash
c) kernel and shell d) None of the mentioned.
35 Which of the following system call uses file descriptor as an d)
argument?
a) read b) write
c) close d) read, write, close
36 A pathname that begins with a ------ is called an absolute pathname. a)
a) slash b) dollar
c) hash d) None of the mentioned.
37 Process time is also called a)
a) CPU time b) Perform time
c) Calender time d) none of the above
38 Which different two time values UNIX systems have maintained? b)
a) Evening time afternoon time
b) Calender time and process time
c) Day time and night time
d) none of the mentioned
39 System calls can be defined as:- a)
a) The functions which change the execution mode of the program
from user mode to kernel mode
b) It is an executable file residing on disk in a directory
c) Signals are a technique used to notify a process that some
condition has occurred.
d) none of the above
40 UNIX System shells associate file descriptor 1 with -------. b)
a) Standard Error
b) Standard output
c) Standard input
d) All of the above
41 Which of the following fields in the structure stat, has information b)
about the permission setting of a file?
a) st_gid b) st_mode c)st_ino d) st_uid
42 Which of the following are not system calls? d)
a)chmod b) open c) lseek d) getc
43 Sticky bit can be set using following permission d)
a) 0777 b) 2666 c) 4744 d)1711
44 If the umask value is 0002. what will be the permissions of new b)
directory
a)777 b)775 c)774 d)664
45 The file permission 764 means: c)
a)Every one can read, group can execute only and the owner can
read and write
b)Every one can read and write, but owner alone can execute
c)Every one can read, group including owner can write, owner
alone can execute
d) Every one can read and write and execute
46 Which of the following umask settings doesn’t allow execute c)
permission to be set by default on directory files
a)222 b)111 c)000 d)444
47 lstat function returns -----. a)
a) information about the symbolic link. b) file position.
c) descriptor. d) none of the above
48 st_mode mask S_IRUSR file access permission for-------- . a)
a)User read b)User write c)User execute d)None of the above
49 st_mode mask S_IRGRP file access permission for ------------ a)
a) group_read b)group_execute
c)user _read d) none of the above
50 st_mode mask S_IWUSR file access permission for ------------ b)
a) group_read b) user_Write
c) group_execute d) none of the above
51 Which of the following commands can be used to change default c)
permissions for files and directories at the time of creation?
a) chmod b)chown c)umask d)chgrp
52 The minimum number of links for any directory file are d)
a) 3 b) 4 c)1 d) 2
53 The default value of Umask is c)
a) 1024 b)4021 c)0022 d)1001
54 st_mode mask S_IXGRP file access permission for ------------ . c)
a) group_read b)user_Write
c) group_execute d)none of the above
55 The permission 746 can be represented as d)
a) rwxrwx- -x b) rw- -w-r-x c) rwxr-xr-x d) rwxr- -rw–
56 The command pwd gives a)
a) Present working directory b) Password in encrypted form
c) Password in decrypted form d) None
57 Which type of access is granted to all users for the /etc/passwd file? a)
a) read b) Execute c) No access d) Write
58 password file has been stored in a)
a)/etc/passwd b)/etc/pwd
c) /bin/passwd d)none of the above
59 The size of any block in the unix file system is d)
a) 512 bytes b)1024 bytes
c) 2048 bytes d) Any of the above
60 Which file gets executed when we use the passwd command c)
a) /etc/passwd b) /etc/pwd
c)/bin/passwd d) /passwd
61 The state of the file system is contained in c)
a) Boot block b) A special block created by Book Block
c) Super Block d) None of the above
62 Each entry in inode table is of size d)
a) 64 kb b)32kb c)32 bytes d)64 bytes
63 The second set of the three permissions (r-) indicates that a)
a) group has read permission only
b) other has read permission only
c) owner has read permission only
d) group has write permission only
64 Which of the following system call is used for truncating a file? d)
a)truncate b)ftruncate c)Trunk d) truncate and ftruncate
65 For creating and removing directories, which of the following d)
system calls are used?
a)mkdir b) rmdir c) chdir d) mkdir and rmdir
66 Default value of group-execute file access permission is --------. c)
a)00400 b)00100 c)00010 d)all of the above
67 For creating a hard and symbolic link, which system calls are used? b)
a)link, unlink b) link, symlink
c) unlink, ulink d) hlink, slink
68 For removing a link, ____ is used. c)
a)link b) symlink c)unlink d)delink
69 Default value of group_read file access permission is --------. b)
a) 00200 b)00040 c)00400 d)all of the above
70 For changing the time stamps, _____ system call is invoked. b)
a) atime b) utime c)mtime d) ch
71 Which of the following system calls performs the action of cd d)
command?
a)chdir b)fchdir c) mkdir d)chdir and fchdir
72 The stat and fstat functions return ------ . b)
a)time stamp b) a structure of information containing all the
attributes of a file c) value d) none of the above
73 Default value of user-write file access permission is --------. a)
a)00200 b)00100 c)00400 d)all of the above
74 Default value of user-read file access permission a)
a)00400 b)00100 c)00200 d)all of the above
75 The time function returns -------- . b)
a) execution time b) current time and date c)previous time d)All
of the above
76 gettimeofday function provides---------. c)
a) execution time b) previous time
c)greater resolution (up to a microsecond) than the time function
d) none of the above
77 localtime and gmtime converts --------------. b)
a) time zone b) a calendar time into a broken-
down time
c)into human readable form d) none of the above
78 gethostname function to return ------------ . a)
a) only the name of the host b) host name and host size
c) both A and B d) all of the above
79 The UNIX System's group file getgrgid function returns -------- a)
a)numerical group ID b)group name c)time d)none of the
above
80 uname function used to find out d)
a) Name of operating system b) Current release of OS
c)Current version of this release d) All of the above
81 Each process is identified by a unique integer called --------. a)
a) PID b) PPID c) TID d) PTID
82 Every process has a parent process. a)
a) True b) False c) Either A or B d) None of the above
83 The parent id of a child is called --------. b)
a) PID b) PPID c) TID d) PTID
84 Which process is immediately set up by the kernel when we log on a)
to a UNIX system?
a) shell b) parent c) shell d) bash
85 To know the PID of your current shell, which command will be a)
used?
a) echo$$ b) echo$ c) $SHELL d) $PATH
86 What is the PID of the first process that is set up when the system b)
is booted?
a) 1 b) 0 c) any d) 2
87 Which of the following command is used to create a new child b)
process?
a) pwd b) fork c) cd d) pwd and cd
88 Which command shows some attributes of a process? c)
a) pid b) $$ c) ps d) HOME
89 Which of the following attribute is not shown by ps command? d)
a) PID b) PPID c) tty d) size

90 There are ___ distinct phases of a process. d)


a) 2 b) 5 c) 4 d) 3
91 What is the value returned by fork system call, when the creation of b)
child process is unsuccessful?
a) Positive Integer b) Negative Integer
c) Zero d) Fractional Value
92 Which system call is used to run a new program? c)
a) fork b) wait c) exec d) exit
93 Which system call is used by the parent process to wait for the b)
child process to complete?
a) wait b) exec c) fork d)exit
94 Shell ___ operator is used for running jobs in the background. d)
a) $ b) # c) | d) &
95 Which of the following shell(s) allows the user to run jobs in the d)
background even when the user has logged out?
a) C b) Bash c) Korn d) C and Bash
96 Which command is used for premature termination of a process? c)
a) signal b) nice c) kill d) nohup
97 The collection of memory locations that the process can access is c)
called ------.
a) Process Table b) Process Space c) Virtual Address Space
d) Virtual Space
98 The virtual address space consists of ____ segments. b)
a) 4 b) 5 c) 3 d) 2
99 The segment representing the constants, global and static variables b)
is called --------.
a) Text Segment b) Data Segment
c) Stack Segment d) Heap Segment
100 The stack stores the _______ d)
a) Arguments and Local Variables b) Address to return
c) Global Variables
d) Arguments and local variables and address to return
101 The attributes of every process are stored in ____ c)
a) Data Table b) Inode Table c) Process Table d) Heap
102 The entire process life cycle is built around ___ system calls. b)
a) 3 b) 4 c) 2 d) 5
103 Which of the following system call is used for replicating a a)
process?
a) fork b) exec c) wait d) _exit
104 Which of the following functions is used for handling environment d)
variables of a process?
a) getenv b) setenv c) letenv d) getenv and setenv
105 The parent process picks up the exit status of a child using ___ a)
system call.
a) wait b) waitp c) exec d) kill
106 Which of the following system call is more powerful (in waiting b)
mechanism) than wait system call?
a) waitp b) waitpid c) kill d) run
107 If the child dies first but the entry of that child in the process table b)
is still present, then that process is called ____
a) orphan b) zombie c) termin d) daemon
108 Which of the following system call is used for duplicating file a)
descriptor?
a) dup b) decr c) exec d) execv
109 The environment variables are available in _____ a)
a) *environ[ ] b) env[ ] c) env d) pipe
110 Which of the following functions are used for obtaining and setting d)
the value of environment variables?
a) getenv b) setenv c) env d) getenv and setenv
111 Environment variables can be accessed by--------. d)
a) system programs b) C programs
c) shell scripts d) All of these
112 Which of the following characteristics of the original process are d)
preserved when the exec system call is executed?
a) The current working directory b) The open files
c) PID & PPID d) All the above
113 Local variables are stored in an area called ___________ d)
a) Heap b) Permanent storage area
c) Free memory d) Stack
114 Which of the following functions allocates multiple blocks of c)
memory, each block of the same size?
a) malloc() b) realloc() c) calloc() d) free()
115 The prototype for the main function is: c)
a) int main (int argc, char *argv);
b) int main (int argc[], char *argv[ ]);
c) int main (int argc, char *argv[ ]);
d) int main (int argc[], char *argv);
116 There are _____ ways for a process to terminate. d)
a) 6 b) 5 c) 3 d) 8
117 Which is Abnormal termination way? d)
a) Calling abort
b) Receipt of a signal e.g. pressing control c
c) Response of the last thread to a cancellation request
d) All the above
118 In which segment dynamic memory allocation is done? d)
a) Text Segment b) Data Segment
c) Stack Segment d) Heap Segment
119 The _________function lets us increase or decrease the size of a b)
previously allocated area.
a) free b) realloc c) malloc d) None of the above
120 The fork function is called once but returns ___________. b)
a) thrice b) twice c) once d) None of the above
121 Signals that occur at the same time, are presented to the process----. b)
a) one at a time, in a particular order
b) one at a time, in no particular order
c) all at a time
d) none of the mentioned
122
W Which of the following is not TRUE? c)
a) Processes may send each other signals
b) Kernel may send signals internally
c) A field is updated in the signal table when the signal is sent
d) Each signal is maintained by a single bit
123 Signals of a given type ---------------. b)
a) are queued
b) are all sent as one
c) cannot be queued
d) none of the mentioned
124 The three ways in which a process responds to a signal are ------. d)
a) ignoring the signal
b) handling the signal
c) performing some default action
d) all of the mentioned
125 Signals are identified by -------------. a)
a) signal identifiers b) signal handlers
c) signal actions d) none of the mentioned
126 A process can never be sure that a signal it has sent __________ b)
a) has which identifier
b) has not been lost
c) has been sent
d) all of the mentioned
127 In UNIX, the set of masked signals can be set or cleared using the - c)
--------- function.
a) sigmask b) sigmaskproc
c) sigprocmask d) sigproc
128 The usefulness of signals as a general inter process communication c)
mechanism is limited because ---------------------.
a) they do not work between processes
b) they are user generated
c) they cannot carry information directly
d) none of the mentioned
129 The usual effect of abnormal termination of a program is ---------. a)
a) core dump file generation b) system crash
c) program switch d) signal destruction
130 In UNIX, the abort () function sends the ________ signal to the d)
calling process, causing abnormal termination.
a) SIGTERM
b) SIGSTOP
c) SIGABORT
d) SIGABRT
131 In most cases, if a process is sent a signal while it is executing a c)
system call --------
a) the system call will continue execution and the signal will be
ignored completely
b) the system call is interrupted by the signal, and the signal
handler comes in
c) the signal has no effect until the system call completes
d) none of the mentioned

132 In UNIX, the --------- system call is used to send a signal. c)


a) sig b) send c) kill d) sigsend
133 The --------- function allows a process to send a signal to itself. d)
a) pause b) kill c) alarm d) raise
134 Which function adds a single signal (represented by signo) to an c)
existing set.
a) Sigemptyset
b) sigdelset
c) sigaddset
d) sigfillset
135 Which of the following is User-defined signal ? c)
a) SIGUSR1 b) SIGUSR2
c) Both A and B d) None of the above
136 Which one of the following is not shared by threads? c)
a) program counter b) stack
c) both program counter and stack d) none of the mentioned
137 A process can be --------. c)
a) single threaded b) multithreaded
c) both single threaded and multithreaded d) none of the above
138 Termination of the process terminates --------------. b)
a) first thread of the process
b) all threads within the process
c) first two threads of the process
d) no thread within the process
139 Which one of the following is not a valid state of a thread? b)
a) running b) parsing c) ready d) blocked
140 The register context and stacks of a thread are deallocated when a)
the thread?
a) terminates b) blocks c) unblocks d) spawns
141 Thread synchronization is required because -------------. d)
a) all threads of a process share the same address space
b) all threads of a process share the same global variables
c) all threads of a process can share the same files
d) all of the mentioned
142 Additional threads can be created by calling the ----------- function. c)
a) pthread_join b) pthread_exit
c) pthread_create d) pthread_self
143 What is Thread cancellation? c)
a) the task of destroying the thread once its work is done
b) the task of removing a thread once its work is done
c) the task of terminating a thread before it has completed
d) none of the mentioned
144 If multiple threads are concurrently searching through a database b)
and one thread returns the result then the remaining threads must
be ---------.
a) continued
b) cancelled
c) protected
d) none of the mentioned
145 Cancelling a thread asynchronously --------. b)
a) frees all the resources properly
b) may not free each resource
c) spoils the process execution
d) none of the mentioned
146 A thread can obtain its own thread ID by calling the ------function. d)
a) pthread_join b) pthread_exit
c) pthread_create d) pthread_self
147 Which of the following is considered as the super daemon in b)
Unix?
a) sysinit b) init c) inetd d) proc
148 Which daemon provides support for the advanced power b)
management features available with various computer systems?
a) Keventd b) kapmd
b) kswapd d) None of the above
149 There are --------- coding rules for daemon. b)
a) 5 b) 6 c) 4 d) 7
150 Which of the following are daemon coding rules? d)
a) Call umask function
b) Call fork and have the parent exit
c) Call setsid fuction to create a new session
d) All the above
151 The ---------- is used to log system messages for an operator. b)
a) inetd daemon
b) syslogd daemon
c) cron daemon
d) None of above
152 Daemons are processes that-------. d)
a) run in background. b) live for a long time.
c) started at boot time d) All the above
153 The ------ daemon executes commands at specified dates and times. c)
a) inetd daemon b) portmap daemon
c) cron daemon d) keventd daemon
154 Most user processes (daemons) call the ------ function to generate b)
log messages.
a) inetd b) syslog c) openlog d) closelog
155 The time between the generation of a signal and its delivery, the a)
signal is said to be --------.
a) pending b) delivered c) blocked d) None of the above
156 Every signal has a name that begins with -------. b)
a) SI b) SIG c) SIGA d) None of above
157 The -------function suspends the calling process until a signal is a)
caught.
a) pause b) alarm c) kill d) None of the above
158 Which are various functions in signal sets? c)
a) sigfillset b) sigemptyset
c) Both A & B d) None of the above
159 The -------- function causes the calling process to be suspended a)
a) sleep b) pause c) both A and B d) only B
160 What is default action for SIGKILL signal? c)
a) terminate + core b) stop process
c) terminate d) None of the above
161 IPC stands for---------.
a) Intra-process Communication b) Interprocess Communication b)
c) Inter-programming Communication d)None of the mentioned
162 Pipe is a mechanism provided by UNIX to communicate between a)
two ---------.
a) Processes b) Programs c)Threads d) None of the mentioned
163 Historically, pipes have been -------. c)
a) Full duplex b)Duplex c) Half duplex d) None of the
mentioned
164 A pipe is created by calling the -------- function. a)
a) pipe b) create c) socket d) FIFO
165 The filedes[0] returned by pipe function, is open for -----------. c)
a) writing b) reading and writing c) reading d) None of the
mentioned
166 If we read from a pipe whose write end has been closed, then ------- c)
returns 0 to indicate an end of file after all the data has been read.
a) write b)read-write c) read d) None of the mentioned
167 FIFOs are sometimes called as ------- pipes. d)
a) unnamed b) simple c) parallel d) named
168 The -------- function is used to create a FIFO. b)
a) pipe b) mkfifo c) makefifo d) create
169 An IPC object is associated with a ----- that acts as an external a)
name.
a) key b) identifier c) value d) None of the mentioned
170 In XSI IPC, the key is converted into an identifier by the --------. b)
a) shell b) kernel c) library d) compiler

171 The --------- function is used to generate a key for IPC structure. d)
a) ktof b) keygen c) create d) ftok
172 The XSI IPC permission for group read is indicated by--------. d)
a) 0020 b) 0400 c) 0002 d) 0040
173 A ---------- is a linked list of messages stored within the kernel. c)
a) pipe b) semaphore c) message queue d) None of the
mentioned
174 Communication via message queues is -----------. a)
a) message-oriented b) byte-oriented c) bit-oriented d)
None of the mentioned
175 A new queue is created or an existing queue opened by ---------- a)
function.
a) msgget b) msgcreate c) msgsnd d) None of the mentioned
176 New messages are added to the end of a message queue by -------- c)
function.
a) msgrcv b) msgget c) msgsnd d) None of the mentioned
177 The msgget function returns ------ if OK. c)
a) 0 b) 1 c) message queue ID d) -1
178 Messages are retrieved from a message queue by ---------function. a)
a) msgrcv b) msgsnd c) msgreceive d) None of the
mentioned
179 The -------- do not make information available between processes, b)
but instead synchronize access to shared resources.
a) pipe b) semaphore c) named pipe d) message
queue
180 The Wait and Signal operations in semaphore were originally d)
termed as ---------------.
a) V and P b) W and A c) W and S d) P and V
181 The semget function is used to obtain a ----------. b)
a) semaphore name b) semaphore ID c) semaphore value
d) None of the mentioned
182 The -------- is the fastest form of IPC. b)
a) pipe b) shared memory c) semaphore d)message queue
183 The shmat( ) is used to --------------. a)
a) attach the shared memory segment b) detach the shared
memory segment c) delete the shared memory segment d) None
of the mentioned
184 The IPC ------- can be used by processes to communicate with c)
other processes where the processes can be on the same machine or
on different machines.
a) message queue b) semaphore c) socket d) None of the
mentioned
185 The socket is made up of an IP address concatenated with a ------- c)
number.
a) device b) starting c) port d) None of the mentioned
186 The return value of socket function is ----------------, if OK. d)
a) 1 b) 0 c) -1 d) socket descriptor
187 The domain AF_INET6 represents ---------------. a)
a) IPv6 Internet domain b) IPv4 Internet domain
c) UNIX domain d) None of the mentioned
188 The SHUT_RDWR parameter in a shutdown function is used c)
for-------.
a) disabling the writing to the socket.
b) disabling the reading to the socket.
c) disabling both transmission and reception
d) enabling both transmission and reception
189 The correct socket API calling sequence for server is---------. b)
a) socket – listen – accept – bind
b) socket – bind – listen – accept
c) socket – bind – accept – listen
d) bind – listen – accept – socket
190 The bind function is used -----------. c)
a) to create a socket b) to connect to a socket
c) to associate an address with a socket d) None of the mentioned
191 In IPC between the client and server, the connect function is used a)
by the -------.
a) client b) server c) client and server d) None of the
mentioned
192 IN IPC, the server announces that it is willing to accept connect b)
request by using the ------- function.
a) socket b) listen c) bind d) None of the mentioned
193 The backlog argument in listen function specifies -------- number of c)
connection requests that may be queued for the socket.
a) minimum b) few c) maximum d) None of the
mentioned
194 The accept function typically ------- until a client connects with the b)
server.
a) doesn’t block b) blocks c) releases d) None of the
mentioned
195 The send function used in IPC, returns---------, if OK. a)
a) number of bytes sent b) number of bytes received
c) 0 d) 1
196 The SOCK_DGRAM type of the socket is-------------. a)
a) connectionless b) connection oriented c) connectionless and
connection oriented d) None of the mentioned
197 In IPC, for a --------- it is necessary to associate a well-known b)
address.
a) client b) server c) client and server d) None of the
mentioned
198 The len argument (third argument) in a connect function specifies b)
the size of the -----------.
a) sock structure b) sockaddr structure
c) socket d) None of the mentioned
199 In listen function, the upper limit of backlog argument in some d)
system is -----.
a) 64 b) 256 c) 32 d) 128
200 The MSG_DONTROUTE flag used with send function in IPC, c)
means -------.
a) Enable nonblocking operation b) Route packet outside of
local network. c) Don't route packet outside of local network.
d) None of the mentioned
Artificial Intelligence & Expert System
(177102)
Question Bank
Be E - Computer
Que. Questions Answer
No. Key
UNIT - I
1. Which of the following contains the output segments of Artificial Intelligence D
programming?
A. Printed language and synthesized speech
B. Manipulation of physical object
C. Locomotion
D. All of the mentioned
2. Strong Artificial Intelligence is __________ A
A. the embodiment of human intellectual capabilities within a computer
B. a set of computer programs that produce output that would be considered to
reflect intelligence if it were generated by humans
C. the study of mental faculties through the use of mental models implemented
on a computer
D. all of the mentioned
3. What is Artificial intelligence? C
A. Putting your intelligence into Computer
B. Programming with your own intelligence
C. Making a Machine intelligent
D. Playing a Game
4. Which search method takes less memory? A
A. Depth-First Search
B. Breadth-First search
C. Optimal search
D. Linear Search
5. A heuristic is a way of trying __________ D
A. To discover something or an idea embedded in a program
B. To search and measure how far a node in a search tree seems to be from a goal
C. To compare two nodes in a search tree to see if one is better than the other is
D. All of the mentioned
6. A.M. turing developed a technique for determining whether a computer could or could A
not demonstrate the artificial Intelligence, Presently, this technique is called
__________
A. Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm
7. A certain Professor at the Stanford University coined the word ‘artificial intelligence’ in B
1956 at a conference held at Dartmouth college. Can you name the Professor?
A. David Levy
B. John McCarthy
C. Joseph Weizenbaum
D. Hans Berliner
8. Who is the “father” of artificial intelligence? A
A. Fisher Ada
B. John McCarthy
C. Allen Newell
D. Alan Turning
9. In 1985, the famous chess player David Levy beat a world champion chess program in B
four straight games by using orthodox moves that confused the program. What was
the name of the chess program?
A. Kaissa
B. CRAY BLITZ
C. Golf
D. DIGDUG
10. The conference that launched the AI revolution in 1956 was held at? A
A. Dartmouth
B. Harvard
C. New York
D. Stanford
11. What is state space? D
A. The whole problem
B. Your Definition to a problem
C. Problem you design
D. Representing your problem with variable and parameter
12. The problem-solving agent with several immediate options of unknown value can A
decide what to do by just examining different possible sequences of actions that lead
to states of known value, and then choosing the best sequence. This process of looking
for such a sequence is called Search.
A. True
B. False
13. A search algorithm takes _________ as an input and returns ________ as an output. B
A. Input, output
B. Problem, solution
C. Solution, problem
D. Parameters, sequence of actions
14. A problem in a search space is defined by one of these state. A
A. Initial state
B. Last state
C. Intermediate state
D. All of the mentioned
15. A problem solving approach works well for ______________ D
A. 8-Puzzle problem
B. 8-queen problem
C. Finding a optimal path from a given source to a destination
D. Mars Hover (Robot Navigation)
16. What is the major component/components for measuring the performance of problem D
solving?
A. Completeness
B. Optimality
C. Time and Space complexity
D. All of the mentioned
17. A production rule consists of ____________ C
A. A set of Rule
B. A sequence of steps
C. Set of Rule & sequence of steps
D. Arbitrary representation to problem
18. Which is the best way to go for Game playing problem? B
A. Linear approach
B. Heuristic approach (Some knowledge is store
C. Random approach
D. An Optimal approach
19. What is the goal of artificial intelligence? C
A. To solve real-world problems
B. To solve artificial problems
C. To explain various sorts of intelligence
D. To extract scientific causes
20. Which is true regarding BFS (Breadth First Search)? B
A. BFS will get trapped exploring a single path
B. The entire tree so far been generated must be stored in BFS
C. BFS is not guaranteed to find a solution if exists
D. BFS is nothing but Binary First Search
21. What is a heuristic function? D
A. A function to solve mathematical problems
B. A function which takes parameters of type string and returns an integer value
C. A function whose return type is nothing
D. A function that maps from problem state descriptions to measures of
desirability
22. What is the problem space of means-end analysis? A
A. An initial state and one or more goal states
B. One or more initial states and one goal state
C. One or more initial states and one or more goal state
D. One initial state and one goal state
23. An algorithm A is admissible if ___________ B
A. It is not guaranteed to return an optimal solution when one exists
B. It is guaranteed to return an optimal solution when one exists
C. It returns more solutions, but not an optimal one
D. It guarantees to return more optimal solutions
24. Which term is used for describing the judgmental or commonsense part of problem A
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
25. What was originally called the “imitation game” by its creator? A
A. The Turing Test
B. LISP
C. The Logic Theorist
D. Cybernetics
26. Which particular generation of computers is associated with artificial intelligence? C
A. Second
B. Fourth
C. Fifth
D. Third
27. What is the primary interactive method of communication used by humans? C
A. reading
B. writing
C. speaking
D. all of the mentioned
28. Which is the first AI programming language? D
A. BASIC
B. FORTRAN
C. IPL(Inductive logic programming)
D. LISP
29. Which is the most straightforward approach for planning algorithm? B
A. Best-first search
B. State-space search
C. Depth-first search
D. Hill-climbing search
30. What are taken into account of state-space search? D
A. Postconditions
B. Preconditions
C. Effects
D. Both Preconditions & Effects
31. How many ways are available to solve the state-space search? B
A. 1
B. 2
C. 3
D. 4
32. How many states are available in state-space search? D
A. 1
B. 2
C. 3
D. 4
33. Which of the following contains the output segments of Artificial Intelligence D
programming?
A. Printed language and synthesized speech
B. Manipulation of physical object
C. Locomotion
D. All of the mentioned
34. Strong Artificial Intelligence is __________ A
A. the embodiment of human intellectual capabilities within a computer
B. a set of computer programs that produce output that would be considered to
reflect intelligence if it were generated by humans
C. the study of mental faculties through the use of mental models implemented
on a computer
D. all of the mentioned
35. In which of the following situations might a blind search be acceptable? C
A. real-life situation
B. complex game
C. small search space
D. all of the mentioned
36. One method of programming a computer to exhibit human intelligence is called A
modeling or __________
A. simulation
B. cognitization
C. duplication
D. psychic amelioration
37. What is the term used for describing the judgmental or commonsense part of problem A
solving?
A. Heuristic
B. Critical
C. Value based
D. Analytical
38. Weak AI is C

A. the embodiment of human intellectual capabilities within a computer.


B. a set of computer programs that produce output that would be considered to
reflect intelligence if it were generated by humans.
C. the study of mental faculties through the use of mental models implemented
on a computer.
D. All of the above
39. An AI technique that allows computers to understand associations and relationships D
between objects and events is called:

A. heuristic processing
B. cognitive science
C. relative symbolism
D. pattern matching
40. The field that investigates the mechanics of human intelligence is: B

A. history
B. cognitive science
C. psychology
D. sociology
UNIT - II
The fundamental goal of KR is to facilitate inference from -----------
A. Knowledge
1. B. Principles A
C. Architecture
D. Planning
--------- attribute is of general importance
A. Physics
2. B. Instance B
C. Principle
D. Logic
Instance and IsA support the property of ----------
A. Inheritance
3. B. Polymorphism A
C. Lower
D. Intermediate
The class – instance relationship is shown by ----- attribute
A. Top
4. B. IsA B
C. Lower
D. Intermediate
-------------- Property is about the consistency check.
A. Top
5. C
B. Middle
C. Inverses
D. Intermediate
------------- relationship is important among the attributes for inheritance
A. Generalization
6. B. Indirect A
C. Quality
D. Performance
This decision making process of deciding whether the values of the attributes are to be
specified explicitly or not is known as a --------- System.
A. Direct
7. B
B. Reasoning
C. Quality
D. Performance
Attribute which always takes a unique value is called as ------------ attribute
A. Single valued
8. B. W. Taylor A
C. Gilberth
D. Elton Mayo
The study of primitives and their level is done while choosing -----------
A. Distance
9. B. Granularity B
C. Speed
D. Time
The set of objects are chosed through the use of ----------- quantifier
A. Henry Fayol
10. B. W. Taylor D
C. Gilberth
D. Universal
------------- logic satisfy the requirement of any language
A. Henry Fayol
11. B. W. Taylor D
C. Gilberth
D. Predicate
Every sentence contains subject and ----------------
A. Predicate
12. B. Safety A
C. Meaning
D. Self Reality
------------- tells what the sentence is about
A. Subject
13. B. Management A
C. Thinking
D. Organizing
------------- can be given names.
A. Flexibility
14. B. Predicates B
C. Commitment
D. Navigation
Predicates always tells something about ------------
A. Flexibility
15. B. Limitation C
C. Verb
D. Navigation
The most popular approach for KR is to use ------------ rules
A. Production
16. B. Limitation A
C. Commitment
D. Navigation
Production rules are sometime called as ---------- rules
A. Flexibility
17. B. Limitation D
C. Commitment
D. IF - Then
Production rules are -------------
A. Modular
18. B. Single Use A
C. Enterprise
D. Repetitive
Production rules are ----------- of other rules
A. Repetitive
19. B. Single Use B
C. Enterprise
D. Time
Rule based system are also called as ---------- system
A. Dependent
20. B. Single Use C
C. Production
D. Independent
Rule based system consist of -------------- engine
A. Repetitive
21. B. Single Use D
C. Enterprise
D. Inference
-------- chaining is also called as data driven chaining
A. Repetitive
22. B. Single Use C
C. Forward
D. Backward
Forward chaining goes from initial state to -------- state
A. Goal
23. B. Functional A
C. Strategic
D. Final
--------- rules specify the actions to be taken when particular condition occurs
A. Scalar
24. B. Condition B
C. Strategic
D. Staff
-------- chaining is also called as goal driven chaining
A. Repetitive
25. B. Single Use D
C. Forward
D. Backward
Backward chaining starts from gaol state to --------- state
26. A
A. Initial
B. Functional
C. Strategic
D. Personnel
The idea in backward chaining is to focus on -----------
A. Need
27. B. Search B
C. Task
D. Target
The --------- processes the rules and facts in backward chaining
A. Compiler
28. B. Job Analysis C
C. Interpreter
D. Target
----------- were invented by Richard RIchens
A. Semantic Net
29. B. CD A
C. Script
D. All of these
Semantic Net were invented in -------------
A. 1956
30. B. 1959 A
C. 1976
D. 1987
Semantic net is graphically shown in the form of---------- graph
A. Universal
31. B. Directed B
C. Placement
D. Induction
Frames were invented in -------------
A. 1956
32. B. 1959 C
C. 1974
D. 1987
Frames is a collection of --------- and associated values
A. Aptitude
33. B. Trade C
C. Attributes
D. Events
------------ are also known as slot filler knowledge representation
A. Aptitude
34. B. CD D
C. Semantic Net
D. Frames
CD was developed by -------------
A. Henry
D
35. B. Fendary
C. Marvin
D. Schank
--------- primitives depicts transfer of physical location of object
A. ATRANS
36. B
B. PTRANS
C. PROPEL
D. MTRANS
Script was developed in ----------
A. 1977
37. B. 1959 A
C. 1976
D. 1987
Persons involved in the script is shown by ---------- component
A. Formation
38. B. Results D
C. Props
D. Roles
Which of these primitives show transfer of mental information
A. ATRANS
39. B. PTRANS C
C. MTRANS
D. SPEAK
Which of the following show emotions from the human body
A. ATRANS
40. B. EXPEL B
C. MTRANS
D. SPEAK
UNIT - III
Which search is equal to minimax search but eliminates the branches that can’t C
influence the final decision?
A. Depth-first search
1.
B. Breadth-first search
C. Alpha-beta pruning
D. None of the mentioned
Which search is similar to minimax search? B
A. Hill-climbing search
2. B. Depth-first search
C. Breadth-first search
D. All of the mentioned
A game can be formally defined as a kind of search problem with the following D
components.
A. Initial State
3.
B. Successor Function
C. Terminal Test
D. All of the mentioned
Which value is assigned to alpha and beta in the alpha-beta pruning? D
A. Alpha = max
4. B. Beta = min
C. Beta = max
D. Both Alpha = max & Beta = min
General algorithm applied on game tree for making decision of win/lose is D
____________.
A. DFS/BFS Search Algorithms
5.
B. Heuristic Search Algorithms
C. Greedy Search Algorithms
D. MINMAX Algorithms
How the effectiveness of the alpha-beta pruning gets increased? A
6.
A. Depends on the nodes
B. Depends on the order in which they are executed
C. Both a & b
D. None of the mentioned
Which function is used to calculate the feasibility of whole game tree? A
A. Evaluation function
7. B. Transposition
C. Alpha-beta pruning
D. All of the mentioned
To which depth does the alpha-beta pruning can be applied? D
A. 10 states
8. B. 8 States
C. 6 States
D. Any depth
Where does the values of alpha-beta search get updated? A
A. Along the path of search
9. B. Initial state itself
C. At the end
D. None of the mentioned
Which is the most straightforward approach for planning algorithm? B
A. Best-first search
10. B. State-space search
C. Depth-first search
D. Transition Hill-climbing search
Which values are independent in minimax search algorithm? C
A. Every state is dependent
11. B. Root is independent
C. Pruned leaves x and y
D. None of the mentioned
General games involves D
A. Single-agent
12. B. Multi-agent
C. Neither Single-agent nor Multi-agent
D. Only Single-agent and Multi-agent
A constructive approach in which no commitment is made unless it is necessary to do A
so, is ____________
A. Least commitment approach
13.
B. Most commitment approach
C. Nonlinear planning
D. Opportunistic planning
The process by which the brain incrementally orders actions needed to complete a A
specific task is referred as ______________
A. Planning problem
14.
B. Partial order planning
C. Total order planning
D. Both Planning problem & Partial order planning
What is the main task of a problem-solving agent? C
A. Solve the given problem and reach to goal
15. B. To find out which sequence of action will get it to the goal state
C. Both A and B
D. None of the Above
In alpha-beta pruning, _______ is used to cut off' the search at maximizing level only B
16.
and ___________is used to cut off the search at minimizing level only.
A. alpha, beta
B. beta, alpha
C. alpha, alpha
D. beta, beta
STRIPS addresses the problem of efficiently representing and implementation of a C
planner. It is not related to which one of the following?
A. SHAKEY
17.
B. SRI
C. NLP
D. None of these
________ is used in game trees to reduce the number of branches of the search tree to A
be traversed without affecting the solution.
A. Alpha-beta pruning procedure
18.
B. Best first search
C. Goal stack planning
D. Min-max search
Consider the following game tree in which root is a maximizing node and children are B
visited left to right. What nodes will be pruned by the alpha-beta pruning?

19.

A. I
B. HI
C. CHI
D. GHI
STRIPS stands for? A
A. Stanford Research Institute Problem Solver
20. B. Standard Research Institute Problem Solver
C. Stanford Research International Problem Solver
D. None of the mentioned
In STRIPS, each operation is described by D
A. ADD List
21. B. DELETE List
C. PRECONDITION List
D. All of the mentioned
Component of Planning System are________ D
A. Choose the best rule to apply next based on the available information and
apply the chosen rule.
22. B. Detect when solution has been found.
C. Detect dead ends so that they can be avoided and system efforts directed in
more fruitful direction
D. All of the mentioned
STRIPS is an automated planner developed by________ C
A. Richard Fikes
23. B. Nils Nilsson
C. Both A and B
D. None of the mentioned
24. Types of Planning are________ D
A. Non Linear Planning
B. Linear Planning
C. Hierarchical Planning
D. All of the mentioned
STRIPS is developed at________ A
A. SRI International
25. B. Stanford University
C. AT & T's Bell Laboratories
D. None of the mentioned
Macro Operator Planning allow a planner A
A. To build new operator that represent commonly used sequence of operators.
26. B. Reuse the old plan to make the new plan.
C. Both A and B
D. None of the mentioned
The reason that game appeared to be good domain to explore machine intelligence is: C
A. They provide a structured task in which it is very easy to measure success or
failure
27.
B. They did not require large amount of knowledge.
C. Both A and B
D. None of the mentioned
Case based planning, allows planner to: A
A. Reuse the old plan to make the new plan
28. B. To build new operator that represent commonly used sequence of operators.
C. Both A and B
D. None of the mentioned
STRIPS is developed in year_________ A
A. 1971
29. B. 1976
C. 1980
D. 1981
Operators used in block world problem are: D
A. UNSTACK
30. B. STACK
C. PICKUP
D. All of the above
What are the preconditions to apply PICKUP (A) operator ? D
A. The arm must be empty
31. B. there must be nothing on top of block A
C. block A must be on table
D. both andA and B
In STRIPS style representation, ADD list is _____ A
A. list of new predicates that the operator causes become true
32. B. list of old predicates that the operator causes become false
C. list of predicates that must be true for the operator to be applied
D. None of the above
Meta Planning is? A
A. The technique for reasoning not just about the problem being solved but also
about the planning process.
33.
B. To build new operator that represent commonly used sequence of operators.
C. To reuse the old plan to make the new plan
D. none of the above
In STRIPS style representation, DELETE list is _____ B
A. list of new predicates that the operator causes become true
34. B. list of old predicates that the operator causes become false
C. list of predicates that must be true for the operator to be applied
D. None of the above
What are the preconditions to apply STACK(A), operator ? C
A. The arm must already be holding A
35. B. there must be nothing on top of block B
C. Both A and B
D. None of the mentioned
In STRIPS style representation, PRECONDITION list is _____ C
A. list of new predicates that the operator causes become true
36. B. list of old predicates that the operator causes become false
C. list of predicates that must be true for the operator to be applied
D. None of the above
What are the preconditions to apply UNSTACK(A), operator ? C
A. The arm must empty
37. B. there must be nothing on top of block A
C. Both A and B
D. None of the mentioned
Predicates that are used in block world problem to represent results of operators D
are_______
A. ON(x,y)
38.
B. ONTABLE(x)
C. HOLDING(x)
D. all of the mentioned
What are the preconditions to apply PUTDOWN operator ? A
A. The arm must already be holding A
39. B. there must be nothing on top of block A
C. Both A and B
D. None of the mentioned
What are present in the empty plan? D
A. Start
40. B. Finish
C. Modest
D. Both Start and Finish
UNIT - IV
1. Constraint satisfaction problems on finite domains are typically solved using a form of D
___________
A. Search Algorithms
B. Heuristic Search Algorithms
C. Greedy Search Algorithms
D. All of the mentioned
2. Solving a constraint satisfaction problem on a finite domain is an/a ___________ B
problem with respect to the domain size.
A. P complete
B. NP complete
C. NP hard
D. Domain dependent
3. Walt’z Algorithm used for? A
A. Figure labelling
B. Natural Language Processing
C. Neural Network
D. None
4. Consider a problem of preparing a schedule for a class of student. What type of C
problem is this?
A. Search Problem
B. Backtrack Problem
C. CSP
D. Planning Problem
5. Language/Languages used for programming Constraint Programming includes A
____________
A. Prolog
B. C#
C. C
D. Fortrun
6. Constraint Propagation technique actually modifies the CSP problem. A
A. True
B. False
7. Which of the following algorithm is generally used CSP search algorithm? B
A. Breadth-first search algorithm
B. Depth-first search algorithm
C. Hill-climbing search algorithm
D. None of the mentioned
8. What will take place as the agent observes its interactions with the world? A
A. Learning
B. Hearing
C. Perceiving
D. Speech
9. What is used in determining the nature of the learning problem? B
A. Environment
B. Feedback
C. Problem
D. All of the mentioned
10. Which modifies the performance element so that it makes better decision? C
A. Performance element
B. Changing element
C. Learning element
D. None of the mentioned
Individual words are analysed into tokens in ------------ analysis
A. Morphological
11. B. Secondary A
C. Tertiary
D. None
Linear sequence of words are transformed into structures -------- analysis
A. Semantic
12. B. Pragmatic C
C. Syntax
D. Professional
In ------------ analysis we assign meaning to syntactic tree
A. Semantic
13. B. Pragmatic A
C. Syntax
D. Professional
----------- analysis is a process of extracting contextual information
A. Semantic
14. B. Pragmatic B
C. Syntax
D. None
----- learning is defined as a process of memorization by repetition
A. Traditional
15. B. Conventional C
C. Rote
D. None
An ------------ system is a system that employs human knowledge captured in a
computer to solve problems that ordinarily require human expertise.
A. Rare
16. B
B. Expert
C. Frequent
D. None
Neural Networks are multi layer network on -----------
A. Neurons
17. B. Electron A
C. Protons
D. None
Neural Networks can have any number of --------- layers
A. Hidden
18. B. Secondary A
C. Tertiary
D. None
Human brain consists of ---------- neurons on average
19. C
A.910 B.1012 C.1011 D.None
---------- divided into number of anatomic and functional units
A. Eyes
20. B. Sensor D
C. Heart
D. Brain
The neurons are inter connected at a point called -----------
A. Axon
21. B. Dendrites C
C. Synapses
D. None
--------- are responsible for receiving of information in BNN
A. Dendrites
22. B. Axon A
C. Synapses
D. None
--------- is responsible for processing of information in BNN
A. Dendrites
23. B. Soma B
C. Synapses
D. None
--------- is responsible for carrying information in BNN
A. Dendrites
24. C
B. Soma
C. Axon
D. None
--------- is connection between axon and other dendrites neurons
A. Dendrites
25. B. Synapses B
C. Axon
D. None
--------- have the capabilities of self-learning
A. ANN
26. B. BNN A
C. Axon
D. None
ANN consists of artificial neurons called --------- units
A. ANN
27. B. BNN C
C. Processing
D. None
ANN initially goes through ----------- phase
A. Training
28. B. Learning A
C. Processing
D. None
Human brain consist of --------- billions neurons
A. 100
29. B. 86 B
C. 50
D. None
The number of neurons in artificial network is much ------- than BNN
A. More
30. B. Less B
C. Equal
D. None
Biological neurons can fire around -------- times per second on average
A. 100
31. B. 86 C
C. 200
D. None
BNN are self-tolerant
A. True
32. B. False A
C. Can’t say
D. None
Brain consumes about -------- per cent of human’s body energy
A. 100
33. B. 86 C
C. 20
D. None
The first step toward neural network took place in ---------
A. 1943
34. B. 1956 A
C. 1966
D. 1960
35. The Hebbian Learning rule was developed by A
A. Donald
B. Hebb
C. Fayol
D. Henry
E. Marvin
The first perceptron was developed in ----------
A. 1943
36. B. 1958 B
C. 1966
D. 1960
ADALINE and MEDALINE was developed in -----------
A. 1943
37. B. 1958 C
C. 1959
D. 1960
LSTM was proposed in ------------
A. 1997
38. B. 1958 A
C. 1966
D. 1960
--------------- proposed the idea of Perceptron
A. Rosenblat
39. B. Schank A
C. Henry
D. Minsky
In --------- learning, there is a teacher present
A. Supervised
40. B. Norma A
C. Rote
D. None
UNIT - V
1. Which of the following is an advantage of using an expert system development tool? D
A. imposed structure
B. knowledge engineering assistance
C. rapid prototyping
D. all of the mentioned
2. Which university introduced Expert systems ? C
A. Massachusetts Institute of Technology
B. University of Oxford
C. Stanford University
D. University of Cambridge
3. Which of the following is incorrect application of Expert System? D
A. Design Domain
B. Monitoring Systems
C. Knowledge Domain
D. Systems domain
4. Which of the following is not a benefits of Expert Systems? C
A. Availability
B. Speed
C. Time
D. Less Error Rate
5. Which of the following is not a Characteristics of Expert Systems? C
A. Understandable
B. Highly responsive
C. Unreliable
D. High performance
6. Which of the following is incorrect Expert Systems Limitations? C
A. Limitations of the technology
B. Difficult knowledge acquisition
C. Easy to maintain
D. High development costs
7. A ______ is nothing but an expert system without knowledge base. B
A. Tools
B. shell
C. Expert System
D. knowledge
8. Which of the following strategies used by Inference Engine? A
A. Forward Chaining
B. Block Chaining
C. Stable Chaining
D. Both A and B
9. Data, information, and past experience combined together are termed as __________. D
A. Inference
B. Acquisition
C. vision
D. knowledge
10. An AI system developed by Daniel Bobrow to read and solve algebra word problems. D
A. SHRDLU
B. SIMD
C. BACON
D. STUDENT
11. An Expert System is A
A. a computer that can answer questions like a human expert
B. a group of scientists who design computer programs
C. a method of producing new words
D. a computer that can feel emotions.
12. Which university introduced Expert systems? C
A. Massachusetts Institute of Technology
B. University of Oxford
C. Stanford University
D. University of Cambridge
13. Which of the following is not a Capabilities of Expert Systems? D
A. Advising
B. Demonstrating
C. Explaining
D. Expanding
14. Which of the following are Components of Expert Systems? D
A. Knowledge Base
B. Inference Engine
C. User Interface
D. All of the above
15. Which of the following is not a benefits of Expert Systems? C
A. Availability
B. Speed
C. Time
D. Less Error Rate
16. What is the form of Knowledge representation? B
A. IF-THEN
B. IF-THEN-ELSE
C. IF-ELSE
D. All of the above
17. Which of the following is not a Characteristics of Expert Systems? C
A. Understandable
B. Highly responsive
C. Unreliable
D. High performance
18. Which of the following is Capabilities of Expert Systems? B
A. Possessing human capabilities
B. Suggesting alternative options to a problem
C. Refining their own knowledge
D. Substituting human decision makers
19. How many Components of Knowledge Base are there? A
A. 2
B. 3
C. 4
D. 5
20. Which of the following is incorrect Expert Systems Limitations? C
A. Limitations of the technology
B. Difficult knowledge acquisition
C. Easy to maintain
D. High development costs
21. A ______ is nothing but an expert system without knowledge base. B
A. Tools
B. shell
C. Expert System
D. knowledge
22. Which of the following strategies used by Inference Engine? A
A. Forward Chaining
B. Block Chaining
C. Stable Chaining
D. Both A and B
23. Data, information, and past experience combined together are termed as D
A. Inference
B. Acquisition
C. vision
D. knowledge
24. The inference engine is: C
A. The programming environment of an expert system.
B. A strategy for searching the rule base in an expert system that begins with
information entered by the user.
C. A strategy used to search through the rule base in an expert system.
D. A method of organizing expert system knowledge into chunks.
25. Which of the following is an advantage of using an expert system development tool? D
A. imposed structure
B. knowledge engineering assistance
C. rapid prototyping
D. all of the mentioned
26. The explanation facility of an expert system may be used to: D
A. construct a diagnostic model
B. expedite the debugging process
C. explain the system's reasoning process
D. both b and c
27. _____ are knowledge based system to which present rules are applied to solve a A
particular problem.
A. ES
B. AI
C. KBS
D. Base rule 0
28. Which of the following is not true about expert systems? D
A. Expert systems are collections of human knowledge
B. Expert systems are expensive to design.
C. expert systems are usually designed to run on small general-purpose computers
D. Maintenance support may be difficult to obtain for an expert system.
29. Expert systems are part of the general area of research known as _____ A
A. AI
B. ES
C. STUDENT
D. RAND
30. The components of an expert system include a .......... that perform interfaces on the B
knowledge base and communicate answers to a user's questions?
A. Database and software module
B. Knowledge base and software module
C. communication base and software module
D. Knowledge base and interactive module
31. Which of the following statements are the disadvantages of Expert System? C
i) They cannot handle inconsistent knowledge

ii) They cannot apply judgement and intuition recognized as important ingredients of
problem solving.
A. Only i
B. Only ii
C. Both i and ii
D. None of these
32. The expert system uses an) …….. to select the most appropriate response. A
A. Inference Engine
B. Decision Support System
C. Knowledge Base
D. Data Source
33. An expert system shell is an expert system without A
A. domain knowledge
B. explanation facility
C. reasoning with knowledge
D. all of the above
34. Knowledge Base in the expert system is ________ D
A. the collection of Information
B. Represents all the data and information imputed by experts in the field.
C. Stores the data as a set of rules that the system must follow to make decisions
D. all of the above
35. User Interface in the expert system is _______ C
A. Allows the expert system and the user to communicate.
B. Finds out what it is that the system needs to answer.
C. Both A and B
D. None of the above
36. Explanation Facility in the expert system is_______ A
A. Explains the systems reasoning and justifies its conclusions.
B. Finds out what it is that the system needs to answer.
C. Both A and B
D. None of the above
37. reasons to use the expert system are________ D
A. If expertise is expansive, or unavailable at that place.
B. For preserving the knowledgebase.
C. If time pressure and accuracy constraints are there
D. All of the above
38. MYSIN attempts to recommend appropriate therapies for patients to B
A. Diagnosis of lung disease
B. Detect bacterial infections.
C. Diagnosis of skin disease
D. None of the mentioned
39. There are primarily two modes for an inference engine: forward chaining and A
backward chaining.
A. True
B. False
40. _________ is/are the well known Expert System/s for medical diagnosis systems. A
A. MYSIN
B. CADUCEUS
C. DENDRAL
D. SMH.PAL

You might also like