You are on page 1of 8

QUESTION PAPER

CODE:

END TERM EXAMINATIONS, OCT 2020


PGDM/SEMESTER: III /BATCH: 2019-21
COURSE: Technology and Innovation Management
COURSE CODE: 19IIIGMTIM

Date: Duration: 2hours


Day: Max. Marks: 40
General Instructions:
 Question Paper is divided into three Sections– A, B & C.
 Section-A contains seven questions, attempt ANY FIVE carries equal marks 4 each.
 Section-B contains two questions; both are COMPLUSARY carries equal marks 5 each.
 Section-C contains TEN questions, all compulsory carries equal marks 1 each.

SECTION-A

Answer any FIVE of the following: 5x4=20 Marks


1. What is innovation designing process? Explain how to manage innovation process
2. Write about basic building blocks of IOT Hardware.
3.What is Big Data Analytics? How it differs from Data Science.
4.What is Block chain Technology? List and explain contents of block chain.
5.Write about 5G Technology.
6.What is Artificial Intelligence? Write about its Applications.
7.Describe the various driver and sources of innovation in the Indian context. .

SECTION-B

Answer Both the questions 2x5=10 Marks

I. Imagine that you are a data scientist who’s been recruited to help detect fraud during the college
admissions process. For this conversation, we shall narrow the focus to fraudulent information
submitted in the college application forms, whether it is an inflated GPA, an invented sports
achievement, or a fake community service achievement, or other types of forgeries.
1. List out some set of fraud detection models which can be build on the above data.
2. List out what your first model will do, and why you choose that as your first model.
3. Tell the director of admissions that why they should pay for your model.
4. What training data will you need to run that model? Where and how will you obtain the
data?

II. Explain Data Life Cycle and describe how Big data is playing a major role in Banking industry?
SECTION - C
Answer all the following: 10x1=10 Marks
1. Explain about block in block chain
2. What is Hadoop?
3. Describe Name Node and Data Node.
4. Define Information security.
5. Explain about Internet Security
6. What is crypto currency.
7. What are things in IOT.
8. List some Software which are used for IOT
9. What are the characteristics of Big Data.
10. What is Data Mining?
KEY-2
2. . Building Blocks of IoT Hardware
Here, we will discuss some internet of Things Hardware:

IoT Hardware – Building Blocks


i. Thing
“Thing” in IOT is the asset that you want to control or monitor or measure, that is, observe
closely. In many IoT products, the “thing” gets fully incorporated into a smart device. For
example, think of products like a smart refrigerator or an automatic vehicle. These products
control and monitor themselves.
There are sometimes many other applications where the thing stands as an alone device, and a
separate product is connected to ensure it possesses smart capabilities.

ii. Data Acquisition Module


The data acquisition module focuses on acquiring physical signals from the thing which is being
observed or monitored and converting them into digital signals that can be manipulated or
interpreted by a computer.
This is the hardware component of an IOT system that contains all the sensors that help in
acquiring real-world signals such as temperature, pressure, density, motion, light, vibration, etc.
The type and number of sensors you need depend on your application.
This module also includes the necessary hardware to convert the incoming sensor signal into
digital information for the computer to use it. This includes conditioning of incoming signal,
removing noise, analog-to-digital conversion, interpretation, and scaling.
iii. Data Processing Module
The third building block of the IoT device is the data processing module. This is the actual
“computer” and the main unit that processes the data performs operations such as local
analytics, stores data locally, and performs some other computing operations.
iv. Communication Module
The last building block of IOT hardware is the communications module. This is the part that
enables communications with your Cloud Platform, and with 3rd party systems either locally or
in the Cloud.
b. IoT Sensors
The most important IoT hardware might be its sensors. These devices consist of a variety of
modules such as energy modules, RF modules, power management modules, and sensing
modules.
3. Big Data Definition
In other words, big data gets generated in multi terabyte quantities. It changes fast and
comes in varieties of forms that are difficult to manage and process using RDBMS or
other traditional technologies. Big Data solutions provide the tools, methodologies, and
technologies that are used to capture, store, search & analyze the data in seconds to find
relationships and insights for innovation and competitive gain that were previously
unavailable.
80% of the data getting generated today is unstructured and cannot be handled by our
traditional technologies. Earlier, an amount of data generated was not that high. We
kept archiving the data as there was just need of historical analysis of data. But today
data generation is in petabytes that it is not possible to archive the data again and again
and retrieve it again when needed as data scientists need to play with data now and then
for predictive analysis unlike historical as used to be done with traditional.
4. Definition of Blockchain.
A blockchain is an open, distributed ledger that can record transactions
between two parties efficiently and in a verifiable and permanent way
without the need for a central authority.

Key Characteristics to be remembered:

 Open: Anyone can access blockchain.

 Distributed or Decentralised: Not under the control of any


single authority.

 Efficient: Fast and Scalable.

 Verifiable: Everyone can check the validity of information because


each node maintains a copy of the transactions.

 Permanent: Once a transaction is done, it is persistent and can’t be


altered.

Contents of a Block.
Blockchain starts with a block called genesis block. Each block stores
the following information in it:

 Index: Position of the block in blockchain. Index of genesis block is


0.

 Time stamp: The time when that particular block was created.

 Hash: Numeric value that uniquely identifies data just like our


fingerprints.

 Previous hash: Hash value of the previous block. For genesis block,


this value is 0.

 Data: Data stored on the node. For example, transactions.


 Nonce: It is a number used to find a valid hash. To generate this
number, the processing power is used.

5. 5G - Fifth Generation
5G is a generation currently under development , that's intended to improve on
4G. 5G promises significantly faster data rates, higher connection density, much
lower latency, among other improvements. Some of the plans for 5G
include device-to-device communication, better battery consumption, and improved
overall wireless coverage. The max speed of 5G is aimed at being as fast as 35.46
Gbps , which is over 35 times faster than 4G.
Key technologies to look out for: Massive MIMO , Millimeter Wave Mobile
Communications etc. Massive MIMO, milimetre wave, small cells, Li-Fi all the
new technologies from the previous decade could be used to give 10Gb/s to a user,
with an unseen low latency, and allow connections for at least 100 billion devices .
Different estimations have been made for the date of commercial introduction of 5G
networks. Next Generation Mobile Networks Alliance feel that 5G should be rolled
out by 2020 to meet business and consumer demands.
6. What is Artificial Intelligence?
According to the father of Artificial Intelligence, John McCarthy, it is “The science and engineering
of making intelligent machines, especially intelligent computer programs”.
Artificial Intelligence is a way of making a computer, a computer-controlled robot, or a
software think intelligently, in the similar manner the intelligent humans think.
AI is accomplished by studying how human brain thinks, and how humans learn, decide, and
work while trying to solve a problem, and then using the outcomes of this study as a basis of
developing intelligent software and systems.

 What are the applications of AI?

A. Here are some.

game playing
You can buy machines that can play master level chess for a few hundred dollars. There
is some AI in them, but they play well against people mainly through brute force
computation--looking at hundreds of thousands of positions. To beat a world champion
by brute force and known reliable heuristics requires being able to look at 200 million
positions per second.
speech recognition
In the 1990s, computer speech recognition reached a practical level for limited purposes.
Thus United Airlines has replaced its keyboard tree for flight information by a system
using speech recognition of flight numbers and city names. It is quite convenient. On the
the other hand, while it is possible to instruct some computers using speech, most users
have gone back to the keyboard and the mouse as still more convenient.
understanding natural language
Just getting a sequence of words into a computer is not enough. Parsing sentences is not
enough either. The computer has to be provided with an understanding of the domain the
text is about, and this is presently possible only for very limited domains.
computer vision
The world is composed of three-dimensional objects, but the inputs to the human eye and
computers' TV cameras are two dimensional. Some useful programs can work solely in
two dimensions, but full computer vision requires partial three-dimensional information
that is not just a set of two-dimensional views. At present there are only limited ways of
representing three-dimensional information directly, and they are not as good as what
humans evidently use.
expert systems
A ``knowledge engineer'' interviews experts in a certain domain and tries to embody their
knowledge in a computer program for carrying out some task. How well this works
depends on whether the intellectual mechanisms required for the task are within the
present state of AI. When this turned out not to be so, there were many disappointing
results. One of the first expert systems was MYCIN in 1974, which diagnosed bacterial
infections of the blood and suggested treatments. It did better than medical students or
practicing doctors, provided its limitations were observed. Namely, its ontology included
bacteria, symptoms, and treatments and did not include patients, doctors, hospitals, death,
recovery, and events occurring in time. Its interactions depended on a single patient being
considered. Since the experts consulted by the knowledge engineers knew about patients,
doctors, death, recovery, etc., it is clear that the knowledge engineers forced what the
experts told them into a predetermined framework. In the present state of AI, this has to
be true. The usefulness of current expert systems depends on their users having common
sense.
heuristic classification
One of the most feasible kinds of expert system given the present knowledge of AI is to
put some information in one of a fixed set of categories using several sources of
information. An example is advising whether to accept a proposed credit card purchase.
Information is available about the owner of the credit card, his record of payment and also
about the item he is buying and about the establishment from which he is buying it (e.g.,
about whether there have been previous credit card frauds at this establishment).
7.

SECTION-B

II

Applications of Big Data  in Banking Sector


These are some applications of Big Data in Banking sector-

 Risk Management
 Fraud Detection
 Customer Contentment
SECTION-C
1.
1. Explain about block in block chain
2. Define Primary key and Foreign key
3. Describe the role of Data Analyst.
4. Define Information security.
5. Explain about Internet Security
6. What is crypto currency.
7. What are things in IOT.
8. List some Software which are used for IOT
9. What are the characteristics of Big Data.
10. What is Data Mining?

1. A block is a general purpose ledger which will have hash code and address of the previous block.
2. Primary key is used to identify a row in a table uniquely and foreign key is used to relate two tables.
3. deals with structural part of the data .role is limited to data cleaning and integrating.
4. the security measures which have to be taken during the transformation of information through
networks
5. providing information security when it is transferred through internet
6. digital currency
7. any object which connected to internet and embedded sensors
8. c,c++,python,java
9.huge volume,gathered from different sources
10. digging the knowledge from datawarehouses.

You might also like