Professional Documents
Culture Documents
2. What is the correct sequence of steps that you should follow to solve a problem?
A. True
B. False
4. Why should you work upon your communication skills? Select all that apply.
A. ISO 2000
B. CIS Controls
C. NIST Cybersecurity Framework
D. COBIT
A. True
B. False
A. Cognitive Learning
B. Inductive Logic Programming
C. Decision Tree Learning
D. Reinforcement Learning
8. Statement 1: Al can help manufacturing lower, or even reverse the adverse impact
on Environment.
Statement 2: Al helps manufacturing with quality checks and predicting maintenance
costs.
A. Statement 1 is correct
B. Statement 2 is correct
C. Both the statements are correct
D. Both the statements are incorrect
A. Design thinking is a human centered approach that aims at creating products &
services that meets the need of the consumers.
B. Design thinking is an approach that helps in improving the technology by borrowing
from designer's too lkit
C. Design thinking is an approach that looks at creating products that can generate
maximum revenue
A. Attacks that use third-party web resources to run scripts in the victim's web browser or
scriptable application
B. Attacks that overwhelm a system's resources so that it cannot respond to service
requests
C. Attacks that occur through interception of network traffic resulting in obtaining
passwords, credit card numbers and other confidential information
D. Attacks that are made against hash algorithms that are used to verify the integrity
of a message, software or digital signature
11. Verbal, non-verbal, interpersonal, and written skills are all part of developing
effective communication. However, listening skills are not required for this purpose.
A. True
B. False
A.True
B. False
14. According to industry experts, which out of the below mentioned is NOT one of
the 'Five V's of Big Data'.
A. Volume
B. Variety
C. Veracity
D. Virtue
E. Velocity
F. Value
15. What should you do to demonstrate that you are listening? Select all that apply.
A. Shake your head if you do not agree while the other person is speaking
B. Pause for few seconds after the other person has stopped speaking
C. Paraphrase to confirm your understanding
D. Complete other person's sentences
E. Ask questions
16. Identify the issues that can lead to ineffective communication. Select all that
apply.
17. What is a cloud-computing offering called in which users are provided with access
to resources such as servers, storage and networks?
18. A cyber threat that spreads from computer to computer without any human
action is called_
A. Spam
B. Virus
C. Trojan Horse
D.Worm
19. Cloud Computing is used for business management applications, backup and
recovery, anti-virus applications but cannot be used for creative work like video
makingand editing.
A. True
B. False
20. What are the skills that you must develop for creative thinking and design
thinking?
21. What are the benefits of lloT? Select all that apply.
22. Identify the professionals who can make use of lot to improve their output. Select
all that apply.
A. Chefs
B. Manufacturers
C. Agriculturists
D. Healthcare Professionals
A. Empathize-->Ideate-->Define-->Prototype-->Test
B. Empathize-->Define-->Ideate-->Prototype-->Test
C. Define-->Empathize-->Prototype-->Test-->Ideate
D. Ideate-->Empathize-->Define-->Prototype-->Test
A. Apache Hadoop
B. Apache Spark
C. Couch DB
D. Packet Sniffers
25. What are the correct steps to be taken to simplify the complexity of
Cybersecurity?
26. Big data in Healthcare can be used to improve care personalization and efficiency
with a comprehensive patient profile.
A. True
B. False
29.Tools that are used for finding patterns which are far too complex or numerousfor
a human programmer to extract and teach the machine to recognize are
called…………..
A. Reinforcement Learning
B. Deep Learning
C. Machine Learning
D. Artificial Neural Networks
A. Cost
B. Speed
C. Human Resources
D. Scale