You are on page 1of 5

DIGITAL FLUENCY ATTEMP TEST - 01

1. How is Al helping in the healthcare industry? Select all that apply.

A. Helps surgeons with finer view during surgery


B. Helps nurses in care of critically illpatients
C. Helps pathologists in analyzingsample tissues
D. Helps in for quicker and bettertools for medical research

2. What is the correct sequence of steps that you should follow to solve a problem?

A. Generate alternatives-->Evaluate & select one alternative-->Fit itto the problem--


>Implement it alternatives- >Implement solutions
B. Define the problem-->Generate alternatives-->Evaluate & select
C. Gather solutions-->Define Problem-->Check suitability of solutions-->Implement solution

3. Security is a concern for loT but not for IloT.

A. True
B. False

4. Why should you work upon your communication skills? Select all that apply.

A. It will reduce conflicts


B. It will make you good team player
C. It will get you a raise in your salary
D. It will improve productivity

5.Select the commonly used CybersecurityFrameworks. Select all that apply.

A. ISO 2000
B. CIS Controls
C. NIST Cybersecurity Framework
D. COBIT

6. An invention that is neither practically implementable nor creates meaningful


impact in a market or society cannot be called innovation.

A. True
B. False

7. Which among these is NOT a Machine Learning technique?

A. Cognitive Learning
B. Inductive Logic Programming
C. Decision Tree Learning
D. Reinforcement Learning

8. Statement 1: Al can help manufacturing lower, or even reverse the adverse impact
on Environment.
Statement 2: Al helps manufacturing with quality checks and predicting maintenance
costs.

A. Statement 1 is correct
B. Statement 2 is correct
C. Both the statements are correct
D. Both the statements are incorrect

9.Select the statement that correctly definesDesign Thinking.

A. Design thinking is a human centered approach that aims at creating products &
services that meets the need of the consumers.
B. Design thinking is an approach that helps in improving the technology by borrowing
from designer's too lkit
C. Design thinking is an approach that looks at creating products that can generate
maximum revenue

10. A Birthday attack is:

A. Attacks that use third-party web resources to run scripts in the victim's web browser or
scriptable application
B. Attacks that overwhelm a system's resources so that it cannot respond to service
requests
C. Attacks that occur through interception of network traffic resulting in obtaining
passwords, credit card numbers and other confidential information
D. Attacks that are made against hash algorithms that are used to verify the integrity
of a message, software or digital signature

11. Verbal, non-verbal, interpersonal, and written skills are all part of developing
effective communication. However, listening skills are not required for this purpose.

A. True
B. False

12.How does Watson BEAT help music composers?

A. It helps by collecting data on their composed music and audience taste


B. It helps composers from securingtheir music against cyber theft
C. It is Al enabled and helps composers with different musical elements
D. It is helps composers to compose and store their music on cloud
13. Being a good team player will help you build your support network.

A.True
B. False

14. According to industry experts, which out of the below mentioned is NOT one of
the 'Five V's of Big Data'.

A. Volume
B. Variety
C. Veracity
D. Virtue
E. Velocity
F. Value

15. What should you do to demonstrate that you are listening? Select all that apply.

A. Shake your head if you do not agree while the other person is speaking
B. Pause for few seconds after the other person has stopped speaking
C. Paraphrase to confirm your understanding
D. Complete other person's sentences
E. Ask questions

16. Identify the issues that can lead to ineffective communication. Select all that
apply.

A. Lack of knowledge and awareness


B. Mixing fun with work
C. Having negative emotions
D. Being judgmental
E. Inadequate listening skills

17. What is a cloud-computing offering called in which users are provided with access
to resources such as servers, storage and networks?

A. Platform as a service (PaaS)


B. Infrastructure as a service (IaaS)
C. Software as a service (SaaS)

18. A cyber threat that spreads from computer to computer without any human
action is called_

A. Spam
B. Virus
C. Trojan Horse
D.Worm

19. Cloud Computing is used for business management applications, backup and
recovery, anti-virus applications but cannot be used for creative work like video
makingand editing.

A. True
B. False

20. What are the skills that you must develop for creative thinking and design
thinking?

A. Verbal & Written Communication


B. Data analysis & visualization skills
C. Deeper understanding of business & processes
D. Empathy & contextual observation

21. What are the benefits of lloT? Select all that apply.

A. Improving return on investment


B. Increasing flexibility and agility
C. Improving operational effectiveness
D. Increasing top line

22. Identify the professionals who can make use of lot to improve their output. Select
all that apply.

A. Chefs
B. Manufacturers
C. Agriculturists
D. Healthcare Professionals

23. Select the right process of design thinking.

A. Empathize-->Ideate-->Define-->Prototype-->Test
B. Empathize-->Define-->Ideate-->Prototype-->Test
C. Define-->Empathize-->Prototype-->Test-->Ideate
D. Ideate-->Empathize-->Define-->Prototype-->Test

24. Which one of these is NOT a Big Data Analytics tool?

A. Apache Hadoop
B. Apache Spark
C. Couch DB
D. Packet Sniffers
25. What are the correct steps to be taken to simplify the complexity of
Cybersecurity?

A. Start with understanding Vulnerability-->Ensure Data Veracity->Assess your Visibility


B. Start with Visibility-->Ensure Data Veracity-->Understand your Vulnerabilities
C. Start with Visibility-->Understand your Vulnerabilities-->Ensure Data Veracity

26. Big data in Healthcare can be used to improve care personalization and efficiency
with a comprehensive patient profile.

A. True
B. False

27. A system that provides anti-spam and anti-malware protection is called

A. End Point Protection


B. Intrusion Prevention System
C. Security Incident Management
D. Secure E-Mail Gateway

28.Select the order of the Big Data Analytics process.

A. Data, Information, Insight, Analysis


B. Data, Analysis, Information, Insights
C. Data, Information, Insights, Analysis
D. Information, Data, Analysis, Insights

29.Tools that are used for finding patterns which are far too complex or numerousfor
a human programmer to extract and teach the machine to recognize are
called…………..

A. Reinforcement Learning
B. Deep Learning
C. Machine Learning
D. Artificial Neural Networks

30.Cloud Computing in e-commerce enables e-commerce to increase which of these


features? Select all that apply.

A. Cost
B. Speed
C. Human Resources
D. Scale

You might also like