Professional Documents
Culture Documents
QUESTION BANK
PART -A
Multiple choice questions on Artificial Intelligence
2
16. The process of training a Neutral Network is:
a. Model – Train – Training Data – Test and Update.
b. Train – Model – Prediction – Test and Update.
c. Training Data – Model – Predict – Test and Update.
d. Model – Train – Prediction – Test and Update.
Ans: c
17. Which of the following is not an application of artificial intelligence?
a. Face recognition system
b. Chatbots
c. Natural language Processing
d. DBMS
Ans: d
18. Which of the following is an example of deep learning?
a. Self-driving cars b. Pattern recognition
c. Natural language processing d. All of the above
Ans: d
19. Convolutional Neural Network is used in-
A. Image classification B. Text classification
C. Computer vision D. All of the above
Ans: d
20. What is machine learning ?
A. Machine learning is the science of getting computers to act without being
explicitly programmed.
B. Machine Learning is a Form of AI that Enables a System to Learn from Data.
C. Both A and B
D. None of the above
Ans:c
21. The categories in which Machine learning approaches can be traditionally categorized
are ______ .
A. Supervised learning B. Unsupervised learning
C. Reinforcement learning D. All of the above
Ans: d
22. The Real-world machine learning use cases are _______.
A. Digital assistants B. Chatbots
C. Fraud detection D. All of the above
Ans: d
23. Which of the following is an advantage of artificial intelligence?
a. Reduces the time taken to solve the problem
b. Helps in providing security
c. Have the ability to think hence makes the work easier
d. All of the above
Ans:d
3
24. What the first layer in neural network is called?
A. input layer B. output layer
C. hidden layer D. None of the above
Ans: a
25. ________ is used as an input to the machine learning model for training and
prediction purposes.
a. Feature b. Feature Vector
c. Both A and B d. None of the above
Ans: b
26. In a Deep Learning System, each connection between Neurons is association with a:
a. Length.
b. Weight.
c. Function.
d. None of the Above
Ans: b.
27. Apple’s, Siri, Amazon’s, Alexa, Microsoft Cortana and Google Assistant’s are_____
a. Digital Assistant’s B. Neural Networks
C. Data Base Systems D. Machine Learning Tools
Ans: a
Multiple choice questions on
Database management and Big Data Analytics
1) Which of the following is generally used for performing tasks like creating the structure of the
relations, deleting relation?
a) DML (Data Manipulation Language) b) Query
c) Relational Schema d) DDL (Data Definition Language)
Answer: d
2) Which of the following provides the ability to query information from the database and insert
tuples into, delete tuples from, and modify tuples in the database?
a) DML (Data Manipulation Language) b) DDL (Data Definition Language)
c) Query d) Relational Schema
Answer: a
3) A Database Management System is a type of ____ software.
a) It is a type of system software
b) It is a kind of application software
c) It is a kind of general software
d) Both A and C
Answer: a
5) Which of the following is the Big Data Analytic tool ?
a) Apache Hadoop b) MongoDB c) Microsoft Azure d) All of the above
Answer: d
6). What are the main components of Big Data?
(a) MapReduce (b)HDFS
(c) YARN (d) All of these
Answer: d
4
7). What are the different features of Big Data Analytics?
(a) Open-Source
(b) Scalability
(c) Data Recovery
(d) All the above
Answer: d
8). What are the four V’s of Big Data?
(a) Volume
(b) Velocity
(c) Variety
(d) All the above
Answer: d
9). The examination of large amounts of data to see what patterns or other useful
information can be found is known as
(a) Data examination
(b) Information analysis
(c) Big data analytics
(d) Data analysis
Answer: c
10). Big data analysis does the following except
(a) Collects data
(b) Spreads data
(c) Organizes data
(d) Analyzes data
Answer: b
11). The new source of big data that will trigger a Big Data revolution in the years to come
is
(a) Business transactions
(b) Social media
(c) Transactional data and sensor data
(d) RDBMS
Answer: c
12) The word 'Big data' was coined by
(a) Roger Mougalas
(b) John Philips
(c) Simon Woods
(d) Martin Green
Answer: a
13) Concerning the Forms of Big Data, which one of these is odd?
(a) Structured
(b) Unstructured
(c) Processed
(d) Semi-Structured
Answer: c
14) Big Data applications benefit the media and entertainment industry by
(a) Predicting what the audience wants
(b) Ad targeting
(c) Scheduling optimization
(d) All of the above
Answer: d
15). The feature of big data that refers to the quality of the stored data is ______
(a) Variety
(b) Volume
(c) Variability
(d) Veracity
Answer: d
5
16. Data science is the process of diverse set of data through ?
A. organizing data B. processing data
C. analysing data D. All of the above
Ans: D
17. Which of the following language is used in Data science?
A. C B. C++
C. R D. Ruby
Ans : C
18. Unstructured data is not organized.
A. TRUE B. FALSE
C. Can be true or false D. Can not say
Ans : A
19. Which of the following is a data visualization method?
A. Line B. Triangle
C. Pie chart and Bar Chart D. Pentagon
Ans: C
20. RDBMS store data in the form of tables with most commercial RDBMS using____
a. SQL B. Apache C. work fusion D. Mango DB
Ans:A
21. Select the order of the Big Data Analytics process.
a. Information, Data, Analysis, Insight
b. Data , Information, Insight, Analysis
c. Data, Insight, Analysis, Information
d. Data, Analysis , Insight , Information
Ans: B
22. ________ refers to the quality of information or data
a. Volume B. Variety C. Velocity D. Veracity
Ans: D
23. ______________ is the process of taking row data, transforming it into to graphs,
charts, images and videos.
A. Data mining B. Data visualisation
C. Data warehouse D. Data Analytics
Ans: B
24. Which of the following is not Big Data tool?
A. Apache Hadoop B. Apache Kafka
C. Apache Tomcat D. Apache Zookeeper
Ans: C
25. The technology solution used to optimize and manage the storage and retrieval of
data from databases is called
A. Database management system B. Datastore management system
C. Big data analytics D. IOT
Ans: A
6
26. Which one of the following is not included in four Vs of Big data analytics?
a) Volume b) Veracity c) Variety d) Vicinity
Ans: D
27. In the Healthcare Industry, AI has disrupted.
A. Medical imaging.
B. Surgery.
C. Physiological Diagnosis.
D. None of these.
Ans: A
7
9) __ allows the user to control electronic components.
a) Android API b) RETful API c) MQTT API d) CoAP API
Answer: b)
10) Which of the following is not an application of IoT?
a) Wearables b) Smart Grid c) Arduino d) Smart City
Answer: c)
11) What is the real example of a smart grid device in IoT?
a) Mobile phone
b) Television
c) Smart Speaker
d) Smart Meters
Answer: d)
12). What is the full form of ICT?
a) InterConnect Technology
b) Internet Connection Topology
c) Information and Communication Technology
d) Infer Communication Topology
Answer: c)
13) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
Answer: d)
14). What is the full form of HDLC?
a) Higher Data Level Communication
b) Higher Data Link Communication
c) High-level Data Link Control
d) High Data Level Control
Answer: c)
15). What is the full form of HART?
a) Highway Application Remote Transport
b) Highway Addressable Remote Transducer
c) High Address Reduce Transport
d) High Application Remote Transport
Answer: b)
16. _____________ are the applications of IOT
a) House
b) Virtual environment
c) Regional office
d) All of the above
Ans: d)
8
17. ___________ are the main components in IOT
a) Low power embedded systems
b) Cloud computing
c) Availability of big data, networking connection
d) All of the above
Ans: d)
18. ___________ are the characteristics of IOT
a) Intelligence, scalable
b) Security
c) Heterogeneity
d) All of the above
Ans: d)
19. What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
Ans: a
20. Which of the following category is used for business to consumer process?
a. Group IoT
b. Community IoT
c. Personal IoT
d. Industrial IoT
Answer : d)
21. Who coined the term IoT?
a) IBM
b) Kevin Ashton
c) Ross Ihaka
d) Guido van Rossum
Ans: b)
22. IIoT stands for _________.
a. Intense Internet of Things
b. Index Internet of Technology
c. Industrial Internet of Things
d. Incorporate Internet of Technology
Ans: c)
23. Identify among the following which is not a fundamental component of IoT
system.
a) User interface
b) Sensors
c) Transformer
d) Connectivity and data processing
Ans: c)
9
24. Identify the protocol used to link all devices in IoT,
a) UDP
b) TCP/IP
c) HTTP
d) Network
Ans: b)
25. The term “TCP/IP” stands for __________.
a. Transmission Contribution protocol/ internet protocol.
b. Transmission Control Protocol/ internet protocol.
c. Transaction Control protocol/ internet protocol.
d. Transmission control Protocol/ internet protocol.
Ans: b.
1) What type of computing technology refers to services and applications that typically run
on a distributed network through virtualized resources?
a) Distributed Computingb) Cloud Computing
c) Soft Computingd) Parallel Computing
Answer: b)
2) Which one of the following options can be considered as the Cloud?
a) Hadoopb) Intranet
c) Web Applicationsd) All of the above
Answer: a)
3) Cloud computing is a kind of abstraction which is based on the notion of combining physical
resources and represents them as ______ resources to users.
a) Realb) Cloud
c) Virtual d) none of the above
Answer: c)
4) Which one of the following cloud concepts is related to sharing and pooling the resources?
a) Polymorphism b) Virtualization
c) Abstraction d) None of the above
Answer: b)
5) Which one of the following statements is not true?
a) The popularization of the Internet actually enabled most cloud computing systems.
b) Cloud computing makes the long-held dream of utility as a payment possible for you,
with an infinitely scalable, universally available system, pay what you use.
c) Soft computing addresses a real paradigm in the way in which the system is
deployed.
d) All of the above
Answer: c)
10
6) Which one of the following can be considered as a utility is a dream that dates from the
beginning of the computing industry itself?
a) Computingb) Model
c) Softwared) All of the mentioned
Answer: a)
7) Which of the following is an essential concept related to Cloud?
a) Reliabilityb) Abstraction
c) Productivityd) All of the mentioned
Answer: b)
8). Which one of the following is Cloud Platform by Amazon?
a) Azure b) AWS
c) Cloudera c) All the above
Answer: b)
9). Which of the following statements is not true?
a) Through cloud computing, one can begin with very small and become big in a rapid
manner
b) All applications benefit from deployment in the Cloud.
c) Cloud computing is revolutionary, even though the technology it is built on is
evolutionary.
d) None of the above
Answer: b)
10) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.
a) Service Development
b) Quality of service
c) Plan Development
d) Technical Service
Answer: b)
11) Which of the following provides the Graphic User Interface (GUI) for interaction with
the cloud?
a) Client
b) Client Infrastructure
c) Application
d) Server
Answer: b)
12) Which one of the following a technology works behind the cloud computing
platform?
a) Virtualization
b) SOA (Service-Oriented Architecture)
c) Grid Computing
d) All of the above
Answer: d)
11
13) Which of the following is the correct full form of SaaS?
a) Storage-as-a-Service
b) Server-as-a-Software
c) Software-as-a-Service
d) None of the above
Answer: c)
14). Which of the following is a characteristic of the SaaS applications?
a) SaaS applications are reliable
b) SaaS applications are not customizable
c) SaaS applications are customizable
d) Non-reliable
Answer: c)
15) Which one of the following statements is not true about SaaS?
a) SaaS applications are offered in all shapes and sizes.
b) All users with a little knowledge or know how to operate a computer also know
about the SaaS.
c) SaaS software is not customizable.
d) None of the above
Answer: d)
16. The response time and transit time is used to measure the ___________ of a
network.
a. Security.
b. Longevity.
c. Reliability.
d. Performance.
Ans: d.
17. Which of the following factor of the network gets hugely impacted when the
number of users exceeds the network's limit?
a. Reliability.
b. Performance.
c. Security.
d. Longevity.
Ans: d.
18. In the computer networks, the encryption techniques are primarily used for
improving the ____________.
a. Security.
b. Performance.
c. Reliability.
d. Longevity.
Ans: a. .
19. Who is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider
d) Charles Bachman
Answer: c
12
20. Which of the following is not a type of cloud server?
a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers
Ans: d)
21. Which of the following are the features of cloud computing?
a) Security
b) Availability
c) Large Network Access
d) All of the mentioned
Answer: d
22. Which of the following is the application of cloud computing?
a) Adobe
b) Paypal
c) Google G Suite
d) All of the above
Answer: d
23. Which of the following is an example of the cloud?
a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above
Answer: d
24. Applications and services that run on a distributed network using virtualized
resources is known as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
Answer: d
25. Which of the following is the Cloud Platform provided by Amazon?
a) AWS
b) Cloudera
c) Azure
d) All of the mentioned
Answer: a
26. Choose the correct IaaS provider among the following.
a) EC2
b) EC1
c) EC10
d) Hybrid
Answer: A
13
27. Choose among the following, which are the characteristics of IaaS.
a) Highly scalable
b) Flexible and dynamic platform
c) Facilitates hardware access to many users
d) All of the above
Answer: D
14
10) Which one of the following usually used in the process of Wi-Fi-hacking?
a) Aircrack-ng
b) Wireshark
c) Norton
d) All of the above
Answer: a)
11) In system hacking, which of the following is the most crucial activity?
a) Information gathering
b) Covering tracks
c) Cracking passwords
d) None of the above
Answer: c)
12). To protect the computer system against the hacker and different kind of viruses,
one must always keep _________ on in the computer system.
a) Antivirus
b) Firewall
c) Vlc player
d) Script
Answer: b)
13). Which of the following can be considered as the elements of cyber security?
a) Application Security
b) Operational Security
c) Network Security
d) All of the above
Answer: d)
14) Which one of the following is also referred to as malicious software?
a) Maliciousware
b) Badware
c) Ilegalware
d) Malware
Answer: d)
15) Hackers usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's Id and Passwords
c) To corrupt the user's data stored in the computer system
d) All of the above
Answer: d)
16. Which one of the following is a type of antivirus program?
a. Quick Heal b. Mcafee.
c. Kaspersky. d. All of the above.
Answer: d .
15
17. Which of the following refers to exploring the appropriate, ethical behaviours
related to the online environment and digital media platform?
a. Cyber Low.
b. Cyber ethics.
c. Cybersecurity.
d. Cyber safety.
Answer: b
18. Which one of the following refers to the technique used for verifying the
integrity of the message?
a. Digital Signature.
b. Decryption algorithm.
c. Protocol.
d. Message Digest.
Ans: d.
19. Which one of the following usually used in the process of Wi-Fi hacking?
a. Aircrack-ng
b. Wireshark.
c. Norton
Ans: a.
20. In ethical hacking and cyber security, there are ___________ types of
scanning:
a. 1
b. 2
c. 3
d. 4
Ans: c.
21. Which of the following is not a type of scanning?
a. Xmas Tree Scan.
b. Cloud Scan.
c. Null Scan.
d. SYN Stealth.
Ans: b.
22. In system hacking, which of the following is the most crucial activity?
a. Information gathering.
b. Covering tracks.
c. Cracking passwords.
d. None of the above.
Ans: c.
16
23. Which of the following are the types of scanning?
a. Network, vulnerability, and port scanning.
b. Port, network, and services.
c. Client, Server, and network.
d. None of the above.
Ans: a.
24. To protect the computer system against the hacker and different king of
viruses, one must always keep __________ on in the computer system.
a. Antivirus. b.Firewall.
c. VLC Player. d. Script.
Ans: b.
25. Which of the following can be considered as the elements of cyber security?
a. Application Security.
b. Operational Security.
c. Network Security.
d. All of the above.
Ans: d.
26. Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user’s system?
a. DDos and Derive-by Downloads.
b. Malware &Malvertising.
c. Phishing and Password attacks.
d. All of the above.
Ans: d.
27. Which one of the following is also referred to as malicious software?
a. Maliciousware.
b. Badware.
c. Illegalware.
d. Malware.
Ans: d.
28. Hackers usually used the computer virus for __________ purpose.
a. To log, monitor each and every user’s stroke.
b. To gain access the sensitive information like user’s Id and Passwords.
c. To corrupt the user’s data stored in the computer system.
d. All of the above.
Ans: d.
29. In Wi-Fi Security, which of the following protocol is more used?
a. WPA. b. WPA2.
c.WPS. d. Both A and C
Ans: b.
17
Multiple Choice question on Communication Module (Module -3)
18
7. The abilities to communicate properly are:
A) read
B) write
C) speak
D) all of these
Answer D
8. Which method is good for taking leave in the office.
A) Website
B) Posters
C) e-mail
D) business meetings
Answer C
9. The word Commūnicāre means ______ in Latin.
A) to deliver
B) to share
C) to present
D) to sacrifice
Answer B
10. To understand the message properly the receiver need to ____________ the
message properly.
A) transmit
B) throw
C) listen
D) ignore
Answer C
11. What is the final step in the communication cycle?
A) Encoding
B) Decoding
C) Feedback
D) Receiving
Answer C
12. The process in which the receiver interprets and understands the message is called
A) Decoding
B) Encoding
C) Feedback
D) None of these
Answer A
13. Which of the following is an example of oral communication?
A) Newspapers
B) Letters
C) Phone call
D) e-mail
Answer C
19
14. “Two girls talking over a phone” – is an example of....
A) interpesonal communication
B) written communication
C) small group communication
D) public communication
Answer A
15. Pointing finger to something is an example of.....
A Expressions
B) Gestures
C) Body Language
D) Para Language
Answer B
16. The response to a sender’s message is called as _________
a. Transmission
b. Message
c. Channel
d. Feedback
Answer D
17. Communication is a non-stop_______
a. Programme
b. Plan
c. Process
d. Play
Answer C
18. Which of the following listens or understands the message?
a. Receiver
b. Channel
c. Sender
d. None of the above
Answer A
19. An effective speaker is the one who is __________
a. speaking appropriately whilst maintaining eye contact with the audience.
b. using varied vocabulary.
c. using varied articulate speech to suit the need of the audience.
d. All of the above
Answer D
20. __________ is the ‘sharing’ of information between two or more individuals or within
a group to reach a common understanding.
a. Common
b. Communication
c. Writing
d. Reading
Answer B
20
21. One can improve communication skill
A Pausing when required
B Asking Open-ended questions
a. Answer A only
b. Answer B only
c. Both A and B
d. Neither A nor B
Answer C
22. Choose the right order of steps to communicate effectively
a. Aim, Message, Channel, audience, Story, Review
b. audience, Aim, Message, Story, Channel, Review
c. Aim, Audience, Message, Channel, story, Review
d. Audience, Message, Aim, Story, Review, Channel
Answer C
23. How not to speak So That People Want to Listen
a. Gossip
b. Complaining
c. Negatively
d. All of these
Answer D
24. Choose the Correct abbreviation for HAIL in communication
a. Honesty Authenticity Integrity Love
b. Honesty, Authority Integrity Love
c. Harmony, Authenticity, Integrity, Love
d. Hearty, Appreciative, Indigenous, Limit
Answer A
25. There are 6 steps that can be used for strategic communication. Five of them are Aim,
Review, Message, Story and Audience. Which is the sixth step?
a. Paths
b. Channels
c. Ways
d. Feedback
Answer B
26. When you’re listening to others, pay as much attention to them as you can. Which
of the following should you notice about the speaker? A. Their words. B. Quirks in their
body language
a. Only A
b. Only B
c. Both A and B
d. None
Answer C
21
27. Which non-verbal aspect makes the most impact in verbal face-to-face
communication?
a. Eye Contact
b. Professional Attire
c. Communication Venue
d. Language
Answer A
28. A communication _______is anything that comes in the way of receiving and
understanding messages that one sends to another to convey his ideas, thoughts, or any other
kind of information
a. Skill b. Barrier
c. Channel d.None
Answer B
29. Which of the following are barriers of effective communication?
a. Disengagement
b. Lack of focus and attention
c. Cultural Difference
d. All of these
Answer D
30. Speech problem, impaired eyesight, or any physical illness are the example of
which communication barrier
a. Lack of Knowledge
b. Being Judgmental
c. Differences in perception
d. Physical disability
Answer D
31. Poor lighting is an example of _________
a. Physical barrier of communication
b. Physiological barrier
c. Technical Jargon
d. none of these
Answer A
32. Information Overload is a ___________ of communication
a. Barrier
b. Substitute
c. Exception
d. none of these
Answer A
22
33. __________ arise when two individuals in an organisation belong to different
religion, states or countries.
a. Physical Barriers
b. Cultural Barriers
c. Perceptional barriers
d. Emotional barriers
Answer B
34. To overcome and prevent communication challenge at work one can
a. Maintain eye contact
b. Request and provide feedback
c. Focus on what the other person is saying
d. All of these
Answer D
PART-B
__________
27
DIGITAL FLUENCY
QUESTION BANK
PART B
One Mark Questions:
1.What is AI? Mention any two Applications.
➢ AI is techniques that help machines and computers mimic human
behaviour.
Two Applications are:
• Robotics
• Digital Assistants
18.Expand SQL.
➢ STRUCTURED QUERY LANGUAGE
32.What is IIoT?
➢ IoT is an evolution of mobile, home and embedded
applications interconnected to each other. Using the internet
and data analytics, billions of devices connected to each other
create an intelligent system of systems
33.List the Benefits of IIoT.
➢ Improvement of Operational Performance
➢ Ensuring Safety and Compliance
➢ Increasing Flexibility and Agility
56.What is a backup?
➢ A backup is a copy of the data stored on a device. It's useful
for restoring data if your device crashes or continuing work if
your device is lost or stolen.
57.What is cyberspace?
➢ Cyberspace is the virtual environment that consists of
computer systems and networks, where all computers
communicate via networks and all networks are connected.
The term originated in science fiction during the 1980s and
became popular during the 1990s
58.What is a firewall?
➢ A firewall is a network security system that monitors incoming
and outgoing network message traffic and prevents the
transmission of malicious messages based on an updatable rule
set.
67.What is Ransomware?
➢ Its a type of malware that denies access to the victim data,
threatening to publish or delete it unless a ransom is paid.
Advanced ransomware uses cryptoviral extortion, encrypting the
victim’s data so that it is impossible to decrypt without the
decryption key.
68.What is Spyware?
➢ A type of program installed to collect information about users,
their systems or browsing habits, sending the data to a remote
user. The attacker can then use the information for
blackmailing purposes or download and install other malicious
programs from the web.
69.What is Trojans?
➢ A program hiding inside a useful program with malicious
purposes. Unlike viruses, a trojan doesn’t replicate itself and it
is commonly used to establish a backdoor to be exploited by
attackers.
70.What is Worms?
➢ unlike viruses, they don’t attack the host, being self-contained
programs that propagate across networks and computers.
Worms are often installed through email attachments, sending
a copy of themselves to every contact in the infected computer
email list. They are commonly used to overload an email
server and achieve a denial-of-service attack.
80.What are the differences among the terms cyber attack, cyber
threat & cyber risk.
➢ The terms cyber attack, cyber threat, and cyber risk are
interrelated as follows. A cyber attack is an offensive action,
whereas a cyber threat is the possibility that a particular attack
may occur, and the DIGITAL FLUENCY E-MANUAL 87
cyber risk associated with the subject threat estimates the
probability of potential losses that may result. For example, a
Distributed Denial of Service (DDoS) cyber attack by a botnet
is a cyber threat for many enterprises with online retail
websites, where the associated cyber risk is a function of lost
revenues due to website downtime and the probability that a
DDoS cyber attack will occur
83.What is a backup?
➢ A backup is a copy of the data stored on a device. It's useful
for restoring data if your device crashes or continuing work if
your device is lost or stolen.
84.What is encryption?
➢ Encryption is a means of protecting files and devices. When
you encrypt a file, you "lock" it with an encryption key or
password. The file itself is scrambled and becomes unreadable
without the appropriate key or password.
88. How data science differs from Big data and Data Analytics?
➢ Data Science is a field which contains various fools &
algorithms for gaining useful insights from raw data. It
involves various methods for data modelling and other data
related takes such as data cleaning, pre-processing, analysis
etc. Big data implies the enormous amount of data. which can
be Structured, unstructured & semi-structured generated.
Through various channels and organisations. The takes data
analyses involve providing operational insights into business
situation.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@