You are on page 1of 48

Mangalore University

Skill Enhancement Course- Digital Fluency


COMMON TO ALL COURSES

QUESTION BANK
PART -A
Multiple choice questions on Artificial Intelligence

1) Artificial Intelligence is about _


a) Playing a game on Computer
b) Making a machine Intelligent
c) Programming on Machine with your Own Intelligence
d) Putting your intelligence in Machine
Answer: b
2) Who is known as the Father of AI?
a) Fisher Ada b) Alan Turing
c) John McCarthy d) Allen Newell
Answer: c
3) Select the most appropriate situation for that a blind search can be used.
a) Real-life situation b) Small Search Space
c) Complex game d) All of the above
Answer: b
4) The application/applications of Artificial Intelligence is/are
a) Expert Systems b) Gaming
c) Vision Systems d) All of the above
Answer: d
5) If a robot is able to change its own trajectory as per the external conditions, then the
robot considered as the
a) Mobile b) Non-Servo c) Open Loop d) Intelligent
Answer: d
6) Which of the given language is not commonly used for AI?
a) LISP b) PROLOG c) Python d) Perl
Answer: d
7). A technique that was developed to determine whether a machine could or could not demonstrate
the artificial intelligence is known as the
a) Boolean Algebra b) Turing Test
c) Logarithm d) Algorithm
Answer: b
8) The component of an Expert system is ____
a) Knowledge Base b) Inference Engine
c) User Interface d) All of the above
Answer: d
1
9) Which algorithm is used in the Game tree to make decisions of Win/Lose?
a) Heuristic Search Algorithm
b) DFSIBFS algorithm
c) Greedy Search Algorithm
d) Min/Max algorithm
Answer: d
10). What is the full form of “AI”?
a) Artificially Intelligent
b) Artificial Intelligence
c) Artificially Intelligence
d) Advanced Intelligence
Answer: b
11). Which of the following is the branch of Artificial Intelligence?
a) Machine Learning
b) Cyber forensics
c) Full-Stack Developer
d) Network Design
Answer: a
12). Which of the following is a component of Artificial Intelligence?
a) Learning
b) Training
c) Designing
d) Puzzling
Answer: a
13) Ways to achieve AI in real-life are_________.
a) Machine Learning
b) Deep Learning
c) Both a & b
d) None of the above
Answer: c
14). The main tasks of an AI agent are_______.
a) Input and Output
b) Moment and Humanly Actions
c) Perceiving, thinking, and acting on the environment
d) None of the above
Answer: c
15). The best AI agent is one which____________
a) Needs user inputs for solving any problem
b) Can solve a problem on its own without any human intervention
c) Need a similar exemplary problem in its knowledge base
d) All of the above
Answer: b

2
16. The process of training a Neutral Network is:
a. Model – Train – Training Data – Test and Update.
b. Train – Model – Prediction – Test and Update.
c. Training Data – Model – Predict – Test and Update.
d. Model – Train – Prediction – Test and Update.
Ans: c
17. Which of the following is not an application of artificial intelligence?
a. Face recognition system
b. Chatbots
c. Natural language Processing
d. DBMS
Ans: d
18. Which of the following is an example of deep learning?
a. Self-driving cars b. Pattern recognition
c. Natural language processing d. All of the above
Ans: d
19. Convolutional Neural Network is used in-
A. Image classification B. Text classification
C. Computer vision D. All of the above
Ans: d
20. What is machine learning ?
A. Machine learning is the science of getting computers to act without being
explicitly programmed.
B. Machine Learning is a Form of AI that Enables a System to Learn from Data.
C. Both A and B
D. None of the above
Ans:c
21. The categories in which Machine learning approaches can be traditionally categorized
are ______ .
A. Supervised learning B. Unsupervised learning
C. Reinforcement learning D. All of the above
Ans: d
22. The Real-world machine learning use cases are _______.
A. Digital assistants B. Chatbots
C. Fraud detection D. All of the above
Ans: d
23. Which of the following is an advantage of artificial intelligence?
a. Reduces the time taken to solve the problem
b. Helps in providing security
c. Have the ability to think hence makes the work easier
d. All of the above
Ans:d

3
24. What the first layer in neural network is called?
A. input layer B. output layer
C. hidden layer D. None of the above
Ans: a
25. ________ is used as an input to the machine learning model for training and
prediction purposes.
a. Feature b. Feature Vector
c. Both A and B d. None of the above
Ans: b
26. In a Deep Learning System, each connection between Neurons is association with a:
a. Length.
b. Weight.
c. Function.
d. None of the Above
Ans: b.
27. Apple’s, Siri, Amazon’s, Alexa, Microsoft Cortana and Google Assistant’s are_____
a. Digital Assistant’s B. Neural Networks
C. Data Base Systems D. Machine Learning Tools
Ans: a
Multiple choice questions on
Database management and Big Data Analytics

1) Which of the following is generally used for performing tasks like creating the structure of the
relations, deleting relation?
a) DML (Data Manipulation Language) b) Query
c) Relational Schema d) DDL (Data Definition Language)
Answer: d
2) Which of the following provides the ability to query information from the database and insert
tuples into, delete tuples from, and modify tuples in the database?
a) DML (Data Manipulation Language) b) DDL (Data Definition Language)
c) Query d) Relational Schema
Answer: a
3) A Database Management System is a type of ____ software.
a) It is a type of system software
b) It is a kind of application software
c) It is a kind of general software
d) Both A and C
Answer: a
5) Which of the following is the Big Data Analytic tool ?
a) Apache Hadoop b) MongoDB c) Microsoft Azure d) All of the above
Answer: d
6). What are the main components of Big Data?
(a) MapReduce (b)HDFS
(c) YARN (d) All of these
Answer: d

4
7). What are the different features of Big Data Analytics?
(a) Open-Source
(b) Scalability
(c) Data Recovery
(d) All the above
Answer: d
8). What are the four V’s of Big Data?
(a) Volume
(b) Velocity
(c) Variety
(d) All the above
Answer: d
9). The examination of large amounts of data to see what patterns or other useful
information can be found is known as
(a) Data examination
(b) Information analysis
(c) Big data analytics
(d) Data analysis
Answer: c
10). Big data analysis does the following except
(a) Collects data
(b) Spreads data
(c) Organizes data
(d) Analyzes data
Answer: b
11). The new source of big data that will trigger a Big Data revolution in the years to come
is
(a) Business transactions
(b) Social media
(c) Transactional data and sensor data
(d) RDBMS
Answer: c
12) The word 'Big data' was coined by
(a) Roger Mougalas
(b) John Philips
(c) Simon Woods
(d) Martin Green
Answer: a
13) Concerning the Forms of Big Data, which one of these is odd?
(a) Structured
(b) Unstructured
(c) Processed
(d) Semi-Structured
Answer: c
14) Big Data applications benefit the media and entertainment industry by
(a) Predicting what the audience wants
(b) Ad targeting
(c) Scheduling optimization
(d) All of the above
Answer: d
15). The feature of big data that refers to the quality of the stored data is ______
(a) Variety
(b) Volume
(c) Variability
(d) Veracity
Answer: d
5
16. Data science is the process of diverse set of data through ?
A. organizing data B. processing data
C. analysing data D. All of the above
Ans: D
17. Which of the following language is used in Data science?
A. C B. C++
C. R D. Ruby
Ans : C
18. Unstructured data is not organized.
A. TRUE B. FALSE
C. Can be true or false D. Can not say
Ans : A
19. Which of the following is a data visualization method?
A. Line B. Triangle
C. Pie chart and Bar Chart D. Pentagon
Ans: C
20. RDBMS store data in the form of tables with most commercial RDBMS using____
a. SQL B. Apache C. work fusion D. Mango DB
Ans:A
21. Select the order of the Big Data Analytics process.
a. Information, Data, Analysis, Insight
b. Data , Information, Insight, Analysis
c. Data, Insight, Analysis, Information
d. Data, Analysis , Insight , Information
Ans: B
22. ________ refers to the quality of information or data
a. Volume B. Variety C. Velocity D. Veracity
Ans: D
23. ______________ is the process of taking row data, transforming it into to graphs,
charts, images and videos.
A. Data mining B. Data visualisation
C. Data warehouse D. Data Analytics
Ans: B
24. Which of the following is not Big Data tool?
A. Apache Hadoop B. Apache Kafka
C. Apache Tomcat D. Apache Zookeeper
Ans: C
25. The technology solution used to optimize and manage the storage and retrieval of
data from databases is called
A. Database management system B. Datastore management system
C. Big data analytics D. IOT
Ans: A

6
26. Which one of the following is not included in four Vs of Big data analytics?
a) Volume b) Veracity c) Variety d) Vicinity
Ans: D
27. In the Healthcare Industry, AI has disrupted.
A. Medical imaging.
B. Surgery.
C. Physiological Diagnosis.
D. None of these.
Ans: A

Multiple choice questions on Internet of things

1) How many numbers of the element in the open IoT architecture?


a) Four elements b) Five elements c) Six elements d) Seven elements
Answer: d)
2) Which of the following is the way in which an IoT device is associated with
data? a) Internet b) Cloud c) Automata d) Network
Answer: b)
3) Which of the following IoT networks has a very short range?
a) Short Network b) LPWAN
c) SigFox d) Short-range Wireless Network
Answer: d)
4) What is the full form of the LPWAN?
a) Low Protocol Wide Area Networkb) Low Power Wide Area Network
c) Long Protocol Wide Area Networkd) Long Power Wide Area Network
Answer: b)
5) An IoT network is a collection of -------- devices.
a) Signal b) Machine to Machine
c) Interconnected d) Network to Network
Answer: c)
6) Which one of the following is not an IoT device?
a) Amazon echo voice controller b) Google Home
c) Nest Smoke Alarm d) None of these
Answer: d)
7) What is the main purpose of WoT (Web of Things) in the IoT?
a) Improve the usability and interoperability
b) Reduce the security
c) Complex the development
d) Increase the cost
Answer: a)
8) What is the Arduino UNO?
a). Software b). Hardware device c). Network d). Protocol
Answer: b)

7
9) __ allows the user to control electronic components.
a) Android API b) RETful API c) MQTT API d) CoAP API
Answer: b)
10) Which of the following is not an application of IoT?
a) Wearables b) Smart Grid c) Arduino d) Smart City
Answer: c)
11) What is the real example of a smart grid device in IoT?
a) Mobile phone
b) Television
c) Smart Speaker
d) Smart Meters
Answer: d)
12). What is the full form of ICT?
a) InterConnect Technology
b) Internet Connection Topology
c) Information and Communication Technology
d) Infer Communication Topology
Answer: c)
13) Which of the following devices is used to measure the gases or liquid?
a) Optical Sensor
b) Gas Sensor
c) Smoke Sensor
d) Pressure sensor
Answer: d)
14). What is the full form of HDLC?
a) Higher Data Level Communication
b) Higher Data Link Communication
c) High-level Data Link Control
d) High Data Level Control
Answer: c)
15). What is the full form of HART?
a) Highway Application Remote Transport
b) Highway Addressable Remote Transducer
c) High Address Reduce Transport
d) High Application Remote Transport
Answer: b)
16. _____________ are the applications of IOT
a) House
b) Virtual environment
c) Regional office
d) All of the above
Ans: d)

8
17. ___________ are the main components in IOT
a) Low power embedded systems
b) Cloud computing
c) Availability of big data, networking connection
d) All of the above
Ans: d)
18. ___________ are the characteristics of IOT
a) Intelligence, scalable
b) Security
c) Heterogeneity
d) All of the above
Ans: d)
19. What is IoT?
a) network of physical objects embedded with sensors
b) network of virtual objects
c) network of objects in the ring structure
d) network of sensors
Ans: a
20. Which of the following category is used for business to consumer process?
a. Group IoT
b. Community IoT
c. Personal IoT
d. Industrial IoT
Answer : d)
21. Who coined the term IoT?
a) IBM
b) Kevin Ashton
c) Ross Ihaka
d) Guido van Rossum
Ans: b)
22. IIoT stands for _________.
a. Intense Internet of Things
b. Index Internet of Technology
c. Industrial Internet of Things
d. Incorporate Internet of Technology
Ans: c)
23. Identify among the following which is not a fundamental component of IoT
system.
a) User interface
b) Sensors
c) Transformer
d) Connectivity and data processing
Ans: c)
9
24. Identify the protocol used to link all devices in IoT,
a) UDP
b) TCP/IP
c) HTTP
d) Network
Ans: b)
25. The term “TCP/IP” stands for __________.
a. Transmission Contribution protocol/ internet protocol.
b. Transmission Control Protocol/ internet protocol.
c. Transaction Control protocol/ internet protocol.
d. Transmission control Protocol/ internet protocol.
Ans: b.

Multiple choice questions on Cloud Computing

1) What type of computing technology refers to services and applications that typically run
on a distributed network through virtualized resources?
a) Distributed Computingb) Cloud Computing
c) Soft Computingd) Parallel Computing
Answer: b)
2) Which one of the following options can be considered as the Cloud?
a) Hadoopb) Intranet
c) Web Applicationsd) All of the above
Answer: a)
3) Cloud computing is a kind of abstraction which is based on the notion of combining physical
resources and represents them as ______ resources to users.
a) Realb) Cloud
c) Virtual d) none of the above
Answer: c)
4) Which one of the following cloud concepts is related to sharing and pooling the resources?
a) Polymorphism b) Virtualization
c) Abstraction d) None of the above
Answer: b)
5) Which one of the following statements is not true?
a) The popularization of the Internet actually enabled most cloud computing systems.
b) Cloud computing makes the long-held dream of utility as a payment possible for you,
with an infinitely scalable, universally available system, pay what you use.
c) Soft computing addresses a real paradigm in the way in which the system is
deployed.
d) All of the above
Answer: c)

10
6) Which one of the following can be considered as a utility is a dream that dates from the
beginning of the computing industry itself?
a) Computingb) Model
c) Softwared) All of the mentioned
Answer: a)
7) Which of the following is an essential concept related to Cloud?
a) Reliabilityb) Abstraction
c) Productivityd) All of the mentioned
Answer: b)
8). Which one of the following is Cloud Platform by Amazon?
a) Azure b) AWS
c) Cloudera c) All the above
Answer: b)
9). Which of the following statements is not true?
a) Through cloud computing, one can begin with very small and become big in a rapid
manner
b) All applications benefit from deployment in the Cloud.
c) Cloud computing is revolutionary, even though the technology it is built on is
evolutionary.
d) None of the above
Answer: b)
10) Which one of the following refers to the non-functional requirements like disaster
recovery, security, reliability, etc.
a) Service Development
b) Quality of service
c) Plan Development
d) Technical Service
Answer: b)

11) Which of the following provides the Graphic User Interface (GUI) for interaction with
the cloud?
a) Client
b) Client Infrastructure
c) Application
d) Server
Answer: b)
12) Which one of the following a technology works behind the cloud computing
platform?
a) Virtualization
b) SOA (Service-Oriented Architecture)
c) Grid Computing
d) All of the above
Answer: d)

11
13) Which of the following is the correct full form of SaaS?
a) Storage-as-a-Service
b) Server-as-a-Software
c) Software-as-a-Service
d) None of the above
Answer: c)
14). Which of the following is a characteristic of the SaaS applications?
a) SaaS applications are reliable
b) SaaS applications are not customizable
c) SaaS applications are customizable
d) Non-reliable
Answer: c)
15) Which one of the following statements is not true about SaaS?
a) SaaS applications are offered in all shapes and sizes.
b) All users with a little knowledge or know how to operate a computer also know
about the SaaS.
c) SaaS software is not customizable.
d) None of the above
Answer: d)
16. The response time and transit time is used to measure the ___________ of a
network.
a. Security.
b. Longevity.
c. Reliability.
d. Performance.
Ans: d.
17. Which of the following factor of the network gets hugely impacted when the
number of users exceeds the network's limit?
a. Reliability.
b. Performance.
c. Security.
d. Longevity.
Ans: d.
18. In the computer networks, the encryption techniques are primarily used for
improving the ____________.
a. Security.
b. Performance.
c. Reliability.
d. Longevity.
Ans: a. .
19. Who is the father of cloud computing?
a) Sharon B. Codd
b) Edgar Frank Codd
c) J.C.R. Licklider
d) Charles Bachman
Answer: c
12
20. Which of the following is not a type of cloud server?
a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers
Ans: d)
21. Which of the following are the features of cloud computing?
a) Security
b) Availability
c) Large Network Access
d) All of the mentioned
Answer: d
22. Which of the following is the application of cloud computing?
a) Adobe
b) Paypal
c) Google G Suite
d) All of the above
Answer: d
23. Which of the following is an example of the cloud?
a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above
Answer: d
24. Applications and services that run on a distributed network using virtualized
resources is known as ___________
a) Parallel computing
b) Soft computing
c) Distributed computing
d) Cloud computing
Answer: d
25. Which of the following is the Cloud Platform provided by Amazon?
a) AWS
b) Cloudera
c) Azure
d) All of the mentioned
Answer: a
26. Choose the correct IaaS provider among the following.
a) EC2
b) EC1
c) EC10
d) Hybrid
Answer: A

13
27. Choose among the following, which are the characteristics of IaaS.
a) Highly scalable
b) Flexible and dynamic platform
c) Facilitates hardware access to many users
d) All of the above
Answer: D

Multiple Choice question on Cyber Security

1) In which of the following, a person is constantly followed /chased by another


person or group of several people?
a) Phishing b) Bulling c) Stalking d) Identity theft
Answer: c)
2). Which one of the following can be considered as the class of computer threats?
a) Dos Attack b) Phishing c) Soliciting d) both a) and c)
Answer: a)
3). Which of the following is considered as the unsolicited commercial email?
a) Virus b) Malware c) Spam d) all of the above
Answer: c)
4)Which of the following usually observe each activity on the internet of the victim,
gather all information in the background and send it someone else?
a) Malware b) Spyware c) Adware d) All of the above
Answer: b)
5) --------- is a type of software designed to help the user to detect the viruses and
avoid them.
a) Malware b) Spyware c) Antivirus d) Both b) and c)
Answer: c)
6) Which one of the following is a type of antivirus program?
a) Quick healb) Mcafee c) Kaspersky d) All of the above
Answer: d)
7) It can be a software program or a hardware device that filters all data packets coming
through the internet or a network etc., it is known as the
a) Antivirus b) Firewall c) Cookies d) Malware
Answer: b)
8) Which of the following refers to stealing one's idea or invention of others and use it
for their own benefits?
a) Piracy b) Plagiarism
c) Intellectual property rights d) All of the above
Answer: d)
9) Which of the following refers to exploring the appropriate, ethical behaviors related to
the online environment and digital media platform?
a) Cyber law b) Cyberethics c) Cybersecurity d) Cybersafety
Answer: b)

14
10) Which one of the following usually used in the process of Wi-Fi-hacking?
a) Aircrack-ng
b) Wireshark
c) Norton
d) All of the above
Answer: a)
11) In system hacking, which of the following is the most crucial activity?
a) Information gathering
b) Covering tracks
c) Cracking passwords
d) None of the above
Answer: c)

12). To protect the computer system against the hacker and different kind of viruses,
one must always keep _________ on in the computer system.
a) Antivirus
b) Firewall
c) Vlc player
d) Script
Answer: b)
13). Which of the following can be considered as the elements of cyber security?
a) Application Security
b) Operational Security
c) Network Security
d) All of the above
Answer: d)
14) Which one of the following is also referred to as malicious software?
a) Maliciousware
b) Badware
c) Ilegalware
d) Malware
Answer: d)
15) Hackers usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's Id and Passwords
c) To corrupt the user's data stored in the computer system
d) All of the above
Answer: d)
16. Which one of the following is a type of antivirus program?
a. Quick Heal b. Mcafee.
c. Kaspersky. d. All of the above.
Answer: d .

15
17. Which of the following refers to exploring the appropriate, ethical behaviours
related to the online environment and digital media platform?
a. Cyber Low.
b. Cyber ethics.
c. Cybersecurity.
d. Cyber safety.
Answer: b
18. Which one of the following refers to the technique used for verifying the
integrity of the message?
a. Digital Signature.
b. Decryption algorithm.
c. Protocol.
d. Message Digest.
Ans: d.
19. Which one of the following usually used in the process of Wi-Fi hacking?
a. Aircrack-ng
b. Wireshark.
c. Norton
Ans: a.
20. In ethical hacking and cyber security, there are ___________ types of
scanning:
a. 1
b. 2
c. 3
d. 4
Ans: c.
21. Which of the following is not a type of scanning?
a. Xmas Tree Scan.
b. Cloud Scan.
c. Null Scan.
d. SYN Stealth.
Ans: b.
22. In system hacking, which of the following is the most crucial activity?
a. Information gathering.
b. Covering tracks.
c. Cracking passwords.
d. None of the above.
Ans: c.

16
23. Which of the following are the types of scanning?
a. Network, vulnerability, and port scanning.
b. Port, network, and services.
c. Client, Server, and network.
d. None of the above.
Ans: a.
24. To protect the computer system against the hacker and different king of
viruses, one must always keep __________ on in the computer system.
a. Antivirus. b.Firewall.
c. VLC Player. d. Script.
Ans: b.
25. Which of the following can be considered as the elements of cyber security?
a. Application Security.
b. Operational Security.
c. Network Security.
d. All of the above.
Ans: d.
26. Which of the following are famous and common cyber-attacks used by
hackers to infiltrate the user’s system?
a. DDos and Derive-by Downloads.
b. Malware &Malvertising.
c. Phishing and Password attacks.
d. All of the above.
Ans: d.
27. Which one of the following is also referred to as malicious software?
a. Maliciousware.
b. Badware.
c. Illegalware.
d. Malware.
Ans: d.
28. Hackers usually used the computer virus for __________ purpose.
a. To log, monitor each and every user’s stroke.
b. To gain access the sensitive information like user’s Id and Passwords.
c. To corrupt the user’s data stored in the computer system.
d. All of the above.
Ans: d.
29. In Wi-Fi Security, which of the following protocol is more used?
a. WPA. b. WPA2.
c.WPS. d. Both A and C
Ans: b.

17
Multiple Choice question on Communication Module (Module -3)

1. Word communication is derived from Latin word


A) Communicate
B) Communicare
C) Compute
D) Computer
Answer B
2. Types of words used for verbal communication?
A) Acronyms
B) Simple
C) Technical
D) Jargons
Answer B
3. Which of the following shows a positive facial expression?
A) Frowning while concentrating
B) Maintaining eye contact
C) Smiling continuously
D) Rolling up your eyes
Answer B
4. __________ is a communication between small groups of individuals, typically in
a face-to-face setting
a. Inter-personal communication
b. Intra Personal communication
c. Mass communication
d. None of these
Answer A
5. Which of the following is not a component of effective communication?
a. Source
b. Message
c. Channel
d. Time
Answer D
6. ________ is the way in which a message or messages travel between source and
receiver
a. Source
b. Message
c. Channel
d. Receive
Answer C

18
7. The abilities to communicate properly are:
A) read
B) write
C) speak
D) all of these
Answer D
8. Which method is good for taking leave in the office.
A) Website
B) Posters
C) e-mail
D) business meetings
Answer C
9. The word Commūnicāre means ______ in Latin.
A) to deliver
B) to share
C) to present
D) to sacrifice
Answer B
10. To understand the message properly the receiver need to ____________ the
message properly.
A) transmit
B) throw
C) listen
D) ignore
Answer C
11. What is the final step in the communication cycle?
A) Encoding
B) Decoding
C) Feedback
D) Receiving
Answer C
12. The process in which the receiver interprets and understands the message is called
A) Decoding
B) Encoding
C) Feedback
D) None of these
Answer A
13. Which of the following is an example of oral communication?
A) Newspapers
B) Letters
C) Phone call
D) e-mail
Answer C

19
14. “Two girls talking over a phone” – is an example of....
A) interpesonal communication
B) written communication
C) small group communication
D) public communication
Answer A
15. Pointing finger to something is an example of.....
A Expressions
B) Gestures
C) Body Language
D) Para Language
Answer B
16. The response to a sender’s message is called as _________
a. Transmission
b. Message
c. Channel
d. Feedback
Answer D
17. Communication is a non-stop_______
a. Programme
b. Plan
c. Process
d. Play
Answer C
18. Which of the following listens or understands the message?
a. Receiver
b. Channel
c. Sender
d. None of the above
Answer A
19. An effective speaker is the one who is __________
a. speaking appropriately whilst maintaining eye contact with the audience.
b. using varied vocabulary.
c. using varied articulate speech to suit the need of the audience.
d. All of the above
Answer D
20. __________ is the ‘sharing’ of information between two or more individuals or within
a group to reach a common understanding.
a. Common
b. Communication
c. Writing
d. Reading
Answer B
20
21. One can improve communication skill
A Pausing when required
B Asking Open-ended questions
a. Answer A only
b. Answer B only
c. Both A and B
d. Neither A nor B
Answer C
22. Choose the right order of steps to communicate effectively
a. Aim, Message, Channel, audience, Story, Review
b. audience, Aim, Message, Story, Channel, Review
c. Aim, Audience, Message, Channel, story, Review
d. Audience, Message, Aim, Story, Review, Channel
Answer C
23. How not to speak So That People Want to Listen
a. Gossip
b. Complaining
c. Negatively
d. All of these
Answer D
24. Choose the Correct abbreviation for HAIL in communication
a. Honesty Authenticity Integrity Love
b. Honesty, Authority Integrity Love
c. Harmony, Authenticity, Integrity, Love
d. Hearty, Appreciative, Indigenous, Limit
Answer A
25. There are 6 steps that can be used for strategic communication. Five of them are Aim,
Review, Message, Story and Audience. Which is the sixth step?
a. Paths
b. Channels
c. Ways
d. Feedback
Answer B
26. When you’re listening to others, pay as much attention to them as you can. Which
of the following should you notice about the speaker? A. Their words. B. Quirks in their
body language
a. Only A
b. Only B
c. Both A and B
d. None
Answer C
21
27. Which non-verbal aspect makes the most impact in verbal face-to-face
communication?
a. Eye Contact
b. Professional Attire
c. Communication Venue
d. Language
Answer A
28. A communication _______is anything that comes in the way of receiving and
understanding messages that one sends to another to convey his ideas, thoughts, or any other
kind of information
a. Skill b. Barrier
c. Channel d.None
Answer B
29. Which of the following are barriers of effective communication?
a. Disengagement
b. Lack of focus and attention
c. Cultural Difference
d. All of these
Answer D
30. Speech problem, impaired eyesight, or any physical illness are the example of
which communication barrier
a. Lack of Knowledge
b. Being Judgmental
c. Differences in perception
d. Physical disability
Answer D
31. Poor lighting is an example of _________
a. Physical barrier of communication
b. Physiological barrier
c. Technical Jargon
d. none of these
Answer A
32. Information Overload is a ___________ of communication
a. Barrier
b. Substitute
c. Exception
d. none of these
Answer A

22
33. __________ arise when two individuals in an organisation belong to different
religion, states or countries.
a. Physical Barriers
b. Cultural Barriers
c. Perceptional barriers
d. Emotional barriers
Answer B
34. To overcome and prevent communication challenge at work one can
a. Maintain eye contact
b. Request and provide feedback
c. Focus on what the other person is saying
d. All of these
Answer D

35. Which of the following can be called a ‘perceptual’ barrier to communication?


a. Negative feeling
b. Cultural norms
c. Pre-made assumptions
d. none of the above
Answer C
36. _________ barrier include using of jargon, abbreviations and unfamiliar
expression
a. Language barrier
b. Perception barrier
c. Cultural Barriers
d. Emotional barrier
Answer A
37. _____________ is the person who notices and decodes and attaches some
meaning to a message.
a. Driver
b. Sender
c. Source
d. Receiver
Answer D
38 Your dress code is an example of _____________
a. Oral communication
b. Written communication
c. Non-verbal communication
d. Spoken
Answer C
23
39. At each stage in the process of communication, there is a possibility of
interference which may hinder the process. Such interference is known as ___.
a. sender
b. receiver
c. barrier
d. none of them
Answer C
40. We use ___ and ___ in addition to words when we speak.
a. words and gestures
b. gestures and body language
c. body language and posture
d. posture and eye gazing
Answer B

41. ___ refers to pitch, loudness, duration, intonation and, tempo.


a. touches
b. prosody
c. gestures
d. haptics
Answer B
42. Communication through ___ and ___ is called verbal communication
a. written material and gestures
b. gestures and spoken words
c. spoken words and written material
d. body language and gestures
Answer C

PART-B

One Marks Questions

1. What is AI? Mention any two Applications.


2. Give any two examples for AI.
3. What do you mean by the term Robotics?
4. List any two Application of AI in Online Shopping Sites.
5. What is Machine learning?
6. List the Machine Learning Methods.
7. What is Deep learning?
8. What is Neural Network?
9. List Machine learning metods.
10. List any four Use Cases of AI in Manufacturing.
24
11. What is autonomous software?
12. How will artificial intelligence affect healthcare?
13. How is artificial intelligence used in education?
14. How is AI used in human resources?
15. What are various types of sensors used in the robotics?
16. Define Supervised Learning.
17. Define Unsupervised Learning.
18. Expand SQL.
19. Which is the best application of AI in the healthcare sector?
20. Define Database. What are the two types of it.
21. Define Semi-supervised Learning.
22. Define Reinforcement Learning.
23. What is Data science?
24. What is the data life cycle?
25. What is the need for Data Science?
26. How Facebook Uses Data Analytics To Understand Your Posts And Recognize
Your Face?
27. What is IoT?
28. What are the main parts of IoT systems?
29. What is Industrial Internet of Things (IIoT)?
30. List application of IoT in Banking System
31. What are the four stages of IoT Architecture?
32. What is IIoT?
33. List the Benefits of IIoT.
34. Give two examples of IIoT.
35. What are the main parts of IoT systems?
36. What is the role of artificial intelligence in IoT.
37. Mention the four different levels of IoT security.
38. What is IoT programming?
39. List any two predictions about the future of IoT.
40. What is Cloud Computing? Give any two applications of it.
41. What are the benefits of Cloud Computing?
42. What are the types of cloud?
43. How does Cloud storage work?
44. Give a difference between IaaS, PaaS, and SaaS.
45. What is a Hybrid Cloud?
46. What is a Community Cloud?
47. Mention different cloud models.
48. Differentiate the private and public cloud.
25
49. What is Public Cloud?
50. What is a Private Cloud?
51. What is Cyber Security? Why it is important.
52. What is Cyber Attack? Mention any two types.
53. List any two method used to avoid Cyber Attacks.
54. List any two method used Preventing Cyber Attacks on your Company.
55. What is cyber hygiene?
56. What is a backup?
57. What is cyberspace?
58. What is a firewall?
59. What is anti-virus software?
60. What is the relation between cybersecurity and cryptography?
61. How is artificial intelligence used in education?
62. How is AI used in human resources?
63. How AI can be used in agriculture?
64. What is the data life cycle?
65. What is Big Data Analytics?
66. List the steps of Data Analytics Process.
67. What is Ransomware?
68. What is Spyware?
69. What is Trojans?
70. What is Worms?
71. List any two Applications of Big Data.
72. What is a Data Cleansing?
73. What is public health analytics?
74. List any four companies that are using big data?
75. List the any two uses of Neural Networks.
76. What are Big Data Tools and Software?
77. List hardware prototypes used in IoT.
78. What type of security parameters does the Cloud have in place?
79. What is a Unified Threat Management (UTM) system?
80. What are the differences among the terms cyber attack, cyber threat & cyber risk.
81. What is information security?
82. List any two Areas of Cyber Securit.
83. What is a backup?
84. What is encryption?
85. What happens if hardware fails?
86. What is Communication? Mention any two skills.
87. What do you mean by Problem Solving Technique?
26
88. How Data Science differs from Big Data and Data Analytics’
89. What is “big data for small business”?
90. Mention 6 basic center for internet security(CIS) Controls
91. Mention any two types of Communication
92. What is meant by Mass communication?
93. How effective communication improves in team building
94. Mention any Four skills of Good communication.
95. What is the final step in the communication cycle?
96. What is meant by Intrapersonal Communication?
97. How Negative body language effects good communication
98. What is verbal communication?
99. What is meant by Non-verbal communication?
100. What is meant by Interpersonal Communication?
101. How pay attention to nonverbal signals Enhance Communication.
102. Give two example for Non verbal communication.
103. What is the first step in the communication cycle?
104. What is critical Thinking?
105. How to overcome and prevent communication challenge at work.
106. What are the two thinks during speak?
107. What are 5 barriers to critical thinking
108. What is meant by Group Communication?
109. Give two examples for verbal communication.
110. Write the steps to communicate effectively.

__________

27
DIGITAL FLUENCY
QUESTION BANK
PART B
One Mark Questions:
1.What is AI? Mention any two Applications.
➢ AI is techniques that help machines and computers mimic human
behaviour.
Two Applications are:

• Robotics
• Digital Assistants

2.What are the two Examples of AI?


➢ Typing using software
➢ Shopping Online

3.What do you mean by term Robotics?


➢ Artificial Intelligence or AI gives robots a computer vision to
navigate, sense and calculate their reaction accordingly. Robots
learn to perform their tasks from humans through machine
learning which again is a part of computer programming and AI.

4.List any two Application of AI in Online Shopping Sites.


➢ Personalized shopping experience
➢ Fighting fake reviews

5.What is Machine Learning?


Machine learning is a method of data analysis that automates
analytical model building. It is a branch of artificial intelligence
based on the idea that systems can learn from data, identify patterns
and make decisions with minimal human intervention.

6.List the Machine Learning methods?


➢ Supervised Learning
➢ Unsupervised Learning
➢ Semi-supervised Learning
➢ Reinforcement Learning:

7.What is Deep Learning?


➢ Deep learning is a subset of machine learning (ML), where
artificial neural networks—algorithms modelled to work like the
human brain—learn from large amounts of data.

8.What are Neural Networks?


➢ Neural networks are a means of doing machine learning, in which
a computer learns to perform some task by analysing training
examples.

10. List any four Use Cases of AI in Manufacturing.


➢ Some Use Cases of AI in Manufacturing AI in manufacturing
allows making rapid, data-driven decisions, optimizing processes,
minimizing costs.
1. Quality checks
2. Prediction of failure modes
3. Predictive maintenance
4. Generative design

11. What is autonomous software?


➢ An autonomous system is one that can achieve a given set of
goals in a changing environment – gathering information about
the environment and working for an extended period of time
without human control or intervention.

12. How will artificial intelligence affect healthcare?


➢ AI can lead to better care outcomes and improve the
productivity and efficiency of care delivery. It can also
improve the day-today life of healthcare practitioners, letting
them spend more time looking after patients and in so doing,
raise staff morale and improve retention.

13. How is artificial intelligence used in education?


➢ With AI, the system alerts the teacher and tells whatis wrong.
It gives students a customized message which offers hints to
the correct answer. Hence, this helps to fill in the gaps in
explanation that might occur in courses. It also ensures that
students are buildingthe same conceptual foundation.

14.How is AI used in human resources?


➢ AI technology allows new hires to utilize human resources
support at any time of day and in any location through the use
of chatbots and remote support applications. AI can be used
for Candidate Screening, Engagement and Development and
Employees Training.

15. What are various types of sensors used in the robotics?


➢ Various types of sensors used in robots include light
sensors, sound sensors, temperature sensors, proximity
sensors, acceleration and navigation sensors

16. Define Supervised Learning?


➢ Supervised learning is commonly used in applications
where historical data predicts likely future events. For
example, it can anticipate when credit card transactions are
likely to be fraudulent or which insurance customer is
likely to file a claim.

17.Define Unsupervised Learning.?


➢ Unsupervised learning works well on transactional data.
For example, it can identify segments of customers with
similar attributes who can then be treated similarly in
marketing campaigns. Or it can find the main attributes
that separate customer segments from each other.

18.Expand SQL.
➢ STRUCTURED QUERY LANGUAGE

19.Which is the best application of AI in the healthcare sector?


➢ Some of the beneficial applications of AI for healthcare
purposes would be administrative workflows, image
analysis,robotic surgery, virtual assistants, and clinical
decision support

20.Define Database. What are the two types of it.


➢ A database is defined as a structured set of data held in a
computer’s memory or on the cloud that is accessible in
various ways.
➢ The two types of it:
• Relational Database
• NO SQL database

21.Define Semi-supervised Learning.


➢ Semi-supervised learning is useful when the cost is too
high to allow for a fully supervised process. Examples of
this include identifying a person's face on a web cam.
22.Define Reinforcement Learning.
➢ This is often used for robotics, gaming and navigation.
With reinforcement learning, the system discovers through
trial and error which actions yield the greatest reward

23.What is Data science?


➢ Data science is an interdisciplinary field that uses
scientific methods, processes, algorithms and systems to
extract knowledge and insights from noisy, structured and
unstructured data, and apply knowledge and actionable
insights from data across a broad range of application
domains.

24.What is the data life cycle?


➢ The data life cycle, also called the information life cycle,
refersto the entire period of time that data exists in your
system. This life cycle encompasses all the stages that your
data goes through, from first capture onward.
25.What is the need for Data Science?
➢ The reason why we need data science is the ability to
process and interpret data. This enables companies to
make informed decisions around growth, optimization,
and performance. Demand for skilled data scientists is on
the rise now and in the next decade.

26.How Facebook Uses Data Analytics To Understand Your Posts


And Recognize Your Face?
➢ Facial recognition - Facebook uses a DL application called
Deep Face to teach it to recognize people in photos. It says
that its most advanced image recognition tool is more
successful than humans in recognizing whether two
different images are of the same person or not – with Deep
Face scoring a 97% success rate compared to humans with
96%.
27.What is IoT?
➢ IoT is an evolution of mobile, home and embedded
applications interconnected to each other.

28.What are the main parts of IoT systems?


➢ IoT system consists of three main parts – Sensors,
Network connectivity and Data storage applications.

29.What is Industrial Internet of Things (IIoT)?


➢ Industrial IoT, or the Industrial Internet of Things (IIoT),
is a vital element of Industry 4.0. IIoT harnesses the power
of smart machines and real-time analysis to make better
use of the data that industrial machines have been churning
out for years. The principal driver of IIoT is smart
machines

30.List application of IoT in Banking System?


➢ Wearables  Connected Cars
➢ C Banking at home:
31. What are the four stages of IoT Architecture?
1. Sensors and actuators – Sensing layer for Data Gathering
2. Internet gateways and Data Acquisition Systems – Network
layer fData Transmission
3. Edge IT - Data Analytics, pre-processing
4. Data center and cloud – Apps & services

32.What is IIoT?
➢ IoT is an evolution of mobile, home and embedded
applications interconnected to each other. Using the internet
and data analytics, billions of devices connected to each other
create an intelligent system of systems
33.List the Benefits of IIoT.
➢ Improvement of Operational Performance
➢ Ensuring Safety and Compliance
➢ Increasing Flexibility and Agility

34.Give two examples of IIoT.


➢ Google Nest
➢ Examples of IoT in Banking- Wearables

35.What are the main parts of IoT systems?


➢ IoT system consists of three main parts – Sensors, Network
connectivity and Data storage applications.

36.What is the role of artificial intelligence in IoT.


➢ AI can be used to interpret data from IoT information obtained
from the physical world, analyzed using data science and AI.

37.Mention the four different levels of IoT security.


➢ Device, communication , cloud and lifecycle management

38.What is IoT programming?


➢ IoT programming involves working with data to produce
outcomes. Besides using programming languages, well-known
data analysis frameworks used in data science have a major
role to play.

39.List any two predictions about the future of IoT.


➢ By 2025, it is estimated that there will be more than to 75
billion IoT devices
➢ Cybercriminals will continue to use IoT devices to facilitate
DDoS attacks
40.What is Cloud Computing? Give any two applications of it.
➢ Cloud computing is described as the process of using a
network of remote servers, hosted via the internet, to store,
manage and process data, rather than hosting it locally.
Essentially, cloud computing is using someone else's
infrastructure and hardware, reducing the number of capital
investments your business needs to make.

41.What are the benefits of Cloud Computing?


➢ The adoption of cloud computing by organizations has
increased exponentially in recent years, due to the efficiency
and costsaving benefits that this computing model promises to
deliver, which is especially appealing to organizations with
limited IT staff and/or limited IT budgets. Independent
Software Vendors (ISV's) in particular, can also substantially
benefit from the cloud computing model for the delivery of
software applications as a service, which offers many
operational and administrative cost saving advantages over the
traditional model of on-premise software delivery for software
provider

42.What are the types of cloud?


➢ The three types of cloud computing are:
• Public cloud is cloud computing that is delivered via the internet
and shared across organizations.
•Private cloud is cloud computing that is dedicated solely to your
organization.
•A hybrid cloud is an environment that uses both public and
private clouds.

43.How does Cloud storage work?


➢ With Cloud storage, the files and data you need are placed on
highly secure remote systems stored in a provider's facility
rather than on your computer's hard drive or local server.
Internet access allows you to connect your computer or device
to the remote cloud solution to retrieve what you need.

44.Give a difference between IaaS, PaaS, and SaaS.


➢ IaaS (Infrastructure as a service) is also known as Hardware as
a Service (HaaS). It is a computing infrastructure managed
over the internet. The main advantage of using IaaS is that it
helps users
to avoid the cost and complexity of purchasing and managing the
physical servers. DIGITAL FLUENCY E-MANUAL 72
➢ PaaS (Platform as a Service) cloud computing platform is
created for the programmer to develop, test, run, and manage
the applications.
➢ SaaS (Software as a Service) is also known as “on-demand
software”. It is software in which the applications are hosted
by a cloud service provider. Users can access these
applications with the help of an internet connection and a web
browser.

45.What is a Hybrid Cloud?


➢ Hybrid Cloud is a combination of the public cloud and the
private cloud. We can say: Hybrid Cloud = Public Cloud +
Private Cloud.

46.What is a Community Cloud?


➢ Community cloud allows systems and services to be accessible
by a group of several organizations to share the information
between the organization and a specific community

47.Mention different cloud models?


➢ IAAS
➢ PAAS
➢ SAAS
48.Differentiate the private and public cloud.
➢ Public cloud is cloud computing that is delivered via the
internet and shared across organizations. • Private cloud is
cloud computing that is dedicated solely to your organization.

49.What is Public Cloud?


➢ Public cloud is cloud computing that is delivered via the
internet and shared across organizations.

50.What is a Private Cloud?


➢ Private cloud is cloud computing that is dedicated solely to
your organization.

51.What is Cyber Security? Why it is important.


➢ Cybersecurity refers to the specialization of computer network
security that consists of technologies, policies, and procedures
that protect networked computer systems from unauthorized
use or harm.
➢ The increasing reliance of our information-age economies and
governments on cyber (computer-based) infrastructure makes
them progressively more vulnerable to cyber attacks on our
computer systems, networks, and data

52.What is Cyber Attack? Mention any two types.


➢ An offensive action by a malicious actor that is intended to
undermine the functions of networked computers and their
related resources, including unauthorized access, unapproved
changes, and malicious destruction.

53.List any two method used to avoid Cyber Attacks.


➢ Train employees in cyber security principles
➢ Install, use and regularly update antivirus and anti-spyware
software on every computer
54.List any two method used Preventing Cyber Attacks on your
Company.
➢ Identify the Threats
➢ Beware of Cybercrimes

55.What is cyber hygiene?


➢ Cyber is a colloquial term that refers to best practices and other
activities that computer system administrators and users can
undertake to improve their cyber security while engaging in
common online activities, such as web browsing, emailing,
texting, etc

56.What is a backup?
➢ A backup is a copy of the data stored on a device. It's useful
for restoring data if your device crashes or continuing work if
your device is lost or stolen.

57.What is cyberspace?
➢ Cyberspace is the virtual environment that consists of
computer systems and networks, where all computers
communicate via networks and all networks are connected.
The term originated in science fiction during the 1980s and
became popular during the 1990s
58.What is a firewall?
➢ A firewall is a network security system that monitors incoming
and outgoing network message traffic and prevents the
transmission of malicious messages based on an updatable rule
set.

59.What is anti-virus software?


➢ Anti-virus software, also known as, anti-malware software, is
computer software used to scan files to identify and eliminate
malicious software (malware). Although anti-virus software
was originally developed to detect and remove computer
viruses (hence its name), it has been broadened in scope to
detect other malware, such as worms, Trojan horses, adware,
spyware, ransom-ware, etc.

60.What is the relation between cybersecurity and cryptography?


➢ Cyber security defenses are typically based on strong
authentication and encryption techniques(cryptography
techniques), cryptography is a key enabling technology for
cybersecurity. In other words, cryptography helps to
implement cyber security.

61.How is artificial intelligence used in education?


➢ AI, the system alerts the teacher and tells whatis wrong. It
gives students a customized message which offers hints to the
correct answer. Hence, this helps to fill in the gaps in
explanation that might occur in courses. It also ensures that
students are buildingthe same conceptual foundation.

62.How is AI used in human resources?


➢ AI can be used to the benefit of not only the hiring organization
but its job applicants. Instead, AI technology allows new hires
to utilize human resources support at any time of day and in
any location through the use of chatbots and remote support
applications. AI can be used for Candidate Screening,
Engagement and Development and Employees Training.

63.How AI can be used in agriculture?


➢ AI systems are helping to improve the overall harvest quality
and accuracy – known as precision agriculture. AI technology
helps in detecting disease in plants, pests and poor nutrition of
farms. AI sensors can detect and target weeds and then decide
which herbicide to apply within the region.

64.What is the data life cycle?


➢ The data life cycle, also called the information life cycle,
refersto the entire period of time that data exists in your
system. This life cycle encompasses all the stages that your
data goes through, from first capture onward.

65.What is Big Data Analytics?


➢ Big data analytics is the use of advanced analytic techniques
against very large, diverse data sets that include structured,
semistructured and unstructured data, from different sources,
and in different sizes from terabytes to zettabytes.

66.List the steps of Data Analytics Process. ?


➢ Data
➢ Info
➢ Insight
➢ Analysis

67.What is Ransomware?
➢ Its a type of malware that denies access to the victim data,
threatening to publish or delete it unless a ransom is paid.
Advanced ransomware uses cryptoviral extortion, encrypting the
victim’s data so that it is impossible to decrypt without the
decryption key.

68.What is Spyware?
➢ A type of program installed to collect information about users,
their systems or browsing habits, sending the data to a remote
user. The attacker can then use the information for
blackmailing purposes or download and install other malicious
programs from the web.

69.What is Trojans?
➢ A program hiding inside a useful program with malicious
purposes. Unlike viruses, a trojan doesn’t replicate itself and it
is commonly used to establish a backdoor to be exploited by
attackers.

70.What is Worms?
➢ unlike viruses, they don’t attack the host, being self-contained
programs that propagate across networks and computers.
Worms are often installed through email attachments, sending
a copy of themselves to every contact in the infected computer
email list. They are commonly used to overload an email
server and achieve a denial-of-service attack.

71.List any two Applications of Big Data.


➢ Healthcare:
➢ Media & Entertainment:

72.What is a Data Cleansing?


➢ Data cleaning is the process of fixing or removing incorrect,
corrupted, incorrectly formatted, duplicate, or incomplete data
within a dataset. When combining multiple data sources, there
are many opportunities for data to be duplicated or mislabeled.

73.What is public health analytics?


➢ Public health analytics is the process of obtaining, reviewing,
and managing health-related data of entire populations,
typically carried out by public health organizations in an effort
to maintain population health.

74.List any four companies that are using big data?


➢ Amazon
➢ Apple
➢ Spotify
➢ Google
➢ Facebook

75.List the any two uses of Neural Networks.


➢ Restoring colour to black and white photos or videos. Let there
be colour is a deep learning network that converts b/w photos
to colour using self learning algorithms.
➢ Pixel enhancing or image enhancing. This is cutting edge CSI
stuff. It uses pixel recursive super enhancement techniques to
convert low resolution images or videos to high quality.

76.What are Big Data Tools and Software?


➢ Hadoop.
➢ Quoble.
➢ Cassandra. .
➢ MongoDB. .
➢ Apache Storm. ....
➢ CuchDB. ...
➢ Statwing

77.List hardware prototypes used in IoT.


Hardware Prototypes used in IoT are
1) Raspberry Pi,
2) ARM Cortex Family
3) Arduino.

78.What type of security parameters does the Cloud have in place?


➢ These days, with cyber-attacks on the rise, security is a major
concern. Cloud providers put numerous security parameters in
place so that, in the event of an attack, your data is secure and
can be restored. These tactics include encryption, identity
management, and physical security. Providers should also
have business continuity plans in place that utilize redundant
hardware, backup generators, and other measures to prevent
downtime. Data center locations will also have security in
place like badge access restrictions, security cameras, fences
and more.
79.What is a Unified Threat Management (UTM) system?
➢ A Unified Threat Management (UTM) provides multiple
security services in a single device or service on a network.

80.What are the differences among the terms cyber attack, cyber
threat & cyber risk.
➢ The terms cyber attack, cyber threat, and cyber risk are
interrelated as follows. A cyber attack is an offensive action,
whereas a cyber threat is the possibility that a particular attack
may occur, and the DIGITAL FLUENCY E-MANUAL 87
cyber risk associated with the subject threat estimates the
probability of potential losses that may result. For example, a
Distributed Denial of Service (DDoS) cyber attack by a botnet
is a cyber threat for many enterprises with online retail
websites, where the associated cyber risk is a function of lost
revenues due to website downtime and the probability that a
DDoS cyber attack will occur

81.What is information security?


➢ Information security is the practice of protecting information
and information systems from unauthorized disclosure,
modification, and destruction. It encompasses the security of
all IT resources, including both University information and the
IT devices that access, process, store, or transmit it.

82.List any two Areas of Cyber Security ?


➢ Critical Infrastructure Security
➢ Application Security

83.What is a backup?
➢ A backup is a copy of the data stored on a device. It's useful
for restoring data if your device crashes or continuing work if
your device is lost or stolen.

84.What is encryption?
➢ Encryption is a means of protecting files and devices. When
you encrypt a file, you "lock" it with an encryption key or
password. The file itself is scrambled and becomes unreadable
without the appropriate key or password.

85.What happens if hardware fails?


The Cloud has a completely self-healing architecture. This means
that if any hardware node should fail, any cloud servers running
on resources on that node will be re-provisioned on alternative
hardware. This happens without the need for any human
intervention. We can also engineer solutions for instantaneous
failover for customers with specific availability requirements.
Contact us, and we can discuss the various options available.
86.What is Communication ? mention any two skills
➢ Communication is the process of sending Receiving message
through verbal and nonverbal.
Two skills
➢ Understanding
➢ listening.

87.What do you mean by problem solving technique?


➢ Problem solving is the act of defining a problem; determining the
cause of the problem; identifying, prioritizing, and selecting
alternatives for a solution; and implementing a solution.

88. How data science differs from Big data and Data Analytics?
➢ Data Science is a field which contains various fools &
algorithms for gaining useful insights from raw data. It
involves various methods for data modelling and other data
related takes such as data cleaning, pre-processing, analysis
etc. Big data implies the enormous amount of data. which can
be Structured, unstructured & semi-structured generated.
Through various channels and organisations. The takes data
analyses involve providing operational insights into business
situation.

89.What is many Big data for Small Business?


➢ Many small Business believe They are too small for big data.
The truth as small business need big data to Succeed Just as
much as longer corporation.

90. Mention 6 basic centre for internet security(CIS) Controls?


➢ Inventory and control of hardware assets
➢ Continuous vulnerability management
➢ Controlled use of adminisrtrative privilege
➢ Configuration for hardware and software on mobile device
laptops and serves
➢ Maintenance monitoring and analysis of audit logs.

91.Mention any two types of Communication


➢ Verbal communication
➢ Nonverbal communication
➢ Visual
➢ Written

92. What is meant by Mass communication?


➢ The imparting or exchanging of information on a latge scale to a
wide range of people.

93.How effectively communication improve in team building?


➢ Good communication within team allows for the better
exchange of ideas, execution of projects.
94.Mention any four skill of good communication.
➢ There basic communication skills are speaking writing
listening and reading.

95.What is the final step in the communication cycle ?


➢ The final step of the communication process is feedback.

96.What is meant by Intrapersonal communication?


➢ An Exchange of information between two more people.

97.How Negative body language effects good communication?


➢ Negative or closed body language are non verbal clue that
could diminish your Readability and influence. your gestures,
facial. Expressions and postures may offend even hurt others.

98.What is verbal communication ?


➢ Verbal communication is the use of words to convey a
message.

99.What is meant by Non-verbal communication?


➢ Nonverbal communication refers to the way in which being
convey information about this emotions, needs, intentions,
attitude, and thoughts without the use of verbal language.

100. What is meant by Interpersonal Communication?


➢ An Exchange of information between two more people.

101.How pay attention to non verbal signal enhance


communication?
1. pay attention to Nonverbal signals.
2. look for in congruent Behaviours
3. Flows on tone of voice.
4. use good Eye contact.

102. Give two example for Non verbal communication.


➢ Nonverbal communication types include
facial expressions, gestures, paralinguistics such as loudness
or tone of voice, body language, proxemics or personal space,
eye gaze, haptics (touch), appearance, and artifacts.

103.What is first step in the communication cycle?


➢ Encoding Process.

104.What is critical Thinking?


➢ critical thinking is the analysis available facts, evidence,
observations & arguments to a Judgement.

105.How to overcome and prevent communication challenge at


work?
1. Be aware of your body language
2. maintain eye contact.
3. Request and provide feedback.
4. 4 Don't interrupt.
5. Limit Distractions.

106. What are the two thinks during speak?


➢ Focus on Audiences
➢ What you say, How you say it

107.What are five barriers to critical thinking?


1. Thinking with ego
2. social Thinking.
3. Authoritative thinking
4. Judgement thinking.
5. Thinking in Black or white

108.what is meant by Group communication?


➢ Group communication is the art of sending & receiving
messages to multiple members of the group.
109.Give two Example for verbal communication.
➢ speeches, presentations & announcement.

110.Write the steps to communicate effectively .


1. 1.Establish trust.
2. 2 speak clearly and concisely.
3. d
4. Learn how to use tone & Body Language
5. Never Assume Anything.

!!!ALL THE BEST GUYS!!!

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

You might also like