Professional Documents
Culture Documents
3. Which phrases describe the opportunities presented by the field of Remote Sensing?
A. Aids climate research by tracking indicators like sea temperature
B. Enables monitoring critical infrastructure
C. Helps farmers monitor crop health
D. All of the above
Answer: D
4. Which of the following is NOT a role of remote sensing in environmental monitoring, natural
resource management, and disaster management?
2. TRUE or FALSE: One of the primary functions of the IoT is Data Collection and Monitoring,
which is used to collect real-time data from various sensors embedded in connected devices.
Answer: True
3. Multiple Choice: Which of the following statements DOES NOT explain the functions of
Internet of Things (IOT)?
4. Identification:
Which industry can benefit from IoT-connected medical devices for real-time patient data
transmission?
Answer: Healthcare
5. TRUE or FALSE: Martin Heidegger's claims on IOT include gestell which describe how
technology frames peoples' understanding of the world and shapes the relationships of people
with it.
Answer: False - The correct answer is Enframing
Team AQUA
1. What is cybersecurity's first primary function in protecting computer systems, networks, and
data?
- a. Identifying
- b. Protecting
- c. Detecting
- d. Responding
2. According to Martin Heidegger, how does cybersecurity influence our understanding of the
digital world?
- a. It hides vulnerabilities
- b. It challenges the human essence
- c. It reveals truth
- d. It develops beyond comprehension
4. What does Heidegger's claim about technology developing beyond comprehension relate to
in the context of cybersecurity?
- a. Complexity of cyber systems
- b. Autonomous evolution of cyber threats
- c. Unintended consequences
- d. Loss of control in critical infrastructure
5. Which opportunity is mentioned in the article as a way cybersecurity enhances security for
individuals and organizations?
- a. Enhancing network speed
- b. Global collaboration
- c. Advancements in AI for threat detection
- d. Protecting against unauthorized access
Team Red Velvet
TRUE OR FALSE
a. book that can execute intricate operations that only humans can do before.
b. phone that can execute intricate operations that only humans can do before.
c. computer programs that can execute intricate operations that only humans can do before.
d. computer programs that can execute intricate operations that only humans can't do before.
a. Artificial Intelligence.
b. Archaeological International.
c. Artificials Intelligence.
d. None of the above.
3.How does Heidegger's claim that technology as the ultimate danger to our existence relate to
challenges posed by AI technology? Answer: B.
5.Which of the following industries was not mentioned to profit from AI? Answer: D
a. Gaming
b. Robotics
c. Marketing
d. None of the above
Team M & Ms
4IR: Biotechnology
True or False
1. Károly Ereki proposed the term "biotechnology" in 1919 by combining the words biology and
technology.
2. The word biology is derived from a Greek work wherein "bio" means life, and "logy" means
science.
3. The 1992 United Nations Convention on Biological Diversity defines biotechnology as any
technological application using biological systems to make or modify products for specific uses.
5. Despite the challenges such as ethical concerns and ecological risks, biotechnology has not
significantly contributed to advancements in the healthcare industry.
Answer
1. T
2. F
3. T
4. T
5. F
Team Wanna One
1. Robotics is the creation of intelligent machines that assists people in many ways. True
3. Robots perform tasks just as well as humans; maybe even better. True
4. Robots cannot work continuously, they need to rest to be able to work efficiently. False
5. In some industries, robotics are only utilized for a narrow set of tasks, rather than having
diverse applications. False