0% found this document useful (0 votes)
14 views11 pages

96375d97-8c7c-4c38-8812-d034ab8ff366

The document contains a series of questions and answers related to Artificial Intelligence, Digital Forensics, and Embedded Systems. It covers fundamental concepts, key figures, applications, and techniques in these fields. Additionally, it addresses ethical norms for investigators and various communication models in IoT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views11 pages

96375d97-8c7c-4c38-8812-d034ab8ff366

The document contains a series of questions and answers related to Artificial Intelligence, Digital Forensics, and Embedded Systems. It covers fundamental concepts, key figures, applications, and techniques in these fields. Additionally, it addresses ethical norms for investigators and various communication models in IoT.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

1) Artificial Intelligence is about_____.

a. playing a game on Computer

b. =Making a machine Intelligent

c. Programming on Machine with your Own Intelligence

d. Putting your intelligence in Machine

2. 2) Who is known as the -Father of AI"?

a. Fisher Ada

b. Alan Turing

c. =John McCarthy

d. Allen Newell

3.) The application/applications of Artificial Intelligence is/are

a. Expert Systems

b. Gaming

c. Vision Systems

d. =All of the above

4. An AI agent perceives and acts upon the environment using___.

a. Sensors

b. Perceiver

c. Actuators

d. =Both a and c

5. Which AI technique enables the computers to understand the associations and


relationships between objects and events?

a. Heuristic Processing

b. Cognitive Science

c. Relative Symbolism

d. =Pattern Matching

6) Ways to achieve AI in real-life are_________.

a. Machine Learning
b. Deep Learning

c. =Both a & b

d. None of the above

7. Strong Artificial Intelligence is

A.= the embodiment of human intellectual capabilities within a computer


B. a set of computer programs that produce output that would be considered
to reflect intelligence if it were generated by humans
C. the study of mental faculties through the use of mental models implemented on a computer
D. all of the mentioned

8. A.M. turing developed a technique for determining whether a computer could or could not
demonstrate the artificial Intelligence, Presently, this technique is called

A. =Turing Test
B. Algorithm
C. Boolean Algebra
D. Logarithm

9 What are the advantages of neural networks over conventional computers?

(F) They have the ability to learn by example

(ii) They are more fault tolerant

(iii)They are more suited for real time operation due to their high `computational’ rates

A. (i) and (ii) are true


B. (I) and (iii) are true
C. Only (i)
D. All of the mentioned

ANSWER: D

10.Natural language processing can be divided into the two subfields of:

A Context and expectations


B Generation and understanding
C Semantics of pragmatics
D Recognition and synthesis

Ans B

11. The characteristics of the computer system capable of thinking, reasoning and learning is
known is

A Machine intelligence
B Human intelligence
C Artificial intelligence
D Virtual intelligence

Ans C

12. The area of AI that investigates methods of facilitating communication between people and
computers is:

A Natural language processing


B Symbolic processing
C Decision support
D Robotics

Ans A

13What is the term used for describing the judgmental or commonsense part of problem solving?

A Heuristic
B Critical
C Value based
D Analytical

Ans A

14. Weak AI is

A The embodiment of human intellectual capabilities within a computer.


B A set of computer programs that produce output that would be considered to reflect intelligence
if it were generated by humans.
C The study of mental faculties through the use of mental models implemented on a computer.
D All of the above

Ans C

15 A robot’s “arm” is also known as its

A End effector
B Actuator
C Manipulator
D Servomechanism

Ans C

16. The face recognition system is based on?

A Strong artificial intelligence approach


B Weak artificial intelligence approach
C Cognitive artificial intelligence approach
D Applied artificial intelligence approach

Ans D

Es.
17. ) Which design considers both the hardware and software during the embedded design?

a. Memory Design

b. =Software/ hardware codesign

c. Platform-based design

d. Peripheral design

18. Which is the first microcontroller?


a) 8051
b) Arm
c) =TMS1000
d) Intel 4004

19. 21. Which of the following has a Harvard architecture?

a) EDSAC

b) SSEM

c) PIC

d) CSIRA

r Answer: c

 20. 1.
What is Digital Forensic?

o A. Process of using scientific knowledge in analysis and presentation of evidence in court


o B.= The application of computer science and investigative procedures for a legal purpose
involving the analysis of digital evidence after proper search authority, chain of custody,
validation with mathematics, use of validated tools, repeatability, reporting, and possible
expert presentation
o C.A process where we develop and test hypotheses that answer questions about digital
events
o D. Use of science or technology in the investigation and establishment of the facts or evidence
in a court of law

 21. Does database forensic include in Digital Forensic application


o A. True
o B. False
 22.
Which of the following hold the highest value of evidence in the court?
o A. Documentary
o B. Demonstrative
o C. Testimonial
o D. =Real

23. The following specializations exist in digital investigations:

a. First responder (a.k.a. digital crime scene technician)

b. Forensic examiner

c. Digital investigator

d.= All of the above

24. 1. Digital forensics is all of them except:


A. Extraction of computer data.
B. Preservation of computer data.
C. Interpretation of computer data.
D. Manipulation of computer data.
Ans:D

25. IDIP stands for


A. Integrated Digital Investigation Process.
B. Integrated Data Investigator Process.
C. Integrated Digital Investigator Process.
D. Independent Digital Investigator Process.
Ans: A

26. . The investigator should satisfy the following points:


A. Contribute to society and human beings.
B. Avoid harm to others.
C. Honest and trustworthy.
D. All of the above
Ans: D

27. What is the most significant legal issue in computer forensics?


A. Preserving Evidence
B. Seizing Evidence
C. Admissibility of Evidence
D. Discovery of Evidence
Ans: C

28. . ____________is known as father of computer forensic.


A. G. Palmar
B. J. Korn
C. Michael Anderson
D. S.Ciardhuain.
Ans: C

29. Who proposed End to End Digital Investigation Process


(EEDIP)?
A. G. Palmar
B. Stephenson
C. Michael Anderson
D. S.Ciardhuain
Ans: B

30. Which of the following is not a property of computer evidence?


A. Authentic and Accurate.
B. Complete and Convincing.
C. Duplicated and Preserved.
D. Conform and Human Readable.

31. Which of the following are general Ethical norms for


Investigator?
A. To contribute to society and human beings.
B. To avoid harm to others.
C. To be honest and trustworthy.
D. All of the above
E. None of the above
Ans: D

32. Which of the following is not a general ethical norm for


Investigator?
A. To contribute to society and human beings.
B. Uphold any relevant Evidence.
C. To be honest and trustworthy.
D. To honor confidentially.
Ans: B

33. Embedded system is______


A. An electronic system
B. A pure mechanical system
C. An electro-mechanical system
D. (A) or (C)
Ans: D

34. Which of the following is not an example of a “small-scale


embedded system”?
A. Electronic Barbie doll
B. Simple calculator
C. Cell phone
D. Electronic toy car
Ans: C
35. Which of the following is an (are) an intended purpose(s) of
embedded systems?
A. Data collection
B. Data processing
C. Data communication
D. All of these
E. None of these
Ans: D

36. Which architecture involves both the volatile and non-volatile


memory?
A. Harvard architecture
B. Von Neumann architecture
C. None of the mentioned
D. All of the mentioned
Ans: A

37. ARM stands for _________


A. Advanced RISC Machine
B. Advanced RISC Methodology
C. Advanced Reduced Machine
D. Advanced Reduced Methodology
Ans: A

38. _____________ is the smallest microcontrollers which can be


programmed to perform a
large range of tasks.
A. PIC microcontrollers
B. ARM microcontrollers
C. AVR microcontrollers
D. ASIC microcontrollers
Ans: - A

39. _______________ was developed in the year 1996 by ATMEL


Corporation
A. PIC
B. AVR
C. ARM
D. ASIC
Ans: - B

40. AVR stands for_____________________.


A. Advanced Virtual RISC.
B. Alf-Egil Bogen and Vegard Wollan RISC
C. Both A & B
D. None of the above
Ans: - C
41. Name of the IoT device which is first recognized?
A. Smart Watch
B. ATM
C. Radio
D. Video Game
Ans: B

42 IOT devices which have unique identities and can perform


________________________.
A. Remote sensing
B. Actuating
C. Monitoring capabilities
D. All of the above
Ans: - D

43. IoT devices are various types, for instance______________.


A. Wearable sensors.
B. Smartwatches.
C. LED lights.
D. All of the above
Ans: - D

44. ___ is a collection of standards for LR-WPANs.


A. IEEE 802.3
B. IEEE 802.11
C. IEEE 802.16
D. IEEE 802.15.4
Ans:D

45. ____________ layer protocols determine how the data is physically


sent over the network’s
physical layer or medium.
A. Application layer
B. Transport layer
C. Network layer
D. Link-layer
Ans: - D

46. 6LOWPAN stands for


A. 6 LOW Personal Area Network
B. IPv6 LOW Personal Area Network
C. IPv6 over Low power wireless personal area network
D. None of the above
Ans:C

47. MQTT is:


A. Based on client-server architecture
B. Based on publish-subscribe architecture
C. Based on both of the above
D. Based on none of the above
Ans: B

48. _____ is a data-centric middleware standard for device-to-device


and machine-to-machine
communication.
A. Data Distribution Service (DDS)
B. Advanced Message Queuing Protocol (AMQP)
C. Extensible Messaging and Presence Protocol (XMPP)
D. Message Queue Telemetry Transport (MQTT)
Ans: A

_49___ is a bi-directional, fully duplex communication model that


uses a persistent connection between client and server.
A. Request-Response
B. Publish-Subscriber
C. Push-Pull
D. Exclusive Pair
Ans:D

50 Which is not an IoT communication model.


A. Request-Response
B. Publish-Subscribe
C. Push-Producer
D. Exclusive Pair
Ans: C

51. _________ is the most refined and restrictive service model.


A. IaaS
B. CaaS
C. PaaS
D. All of the mentioned
Ans.C

52. _____ is suitable for IoT applications to have low latency or high
throughput requirements.
A. REST
B. Publish-Subscriber
C. Push-Pull
D. WebSocket
Ans:D

53. ___ is one of the most popular wireless technologies used by


WSNs.
A. Zigbee
B. AllSean
C. Tyrell
D. Z-Wave
Ans:A
54. Zigbee specification are based on ______.
A. 802.3
B. 802.11
C. 802.16
D. 802.15.4
Ans:D

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy