Digital Fluency Q&A
Digital Fluency Q&A
Digital Fluency Q&A
Digital Fluency
SECTION A – 1 MARK
3. Expand DL.
Ans: Deep Learning.
6. Mention any 2 technology trends that will transform Healthcare in the future in AI.
Ans:
AI and Machine Learning Offer Better way to Spot Diseases
Wearable Tech has more to offer than just counting steps.
AI- Enabled Genomic can determine personalized treatments.
3D Printing helps doctor’s replicate patient-specific organs.
BACB TKN
2
BACB TKN
3
BACB TKN
4
BACB TKN
5
BACB TKN
6
48. What is Thorough Risk Assessment and Threat Modeling in Cyber Security?
Ans:
Risk Assessment: cybersecurity risk assessment identifies the various information assets that could be
affected by a cyber-attack and then identifies the various risks that could affect those assets.
Threat modeling: is a structured process with these objectives: identify security requirements, pinpoint
security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize
remediation methods.
BACB TKN
7
BACB TKN
8
BACB TKN
9
83. Which are the 10 companies that are using big data?
Ans:
1. Amazon
2. Apple ·
3. Google
4. Spotify
5. Facebook
6. Instagram
7. Starbucks
8. Netflix.
9. American Express.
10. McDonald’s
BACB TKN
10
85. How does big data help in decision making for the organization?
Ans: One benefit big data and business analytics can help improve decision making is by identifying
patterns. Identifying problems and providing data to back up the solution is beneficial as you can track
whether the solution is solving the problem, improving the situation or has an insignificant effect.
BACB TKN
11
BACB TKN
12
SECTION B – 2 MARKS
1. What is Artificial Intelligence?
Ans: Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are
programmed to think like humans and mimic their actions.
BACB TKN
13
BACB TKN
14
BACB TKN
15
27. How Facebook Uses Data Analytics To Understand Your Posts And Recognize Your Face?
Ans: How Facebook uses data analytics to understand your posts and recognize your face?
Facebook uses a DL application called DeepFace to teach it to recognize people in photos.
BACB TKN
16
37. What are the operations that we can do using cloud computing?
Ans: Here are the following operations that we can do using cloud computing:
Developing new applications and services.
Storage, back up, and recovery of data.
Hosting blogs and websites.
Delivery of software on demand.
Analysis of data.
Streaming videos and audios.
BACB TKN
17
45. Differentiate between public cloud, private cloud, hybrid cloud, and community cloud
Ans:
BACB TKN
18
BACB TKN
19
BACB TKN
20
Protect your home and/or business using a secure Internet connection and Wi-Fi network, and
change passwords regularly.
Don’t share PINs or passwords. Use devices that use biometric scans when possible (e.g.
fingerprint scanner or facial recognition).
Check your account statements and credit reports regularly.
Use antivirus and anti-malware solutions, and firewalls to block threats.
Back up your files regularly in an encrypted file or encrypted file storage device.
Do not click on links in texts or emails from people you don’t know. Scammers can create fake
links to websites.
Remember that the government will not call, text or contact you via social media about owing
money.
64. What are the differences among the terms cyber-attack, cyber threat & cyber risk?
Ans: A cyber threat is a probability that a specific type of attack may occur. Cyber risk is an area where if
exploited, it could be leveraged by a cyber-attack. Cyber risk is like any risk and measures the likelihood
and impact of a security breach.
67. What is a Unified Threat Management (UTM) system and how does it work?
Ans: Unified threat management (UTM) describes an information security (infosec) system that provides a
single point of protection against threats, including viruses, worms, spyware and other malware, and
network attacks.
76. How Data Science differs from Big Data and Data Analytics?
Ans: Big data refers to any large and complex collection of data. Data analytics is the process of extracting
meaningful information from data. Whereas Data science is a multidisciplinary field that aims to produce
broader insights.
77. How You Can Leverage the Power of Data to Grow Sales?
Ans: It’s not enough to have the data you need to increase sales. You also need to know how to use and
analyze it. Modern sales teams use prospect or customer data collected from various sources such as their
CRM, website, apps, social media, email marketing database, and call logs to power their campaigns.
79. How Big Data is changing the Way People Live Their Lives?
Ans: There is no doubt that big data is changing how people live their lives in ways that they could never
have imagined.
82. What are the new IoT ideas in the field of home automation?
Ans:
Lighting control.
HVAC.
Lawn/Gardening management.
Smart Home Appliances.
Improved Home safety and security.
Home air quality and water quality monitoring.
Natural Language-based voice assistants.
Better Infotainment delivery.
88. What type of security parameters does the Cloud have in place?
Ans: Cloud Security Maturity Model is a bunch of rules, not all of which will work for each association.
Associations should involve the model as a beginning stage and a way to settle on choices regarding how
much interest in every classification checks out for their current circumstance.
BACB TKN
23
BACB TKN
24
SECTION-C(MCQ’s)
2. Select the most appropriate situation for that a blind search can be used.
a) Real-life situation
b) Small Search Space
c) Complex game
d) All of the above
BACB TKN
25
12. The categories in which Machine learning approaches can be traditionally categorized are ______
A. Supervised learning
B. Unsupervised learning
C. Reinforcement learning
D. All of the above
BACB TKN
26
16. Apple’s, Siri, Amazon’s, Alexa, Microsoft Cortana and Google Assistant’s are_____
A. Digital Assistant’s
B. Neural Networks
C. Data Base Systems
D. Machine Learning Tools
21. The examination of large amounts of data to see what patterns or other useful
Information can be found is known as
(a) Data examination
(b) Information analysis
(c) Big data analytics
(d) Data analysis
22. Concerning the Forms of Big Data, which one of these is odd?
(a) Structured
(b) Unstructured
(c) Processed
(d) Semi-Structured
BACB TKN
27
24. The technology solution used to optimize and manage the storage and retrieval of data from
databases is called
A. Database management system
B. Datastore management system
C. Big data analytics
D. IOT
25. Which of the following is the way in which an IoT device is associated with data?
a) Internet
b) Cloud
c) Automata
d) Network
28. What type of computing technology refers to services and applications that typically run on a
distributed network through virtualized resources?
a) Distributed Computing
b) Cloud Computing
c) Soft Computing
d) Parallel Computing
29. Which one of the following options can be considered as the Cloud?
a) Hadoop
b) Intranet
c) Web Applications
d) All of the above
BACB TKN
28
38. Which one of the following can be considered as the class of computer threats?
a) Dos Attack
b) Phishing
c) Soliciting
d) both a and c
40. --------- is a type of software designed to help the user to detect the viruses and avoid them.
a) Malware
b) Spyware
c) Antivirus
d) Both b and c
BACB TKN
29
41. It can be a software program or a hardware device that filters all data packets coming through
the internet or a network etc., it is known as the
a) Antivirus
b) Firewall
c) Cookies
d) Malware
42. Hackers usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's Id and Passwords
c) To corrupt the user's data stored in the computer system
d) All of the above
BACB TKN