Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Digital Fluency Q&A

Download as pdf or txt
Download as pdf or txt
You are on page 1of 29

1

Digital Fluency
SECTION A – 1 MARK

1. What is AI (Artificial Intelligence)?


Ans: AI is intelligence demonstrated by machines, as opposed to the natural intelligence displayed by
humans or animals.

2. Mention any 2 examples of AI.


Ans:
 Self-Driving And Parking Vehicles. Self-driving and parking cars use deep learning, a subset of
AI, torecognize the space around a vehicle.
 Digital Assistants.
 Vehicle Recognition Identification.
 Robots.
 Transportation.

3. Expand DL.
Ans: Deep Learning.

4. What is Augmented Reality (AU)?


Ans: Augmented reality (AR) is an experience where designers enhance parts of users' physical world
with computer-generated input.

5. What is Virtual Reality (VR)?


Ans: Virtual reality is a form of interaction between humans and computers in which a real or
imaginaryenvironment is simulated.

6. Mention any 2 technology trends that will transform Healthcare in the future in AI.
Ans:
AI and Machine Learning Offer Better way to Spot Diseases
Wearable Tech has more to offer than just counting steps.
AI- Enabled Genomic can determine personalized treatments.
3D Printing helps doctor’s replicate patient-specific organs.

7. What is Narrow AI?


Ans: Artificial narrow intelligence (ANI or narrow AI) refers to a computer’s ability to perform a single
task extremely well, such as crawling a webpage or playing chess.

8. What is Machine Learning?


Ans: Machine learning is the concept that a computer program can learn and adapt to new data without
human intervention.

BACB TKN
2

9. What is Deep Learning?


Ans: Deep Learning is a subfield of machine learning concerned with algorithms inspired by the structure
and function of the brain called artificial neural networks.

10. What are Neural Networks?


Ans: A neural network is a series of algorithms that endeavors to recognize underlying relationships in a
set of data through a process that mimics the way the human brain operates.

11. Mention Machine Learning methods?


Ans:
1. Supervised learning,
2. Unsupervised learning
3. Reinforcement learning

12. What is Supervised Learning?


Ans: Supervised Learning is defined by its use of labeled datasets to train algorithms that to classify data
or predict outcomes accurately.

13. What is Unsupervised Learning?


Ans: Unsupervised learning is a type of machine learning in which models are trained using
unlabeleddataset and are allowed to act on that data without any supervision.

14. What is Semi-supervised Learning?


Ans: Semi-supervised learning is a learning problem that involves a small number of labeled examples
and a large number of unlabeled examples.

15. What is Reinforcement Learning?


Ans: Reinforcement learning is the training of machine learning models to make a sequence of decisions.

17. How powerful is AI?


Ans: The power of AI depends on the capability of the researcher working on the computation of
theprogram. As of now, AI is quite powerful to solve a set of tasks that is assigned to it efficiently
and effectively. However, it hasn’t reached its peak yet, and we are a few years away from that
point.

18. What is word embedding?


Ans: Word Embeddings are a method of extracting features out of text so that we can input those features
into a machine learning model to work with text data.

19. What is Data?


Ans: data is information processed or stored by a computer. This information may be in the form of text
documents, images, audio clips, software programs, or other types of data.

20. What is Database?


Ans: database is an organized collection of structured information, or data, typically stored electronically
in a computer system.

BACB TKN
3

21. What is IoT?


Ans: IoT is an umbrella term that refers to the billions of physical objects or “things” connected to the
Internet, all collecting and exchanging data with other devices and systems over the Internet.

22. Mention any 2 examples of IoT?


Ans:
 Connected appliances
 Smart home security systems
 Autonomous farming equipment
 Wearable health monitors
 Wireless inventory trackers
 Ultra-high speed wireless internet
 Biometric cybersecurity scanners
 Shipping container and logistics tracking
 Smart factory equipment

23. What is IoT Security?


Ans: IoT security is the practice that keeps your IoT systems safe. IoT security tools protect from threats
and breaches, identify and monitor risks and can help fix vulnerabilities.

24. Mention 2 examples of IIoT.


Ans:
 MAN
 Siemens
 Airbus
 ABB
 Fanuc
 Magna Steyr
 John Deere
 Tesla
 Caterpillar (CAT)

25. Mention benefits of IIoT


Ans: Benefits of IIoT
 Increase productivity and uptime.
 Improve process efficiencies.
 Accelerate innovation.
 Reduce asset downtime.
 Enhance operational efficiency.
 Create end-to-end operational visibility.
 Improve product quality.
 Reduce operating costs.

BACB TKN
4

26. What are the main parts of IoT systems?


Ans: There are four main IOT components, which tells us how IoT works.
 Sensors/Devices.
 Connectivity.
 Data Processing.
 User Interface.

27. Are IoT and digitization the same?


Ans: IoT technology starts with connectivity, but it's digitization where things get interesting.

28. Can Alexa be part of IoT?


Ans: Yes

29. What are examples of smart devices?


Ans: Types of smart devices are smartphones, smart cars, smart thermostats, smart doorbells, smart
locks, smart refrigerators, phablets and tablets, smartwatches, smart bands, smart key chains, smart
glasses, and many others.

30. Why should we learn about IoT?


Ans: It is easy to explore the new technology and applications. It's better decision making solution and
communication made creators more confident to represent themselves. IoT is best opportunity for career
oriented creators as they can learn, build and understand system on its own.

31. What is the role of artificial intelligence in IoT?


Ans: AI enabled IoT creates intelligent machines that simulate smart behavior and supports in decision
making with little or no human interference.

32. What devices are part of IoT?


Ans: The IoT devices include wireless sensors, software, actuators, computer devices and more.

33. What is IoT programming?


Ans: Programming for IoT is usually a polyglot (multiple languages) effort since the Internet-of-Things (
IoT ) is a system of inter-related computing devices that are provided with unique identifiers and the
ability to transfer data over a network.

34. Which language is better for IoT?


Ans: C, C++, JAVA, swift, python

35. Is Python good for IoT?


Ans: Python is a great choice for the backend side of development as well as the software development of
devices.

36. What is Cloud Computing?


Ans: Cloud computing is the delivery of computing services—including servers, storage, databases,
networking, software, analytics.

BACB TKN
5

37. Why do we need Cloud


Computing? Ans:
 It enables us to run software programs without installing them on our computers.
 It enables us to store and access our multimedia content via the internet.
 It enables us to develop and test programs without necessarily having servers and so on.

38. Mention Cloud service


models. Ans:
 Software as a Service (SaaS)
 Platform as a Service (PaaS)
 Infrastructure as a Service (IaaS).

39. Expand IaaS


Ans: Infrastructure as a Service.

40. Expand PaaS


Ans: Platform as a Service.

41. Expand SaaS


Ans: Software as a Service.

42. Mention the Types of Cloud


Ans: Storage, Database, Information, Process, Application, Integration, Security, Management and
Testing-as-a-service.

43. How does Cloud storage work?


Ans: Cloud storage uses data centers with massive computer servers that physically store the data and
make it available online to users via web

44. Is the cloud safe for personal information?


Ans: Yes, personal information of our data is relatively safe in the cloud

45. What is Cyber security?


Ans: Cyber security is the practice of defending computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks.

46. What are 5 types of Cyber Security?


Ans:
 Critical infrastructure security.
 Application security.
 Network security.
 Cloud security.
 Internet of Things (IoT) security.

47. What is End-to-End Scope in Cyber Security?


Ans: End-to-End Scope in Cyber Security is a secure communication process that prevents third parties
from accessing data transferred from one endpoint to another.

BACB TKN
6

48. What is Thorough Risk Assessment and Threat Modeling in Cyber Security?
Ans:
Risk Assessment: cybersecurity risk assessment identifies the various information assets that could be
affected by a cyber-attack and then identifies the various risks that could affect those assets.
Threat modeling: is a structured process with these objectives: identify security requirements, pinpoint
security threats and potential vulnerabilities, quantify threat and vulnerability criticality, and prioritize
remediation methods.

49. What is Proactive Incident Response Planning in Cyber Security?


Ans: A Cybersecurity Incident Response Plan is a document that gives IT and cybersecurity
professionals instructions on how to respond to a serious security incident, such as a data breach, data
leak, ransomware attack, or loss of sensitive information.

50. What is Dedicated Cyber security


Resources? Ans:
 AFCEA.
 CIO From IDG.
 CNET Security.
 Computer World Emerging Technology.

51. What is SEG in Cyber security?


Ans: Secure Email Gateway (SEG) is a solution that improves the protection of incoming and outgoing
emails. It's a product widely used by businesses and governments to block cyber threats, such as spam,
phishing, BEC (Business Email Compromise), trojan, ransomware, and other types of malware.

52. What is EPP in Cyber security?


Ans: An endpoint protection platform (EPP) is an integrated suite of endpoint protection technologies—
such as antivirus, data encryption, intrusion prevention, and data loss prevention—that detects and stops a
variety of threats at the endpoint.

53. What is NGFW in Cyber security?


Ans: A next generation firewall (NGFW) is, as Gartner defines it, a “deep-packet inspection firewall that
moves beyond port/protocol inspection and blocking to add application-level inspection, intrusion
prevention, and bringing intelligence from outside the firewall.”

54. What is DLP in Cyber Security?


Ans: Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not
lost, misused, or accessed by unauthorized users.

55. What is SIEM in Cyber Security?


Ans: SIEM stands for security information and event management and provides organizations with next-
generation detection, analytics and response.

56. What is SWG in Cyber Security?


Ans: A secure web gateway (SWG) protects users from web-based threats in addition to applying and
enforcing corporate acceptable use policies.

BACB TKN
7

57. What is UTM in Cyber Security?


Ans: Unified threat management (UTM) refers to when multiple security features or services are
combined into a single device within your network.

58. What is Threats to Cyber Security?


Ans: A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general. Cyber threats include computer viruses, data breaches, Denial of Service (DoS)
attacks, and other attack vectors.

59. What is Blockchain Technology?


Ans: Blockchain defined: Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network.

60. What is Malware?


Ans: Malware (short for “malicious software”) is a file or code, typically delivered over a network, that
infects, explores, steals or conducts virtually any behavior an attacker wants.

61. What are Viruses?


Ans: A computer virus is a type of malicious software, or malware that spreads between computers and
causes damage to data and software

62. What is Trojan?


Ans: Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that
is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus
programs.

63. What are Worms?


Ans: A computer worm is a type of malware whose primary function is to self-replicate and infect other
computers while remaining active on infected systems. A computer worm duplicates itself to spread to
uninfected computers.

64. What are Ransomware?


Ans: Ransomware is a type of malware that employs encryption to hold a victim's information at ransom.
A user or organization's critical data is encrypted so that they cannot access files, databases, or
applications. A ransom is then demanded to provide access.

65. What is Spyware?


Ans: Spyware is any software that installs itself on your computer and starts covertly monitoring your
online behavior without your knowledge or permission. Spyware is a kind of malware that secretly
gathers information about a person or organization and relays this data to other parties.

66. What are different types of phishing attacks


Ans:
 Phishing: Mass-market emails.
 Spear phishing: Going after specific targets.
 Whaling: Going after the big one.
 Business email compromise (BEC): Pretending to be the CEO.
 Clone phishing: When copies are just as effective.
 Vishing: Phishing over the phone.

BACB TKN
8

67. What is Spear phishing?


Ans: Spear phishing is a type of phishing campaign that targets a specific person or group and often will
include information known to be of interest to the target, such as current events or financial documents.

68. What is Whaling?


Ans: Whaling is a common cyber attack that occurs when an attacker utilizes spear phishing methods to
go after a large, high-profile target, such as the c-suite.

69. What is Pharming?


Ans: Pharming is like phishing in that it is a threat that tricks users into divulging private information, but
instead of relying on email as the attack vector, pharming uses malicious code executed on the victim's
device to redirect to an attacker-controlled website.

70. What is Zero-day Exploit?


Ans: A zero-day (0day) exploit is a cyber attack targeting a software vulnerability which is unknown to
the software vendor or to antivirus vendors. The attacker spots the software vulnerability before any
parties interested in mitigating it, quickly creates an exploit, and uses it for an attack.

71. What is Password Attack?


Ans: A password attack refers to any of the various methods used to maliciously authenticate into
password-protected accounts. These attacks are typically facilitated through the use of software that
expedites cracking or guessing passwords.

72. What is Cross-site Scripting?


Ans: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected
into otherwise benign and trusted websites.

73. What are Rootkits?


Ans: A rootkit is software used by cybercriminals to gain control over a target computer or network.

74. What is cyber hygiene?


Ans: Cyber hygiene is a set of habitual practices for ensuring the safe handling of critical data and for
securing networks.

75. What is the relation between cybersecurity and cryptography?


Ans: Cryptography is used to keep sensitive material, such as private passwords, secure
online. Cybersecurity experts use cryptography to design algorithms, ciphers, and other security measures
that codify and protect company and customer data.

76. What is a Digital twin?


Ans: A digital twin is a virtual representation of an object or system that spans its lifecycle, is updated
from real-time data, and uses simulation, machine learning and reasoning to help decision-making.

77. What is Generative design?


Ans: Generative design is a technology in which 3D models are created and optimized by computer
software.

BACB TKN
9

78. What are the applications of artificial


intelligence? Ans:
 Personalized Shopping.
 AI-powered Assistants.
 Fraud Prevention.
 Administrative Tasks Automated to Aid Educators.
 Creating Smart Content.
 Voice Assistants.
 Personalized Learning.
 Autonomous Vehicles.

79. What examples of AI do we use in daily


life? Ans:
 Self-Driving And Parking Vehicles. Self-driving and parking cars use deep learning, a subset of
AI, to recognize the space around a vehicle.
 Digital Assistants.
 Vehicle Recognition Identification.
 Robots.
 Transportation.

80. How is artificial intelligence used in education?


Ans: Artificial intelligence can help students learn better and faster when paired with high-quality
learning materials and instruction. AI systems can also help students get back on track faster by alerting
teachers to problems the naked eye cannot see.

81. What is Big Data Analytics?


Ans: Big data analytics is the use of advanced analytic techniques against very large, diverse data sets that
include structured, semi-structured and unstructured data, from different sources, and in different sizes
from terabytes to zettabytes.

82. What is public health analytics?


Ans: Public Health Analytics supports BCCDC program areas across all components of the surveillance
cycle, from data acquisition and data management, to data analysis and dissemination.

83. Which are the 10 companies that are using big data?
Ans:
1. Amazon
2. Apple ·
3. Google
4. Spotify
5. Facebook
6. Instagram
7. Starbucks
8. Netflix.
9. American Express.
10. McDonald’s

BACB TKN
10

84. Mention Big Data Analytics Tools


Ans: List of Big Data Analytics Tools
 Tableau Public.
 OpenRefine.
 KNIME.
 RapidMiner.
 Google Fusion Tables.
 NodeXL.
 Wolfram Alpha.
 Google Search Operators.

85. How does big data help in decision making for the organization?
Ans: One benefit big data and business analytics can help improve decision making is by identifying
patterns. Identifying problems and providing data to back up the solution is beneficial as you can track
whether the solution is solving the problem, improving the situation or has an insignificant effect.

86. What is “big data for small business”?


Ans: Big data analytics is the process of examining large and varied data sets or big data to divulge
valuable information that can help small businesses make informed decisions

87. What are Big Data Tools and Software?


Ans:
 Apache Storm. Apache Storm is a real-time distributed tool for processing data streams.
 MongoDB. This is an open-source NoSQL database that is an advanced alternative to modern
databases.
 Cassandra.
 Cloudera.
 OpenRefine.

88. Write use of IoT by Kia Motors.


Ans: Use of IoT by KIA motors in navigation, safety and security, vehicle management, remote control
and convenience

89. What are 10 real world examples of


IoT? Ans:
1. IoT Sensors.
2. IoT Data Analytics.
3. IoT Connected Factory.
4. Smart Supply Chain Management.
5. Smart Barcode Readers.
6. Smart Grids.
7. Connected HealthCare System.
8. Smart Farming.

BACB TKN
11

90. List out Some popular companies are working on IoT


Ans: Top Internet-of-Things (IoT) Companies
 Cooler Screens.
 Farmer's Fridge.
 Simplisafe.
 Inspire.
 Enovo.
 Tive.
 Xage Security.
 Samsara.

91. Which are the different IoT softwares?


Ans: The different IoT softwares
 Google Cloud IoT.
 Cisco IoT Cloud Connect.
 Salesforce IoT Cloud.
 IRI Voracity.
 Particle.
 IBM Watson IoT.
 ThingWorx.
 Amazon AWS IoT Core.

92. List hardware prototypes used in IoT


Ans: IoT Hardware Prototype includes a wide range of devices such as devices for routing, bridges,
sensors etc.

93. Is laptop an IoT device?


Ans: No

94. Is the Cloud Safe for personal information?


Ans: Relatively safe.

95. What is Cosmos Bank Cyber Attack in Pune?


Ans: Cosmos Bank Cyber Attack in Pune it’s a several cloned debit cards of Cosmos Bank were used for
thousands of ATM transactions from India and 28 other countries in a period of seven hours on August
11, 2018.

96. What is information security?


Ans: Information security is a set of practices designed to keep personal data secure from unauthorized
access and alteration during storing or transmitting from one place to another.

BACB TKN
12

SECTION B – 2 MARKS
1. What is Artificial Intelligence?
Ans: Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are
programmed to think like humans and mimic their actions.

2. How powerful is AI?


Ans: AI can outperform humans at routine tasks—provided the task is in one domain with a lot of data—it
is technically capable of displacing hundreds of millions of white and blue collar jobs in the next 15 years
or so.

3. Will AI steal our jobs?


Ans: According to the World Economic Forum's "The Future of Jobs Report 2020", AI is expected to
replace 85 million jobs worldwide by 2025.

4. Can AI take over the world?


Ans: Robots May Carry out All Human Works by 2050, Says Experts · Artificial General Intelligence
(AGI) is capable of Will AI Take over the World? Robots May Carry out All Human Works by 2050, Says
Experts.

5. What are the advantages of AI?


Ans: Advantages of AI
 AI drives down the time taken to perform a task.
 AI enables the execution of hitherto complex tasks without significant cost outlays.
 AI operates 24x7 without interruption or breaks and has no downtime.
 AI augments the capabilities of differently abled individuals.

6. What are the disadvantages of AI?


Ans: Disadvantages of AI
 High Costs. The ability to create a machine that can simulate human intelligence is no small feat. ...
 No creativity. A big disadvantage of AI is that it cannot learn to think outside the box. ...
 Increase in Unemployment. ...
 Make Humans Lazy. ...
 No Ethics.

7. What are the applications of AI?


Ans:
 Personalized Shopping.
 AI-powered Assistants.
 Fraud Prevention.
 Administrative Tasks Automated to Aid Educators.
 Creating Smart Content.
 Voice Assistants.
 Personalized Learning.
 Autonomous Vehicles.

BACB TKN
13

8. Do you need to be a genius to start learning AI?


Ans: “No, you don’t!”
Artificial Intelligence is a fabulous field containing a lot of spectacular sub-fields.

9. How will artificial intelligence affect healthcare?


Ans: AI technology can help healthcare professionals diagnose patients by analyzing symptoms, suggesting
personalized treatments, and predicting risk. It can also detect abnormal results.

10. Which is the best application of AI in the healthcare sector?


Ans: Managing Medical Records and Other Data. Since the first step in health care is compiling and
analyzing information, data management is the most widely used application of artificial intelligence and
digital automation.

11. Will AI in healthcare make doctors redundant?


Ans: AI innovations in healthcare don't substitute human doctors. They just enhance what they already can
do by taking on certain tasks. By some estimates, technology is about to replace 80% of what doctors
currently do.

12. What do you understand by the term robotics?


Ans: Robotics is the intersection of science, engineering and technology that produces machines,
called robots, that substitute for (or replicate) human actions.

13. What are various types of sensors used in the robotics?


Ans:
Types of Robot Sensors:
1) Light Sensor. Light sensor is a transducer used for detecting light and creates a voltage difference
equivalent to the light intensity fall on a light sensor.
2) Proximity Sensor.
3) Sound Sensor.
4) Temperature Sensor.
5) Acceleration Sensor.

14. What can a digital assistant do?


Ans: A digital assistant is an advanced computer program, also known as a virtual digital assistant, a
mobile assistant, and a predictive chatbot.

15. Is a chatbot a digital assistant?


Ans: Chatbot is essentially an AI-powered assistant built to boost the business efficiency of any enterprise
with cutting-edge technology and tools that seamlessly connect to your backend applications.

16. What is autonomous software?


Ans: Autonomous Intelligent Systems are AI software systems that act independently of direct human
supervision, e.g., self-driving cars, UAVs, smart manufacturing robots, care robots for the elderly and
virtual agents for training or support.

17. What technologies are needed for autonomous vehicles?


Ans: Technologies are needed Autonomous-vehicle operation are—AI, safety and security, cameras,
network infrastructure, and the sensor technologies radar and lidar, or laser-light radar.

BACB TKN
14

18. Why are autonomous things important?


Ans: Autonomous things are fundamentally important because they represent the first real untethering of
machines from explicit human guidance.

19. How Amazon uses Data Science?


Ans: Through this technology, it gathers data from their customers . The more data they have the better it is
for them because once they understand what the user wants, they then streamline the process and try to
encourage the customers to purchase the products.

20. What is Database Management System?


Ans: Database Management Systems (DBMS) are software systems used to store, retrieve, and run queries
on data.

21. Mention the types of Databases.


Ans: Types of Datatypes
 Centralised database.
 Distributed database.
 Personal database.
 End-user database.
 Commercial database.
 NoSQL database.
 Operational database.
 Relational database

22. What are the uses of databases(advantages)?


Ans:
 Better Data Transferring.
 Better Data Security.
 Better data integration.
 Minimized Data Inconsistency.
 Faster data Access.
 Better decision making.
 Increased end-user productivity.
 Simple.

23. What is data science?


Ans: Data science encompasses preparing data for analysis, including cleansing, aggregating, and
manipulating the data to perform advanced data analysis.

24. What is the need for Data Science?


Ans: The principal purpose of Data Science is to find patterns within data. It uses various statistical
techniques to analyze and draw insights from the data.

25. What is Data Science useful for?


Ans: Data science can be used to gain knowledge about behaviors and processes, write algorithms that
process large amounts of information quickly and efficiently, increase security and privacy of sensitive
data, and guide data-driven decision-making.

26. How Facebook Uses Data Analytics To Understand Your Posts?


Ans: Facebook uses a tool it developed itself called DeepText to extract meaning from words we post by
learning to analyze them contextually.

BACB TKN
15

27. How Facebook Uses Data Analytics To Understand Your Posts And Recognize Your Face?
Ans: How Facebook uses data analytics to understand your posts and recognize your face?
Facebook uses a DL application called DeepFace to teach it to recognize people in photos.

28. What is IoT?


Ans: The Internet of Things (IoT) describes the network of physical objects—“things”—that are embedded
with sensors, software, and other technologies for the purpose of connecting and exchanging data with
other devices and systems over the internet.

29. What is Google Nest?


Ans: Google Nest is a line of smart home products including smart speakers, smart displays, streaming
devices, thermostats, smoke detectors, routers and security systems including smart
doorbells, cameras and smart locks.

30. What are the 4 stages of IoT architecture?


Ans:
Stages of IoT Architecture
1 Use of Sensors and Actuators
2. The Internet Gateway Use of Layers & Data Acquisition
3. Edge Information Technology
4. Use of Cloud Analytics and Data Centers

31. Mention any 4 predictions about the future of IoT.


Ans:
1. By 2025, it is estimated that there will be more than to 21 billion IoT devices.
2. Cybercriminals will continue to use IoT devices to facilitate DDoS attacks.
3. 5-G Networks will continue to fuel IoT growth.
4. Artificial intelligence will continue to become a bigger thing.
5. Routers will continue to become more secure and smarter.
6. More cities will become “smart”.
7. Cars will get even smarter.

32. What is Industrial Internet of Things (IIoT)?


Ans: The industrial internet of things (IIoT) refers to the extension and use of the internet of things (IoT) in
industrial sectors and applications.

33. Compare IoT and IIoT.


Ans:
IIOT IOT
It offers on-site programming. It offers easy off-site programming.
It focuses on industrial applications such as It focuses on general applications ranging from
manufacturing, power plants, oil & gas, etc. wearables to robots & machines.
It uses critical equipment & devices connected
over a network which will cause a life-
threatening or other emergency situations on Its implementation starts with small scale level
failure therefore uses more sensitive and precise so there is no need to worry about life-
sensors. threatening situations.
It deals with large scale networks. It deals with small scale networks.

BACB TKN
16

34. What are security concerns related to IoT?


Ans:
 Privacy.
 Hardware issues.
 Encryption of data.
 Web interface.
 Less network awareness.
 Insecure software.

35. What are examples of IoT used in devices?


Ans:
 Smart home devices.
 Industrial sensors
 Industrial robots
 Healthcare devices
 Connected cars

36. Is coding required for IoT?


Ans: No, Coding is not required for IoT.

37. What are the operations that we can do using cloud computing?
Ans: Here are the following operations that we can do using cloud computing:
 Developing new applications and services.
 Storage, back up, and recovery of data.
 Hosting blogs and websites.
 Delivery of software on demand.
 Analysis of data.
 Streaming videos and audios.

38. What are the advantages of Cloud Computing?


Ans: Here are the advantages of Cloud Computing
 Less Costs.
 24 X 7 Availability.
 Flexibility in Capacity.
 All over Functioning.
 Automated Updates on Software.

39. How does Cloud Computing work?


Ans: Cloud computing is a network of servers connected using the Internet. Its main function is to share
information, resources, and software. The Internet acts as the invisible cable that connects everything. This
includes all physical and virtual servers all over the globe.

40. Differentiate between IaaS, PaaS, and SaaS


Ans:
 IaaS: cloud-based services, pay-as-you-go for services such as storage, networking, and
virtualization.
 PaaS: hardware and software tools available over the internet.
 SaaS: software that’s available via a third-party over the internet.

BACB TKN
17

41. What is a Public Cloud?


Ans: Public cloud is a term for cloud computing services offered over the public Internet and available to
anyone who wants to purchase them.
42. What is a Private Cloud?
Ans: Private cloud is an on-demand cloud deployment model where cloud computing services and
infrastructure are hosted privately.

43. What is a Hybrid Cloud?


Ans: A hybrid cloud is one in which applications are running in a combination of different environments.
Hybrid cloud computing approaches are widespread because almost no one today relies entirely on the
public cloud.

44. What is a Community Cloud?


Ans: Community cloud is a cloud infrastructure that allows systems and services to be accessible by a
group of several organizations to share the information.

45. Differentiate between public cloud, private cloud, hybrid cloud, and community cloud
Ans:

46. What are the various cloud models?


Ans: IaaS, PaaS and SaaS are the three most popular types of cloud service offerings. (They are sometimes
referred to as cloud service models or cloud computing service models.)

BACB TKN
18

47. How do vendors charge for cloud services?


Ans: When setting price, cloud providers determine the expense to maintaining the network. They start
by calculating costs for network hardware, network infrastructure maintenance, and labor. These expenses
are added together and then divided by the number of rack units a business will need for its IaaS cloud.

48. What are the benefits of cloud computing?


Ans:
Cloud computing benefits are given below,
1. High Speed – Quick Deployment
2. Automatic Software Updates and Integration
3. Efficiency and Cost Reduction
4. Data Security
5. Scalability
6. Collaboration
7. Unlimited Storage Capacity
8. Back-up and Restore Data
9. Disaster Recovery

49. What is Critical infrastructure security?


Ans: Critical infrastructure security is the area of concern surrounding the protection of systems, networks
and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its
economy, and the public's health and/or safety.

50. What is Application security?


Ans: Application security is the process of developing, adding, and testing security features within
applications to prevent security vulnerabilities against threats such as unauthorized access and
modification.

51. What is Network security?


Ans: Network security is a set of technologies that protects the usability and integrity of a company's
infrastructure by preventing the entry or proliferation within a network of a wide variety of potential
threats.

52. What is Cloud security?


Ans: Cloud security, also known as cloud computing security, is the practice of protecting cloud-based
data, applications and infrastructure from cyber attacks and cyber threats.

53. What is Internet of things (IoT) security?


Ans: IoT security is the technology segment focused on safeguarding connected devices and networks in
the internet of things (IoT).

54. Mention Essential elements of Cyber Security.


Ans: Essential elements of Cyber Security are given below,
I. Confidentiality.
II. Integrity.
III. Availability.

55. Explain Password managers.


Ans: A password manager is a program that houses all your passwords, as well as other information, in one
convenient location with one master password. The benefits to using a password manager are: A password
manager will do the work of creating the complicated passwords you need to help protect your online
accounts.

BACB TKN
19

56. Explain Virtual Private Network (VPN)


Ans: A service that helps you stay private online. A VPN establishes a secure, encrypted connection
between your computer and the internet, providing a private tunnel for your data and communications while
you use public networks.

57. Mention Common Types of Cyber Attacks.


Ans: Common Types of Cyber Attacks
1. Ransomware
2. Malware
3. Malware as a Service (MaaS)
4. DoS and DDoS Attacks
5. Phishing
6. MITM Attack
7. Cross-Site Scripting (XSS)
8. SQL Injections
9. DNS Tunneling
10. Password Attack
11. Cryptojacking

58. What is Phising?


Ans: Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social engineering
techniques to entice a victim to share sensitive information — such as passwords or account numbers — or
to download a malicious file that will install viruses on their computer or phone.

59. Explain Man-in-the-Middle (MitM) Attacks.


Ans: A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a
conversation between a user and an application—either to eavesdrop or to impersonate one of the parties,
making it appear as if a normal exchange of information is underway.

60. Explain Denial-of-Service (DOS) Attack.


Ans: A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it
inaccessible to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending
it information that triggers a crash.

61. Explain SQL Injections


Ans: An SQL injection is a type of cyber-attack in which a hacker uses a piece of SQL (Structured Query
Language) code to manipulate a database and gain access to potentially valuable information.

62. Internet of Things (IoT) Attacks


Ans: An IoT attack is a compromise of an Internet of Things (IoT) system. This can include devices,
networks, data, and users. A cybercriminal can launch an IoT attack to steal information. They can take
over an automated or IoT system, and shut it down.

63. Mention Tips to avoid Cyber Attacks.


Ans:
 Limit the personal information you share online. Change privacy settings and do not use location
features.
 Keep software applications and operating systems up-to-date.
 Create strong passwords by using upper and lower case letters, numbers and special characters. Use
a password manager and two methods of verification.

BACB TKN
20

 Protect your home and/or business using a secure Internet connection and Wi-Fi network, and
change passwords regularly.
 Don’t share PINs or passwords. Use devices that use biometric scans when possible (e.g.
fingerprint scanner or facial recognition).
 Check your account statements and credit reports regularly.
 Use antivirus and anti-malware solutions, and firewalls to block threats.
 Back up your files regularly in an encrypted file or encrypted file storage device.
 Do not click on links in texts or emails from people you don’t know. Scammers can create fake
links to websites.
 Remember that the government will not call, text or contact you via social media about owing
money.

64. What are the differences among the terms cyber-attack, cyber threat & cyber risk?
Ans: A cyber threat is a probability that a specific type of attack may occur. Cyber risk is an area where if
exploited, it could be leveraged by a cyber-attack. Cyber risk is like any risk and measures the likelihood
and impact of a security breach.

65. How does anti-virus software work?


Ans: An antivirus software works by scanning incoming files or code that's being passed through your
network traffic.

66. What is anti-virus software?


Ans: Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer.

67. What is a Unified Threat Management (UTM) system and how does it work?
Ans: Unified threat management (UTM) describes an information security (infosec) system that provides a
single point of protection against threats, including viruses, worms, spyware and other malware, and
network attacks.

68. Explain Artificial Intelligence in Business.


Ans: Artificial intelligence in business simply involves the use of intelligent computer software with
human-like capabilities to boost revenue, improve customer experience, increase productivity and
efficiency, and drive business growth and transformation.

69. Explain Artificial Intelligence in Autonomous Vehicles.


Ans: The AI simulates human perceptual and decision-making processes using deep learning and controls
actions in driver control systems, such as steering and brakes.

70. Explain Top 5 uses of Neural Networks.


Ans: Uses of Neural Neworks:
i. Facial Recognition
ii. Stock Market Prediction
iii. Aerospace
iv. Healthcare
v. Signature Verification and Handwriting Analysis
vi. Weather Forecasting

71. Explain Use Cases of AI in Manufacturing


Ans: Below are the some of use cases of AI in Manufacturing.
 Developing smarter products.
 Developing smarter services.
 Making business processes more intelligent.
BACB TKN
21

 Automating repetitive or mundane tasks.


 Automating manufacturing processes.

72. How is AI used in human resources?


Ans: Artificial intelligence in HR allows procedures to be customized to need workers and their associated
roles to be separated. AI also keeps track of all the important contact details of the company and other
important tasks like verification of legal documents, etc.
73. How AI can be used in agriculture?
Ans: AI technology helps in detecting disease in plants, pests and poor nutrition of farms. AI sensors can
detect and target weeds and then decide which herbicide to apply within the region.

74. What is the data life cycle?


Ans: The data life cycle is the sequence of stages that a particular unit of data goes through from its initial
generation or capture to its eventual archival and/or deletion at the end of its useful life.

75. Who are some of the BIG DATA users?


Ans:
 Healthcare Providers.
 Education.
 Government.
 Insurance.
 Communications, Media and Entertainment.
 Banking and Securities.
 Manufacturing and Natural Resources.

76. How Data Science differs from Big Data and Data Analytics?
Ans: Big data refers to any large and complex collection of data. Data analytics is the process of extracting
meaningful information from data. Whereas Data science is a multidisciplinary field that aims to produce
broader insights.

77. How You Can Leverage the Power of Data to Grow Sales?
Ans: It’s not enough to have the data you need to increase sales. You also need to know how to use and
analyze it. Modern sales teams use prospect or customer data collected from various sources such as their
CRM, website, apps, social media, email marketing database, and call logs to power their campaigns.

79. How Big Data is changing the Way People Live Their Lives?
Ans: There is no doubt that big data is changing how people live their lives in ways that they could never
have imagined.

80. What is TCS’ Energy Management Solutions for Enterprises?


Ans: TCS' Energy Management Solution enables enterprises to acquire data in various formats from
geographically-distributed buildings, facilities, and datacenters.

81. Write Real-World IoT Applications in 2020.


Ans: Real-World IoT Applications
1. Connected vehicles
2. Traffic management
3. Smart grids
4. Environmental monitoring
5. Smart buildings and smart homes
6. Smart cities
7. Industrial, agricultural and commercial management
BACB TKN
22

82. What are the new IoT ideas in the field of home automation?
Ans:
 Lighting control.
 HVAC.
 Lawn/Gardening management.
 Smart Home Appliances.
 Improved Home safety and security.
 Home air quality and water quality monitoring.
 Natural Language-based voice assistants.
 Better Infotainment delivery.

83. Can Internet of things be hacked?


Ans: Yes, IoT devices can be hacked.

84. Can IoT work without Internet?


Ans: The IoT without the Internet is possible. In fact, some of our customer systems don't use the Internet
at all.

85. List Cloud Computing Applications?


Ans: Applications of Cloud Computing are,
 Data Storage and Backup Applications
 Business Applications
 Art Applications
 Education Applications
 Entertainment Applications
 Management Applications

86. Write steps for creating DigiLocker Account


Ans: The below are the steps to create DigiLocker account,
1. Visit the DigiLocker website or download digital locker app on your smartphone.
2. Enter your mobile number or Aadhaar card number.
3. Post submitting the details, you will receive an OTP on your mobile number.
4. Enter the OTP (One Time Password) in the space provided.
5. Once authentication is complete, you can create a DigiLocker username and set up a security PIN.
6. Now you can login to DigiLocker account with your credentials (Username and password).

87. How do I know if Cloud is right for my business?


Ans: It is important to evaluate if cloud is right for you from a strategic and operational perspective. Does
your demand for IT vary throughout the year? Are the costs of your IT impacting your ability to grow as a
business? If so you may consider a cloud option that can be easily scaled.

88. What type of security parameters does the Cloud have in place?
Ans: Cloud Security Maturity Model is a bunch of rules, not all of which will work for each association.
Associations should involve the model as a beginning stage and a way to settle on choices regarding how
much interest in every classification checks out for their current circumstance.

BACB TKN
23

89. How much can I save by using cloud computing services?


Ans: Even though it's a time-consuming process, the cloud can provide extensive financial benefits like
budget savings and increased workplace productivity. In fact, companies can save an average of 15
percent on all IT costs by migrating to the cloud.

90. What are different areas of Cyber Security?


Ans:
 Critical Infrastructure Security.
 Application Security.
 Network Security.
 Cloud Security.
 Internet of Things (IoT) Security.

91. Mention WannaCry ransom ware attack


Ans: WannaCry ransom ware is a crypto ransom ware worm that attacks Windows PCs. It's a form of
malware that can spread from PC to PC across networks (hence the "worm" component) and then once on a
computer it can encrypt critical files (the "crypto" part). The perpetrators then demand ransom payments to
unlock those files.

92. How do I secure my computer?


Ans:
 I’ll update software regularly.
 Always research and double-check my downloads,
 I’ll protect my network with firewall.
 Monitor Your PC with Windows Task Manager
 Avoid Dangerous Pop-Ups with an Ad Blocker
 Keep Your Browsing Private with a VPN, Especially on Public Wi-Fi
 Use Device Encryption or Bitlocker to Protect Your Hard Drive
 Use a Secure Password Manager with Two-Factor Authentication

93. How do I secure my mobile device?


Ans:
 I avoid giving out personal information.
 I’ll use a pin, password or pattern to lock your phone.
 Download apps only from trusted stores.
 I backup my data.
 I’ll Keep my operating system and apps updated
 Turn off Wi-Fi and Bluetooth when not in use.

94. What is a backup?


Ans: Backup refers to the copying and archiving of computer data so it may be used to restore the original
version after a data loss event.

95. What is encryption?


Ans: Encryption is a means of securing data by encoding it mathematically such that it can only be read, or
decrypted, by those with the correct key or cipher.

BACB TKN
24

SECTION-C(MCQ’s)

1. Artificial Intelligence is about _


a) Playing a game on Computer
b) Making a machine Intelligent
c) Programming on Machine with your Own Intelligence
d) Putting your intelligence in Machine

2. Select the most appropriate situation for that a blind search can be used.
a) Real-life situation
b) Small Search Space
c) Complex game
d) All of the above

3. The application/applications of Artificial Intelligence is/are


a) Expert Systems
b) Gaming
c) Vision Systems
d) All of the above

4. What is the full form of “AI”?


a) Artificially Intelligent
b) Artificial Intelligence
c) Artificially Intelligence
d) Advanced Intelligence

5. Which of the following is the branch of Artificial Intelligence?


a) Machine Learning
b) Cyber forensics
c) Full-Stack Developer
d) Network Design

6. Which of the following is a component of Artificial Intelligence?


a) Learning
b) Training
c) Designing
d) Puzzling

7. Ways to achieve AI in real-life are_________.


a) Machine Learning
b) Deep Learning
c) Both a & b
d) None of the above

BACB TKN
25

8. The process of training a Neutral Network is:


a. Model – Train – Training Data – Test and Update.
b. Train – Model – Prediction – Test and Update.
c. Training Data – Model – Predict – Test and Update.
d. Model – Train – Prediction – Test and Update

9. Which of the following is not an application of artificial intelligence?


a. Face recognition system
b. Chatbots
c. Natural language Processing
d. DBMS

10. Which of the following is an example of deep learning?


a. Self-driving cars
b. Pattern recognition
c. Natural language processing
d. All of the above

11. What is machine learning ?


A. Machine learning is the science of getting computers to act without being explicitly programmed.
B. Machine Learning is a Form of AI that Enables a System to Learn from Data.
C. Both A and B
D. None of the above

12. The categories in which Machine learning approaches can be traditionally categorized are ______
A. Supervised learning
B. Unsupervised learning
C. Reinforcement learning
D. All of the above

13. The Real-world machine learning use cases are _______.


A. Digital assistants
B. Chatbots
C. Fraud detection
D. All of the above

14. Which of the following is an advantage of artificial intelligence?


a. Reduces the time taken to solve the problem
b. Helps in providing security
c. Have the ability to think hence makes the work easier
d. All of the above

15. What the first layer in neural network is called?


A. input layer
B. output layer
C. hidden layer
D. None of the above

BACB TKN
26

16. Apple’s, Siri, Amazon’s, Alexa, Microsoft Cortana and Google Assistant’s are_____
A. Digital Assistant’s
B. Neural Networks
C. Data Base Systems
D. Machine Learning Tools

17. A Database Management System is a type of ____ software.


a) It is a type of system software
b) It is a kind of application software
c) It is a kind of general software
d) Both A and C

18. Which of the following is the Big Data Analytic tool ?


a) Apache Hadoop
b) MongoDB
c) Microsoft Azure
d) All of the above

19. What are the different features of Big Data Analytics?


(a) Open-Source
(b) Scalability
(c) Data Recovery
(d) All the above

20. What are the four V’s of Big Data?


(a) Volume
(b) Velocity
(c) Variety
(d) All the above

21. The examination of large amounts of data to see what patterns or other useful
Information can be found is known as
(a) Data examination
(b) Information analysis
(c) Big data analytics
(d) Data analysis

22. Concerning the Forms of Big Data, which one of these is odd?
(a) Structured
(b) Unstructured
(c) Processed
(d) Semi-Structured

23. Select the order of the Big Data Analytics process.


a. Information, Data, Analysis, Insight
b. Data , Information, Insight, Analysis
c. Data, Insight, Analysis, Information
d. Data, Analysis , Insight , Information

BACB TKN
27

24. The technology solution used to optimize and manage the storage and retrieval of data from
databases is called
A. Database management system
B. Datastore management system
C. Big data analytics
D. IOT

25. Which of the following is the way in which an IoT device is associated with data?
a) Internet
b) Cloud
c) Automata
d) Network

26. ___________ are the main components in IOT


a) Low power embedded systems
b) Cloud computing
c) Availability of big data, networking connection
d) All of the above

27. IIoT stands for _________.


a. Intense Internet of Things
b. Index Internet of Technology
c. Industrial Internet of Things
d. Incorporate Internet of Technology

28. What type of computing technology refers to services and applications that typically run on a
distributed network through virtualized resources?
a) Distributed Computing
b) Cloud Computing
c) Soft Computing
d) Parallel Computing

29. Which one of the following options can be considered as the Cloud?
a) Hadoop
b) Intranet
c) Web Applications
d) All of the above

30. Which one of the following is Cloud Platform by Amazon?


a) Azure
b) AWS
c) Cloudera
c) All the above

31. Which of the following statements is not true?


a) Through cloud computing, one can begin with very small and become big in a rapid manner
b) All applications benefit from deployment in the Cloud.
c) Cloud computing is revolutionary, even though the technology it is built on is evolutionary.
d) None of the above

BACB TKN
28

32. Which of the following is the correct full form of SaaS?


a) Storage-as-a-Service
b) Server-as-a-Software
c) Software-as-a-Service
d) None of the above

33. Which of the following is a characteristic of the SaaS applications?


a) SaaS applications are reliable
b) SaaS applications are not customizable
c) SaaS applications are customizable
d) Non-reliable

34. Which of the following is not a type of cloud server?


a) Public Cloud Servers
b) Private Cloud Servers
c) Dedicated Cloud Servers
d) Merged Cloud Servers

36. Which of the following are the features of cloud computing?


a) Security
b) Availability
c) Large Network Access
d) All of the mentioned

37. Which of the following is an example of the cloud?


a) Amazon Web Services (AWS)
b) Dropbox
c) Cisco WebEx
d) All of the above

38. Which one of the following can be considered as the class of computer threats?
a) Dos Attack
b) Phishing
c) Soliciting
d) both a and c

39. Which of the following is considered as the unsolicited commercial email?


a) Virus
b) Malware
c) Spam
d) all of the above

40. --------- is a type of software designed to help the user to detect the viruses and avoid them.
a) Malware
b) Spyware
c) Antivirus
d) Both b and c

BACB TKN
29

41. It can be a software program or a hardware device that filters all data packets coming through
the internet or a network etc., it is known as the
a) Antivirus
b) Firewall
c) Cookies
d) Malware

42. Hackers usually used the computer virus for ______ purpose.
a) To log, monitor each and every user's stroke
b) To gain access the sensitive information like user's Id and Passwords
c) To corrupt the user's data stored in the computer system
d) All of the above

BACB TKN

You might also like