20EC067 AI Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 32

Quiz 1

Q:1. A.M. Turing developed a technique for determining whether a computer


could or could not demonstrate the artificial Intelligence, Presently, this
technique is called __________
1. Turing Test

2. Algorithm

3. Boolean Algebra

4. Logarithm

Q:2. Knowledge based systems comprises of:

1. DENDRAL

2. MYCIN

3. PROSPECTOR

4. All the above

Q:3. Weak AI is

1. A set of computer programs that produce output that would be considered


to reflect intelligence if it were generated by humans.

2. Useful for testing hypothesis about minds, but would not actually be minds

3. The embodiment of human intellectual capabilities within a computer.

4. None of the above

Q:4. Strong AI is

1. An AI system with generalized human cognitive abilities.


2. Also called as narrow AI.

3. All actions are preprogrammed by human

4. None of the above

Q:5. Which of the following could be the approaches to Artificial Intelligence?

1. Strong AI

2. Swarm Intelligence

3. Computational Intelligence

4. All the above

Q:6. AI vs. Human Brain

1. Humans use content memory and thinking whereas, robots are using
built-in instructions, designed by scientists.

2. Artificial intelligence cannot beat human intelligence at all

3. The field of Artificial intelligence limits on designing machines that can


mimic human behavior.

4. None of the above

Q:7. Which of the following is not a stage of AI?

1. Cognitive analytics

2. Predictive analytics

3. Diagnostic analytics

4. None of the above


Q:8. Steps to process the command are:

1. Trigger word detection

2. Speech recognition

3. Intent recognition

4. All the above

Q:9. Which of the following is not an application of AI?

1. Pattern recognition

2. Crop prediction

3. Digital assistant

4. Fund transfer

Q:10. A method of programming a computer to exhibit human intelligence is


called modeling or.....................

1. simulation

2. cognitization

3. duplication

4. psychic amelioration
Submit
Quiz2
Q:1. What is an advantage of Artificial Intelligence?
1. Potential for misuse

2. Highly dependent on machines

3. Requires Supervision

4. Rational Decision Maker

Q:2. Who is known as the "Father of AI"?

1. Fisher Ada

2. Alan Turing

3. John McCarthy

4. Allen Newell

Q:3. Which of the following is not a branch of Artificial Intelligence?

1. Expert systems

2. Robotics

3. Natural language Processing

4. None of the above

Q:4. Which of the following is not an application of Unsupervised Learning?

1. Document clustering

2. Speech recognition
3. Image compression

4. Association analysis

Q:5. The multi-armed bandit problem is a generalized use case for-

1. Reinforcement learning

2. Supervised learning

3. Unsupervised learning

4. All the above

Q:6. Why IOT now?

1. Electronic companies are building Wi-Fi and cellular wireless connectivity


into a wide range of devices.

2. Mobile data coverage has improved significantly

3. The size and cost of wireless radios has dropped

4. All the above

Q:7. Scalability of IoT means:

1. Expandable/reducible in terms of scale or size.

2. Measurable

3. Increasing/decreasing monetary costs.

4. All of these.
Q:8. Which of the following statement is incorrect for AI?

1. Humans can not evolve as soon as AI evolves to control and handle it

2. The community working towards safe and beneficial superintelligence has


grown worldwide.

3. It is typically managed by a peer-to-peer network working simultaneously


together to solve complex mathematical problems in order to validate new
blocks

4. AI is the new electricity

Q:9. Overfitting

1. The model remembers a huge number of examples instead of learning to


notice features and may fail to predict future observations reliably.

2. Occurs when a statistical model cannot adequately capture the underlying


structure of the data.

3. Occurs if the model or algorithm shows low variance but high bias

4. None of the above

Q:10. AI in security will:

1. Not detect threats based on application behavior and a whole network's


activity.

2. Not be able to identify and stop cyber threats with less human
intervention than is typically expected or needed with traditional security
approaches.

3. Not detect when new threats are imminent

4. Not replace a security analyst's insights or understanding of the field.


Quiz3

Q:1. The first usage of Data came in:


1. 1640

2. 1954

3. 1946

4. 1940

Q:2. DIKW:

1. Stands for Data, Information, Knowledge, Wisdom

2. In 1994 Nathan Shedroff presented the DIKW hierarchy in an information


design context

3. In this context data is considered as symbols representing signals

4. All the above statements are correct

Q:3. Classification data type which is not on the basis of measurement:

1. Ratio data

2. Ordinal data

3. Boolean data (True/False)

4. Interval data

Q:4. Not a case of Qualitative vs Quantitative data:

1. Category vs Number

2. Observed vs Measured
3. Smell vs Height

4. Volume vs Color

Q:5. User driven approach is

1. Data Mining

2. Deep Learning

3. OLTP

4. Machine Learning

Q:6. Physical storage of data:

1. CD-ROM

2. Distributed database

3. Cloud storage

4. None of the above

Q:7. Which of the following statement is true for Data Warehouse?

1. It is semi-structured and raw

2. It is less agile with fixed configuration

3. It is designed for low-cost storage

4. All the above

Q:8. Importance of data:


1. It helps to analyze and visualize the performance

2. It helps to recommend correct options to the customers

3. It helps to solve complex problems

4. All the above

Q:9. Choose an incorrect statement:

1. ETL stands for Extraction, Transformation, Loading into repository.

2. Data cleaning is very important in data preparation.

3. Removal of outliers and smoothing of data is required to prepare data for


further processing.

4. Data needs to be normalize.

Q:10. Data visualization tools are:

1. Pie chart

2. Histogram

3. Scatter Plot

4. All the above

Quiz 4
Q:1. In Supervised Learning:
1. Input data is called training data and has a known label.

2. It can solve the classification and regression problems.

3. The training process continues until model achieves desired accuracy

4. All the above statements are true.

Q:2. In Unsupervised Learning, the incorrect statements are:

1. It organize data by similarity.

2. Input data know about results

3. It can solve problem of dimension reduction.

4. None of the above

Q:3. Data Visualization is:

1. Used to communicate information clearly and efficiently to users by the


usage of information graphics such as tables and charts.

2. Helps users in analyzing a large amount of data in a simpler way.

3. Makes complex data more accessible, understandable, and usable.

4. All of the above

Q:4. Data Visualization tool that can be used for displaying hierarchical data:

1. Histogram

2. Treemap

3. Scatter plot
4. Pie chart

Q:5. Which of the following is a Regression problem?

1. Weather forecasting

2. Spam/Not-Spam emails categorization

3. Sentiment analysis

4. Fraud detection

Q:6. Which of the following is a Classification problem?

1. Estimating the price of house

2. Credit/loan approval

3. Recommender system

4. Predicts the number of items which a consumer will probably purchase

Q:7. Decision tree:

1. Belongs to a family of unsupervised learning algorithms

2. Consider all attributes to split at each node, starting from the root node

3. Create a model that can be used to predict the class or value of the target
variable by learning simple decision rules inferred from training data

4. All the above

Q:8. Bayesian Classifier:


1. Connects the degree of belief in a hypothesis before and after accounting
for evidence

2. Uses conditional and marginal probability

3. Performance can be estimated using accuracy, precision, recall

4. All the above

Q:9. When two clusters have a parent-child relationship then it is called as:

1. K-means clustering

2. Fuzzy c-means clustering

3. Hierarchical clustering

4. Density based clustering

Q:10. Recommender system is an example of:

1. Clustering

2. Supervised learning

3. Reinforcement learning

4. Regression

Quiz 5

Q:1. The possible features of a text corpus in NLP


1. Count of the word

2. Identifying stop words

3. Predicting parts of Speech


4. All the above

Q:2. Normalization techniques in NLP


a. Lemmatization
b. Bag of words
c. Stemming
d. Named entity recognition

1. a,b

2. a,c

3. d,b

4. b,c

Q:3. NLP Use cases


a. Text summarization
b. Object detection
c. Sentiment analysis
d. Chatbots

1. b,c,d

2. a,b,d

3. a, c, d

4. a,b,c

Q:4. Speech recognition

1. It is a way of encoding and decoding signals

2. It is coupled with AI as deep learning models


3. Both acoustic modeling and language modeling are important parts of
modern statistically-based speech recognition algorithms.

4. All the above

Q:5. Choose an incorrect statement in context of speech recognition

1. In 1952, three Bell Labs researchers built a system called "Audrey"

2. Modern general-purpose speech recognition systems are based on Hidden


Markov Models

3. It can identify objects, people, places, and actions in images

4. None of the above

Q:6. Natural Language Understanding (NLU)


a. It is the ability of machines to understand the human language
b. It is a branch of Natural Language Processing
c. Natural-language understanding is considered an AI-hard problem.
d. None of the above

1. a,b,c

2. a,c,d

3. b,a,d

4. b,c,d

Q:7. Speech recognition steps include

1. Feature extraction

2. Spectrum analysis

3. Preprocessing of input signals


4. All the above

Q:8. The interpretation capabilities of a language-understanding system depend


on

1. The semantic Theory

2. The syntactic theory

3. Both a and b

4. None of the above

Q:9. Applications of NLU


a. Automated reasoning
b. Machine translation
c. Network congestion control
d. All the above

1. c,d

2. b,c

3. d,a

4. a,b

Q:10. Methods used in speech recognition systems are

1. Hidden Markov Model (HMM)

2. Neural Networks

3. Both a and b

4. None of the above


Quiz 6

Q:1. Choose an incorrect statement in context to Natural Language Generation


(NLG)
1. Transforms structured data into natural language

2. Markov chains can be used for generating natural language

3. It converts a text into structured data

4. None of the above

Q:2. In natural-language understanding, the system needs to disambiguate the


input sentence to produce the machine representation language, in NLG the
system needs to make decisions about how to put a concept into words

1. True

2. False

Q:3. Applications of Natural Language Generation


a. Smartphone
b. Analysis of business intelligence
c. IOT devices
d. Chatbots

1. a, b, c, d

2. a,c,d

3. b,c

4. a,b,c

Q:4. Choose correct options


a. NLU takes up the understanding of the data based on grammar, the context
in which it was said and decide on intent and entities.
b. NLP converts a text into structured data.
c. NLG generates a text based on structured data.
d. None of the above

1. b,c,d

2. a,c

3. a,b,c

4. a,b,d

Q:5. Chatbots
a. Can be used for E-commerce
b. Can be used to solve people’s travel related problems
c. Need not to pass the industry standard Turing test at any level
d. Require a large amount of conversational data to train

1. b,c,d

2. a,c

3. a, b, c

4. a,b,d

Q:6. Machine translation


a. Is the process of using computer programs to translate a text/speech from
one natural language to another relevant to context
b. It has the ability to translate in many languages
c. It is required for web content and web page translation
d. None of the above

1. a,b,d

2. b,c,d

3. c,d,a
4. a,b,c

Q:7. A brief history of Machine Translation includes:


a. Rule based Machine Translation (RBMT)
b. Example based Machine Translation (EBMT)
c. Statistical Machine Translation (SMT)
d. Neural Machine Translation (NMT)

1. a,b,c

2. c,d,a

3. a,b,c,d

4. b,c,d

Q:8. Which of the following includes major tasks of NLP?

1. Automatic Summarization

2. Natural language understanding

3. Natural language generation

4. All the above

Q:9. Google translator is the application of

1. Machine Translation

2. Text summarization

3. Information extraction

4. None of the above


Q:10. Applications of NLP are
a. Chatbots
b. Voice assistants
c. Virtual assistant
d. None of the above

1. a,b,d

2. a,b,c

3. b,c,d

4. a,c,d

Quiz 7

Q:1. Applications of Deep Learning are:


1. Self-driving cars

2. Fake news detection

3. Virtual Assistants

4. All the above

Q:2. The inputs for a single layer neural network are 1, 3, 2 and the weights of
links connecting input neurons to the output neuron are 2, 2, and 3 then the
output will be (Identity activation function is used in output neuron):

1. 6

2. 14

3. 12

4. None of the above


Q:3. Which of the following is not a type of Artificial Neural Network?

1. Perceptron

2. Radial Basis Functions

3. Random Forest

4. Autoencoder

Q:4. What is the limitation of deep learning?

1. Amount of data

2. Computational expensive

3. Data Labeling

4. All the above

Q:5. The number of nodes in the hidden layer is 8 and the output layer is 5. The
maximum number of connections from the hidden layer to the output layer are:

1. 40

2. Less than 40

3. More than 40

4. It is an arbitrary value

Q:6. Recurrent Neural Networks (RNN) are used for

1. Businesses Help securities traders to generate analytic reports

2. Detecting fraudulent credit-card transaction


3. Providing a caption for images

4. All of the above

Q:7. Types of RNN are:

1. LSTM

2. Boltzman machine

3. Hopfield network

4. a and b

Q:8. What is perceptron?

1. a single layer feed-forward neural network with pre-processing

2. an auto-associative neural network

3. a double layer auto-associative neural network

4. a neural network that contains feedb

Q:9. Which of the following architecture has feedback connections?

1. Recurrent Neural network

2. Convolutional Neural Network

3. Restricted Boltzmann Machine

4. None of these

Q:10. Bidirectional RNN:


1. Trained to predict both the positive and negative directions of time
simultaneously.

2. Applications are speech recognition, handwritten recognition etc.

3. After forward and backward passes are done, the weights are updated

4. All the above

Assignment 8

Q:1. The incorrect statement for a Convolutional Neural Network are:


1. The height and width of the filter in CNN must be less than the size of
input

2. The Pooling layer progressively increases the spatial size of the


representation

3. It uses both linear and non-linear activation functions

4. The last few layers are fully connected layers and computation on these
layers are very time consuming

Q:2. A Convolutional Neural Network is able to successfully capture the Spatial


and Temporal dependencies:

1. True

2. False

Q:3. Different types of normalization in Deep Neural Networks are


a. Output
b. Batch
c. Group
d. Instance

1. a,b,c
2. b,c,d

3. d,a,b

4. d,a,c

Q:4. Applications of CNNs are:


a. Recommender systems
b. AlexNet
c. Natural Language Processing
d. Pooling

1. a,b

2. b,d

3. a,c

4. a,d

Q:5. Which of the following statements are correct for GAN?


a. GANs are useful for unsupervised learning, supervised learning, semi-
supervised learning, and reinforcement learning
b. Generative model technique learns to generate the data with the same
statistics of training data
c. At each iteration the goal of generator is to minimize the classification error
and the goal of discriminator is to maximize the classification error.
d. The discriminator could tell the difference between images of a cat and a dog
and generative model could generate new images of animals that look like real
animals.

1. a,b,c

2. a,b,d

3. a,c,d

4. b,c,d
Q:6. A generative model:
a. Captures the joint probability p(X,Y)
b. Captures the conditional probability p(Y|X)
c. Includes the distribution of data itself
d. Cannot predict the next word in sequence

1. a,b

2. a,c

3. a,d

4. b,c

Q:7. The discriminative model:


a. Draw boundaries in the data space as it tells the difference between
handwritten 0s and 1s.
b. Captures the joint probability p(X,Y)
c. Captures the conditional probability p(Y|X)
d. Learns to distinguish the generator’s fake data from real data

1. a,b,c

2. a,b,d

3. a,c,d

4. b,c,d

Q:8. Choose the incorrect statements from the following

1. The discriminator uses the real data as negative examples during training

2. The discriminator uses the fake data as negative examples during training

3. The portion of the GAN that trains the generator model includes random
input
4. None of the above

Q:9. Choose the correct statements from the following


a. Most universal approximation theorems can be parsed into two classes. The
first quantifies the approximation capabilities of neural networks with an
arbitrary number of artificial neurons and the second quantifies an arbitrary
number of hidden layers
b. A neural network can represent any function provided it has sufficient
capacity.
c. Not all architectures can represent any function
d. None of the above

1. a,b,c

2. b,c,d

3. d,a,b

4. d,a,c

Q:10. Interesting applications of Generative Adversarial Networks (GANs) are:

1. Photo Inpainting

2. Culinary arts (as making a pizza)

3. Face aging

4. All the above

Quiz 9

Q:1. Applications of face recognition system are


a. Security system
b. Attendance system
c. Smartphone’s unlocking system
d. Video surveillance system
1. a,b,c,d

2. a,b,c

3. b,c,d

4. d,a,b

Q:2. Image recognition steps are


a. Extract pixel features from an image
b. Prepare labeled images for training data
c. Train the model to be able to categorize images
d. None of the above

1. a,b,c

2. b,c,d

2. d,a,b

2. d,a,c

Q:3. Applications of image recognition system are


a. Driverless car technology
b. Document clustering
c. Gaming
d. All the above

1. a,b

2. b,c

3. a,c

4. c,d

Q:4. Object detection


a. It is a computer vision technique that allows us to identify and locate objects
in an image or video
b. Object detection allows us to at once classify the types of things found while
also locating instances of them within the image
c. Draws a box around each object whereas image recognition assigns a label to
an image
d. It has a capability which enables a program to process human speech into a
written format

1. a,b,c

2. b,d,a

3. a,c,d

4. b,c,d

Q:5. Applications of object detection are


a. Video surveillance b. Crowd counting c. Spam/Non-spam classification d.
Self-driving cars

1. a,b,c

2. a,b,d

3. a,c,d

4. b,c,d

Q:6. Methods for object detection are

1. Viola–Jones method

2. Deep Learning approaches

3. Both (a) and (b)

4. None of the above


Q:7. In which step of the processing, assigning a label (e.g., “dog”) to an object
based on its descriptors is done?

1. Object recognition

2. Morphological processing

3. Segmentation

4. Representation

Q:8. What is the first and foremost step in Image Processing?

1. Morphological processing

2. Compression

3. Image acquisition

4. Image enhancement

Q:9. Image recognition tools are:


a. Clarifai b. IBM Watson Visual Recognition c. Amazon Lex d. Scikit-image

1. a,b,c

2. b,c,d

3. a,b,d

4. d,a,c

Q:10. Choose an incorrect statement

1. Image detection involves predicting the class of one object in an image.


2. Object localization refers to identifying the location of one or more objects
in an image and drawing abounding box around their extent

3. Object detection combines these two tasks and localizes and classifies one
or more objects in an image

4. Detection is the process of identification and classification is the


categorization of the object based on a previously defined classes or types

Quiz 10

Q:1. Choose the incorrect statement:


1. Speech recognition is a way of encoding and decoding analog signals

2. Differently abled people can use speech recognition system.

3. The first speech recognition systems were focused on numbers not words

4. None of the above

Q:2. Voice search engines are:


a. Google Assistant
b. Siri
c. Alexa
d. Cortana

1. a,b,c,d

2. b,c,d

2. d,a,b

2. d,a,c
Q:3. Types of speech recognition systems

1. Speaker independent

2. Speaker dependent

3. Speaker adaptive

4. All the above

Q:4. Steps of speech recognition system include


a. Analog to digital conversion
b. Wavelets and multiresolution processing
c. Use of acoustic and language model
d. Segmentation

1. a,b

2. b,c

3. c,a

4. a,d

Q:5. Applications of speech recognition systems are


a. Home automation
b. Voice dialing
c. Color processing
d. Translation

1. a,b,c

2. a,b,d

3. a,c,d

4. b,c,d
Q:6. In computer vision
a. The tasks include methods for acquiring, processing, analyzing and
understanding digital images
b. Most computer vision systems rely on image sensors, which detect
electromagnetic radiation, which is typically in the form of either visible or infra-
red light
c. The working of visual cortex of a dog has introduced the concept of edge
detection.
d. All the above

1. a,b

2. b,c

3. c,d

4. a,d

Q:7. How computer vision works


a. Acquiring an image
b. Processing the image
c. Analyzing the image
d. Understanding the image

1. a,b,c,d

2. a,b,c

3. d,a,b

4. d,a,c

Q:8. Potential application areas of robots


a. Military robots
b. Drones
c. Medical robot
d. None of the above
1. a,b,c

2. b,c,d

3. a,b,d

4. d,a,c

Q:9. Artificial Intelligence techniques can


a. Analyze large amount of data
b. Take complicated decision easily
c. Replace humans in near future from almost all type of jobs
d. Be used in Logistic and Supply chain management

1. a,b,c

2. b,c,d

3. a,b,d

4. d,a,c

Q:10. How a robot works?

1. Uses pre-programmed instructions stored in CPU

2. It need special hardware with sensors and effectors

3. Robot sensors send feedback to controllers

4. All the above

Submit

You might also like