Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
275 views
24 pages
Digital Fluency Notes MCQ
B.com NEP df important MCQ
Uploaded by
taahanaganur
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save digital fluency notes MCQ For Later
Download
Save
Save digital fluency notes MCQ For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
275 views
24 pages
Digital Fluency Notes MCQ
B.com NEP df important MCQ
Uploaded by
taahanaganur
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save digital fluency notes MCQ For Later
Carousel Previous
Carousel Next
Download
Save
Save digital fluency notes MCQ For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 24
Search
Fullscreen
waangaiure UuaverDiLy Skill Enhancement Course- Digital Fluency COMMON TO ALL COURSES QUESTION BANK PART-A Multiple choice questions on Artificial Intelligence 1) Artificial Intelligence is about _ a) Playing a game on Computer b) Making a machine Intelligent c) Programming on Machine with your Own Intelligence d) Putting your intelligence in Machine Answer: b 2) Who is known as the Father of AI? a) Fisher Ada b) Alan Turing ) John McCarthy ) Allen Newell Answer: ¢ 3) Select the most appropriate situation for that a blind search can be used. a) Real-life situation b) Small Search Space c) Complex game 4) All of the above Answer: b 4) The application/applications of Artificial Intelligence is/are a) Expert Systems b) Gaming c) Vision Systems d) All of the above Answer: d 5) If a robot is able to change its own trajectory as per the extemal conditions, then the robot considered as the a) Mobile b) Non-Servo c)Open Loop _ dd) Intelligent Answer: d 6) Which of the given language is not commonly used for Al? a) LISP b) PROLOG c) Python d) Perl Answer: d 7). A technique that was developed to determine whether a machine could or could not demonstrate the artificial intelligence is known as the a) Boolean Algebra b) Turing Test ¢) Logarithm d) Algorithm Answer: b 8) The component ofan Expert system is___ a) Knowledge Base b) Inference Engine c) User Interface d) All of the above Answer: d9) Which algorithm is used in the Game tree to make decisions of Win/Lose’? a) Heuristic Search Algorithm b) DFSIBFS algorithm ¢) Greedy Search Algorithm d) Min/Max algorithm Answer: d 10). What is the full form of “AI”? a) Attificially Intelligent b) Artificial Intelligence c) Attificially Intelligence d) Advanced Intelligence Answer: b 11). Which of the following is the branch of Artificial Intelligence? a) Machine Learning b) Cyber forensics ¢) Full-Stack Developer d) Network Design Answer: a 12). Which of the following is a component of Artificial Intelligence? a) Leaming b)} Training c) Designing d) Puzzling Answer: a 13) Ways to achieve Al in real-life arc. : a) Machine Leaming b) Deep Learning c) Botha&b d) None of the above Answer: 14). The main tasks of an AI agent are. a) Input and Output b) Moment and Humanly Actions c) Perceiving, thinking, and acting on the environment d) None of the above Answer: ¢ 15). The best Al agent is one which. a) Needs user inputs for solving any problem b) Can solve a problem on its own without any human intervention c) Needa similar exemplary problem in its knowledge base d) All of the above Answer: b16. The process of training a Neutral Network is: a. Model — Train — Training Data — Test and Update. b. Train — Model — Prediction ~ Test and Update. c. Training Data — Model — Predict — Test and Update. d. Model — Train — Prediction — Test and Update. Ans: ¢ 17. Which of the following is not an application of artificial intelligence? a. Face recognition system b. Chatbots c. Natural language Processing d. DBMS Ans: d 18. Which of the following is an example of deep leaming? a. Self-driving cars b. Pattern recognition c. Natural language processing. All of the above Ans: d 19. Convolutional Neural Network is used in- ‘A. Image classification B, Text classification C. Computer vision D. All of the above Ans: d 20. What is machine learning ? A. Machine learning is the science of getting computers to act without being explicitly programmed. B. Machine Learning is a Form of Al that Enables a System to Learn from Data. C. Both A and B D. None of the above Ans:c 21. The categories in which Machine learning approaches can be traditionally categorized are ‘A. Supervised learning B. Unsupervised learning C. Reinforcement learning D. All of the above Ans: d 22. The Real-world machine leaming use cases are 5 A. Digital assistants B. Chatbots C. Fraud detection D. Alll of the above Ans: d 23. Which of the following is an advantage of artificial intelligence? a. Reduces the time taken to solve the problem b. Helps in providing security c. Have the ability to think hence makes the work easier d. All of the above Ans:d24. What the first layer in neural network is called? A. input layer B. output layer C. hidden layer D. None of the above Ans: a 25. is used as an input to the machine learning model for training and prediction purposes. a. Feature b. Feature Vector c. Both A and B d. None of the above Ans: b 26. In.a Deep Learning System, cach connection between Neurons is association with a: a. Length. b. Weight. c. Function. d. None of the Above Ans: b. 27. Apple's, Siri, Amazon's, Alexa, Microsoft Cortana and Google Assistant's are a. Digital Assistant’s B. Neural Networks C. Data Base Systems D. Machine Learning Tools Ans: a Multiple choice questions on Database management and Big Data Analytics 1) Which of the following is generally used for performing tasks like creating the structure of the relations, deleting relation? a) DML (Data Manipulation Language) b) Query c)Relational Scher d) DDL (Data Definition Language) Answer: d 2) Which of the following provides the ability to query information ffom the database and insert tuples into, delete tuples from, and modify tuples in the database” a) DML (Data Manipulation Language) b) DDL (Data Definition Language) c) Query d) Relational Schema Answer! a 3) A Database Management System is a type of software. a) It is a type of system software b) It is a kind of application software ©) Itis a kind of general software d) Both A and C Answer: a 5) Which of the following is the Big Data Analytic tool ? a) Apache Hadoop b) MongoDB_ c) Microsoft Azure d) All of the above Answer: d 6). What are the main components of Big Data? {2} MapReduce “(bHDES c) YARN d) All of these Answer: d7). What are the different features of Big Data Analytics? a) Open-Source { 5 Scalability (c} Data Recovery (d) All the above Answer: d 8). What are the four V’s of Big Data? (a) Volume (b) Velocity c) Variety’ ‘d) All thé above nswer: 9). The examination of large amounts of data to see what patterns or other useful information can be found is known as (a) Data examination {b) Information analysis } Big data analytics 'd) Data analysis Answer: ¢ 10). Big data analysis does the following except {a) Collects data ¢b) Spreads data ‘c) Organizes data (d) Analyzes data Answer: b 11). The new source of big data that will trigger a Big Data revolution in the years to come is (a) Business transactions 'b) Social media & Transactional data and sensor data (d) RDBMS Answer: ¢ 12) The word 'Big data’ was coined by ‘a) Roger Mougalas 'b) John Philips {c) Simon Woods {d) Martin Green Answer: a 13) Concerning the Forms of Big Data, which one of these is odd? (a) Structured (b) Unstructured ic) Processed Scmi-Structured Answer: c 14) Big Data applications benefit the media and entertainment industry by ® Predicting what the audience wants Ad targeting (c) Scheduling optimization (d) All of the above Answer: d 15). The feature of big data that refers to the quality of the stored data is a) Variety b) Volume c) Variability (d) Veracity Answer: d16. Data science is the process of diverse set of data through ? ‘A. organizing data B. processing data C. analysing data D. All of the above Ans: D 17. Which of the following language is used in Data science? AC BCH CR D. Ruby Ans: C 18, Unstructured data is not organized. A. TRUE B. FALSE C. Can be true or false D. Can not say Ans: A. 19. Which of the following is a data visualization method? A. Line B. Triangle C. Pie chart and Bar Chart D. ‘Pentagon Ans: C 20. RDBMS store data in the form of tables with most commercial RDBMS using. a. SQL B. Apache C. work fusion D. Mango DB Ans:A 21. Select the order of the Big Data Analytics process. a. Information, Data, Analysis, Insight b. Data , Information, Insight, Analysis c. Data, Insight, Analysis, Information d. Data, Analysis , Insight , Information 22. refers to the quality of information or data . Volume B. Variety C. Velocity D. Veracity is the process of taking row data, transforming it into to graphs, charts, images and videos. A. Datamining _B. Data visualisation C. Data warehouse _D. Data Analytics ‘Ans: B 2A. Which of the following is not Big Data tool? ‘A. Apache Hadoop B. Apache Kafka C. Apache Tomcat D. Apache Zookeeper Ans: C 25. The technology solution used to optimize and manage the storage and retrieval of data from databases is called A. Database management system B. Datastore management system C. Big data analytics D.1OT Ans: A26. Which one of the following is not included in four Vs of Big data analytics? a) Volume ) Veracity — c) Variety) Vicinity Ans: D 27. In the Healthcare Industry, AI has disrupted. A Medical imaging. B.Surgery. C.Physiological Diagnosis. D.None of these. Ans: A Multiple choice questions on Internet of things 1) How many numbers of the element in the open IoT architecture? a) Four elements b) Five elements c) Sixelements__d) Seven elements Answer: d) 2) Which of the following is the way in which an IoT device is associated with data? a) Internet —_b) Cloud c) Automata 4) Network Answer: b) 3) Which of the following IoT networks has a very short range? a) Short Network b) LPWAN c) SigFox d) Short-range Wireless Network ‘Answer: d) 4) What is the full form of the LPWAN? a) Low Protocol Wide Area Networkb) Low Power Wide Area Network c) Long Protocol Wide Area Networkd) Long Power Wide Area Network Answer: b) 5) An JoT network is a collection of devices. a) Signal b) Machine to Machine c) Interconnected d) Network to Network Answer: c) 6) Which one of the following is not an IoT device? a) Amazon echo voice controller b) Google Home c) Nest Smoke Alarm d) None of these Answer: d) 7) What is the main purpose of WoT (Web of Things) in the loT? a) Improve the usability and interoperability b) Reduce the security ©) Complex the development d) Increase the cost Answer: a) 8) What is the Arduino UNO? a). Software b). Hardware device c). Network — d). Protocol Answer: b)9) __allows the user to control electronic components. a) Android API. b) RETful API c) MQTT API d) CoAP API Answer: b) 10) Which of the following is not an application of loT? a) Wearables b) Smart Grid c) Arduino 4) Smart City Answer: c) 11) What is the real example of a smart grid device in loT? a) Mobile phone b) Television ©) Smart Speaker d) Smart Meters Answer: d) 12). What is the full form of ICT? a) InterConnect Technology b) Internet Connection Topology c) Information and Communication Technology d) Infer Communication Topology Answer: c) 13) Which of the following devices is used to measure the gases or liquid? a) Optical Sensor b) Gas Sensor c) Smoke Sensor d) Pressure sensor ‘Answer: d) 14). What is the full form of HDLC? a) Higher Data Level Communication b) Higher Data Link Communication c) High-level Data Link Control d) High Data Level Control Answer: c) 15). What is the full form of HART? a) Highway Application Remote Transport b) Highway Addressable Remote Transducer c) High Address Reduce Transport d) High Application Remote Transport ‘Answer: b) 16. are the applications of IOT a) House b) Virtual environment c) Regional office d) Allofthe above Ans: d)17. are the main components in JOT a) Low power embedded systems b) Cloud computing ¢) Availability of big data, networking connection d) Allof the above Ans: d) 18. are the characteristics of OT a) Intelligence, scalable b) Security c) Heterogeneity d) Allof the above Ans: d) 19. What is loT? a) network of physical objects embedded with sensors b) network of virtual objects c) network of objects in the ring structure d) network of sensors Ans: a 20. Which of the following category is used for business to consumer process? a, Group [oT b. Community loT c. Personal loT d. Industrial loT Answer : d) 21. Who coined the term IoT? a) IBM b) Kevin Ashton ¢) Ross thaka d) Guido van Rossum Ans: b) 22. HoT stands for . a. Intense Internet of Things b. Index Intemet of Technology c. Industrial Intemet of Things d. Incorporate Internet of Technology Ans: c) 23. Identify among the following which is not a fundamental component of loT system. a) User interface b) Sensors c) Transformer d) Connectivity and data processing Ans: c)24. Identify the protocol used to link all devices in IoT, a) UDP b) TCP/IP c) HTTP d) Network Ans: b) 25. The term “TCP/IP” stands for : a. Transmission Contribution protocol/ internet protocol. b. Transmission Control Protocol/ internet protocol. c. Transaction Control protocol/ internet protocol. d. Transmission control Protocol/ internet protocol. Ans: b. Multiple choice questions on Cloud Computing 1) What type of computing technology refers to services and applications that typically run ona distributed network through virtualized resources? a) Distributed Computingb) Cloud Computing c) Soft Computingd) Parallel Computing Answer: b) 2) Which one of the following options can be considered as the Cloud? a) Hadoopb) Intranet ) Web Applicationsd) All of the above Answer: a) 3) Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as resources to users. a) Realb) Cloud ©) Virtual ) none of the above Answer: c) 4) Which one of the following cloud concepts is related to sharing and pooling the resources? a) Polymorphism b) Virtualization c) Abstraction d) None of the above Answer: b) 5) Which one of the following statements is not true? a) The popularization of the Internet actually enabled most cloud computing systems. b) Cloud computing makes the long-held dream of utility asa payment possible for you, with an infinitely scalable, universally available system, pay what you use. c) Soft computing addresses a real paradigm in the way in which the system is deployed. d) All of the above Answer: ¢) 106) Which one of the following can be considered as a utility is a dream that dates from the beginning of the computing industry itself? a) Computing) Model c) Softwared) All of the mentioned Answer: a) 7) Which of the following is an essential concept related to Cloud? a) Reliabilityb) Abstraction ) Productivityd) All of the mentioned Answer: b) 8). Which one of the following is Cloud Platform by Amazon? a) Azure b) AWS c) Cloudera c) All the above Answer: b) 9). Which of the following statements is not true? a) Through cloud computing, one can begin with very small and become big in a rapid manner b) All applications benefit from deployment in the Cloud. c) Cloud computing is revolutionary, even though the technology it is built on is evolutionary. d) None of the above Answer: b) 10) Which one of the following refers to the non-functional requirements like disaster recovery, security, reliability, etc. a) Service Development b) Quality of service ¢) Plan Development d) Technical Service Answer: b) 11) Which of the following provides the Graphic User Interface (GUI) for interaction with the cloud? a) Client b) Client Infrastructure ©) Application d) Server Answer: b) 12) Which one of the following a technology works behind the cloud computing platform? a) Virtualization b) SOA (Service-Oriented Architecture) c) Grid Computing d) All of the above Answer: d) 1.13) Which of the following is the correct full form of SaaS? a) Storage-as-a-Service b) Server-as-a-Software c) Software-as-a-Service d) None of the above Answer: ¢) 14). Which of the following is a characteristic of the SaaS applications? 1a) SaaS applications are reliable b) SaaS applications are not customizable &) SaaS applications ae customizable d) Non-reliable Answer: c) 15) Which one of the following statements is not true about SaaS? a) SaaS applications are offered in all shapes and sizes. b) Allusers with a little knowledge or know how to operate a computer also know about the SaaS. c) SaaS software is not customizable. 4) None of the above Answer: d) 16. The response time and transit time is used to measure the ofa network. a. Security. b. Longevity. c. Reliability. d. Performance. Ans: d. 17. Which of the following factor of the network gets hugely impacted when the number of users exceeds the network's limit? a. Reliability. b. Performance. c. Security. d. Longevity. Ans: d. 18. In the computer networks, the encryption techniques are primarily used for improving the Security. . Performance. Reliability. Longevity. Ansa: ¢ 19. Who is the father of cloud computing? a) Sharon B. Codd b) Edgar Frank Codd c) LCR. Licklider d) Charles Bachman Answer: ¢ pegs 1220. Which of the following is not a type of cloud server? a) Public Cloud Servers b) Private Cloud Servers c) Dedicated Cloud Servers d) Merged Cloud Servers ‘Ans: d) 21. Which of the following are the features of cloud computing? a) Security b) Availability c) Large Network Access d) All of the mentioned Answer: d 22. Which of the following is the application of cloud computing? a) Adobe b) Paypal c) Google G Suite d) All of the above Answer: d 23. Which of the following is an example of the cloud? a) Amazon Web Services (AWS) b) Dropbox c) Cisco WebEx d) All of the above Answer: d 24. Applications and services that run on a distributed network using virtualized resources is known as a) Parallel computing b) Soft computing c) Distributed computing d) Cloud computing Answer: d 25. Which of the following is the Cloud Platform provided by Amazon? a) AWS b) Cloudera c) Azure d) All of the mentioned Answer: a 26. Choose the correct IaaS provider among the following. a) EC2 b)-ECI c) ECIO d) Hybrid Answer: A 1327. Choose among the following, which are the characteristics of laaS. a). Highly scalable b) Flexible and dynamic platform c) Facilitates hardware access to many users d) All of the above Answer: D Multiple Choice question on Cyber Security 1) In which of the following, a person is constantly followed /chased by another person or group of several people? a) Phishing b)Bulling c) Stalking d) Identity theft Answer: ¢) 2). Which one of the following can be considered as the class of computer threats? a) Dos Attack b) Phishing” c) Soliciting —d) both a) and c) ‘Answer: a) 3). Which of the following is considered as the unsolicited commercial email? ‘a) Virus b) Malware c) Spam) all of the above Answer: c) 4)Which of the following usually observe cach activity on the intemet of the victim, gather all information in the background and send it someone else? a)Malware b) Spyware c) Adware —d) Alllof the above nswer: 5) - is a type of software designed to help the user to detect the viruses and avoid them. a) Malware b) Spyware c) Antivirus) Both b) and c) Answer: c) 6) Which one of the following is a type of antivirus program? a) Quick healb) Mcafee —_c) Kaspersky d) All of the above Answer: d) 7) It can be a software program or a hardware device that filters all data packets coming through the intemet ora network etc., it is known as the a) Antivirus b) Firewall c) Cookies d) Malware Answer: b) 8) Which of the following refers to stealing one's idea or invention of others and use it for their own benefits? a)Piracy —_b) Plagiarism c) Intellectual property rights d) All of the above Answer: d} 9) Which of the following refers to exploring the appropriate, cthical behaviors related to the online environment and digital media platform? a)Cyberlaw —b) Cyberethicsc) Cybersecurity _d) Cybersafety Answer: b} 1410) Which one of the following usually used in the process of Wi-Fi-hacking? a) Airerack-ng b) Wireshark c) Norton d) Allof the above Answer: a) 11) Insystem hacking, which of the following is the most crucial activity? a) Information gathering b) Covering tracks c) Cracking passwords d) None of the above Answer: c) 12). To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system. a) Antivirus b) Firewall ©) Vic player d) Script Answer: b) 13). Which of the following can be considered as the elements of cyber security? a) Application Security b) Operational Security c) Network Security d) Allofthe above Answer: d) 14) Which one of the following is also referred to as malicious software? a) Maliciousware b) Badware c) Ilegalware d) Malware Answer: d) 15) Hackers usually used the computer virus for purpose. a) To log, monitor each and every user's stroke b) To gain access the sensitive information like user's Id and Passwords c) To corrupt the user's data stored in the computer system d) Allofthe above Answer: 16. Which one of the following is a type of antivirus program? a. Quick Heal b. Mcafee. c. Kaspersky. d. All of the above. Answer: d. 1s17. Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform? a. Cyber Low. b. Cyber ethics. c. Cybersecurity. d. Cyber safety. Answer: b 18. Which one of the following refers to the technique used for verifying the integrity of the message? a. Digital Signature. b. Decryption algorithm. c. Protocol. d. Message Digest. Ans: d. 19. Which one of the following usually used in the process of Wi-Fi hacking? a. Aircrack-ng b. Wireshark. c. Norton Ans: a. 20. In ethical hacking and cyber security, there are types of scanning: al b. 2 c. 3 d. 4 Ans: c 21. Which of the following is not a type of scanning? a. Xmas Tree Scan. b. Cloud Scan. c. Null Scan. d. SYN Stealth. Ans: b. 22. In system hacking, which of the following is the most crucial activity? a. Information gathering. b. Covering tracks. c. Cracking passwords. d. None of the above. Ans: c. 1623. Which of the following are the types of scanning? a. Network, vulnerability, and port scanning. b. Port, network, and services. c. Client, Server, and network, d. None of the above. Ans: 24. To protect the computer system against the hacker and different king of viruses, one must always keep on in the computer system. a. Antivirus. b.Firewall. c. VLC Player. d. Script. Ans: b. 25. Which of the following can be considered as the clements of cyber security? a. Application Security. b. Operational Security. c. Network Security. d. All of the above. Ans: d. 26. Which of the following are famous and common cyber-attacks used by hackers to infiltrate the user's system? DDos and Derive-by Downloads. Malware &Malvertising. Phishing and Password attacks. d. All of the above. Ans: d. 2T. Which one of the following is also referred to as malicious software? a. Maliciousware. b. Badware. c. Illegalware. d. Malware. Ans: d. 28. Hackers usually used the computer virus for purpose. a. To log, monitor each and every user’s stroke. b. To gain access the sensitive information like user’s Id and Passwords. c. To corrupt the uscr’s data stored in the computer system. d. All of the above. Ans: d. 29. In Wi-Fi Security, which of the following protocol is more used? a. WPA. —b. WPA2. c.WPS. d. Both A and C Ans: b. e oP 7Multiple Choice question on Communication Module (Module -3) 1. Word communication is derived from Latin word A) Communicate B) Communicare C) Compute D) Computer Answer B 2. Types of words used for verbal communication? A) Acronyms B) Simple C) Technical D) Jargons Answer B 3. Which of the following shows a positive facial expression? A) Frowning while concentrating B) Maintaining eye contact C) Smiling continuously D) Rolling up your eyes Answer B 4. is a communication between small groups of individuals, typically in a face-to-face setting a. Inter-personal communication b. Intra Personal communication c. Mass communication d. None of these Answer A 5. Which of the following is not a component of effective communication? a. Source b. Message c. Channel d. Time Answer D 6. is the way in which a message or messages travel between source and receiver a. Source b. Message c. Channel d. Receive Answer C 187. The abilities to communicate properly are: Aj read B) write C) speak D)all of these Answer D 8. Which method is good for taking leave in the office. A) Website B) Posters C) e-mail D) business meetings Answer C 9. The word Commiinicare means in Latin. Ato deliver B) to share C) to present D) to sacrifice Answer B 10. To understand the message properly the receiver need to the message properly. A) transmit B) throw C) listen D) ignore Answer C 11. What is the final step in the communication cycle? A) Encoding B) Decoding C) Feedback D) Receiving Answer C 12. The process in which the receiver interprets and understands the message is called A) Decoding B) Encoding C) Feedback 1D) None of these Answer A 13. Which of the following is an example of oral communication? A) Newspapers B) Letters C) Phone call D) e-mail Answer C 1914. “Two girls talking over a phone” ~is an example of... A) interpesonal communication B) written communication C) small group communication D) public communication Answer A 15, Pointing finger to something is an example of. A Expressions B) Gestures ©) Body Language D) Para Language Answer B 16. The response to a sender’s message is called as Transmission a. b. Message c. Channel d. Feedback Answer D 17. Communication is a non-stop, a. Programme b. Plan c. Process d Play Answer C 18. Which of the following listens or understands the message? a. Receiver b. Channel c. Sender d. None of the above Answer A 19. An effective speaker is the one who is a. speaking appropriately whilst maintaining cye contact with the audience. b. using varied vocabulary. c. _using varied articulate speech to suit the need of the audience. d. —_Allof the above Answer D 20. is the ‘sharing’ of information between two or more individuals or within a group to reach a common understanding. a. Common b. Communication c. Writing d. Reading Answer B 2021. One can improve communication skill ‘A Pausing when required B Asking Open-ended questions a. Answer A only b, Answer B only c. Both A and B d. Neither A nor B Answer C 22. Choose the right order of steps to communicate effectively a. Aim, Message, Channel, audience, Story, Review b. audience, Aim, Message, Story, Channel, Review c. Aim, Audience, Message, Channel, story, Review d. Audience, Message, Aim, Story, Review, Channel Answer C 23. How not to speak So That People Want to Listen a. Gossip b. Complaining c. Negatively d. Alllof these Answer D 24, Choose the Correct abbreviation for HAIL in communication a. Honesty Authenticity Integrity Love b. Honesty, Authority Integrity Love c. Harmony, Authenticity, Integrity, Love d. Hearty, Appreciative, Indigenous, Limit Answer A 25. There are 6 steps that can be used for strategic communication. Five of them are Aim, Review, Message, Story and Audience. Which is the sixth step? a. Paths b. Channels c. Ways d. Feedback Answer B 26. When you're listening to others, pay as much attention to them as you can. Which of the following should you notice about the speaker? A. Their words. B, Quirks in their body language a. Only A b. Only B c. Both AandB d. None Answer C 2127. Which non-verbal aspect makes the most impact in verbal face-to-face communication? a. Eye Contact b. Professional Attire c. Communication Venue d. Language Answer A 28. A communication is anything that comes in the way of receiving and understanding messages that one sends to another to convey his ideas, thoughts, or any other kind of information a. Skill b. Barrier c. Channel d.None Answer B 29. Which of the following are barriers of effective communication? a. Disengagement b. Lack of focus and attention c. Cultural Difference d. All of these Answer D 30. Speech problem, impaired eyesight, or any physical illness are the example of which communication barrier a. Lack of Knowledge b. Being Judgmental c. Differences in perception d. Physical disability Answer D 31. Poor lighting is an example of, a. Physical barrier of communication b. Physiological barrier c. Technical Jargon d. none of these Answer A 32. Information Overload is a of communication a. Barrier b. Substitute c. Exception d. none of these Answer A. 2233. arise when two individuals in an organisation belong to different religion, states or countries. . Physical Barriers b. Cultural Barriers c. Perceptional barriers d. Emotional barriers p Answer B 34. To overcome and prevent communication challenge at work one can a. Maintain eye contact b. Request and provide feedback c. Focus on what the other person is saying d. All of these Answer D 35. Which of the following can be called a ‘perceptual’ barrier to communication? a. Negative feeling b. Cultural norms c. Pre-made assumptions d. none of the above Answer C 36. barrier include using of jargon, abbreviations and unfamiliar expression a. Language barrier b. Perception barrier c. Cultural Barriers d. Emotional barrier Answer A 37. is the person who notices and decodes and attaches some meaning to a message. a. Driver b. Sender c. Source d. Receiver Answer D 38 Your dress code is an example of a. Oral communication b. Written communication c. Non-verbal communication d. Spoken Answer C a39. At cach stage in the process of communication, there is a possibility of interference which may hinder the process. Such interference is known as ___. a. sender b. receiver c. barrier d. none of them Answer C 40.Weuse___and____in addition to words when we speak. a. words and gestures b. gestures and body language c. body language and posture d. posture and eye gazing Answer B 41.____ refers to pitch, loudness, duration, intonation and, tempo. a. touches b. prosody c. gestures d. haptics Answer B 42. Communication through ___ and ____is called verbal communication a. written material and gestures b. gestures and spoken words c. spoken words and written material d. body language and gestures Answer C
You might also like
Sample Paper Assistant Manager CS
PDF
No ratings yet
Sample Paper Assistant Manager CS
5 pages
Business Computing MCQ
PDF
No ratings yet
Business Computing MCQ
9 pages
IT Specialist Officer Study Material-DBMS
PDF
No ratings yet
IT Specialist Officer Study Material-DBMS
8 pages
Question Bank - Digital Fluency
PDF
No ratings yet
Question Bank - Digital Fluency
27 pages
DIGITAL FLUENCY MCQ's-Material (Complete Syllabus)
PDF
No ratings yet
DIGITAL FLUENCY MCQ's-Material (Complete Syllabus)
37 pages
Sybca Bigdata MCQ
PDF
No ratings yet
Sybca Bigdata MCQ
7 pages
DWDM Unit - 1 MCQ: by Arpit Sharma 01629802018
PDF
No ratings yet
DWDM Unit - 1 MCQ: by Arpit Sharma 01629802018
27 pages
Irs Question Papers
PDF
No ratings yet
Irs Question Papers
6 pages
Bigdata-Bigdata (Set 1)
PDF
No ratings yet
Bigdata-Bigdata (Set 1)
11 pages
Important Questions and Answers of Big Data Course
PDF
No ratings yet
Important Questions and Answers of Big Data Course
4 pages
CO1-CC-PPT Session-2
PDF
100% (1)
CO1-CC-PPT Session-2
14 pages
Unit I DM
PDF
No ratings yet
Unit I DM
27 pages
DATA ANALYTICS QUESTION BANK
PDF
No ratings yet
DATA ANALYTICS QUESTION BANK
4 pages
Business Intelligence Unit 2 Chapter 1
PDF
100% (1)
Business Intelligence Unit 2 Chapter 1
7 pages
NN Question Bank VIISem
PDF
No ratings yet
NN Question Bank VIISem
42 pages
(Ebook) Image and Video Processing in the Compressed Domain by Jayanta Mukhopadhyay ISBN 1439829357 instant download
PDF
100% (1)
(Ebook) Image and Video Processing in the Compressed Domain by Jayanta Mukhopadhyay ISBN 1439829357 instant download
56 pages
Unit 1
PDF
No ratings yet
Unit 1
15 pages
Urban Street Cleanliness Assessment Using Mobile Edge Computing and Deep Learning
PDF
No ratings yet
Urban Street Cleanliness Assessment Using Mobile Edge Computing and Deep Learning
22 pages
Distributed Database Transparency Features
PDF
No ratings yet
Distributed Database Transparency Features
6 pages
Chapter 10
PDF
No ratings yet
Chapter 10
21 pages
The Oxford College of Engineering SSR
PDF
100% (1)
The Oxford College of Engineering SSR
303 pages
Cyber Security Assignment
PDF
No ratings yet
Cyber Security Assignment
9 pages
CYBER SECURITY SCORE BOOSTER
PDF
No ratings yet
CYBER SECURITY SCORE BOOSTER
37 pages
TYCS - Data Science MCQ
PDF
No ratings yet
TYCS - Data Science MCQ
6 pages
Sawtooth Software: Analysis of Traditional Conjoint Using Microsoft Excel: An Introductory Example
PDF
No ratings yet
Sawtooth Software: Analysis of Traditional Conjoint Using Microsoft Excel: An Introductory Example
7 pages
BlockChain Sample Paper
PDF
No ratings yet
BlockChain Sample Paper
4 pages
IR Models: - Why IR Models? - Boolean IR Model - Vector Space IR Model - Probabilistic IR Model
PDF
No ratings yet
IR Models: - Why IR Models? - Boolean IR Model - Vector Space IR Model - Probabilistic IR Model
46 pages
Unit 1 Question and Answers
PDF
100% (1)
Unit 1 Question and Answers
29 pages
Unit - 3 Ir Questionbank
PDF
No ratings yet
Unit - 3 Ir Questionbank
27 pages
Question Bank - Unit 1
PDF
No ratings yet
Question Bank - Unit 1
5 pages
Cost Sheet Using Inheritance
PDF
No ratings yet
Cost Sheet Using Inheritance
7 pages
T.Y.B.Sc.C.S. Sem VI Ethical Hacking Sample Quwstions
PDF
No ratings yet
T.Y.B.Sc.C.S. Sem VI Ethical Hacking Sample Quwstions
13 pages
Elmasri and Navathe DBMS Concepts 25
PDF
No ratings yet
Elmasri and Navathe DBMS Concepts 25
10 pages
Total Marks (15 Qns 1 Mark 15 Marks) : Business Intelligence and Analytics Assignment Week 1
PDF
No ratings yet
Total Marks (15 Qns 1 Mark 15 Marks) : Business Intelligence and Analytics Assignment Week 1
29 pages
Cse357 MCQ
PDF
No ratings yet
Cse357 MCQ
28 pages
Data Science Module1
PDF
No ratings yet
Data Science Module1
20 pages
Cloud Computing MCQ (Multiple Choice Questions)
PDF
No ratings yet
Cloud Computing MCQ (Multiple Choice Questions)
11 pages
[IJCST-V12I6P9]:Mrs.N.Dhivya, Mrs.S.Senthamarai Selvi, R.Gayathri
PDF
No ratings yet
[IJCST-V12I6P9]:Mrs.N.Dhivya, Mrs.S.Senthamarai Selvi, R.Gayathri
5 pages
Data Science 100 MCQs
PDF
No ratings yet
Data Science 100 MCQs
16 pages
T.Y.B.Sc. It Sem Vi SIC MCQ-Unit-2
PDF
100% (1)
T.Y.B.Sc. It Sem Vi SIC MCQ-Unit-2
5 pages
PPT Unit 1
PDF
No ratings yet
PPT Unit 1
93 pages
Course - DBMS: Course Instructor Dr. Umadevi V Department of CSE, BMSCE
PDF
No ratings yet
Course - DBMS: Course Instructor Dr. Umadevi V Department of CSE, BMSCE
43 pages
Computer Set-2 - 5887523
PDF
No ratings yet
Computer Set-2 - 5887523
9 pages
Data Mining and Warehousing
PDF
No ratings yet
Data Mining and Warehousing
12 pages
BCA4001
PDF
No ratings yet
BCA4001
16 pages
MCQS For Virtualization
PDF
No ratings yet
MCQS For Virtualization
7 pages
Guidelines For Data On Publications INFLIBNET PDF
PDF
No ratings yet
Guidelines For Data On Publications INFLIBNET PDF
4 pages
Big Data Question Bank
PDF
No ratings yet
Big Data Question Bank
38 pages
BI Module 4 Notes
PDF
No ratings yet
BI Module 4 Notes
31 pages
Chapter 3. Big Data Adoption and Planning Considerations
PDF
No ratings yet
Chapter 3. Big Data Adoption and Planning Considerations
70 pages
Disk Storage, Basic File Structures, and Hashing: Dr. Hasnaa Raafat Dr. Nora Zakie
PDF
No ratings yet
Disk Storage, Basic File Structures, and Hashing: Dr. Hasnaa Raafat Dr. Nora Zakie
31 pages
DBMS MCQ-1 Beltron_51652521_2025_02_27_23_32
PDF
No ratings yet
DBMS MCQ-1 Beltron_51652521_2025_02_27_23_32
49 pages
ESC-CSBS601 PEC-IT602D Pattern Recognition
PDF
100% (1)
ESC-CSBS601 PEC-IT602D Pattern Recognition
2 pages
Attribute Oriented Induction
PDF
100% (1)
Attribute Oriented Induction
6 pages
CSE332 MCQs - Industry Ethics
PDF
No ratings yet
CSE332 MCQs - Industry Ethics
29 pages
Digital fluency_Question Bank
PDF
No ratings yet
Digital fluency_Question Bank
36 pages
Digital Fluency (Answer Key)
PDF
100% (4)
Digital Fluency (Answer Key)
48 pages
Vani Vidyalaya Senior Secondary and Junior College: Answer
PDF
No ratings yet
Vani Vidyalaya Senior Secondary and Junior College: Answer
7 pages
Emerging New Mid Exams Collection ExamClass
PDF
No ratings yet
Emerging New Mid Exams Collection ExamClass
28 pages