Welcome to the Emerging Technologies Skill Level Assessment QUIZ! Measure your skill level by taking a quiz here and discover your unique strengths ! This quiz has 30 questions and will take approximately 5-7 mins. 1) Which is the online advertising pricing model to denote the price of thousand advertisement impressions on one webpage? CPM CPC CPL CPA2) A process of making changes to web pages and content to improve visibility is called Search engine marketing Search engine results page Search engine optimization Social Media optimization3) Which method is used for outbound marketing Direct email Content Marketing Social marketing Search Engine optimization4) Which of the below is an example of SaaS Amazon Web Services Microsoft Azure Goggle Compute Engine Salesforce5) In cloud computing, which of the below datacentre deployment models refers to when equipment’s are established far apart Containerized Datacenter Low Density Datacenter Medium Density Datacenter High Density Datacenter6) Which of the below is an open source software IaaS platform launched by Rackspace and Nasa for private clouds and public clouds, it enables companies to efficiently add servers, storage and networking components to their cloud. Eucalyptus Openstack OpenNebula CloudStack7) Which of the below is not an example of NoSQL database MongoDB HBase CouchDB Mysql8) Which of the below enables dynamic resource utilization on Hadoop Framework HDFS (Hadoop Distributed file system) MapReduce Yarn Hive9) Which of the below tool is not used for data analytics Excel Google Search operators Tableau HdbaseT10) Which of the below protocols are used for IOT communications? SFTP XMPP HTTP MQTT11) Which is the open-source platform based on easy-to-use hardware and software to implement IoT applications? Caffe H2O Arduino Ambari12) In the different levels of Wearable technology, the smart watch falls under which level of wearable technology Intimate Embedded Mounted Carried13) Which of these is not a characteristic of Blockchain? Consensus Smart contracts Regulatory Shared Ledger14) All Bitcoin transactions are recorded in the blockchain, in a linear, time-stamped series of bundled transactions known as Private Key Peer-to-peer Hash Blocks15) Which of the below is open source blockchain platform developed by Linux foundation? Hyperledger R3’s Corda Waves Ethereum16) Which of these areas of AI creates a learning system for computers like human brain? Artificial Neural networks Robotics Natural Language processing Image processing17) Method of learning in which AI knows the answer and it knows the question. It defines patterns between question and answer Supervised Learning Unsupervised Learning Reinforcement learning Transfer Learning18) The hardware and software that provide entertainment in an autonomous vehicle is called GPU IVI IVE HMI19) PokemonGo is an example of Mixed Reality Alternate Reality Virtual Reality Augmented Reality20) Which platform is used for VR development Unity3D EasyAR Wikitude Vuforia21) Augmented Reality can be experienced using Oculus Rift False True22) Robotic process automation (RPA) can be defined Integration using API based automation when business process involves accessing application of different era’s as a software or technology that perform sequence of tasks like human and mimic the way people interact with software applications without human intervention a script that runs in the background and generated reports All of them23) Which is the primary factors that influence our decision in selecting which is the right RPA tool fit for the project Industry Infrastructure Interfaces Technology24) Automation process that uses Heuristics and defines its processes based on previous experiences is called Adaptive Automation Autonomics Enterprise RPA Intelligent Process Automation25) A technology that allows transmission of data via a computer without having to be connected physically is called Cloud Computing Mobile computing Physical Computing Pervasive computing26) Swift is used to develop mobile apps for iPhone Windows phone Android All of them27) A set of rules that define interactions between software components and are created for libraries, OS and applications is called API ESB XML SOA28) The practice of gathering and analyzing computer related data for investigative purposes in a manner that maintains the integrity of the data is Forensics Exposure Analysis Risk Analysis Business Impact Analysis 29) In the field of cyber security, worm is Malware that replicates itself and spreads to other computers Malware that passes information about user activities to external elements Malware that uses macro capabilities of word/Excel etc to infect data Malware that is loaded into a computer and runs without users knowledge30) An approach to data backup in which real-time duplicates of critical files are maintained at a remote processing site Secondary Database Shadow database Transaction Log Backup Tail Log Backup Name Email ( Only required if you would like a copy of your results sent to your email)