Welcome to the Emerging Technologies Skill Level Assessment QUIZ! Measure your skill level by taking a quiz here and discover your unique strengths ! This quiz has 30 questions and will take approximately 5-7 mins. 1) Which is the online advertising pricing model to denote the price of thousand advertisement impressions on one webpage? CPA CPC CPL CPM2) A process of making changes to web pages and content to improve visibility is called Search engine optimization Search engine results page Search engine marketing Social Media optimization3) Which method is used for outbound marketing Direct email Social marketing Content Marketing Search Engine optimization4) Which of the below is an example of SaaS Goggle Compute Engine Microsoft Azure Amazon Web Services Salesforce5) In cloud computing, which of the below datacentre deployment models refers to when equipment’s are established far apart Containerized Datacenter High Density Datacenter Low Density Datacenter Medium Density Datacenter6) Which of the below is an open source software IaaS platform launched by Rackspace and Nasa for private clouds and public clouds, it enables companies to efficiently add servers, storage and networking components to their cloud. CloudStack Openstack OpenNebula Eucalyptus7) Which of the below is not an example of NoSQL database CouchDB Mysql HBase MongoDB8) Which of the below enables dynamic resource utilization on Hadoop Framework Yarn HDFS (Hadoop Distributed file system) MapReduce Hive9) Which of the below tool is not used for data analytics HdbaseT Excel Tableau Google Search operators10) Which of the below protocols are used for IOT communications? XMPP SFTP HTTP MQTT11) Which is the open-source platform based on easy-to-use hardware and software to implement IoT applications? Ambari Caffe Arduino H2O12) In the different levels of Wearable technology, the smart watch falls under which level of wearable technology Carried Mounted Embedded Intimate13) Which of these is not a characteristic of Blockchain? Smart contracts Shared Ledger Regulatory Consensus14) All Bitcoin transactions are recorded in the blockchain, in a linear, time-stamped series of bundled transactions known as Peer-to-peer Private Key Hash Blocks15) Which of the below is open source blockchain platform developed by Linux foundation? R3’s Corda Ethereum Hyperledger Waves16) Which of these areas of AI creates a learning system for computers like human brain? Robotics Artificial Neural networks Image processing Natural Language processing17) Method of learning in which AI knows the answer and it knows the question. It defines patterns between question and answer Unsupervised Learning Supervised Learning Transfer Learning Reinforcement learning18) The hardware and software that provide entertainment in an autonomous vehicle is called GPU IVI HMI IVE19) PokemonGo is an example of Augmented Reality Alternate Reality Virtual Reality Mixed Reality20) Which platform is used for VR development Wikitude Vuforia EasyAR Unity3D21) Augmented Reality can be experienced using Oculus Rift False True22) Robotic process automation (RPA) can be defined as a software or technology that perform sequence of tasks like human and mimic the way people interact with software applications without human intervention All of them Integration using API based automation when business process involves accessing application of different era’s a script that runs in the background and generated reports23) Which is the primary factors that influence our decision in selecting which is the right RPA tool fit for the project Interfaces Industry Technology Infrastructure24) Automation process that uses Heuristics and defines its processes based on previous experiences is called Intelligent Process Automation Enterprise RPA Autonomics Adaptive Automation25) A technology that allows transmission of data via a computer without having to be connected physically is called Physical Computing Pervasive computing Cloud Computing Mobile computing26) Swift is used to develop mobile apps for Android Windows phone All of them iPhone27) A set of rules that define interactions between software components and are created for libraries, OS and applications is called SOA XML ESB API28) The practice of gathering and analyzing computer related data for investigative purposes in a manner that maintains the integrity of the data is Business Impact Analysis Risk Analysis Forensics Exposure Analysis29) In the field of cyber security, worm is Malware that is loaded into a computer and runs without users knowledge Malware that passes information about user activities to external elements Malware that replicates itself and spreads to other computers Malware that uses macro capabilities of word/Excel etc to infect data30) An approach to data backup in which real-time duplicates of critical files are maintained at a remote processing site Transaction Log Backup Tail Log Backup Shadow database Secondary Database Name Email ( Only required if you would like a copy of your results sent to your email)