Description : There exists two way to infer using semantic networks in which knowledge is represented as Frames. 1) Intersection Search 2) Inheritance Search a) True b) False
Last Answer : 1) Intersection Search
Description : The basic inference mechanism in semantic network in which knowledge is represented as Frames is to follow the links between the nodes. a) True b) False
Last Answer : a) True
Description : Like semantic networks, frames can be queried using spreading activation. a) True b) False
Description : Frames in artificial intelligence is derived from semantic nets. a) True b) False
Description : People overcome natural language problems by _____________ a) grouping attributes into frames b) understanding ideas in context c) identifying with familiar situations d) both understanding ideas in context & identifying with familiar situations
Last Answer : d) both understanding ideas in context & identifying with familiar situations
Description : Suppose that the number of instructions executed between page faults is directly proportional to the number of page frames allocated to a program. If the available memory is doubled, the mean interval between page faults is also ... memory were available? (A) 60 sec (B) 30 sec (C) 45 sec (D) 10 sec
Last Answer : Answer: C Explanation: T = Ninstr x 1µs + 15,000 x 2,000 µs = 60s Ninstr x 1µs = 60,000,000 µs - 30,000,000 µs = 30,000,000 µs Ninstr = 30,000,000 The number of instruction ... doesn't mean that the program runs twice as fast as on the first system. Here, the performance increase is of 25%.
Description : Determine the maximum length of the cable (in km) for transmitting data at a rate of 500 Mbps in an Ethernet LAN with frames of size 10,000 bits. Assume the signal speed in the cable to be 2,00,000 km/s. b. 2 c. 2.5 d. 5
Last Answer : b. 2
Description : What are the advantages of neural networks over conventional computers? (i) They have the ability to learn by example (ii) They are more fault tolerant (iii)They are more suited for real time operation due to their high ... true b) (i) and (iii) are true c) Only (i) d) All of the mentioned
Last Answer : d) All of the mentioned
Description : Fiber optics posses following properties __________ a) Immune electromagnetic interference b) Very less signal attenuation c) Very hard to tap d) All of the mentioned
Description : What are the limitations of the semantic networks? a) Intractability b) Lack in expressing some of the properties c) Incomplete d) Has memory constraints
Last Answer : b) Lack in expressing some of the properties
Description : With an example, show objects, properties functions and relations.
Last Answer : Example “EVIL KING JOHN BROTHER OF RICHARD RULED ENGLAND IN 1200” Objects : John, Richard, England, 1200 Relation : Ruled Properties : Evil, King Functions : BROTHER OF
Description : List some properties of SMA* search.
Last Answer : * It will utilize whatever memory is made available to it. * It avoids repeated states as for as its memory allow. * It is complete if the available memory is sufficient to store ... available for entire search tree, the search is optimally efficient. *Hill climbing. *Simulated annealing.
Description : List the properties of environments.
Last Answer : o Fully Observable Vs Partially Observable o Deterministic Vs Stochastic o Episodic Vs Sequential o Static Vs Dynamic o Discrete Vs Continuous o Single Agent Vs Multi agent a. Competitive Multi agent b.Co – operative Multi agent
Description : Machine can perform any task better than human with cognitive properties is known as ___ AI. A. Narrow AI B. General AI C. Super AI D. None of above
Last Answer : C. Super AI
Description : In an Ethernet local area network, which one of the following statements is TRUE ? a. A station stops to sense the channel once it starts transmitting a frame. b. The purpose ... collision is detected. d. The exponential backoff mechanism reduces the probability of collision on retransmissions
Last Answer : The exponential backoff mechanism reduces the probability of collision on retransmissions
Description : SONET frames have considerably more ____________________ than do DS frames for information about signal routing and setup.
Last Answer : overhead
Description : What is the name for information sent from robot sensors to robot controllers? a) temperature b) pressure c) feedback d) signal
Last Answer : c) feedback
Description : What kind of signal is used in speech recognition? a) Electromagnetic signal b) Electric signal c) Acoustic signal d) Radar
Last Answer : c) Acoustic signal
Description : Neuron can send ________ signal at a time. A. multiple B. one C. none D. any number of
Last Answer : B. one
Description : Each connection link in ANN is associated with ________ which has information about the input signal. A. neurons B. weights C. bias D. activation function
Last Answer : B. weights
Description : MCC is investigating the improvement of the relationship between people and computers through a technology called ___________ a) computer-aided design b) human factors c) parallel processing d) all of the mentioned
Last Answer : b) human factors
Description : There are also other operators, more linguistic in nature, called __________ that can be applied to fuzzy set theory. a) Hedges b) Lingual Variable c) Fuzz Variable d) None of the mentioned
Last Answer : a) Hedges
Description : What is called inconsistent support? a) If two literals are not negation of other b) If two literals are negation of other c) Mutually exclusive d) None of the mentioned
Last Answer : b) If two literals are negation of other
Description : Which knowledge base is called as fixed point? a) First-order definite clause are similar to propositional forward chaining b) First-order definite clause are mismatch to propositional forward chaining c) All of the mentioned d) None of the mentioned
Last Answer : a) First-order definite clause are similar to propositional forward chaining
Description : When the resolution is called as refutation-complete? a) Sentence is satisfiable b) Sentence is unsatisfiable c) Sentence remains the same d) None of the mentioned
Last Answer : b) Sentence is unsatisfiable
Description : Which form is called as a conjunction of disjunction of literals? a) Conjunctive normal form b) Disjunctive normal form c) Normal form d) All of the mentioned
Last Answer : a) Conjunctive normal form
Description : Which is also called single inference rule? a) Reference b) Resolution c) Reform d) None of the mentioned
Last Answer : b) Resolution
Description : What is called as transposition table? a) Hash table of next seen positions b) Hash table of previously seen positions c) Next value in the search d) None of the mentioned
Last Answer : b) Hash table of previously seen positions
Description : Which search strategy is also called as blind search? a) Uninformed search b) Informed search c) Simple reflex search d) All of the mentioned
Last Answer : a) Uninformed search
Description : What is called an exploration problem? a) State and actions are unknown to the agent b) State and actions are known to the agent c) Only actions are known to agent d) None of the mentioned
Last Answer : a) State and actions are unknown to the agent
Description : Law of octaves says that if the chemical elements are arranged according to increasing atomic weight, those with similar physical and chemical properties occur after each interval of elements
Last Answer : 7
Description : What height of an ionized layer is determined from the time interval between the transmitted signal and the ionospheric echo at vertical incidence? A. Virtual height B. Apparent height C. Actual height D. Effective height
Last Answer : A. Virtual height
Description : The time interval that a waveform is high (or low) is the ___ of the signal.
Last Answer : pulse width
Description : In which of the following situations might a blind search be acceptable? a) Real life situation b) Complex game c) Small search space d) All of the mentioned
Last Answer : c) Small search space
Description : The component of an ICAI (Intelligent Computer Assisted Instruction) presenting information to the student is the? a) Student model b) Problem solving expertise c) Tutoring module d) All of the mentioned
Last Answer : c) Tutoring module
Description : When a top-level function is entered, the LISP processor does? a) It reads the function entered b) It prints the result returned by the function c) Large memory and high-speed processor d) All of the mentioned
Last Answer : b) It prints the result returned by the function
Description : How can you evaluate 1.25 + sqrt (144) in LISP? a) 1.25+sqrt (1.44) b) (1.25+sqrt (1.44)) c) (+1.25 sqrt (1.44) d) All of the mentioned
Last Answer : c) (+1.25 sqrt (1.44)
Description : Which of the following contains output segments of AI programming? a) Printed language and synthesized b) Manipulation of physical object c) Locomotion d) All of the mentioned
Description : Which technique is being investigated as an approach to automatic programming? a) generative CAI b) specification by example c) non-hierarchical planning d) all of the mentioned
Last Answer : b) specification by example
Description : In which of the following areas may ICAI programs prove to be useful? a) educational institutions b) corporations c) department of Defense d) all of the mentioned
Last Answer : d) all of the mentioned
Description : For speech understanding systems to gain widespread acceptance in office automation, they must feature ____________ a) speaker independence b) speaker dependence c) isolated word recognition d) all of the mentioned
Last Answer : a) speaker independence
Description : In AI programming, a list may contain ___________ a) cells b) fields c) pointers d) all of the mentioned
Description : A KES knowledge base contains information in the form of ___________ a) associations b) actions c) free text d) all of the mentioned
Description : In LISP, which of the following function assigns the value 10 to the symbol a? a) (setq a 10) b) (a = b) where b = 10 c) (a = 10) (d) (setq 10 a) d) All of the mentioned
Last Answer : a) (setq a 10)
Description : What is Weak AI? a) the embodiment of human intellectual capabilities within a computer b) a set of computer programs that produce output that would be considered to reflect intelligence if it ... the study of mental faculties using mental models implemented on a computer d) all of the mentioned
Last Answer : c) the study of mental faculties using mental models implemented on a computer
Description : Which of the following is a project of the Strategic Computing Program? a) Defense Advanced Research Projects Agency b) National Science Foundation c) Jet Propulsion Laboratory d) All of the mentioned
Last Answer : a) Defense Advanced Research Projects Agency
Description : Prior to the invention of time-sharing, the prevalent method of computer access was ____________ a) batch processing b) telecommunication c) remote access d) all of the mentioned
Last Answer : a) batch processing
Description : Given a sound clip of a person or people speaking, determine the textual representation of the speech. a) Text-to-speech b) Speech-to-text c) All of the mentioned d) None of the mentioned
Last Answer : b) Speech-to-text
Description : Many words have more than one meaning; we have to select the meaning which makes the most sense in context. This can be resolved by ____________ a) Fuzzy Logic b) Word Sense Disambiguation c) Shallow Semantic Analysis d) All of the mentioned
Last Answer : b) Word Sense Disambiguation