National Online Quiz Competition On Emerging Technologies For Defense Transformation with Certificate

Online quiz competition

Organizer : ARMY INSTITUTE OF MANAGEMENT (AIMK)
New Town, Rajarhat, Kolkata-700160 (ISO 9001:2015 CERTIFIED INSTITUTE)

National Online Quiz Competition On Emerging Technologies For Defense Transformation

About the Quiz Competition

  • The Quiz will be based on basic knowledge of emerging technologies and their applications. >The Quiz is open to all.
  • No Registration or Fees are required to participate in this Quiz.
  • E-Certificates shall be given to all the participants who will actually complete the quiz with min 50% marks and the certificates will be sent to the e-mail ids of the successful participants.
  • One of the top scorer will additionally get memento, medal and hard copy of appreciation certificate In case of any ambiguity, the decision of the Organizers shall be final and binding.

Apply Link

For Any Queries, Contact Ph: 9999727160

Email:
kundu.prasenjit@aim.ac.in
Website: https://www.aim.ac.in

100% Correct Answers Available Here

Most obvious risk associated with Big Data is ……..*
1/1

Type of storage risk
Data Storage and retention risk
Storage Performance risk
Data Reduction Risk

Match the followings*
Augmented Reality Remote Training 1
Image processing; 2
Internet Of Things: 3

Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?*
2/2
Piracy
Plagiarism
Intellectual property rights
All of the above

Target Recognition and Adaption in Contested Environments (TRACE) program gets benefit from Synthetic-Aperture Radar (SAR) images to locate and identify targets by using ____ techniques.*
2/2

Machine Learning
Cyber Security
Data mining
Cryptography

Financial Fraud analytics can be implemented to protect economical disordering using
2/2

Data mining
Bit coins and Payment Gateways
Block chain and digital signatur
Machine learning & Sensor Technologies

___ is a digital payment system that doesn’t rely on banks to verify transactions.*
1/1
Blockchain
Cryptocurrency
Bit coin
NEFT

Hackers usually used the computer virus for __ purpose.*
2/2
To log, monitor each and every user’s stroke
To gain access the sensitive information like user’s Id and Passwords
To corrupt the user’s data stored in the computer system
All of the above

A  military aircraft inspect the sensitive area across border line in a  circular path of radius 70km. If he completes one round in 11mins, calculate the total length of the path.*
2/2
40m
440km
440m
11m

The sensors based  Polygraph test typically record a person’s  following details*
2/2
breathing rate
pulse rate
blood pressure
all of the above

Data visualization tools provide an accessible way to see and understand ……………….. in data.*
2/2
Trends
Outliers
Patterms
All of the above

By embedding AI into weapons and land, naval, airborne, space systems, autonomous and high-speed weapons usage has empowered. Therefore, AI is integrated in military logistics and transportation  to decrease transportation cost and the followings :                      [ Select three options from below]*
3/3

Anomaly detection and component failure predictions
Reduce human efforts
Increase security protection
Drones with integrated AI can be used to patrol border areas.

The below picture is an example of __ monitoring & parking system.*
2/2

machine learning based
AI based
IOT and Sensors based
Big Data based

Considering the below graph, which of the following option is truly examples of unstructured data?*
2/2

Audio data
Text, Graphics & Audio Data
Audio, Video & text data
Audio, Video & Sensors data
Other:

The below image during defense training is an application of which of the following emerge ring   technique?*
2/2

Machine Learning
Internet o Things
Argument Reality
Big Data Technology

Data Cleaning in  Defense mainly deals with*
2/2

identify and removing inconsistence records
missing and duplicate values
Both the above two points
None of the point

Disclaimer :  Part of the image(s), concepts use in this G-form are taken from public internet domain  purely for academic and knowledge sharing purpose only.

error: Content is protected !!
Scroll to Top