Summary

This is a past exam paper from Nanyang Technological University covering computational thinking techniques. The quiz contains questions on topics such as computational thinking techniques and quantitative reasoning techniques, and covers various aspects of these topics.

Full Transcript

lOMoARcPSD|24726182 CC0002 Exam PYP Navigating world (Nanyang Technological University) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by gloomyy panfa ([email protected]) ...

lOMoARcPSD|24726182 CC0002 Exam PYP Navigating world (Nanyang Technological University) Scan to open on Studocu Studocu is not sponsored or endorsed by any college or university Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Topic: 1: Computational Thinking Techniques Qn: 1 Alice, Bob, and Eve are having a school project. Alice as a team leader decided to divide the task for everyone. Bob will be in charge in writing the report, Eve will be responsible for collecting the data, and Alice will be left with doing the analysis. What type of competence does Alice displayed in this scenario? 1. Abstraction 2. Pattern Recognition 3. Algorithm 4. Decomposition Selected Answer: Option 4; Topic: 1: Computational Thinking Techniques Qn: 2 Which of the following is not an example of computational thinking approach? 1. Allowing your friends to decide which restaurant to dine in 2. Discuss with your friends to decide which restaurant to dine in with respects to time and cost 3. Looking at the menu to decide which restaurant to dine in 4. All of the above Selected Answer: Option 1; file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 1/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Topic: 1: Computational Thinking Techniques Qn: 3 When trying to identify the number of side of different shapes, which of the following components of computation thinking is being used? 1. Pattern recognition 2. Abstraction 3. Algorithm 4. Decomposition Selected Answer: Option 1; Topic: 1: Computational Thinking Techniques Qn: 4 What competence of computational thinking describes the process of removing unnecessary details and leaving only the information that we need? 1. Abstraction 2. Pattern Recognition 3. Algorithm 4. Decomposition Selected Answer: Option 1; Topic: 1: Computational Thinking Techniques file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 2/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 5 Which of the following are considered an example of demonstration of algorithm competence in daily life? 1. A sailor using star to navigate their position in the sea 2. A recipe on how to cook a burger 3. A fighter finding a weak point of his opponent 4. A company consist of many departments to help it operates Selected Answer: Option 2; Topic: 1: Computational Thinking Techniques Qn: 6 These are the advantages of decomposition, except 1. Turn complex problem into many smaller problems that are easier to solve 2. Allows you to easily split the work when you work on a team 3. Understanding/representing problems becomes easier since the unnecessary details is filtered out 4. Identifying pattern becomes easier since it can be done on smaller problems Selected Answer: Option 3; Topic: 1: Computational Thinking Techniques Qn: 7 Decomposition makes problem 1. More complicated 2. Harder to solve file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 3/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Easier to understand 4. Easier to manage Selected Answer: Option 3;Option 4; Topic: 1: Computational Thinking Techniques Qn: 8 Your team was tasked to present a report on computational thinking. After learning from LAMS video and getting additional information from the internet and journal papers, your team summarised and discussed the key aspects of the topic in the report. This activity, namely summarising and discussing the key aspects, is an example of _______ 1. Decomposition 2. Abstraction 3. Pattern Recognition 4. Algorithm Selected Answer: Option 2; Topic: 2: Quantitative Reasoning Techniques Qn: 9 Looking at the histogram of three dataset A, B, C, which one has the highest standard deviation? 1. A 2. B 3. C file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 4/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. Cannot tell from the information given Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 10 You are given a data set that contains 1000 data points. The suggestion is to randomly select 500 data points to setup a model (based on correlation/trend/curve fittings, obtain a model/equation) and test for the validity of the model/equation using the remainder 500 data points. Which one of following is valid? 1. No need for double work. Develop the model/equation using all the 1000 data points, and then test the validity by selecting several random data points (say 100 points) in the same data set. 2. The double work is necessary. Testing the model using data set not included in the model development render better confidence in the model developed. 3. Use all the 1000 data to develop the model and test on new data point as more data is collected. 4. Use all 1000 data points to develop the model. Refine/re-develop the model as more data points are collected. Selected Answer: Option 2; Topic: 2: Quantitative Reasoning Techniques Qn: 11 In normalising a data set consisting of positive real numbers, a user used the value of the largest data point as the reference. Select all valid responses. 1. Limit the range of data set to within the range of 0-to-1. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 5/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. The user could use the average/mean as the benchmark value for normalising the data set 3. The user should remove the outlier-data points before performing the normalisation 4. The user should consider representing the data in a more meaningful form, and then normalise the data points against a valid benchmark-value. Selected Answer: Option 1;Option 3;Option 4; Topic: 2: Quantitative Reasoning Techniques Qn: 12 A model equation obtained from a correlation exercise consists of 4 terms, the target and 3 parameters as follow: T = aX + bY and cZ. The magnitude of order of aX is [~10], bY is [~100] and cZ is [~1000]. In the equation, X, Y and Z are variables and a, b and c are coefficients. You should reject this model and re-examine your analysis. Why? 1. The third term cZ dominates and the effects of aX and bY is not significant 2. The third term cZ should be removed from the model 3. Appropriate normalisation should be carried out such that the 3 terms aX, bY and cZ should be in the same/similar order of magnitude. 4. The current thinking/philosophy of analysis may not be valid. Selected Answer: Option 1;Option 3;Option 4; Topic: 2: Quantitative Reasoning Techniques Qn: 13 In developing a joint correlation model, one may add a series of positively correlated target and parameters in a linear manner. Select the correct responses below. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 6/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. This is a first approach 2. One may include weightage to each parameter based on personal judgement and knowledge on the subject matter. 3. Not all the correlation are linear. Simple addition may not be valid. 4. One may test the validity of the model based on linear addition of the parameters (with appropriate coefficients) or product of the parameters with appropriate index Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 2: Quantitative Reasoning Techniques Qn: 14 It is always possible to quantify a "quality" representation is an analysis. Select the correct responses. 1. By setting a scale of 0 to 10, for example, and map the scale to certain monetary values, for example. 2. By comparing the qualitative measures with an analogous subject that has been quantified and accepted by the community.ers. 3. By assessing the value of the item by the cost of replacement/restoration. 4. By setting the acceptance/expectation level of the community on such subject, such as 95% of the community is receptive to a certain quality. Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 2: Quantitative Reasoning Techniques Qn: 15 There are 2 data of student’s height from 2 different classes, class A and class B. It is found that the standard deviation of height on student in class A is higher than the one from class B. Consider the following file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 7/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions statement: I. Student’s height from class A is more spread out than student’s height on class B II. Student’s height from class B is more spread out than student’s height on class A III. The difference of height between the tallest person and the shortest person in class B is larger than the one in class A IV. The difference of height between the tallest person and the shortest person in class A is larger than the one in class B Which of the following statement is true? 1. I only 2. I and IV 3. II and III 4. None of the above Selected Answer: Option 1; Topic: 2: Quantitative Reasoning Techniques Qn: 16 Which of the following answers a numerical question? 1. Characteristics of online shoppers can affect the sales 2. Sales has increased because more customers are attracted to stop and look in store windows and enter stores to buy products 3. Cost of production has decreased by 10% 4. All of the above Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 8/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 17 What is NOT TURE regarding mean squared error (MSE) and mean absolute error (MAE) below: 1. MSE measures the variance of the residuals 2. MSE is more robust to data with outliers 3. The lower value of MAE, the higher accuracy of a regression model 4. MAE is to measure the average of the residuals in the dataset Selected Answer: Option 2; Topic: 2: Quantitative Reasoning Techniques Qn: 18 A linear regression line has an equation of the form Y=aX + b, where Y is the dependent variable and X is the explanatory variable. Given a dataset that contains dependent variable (P) and explanatory variables (S, A and C), the scatter plots generate the following 3 regression lines: P = kS + d P = mA + e P = nC + f Where k > 0, m < 0 and n is close to zero. d, e and f are constant. Which of the following is FALSE: 1. P is positively correlated with S 2. P is negatively correlated with A 3. P depends highly on C 4. P is hardly correlated with C Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 19 What level of the following is considered high correlation? file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 9/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. 0 2. 0.5 3. -0.4 4. -1 Selected Answer: Option 4; Topic: 2: Quantitative Reasoning Techniques Qn: 20 When we use mean as an estimator, what is our margin of error? 1. Variance 2. Correlation 3. Standard Deviation 4. Range Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 21 Many businesses today are worried that the post-Covid new normal will be fundamentally different from the pre-Covid days. One such business is the airlines. In trying to better understand what the past data looks like, what might be most helpful? 1. Plot the historical data using scatter plots 2. Plot the historical data using bar charts file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 10/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Plot the data using histograms 4. All of the above Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 22 Many businesses today are worried that the post-Covid new normal will be fundamentally different from the pre-Covid days. One such business is the airlines. In trying to better understand what the past data looks like, they first plot their data. After plotting the data, the next best step to comprehend past data should be: 1. Look at parameters such as mean, median, mode, and so on 2. Idealise the distribution of data 3. Throw away the outliers 4. None of the above Selected Answer: Option 2; Topic: 2: Quantitative Reasoning Techniques Qn: 23 Many businesses today are worried that the post-Covid new normal will be fundamentally different from the pre-Covid days. One such business is the airlines. They take multiple steps to first understand their historical data. But once they have done so, how should they compare the post-Covid data with the historical data? 1. By looking at the two distributions side-by-side file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 11/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. By comparing parameters such as mean, median, mode, and so on 3. Through hypothesis testing 4. Through probability theory Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 24 A data set of 50 readings has a mean of 25 and standard deviation of 5. If we take multiple such readings from the same population, what can be expected? 1. The sample means will likely to be the same (50) 2. The sample means will likely be different, and their range will be large (they will differ widely) 3. The sample means will likely be different, and their range will be quite small (they will be close to each other) 4. None of the above Selected Answer: Option 3; Topic: 2: Quantitative Reasoning Techniques Qn: 25 Which search result are we most likely to click on? Google has built a model to make this determination. What is the conceptual process it might have followed? 1. By actually observing people while they search and click 2. By plotting clicks with various characteristics such as age, interest, and others file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 12/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. By using linear models with clicks as the response variable 4. By using linear models with age, interest and others as response variables Selected Answer: Option 2;Option 3; Topic: 3: Managing Cybersecurity Qn: 26 Which of the below is not a best practice of choosing Strong Passwords? 1. Make it long 2. Make it impersonal 3. Make it diverse 4. Make it numeric Selected Answer: Option 1; Topic: 3: Managing Cybersecurity Qn: 27 Which one of the following is NOT the way to avoid being scammed? 1. Recognise the signs that scammers use 2. Ask yourself or others if the message could be true 3. Do not rush into providing personal details 4. Only disclose personal information, including passwords if the request seems to be legitimate file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 13/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 4; Topic: 3: Managing Cybersecurity Qn: 28 Which one of these passwords are more likely to be secure than others? 1. Akr3.9 2. 1$@dnA 3. B9!$7gjq.g 4. Kh9.&5 Selected Answer: Option 3; Topic: 3: Managing Cybersecurity Qn: 29 How would you classify the security of military weapons plans data as? 1. Restricted 2. Open 3. Confidential 4. Classified Selected Answer: Option 4; Topic: 3: Managing Cybersecurity file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 14/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 30 Which of the following passwords is the most secure? 1. Her0k1d123 2. Qp8!gt&x 3. P@ssw0rd 4. S9022334V Selected Answer: Option 2; Topic: 3: Managing Cybersecurity Qn: 31 Which of the following is NOT a good cybersecurity practice? 1. Not sharing passwords with anyone else 2. Leaving your desktop on when going to the toilet 3. Using secure public wifis 4. Keeping data storage devices locked in desks Selected Answer: Option 2; Topic: 3: Managing Cybersecurity Qn: 32 CIA stands for____________. 1. Collaboration, Integrity, Availability 2. Confidentiality, Integrity, Availability file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 15/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Confidential, Internal, Access 4. None of the above Selected Answer: Option 2; Topic: 3: Managing Cybersecurity Qn: 33 BCC stands for ___________ 1. Blind Carbon Copy 2. Blind Confidential Copy 3. Blind Collaboration Copy 4. None of the above Selected Answer: Option 1; Topic: 3: Managing Cybersecurity Qn: 34 When you open a saving account in a bank, you provide your name, your IC number, your home address to your bank. The bank will keep these data in a database in the bank’s server, together with your new saving account number, etc. Who has the data ownership of your name, your IC number and your home address? 1. You as an individual. 2. Your bank since the bank keeps these data in their server. 3. You and your bank. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 16/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. None of the above. Selected Answer: Option 1; Topic: 3: Managing Cybersecurity Qn: 35 Internal memo of an organization is considered as: 1. Restricted data 2. Open data 3. Classified data 4. Confidential data Selected Answer: Option 1; Topic: 3: Managing Cybersecurity Qn: 36 Which of the following is NOT true about Phishing? 1. Phishing scam can occur through email and SMS 2. Phishing scams take advantage of weakness in human nature 3. Phishing scams crash the organisation’s server 4. There is a sense of urgency in phishing scams Selected Answer: Option 3; Topic: 3: Managing Cybersecurity file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 17/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 37 Which one of the following is an example of phishing? 1. You received a warning email on a computer virus threat 2. You received an email telling you to forward email to family members and friends. 3. You received an email directing you to enter personal details using a fake website 4. You received an email directing you to open the file attachment Selected Answer: Option 3; Topic: 3: Managing Cybersecurity Qn: 38 Due to urgency, you need to send confidential information using public network. In this case, it is better to send this information as 1. Per normal i.e. enclosing the confidential information in the email 2. File attachment 3. Compressed file such as zip file 4. Encrypted file Selected Answer: Option 4; Topic: 3: Managing Cybersecurity Qn: 39 Among the following 5 passwords, which one is the most secure? 1. Home123 2. iL@bLk5 file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 18/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. info*21 4. QwertyuI Selected Answer: Option 2; Topic: 4: The World of Disinformation Qn: 40 Deepfake is referring to: 1. A fake document. 2. A fake image with deep secret. 3. A fake video with deeply embedded data. 4. None of the above. Selected Answer: Option 4; Topic: 4: The World of Disinformation Qn: 41 One way to combat fake news is by using "Truth Sandwich". What is "Truth Sandwich"? 1. Starts with the truth of the story. After that followed by the falsehood. And then fact-check the misinformation and repeat the truth. 2. Start with the falsehood statement. Followed by fact-check. And lastly conclude that misinformation is fake and provide the truth. 3. Start with the truth of the story. Explain why it is true. And lastly repeat the true statement to end the article. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 19/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. Start with the news as it is the meat of the story, the focus of the 'sandwich'. After that give the audience on why it is false and the correct statement, accompanying the meat with the delicious 'truth bread'. Selected Answer: Option 1; Topic: 4: The World of Disinformation Qn: 42 Amy was scrolling through her social media account. One time, she stumbled upon a news article but she immediately realized that it is a fake news! What action(s) below that might NOT be helpful in defeating fake news? 1. She reported the post in hope that the post got removed. 2. She told herself that this is fake news and moved on. 3. She publicly comment that the post is fake and explained why. 4. She posted on her account the actual truth of the news, in hope that people might be realized that the previous post was fake. Selected Answer: Option 2; Topic: 4: The World of Disinformation Qn: 43 Personal cognitive biases may cloud our judgement. When we believe information that is consistent with our prior beliefs, this is known as 1. Anchoring bias 2. Blind spot 3. Confirmation bias file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 20/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. Halo effect Selected Answer: Option 3; Topic: 4: The World of Disinformation Qn: 44 Evaluating the authenticity of news received from social media include (select all that apply) 1. Check credentials of the author 2. Check the tone of the message 3. Check the number of likes 4. Consider the source of the news Selected Answer: Option 1;Option 2;Option 4; Topic: 4: The World of Disinformation Qn: 45 Ways to verify authenticity of a viral image circulated via social media include (select all that apply): 1. Using a reverse image search tool to check its origin 2. Checking whether news agencies have shared the image 3. Checking Snope.com a fact-checking website, formerly known as the Urban Legends Reference Pages. 4. Checking the Onion : America’s finest news source. that publishes satirical articles on international, national, and local news. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 21/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 1;Option 2;Option 3; Topic: 4: The World of Disinformation Qn: 46 POFMA, an Act to prevent the electronic communication in Singapore of false statement of fact, to suppress support for and counteract the effects of such communication, to safeguard against the use of online accounts for such communication and for information manipulation, to enable measures to be taken to enhance transparency of online political advertisements, and for related matters. prohibits the communication of a false statement via (select all that apply): 1. Facebook 2. Face-to-Face communications 3. SMS 4. Private Telegram chat groups Selected Answer: Option 1;Option 3;Option 4; Topic: 4: The World of Disinformation Qn: 47 Choose a strategy that can be applied to spot fake news 1. Check for date of the news 2. Evaluate if the news site is legitimate 3. Check the comments on the site 4. Check the number of views for the site file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 22/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 2; Topic: 4: The World of Disinformation Qn: 48 Which Act prohibits the communication of fake news in Singapore ? 1. Public Order Act 2. Protection from Harassment Act 3. Protection from Online Falsehoods and Manipulation Act (POFMA) 4. Prevention of Corruption Act Selected Answer: Option 3; Topic: 4: The World of Disinformation Qn: 49 Falsehood that is propagated without malicious intent is 1. Misinformation 2. Disinformation 3. Whistleblowing 4. Cyberbullying Selected Answer: Option 1; Topic: 4: The World of Disinformation Qn: 50 Fake news spreads most effectively through file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 23/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. Word of mouth 2. Social bots, agents that communicate more or less autonomously on social media, often with the task of influencing the course of discussion and/or the opinions of its readers. 3. Internet Trolls, people who post inflammatory, insincere, digressive, extraneous, or off-topic messages in an online community (such as social media Twitter, Facebook, Instagram, etc.) 4. TikTok, a video-focused social networking service that hosts a variety of short- form user videos, from genres like pranks, stunts, tricks, jokes, dance, and entertainment[. Selected Answer: Option 2; Topic: 4: The World of Disinformation Qn: 51 The Sun tabloid website (25 Jan 2022) shared a footage with the headlines “Hunted Down UFO chased by Black Hawk helicopters across Connecticut sky …”. This is likely to be fake news because … (select all that apply) 1. Images in video look photoshopped 2. There are several spelling mistakes in the article accompanying the video 3. More than 10,000 people have shared the video 4. The article uses sensational language Selected Answer: Option 1;Option 2;Option 4; Topic: 4: The World of Disinformation file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 24/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 52 The Daily Mesh (14 Jan 2022) reported that “Djokovic (a Serbian professional tennis player) to defend title via Zoom”. This is likely to be fake news because 1. Djokovic’s visa has been revoked twice by Australian government 2. It is not possible to have a Zoom competition 3. Djokovic has been hospitalised 4. The Daily Mesh does not exist Selected Answer: Option 2; Topic: 4: The World of Disinformation Qn: 53 USA Today (5 Oct 0218) reported that “Young girl pulls 1,500-year- old sword from lake, earns ‘queen’ nickname”. This article is likely to be true because … (select all that apply) 1. Other websites such as BBC News have carried the same news 2. USA Today is a reputable site 3. The young girl had been interviewed 4. The article has been read and shared by many people Selected Answer: Option 1;Option 2; Topic: 4: The World of Disinformation Qn: 54 On 3 Feb 2022, a user tweeted a photo and claimed that “2 million people took to the streets of Ottawa demanding their freedom”. This is likely to be false because file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 25/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. The tweet had been liked more than 10,000 times 2. The photo was not well taken 3. A reverse image search showed that the image had first appeared in 2013 4. The user is a member of the opposition party Selected Answer: Option 3; Topic: 5: Principles of Data Ethics in the Digital World Qn: 55 Identify all the main challenges in data ethics 1. Unfair discrimination 2. Reinforcing human biases 3. Lack of data annotation 4. Privacy Selected Answer: Option 1;Option 2;Option 4; Topic: 5: Principles of Data Ethics in the Digital World Qn: 56 Mary is a member of the Singapore Computer Society who has a list of the members’ contact information. Mary’s husband is a sales manager working at a computer company. Mary’s husband is has not been performing well as he has not meet the sales key performance indicators. Therefore, he is asking Mary for the list so that he can approach these members, and Mary agrees. By doing so, Mary has violated which of the Singapore Computer Society’s Code of Conduct: file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 26/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. Act with complete discretion when entrusted with confidential information 2. Not seek personal advantage to the detriment of the Society 3. Be impartial when giving advice and will disclose any relevant personal interests 4. All of the above Selected Answer: Option 2; Topic: 5: Principles of Data Ethics in the Digital World Qn: 57 Bob has a talent in dancing and he is planning to make a dancing video and post on Tiktok. After posting, he has received both positive and negative comments. What is your advice for Bob? 1. Do not delete all the negative comments 2. Respond to the negative comments 3. Delete his Tiktok account 4. All of the above Selected Answer: Option 1; Topic: 5: Principles of Data Ethics in the Digital World Qn: 58 Fred who has just recently graduated from NTU. He plans to join a professional networking website. What type of personal information he cannot share with this professional networking website? 1. His name and mobile number file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 27/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. His education profile 3. His email address 4. All of the above Selected Answer: Option 1; Topic: 5: Principles of Data Ethics in the Digital World Qn: 59 Which of the following is the correct meaning of a whistleblower? 1. A railway employee whose job is to signal the departure of a train from the station platform. 2. A person who has witnessed a crime and has called the police. 3. A person who knows that a company practice is not in the public interest and that the problem should be be addressed in some way. 4. A person who knows that a company practice is not in the public interest and goes public with evidence after exhausting all possible internal feedback processes. Selected Answer: Option 4; Topic: 5: Principles of Data Ethics in the Digital World Qn: 60 If you are in possession of personal information of other people because that information is needed for your job, what should you do to safeguard the personal information. 1. Restrict access to the personal information to only those who really need that information file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 28/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. Set passwords for all computer files storing the personal information. 3. Save the storage devices in a locked filing cabinet. 4. All of the above. Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 61 Intellectual property rights protect the use of information and ideas that are of 1. Social value 2. Ethical value 3. Commercial value 4. All of the above Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 62 What is the duration of production for literacy, dramatic, musical and artistic works? 1. Life of author plus 20 years from the end of the year in which the author died 2. Life of author plus 50 years from the end of the year in which the author died 3.. Life of author plus 60 years from the end of the year in which the author died. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 29/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. Life of author plus 70 years from the end of the year in which the author died Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 63 Mary bought a DVD of a movie, which of her behavior below is NOT considered a violation of copyright? 1. Mary makes copies of the DVD and gives to her parents and friends. 2. Mary makes a 5 mins movie review video with some clips from the DVD, then post it on YOUTUBE. 3. Mary re-mixes the theme song from the DVD and presents it as a school project. 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 64 In which of the following cases will IP protection be denied? 1. A book author comes up with an idea and chats about it with friends 2. A book author comes up with an idea and creates a small outline which is shared with friends 3. A book author comes up with an idea and shares an email about it with friends 4. All of the above Selected Answer: Option 1; file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 30/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 65 An employee works on a new and novel search as a part of his job. The IP for this algorithm will belong to: 1. The employee, since he created it 2. His team, since they also worked on it 3. The employer, since they pay the employee 4. The computer manufacturer whose laptop was used to create the search algorithm Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 66 Which of the following would most likely be a copyright violation? 1. You write a book whose story is similar to another book but the setting is different 2. You write a book whose story is similar to another book but your characters are different 3. You write a book whose story is similar to another book but your underlying inspiration is different 4. None of the above Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 31/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 67 Getting access to legal data is important for all businesses. One company collates legal court proceedings, i.e., it compiles all cases which are handled by government courts and stores them in a database. What form of IP protection is available to this company for their content? 1. Trademark 2. Copyright 3. Patent 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 68 Many technology giants thrive because of the patents they have acquired. For example, Amazon has a patent called “1-click shopping” where customers can check out using just one click. In which of the following cases can another business legally implement this functionality? 1. If they call it something different, for example, “Express Shopping” 2. If they change the underlying code of 1-click shopping 3. If they file a lawsuit against Amazon 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 32/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 69 Solar Tech” company has developed a new technology that will result in significant cost reduction of solar panel. What type of intellectual property should “Solar Tech” file to prevent others from copying their invention? 1. Copyright 2. Trademarks 3. Patents 4. Registered Design Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 70 A PhD student at University X writes a scientific paper together with the student's supervisor. They submitted the manuscript to Journal of Computer Science. After the paper has been accepted by this journal, who owns the copyright of the accepted paper? 1. University X 2. The student who wrote the paper. 3. The PhD student's supervisor 4. Journal of Computer Science Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 33/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 71 The recipe for producing the soft drink Coca Cola by the the Coca- Cola Company is protected by: 1. Artistic copyright 2. Trademark 3. Trade secret 4. Patent Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 72 A team of scientists at a pharmaceutical company developed a new anti-viral drug that can kill the Covid-19 virus (delta variant) and the experimental drug has cleared the final stage of a clinical trial. Before manufacturing this new anti-viral drug, what will the company normally do first? 1. Submit a technical disclosure and file for patent protection in one or more countries 2. Keep the invention as secret as possible 3. Design a trademark for the new drug. 4. Obtain copyright protection on all the data collected by the team of scientists during the course of developing the drug.. Selected Answer: Option 1; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 34/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 73 A software engineering team at a startup company developed a new app for an electronic commerce platform. Which of the following intellectual property protection should be used by the company to protect this developed software? 1. Patent 2. Literary copyright 3. Trademark 4. Artistic copyright Selected Answer: Option 2; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 74 The author of a new book to be published by company A needs to re-use a figure in another book published by company B. What should this author do to avoid violating the literary copyright of another party? 1. Send a detailed email to company B explaining what the author needs to re-use 2. Request permission to reuse the figure from company B and credit the original source in a figure caption of the new book 3. Request permission to reuse the figure from company B 4. Request permission to reuse the figure from the author of the book published by company B. Selected Answer: Option 2; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 35/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 75 In the Creative Commons licensing system, a CC BY-NC license allows re-users of content to: 1. distribute, adapt, remix, build upon the material for commercial purpose and credit must be given to the original creator 2. distribute, adapt, remix, build upon the material for commercial purpose 3. distribute, adapt, remix, build upon the material for non-commercial purpose 4. distribute, adapt, remix, build upon the material for non-commercial purpose and credit must be given to the original creator Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 76 An open source publication is protected by a Creative Commons CC BY-NC-SA license. If the author of a new paper needs to adapt and then reuse a figure in this open source publication, what is the restriction on the new article? 1. Adaptations of the figure must be shared under the same terms. 2. The figure in the source publication cannot be modified. 3. The author of the new article needs to pay the author of the source publication royalty fee. 4. The author of the new article needs to obtain written permission from the author of the original figure. Selected Answer: Option 1; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 36/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 77 Which of the following is a benefit of obtaining a patent protection for an invention? 1. The technical details of the invention can be kept secret for a long period of time. 2. The inventors can generate a great deal of publicity about the invention after the patent is granted. 3. The owner of the patent has the right to exclusive use of the invention including the right to license the patent to other parties for a fee 4. The inventors can receive an annual financial reward from the patenting authority during the lifetime of the patent. Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 78 Which of the followings are intellectual property rights? 1. Patents 2. Trademarks 3. Designs 4. Copyrights Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 79 Which of the following statements is/are false? 1. An invention can be patented file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 37/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. An idea without a tangible form cannot be protected 3. A process can be patented 4. A recipe of ingredients can be copyrighted Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 80 The concept of Machine Learning was introduced decades ago. What are the drivers of rapid development and adoption of machine learning in the last decade? 1. Hardware advancement 2. Digital data accumulation 3. Reduction of cost required to train machine learning model 4. Algorithm development Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 81 Which of the following is an example of machine learning? 1. Speech to text 2. Goggle search 3. Wearable fitness tracker file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 38/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. All of the above Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 82 The success of Artificial Intelligence is NOT due to: 1. The advancement of CPU 2. The availability of cloud computing 3. The advancement of software algorithm 4. The availability of huge data Selected Answer: Option 1; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 83 Which of the following network is mostly used in image classification: 1. Artificial Neural Network 2. Recurrent Neural Network 3. Convolutional Neural Network 4. Reinforcement Neural Network Selected Answer: Option 3; file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 39/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 84 Which of the following statement is FALSE: 1. Neural Network has input layer, hidden layers and output layer 2. Deep Neural Network has multiple hidden layers 3. Hidden layer consists of learnable parameters 4. The convolution operation is normally done in the output layer Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 85 To save time and resources from training multiple models and data from scratch to complete similar tasks, we normally use _______________. 1. deep learning 2. transfer learning 3. feedforward learning 4. few-shot learning Selected Answer: Option 2; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 86 Which of the following is commonly used for image recognition problem? file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 40/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 1. Recurrent Neural Network 2. Artificial Neural Network 3. Convolution Neural Network 4. None of the above Selected Answer: Option 3; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 87 What is the causes of bias in AI systems? 1. AI system designers unknowingly introducing his/her personal bias to the model 2. The training data set includes biases 3. The algorithm used to train the model is biased towards certain decision 4. All of above Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 88 Despite the wide application of AI in many aspects of our life, the current AI technology is still considered ________ 1. AGI (Artificial General Intelligence) 2. ANI (Artificial Narrow Intelligence) 3. AI (Artificial Intelligence) file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 41/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. None of the above Selected Answer: Option 2; Topic: 5: Principles of Data Ethics in the Digital World Qn: 89 Identify all the main challenges in data ethics 1. Unfair discrimination 2. Reinforcing human biases 3. Lack of data annotation 4. Privacy Selected Answer: Option 1;Option 2;Option 4; Topic: 5: Principles of Data Ethics in the Digital World Qn: 90 Mary is a member of the Singapore Computer Society who has a list of the members’ contact information. Mary’s husband is a sales manager working at a computer company. Mary’s husband is has not been performing well as he has not meet the sales key performance indicators. Therefore, he is asking Mary for the list so that he can approach these members, and Mary agrees. By doing so, Mary has violated which of the Singapore Computer Society’s Code of Conduct: 1. Act with complete discretion when entrusted with confidential information 2. Not seek personal advantage to the detriment of the Society 3. Be impartial when giving advice and will disclose any relevant personal interests file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 42/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. All of the above Selected Answer: Option 2; Topic: 5: Principles of Data Ethics in the Digital World Qn: 91 Bob has a talent in dancing and he is planning to make a dancing video and post on Tiktok. After posting, he has received both positive and negative comments. What is your advice for Bob? 1. Do not delete all the negative comments 2. Respond to the negative comments 3. Delete his Tiktok account 4. All of the above Selected Answer: Option 1; Topic: 5: Principles of Data Ethics in the Digital World Qn: 92 Fred who has just recently graduated from NTU. He plans to join a professional networking website. What type of personal information he cannot share with this professional networking website? 1. His name and mobile number 2. His education profile 3. His email address 4. All of the above file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 43/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 1; Topic: 5: Principles of Data Ethics in the Digital World Qn: 93 Which of the following is the correct meaning of a whistleblower? 1. A railway employee whose job is to signal the departure of a train from the station platform. 2. A person who has witnessed a crime and has called the police. 3. A person who knows that a company practice is not in the public interest and that the problem should be be addressed in some way. 4. A person who knows that a company practice is not in the public interest and goes public with evidence after exhausting all possible internal feedback processes. Selected Answer: Option 4; Topic: 5: Principles of Data Ethics in the Digital World Qn: 94 If you are in possession of personal information of other people because that information is needed for your job, what should you do to safeguard the personal information. 1. Restrict access to the personal information to only those who really need that information 2. Set passwords for all computer files storing the personal information. 3. Save the storage devices in a locked filing cabinet. 4. All of the above. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 44/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 95 Intellectual property rights protect the use of information and ideas that are of 1. Social value 2. Ethical value 3. Commercial value 4. All of the above Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 96 What is the duration of production for literacy, dramatic, musical and artistic works? 1. Life of author plus 20 years from the end of the year in which the author died 2. Life of author plus 50 years from the end of the year in which the author died 3. Life of author plus 60 years from the end of the year in which the author died. 4. Life of author plus 70 years from the end of the year in which the author died Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 45/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 97 Mary bought a DVD of a movie, which of her behavior below is NOT considered a violation of copyright? 1. Mary makes copies of the DVD and gives to her parents and friends. 2. Mary makes a 5 mins movie review video with some clips from the DVD, then post it on YOUTUBE. 3. Mary re-mixes the theme song from the DVD and presents it as a school project. 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 98 In which of the following cases will IP protection be denied? 1. A book author comes up with an idea and chats about it with friends 2. A book author comes up with an idea and creates a small outline which is shared with friends 3. A book author comes up with an idea and shares an email about it with friends 4. All of the above Selected Answer: Option 1; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 99 An employee works on a new and novel search as a part of his job. The IP for this algorithm will belong to: 1. The employee, since he created it file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 46/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 2. His team, since they also worked on it 3. The employer, since they pay the employee 4. The computer manufacturer whose laptop was used to create the search algorithm Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 100 Which of the following would most likely be a copyright violation? 1. You write a book whose story is similar to another book but the setting is different 2. You write a book whose story is similar to another book but your characters are different 3. You write a book whose story is similar to another book but your underlying inspiration is different 4. None of the above Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 101 Getting access to legal data is important for all businesses. One company collates legal court proceedings, i.e., it compiles all cases which are handled by government courts and stores them in a database. What form of IP protection is available to this company for their content? 1. Trademark 2. Copyright file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 47/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Patent 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 102 Many technology giants thrive because of the patents they have acquired. For example, Amazon has a patent called “1-click shopping” where customers can check out using just one click. In which of the following cases can another business legally implement this functionality? 1. If they call it something different, for example, “Express Shopping” 2. If they change the underlying code of 1-click shopping 3. If they file a lawsuit against Amazon 4. None of the above Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 103 Solar Tech” company has developed a new technology that will result in significant cost reduction of solar panel. What type of intellectual property should “Solar Tech” file to prevent others from copying their invention? 1. Copyright 2. Trademarks file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 48/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Patents 4. Registered Design Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 104 A PhD student at University X writes a scientific paper together with the student's supervisor. They submitted the manuscript to Journal of Computer Science. After the paper has been accepted by this journal, who owns the copyright of the accepted paper? 1. University X 2. The student who wrote the paper. 3. The PhD student's supervisor 4. Journal of Computer Science Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 105 The recipe for producing the soft drink Coca Cola by the the Coca-Cola Company is protected by: 1. Artistic copyright 2. Trademark 3. Trade secret file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 49/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. Patent Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 106 A team of scientists at a pharmaceutical company developed a new anti-viral drug that can kill the Covid-19 virus (delta variant) and the experimental drug has cleared the final stage of a clinical trial. Before manufacturing this new anti-viral drug, what will the company normally do first? 1. Submit a technical disclosure and file for patent protection in one or more countries 2. Keep the invention as secret as possible 3. Design a trademark for the new drug. 4. Obtain copyright protection on all the data collected by the team of scientists during the course of developing the drug.. Selected Answer: Option 1; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 107 A software engineering team at a startup company developed a new app for an electronic commerce platform. Which of the following intellectual property protection should be used by the company to protect this developed software? 1. Patent 2. Literary copyright file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 50/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Trademark 4. Artistic copyright Selected Answer: Option 2; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 108 The author of a new book to be published by company A needs to re-use a figure in another book published by company B. What should this author do to avoid violating the literary copyright of another party? 1. Send a detailed email to company B explaining what the author needs to re-use 2. Request permission to reuse the figure from company B and credit the original source in a figure caption of the new book 3. Request permission to reuse the figure from company B 4. Request permission to reuse the figure from the author of the book published by company B. Selected Answer: Option 2; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 109 In the Creative Commons licensing system, a CC BY-NC license allows re-users of content to: 1. distribute, adapt, remix, build upon the material for commercial purpose and credit must be given to the original creator 2. distribute, adapt, remix, build upon the material for commercial purpose 3. distribute, adapt, remix, build upon the material for non-commercial purpose file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 51/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 4. distribute, adapt, remix, build upon the material for non-commercial purpose and credit must be given to the original creator Selected Answer: Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 110 An open source publication is protected by a Creative Commons CC BY-NC-SA license. If the author of a new paper needs to adapt and then reuse a figure in this open source publication, what is the restriction on the new article? 1. Adaptations of the figure must be shared under the same terms. 2. The figure in the source publication cannot be modified. 3. The author of the new article needs to pay the author of the source publication royalty fee. 4. The author of the new article needs to obtain written permission from the author of the original figure. Selected Answer: Option 1; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 111 Which of the following is a benefit of obtaining a patent protection for an invention? 1. The technical details of the invention can be kept secret for a long period of time. 2. The inventors can generate a great deal of publicity about the invention after the patent is granted. file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 52/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. The owner of the patent has the right to exclusive use of the invention including the right to license the patent to other parties for a fee 4. The inventors can receive an annual financial reward from the patenting authority during the lifetime of the patent. Selected Answer: Option 3; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 112 Which of the followings are intellectual property rights? 1. Patents 2. Trademarks 3. Designs 4. Copyrights Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 6: Intellectual Properties, Rights and Data Privacy Qn: 113 Which of the following statements is/are false? 1. An invention can be patented 2. An idea without a tangible form cannot be protected 3. A process can be patented 4. A recipe of ingredients can be copyrighted file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 53/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 114 The concept of Machine Learning was introduced decades ago. What are the drivers of rapid development and adoption of machine learning in the last decade? 1. Hardware advancement 2. Digital data accumulation 3. Reduction of cost required to train machine learning model 4. Algorithm development Selected Answer: Option 1;Option 2;Option 3;Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 115 Which of the following is an example of machine learning? 1. Speech to text 2. Goggle search 3. Wearable fitness tracker 4. All of the above Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 54/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Qn: 116 The success of Artificial Intelligence is NOT due to: 1. The advancement of CPU 2. The availability of cloud computing 3. The advancement of software algorithm 4. The availability of huge data Selected Answer: Option 1; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 117 Which of the following network is mostly used in image classification: 1. Artificial Neural Network 2. Recurrent Neural Network 3. Convolutional Neural Network 4. Reinforcement Neural Network Selected Answer: Option 3; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 118 Which of the following statement is FALSE: 1. Neural Network has input layer, hidden layers and output layer 2. Deep Neural Network has multiple hidden layers file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 55/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions 3. Hidden layer consists of learnable parameters 4. The convolution operation is normally done in the output layer Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 119 To save time and resources from training multiple models and data from scratch to complete similar tasks, we normally use _______________. 1. deep learning 2. transfer learning 3. feedforward learning 4. few-shot learning Selected Answer: Option 2; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 120 Which of the following is commonly used for image recognition problem? 1. Recurrent Neural Network 2. Artificial Neural Network 3. Convolution Neural Network 4. None of the above file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 56/57 Downloaded by gloomyy panfa ([email protected]) lOMoARcPSD|24726182 10/18/23, 3:54 PM Quiz Questions Selected Answer: Option 3; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 121 What is the causes of bias in AI systems? 1. AI system designers unknowingly introducing his/her personal bias to the model 2. The training data set includes biases 3. The algorithm used to train the model is biased towards certain decision 4. All of above Selected Answer: Option 4; Topic: 7a: Latest Tech Trend: Artificial Intelligence Qn: 122 Despite the wide application of AI in many aspects of our life, the current AI technology is still considered ________ 1. AGI (Artificial General Intelligence) 2. ANI (Artificial Narrow Intelligence) 3. AI (Artificial Intelligence) 4. None of the above Selected Answer: Option 2; file:///C:/Users/sohki/Downloads/Telegram Desktop/output.html 57/57 Downloaded by gloomyy panfa ([email protected])

Use Quizgecko on...
Browser
Browser