All keywords in Python are in _________
All keywords in Python are in _________
Is Python code compiled or interpreted?
Is Python code compiled or interpreted?
Which of the following is the correct extension of the Python file?
Which of the following is the correct extension of the Python file?
Is Python case sensitive when dealing with identifiers?
Is Python case sensitive when dealing with identifiers?
Which type of Programming does Python support?
Which type of Programming does Python support?
Who developed Python Programming Language?
Who developed Python Programming Language?
Unauthorized access is a ___________ type of network problem?
Unauthorized access is a ___________ type of network problem?
Which of the following is a program or hardware device that filters information coming through an Internet connection in
Which of the following is a program or hardware device that filters information coming through an Internet connection in
: ________ Technology makes users feel as if they are actually in a virtual environment.
: ________ Technology makes users feel as if they are actually in a virtual environment.
Identify computer viruses?
Identify computer viruses?
Who invented the term of IOT?
Who invented the term of IOT?
________ protects data and passwords.
________ protects data and passwords.
What is the full name of WPS?
What is the full name of WPS?
197. Which of the following is the common language for Artificial Intelligence?
197. Which of the following is the common language for Artificial Intelligence?
200. The “Father of Artificial Intelligence” is:
200. The “Father of Artificial Intelligence” is:
199. Blind Search can be used for which of the following situations?
199. Blind Search can be used for which of the following situations?
89. In how many category processes is Artificial Intelligence classified in?
89. In how many category processes is Artificial Intelligence classified in?
198. If a machine can change its course of action based on the external environment on its own, the machine is called?
198. If a machine can change its course of action based on the external environment on its own, the machine is called?
196. Which of the following is not an application of artificial intelligence?
196. Which of the following is not an application of artificial intelligence?
49. ____ is not a major type of electronic commerce.
49. ____ is not a major type of electronic commerce.
48. Which is not one of the three phases of electronic commerce?
48. Which is not one of the three phases of electronic commerce?
47.Which of the following describes the definition of electronic commerce?
47.Which of the following describes the definition of electronic commerce?
46. Which e-commerce model involves the sale of goods or services from businesses to the general public?
46. Which e-commerce model involves the sale of goods or services from businesses to the general public?
50. Which dimension of e-commerce enables commerce beyond the boundaries of the country?
50. Which dimension of e-commerce enables commerce beyond the boundaries of the country?
49. Modem is used for?
49. Modem is used for?
44. Data in RAM are:
44. Data in RAM are:
50. Which of the following is known as the brain of a computer?
50. Which of the following is known as the brain of a computer?
48. The acronym for MAC is?
48. The acronym for MAC is?
47. What is the full form of IP?
47. What is the full form of IP?
46. Which of the following is an output device?
46. Which of the following is an output device?
45. RAM stands for?
45. RAM stands for?
43. BIOS stand for?
43. BIOS stand for?
45. What is the function of the 'when green flag clicked' command block?
45. What is the function of the 'when green flag clicked' command block?
48. Which command block enables you to control the car?
48. Which command block enables you to control the car?
46. What is the car in the racing car game?
46. What is the car in the racing car game?
47. What would you call the background in your racing car game?
47. What would you call the background in your racing car game?
49. What is the function of the 'forever' command block?
49. What is the function of the 'forever' command block?
50. What is the name of the software that you use to create the game?
50. What is the name of the software that you use to create the game?
45. The categories in which Machine learning approaches can be traditionally categorized are ______
45. The categories in which Machine learning approaches can be traditionally categorized are ______
49. Machine learning is an application of _______
49. Machine learning is an application of _______
44. ___ is the machine learning algorithms that can be used with labeled data.
44. ___ is the machine learning algorithms that can be used with labeled data.
50. What is machine learning ?
50. What is machine learning ?
46. Machine learning approaches can be traditionally categorized into ______ categories
46. Machine learning approaches can be traditionally categorized into ______ categories
47. The term machine learning was coined in which year?
47. The term machine learning was coined in which year?
48. Application of Machine learning is _______
48. Application of Machine learning is _______
27. Who coined the term “Internet of Things”?
27. Who coined the term “Internet of Things”?
28. What is IoT?
28. What is IoT?
29. What is the full form of IoT?
29. What is the full form of IoT?
30. Through which network does Open IoT manage registration, deployment of sensors?
30. Through which network does Open IoT manage registration, deployment of sensors?
26. When was the actual term “Internet of Things” coined?
26. When was the actual term “Internet of Things” coined?