What was originally called the imitation game by its creator

Assignment Help Basic Computer Science
Reference no: EM131127599

1. The High level language ...................... has now become the dominant AI programming language.

A) Ada
B) Lisp
C) AI pro
D) High AI

2. In AI, a representation of ........................ is a combination of data structures and interpretive procedures that is used in the right way in a program.

A) Knowledge
B) Power
C) Strength
D) Intelligence

3. .............. is an environment in which the search takes place.

A) problem place
B) problem instance
C) problem space
D) Non of  the above

4. The fundamental ideas about retrieval that have been developed in AI systems might be termed as .................. and ........................

A) Analogy, reasoning
B) Thinking, doing
C) Event, domain
D) Linking, lumping

5. Robot machine might have cameras and infrared range finders for ............ and various motors of ..........

A) Sensors, Agents
B) Agents, Actuators
C) Actuators, Sensors
D) Sensors, Actuators

6. .................... are rules of thumb that may solve a given problem, but do not guarantee a solution.

A) Strong methods
B) Weak methods
C) Heuristic
D) Probabilistic

7. ................... is the primary consideration in designing knowledge-based AI systems.

A) Analogy
B) Efficiency
C) Efficacy
D) Acquisition

8. The initial state and successor function implicitly define state space of the problem

A) Initial state
B) State space
C) problem space
D) problem place

9. ................. are data structures giving "snapshots" of the condition of the problem at each stage of its solution.

A) States
B) Operators
C) Heuristic
D) None of the above

10. ................... are means for transforming the problem from one state to another.

A) States
B) Operators
C) Heuristic
D) None of the above

11. .............. is called the father of AI.

A) James C Gosling
B) Dennis Ritchie
C) Alan Turing
D) Isaac Newton

12. In AI ............................ is a combination of data structures and interpretive procedures.

A) Knowledge
B) Meta-knowledge
C) Artificial Knowledge
D) Performance

13. The ........................ approach uses the knowledge of mathematics and engineering.

A) rationalist
B) Top-down
C) bottom-up
D) push-pop approach

14. We also use knowledge about what we know, called ..........................

A) Meta-Knowledge
B) Performance Knowledge
C) Standard knowledge
D) Specific knowledge

15. The Artificial Intelligence is concerned with designing intelligent computer systems that exhibit intelligent characteristics expressed by .......................

A) Functional behavior
B) Human behavior
C) Human brain
D) Statistical analysis
 
16. ..................... includes what we know about our own performance as cognitive processors.

A) Meta-Knowledge
B) Performance Knowledge
C) Standard knowledge
D) Specific knowledge

17. State whether the following true or false.

i) AI is used in diverse fields like space exploration, robotics.
ii) AI is used for military purpose

A) i-True, ii-False
B) i-True, ii-True
C) i-False, ii-False
D) i-False, ii-True

18. The goals of AI systems can be described in terms of cognitive tasks like

A) Recognizing objects
B) Answering questions
C) Manipulating robotic devices
D) All of the above

19. ....................... is computerized advice-giver, that is capable of reasoning but which is usually confined to a rather narrow field of knowledge.

A) Expert system
B) Knowledge system
C) Common system
D) Communication system

20. ................... involves relating something new to what we already know in a psychologically complex way.

A) Knowledge Acquisition
B) Knowledge retrieval
C) Reasoning
D) Meta-level reasoning

21.  What is the term used for describing the judgmental or commonsense part of problem solving?

A. Heuristic
B. Critical
C. Value based
D. Analytical
E. None of the above

22.  What stage of the manufacturing process has been described as "the mapping of function onto form"? 

A. Design
B. Distribution
C. project management
D. field service
E. None of the above

23.  Which kind of planning consists of successive representations of different levels of a plan? 

A. hierarchical planning
B. non-hierarchical planning
C. All of the above
D. project planning
E. None of the above

24.  What was originally called the "imitation game" by its creator? 

A. The Turing Test
B. LISP
C. The Logic Theorist
D. Cybernetics
E. None of the above

25.  Decision support programs are designed to help managers make:

A.budget projections
B.visual presentations
C.business decisions
D.vacation schedules
E. None of the above

26.  PROLOG is an AI programming language which solves problems with a form of symbolic logic known as predicate calculus. It was developed in 1972 at the University of Marseilles by a team of specialists. Can you name the person who headed this team?

A. Alain Colmerauer
B. Nicklaus Wirth
C. Seymour Papert
D. John McCarthy
E. None of the above

27.  Programming a robot by physically moving it through the trajectory you want it to follow is called: 

A. contact sensing control
B. continuous-path control
C. robot vision control
D. pick-and-place control
E. None of the above

28.  To invoke the LISP system, you must enter 

A. AI
B. LISP
C. CL (Common Lisp)
D. both b and c
E. None of the above

29.  DEC advertises that it helped to create "the world's first expert system routinely used in an industrial environment," called XCON or: 

A. PDP-11
B. Rl
C. VAX
D. MAGNOM
E. None of the above

30.  Prior to the invention of time sharing, the prevalent method of computer access was:

A. batch processing
B. telecommunication
C. remote access
D. All of the above
E. None of the above

31. What is Artificial intelligence?

(a)   Putting your intelligence into Computer
(b)   Programming with your own intelligence
(c)   Making a Machine intelligent
(d)   Playing a Game
(e)   Putting more memory into Computer 

32. Which is not the commonly used programming language for AI?

(a)  PROLOG           
(b)  Java                  
(c)  LISP                  
(d)  Perl             
(e)  Java script.

33. What is state space?

(a)   a)The whole problem
(b)   b)Your Definition to a problem
(c)   c)Problem you design
(d)   d)Representing your problem with variable and parameter
(e)   e)A space where You know the solution.

34. A production rule consists of

(a)  A set of Rule     
(b)  A sequence of steps
(c)  Both (a) and (b) 
(d)  Arbitrary representation to problem
(e)  Directly getting solution.

35. Which search method takes less memory?

(a)  Depth-First Search
(b)  Breadth-First search
(c)  Both (a) and (b) (d) Linear Search.
(e)  Optimal search

36. A heuristic is a way of trying

(a)   To discover something or an idea embedded in a program
(b)   To search and measure how far a node in a search tree seems to be from a goal
(c)   To compare two nodes in a search tree to see if one is better than the other
(d)   Only (a) and (b)
(e)   Only (a), (b) and (c).

37. A* algorithm is based on

(a)  Breadth-First-Search
(b)  Depth-First -Search
(c)  Best-First-Search
(d)  Hill climbing.
(e)  Bulkworld Problem.

38. Which is the best way to go for Game playing problem?

(a)  Linear approach
(b)  Heuristic approach
(c)  Random approach
(d)  Optimal approach
(e)  Stratified approach.

39. How do you represent "All dogs have tails".

(a)   νx: dog(x)→hastail(x)

(b)  νx: dog(x)→hastail(y)

(c)  νx: dog(y)→hastail(x)

(d)  νx: dog(x)→has?tail(x)

(e)  νx: dog(x)→has?tail(y)


40. Which is not a property of representation of knowledge?

(a)  Representational Verification
(b)  Representational Adequacy
(c)  Inferential Adequacy
(d)  Inferential Efficiency
(e)  Acquisitional Efficiency. 

Reference no: EM131127599

Questions Cloud

Replace these forces with a single equivalent force r : Replace these forces with a single equivalent force R. Show the result on a sketch of the eye bolt.
Explain which security is a better buy : The yield on a corporate bond is 10%, and it is currently selling at par. The marginal tax rate is 20%. A par value municipal bond with a coupon rate of 8.50% is available. Which security is a better buy?
The primary control loop of a nuclear power plant : The primary control loop of a nuclear power plant includes a time delay due to the need to transport the fluid from the reactor to the measurement point as shown in Figure DP9.11. The transfer function of the controller is
The supplies account had a beginning balance : The supplies account had a beginning balance of $1,815 and was debited for $3,790 for supplies purchased during the year.
What was originally called the imitation game by its creator : What is the term used for describing the judgmental or commonsense part of problem solving? What stage of the manufacturing process has been described as "the mapping of function onto form"?  What was originally called the "imitation game" by its cre..
What is the duration of these cash flows : What price would you pay for these cash flows? What total wealth do you expect after 2.5 years if you sell the rights to the remaining cash flows? Assume interest rates remain constant. What is the duration of these cash flows?
Research and describe the six rights of the consumer : Research and describe the six rights of the consumer. Provide a detailed analysis of each right and illustrate the importance.
Discuss the concept of nos in lans : Discuss the concept of NOS in LANs, and its evolution in the LAN market from its inception by Novell, and market shift from Novell's dominance (for two decades) to the ongoing Microsoft's dominance.
The prepaid insurance account had a beginning balance : Journalize the adjusting entry required at the end of the year assuming the amount of unexpired insurance related to future periods is $4,200.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write the output from instrument class methods

Write the output from your Instrument class methods to a text file that a user entered from the command line arguments (e.g. java Mynamep3tst myfilename.txt). This allows your program to accept filenames from the user via a command line argument.

  Security polices of a mobile companies

What are the security polices of a mobile companies? write a 2-3 page report and ensure to address the following points. 1) Are the existing policies obsolete?

  Traditional project management approach

Identify the business problems the project team tried to solve and analyze how they applied the agile project management techniques to ensure the project was delivered on time, on budget with good quality.

  Determine the largest vertical force p

Using the coefficients of static friction indicated, determine the largest vertical force P which can be applied to the cord without causing motion.

  Write a program that requests a state and category

State Flowers, nicknames, and mottoes. Table 4.7 contains information on several states. Write a program that requests a state and category (flower, motto and nickname) as input and displays the requested information

  Certification-accreditation implementation proposal

The introduction should briefly state the purpose of the C&A Implementation Proposal and the standardized C&A process to which your proposal document applies.

  Describe the concept of concurrency

Write 2 pages.Describe the concept of concurrency. Use examples to discuss how concurrency is used in distributed enterprise systems and why concurrency is important in these scenarios.

  A week after the upgrade it is foud out that there are some

while maintaining your companys configuration management it is determined that you need to upgrade your switches. after

  The ieee 754 single precision binary representation

What would be the IEEE 754 single precision binary representation of the floating point value -314159265. 3589 ? Express your final answer as an 8-hex-digit number and explain how your answer was obtained for full credit.

  Under what circumstances will it fail

will the above function compile in C++? Is it correct? Under what circumstances will it fail and how should it be corrected?

  Traditional strategies of organizing

Compare and contrast the traditional strategies of organizing as described by Max Weber and others from Relational strategies for organizing. Cite your references.

  Create a warped text box with the band name

Create a Warped text box with the band name, as shown in Figure 7 - 92. Sample the blue in the guitar strap for the color of the text and apply a layer style to emphasize the text.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd