What cryptographic technique allows multiple parties to compute a function over their inputs while keeping those inputs private?

  • Digital Signatures
  • Public Key Infrastructure (PKI)
  • Secure Multi-Party Computation
  • Zero-Knowledge Proof
Secure Multi-Party Computation (SMPC) is a cryptographic technique that enables multiple parties to jointly compute a function over their inputs while ensuring the privacy of those inputs. It's used in scenarios where data privacy is crucial, such as collaborative data analysis without revealing individual data points.

One of the pillars of IT governance is ensuring that IT resources are used responsibly, efficiently, and _______.

  • Effectively
  • Innovatively
  • Securely
  • Transparently
In IT governance, one of the pillars is to ensure that IT resources are used responsibly, efficiently, and 'transparently.' This means that actions and decisions related to IT should be clear and open to scrutiny, promoting accountability and trust.

Which module in an ERP system typically manages human resources, payroll, and benefits?

  • Finance Module
  • HR Module
  • Inventory Module
  • Sales Module
The 'HR (Human Resources) Module' in an ERP system is responsible for managing various aspects of an organization's human resources, including payroll, employee benefits, and personnel data. It helps streamline HR-related processes.

Which RAID level provides disk mirroring for fault tolerance without striping?

  • RAID 0
  • RAID 1
  • RAID 10
  • RAID 5
RAID 1, also known as disk mirroring, is a RAID level that provides fault tolerance by duplicating data on two or more disks. It doesn't involve striping, making it a reliable choice for data redundancy.

High-Performance Computing (HPC) is commonly associated with which type of processing?

  • Everyday computing tasks
  • Scientific and data-intensive tasks
  • Simple mathematical calculations
  • Social media management
High-Performance Computing (HPC) is associated with "scientific and data-intensive tasks." These tasks involve complex simulations, modeling, and data analysis that require immense computational power, often beyond the capability of regular computers.

Which activation function in neural networks maps its input to values between 0 and 1?

  • Leaky ReLU
  • ReLU (Rectified Linear Unit)
  • Sigmoid
  • Tanh (Hyperbolic Tangent)
The activation function that maps its input to values between 0 and 1 is the 'Sigmoid' function. It's commonly used in the output layer of a neural network for binary classification tasks, where it represents probabilities.

You're developing a web application where performance is a critical concern. Which technique would be most suitable for reducing the load times of your web pages?

  • Content Delivery Networks (CDNs)
  • Object-Oriented Programming
  • Static Code Analysis
  • Waterfall Model
Content Delivery Networks (CDNs) are crucial for optimizing web page load times. CDNs distribute content to servers closer to the user, reducing latency and speeding up page loading. They cache assets and reduce the load on the origin server, improving performance.

Which type of visualization would be most appropriate for representing hierarchical data, like the structure of an organization?

  • Bar Chart
  • Pie Chart
  • Scatter Plot
  • Tree Diagram
Representing hierarchical data, such as the structure of an organization, is best done using a 'Tree Diagram' visualization. It visually displays the parent-child relationships between different levels of a hierarchy, making it clear and organized.

Which data structure would be most efficient for implementing a cache with least recently used (LRU) eviction policy?

  • Binary Search Tree
  • Doubly Linked List
  • Hash Table
  • Priority Queue
A 'Doubly Linked List' is a common choice for implementing an LRU cache. It allows efficient insertion and removal of elements from both ends, making it suitable for the LRU policy.

Which protocol operates at the Data Link layer and prevents loops in Ethernet networks by creating a loop-free logical topology?

  • ARP
  • ICMP
  • OSPF
  • STP
The Spanning Tree Protocol (STP) operates at the Data Link layer and prevents loops in Ethernet networks by creating a loop-free logical topology. It's crucial for network stability and redundancy in Ethernet networks.