A company wants to develop a mobile app that works both offline and online, syncing data when a connection is available. Which type of database would be most suitable for this requirement?
- Graph Database
- In-Memory Database
- NoSQL
- SQL (Relational)
For offline-online sync, a 'NoSQL' database, like document-oriented databases, is often used. NoSQL databases offer flexible schema and can efficiently handle unstructured data, making them suitable for mobile apps with sync requirements.
The methodology that emphasizes a phased approach to deploying ERP solutions, where each phase is a stepping stone for the next, is called _______.
- Agile Implementation
- Incremental Implementation
- RAD (Rapid Application Development)
- Waterfall Implementation
The methodology described is known as 'Incremental Implementation.' In this approach, an ERP (Enterprise Resource Planning) solution is deployed in phases, with each phase building upon the previous one, providing a structured and manageable implementation process.
In BGP (Border Gateway Protocol), what is the primary metric used for path selection?
- AS Path Length
- Hop Count
- Link Bandwidth
- Network Latency
The primary metric used in BGP for path selection is the 'AS Path Length.' BGP routers use this information to determine the best path to a destination network based on the number of Autonomous Systems (ASes) through which the route has traversed.
How does a "risk matrix" aid in the IT risk management process?
- Eliminating risks
- Identifying risks
- Prioritizing risks
- Quantifying risks
A "risk matrix" helps in 'prioritizing risks.' It categorizes risks based on their likelihood and impact, allowing organizations to focus their resources on mitigating the most critical risks first.
Which type of malware is specifically designed to be activated at a certain time or when a specific condition is met?
- Logic Bomb
- Ransomware
- Spyware
- Trojan Horse
A 'Logic Bomb' is a type of malware that is programmed to execute malicious actions when a predefined condition is met, such as a specific time or event. It can cause harm or data loss.
Which wireless networking technology is optimized for low power usage and short-range communications, often used in wearable devices?
- Bluetooth LE (Low Energy)
- LTE (Long-Term Evolution)
- NFC (Near Field Communication)
- Wi-Fi
Bluetooth Low Energy (LE) is optimized for low power usage and short-range communications, making it ideal for wearable devices, IoT, and other applications where power efficiency is crucial.
Which protocol is used to assign IP addresses to devices on a network automatically?
- DHCP
- DNS
- FTP
- HTTP
The 'DHCP (Dynamic Host Configuration Protocol)' is used to automatically assign IP addresses to devices on a network. It simplifies network management by dynamically allocating IPs to devices.
What is the primary function of the ALU (Arithmetic Logic Unit) in a computer?
- Display graphics
- Execute instructions
- Manage storage
- Store data
The primary function of the ALU (Arithmetic Logic Unit) is to 'execute instructions.' It performs arithmetic operations (addition, subtraction, etc.) and logical operations (AND, OR, etc.) as directed by the CPU.
Which operating system concept allows multiple programs to run concurrently by sharing the same CPU time?
- Multiprocessing
- Multiprogramming
- Multitasking
- Multithreading
'Multitasking' is an operating system concept that allows multiple programs to run concurrently by 'sharing the same CPU time.' This enables users to switch between applications seamlessly.
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called __________.
- Cross-Validation
- Overfitting
- Regularization
- Underfitting
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called "Cross-Validation." Cross-validation helps assess a model's generalization and performance on unseen data.