In IoT, devices that directly interact with the physical environment to collect data are called _______.
- Protocols
- Routers
- Sensors
- Servers
In the Internet of Things (IoT), 'sensors' are the devices that directly interact with the physical environment to collect data. They play a crucial role in gathering information for IoT applications.
In operating systems, what mechanism provides an interface between users or application programs and the computer hardware?
- Compiler
- Device Drivers
- File System
- Kernel
The 'kernel' serves as the core component of an operating system, providing an interface between user/application programs and the hardware. It manages system resources, scheduling, and hardware communication.
A _______ is a set of conventions and best practices that dictate how developers should format and style their code to improve readability and maintainability.
- Compiler
- Debugger
- IDE
- Style guide
A 'style guide' is a collection of rules and guidelines that prescribe the coding style and formatting to be followed by developers. It enhances code consistency, readability, and maintainability.
Which ITSM process is responsible for ensuring that all IT services meet the current and future needs of the business?
- Change Management
- Incident Management
- Problem Management
- Service Level Management
'Service Level Management' is the IT Service Management (ITSM) process responsible for ensuring that all IT services align with the current and future needs of the business. It involves setting, measuring, and managing service level agreements (SLAs) to meet business requirements.
The process of converting data into a code to prevent unauthorized access is known as _______.
- Authentication
- Decryption
- Encryption
- Firewall
'Encryption' is the process of converting data into a code or cipher to make it unreadable to unauthorized users. It is a fundamental technique for protecting data confidentiality and privacy in various security contexts.
What is the primary purpose of an intrusion detection system (IDS)?
- Encrypt data transmission
- Identify and prevent network attacks
- Improve system performance
- Manage user access
The primary purpose of an 'Intrusion Detection System (IDS)' is to identify and prevent network attacks by monitoring network traffic for suspicious or malicious activity. It helps enhance network security.
Web APIs that allow web pages to request incremental amounts of data as needed, rather than reloading the entire page, utilize a technique called _______.
- AJAX (Asynchronous JavaScript and XML)
- HTTP (Hypertext Transfer Protocol)
- RESTful API
- SOAP (Simple Object Access Protocol)
AJAX is a technique used to create responsive and efficient web applications by allowing web pages to request and display small data updates without having to reload the entire page.
Which model architecture has been popularly used for tasks such as translation in NLP due to its attention mechanism?
- CNN (Convolutional Neural Network)
- GAN (Generative Adversarial Network)
- RNN (Recurrent Neural Network)
- Transformer
The 'Transformer' model architecture is popular in Natural Language Processing (NLP) because of its attention mechanism, which enables it to handle sequential data like text efficiently. It has been instrumental in machine translation tasks.
You are designing an IoT system for a smart city project that requires real-time processing of data from thousands of sensors spread across the city. Which computing model would be most appropriate to minimize latency?
- Cloud Computing
- Edge Computing
- Fog Computing
- Quantum Computing
In this scenario, 'Edge Computing' is the most appropriate computing model. It involves processing data closer to the data source, reducing latency by minimizing the need to send data to a remote data center (as in cloud computing) or relying on quantum computing, which is not yet widely available for practical IoT applications.
Which front-end JavaScript framework introduces the concept of a "virtual DOM" to optimize rendering performance?
- Angular
- Ember.js
- React
- Vue.js
'React' is a front-end JavaScript framework that introduces the concept of a "virtual DOM." This virtual representation of the real DOM is used to optimize rendering by minimizing actual DOM updates, enhancing performance.
A company has sensitive data they want to transfer over the internet. They decide to use a VPN. What is the primary benefit of this approach in terms of network security?
- Data Compression
- Enhanced Performance
- Lower Latency
- Secure and Encrypted Data Transfer
The primary benefit of using a VPN (Virtual Private Network) for transferring sensitive data is the 'secure and encrypted data transfer.' A VPN creates a secure tunnel for data to pass through, ensuring that data is encrypted and protected from interception during transmission.
In the context of neural networks, the function used to quantify how far the predicted output is from the actual output is termed as _______.
- Activation Function
- Cost Function
- Gradient Descent
- Loss Function
In neural networks, the term you're looking for is the 'Loss Function.' This function quantifies the difference between the predicted output and the actual output, helping the network learn and improve its predictions during training.