In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?

  • Data Fragmentation
  • Data Partitioning
  • Data Replication
  • Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.

Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

In deep learning, when the internal states of a neural network capture necessary information about previous time steps, it is particularly referred to as _______.

  • Backpropagation
  • Convolutional Layer
  • Long Short-Term Memory
  • Recurrent Neural Network
The term you're referring to is 'Recurrent Neural Network' (RNN). RNNs are designed to capture information from previous time steps, making them suitable for sequential data tasks like natural language processing and time series analysis.

A neural network with three or more layers (input, output, and one or more hidden layers) is termed as a __________.

  • Deep Learning Network
  • Feedforward Network
  • Perceptron
  • Recurrent Network
A neural network with three or more layers, including input, output, and one or more hidden layers, is termed as a "Deep Learning Network." Deep networks are known for their ability to model complex relationships.

In HPC, the practice of splitting a single task into smaller tasks that run simultaneously across multiple processors is called _______.

  • Clustering
  • Multithreading
  • Parallelism
  • Virtualization
In High-Performance Computing (HPC), 'parallelism' is the technique of dividing a single task into smaller tasks that can run concurrently across multiple processors or cores, improving performance.

In a O(nlog?n) sorting algorithm, the log?n typically indicates the use of a _______ process.

  • Divide and Conquer
  • Linear
  • Parallel
  • Recursive
In a sorting algorithm with a time complexity of O(nlog?n), the log?n typically indicates the use of a 'Divide and Conquer' process, where the problem is split into smaller subproblems and solved recursively.

The process of gathering information about a target system to find vulnerabilities that can be exploited is called _______.

  • Debugging
  • Encryption
  • Hacking
  • Scanning
The process of gathering information about a target system to find vulnerabilities is known as 'Scanning.' It's a critical phase in penetration testing and security assessment.

In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is called _______.

  • Accountability
  • Compliance
  • Equity
  • Transparency
In IT governance, the principle that ensures stakeholders' rights are protected and taken into consideration is 'equity.' This means that the interests and concerns of all stakeholders are fairly addressed, promoting fairness and inclusivity.

Which ITSM process aims to minimize the negative impact of changes to the IT infrastructure?

  • Asset Management
  • Change Management
  • Incident Management
  • Problem Management
'Change Management' in ITSM focuses on controlling and managing changes to the IT infrastructure. It aims to minimize the negative impact of changes, ensuring that they are planned and implemented effectively.

In object-oriented programming, what concept involves hiding the internal states and requiring all interaction to be performed through well-defined interfaces?

  • Abstraction
  • Encapsulation
  • Inheritance
  • Polymorphism
'Encapsulation' is a key concept in object-oriented programming that involves bundling the internal state and methods into a single unit (a class) and allowing interaction through well-defined interfaces, thus hiding implementation details.

When visualizing data with a large number of categories, a _______ chart can help in displaying the data in a compact and organized manner.

  • Bar
  • Line
  • Pie
  • Treemap
For data visualization with many categories, a 'Treemap' chart is useful. It displays hierarchical data in a compact way, with nested rectangles representing different categories.