Which wireless networking technology is optimized for low power usage and short-range communications, often used in wearable devices?

  • Bluetooth LE (Low Energy)
  • LTE (Long-Term Evolution)
  • NFC (Near Field Communication)
  • Wi-Fi
Bluetooth Low Energy (LE) is optimized for low power usage and short-range communications, making it ideal for wearable devices, IoT, and other applications where power efficiency is crucial.

Which operating system concept allows multiple programs to run concurrently by sharing the same CPU time?

  • Multiprocessing
  • Multiprogramming
  • Multitasking
  • Multithreading
'Multitasking' is an operating system concept that allows multiple programs to run concurrently by 'sharing the same CPU time.' This enables users to switch between applications seamlessly.

The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called __________.

  • Cross-Validation
  • Overfitting
  • Regularization
  • Underfitting
The method where certain portions of a dataset are intentionally left out of training to validate the model's performance is called "Cross-Validation." Cross-validation helps assess a model's generalization and performance on unseen data.

A common challenge in NLP where words have multiple meanings depending on context is known as _______.

  • Ambiguity
  • Homonymy
  • Polysemy
  • Synonymy
In NLP, 'Polysemy' refers to a situation where a word has multiple meanings, and the meaning depends on the context. This is a significant challenge in natural language understanding.

Web APIs that allow web pages to request incremental amounts of data as needed, rather than reloading the entire page, utilize a technique called _______.

  • AJAX (Asynchronous JavaScript and XML)
  • HTTP (Hypertext Transfer Protocol)
  • RESTful API
  • SOAP (Simple Object Access Protocol)
AJAX is a technique used to create responsive and efficient web applications by allowing web pages to request and display small data updates without having to reload the entire page.

What is the primary purpose of an intrusion detection system (IDS)?

  • Encrypt data transmission
  • Identify and prevent network attacks
  • Improve system performance
  • Manage user access
The primary purpose of an 'Intrusion Detection System (IDS)' is to identify and prevent network attacks by monitoring network traffic for suspicious or malicious activity. It helps enhance network security.

The process of converting data into a code to prevent unauthorized access is known as _______.

  • Authentication
  • Decryption
  • Encryption
  • Firewall
'Encryption' is the process of converting data into a code or cipher to make it unreadable to unauthorized users. It is a fundamental technique for protecting data confidentiality and privacy in various security contexts.

Which ITSM process is responsible for ensuring that all IT services meet the current and future needs of the business?

  • Change Management
  • Incident Management
  • Problem Management
  • Service Level Management
'Service Level Management' is the IT Service Management (ITSM) process responsible for ensuring that all IT services align with the current and future needs of the business. It involves setting, measuring, and managing service level agreements (SLAs) to meet business requirements.

A _______ is a set of conventions and best practices that dictate how developers should format and style their code to improve readability and maintainability.

  • Compiler
  • Debugger
  • IDE
  • Style guide
A 'style guide' is a collection of rules and guidelines that prescribe the coding style and formatting to be followed by developers. It enhances code consistency, readability, and maintainability.

In operating systems, what mechanism provides an interface between users or application programs and the computer hardware?

  • Compiler
  • Device Drivers
  • File System
  • Kernel
The 'kernel' serves as the core component of an operating system, providing an interface between user/application programs and the hardware. It manages system resources, scheduling, and hardware communication.