Which cryptographic attack involves trying every possible key until the correct one is found?
- Brute Force Attack
- DDoS Attack
- Man-in-the-Middle
- SQL Injection
A 'Brute Force Attack' is an approach where an attacker tries every possible key or combination until the correct one is found. It's used to crack passwords, encryption, or authentication mechanisms.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations, and 'multiplication' is performed before addition, subtraction, and division.
Which design principle suggests that objects should be open for extension but closed for modification?
- Abstraction
- Inheritance
- Open-Closed Principle
- Polymorphism
The 'Open-Closed Principle' is a fundamental design principle in object-oriented programming. It suggests that software entities (such as classes) should be open for extension (new functionality can be added) but closed for modification (existing code remains unchanged). This encourages modularity and maintainability.
In the context of data storage, what does deduplication refer to?
- Accelerating data access
- Encrypting data
- Increasing data capacity
- Reducing data redundancy
'Deduplication' is a data reduction technique that involves eliminating duplicate copies of data, thus reducing data redundancy. This process saves storage space and improves efficiency.
Which type of neural network architecture is particularly effective for sequence-to-sequence tasks, such as language translation?
- Autoencoders
- Convolutional Neural Networks (CNNs)
- Generative Adversarial Networks (GANs)
- Recurrent Neural Networks (RNNs)
Recurrent Neural Networks (RNNs) are particularly effective for 'sequence-to-sequence' tasks. They are widely used in tasks like language translation and speech recognition. The ability to maintain context from previous time steps allows RNNs to generate meaningful sequences, making them suitable for these tasks.
In which switching method is the entire frame stored before it is forwarded to its destination?
- Circuit Switching
- Message Switching
- Packet Switching
- Store-and-Forward
Store-and-Forward switching is a method where the entire data frame is received and stored before being forwarded to its destination. This method allows for error checking and can help prevent network congestion.
Which method in NLP helps in reducing the dimensionality of word vectors while retaining most of the important information?
- Dimensionality Reduction
- Latent Semantic Analysis (LSA)
- Neural Networks
- Word Embedding
'Latent Semantic Analysis (LSA)' is a technique in NLP that reduces the dimensionality of word vectors while preserving important semantic information. It's a method used for semantic analysis and text retrieval.
In the context of digital transformation, which term refers to the redesign of business processes, often involving the integration of advanced digital technologies?
- Agile Transformation
- Business Process Reengineering (BPR)
- DevOps (Development and Operations)
- Waterfall Methodology
'Business Process Reengineering (BPR)' refers to the significant redesign of business processes to achieve improvements in efficiency, effectiveness, and often involves integrating advanced digital technologies to streamline and enhance operations.
In the context of information security, what does the acronym "CIA" stand for?
- Central Intelligence Agency
- Computer Information Access
- Confidentiality, Integrity, Availability
- Cybersecurity and Information Assurance
In information security, "CIA" stands for 'Confidentiality, Integrity, and Availability.' These three principles are fundamental to ensuring the security and reliability of data and systems.
A company is undergoing a major digital transformation initiative. They are looking to adopt a cloud-first strategy. Which governance consideration should be a priority to ensure data protection and compliance?
- Cost Reduction and Efficiency
- Data Residency and Compliance
- Innovation and Experimentation
- Vendor Lock-In
In the context of a cloud-first strategy, 'Data Residency and Compliance' is a priority because it ensures that data is stored in compliance with legal and regulatory requirements, minimizing the risk of non-compliance and data breaches.