What is the primary purpose of an ERP system?
- Customer Relationship Management
- Employee Time Tracking
- Integrated Business Operations
- Inventory Management
The primary purpose of an 'ERP (Enterprise Resource Planning) system' is to integrate and streamline various business operations, such as finance, production, inventory, and more, to enhance efficiency and decision-making.
You are designing an IoT system for a smart city project that requires real-time processing of data from thousands of sensors spread across the city. Which computing model would be most appropriate to minimize latency?
- Cloud Computing
- Edge Computing
- Fog Computing
- Quantum Computing
In this scenario, 'Edge Computing' is the most appropriate computing model. It involves processing data closer to the data source, reducing latency by minimizing the need to send data to a remote data center (as in cloud computing) or relying on quantum computing, which is not yet widely available for practical IoT applications.
Which model architecture has been popularly used for tasks such as translation in NLP due to its attention mechanism?
- CNN (Convolutional Neural Network)
- GAN (Generative Adversarial Network)
- RNN (Recurrent Neural Network)
- Transformer
The 'Transformer' model architecture is popular in Natural Language Processing (NLP) because of its attention mechanism, which enables it to handle sequential data like text efficiently. It has been instrumental in machine translation tasks.
Web APIs that allow web pages to request incremental amounts of data as needed, rather than reloading the entire page, utilize a technique called _______.
- AJAX (Asynchronous JavaScript and XML)
- HTTP (Hypertext Transfer Protocol)
- RESTful API
- SOAP (Simple Object Access Protocol)
AJAX is a technique used to create responsive and efficient web applications by allowing web pages to request and display small data updates without having to reload the entire page.
What is the primary purpose of an intrusion detection system (IDS)?
- Encrypt data transmission
- Identify and prevent network attacks
- Improve system performance
- Manage user access
The primary purpose of an 'Intrusion Detection System (IDS)' is to identify and prevent network attacks by monitoring network traffic for suspicious or malicious activity. It helps enhance network security.
The process of converting data into a code to prevent unauthorized access is known as _______.
- Authentication
- Decryption
- Encryption
- Firewall
'Encryption' is the process of converting data into a code or cipher to make it unreadable to unauthorized users. It is a fundamental technique for protecting data confidentiality and privacy in various security contexts.
Which ITSM process is responsible for ensuring that all IT services meet the current and future needs of the business?
- Change Management
- Incident Management
- Problem Management
- Service Level Management
'Service Level Management' is the IT Service Management (ITSM) process responsible for ensuring that all IT services align with the current and future needs of the business. It involves setting, measuring, and managing service level agreements (SLAs) to meet business requirements.
A _______ is a set of conventions and best practices that dictate how developers should format and style their code to improve readability and maintainability.
- Compiler
- Debugger
- IDE
- Style guide
A 'style guide' is a collection of rules and guidelines that prescribe the coding style and formatting to be followed by developers. It enhances code consistency, readability, and maintainability.
In operating systems, what mechanism provides an interface between users or application programs and the computer hardware?
- Compiler
- Device Drivers
- File System
- Kernel
The 'kernel' serves as the core component of an operating system, providing an interface between user/application programs and the hardware. It manages system resources, scheduling, and hardware communication.
In IoT, devices that directly interact with the physical environment to collect data are called _______.
- Protocols
- Routers
- Sensors
- Servers
In the Internet of Things (IoT), 'sensors' are the devices that directly interact with the physical environment to collect data. They play a crucial role in gathering information for IoT applications.