Which scheduling algorithm in operating systems gives the shortest job the highest priority?
- First-Come-First-Served (FCFS)
- Priority Scheduling
- Round Robin
- Shortest Job Next (SJN)
The scheduling algorithm that gives the shortest job the highest priority is "Shortest Job Next" (SJN). This approach minimizes waiting time and helps to execute shorter tasks quickly, leading to optimal resource utilization.
Which type of malware disguises itself as legitimate software to deceive users into installing malicious code?
- Spyware
- Trojan Horse
- Virus
- Worm
A 'Trojan Horse' is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can execute malicious actions without the user's knowledge.
The process of integrating new digital technologies and processes into an organization's existing ecosystem, without a complete overhaul, is called _______ transformation.
- Agile
- Digital
- Incremental
- Radical
'Incremental' transformation is the process of gradually integrating new digital technologies and processes into an organization's existing ecosystem without completely overhauling the existing systems. It allows for a smoother transition and reduces disruption.
In the context of network security, what does "DLP" stand for, and what is its primary function?
- Data Leakage Prevention (DLP)
- Digital Language Processor
- Distributed Logging Process
- Dynamic Link Protocol
"DLP" stands for "Data Leakage Prevention." Its primary function is to identify, monitor, and prevent unauthorized data transfer or disclosure, whether intentional or accidental, to protect sensitive information within an organization.
In the context of IoT, what does the term "edge computing" refer to?
- Processing data at the network core
- Processing data in the cloud
- Processing data on IoT devices
- Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.
What is the primary goal of IT governance within an organization?
- Aligning IT with business
- Ensuring data security
- Managing IT projects
- Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.
Which system is designed to detect and prevent unauthorized access to or from a computer network?
- Firewall
- Modem
- Router
- Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.
In NLP, what is the process of converting words into numerical vectors called?
- Embedding
- Lemmatization
- Stemming
- Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.
In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?
- FTP (File Transfer Protocol)
- NFS (Network File System)
- SMB (Server Message Block)
- iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.
One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.
- FastText
- Semantic Segmentation
- Subword Tokenization
- Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.