In data visualization, which type of chart is best suited for showing the distribution of a single continuous variable?

  • Bar Chart
  • Histogram
  • Line Chart
  • Pie Chart
A 'Histogram' is ideal for displaying the distribution of a single continuous variable. It divides the data into intervals or bins and shows the frequency or count of data points within each bin, giving insights into the data's distribution.

In which sorting algorithm are repeated swaps made to bring elements to their correct position, typically visualized like "bubbles" moving up in a fluid?

  • Bubble Sort
  • Insertion Sort
  • Merge Sort
  • Quick Sort
'Bubble Sort' is an elementary sorting algorithm that repeatedly steps through the list, compares adjacent elements, and swaps them if they are in the wrong order. The largest unsorted element "bubbles up" to its correct position.

The SQL command used to modify the structure of an existing table is _______.

  • ALTER TABLE
  • CHANGE TABLE
  • MODIFY TABLE
  • UPDATE TABLE
The SQL command 'ALTER TABLE' is used to modify the structure of an existing table, such as adding, deleting, or modifying columns. It's a crucial operation in database management.

Which technique helps prevent overfitting by ignoring certain neurons during training?

  • Batch Normalization
  • Dropout
  • Gradient Clipping
  • ReLU Activation Function
The technique that helps prevent overfitting by ignoring certain neurons during training is 'Dropout.' It randomly deactivates neurons, forcing the network to learn more robust representations.

A project's _______ defines the work that needs to be accomplished to deliver a product, service, or result with the specified features and functions.

  • Milestone
  • Risk Register
  • Scope Statement
  • Stakeholder Analysis
The 'scope statement' in a project defines the work that must be completed to deliver the project's intended product, service, or result with specified features and functions. It sets the boundaries for the project and helps manage expectations. Milestones are significant project events, the Risk Register records project risks, and Stakeholder Analysis involves identifying and assessing stakeholders.

You are tasked with setting up a public Wi-Fi network for a cafe. Which security measure would be most appropriate to prevent users from seeing the traffic of other users?

  • Intrusion Detection System
  • MAC Filtering
  • VPN Configuration
  • WPA3 Encryption
Utilizing WPA3 (Wi-Fi Protected Access 3) encryption is a crucial security measure for a public Wi-Fi network. It encrypts the data between the user's device and the access point, preventing other users from intercepting or seeing the traffic.

In the context of ERP, what is the primary challenge of "data silos"?

  • Data duplication
  • Data encryption
  • Data integration
  • Data isolation
"Data silos" in ERP refer to isolated data repositories within an organization, and the primary challenge they pose is 'data integration.' Integrated data is essential for a holistic view of business processes and decision-making.

What does RAID stand for in terms of data storage?

  • Random Access and Integrated Data
  • Rapid Access and Integrated Devices
  • Read-Write Automation and Integrated Data
  • Redundant Array of Independent Disks
RAID, which stands for 'Redundant Array of Independent Disks,' is a technology used in data storage to combine multiple physical disks into a single logical unit for the purpose of data redundancy, improved performance, or both. It helps protect data from disk failures and can enhance data access speed.

A _______ is a virtualized storage model that pools physical storage from multiple network storage devices and makes it appear as if it's a single storage device.

  • DNS
  • NAS
  • RAID
  • SAN
A 'SAN' (Storage Area Network) is a virtualized storage model that combines physical storage from various network storage devices into a single storage device. It provides high-speed data access and centralized storage management.

In a router, the table that keeps track of paths to active networks and how to reach them is known as the _______ table.

  • ARP
  • Destination
  • Routing
  • Routing Information Base (RIB)
In a router, the table that keeps track of paths to active networks and how to reach them is known as the 'Routing' table. This table is used for making forwarding decisions based on the destination address.