In the context of IoT, what does the term "edge computing" refer to?

  • Processing data at the network core
  • Processing data in the cloud
  • Processing data on IoT devices
  • Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.

What is the primary goal of IT governance within an organization?

  • Aligning IT with business
  • Ensuring data security
  • Managing IT projects
  • Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.

Which system is designed to detect and prevent unauthorized access to or from a computer network?

  • Firewall
  • Modem
  • Router
  • Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.

In NLP, what is the process of converting words into numerical vectors called?

  • Embedding
  • Lemmatization
  • Stemming
  • Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.

In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?

  • FTP (File Transfer Protocol)
  • NFS (Network File System)
  • SMB (Server Message Block)
  • iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.

One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.

  • FastText
  • Semantic Segmentation
  • Subword Tokenization
  • Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.

A research institute is working on a complex weather prediction model that requires the simultaneous processing of vast datasets. Which type of computing infrastructure would best suit their needs?

  • Grid Computing
  • High-Performance Computing (HPC)
  • Mainframe Computing
  • Quantum Computing
For the processing of vast datasets and complex simulations, 'High-Performance Computing (HPC)' is the ideal choice. It offers exceptional processing power and parallel computing capabilities, making it suitable for tasks like weather prediction models. Mainframes, grid computing, and quantum computing may not provide the necessary performance.

In the context of computer architecture, what does the term "bus" refer to?

  • A communication pathway for data
  • A high-speed memory
  • A system's central processing unit
  • A type of storage device
In computer architecture, a "bus" refers to a communication pathway for data, serving as a conduit to transfer data and control signals between different hardware components in a computer system.

_______ is a Cisco proprietary protocol used between switches to maintain a loop-free network.

  • ARP
  • Internet Control Message Protocol (ICMP)
  • Spanning Tree Protocol (STP)
  • VLAN Trunking Protocol (VTP)
The 'Spanning Tree Protocol (STP)' is a Cisco proprietary protocol used to prevent and eliminate loops in Ethernet networks. It helps ensure network reliability by maintaining a loop-free topology.

Which algorithmic paradigm solves problems by trying out solutions using one or more models and then adapting based on what works and what doesn't?

  • Divide and Conquer
  • Dynamic Programming
  • Genetic Algorithms
  • Greedy Algorithms
'Greedy Algorithms' follow a paradigm where they make locally optimal choices at each step, hoping to find a globally optimal solution. They adapt based on immediate success without considering future consequences.