In NLP, what is the process of converting words into numerical vectors called?
- Embedding
- Lemmatization
- Stemming
- Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.
In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?
- FTP (File Transfer Protocol)
- NFS (Network File System)
- SMB (Server Message Block)
- iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.
One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.
- FastText
- Semantic Segmentation
- Subword Tokenization
- Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.
Which type of malware disguises itself as legitimate software to deceive users into installing malicious code?
- Spyware
- Trojan Horse
- Virus
- Worm
A 'Trojan Horse' is a type of malware that disguises itself as legitimate software, tricking users into installing it. Once installed, it can execute malicious actions without the user's knowledge.
The process of integrating new digital technologies and processes into an organization's existing ecosystem, without a complete overhaul, is called _______ transformation.
- Agile
- Digital
- Incremental
- Radical
'Incremental' transformation is the process of gradually integrating new digital technologies and processes into an organization's existing ecosystem without completely overhauling the existing systems. It allows for a smoother transition and reduces disruption.
In the context of network security, what does "DLP" stand for, and what is its primary function?
- Data Leakage Prevention (DLP)
- Digital Language Processor
- Distributed Logging Process
- Dynamic Link Protocol
"DLP" stands for "Data Leakage Prevention." Its primary function is to identify, monitor, and prevent unauthorized data transfer or disclosure, whether intentional or accidental, to protect sensitive information within an organization.
Which algorithmic paradigm solves problems by trying out solutions using one or more models and then adapting based on what works and what doesn't?
- Divide and Conquer
- Dynamic Programming
- Genetic Algorithms
- Greedy Algorithms
'Greedy Algorithms' follow a paradigm where they make locally optimal choices at each step, hoping to find a globally optimal solution. They adapt based on immediate success without considering future consequences.
Which memory type is non-volatile and can be electrically erased and reprogrammed?
- Cache
- EEPROM
- RAM
- ROM
'EEPROM' stands for Electrically Erasable Programmable Read-Only Memory. It is a non-volatile memory type that can be erased and reprogrammed electrically. It is commonly used for storing firmware and configuration data.
Which component of a computer temporarily stores data that the CPU is currently processing or using?
- Hard Drive
- Keyboard
- Monitor
- RAM
RAM (Random Access Memory) is a component of a computer that 'temporarily stores data' that the CPU is currently processing. It provides fast access to data and programs that are in use.
In most programming languages, which arithmetic operation is performed first if no parentheses are used?
- Addition
- Division
- Multiplication
- Subtraction
In the absence of parentheses, most programming languages follow the order of operations (PEMDAS/BODMAS). This means that 'multiplication' is performed before addition, subtraction, and division. It's important to understand these rules for correctly evaluating mathematical expressions in code.