In the context of IoT, what does the term "edge computing" refer to?
- Processing data at the network core
- Processing data in the cloud
- Processing data on IoT devices
- Processing data on a printed circuit board
"Edge computing" in IoT refers to processing data on the IoT devices themselves, closer to the data source. This helps reduce latency and enhances real-time decision-making, making it an important concept in IoT.
What is the primary goal of IT governance within an organization?
- Aligning IT with business
- Ensuring data security
- Managing IT projects
- Maximizing profits
The primary goal of IT governance is to 'align IT with business.' It ensures that IT investments, resources, and strategies are in harmony with the organization's objectives, contributing to business success.
Which system is designed to detect and prevent unauthorized access to or from a computer network?
- Firewall
- Modem
- Router
- Switch
A 'Firewall' is a security system designed to detect and prevent unauthorized access to or from a computer network. It acts as a barrier between a trusted internal network and untrusted external networks.
In NLP, what is the process of converting words into numerical vectors called?
- Embedding
- Lemmatization
- Stemming
- Tokenization
The process of converting words into numerical vectors in NLP is called 'Embedding.' Word embeddings like Word2Vec, GloVe, and FastText are widely used to represent words as dense vectors in machine learning models.
In Storage Area Networks (SAN), which protocol is commonly used to transfer data between the storage devices and servers?
- FTP (File Transfer Protocol)
- NFS (Network File System)
- SMB (Server Message Block)
- iSCSI (Internet Small Computer System Interface)
In Storage Area Networks (SAN), 'iSCSI' is commonly used to transfer data between storage devices and servers. iSCSI allows for block-level data transfer over IP networks, making it a popular choice for SANs.
One of the advanced techniques in NLP for handling large vocabularies without assigning a unique token to each word is called _______.
- FastText
- Semantic Segmentation
- Subword Tokenization
- Word2Vec
The technique mentioned is 'Subword Tokenization,' which involves breaking words into smaller units, such as subword pieces or characters, to handle large vocabularies efficiently. This is commonly used in models like BERT.
In terms of information assurance, what practice ensures that only authorized modifications are made to an organization's assets?
- Change Management
- Data Encryption
- Firewall Configuration
- Intrusion Detection
Change Management is a crucial practice in information assurance that ensures that only authorized modifications are made to an organization's assets, including hardware, software, and data. It involves a structured process of requesting, reviewing, and approving changes to maintain system integrity and security.
What technique do threat actors use to exploit human psychology, rather than technical vulnerabilities, to gain unauthorized access or information?
- Encryption
- Firewall
- Intrusion Detection System (IDS)
- Phishing
'Phishing' is a technique where threat actors use social engineering to manipulate human psychology and trick individuals into revealing sensitive information or granting unauthorized access.
A research institute is working on a complex weather prediction model that requires the simultaneous processing of vast datasets. Which type of computing infrastructure would best suit their needs?
- Grid Computing
- High-Performance Computing (HPC)
- Mainframe Computing
- Quantum Computing
For the processing of vast datasets and complex simulations, 'High-Performance Computing (HPC)' is the ideal choice. It offers exceptional processing power and parallel computing capabilities, making it suitable for tasks like weather prediction models. Mainframes, grid computing, and quantum computing may not provide the necessary performance.
In the context of computer architecture, what does the term "bus" refer to?
- A communication pathway for data
- A high-speed memory
- A system's central processing unit
- A type of storage device
In computer architecture, a "bus" refers to a communication pathway for data, serving as a conduit to transfer data and control signals between different hardware components in a computer system.