Which storage device uses NAND-based flash memory and offers quicker data access than traditional HDDs?

  • CD-ROM (Compact Disc Read-Only Memory)
  • Floppy Disk
  • RAM (Random Access Memory)
  • SSD (Solid State Drive)
An SSD, which stands for 'Solid State Drive,' uses NAND-based flash memory to store data. It is significantly faster in terms of data access compared to traditional HDDs (Hard Disk Drives) because it has no moving parts, resulting in quicker data retrieval. SSDs are commonly used for faster storage and improved system performance.

In a distributed database, what term describes the division of a database into parts, each of which is stored on different servers?

  • Data Fragmentation
  • Data Partitioning
  • Data Replication
  • Data Sharding
Data Sharding is a technique in distributed databases where a database is divided into smaller parts called "shards," and each shard is stored on different servers. This improves data distribution and scalability.

In IT project management, what technique visualizes tasks or activities on a board, allowing team members to track project progress?

  • Critical Path Method (CPM)
  • Gantt Chart
  • Kanban
  • Waterfall Method
The technique that visualizes tasks on a board for easy tracking is 'Kanban.' Kanban is widely used in Agile project management, allowing teams to manage work in progress effectively and optimize flow.

In wireless networks, what does the term "SSID" stand for?

  • Secure System Identifier
  • Signal Strength Indicator
  • Service Set Identifier
  • Subnet Specification
"SSID" stands for "Service Set Identifier" (Option c). It is a unique name used to identify a wireless network. When connecting to a Wi-Fi network, users select the network with the matching SSID. This helps users distinguish between different networks.

In ITSM, a _______ is a standard or set of guidelines for how something might be accomplished, but without mandating a particular tool or method.

  • Best Practice
  • Change Request Form
  • Process Model
  • Service Catalog
In IT Service Management (ITSM), a 'best practice' refers to a standard or set of guidelines for achieving a specific objective or task effectively. It provides recommendations and proven methods, but it doesn't require the use of a particular tool or approach. A Process Model outlines how a specific process works, a Service Catalog lists available services, and a Change Request Form is used to request changes in IT services.

The concept of providing a dedicated portion of a public cloud environment exclusively for a single tenant is called _______.

  • Cloud Bursting
  • Multi-Tenancy
  • Single-Tenancy
  • Virtualization
Single-Tenancy refers to the practice of allocating a dedicated portion of a public cloud for a single tenant or organization, providing isolation and control over resources.

The concept in ERP where data is entered once and is then accessible from multiple applications without redundancy is referred to as _______.

  • Data Aggregation
  • Data Duplication
  • Data Integration
  • Data Normalization
The concept described is 'Data Integration' in ERP. It ensures that data is entered once and can be accessed by multiple applications without duplication. This enhances data accuracy and consistency across the organization.

In app development, the method of delivering updates to only a portion of the app's user base to test changes before a full release is known as _______.

  • A/B testing
  • Alpha testing
  • Beta testing
  • Canary testing
A/B testing, or "split testing," is a method where different versions of an application are released to different user groups. It's a technique used to assess the impact of changes before a full release.

An industrial company wants to deploy IoT sensors in their machinery to predict maintenance needs. However, they are concerned about the potential security risks. Which aspect of IoT should they prioritize to ensure the safe transmission of data?

  • Data Encryption
  • Device Authentication
  • Predictive Maintenance Algorithms
  • Secure Boot Process
Prioritizing a 'Secure Boot Process' is essential for ensuring the safe transmission of IoT data. This process ensures that only trusted, authenticated firmware and software are loaded onto devices, preventing unauthorized access and enhancing security. While data encryption, device authentication, and predictive maintenance algorithms are important, securing the boot process is the first line of defense.

A neural network with three or more layers (input, output, and one or more hidden layers) is termed as a __________.

  • Deep Learning Network
  • Feedforward Network
  • Perceptron
  • Recurrent Network
A neural network with three or more layers, including input, output, and one or more hidden layers, is termed as a "Deep Learning Network." Deep networks are known for their ability to model complex relationships.