Which of the following services typically falls under the Infrastructure as a Service (IaaS) category in cloud computing?

  • Email Services
  • Mobile Applications
  • Social Media
  • Virtual Machines
Infrastructure as a Service (IaaS) in cloud computing provides virtualized computing resources. 'Virtual Machines' are a prime example of IaaS, allowing users to provision and manage virtual servers in the cloud.

In IT project management, the total of the approved time-phased project budget, including all authorized contingency reserves, is known as _______.

  • Contingency Budget
  • Cost Baseline
  • Financial Snapshot
  • Project Quota
The term you're looking for is 'Cost Baseline.' In IT project management, the cost baseline represents the approved budget for the project, including all authorized contingency reserves. It's a critical component for tracking and controlling the project's financial aspects.

What is the main objective of the Initiation phase in a project's lifecycle?

  • Close the project
  • Define project scope
  • Develop detailed plans
  • Execute the project
The main objective of the 'Initiation' phase in a project's lifecycle is to define the project scope and its purpose. During this phase, the project's feasibility is assessed, and initial plans are developed. It sets the project's direction.

Which cryptographic algorithm uses two keys: one public and one private?

  • AES
  • DES
  • RSA
  • SHA
The RSA algorithm uses a pair of keys - one public and one private. The public key is used for encryption, while the private key is used for decryption. It's widely used for secure data transmission and digital signatures.

You are tasked with creating a web application that will have high traffic with users all around the world. Which deployment approach might help distribute the load and deliver content faster to users?

  • Agile Development
  • Database Normalization
  • Multi-Region Deployment
  • Waterfall Model
Multi-Region Deployment involves deploying your application in multiple geographic regions. This approach helps distribute the load and deliver content faster to users by serving content from servers closer to the end-users, reducing latency and improving performance.

Malware that is designed to replicate itself and spread to other devices or systems is known as _______.

  • Spyware
  • Trojan Horse
  • Virus
  • Worm
Malware that replicates and spreads to other devices is termed a 'Worm.' Worms can self-replicate and propagate across networks, making them a specific type of malicious software.

When an operating system spends much of its time paging, rather than executing application software, it is said to be in a state of _______.

  • Booting
  • Fragmentation
  • Multitasking
  • Thrashing
'Thrashing' occurs in an operating system when it spends a significant amount of time swapping data between RAM and secondary storage due to excessive paging. This can severely degrade system performance and is an undesirable state.

What is the primary purpose of recurrent neural networks (RNNs)?

  • Dimensionality reduction
  • Handling static data
  • Image classification
  • Modeling sequential data
RNNs are designed for 'modeling sequential data.' They are capable of processing data with temporal dependencies, making them suitable for tasks like natural language processing, speech recognition, and time series analysis. RNNs maintain a hidden state that carries information from previous time steps.

How do fog computing and edge computing differ in the context of IoT?

  • Edge computing focuses on cloud-based data processing, while fog computing utilizes on-device processing.
  • Edge computing processes data closer to its source, while fog computing processes data at a central node.
  • Fog computing and edge computing are the same in the context of IoT.
  • Fog computing is centralized, while edge computing is distributed.
In the context of IoT, 'edge computing' processes data near its source, often at the edge of the network, reducing latency and dependence on centralized servers. 'Fog computing,' on the other hand, is a bit broader and may involve localized processing but can also involve central nodes. This distinction is crucial for IoT applications that require real-time data processing.

A _______ is a database object that automatically triggers specific actions when certain events occur in the database.

  • Index
  • Procedure
  • Trigger
  • View
In the context of databases, a 'trigger' is an object that automatically initiates specific actions when predefined events, such as data changes or updates, occur in the database. Triggers help maintain data integrity and enforce business rules.