How do fog computing and edge computing differ in the context of IoT?

  • Edge computing focuses on cloud-based data processing, while fog computing utilizes on-device processing.
  • Edge computing processes data closer to its source, while fog computing processes data at a central node.
  • Fog computing and edge computing are the same in the context of IoT.
  • Fog computing is centralized, while edge computing is distributed.
In the context of IoT, 'edge computing' processes data near its source, often at the edge of the network, reducing latency and dependence on centralized servers. 'Fog computing,' on the other hand, is a bit broader and may involve localized processing but can also involve central nodes. This distinction is crucial for IoT applications that require real-time data processing.

A _______ is a database object that automatically triggers specific actions when certain events occur in the database.

  • Index
  • Procedure
  • Trigger
  • View
In the context of databases, a 'trigger' is an object that automatically initiates specific actions when predefined events, such as data changes or updates, occur in the database. Triggers help maintain data integrity and enforce business rules.

You are setting up a network for a small business. They want to ensure that even if one of the network paths fails, there will be another path available for data to travel. Which type of routing should you consider implementing?

  • Default Routing
  • Dynamic Routing
  • Load Balancing
  • Static Routing
In this scenario, implementing 'Dynamic Routing' is the most suitable choice. Dynamic routing protocols like OSPF or EIGRP allow routers to automatically update routing tables, making it possible for data to take alternative paths in case of network path failures.

What is the main purpose of a "tokenizer" in Natural Language Processing?

  • Converting text to speech
  • Counting words
  • Identifying emotions
  • Splitting text into words
A "tokenizer" in NLP is used for 'splitting text into words or tokens.' It breaks down a piece of text into individual words or tokens, which is a fundamental step in many NLP tasks such as text analysis, language modeling, and more.

A company is experiencing slow network speeds during specific times of the day. They suspect it might be a loop in the network. Which tool or protocol can help in detecting and preventing such loops?

  • ICMP
  • NAT
  • SNMP
  • Spanning Tree Protocol
To detect and prevent network loops that can lead to slow network speeds, 'Spanning Tree Protocol (STP)' is the right choice. STP is designed to prevent loops in Ethernet networks and ensure a loop-free topology.

How does pipelining improve CPU performance?

  • Enhances cache capacity
  • Increases clock speed
  • Optimizes virtual memory management
  • Reduces instruction throughput latency
Pipelining improves CPU performance by reducing instruction throughput latency. It allows multiple instructions to be in different stages of execution simultaneously, thus increasing the overall throughput.

Which term describes the long-term direction and the broad aims of an organization's IT?

  • IT Governance
  • IT Operations
  • IT Security
  • IT Strategy
'IT Strategy' refers to the long-term direction and the broad aims of an organization's IT. It involves defining how IT can support and align with the overall business goals and objectives.

Which web development approach involves designing a website so it looks and works properly on various devices without requiring a separate version for each device?

  • Adaptive Design
  • Cross-Browser Compatibility
  • Mobile Optimization
  • Responsive Design
'Responsive Design' is an approach in web development that focuses on designing websites to adapt to various screen sizes and devices. It ensures that a single version of a website can provide an optimal user experience across different platforms.

In supervised learning, what type of data is used to make predictions?

  • Testing data
  • Training data
  • Unlabeled data
  • Validation data
In supervised learning, 'Training data' is used to make predictions. The model learns patterns from this labeled dataset to make predictions on new, unseen data.

In wireless networking, which protocol is specifically designed to secure Wi-Fi networks?

  • DNS
  • TCP/IP
  • WEP (Wired Equivalent Privacy)
  • WPA (Wi-Fi Protected Access)
'WPA (Wi-Fi Protected Access)' is a protocol specifically designed to secure Wi-Fi networks. It provides encryption and authentication to protect the confidentiality and integrity of wireless data transmissions.