Which software engineering principle emphasizes that a system should have only one reason to change?

  • DRY (Don't Repeat Yourself)
  • OOP (Object-Oriented Programming)
  • SRP (Single Responsibility Principle)
  • YAGNI (You Ain't Gonna Need It)
The 'SRP' (Single Responsibility Principle) is a principle in software engineering that states that a module, class, or function should have only one reason to change. This helps in maintaining a system by reducing the impact of modifications.

What is the primary benefit of using Virtual Private Cloud (VPC) in a public cloud environment?

  • Cost savings
  • Enhanced security
  • Improved internet speed
  • On-premises control
The primary benefit of using a 'Virtual Private Cloud (VPC)' in a public cloud environment is 'enhanced security.' VPCs provide isolated network segments within the public cloud, allowing users to define their own network architecture and apply security measures specific to their needs.

An organization is deploying a secure system where users must prove their identity without revealing any other unnecessary information. Which cryptographic concept allows for this selective disclosure of information?

  • Biometric Authentication
  • Public Key Infrastructure (PKI)
  • Two-Factor Authentication
  • Zero-Knowledge Proofs
The cryptographic concept that allows for selective disclosure of information without revealing unnecessary details is 'Zero-Knowledge Proofs.' In this technique, a prover can demonstrate knowledge of a secret without revealing the secret itself, ensuring privacy and security.

Which programming construct allows the execution of a block of code multiple times based on a condition?

  • Array
  • Function
  • Loop
  • Pointer
In programming, a 'loop' is a control structure that allows you to execute a block of code repeatedly as long as a certain condition is met. This is commonly used for repetitive tasks in coding.

Which cryptographic attack involves trying every possible key until the correct one is found?

  • Brute Force Attack
  • DDoS Attack
  • Man-in-the-Middle
  • SQL Injection
A 'Brute Force Attack' is an approach where an attacker tries every possible key or combination until the correct one is found. It's used to crack passwords, encryption, or authentication mechanisms.

In most programming languages, which arithmetic operation is performed first if no parentheses are used?

  • Addition
  • Division
  • Multiplication
  • Subtraction
In the absence of parentheses, most programming languages follow the order of operations, and 'multiplication' is performed before addition, subtraction, and division.

Which design principle suggests that objects should be open for extension but closed for modification?

  • Abstraction
  • Inheritance
  • Open-Closed Principle
  • Polymorphism
The 'Open-Closed Principle' is a fundamental design principle in object-oriented programming. It suggests that software entities (such as classes) should be open for extension (new functionality can be added) but closed for modification (existing code remains unchanged). This encourages modularity and maintainability.

In the context of data storage, what does deduplication refer to?

  • Accelerating data access
  • Encrypting data
  • Increasing data capacity
  • Reducing data redundancy
'Deduplication' is a data reduction technique that involves eliminating duplicate copies of data, thus reducing data redundancy. This process saves storage space and improves efficiency.

Which method in NLP helps in reducing the dimensionality of word vectors while retaining most of the important information?

  • Dimensionality Reduction
  • Latent Semantic Analysis (LSA)
  • Neural Networks
  • Word Embedding
'Latent Semantic Analysis (LSA)' is a technique in NLP that reduces the dimensionality of word vectors while preserving important semantic information. It's a method used for semantic analysis and text retrieval.

In the context of digital transformation, which term refers to the redesign of business processes, often involving the integration of advanced digital technologies?

  • Agile Transformation
  • Business Process Reengineering (BPR)
  • DevOps (Development and Operations)
  • Waterfall Methodology
'Business Process Reengineering (BPR)' refers to the significant redesign of business processes to achieve improvements in efficiency, effectiveness, and often involves integrating advanced digital technologies to streamline and enhance operations.