In the context of convolutional neural networks (CNNs), what operation is used to reduce the spatial dimensions of the input volume?

  • Batch Normalization
  • Normalization
  • Pooling
  • Weight Initialization
In CNNs, 'pooling' is used to reduce the spatial dimensions of the input volume. Pooling layers downsample the feature maps, which helps in reducing computational complexity while retaining essential information, enabling the network to focus on important features.

A user is running multiple applications simultaneously on their computer. Over time, the computer starts to slow down and becomes less responsive. Which operating system feature can help manage and allocate the CPU's time among the various running applications?

  • Device Manager
  • Disk Cleanup Utility
  • File Explorer
  • Task Scheduler
The 'Task Scheduler' is an operating system feature that helps manage and allocate the CPU's time among various running applications. It schedules tasks and processes, ensuring fair and efficient resource allocation.

A computer or network that is compromised and used as a launch point for malicious attacks against other systems is referred to as a _______.

  • Botnet
  • Honey Pot
  • Proxy Server
  • Zero-Day Vulnerability
A 'Proxy Server' is a computer or network device that can be compromised and used to route malicious traffic, making it appear as if the attacks are originating from a different source.

Which encryption method ensures that a message can only be decrypted by a specific recipient using their private key?

  • Symmetric Encryption
  • Asymmetric Encryption
  • Hashing
  • Public Key Encryption
"Asymmetric Encryption" (Option b) uses a pair of keys: a public key for encryption and a private key for decryption. This ensures that a message encrypted with the recipient's public key can only be decrypted using their private key, providing secure communication.

A cybersecurity analyst comes across a file that appears benign but suspects it might contain concealed malicious code. Which analysis technique would be most suitable to inspect the file without executing it?

  • Behavioral Analysis
  • Dynamic Analysis
  • Signature-based Analysis
  • Static Analysis
When dealing with a file suspected of containing concealed malicious code, 'Static Analysis' is the most suitable technique. It involves examining the file's code and structure without executing it to identify potential threats.

Which ACID property ensures that once a transaction is committed, it remains permanent even in the event of system failures?

  • Atomicity
  • Consistency
  • Durability
  • Isolation
The 'Durability' property in the ACID (Atomicity, Consistency, Isolation, Durability) transaction model ensures that once a transaction is committed, the changes are permanent and will survive system failures, such as power outages or crashes.

What is the primary purpose of a network switch in a local area network (LAN)?

  • Connect devices
  • Connect to the internet
  • Provide wireless access
  • Store data temporarily
A network switch primarily serves to 'connect devices' within a local area network (LAN). It intelligently forwards data to the appropriate device based on the device's MAC address, improving network efficiency.

In HPC, what is the primary purpose of using parallel processing techniques?

  • Enhancing data security
  • Minimizing software complexity
  • Reducing hardware costs
  • Speeding up individual tasks
Parallel processing in High-Performance Computing (HPC) aims to 'speed up individual tasks' by breaking them into smaller sub-tasks that can be processed simultaneously on multiple processors, increasing overall computation speed.

Which approach in ERP involves tailoring the software to fit the specific needs and processes of an organization, often leading to longer implementation times?

  • Configuration
  • Customization
  • Off-the-shelf
  • Standardization
The approach of 'customization' in ERP entails tailoring the software to meet specific organizational needs. This can lead to longer implementation times but results in a more tailored solution.

What cryptographic technique allows multiple parties to compute a function over their inputs while keeping those inputs private?

  • Digital Signatures
  • Public Key Infrastructure (PKI)
  • Secure Multi-Party Computation
  • Zero-Knowledge Proof
Secure Multi-Party Computation (SMPC) is a cryptographic technique that enables multiple parties to jointly compute a function over their inputs while ensuring the privacy of those inputs. It's used in scenarios where data privacy is crucial, such as collaborative data analysis without revealing individual data points.