A software development team finds that they spend a significant amount of time fixing bugs in the week following each release. Which software engineering practice could help them identify and address issues earlier in the development process?

  • DevOps
  • Pair Programming
  • Scrum
  • Test-Driven Development (TDD)
Test-Driven Development (TDD) involves writing tests before writing code. By writing tests first, developers can identify and address issues early in the development process, ensuring that code is more reliable and bug-free before it's integrated into the codebase.

What is the primary purpose of an ORM (Object-Relational Mapping) in application development?

  • Displaying graphics
  • Managing user accounts
  • Mapping objects to databases
  • Playing audio
The primary purpose of an ORM is to map objects in your application to the tables and records in a relational database. It simplifies database interactions and allows you to work with data in an object-oriented manner.

A company wants to analyze customer reviews to improve product features. Which NLP technique would be most appropriate to extract specific product features mentioned in the reviews?

  • Document Classification
  • Named Entity Recognition (NER)
  • Sentiment Analysis
  • Tokenization
Named Entity Recognition (NER) is a technique in Natural Language Processing (NLP) that identifies and extracts specific entities such as product names, locations, and more. It's ideal for extracting product features from text data.

In the context of intrusion detection, what does "false positive" refer to?

  • Inactive System
  • Legitimate Activity
  • Successful Intrusion
  • System Patched
A 'false positive' in intrusion detection occurs when the system incorrectly identifies legitimate activity as a security threat or intrusion attempt. It can lead to unnecessary alerts.

In cryptography, the process of disguising plaintext to hide its content is called _______.

  • Compression
  • Decryption
  • Encryption
  • Steganography
The blank should be filled with "Steganography." Steganography is the practice of concealing data within other data, making it appear as if the hidden information doesn't exist, enhancing security and confidentiality.

The practice of using technology to innovate business practices, customer experiences, and culture is known as _______ transformation.

  • Cultural
  • Digital
  • Innovation
  • Technological
Digital transformation involves using technology to fundamentally change and improve business processes, customer interactions, and organizational culture. It's about leveraging digital tools to drive innovation and stay competitive.

In intrusion detection, a set of rules used to detect typical intrusive activity is referred to as _______.

  • Encryption
  • Firewall
  • Honeypot
  • Signature
In intrusion detection systems, a 'Signature' is a set of rules used to detect typical intrusive activity. These rules help identify known patterns of attacks or breaches.

What is the main purpose of version control systems in software engineering?

  • Automated testing
  • Code obfuscation
  • Code optimization
  • Collaboration and code management
Version control systems are used primarily for 'collaboration and code management.' They enable teams of developers to work together, track changes, manage versions, and maintain a history of the codebase.

For tasks like question-answering in NLP, which pre-trained model has gained significant attention due to its capabilities?

  • GPT-3
  • LSTM
  • Naive Bayes
  • SVM
The pre-trained model 'GPT-3' (Generative Pre-trained Transformer 3) has gained remarkable attention in the field of Natural Language Processing (NLP) due to its extensive language understanding and generation capabilities.

Which component of IT risk management focuses on identifying and analyzing potential events that may negatively impact the organization?

  • Disaster Recovery
  • Hardware Maintenance
  • Risk Assessment
  • Risk Mitigation
'Risk Assessment' is a key element in IT risk management. It involves identifying and analyzing potential risks, vulnerabilities, and threats that could have adverse effects on an organization's IT infrastructure and operations.