Spaces:
Build error
Build error
| domain,subdomain,question,option1,option2,option3,option4,correct_answer,keywords | |
| Computer Science,Cyber Security,What is a firewall?,Hardware,Software,Both,None,Both,firewall security network | |
| Data Science,Statistics,"What is the mean of [2,4,6]?",3,4,5,6,4,statistics mean average | |
| Data Science,Data Analysis,What is data cleaning?,Removing nulls,Plotting,Analysis,Modeling,Removing nulls,data cleaning preprocessing missing | |
| Machine Learning,Supervised Learning,What is the goal of supervised learning?,Prediction,Exploration,Reward,None,Prediction,supervised learning prediction label | |
| Machine Learning,Unsupervised Learning,What is clustering?,Grouping data,Labeling data,Cleaning data,None,Grouping data,unsupervised learning clustering groups | |
| Cloud Computing,Infrastructure as a Service,What does IaaS provide?,Apps,OS,Virtual Machines,None,Virtual Machines,cloud computing IaaS infrastructure | |
| Cloud Computing,Platform as a Service,PaaS is mainly for?,Storage,Code execution,Networking,Email,Code execution,PaaS cloud platform development | |
| Web Development,Frontend,What is HTML used for?,Styling,Logic,Structure,Database,Structure,html frontend web structure | |
| Web Development,Backend,Which language is commonly used in backend?,HTML,CSS,Python,React,Python,backend web server python | |
| Data Engineer,Builing Pipelines,What are the automation tools used in data engineering?,TensorFlow,Apache Airflow,MySQL,Jupyter Notebook,Apache Airflow, | |
| Data Engineer,Data Streaming & Messaging Systems,What is the main purpose of Apache Kafka in data engineering?,Distributed streaming platform,Real-time data processing,Event-driven architecture,Message brokering,Distributed streaming platform, | |
| Data Engineer,Data Warehousing & Analytics,What is the primary function of a Data Warehouse in a data engineering pipeline?,Store transactional data,Store historical data for analytics,Perform real-time data processing,Clean and transform raw data,Store historical data for analytics, | |
| Data Engineer,ETL Processes & Data Transformation,Which technology is most commonly used for data transformation in an ETL pipeline?,Apache Hive,Apache Pig,SQL-based tools,Data lakes,SQL-based tools, | |
| Cloud Computing,"Cloud Service Models (IaaS, PaaS, SaaS)",What is the main benefit of using Infrastructure as a Service (IaaS)?,On-demand compute,Full platform control,No server maintenance,Virtualization flexibility,On-demand compute, | |
| Cloud Computing,Cloud Storage Services,What service does Amazon S3 primarily provide?,Object storage,File system backup,Block storage,Virtual machines,Object storage, | |
| Cloud Computing,Cloud Deployment Models,Which cloud model allows a business to keep sensitive workloads private but still use public cloud benefits?,Hybrid cloud,Multi-cloud,Public cloud,Private cloud,Hybrid cloud, | |
| Machine Learning,Model Training & Evaluation,What is the main purpose of a loss function in machine learning?,Measure prediction error,Train data models,Optimize hyperparameters,Increase accuracy,Measure prediction error, | |
| Machine Learning,Supervised Learning (Classification),Which algorithm is typically used for classification tasks?,K-Means,Decision Trees,PCA,Linear Regression,Decision Trees, | |
| Software Testing,Unit Testing,What is the purpose of unit testing in software development?,Verify UI flow,Validate system integration,Test individual components,Perform load testing,Test individual components, | |
| Software Testing,System & Integration Testing,Which type of testing checks the complete functionality of an application with all components working together?,Unit testing,Smoke testing,Regression testing,System testing,System testing, | |
| Software Testing,Automation Testing Tools, Which tool is commonly used for automated testing of web applications?,Selenium,Postman,Jenkins,Docker,Selenium, | |
| Software Testing,Black-box & Functional Testing,What is the key focus of black-box testing?,Test case generation,Memory usage,Functionality without internal knowledge,"Source code analysis,",Functionality without internal knowledge, | |
| Game Development,Game Engines & Frameworks,What is the primary function of a game engine?,Render graphics,All of the above,Handle physics,Provide development tools,All of the above, | |
| Game Development,Game Engines & Frameworks,Which language is commonly used in Unity game development?,C#,Java,Python,C++,C#, | |
| Game Development,Physics & Simulation,What does a physics engine simulate in a game?,Rendering optimization,"Sound effects, AI behavior",Real-world motion,AI behavior,Real-world motion, | |
| Game Development,Graphics Optimization,Which technique is used to improve performance by only rendering what the player can see?,Texture mapping,Level design,Ray tracing,Occlusion culling,Occlusion culling, | |
| Game Development,Core Game Architecture,What is the role of a game loop in game development?,Continuously update and render game state,Load assets,Build UI,Save progress,Continuously update and render game state, | |
| Computer Science,Artificial Intelligence,What is AI?,A machine,A program,A system,All of these,All of these,artificial intelligence machine | |
| Computer Science,Artificial Intelligence,Which of the following is a branch of AI?,Machine Learning,Deep Learning,Natural Language Processing,All of these,All of these,artificial intelligence branches | |
| Computer Science,Artificial Intelligence,What is deep learning?,A subset of machine learning,A type of neural network,A learning method that uses multiple layers,All of these,All of these,deep learning neural network | |
| Computer Science,Artificial Intelligence,Which algorithm is used in reinforcement learning?,Q-Learning,K-means,Linear Regression,DBSCAN,Q-Learning,reinforcement learning algorithm | |
| Computer Science,Artificial Intelligence,What is the Turing Test in AI?,A test of a machine's ability to exhibit human-like intelligence,A test for hardware performance,A programming language,A mathematical formula,A test of a machine's ability to exhibit human-like intelligence,turing test AI human intelligence | |
| Computer Science,Artificial Intelligence,Which company developed the Watson AI system?,Google,Microsoft,IBM,Amazon,IBM,watson IBM AI system | |
| Computer Science,Artificial Intelligence,What is Natural Language Processing (NLP)?,Processing written and spoken language,Creating natural landscapes,A programming paradigm,A database management system,Processing written and spoken language,nlp language processing | |
| Computer Science,Artificial Intelligence,What is a neural network in AI?,A network of computers,A computational model inspired by the human brain,A physical network of neurons,A type of internet connection,A computational model inspired by the human brain,neural network brain AI | |
| Computer Science,Artificial Intelligence,What is computer vision?,The ability of computers to see and interpret visual data,A brand of computers,A virtual reality technology,A programming language,The ability of computers to see and interpret visual data,computer vision visual data | |
| Computer Science,Artificial Intelligence,What is GANs in AI?,General Artificial Networks,Generative Adversarial Networks,Generic Automated Navigation,Global AI Nodes,Generative Adversarial Networks,GANs generative adversarial networks | |
| Computer Science,Artificial Intelligence,What does AI stand for?,Automated Intelligence,Advanced Interface,Artificial Intelligence,Augmented Information,Artificial Intelligence,AI artificial intelligence | |
| Computer Science,Artificial Intelligence,What is the primary goal of machine learning?,Enable computers to learn from data,Speed up computation,Create better hardware,Increase storage capacity,Enable computers to learn from data,machine learning goal data | |
| Computer Science,Artificial Intelligence,Which language is commonly used for AI development?,Python,HTML,CSS,XML,Python,AI development python language | |
| Computer Science,Artificial Intelligence,What is a decision tree in AI?,A type of flowchart,A predictive model,A hierarchical model with decision nodes,All of these,All of these,decision tree AI model | |
| Computer Science,Artificial Intelligence,What is an expert system in AI?,A system that mimics human experts,A database of expert opinions,A knowledge-based system,Both A and C,Both A and C,expert system AI knowledge | |
| Computer Science,Artificial Intelligence,What is LISP primarily used for in AI?,Natural language processing,Symbolic computation,Image processing,Database management,Symbolic computation,LISP AI symbolic computation | |
| Computer Science,Artificial Intelligence,What is the primary goal of reinforcement learning?,Learn through trial and error,Learn from labeled data,Learn from unlabeled data,Learn from demonstration,Learn through trial and error,reinforcement learning goal trial error | |
| Computer Science,Artificial Intelligence,What is a chatbot?,A robot that can chat,A software application that simulates human conversation,A hardware device,A mobile application,A software application that simulates human conversation,chatbot AI conversation | |
| Computer Science,Artificial Intelligence,Which is NOT a type of machine learning?,Supervised learning,Unsupervised learning,Semi-supervised learning,Determined learning,Determined learning,machine learning types | |
| Computer Science,Artificial Intelligence,What is the term for AI systems that can perform general intelligent actions?,AGI (Artificial General Intelligence),API (Application Programming Interface),ANN (Artificial Neural Network),ASI (Artificial Specialized Intelligence),AGI (Artificial General Intelligence),AGI artificial general intelligence | |
| Computer Science,Artificial Intelligence,What is a transformer model in AI?,A neural network architecture for sequence processing,A physical transformer device,A power conversion unit,A type of robot,A neural network architecture for sequence processing,transformer model AI sequence | |
| Computer Science,Artificial Intelligence,Which is an application of AI in healthcare?,Disease diagnosis,Drug discovery,Treatment planning,All of these,All of these,AI healthcare applications | |
| Computer Science,Artificial Intelligence,What is feature extraction in AI?,The process of selecting relevant features from data,Creating new features from existing ones,Reducing dimensionality,All of these,All of these,feature extraction AI data | |
| Computer Science,Artificial Intelligence,What is AlphaGo?,An AI program that plays the board game Go,A search engine,A cloud service,A programming language,An AI program that plays the board game Go,AlphaGo AI game | |
| Computer Science,Artificial Intelligence,What is bias in AI systems?,Systematic errors that favor certain outcomes,A mathematical function,A programming technique,A hardware component,Systematic errors that favor certain outcomes,AI bias systematic errors | |
| Computer Science,Artificial Intelligence,What is ensemble learning in AI?,Combining multiple models to improve performance,Group study sessions,A type of neural network,A programming paradigm,Combining multiple models to improve performance,ensemble learning AI models | |
| Computer Science,Artificial Intelligence,What is a recommendation system?,A system that suggests items to users,A system that recommends hardware upgrades,A type of firewall,A network protocol,A system that suggests items to users,recommendation system AI | |
| Computer Science,Artificial Intelligence,What is sentiment analysis?,The process of identifying emotions in text,A financial analysis technique,A hardware testing method,A network security protocol,The process of identifying emotions in text,sentiment analysis AI emotions | |
| Computer Science,Artificial Intelligence,What is a knowledge graph?,A visual representation of knowledge,A network of interconnected information,A database structure,All of these,All of these,knowledge graph AI information | |
| Computer Science,Artificial Intelligence,What is transfer learning in AI?,Using knowledge from one task to improve another,Transferring data between computers,Moving AI models to production,Sharing code repositories,Using knowledge from one task to improve another,transfer learning AI knowledge | |
| Computer Science,Artificial Intelligence,What is a convolutional neural network (CNN) primarily used for?,Image processing,Text analysis,Audio processing,Data storage,Image processing,CNN neural network image | |
| Computer Science,Artificial Intelligence,What is hyperparameter tuning in AI?,Adjusting model parameters to improve performance,Tuning a musical instrument,Calibrating hardware,Network optimization,Adjusting model parameters to improve performance,hyperparameter tuning AI performance | |
| Computer Science,Artificial Intelligence,What is an autoencoder in AI?,A type of neural network for unsupervised learning,A hardware encoder,An encryption tool,An automatic code generator,A type of neural network for unsupervised learning,autoencoder AI neural network | |
| Computer Science,Artificial Intelligence,What is explainable AI (XAI)?,AI systems that can explain their decisions,An AI programming language,A debugging tool,A hardware component,AI systems that can explain their decisions,explainable AI XAI decisions | |
| Computer Science,Artificial Intelligence,What is a Markov Decision Process in AI?,A mathematical framework for decision making,A programming language,A hardware component,A network protocol,A mathematical framework for decision making,Markov decision process AI | |
| Computer Science,Artificial Intelligence,What is a recurrent neural network (RNN)?,A neural network that processes sequences,A repetitive network structure,A recursive algorithm,A random number generator,A neural network that processes sequences,recurrent neural network RNN | |
| Computer Science,Artificial Intelligence,What is federated learning?,Training models across multiple devices while keeping data local,A learning technique for federal agencies,A centralized learning approach,A hardware optimization technique,Training models across multiple devices while keeping data local,federated learning AI privacy | |
| Computer Science,Artificial Intelligence,What is a support vector machine (SVM)?,A classification algorithm,A hardware device,A programming tool,A database system,A classification algorithm,SVM support vector machine | |
| Computer Science,Artificial Intelligence,What is AI alignment?,Making AI systems' values align with human values,Aligning hardware components,Code formatting,Network configuration,Making AI systems' values align with human values,AI alignment values ethics | |
| Computer Science,Artificial Intelligence,What is the AI winter?,Periods of reduced funding and interest in AI,A cooling system for AI hardware,A programming framework,An AI conference,Periods of reduced funding and interest in AI,AI winter funding history | |
| Computer Science,Artificial Intelligence,What is the Chinese room argument in AI?,A thought experiment about understanding vs. simulation,A programming technique,A hardware design,A networking protocol,A thought experiment about understanding vs. simulation,Chinese room argument philosophy | |
| Computer Science,Artificial Intelligence,What is a genetic algorithm in AI?,An optimization algorithm inspired by natural selection,A DNA sequencing technique,A biological computing method,A healthcare application,An optimization algorithm inspired by natural selection,genetic algorithm AI optimization | |
| Computer Science,Artificial Intelligence,What is a Boltzmann machine?,A type of stochastic neural network,A coffee machine brand,A hardware component,A programming language,A type of stochastic neural network,Boltzmann machine neural network | |
| Computer Science,Artificial Intelligence,What is AI ethics?,The study of moral issues related to AI development and use,Programming guidelines,Hardware regulations,Software licensing,The study of moral issues related to AI development and use,AI ethics moral issues | |
| Computer Science,Artificial Intelligence,What is reinforcement learning from human feedback (RLHF)?,Training AI using human evaluations,A type of supervised learning,A hardware testing method,A data collection technique,Training AI using human evaluations,RLHF reinforcement learning feedback | |
| Computer Science,Artificial Intelligence,What is a language model in AI?,A model trained to understand and generate language,A translation tool,A grammar checker,A speech recognition system,A model trained to understand and generate language,language model AI NLP | |
| Computer Science,Artificial Intelligence,What is an AI agent?,An entity that perceives and acts in an environment,A secret AI operative,A software package,A hardware component,An entity that perceives and acts in an environment,AI agent environment action | |
| Computer Science,Artificial Intelligence,What is a Bayesian network in AI?,A probabilistic graphical model,A neural network type,A hardware architecture,A programming language,A probabilistic graphical model,Bayesian network AI probability | |
| Computer Science,Artificial Intelligence,What is multimodal AI?,AI that can process multiple types of data,Multiple AI systems working together,A hardware configuration,A network protocol,AI that can process multiple types of data,multimodal AI data types | |
| Computer Science,Artificial Intelligence,What is zero-shot learning in AI?,The ability to recognize objects without prior training,Learning without any data,A hardware optimization technique,A security protocol,The ability to recognize objects without prior training,zero-shot learning AI recognition | |
| Computer Science,Artificial Intelligence,What is prompt engineering?,The process of designing effective prompts for language models,A hardware design technique,A programming paradigm,A network configuration,The process of designing effective prompts for language models,prompt engineering language models | |
| Computer Science,Artificial Intelligence,What is a confusion matrix in AI?,A table used to evaluate classification models,A mathematical formula,A hardware component,A programming error,A table used to evaluate classification models,confusion matrix classification | |
| Computer Science,Artificial Intelligence,What is a generative model in AI?,A model that can generate new data similar to training data,A financial modeling tool,A hardware blueprint,A network design,A model that can generate new data similar to training data,generative model AI data | |
| Computer Science,Artificial Intelligence,What is feature selection in AI?,The process of selecting relevant features for a model,UI component selection,Hardware component selection,Database field selection,The process of selecting relevant features for a model,feature selection AI model | |
| Computer Science,Artificial Intelligence,What is few-shot learning?,Learning from very few examples,Learning with minimal resources,Quick model training,A hardware optimization,Learning from very few examples,few-shot learning AI examples | |
| Computer Science,Artificial Intelligence,What is a decision boundary in AI?,The boundary that separates different classes in a classification problem,A limitation on decision-making,A programming constraint,A hardware limitation,The boundary that separates different classes in a classification problem,decision boundary classification | |
| Computer Science,Artificial Intelligence,What is AI reasoning?,The ability of AI to draw conclusions from information,A debugging technique,A hardware testing method,A programming paradigm,The ability of AI to draw conclusions from information,AI reasoning logic conclusions | |
| Computer Science,Artificial Intelligence,What is a knowledge-based system?,A system that uses a knowledge base to solve problems,A database management system,A hardware component,A networking protocol,A system that uses a knowledge base to solve problems,knowledge-based system AI | |
| Computer Science,Artificial Intelligence,What is transfer learning?,Using knowledge gained from one problem to solve another,Data transfer between systems,Hardware migration,Network communication,Using knowledge gained from one problem to solve another,transfer learning AI knowledge | |
| Computer Science,Artificial Intelligence,What is a Large Language Model (LLM)?,A large AI model trained on vast amounts of text,A big book of languages,A hardware component,A programming language,A large AI model trained on vast amounts of text,LLM large language model | |
| Computer Science,Artificial Intelligence,What is AI governance?,The framework for managing AI development and deployment,Government control of AI,Hardware regulations,Software licensing,The framework for managing AI development and deployment,AI governance framework | |
| Computer Science,Artificial Intelligence,What is a hidden layer in a neural network?,A layer between input and output layers,A secret programming component,A hardware element,A security feature,A layer between input and output layers,hidden layer neural network | |
| Computer Science,Artificial Intelligence,What is AI bias?,Systematic errors in AI systems that favor certain outcomes,A programming technique,A hardware component,A network setting,Systematic errors in AI systems that favor certain outcomes,AI bias errors fairness | |
| Computer Science,Artificial Intelligence,What is a synthetic dataset?,Artificially generated data for training AI,A collection of chemical compounds,A hardware specification,A network configuration,Artificially generated data for training AI,synthetic dataset AI training | |
| Computer Science,Artificial Intelligence,What is model pruning in AI?,Removing unnecessary parameters from a model,Tree trimming,Code optimization,Hardware reduction,Removing unnecessary parameters from a model,model pruning AI optimization | |
| Computer Science,Artificial Intelligence,What is a diffusion model in AI?,A generative model that gradually adds noise to data,A chemical process simulation,A hardware component,A network protocol,A generative model that gradually adds noise to data,diffusion model AI generative | |
| Computer Science,Artificial Intelligence,What is AI hallucination?,When AI generates false information confidently,A visual processing error,A hardware malfunction,A network issue,When AI generates false information confidently,AI hallucination false information | |
| Computer Science,Artificial Intelligence,What is one-shot learning?,Learning from a single example,Quick training,A hardware optimization,A network protocol,Learning from a single example,one-shot learning AI example | |
| Computer Science,Artificial Intelligence,What is an attention mechanism in AI?,A component that helps models focus on relevant parts of the input,A human attention simulator,A hardware component,A user interface feature,A component that helps models focus on relevant parts of the input,attention mechanism AI focus | |
| Computer Science,Artificial Intelligence,What is a neural architecture search?,Automated discovery of optimal neural network architectures,A hardware search algorithm,A network troubleshooting tool,A database query,Automated discovery of optimal neural network architectures,neural architecture search AI | |
| Computer Science,Artificial Intelligence,What is AI explainability?,The ability to explain AI decisions in human terms,A documentation requirement,A hardware feature,A programming paradigm,The ability to explain AI decisions in human terms,AI explainability decisions | |
| Computer Science,Artificial Intelligence,What is a Transformer in AI?,A neural network architecture used for sequence processing,An electrical component,A data conversion tool,A hardware element,A neural network architecture used for sequence processing,transformer AI architecture | |
| Computer Science,Artificial Intelligence,What is an embedding in AI?,A vector representation of data in a lower-dimensional space,A hardware installation,A programming technique,A network configuration,A vector representation of data in a lower-dimensional space,embedding AI vector representation | |
| Computer Science,Artificial Intelligence,What is overfitting in AI?,When a model learns training data too well and performs poorly on new data,Hardware overheating,Excessive programming,Network congestion,When a model learns training data too well and performs poorly on new data,overfitting AI model training | |
| Computer Science,Artificial Intelligence,What is an AI chip?,A specialized processor designed for AI computations,A snack food,A programming component,A network device,A specialized processor designed for AI computations,AI chip processor hardware | |
| Computer Science,Artificial Intelligence,What is a reward function in reinforcement learning?,A function that defines the goal of an agent,A bonus payment system,A hardware component,A programming paradigm,A function that defines the goal of an agent,reward function reinforcement learning | |
| Computer Science,Artificial Intelligence,What is AI safety?,Ensuring AI systems don't cause harm,Hardware protection,Network security,Code backup,Ensuring AI systems don't cause harm,AI safety harm prevention | |
| Computer Science,Artificial Intelligence,What is a Variational Autoencoder (VAE)?,A generative model that learns data distributions,A hardware component,A programming tool,A network protocol,A generative model that learns data distributions,VAE autoencoder generative | |
| Computer Science,Artificial Intelligence,What is a self-supervised learning?,Learning from the data itself without explicit labels,Self-directed study,A hardware feature,A programming method,Learning from the data itself without explicit labels,self-supervised learning AI | |
| Computer Science,Artificial Intelligence,What is a knowledge distillation in AI?,Transferring knowledge from a large model to a smaller one,Information extraction,Data purification,Hardware optimization,Transferring knowledge from a large model to a smaller one,knowledge distillation AI model | |
| Computer Science,Artificial Intelligence,What is Computer Vision?,The field of AI that enables computers to interpret visual information,A hardware display,A programming interface,A network visualization,The field of AI that enables computers to interpret visual information,computer vision AI visual | |
| Computer Science,Artificial Intelligence,What is backpropagation in neural networks?,An algorithm for calculating gradients in neural networks,Signal reflection,Data restoration,Network rollback,An algorithm for calculating gradients in neural networks,backpropagation neural networks | |
| Computer Science,Artificial Intelligence,What is a loss function in AI?,A function that measures how well a model performs,A data loss prevention tool,A hardware failure metric,A network downtime measure,A function that measures how well a model performs,loss function AI performance | |
| Computer Science,Artificial Intelligence,What is AI fairness?,Ensuring AI systems treat all groups equally,Equal hardware distribution,Balanced programming,Network neutrality,Ensuring AI systems treat all groups equally,AI fairness equality ethics | |
| Computer Science,Artificial Intelligence,What is a data augmentation in AI?,Creating variations of training data to improve model performance,Data backup,Storage expansion,Hardware upgrades,Creating variations of training data to improve model performance,data augmentation AI training | |
| Computer Science,Artificial Intelligence,What is a stochastic gradient descent?,An optimization algorithm for training neural networks,A random data selection,A hardware component,A network protocol,An optimization algorithm for training neural networks,stochastic gradient descent optimization | |
| Computer Science,Artificial Intelligence,What is a multimodal learning?,Learning from multiple types of data simultaneously,Multiple learning methods,Hardware integration,Network protocols,Learning from multiple types of data simultaneously,multimodal learning AI data | |
| Computer Science,Artificial Intelligence,What is a Q-learning?,A reinforcement learning algorithm,A questioning technique,A hardware testing method,A network protocol,A reinforcement learning algorithm,Q-learning reinforcement algorithm | |
| Computer Science,Artificial Intelligence,What is AI accountability?,The principle that AI systems and their creators are responsible for their actions,Financial accounting for AI projects,Hardware maintenance,Software licensing,The principle that AI systems and their creators are responsible for their actions,AI accountability responsibility | |
| Computer Science,Artificial Intelligence,What is semi-supervised learning?,Learning from both labeled and unlabeled data,Partial supervision,Hardware monitoring,Network oversight,Learning from both labeled and unlabeled data,semi-supervised learning AI data | |
| Computer Science,Artificial Intelligence,What is an activation function in neural networks?,A function that determines the output of a neuron,A power switch,A hardware component,A network protocol,A function that determines the output of a neuron,activation function neural networks | |
| Computer Science,Artificial Intelligence,What is AI interpretability?,The ability to understand and explain AI decisions,Language translation,Code analysis,Hardware diagnostics,The ability to understand and explain AI decisions,AI interpretability explanation | |
| Computer Science,Artificial Intelligence,What is a generative adversarial network (GAN)?,A framework where two neural networks compete to generate realistic data,A hostile network architecture,A hardware security system,A network defense protocol,A framework where two neural networks compete to generate realistic data,GAN generative networks | |
| Computer Science,Artificial Intelligence,What is a Restricted Boltzmann Machine (RBM)?,A type of stochastic neural network,A hardware restriction,A programming limitation,A network constraint,A type of stochastic neural network,RBM neural network | |
| Computer Science,Artificial Intelligence,What is AI robustness?,The ability of AI systems to perform consistently under different conditions,Hardware durability,Code stability,Network reliability,The ability of AI systems to perform consistently under different conditions,AI robustness consistency | |
| Computer Science,Artificial Intelligence,What is a heuristic in AI?,A practical method for solving problems that is not guaranteed to be optimal,A hardware benchmark,A programming standard,A network protocol,A practical method for solving problems that is not guaranteed to be optimal,heuristic AI problem solving | |
| Computer Science,Artificial Intelligence,What is quantum machine learning?,The integration of quantum computing with machine learning,A hypothetical concept,A hardware component,A network protocol,The integration of quantum computing with machine learning,quantum machine learning computing | |
| Computer Science,Artificial Intelligence,What is AI transparency?,The principle of making AI systems understandable to humans,Invisible hardware,See-through programming,Network visibility,The principle of making AI systems understandable to humans,AI transparency understandable | |
| Computer Science,Artificial Intelligence,What is a Long Short-Term Memory (LSTM) network?,A type of recurrent neural network,A memory management system,A hardware storage component,A network protocol,A type of recurrent neural network,LSTM neural network memory | |
| Computer Science,Artificial Intelligence,What is AI regulatory compliance?,Adherence to laws and regulations governing AI,Hardware standards,Programming guidelines,Network protocols,Adherence to laws and regulations governing AI,AI regulatory compliance laws | |
| Computer Science,Artificial Intelligence,What is a training dataset in AI?,Data used to train a model,Exercise routines,Hardware specifications,Network configurations,Data used to train a model,training dataset AI model | |
| Computer Science,Artificial Intelligence,What is AI privacy?,Protecting personal data in AI systems,Secret algorithms,Hidden hardware,Network isolation,Protecting personal data in AI systems,AI privacy data protection | |
| Computer Science,Artificial Intelligence,What is a validation dataset in AI?,Data used to evaluate a model during training,Data verification,Hardware testing,Network confirmation,Data used to evaluate a model during training,validation dataset AI model | |
| Computer Science,Artificial Intelligence,What is an AI simulator?,A program that mimics real-world environments for AI training,A hardware tester,A programming tool,A network emulator,A program that mimics real-world environments for AI training,AI simulator training environment | |
| Computer Science,Cyber Security,What is a firewall?,Hardware,Software,Both,None,Both,firewall security network | |
| Computer Science,Cyber Security,What is malware?,Malicious software,Hardware failure,Network protocol,Security tool,Malicious software,malware virus security | |
| Computer Science,Cyber Security,What is a DDoS attack?,Distributed Denial of Service,Data Deletion of Service,Database Destruction of Software,Dynamic Domain of Security,Distributed Denial of Service,DDoS attack security | |
| Computer Science,Cyber Security,What is encryption?,Converting data into a code to prevent unauthorized access,Compressing data,Deleting data,Transferring data,Converting data into a code to prevent unauthorized access,encryption security data | |
| Computer Science,Cyber Security,What is a VPN?,Virtual Private Network,Virtual Protocol Network,Visual Processing Node,Verified Public Network,Virtual Private Network,VPN security network | |
| Computer Science,Cyber Security,What is phishing?,A type of social engineering attack,A network protocol,A secure connection,A type of encryption,A type of social engineering attack,phishing attack security | |
| Computer Science,Cyber Security,What is two-factor authentication?,Using two factors to verify identity,Having two passwords,Dual encryption,Two-step installation,Using two factors to verify identity,two-factor authentication security | |
| Computer Science,Cyber Security,What is a zero-day vulnerability?,A vulnerability unknown to the software vendor,A vulnerability with no impact,A security feature,A patched vulnerability,A vulnerability unknown to the software vendor,zero-day vulnerability security | |
| Computer Science,Cyber Security,What is PKI?,Public Key Infrastructure,Private Key Implementation,Protected Knowledge Interface,Personal Key Identification,Public Key Infrastructure,PKI security encryption | |
| Computer Science,Cyber Security,What is a brute force attack?,Trying all possible combinations,Physical destruction,Network jamming,Server overload,Trying all possible combinations,brute force attack security | |
| Computer Science,Cyber Security,What is a honeypot in cybersecurity?,A trap to detect or counteract unauthorized access,A sweet reward for hackers,A security vulnerability,A network protocol,A trap to detect or counteract unauthorized access,honeypot security trap | |
| Computer Science,Cyber Security,What is SSL/TLS?,Security protocols for secure communications,Software testing tools,System login techniques,Server licensing technologies,Security protocols for secure communications,SSL TLS security protocol | |
| Computer Science,Cyber Security,What is a privilege escalation attack?,Gaining elevated access to resources,Network flooding,Denial of service,Social engineering,Gaining elevated access to resources,privilege escalation security | |
| Computer Science,Cyber Security,What is a rootkit?,A collection of tools that enable administrator-level access,A gardening tool,A networking hardware,A programming language,A collection of tools that enable administrator-level access,rootkit security access | |
| Computer Science,Cyber Security,What is a man-in-the-middle attack?,Intercepting communications between two parties,Physical assault,Hardware tampering,Server overload,Intercepting communications between two parties,mitm attack security | |
| Computer Science,Cyber Security,What is a security audit?,Systematic evaluation of security,Financial review,Performance testing,User training,Systematic evaluation of security,security audit evaluation | |
| Computer Science,Cyber Security,What is sandboxing in cybersecurity?,Isolating programs for testing,Playing in a sandbox,Creating backup files,Network monitoring,Isolating programs for testing,sandboxing security isolation | |
| Computer Science,Cyber Security,What is a CAPTCHA?,A test to determine if the user is human,A type of malware,An encryption algorithm,A password recovery tool,A test to determine if the user is human,CAPTCHA security human | |
| Computer Science,Cyber Security,What is a SQL injection attack?,Inserting malicious SQL code,Hardware failure,Network overload,Data corruption,Inserting malicious SQL code,SQL injection attack security | |
| Computer Science,Cyber Security,What is network segmentation?,Dividing a network into smaller parts,Combining networks,Disabling a network,Encrypting a network,Dividing a network into smaller parts,network segmentation security | |
| Computer Science,Cyber Security,What is a security information and event management (SIEM) system?,A tool that provides real-time analysis of security alerts,A physical security measure,A programming language,A type of malware,A tool that provides real-time analysis of security alerts,SIEM security management | |
| Computer Science,Cyber Security,What is a patch in cybersecurity?,Software update to fix vulnerabilities,Physical repair,Network configuration,Security protocol,Software update to fix vulnerabilities,patch security update | |
| Computer Science,Cyber Security,What is a penetration test?,Simulated attack to evaluate security,Hardware testing,Network speed test,User training,Simulated attack to evaluate security,penetration test security | |
| Computer Science,Cyber Security,What is social engineering?,Manipulating people to divulge information,Building social networks,Community development,Public relations,Manipulating people to divulge information,social engineering security | |
| Computer Science,Cyber Security,What is a security token?,A physical device for authentication,A digital currency,A network protocol,A software license,A physical device for authentication,security token authentication | |
| Computer Science,Cyber Security,What is biometric authentication?,Using physical characteristics for identity verification,Biological testing,Medical scanning,Health monitoring,Using physical characteristics for identity verification,biometric authentication security | |
| Computer Science,Cyber Security,What is a vulnerability scanner?,A tool that checks for security weaknesses,A medical device,A hardware component,A network monitor,A tool that checks for security weaknesses,vulnerability scanner security | |
| Computer Science,Cyber Security,What is ransomware?,Malware that encrypts data and demands payment,A payment system,A security tool,A network protocol,Malware that encrypts data and demands payment,ransomware security malware | |
| Computer Science,Cyber Security,What is a security policy?,Document outlining security requirements,Insurance policy,Political statement,User agreement,Document outlining security requirements,security policy document | |
| Computer Science,Cyber Security,What is a DMZ in networking?,Demilitarized Zone between internal and external networks,Data Management Zone,Digital Messaging Zone,Dynamic Memory Zone,Demilitarized Zone between internal and external networks,DMZ network security | |
| Computer Science,Cyber Security,What is a backdoor in cybersecurity?,A method of bypassing authentication,A physical entrance,A network protocol,A backup system,A method of bypassing authentication,backdoor security bypass | |
| Computer Science,Cyber Security,What is intrusion detection system (IDS)?,A system that monitors for suspicious activities,A physical alarm,A firewall type,An encryption method,A system that monitors for suspicious activities,IDS security monitoring | |
| Computer Science,Cyber Security,What is hashing in cybersecurity?,Converting data into a fixed-size string,Destroying data,Encrypting data,Compressing data,Converting data into a fixed-size string,hashing security data | |
| Computer Science,Cyber Security,What is a security risk assessment?,Evaluating potential security threats,Financial analysis,Performance evaluation,User satisfaction survey,Evaluating potential security threats,security risk assessment | |
| Computer Science,Cyber Security,What is a virus in cybersecurity?,Malicious code that replicates itself,A biological agent,A hardware failure,A network protocol,Malicious code that replicates itself,virus security malware | |
| Computer Science,Cyber Security,What is a trojan horse in cybersecurity?,Malware disguised as legitimate software,A wooden horse,A network tool,A hardware component,Malware disguised as legitimate software,trojan horse security malware | |
| Computer Science,Cyber Security,What is endpoint security?,Protection of network entry points,Terminal security,Database security,Server security,Protection of network entry points,endpoint security network | |
| Computer Science,Cyber Security,What is a CISO?,Chief Information Security Officer,Computer and Internet Security Operator,Critical Infrastructure Security Oversight,Cyber Intelligence and Security Organization,Chief Information Security Officer,CISO security officer | |
| Computer Science,Cyber Security,What is a data breach?,Unauthorized access to sensitive information,Hardware failure,Network outage,Power loss,Unauthorized access to sensitive information,data breach security | |
| Computer Science,Cyber Security,What is a security incident response plan?,A documented approach to addressing security breaches,A business continuity plan,A disaster recovery procedure,All of these,A documented approach to addressing security breaches,incident response security | |
| Computer Science,Cyber Security,What is spyware?,Software that collects information without consent,Surveillance equipment,Network monitoring tools,Security cameras,Software that collects information without consent,spyware security malware | |
| Computer Science,Cyber Security,What is a security baseline?,Minimum security standards for systems,Performance benchmark,Network speed test,Hardware specification,Minimum security standards for systems,security baseline standards | |
| Computer Science,Cyber Security,What is role-based access control (RBAC)?,Restricting system access based on roles,Acting in different roles,Controlling user behavior,Managing administrator privileges,Restricting system access based on roles,RBAC access control security | |
| Computer Science,Cyber Security,What is a vulnerability in cybersecurity?,A weakness that can be exploited,A security feature,A network protocol,A hardware component,A weakness that can be exploited,vulnerability security weakness | |
| Computer Science,Cyber Security,What is HTTPS?,Secure version of HTTP,Hardware Testing Protocol System,High-Tech Processing Service,Hybrid Transfer Protocol Standard,Secure version of HTTP,HTTPS security protocol | |
| Computer Science,Cyber Security,What is a stateful firewall?,A firewall that keeps track of connections,A firewall with multiple states,A static firewall,A hardware-only firewall,A firewall that keeps track of connections,stateful firewall security | |
| Computer Science,Cyber Security,What is cross-site scripting (XSS)?,A web security vulnerability that allows attackers to inject scripts,A programming technique,A network protocol,A browser feature,A web security vulnerability that allows attackers to inject scripts,XSS security vulnerability | |
| Computer Science,Cyber Security,What is a security operations center (SOC)?,A facility that monitors and manages security,A type of firewall,A hardware component,A programming language,A facility that monitors and manages security,SOC security operations | |
| Computer Science,Cyber Security,What is multi-factor authentication (MFA)?,Authentication using multiple verification factors,Multiple firewalls,Having several passwords,Network redundancy,Authentication using multiple verification factors,MFA authentication security | |
| Data Science,Statistics,"What is the mean of [2,4,6]?",3,4,5,6,4,statistics mean average | |
| Data Science,Statistics,What is median?,Middle value,Most common value,Average value,Highest value,Middle value,statistics median middle | |
| Data Science,Statistics,What is standard deviation?,Measure of spread,Average,Middle value,Range,Measure of spread,statistics standard deviation | |
| Data Science,Statistics,What is correlation?,Relationship between variables,Causation,Data transformation,Statistical test,Relationship between variables,statistics correlation relationship | |
| Data Science,Statistics,What is p-value?,Probability of observing results by chance,Percentage value,Prediction accuracy,Population parameter,Probability of observing results by chance,statistics p-value probability | |
| Data Science,Statistics,What is a hypothesis test?,Method to test a claim about a parameter,Data collection technique,Prediction method,Correlation analysis,Method to test a claim about a parameter,statistics hypothesis test | |
| Data Science,Statistics,What is linear regression?,Statistical method for modeling relationships,Classification algorithm,Clustering technique,Sampling method,Statistical method for modeling relationships,statistics linear regression | |
| Data Science,Statistics,What is variance?,Squared standard deviation,Mean difference,Absolute deviation,Range divided by 4,Squared standard deviation,statistics variance deviation | |
| Data Science,Statistics,What is a normal distribution?,Bell-shaped probability distribution,,Data Science,Statistics,What is a normal distribution?,Bell-shaped probability distribution | |