1/318
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In RSA, if user A wants to send an encrypted message to user B, the plaintext is encrypted with the public key of ___
A. User A
B. User B
C. The network
D. A third party.
B. User B
An IPv4 address is a_address that uniquely and universally defines the connection of a host or a routero the Internet
A. 32-bit
B. 64-bit
C. 128-bit|
D. None of others
A
Which network is a packet switching network?
A. Ring network
B. LAN
C. Star network
D. EuroNET
E. None of the others
D
Images are stored in computers using _ techniques?
A. Raster graphics and bit map
B. Vector graphics and bit map
C. True-color and raster graphics
D. Index-color and vector graphics
E. Bit map
A
If we cannot record all the values of an audio signal over an interval, we can record some of themmeans that we select only a finite number of points on the analog signal, measure their values, and recordthem
A. digita
lB. analog
C. sampling
D. binary
C
A byte consists of _ bits.
A. 2
B. 4
C. 8
D. 16
C
What is the number of bit patterns provided by a 7-bit code?
A. 256
B. 128
C. 64
D. 512
B
The maximum value of a binary integer with K digits. For example, if K = 5, then the maximum value is _
A. 30
B. 31|
C. 32
D. 33
B
Which printer uses a combination of laser-beam & electro photographic techniques.
A. Laser printers
B. Dot-Matrix
C. Line printer
D. Daisy wheel
E. None of the others
C
Who is considered the 'father' of the minicomputer and one of the founder fathers of the modern computer industry world-wide?
A. George Tate
B. Kenneth H. Olsen
C. Seymour Cray
D. Basic Pascal
B
In the Turing model, the___depends on the combination of two factors: the input data and the program.
A. Output data
B. Instructions
C. Algorithm
D. Data processing
A
In a stream cipher encryption and decryption are done one symbol. We have a plaintext stream a ciphertext stream and a
A. Key block
B. Single key
C. Key stream
D. Auto key
B
_ who create algorithms to break existing internet networks so as to solve the loopholes in them
A. Black Hat Hacker
B. Grey Hat Hacker
C. White Hat Hacker
D. Blue Hat Hacker
C
Which of the following attacks is threatening integrity?
A. Masquerading
B. Traffic Analysis
C. Denial of service
D. Encoding
A
The intersection of a column and row in a spreadsheet is called a bon or
A. Key
B. Field
C. Cell
D. Menu
E. None of the others
C
When a hashing algorithm produces an address for an insertion key and that address is already occupied, it is called a____
A. Collision
B. Probe
C. Synonym
D. Linked list
A
Given a linked list called children, the pointer variable children identifies_____element of the linked list.
A. The first
B. The second
C. The last
D. Any
A
A data structure can be
A. Only an array
B. Only a record
C. Only a linked list
D. An array, a record, or a linked list
D
Testing a software system can involve_____testing
A. Black-box
B. Glass-box
C. Neither black-box nor glass-box
D. Both black-box and glass-box
D
between modules in a software system must be maximized.
A. Coupling
B. Cohesion
C. Neither coupling nor cohesion
D. Both coupling and cohesion
B
_ are names for memory locations
A. Variables
B. Imperative language
C. Identifiers
D. Data type
A
The code that should be adequate for present and anticipated data processing both for machine and human use is
A. Conciseness
B. Uniqueness
C. Operability
D. All of the others
C
The program in a high-level language is called the
A. Programming language
B. Source program
C. Translation
D. Interpretation
B
In_____sort, the smallest item from the unsorted list is swapped with the item at the beginning of the unsorted list.
A. Selection
B. Bubble
C. Insertion
D. Every
A
Which of the following holds data and processing instructions temporarily until the CPU needs it?
A. ROM
B. Control unit
C. Main memory
D. Coprocessor chips
E. None of the others
C
Which of the following is the user programmed semiconductor memory?
A. SRAM
B. DRAM
C. EPROM
D. All of the others
E. None of the others
C
In a_ the directory system listing of the peers and what they offer uses the client-server paradigm, but the storing and downloading of the files are done using the peer-to-peer paradigm.
A. WWW
B. Centralized network
C. Hybrid network
D. Decentralized network
B
explicitly defines connection establishment, data transfer, connection teardown phases to provide a connection-oriented service AND reliable protocol
A. TCP
B. UDP
C. IP
D. HTTP
A
The format of an Ipv6 address is referred to as _
A. Dotted-hexadecimal notation
B. Dotted-octal notation
C. Dotted-decimal notation
D. 8- Hexadecimal digits
D
Use a simple left shift operation on the bit pattem 1001 1000
A. 0001 1001
B. 0001 1010
C. 0011 0000
D. 0011 0001
C
Use a arithmetic right shift operation on the bit pattem 1001 1000
A. 0100 1100
B. 1100 1100
C. 1101 1001
D. 1001 1000
B
If we call the bit depth or number of bits per sample 8, the number of samples per second S, so how tocalculate BIT RATE (R)?
A. B x 2S
B. 28 x S
C. B x S
D. B2 x S2
C
The ASCIl code for the character J is:
A. 1001 0001
B. 1001 1010
C. 0100 1010
D. 1010 0001
E. None of the others
C
What is the result of storing -25 in an 8-bit memory location using two's complement representation?
A. 00011001
B. 00110010
C. 11100111|
D. 11110010
C
Instructions and memory addresses are represented by
A. Character codes
B. Binary codes
C. Binary word
D. Parity bit
E. None of the others
B
IBM-PC is an example of
A. A main frame
B. Machine-in-built
C. Micro computer
D. Special purpose
E. None of the others
C
For surface organization of magnetic tape, the width of the tape is divided into nine tracks. Nine vertical locations can store 8 bits of information related to a byte plus a bit for
A. Next block
B. Data
C. Next tape information
D. Error detection
D
After the instruction is decoded, the control unit sends the task order to a component in the CPU. What is this phase?.
A. Fetch phase
B. Decode phase
C. Excute phase
D. None of others
C
A 17th-century computing machine that could perform addition and subtraction was the
A. Pascaline
B. Jacquard loom
C. Analytical Engine
D. Babbage machine
A
In a block cipher a _____ is used to encrypt the whole block even if the key is made of multiple values
A. Key block
B. Single key
C. Key stream
D. Auto key
B
_____ is an attack that reduce the capability of a computer system to function correctly or bring the system down altogether by exhausting its resources.
A. DoS
B. Trojan horses
C. Worms
D. Viruses
A
_____ means concealing the message by covering it with something else.
A. Cryptography
B. Steganography
C. Compressing
D. Authentication
B
Which of the following attacks is threatening confidentiality?
A. Snooping
B. Repudiation
C. Denial of service
D. Modification
A
_____ is the process by which a given set of relations are transformed to a new set of relations with a more solid structure.
A. Relational database
B. Database system
C. Atomic operations
D. Normalization
D
If you want to change the value of an attribute of a tuple, you use the _____ operation.
A. Project
B. Join
C. Update
D. Select
C
In the relational database model, data is organized in _____ called relations
.A. Two-dimensional array
B. Two-dimensional tables
C. Two-dimensional record
D. None of others
B
The address produced by a hashing algorithm is the _____ address.
A. Probe
B. Synonym
C. Collision
D. Home
D
The enqueue operation _____ an item at the _____ of the queue.
A. Delete/front
B. Delete /end
C. Inserts/front
D. Insert/rear
D
In preorder traversal of a binary tree, the _____
A. Left subtree is processed first
B. Right subtree is processed first
C. Root is processed first
D. The root is never processed
C
The pop operation _____ of the stack.
A. Deletes an item from the top
B. Deletes an item from the bottom
C. Inserts an item at the top
D. Inserts an item at the bottom
A
The name of a linked list is the name of the head pointer that points to the _____ of the list
.A. First node
B. Second node
C. Null node
D. Last node
A
An array that consists of just rows and columns is a _____ array.
A. One-dimensional
B. Two-dimensional
C. Three-dimensional
D. Multidimensional
B
What is method in black-box testing which tests are designed to include representatives of boundary values in a range?
A. Boundary-value testing
B. Random testing
C. Exhaustive testing
D. Data flow testing
A
In the software quality, what factor measures can be mentioned for transferability?
A. Accuracy
B. Timeliness
C. Resusability
D. Changeability
C
_____ is the breaking up of a large project into smaller parts.
A. Coupling
B. Incrementing
C. Obsolescence
D. Modularization
D
One phase in system development is _____
A. Analysis
B. Application
C. Designing
D. Collecting
A
What is the analysis process in the system implementation phase that will use a program as an active agent that manipulates passive object?
A. Procedure-oriented analysis
B. Structured analysis
C. Classical analysis
D. All of others
D
A _____ causes an action to be performed by the program. It translates directly into one or more executable computer instructions
.A. Expression
B. Operator
C. Variables
D. Statements
D
What is language of procedural paradigm that is high level language and also has some low-level instructions?
A. COBOL
В. С
C. Pascal
D. Ada
B
An instruction that transfers program control to one or more possible paths is known as
A. Utility program
B. System software
C. Broadband channel
D. Application program
E. None of the others
C
The _____ analyzer checks the sentences created by the syntax analyzer to be sure that they contain no ambiguity.
A. Lexical
8. Syntax
C. Semantic
D. Code generation
C
The list of coded instructions is called
A. Computer program
B. Algorithm
C. Flowchart
D. Utility programs
E. None of the others
A
A _____ is a program in execution. It is a program that has started but has not finished
A. Program
B. Job
C. Process
D. Task
C
Which technique is used in multiprogramming that needs to be determined size beforehand by the memory manager and with each program occupying a contiguous space?
A. Partitioning
B. Paging
C. Demand paging
D. Demand segmentation
A
Which is an electronic device that can store temporarily a single bit of data
A. Accumulator
B. Buffer
C. Memory
D. Latch
D
All the instructions and procedures needed to start up a computer, to the point it can load an operating system, are stored in ROM chips. In IBM compatible PCs this is called the _____
A. RAM BIOS
B. ROM BIOS
C. EPROM
D. POST
E. None of the others
B
_____ is the standard protocol provided by TCP/IP for copying a file from one host to another and transferring files from one system to another seems simple and straightforward
A. FTP
B. SMTP
C. URL
D. HTTP
A
At the transport layer, addresses are called _____ and these define the application-layer programs at the source and destination.
A. TCP
B. Port numbers
C. UDP
D. IP address
B
A _____ WAN is a network that connects two communicating devices through a transmission medium (cable or air)
A. Peer-to-peer
B. Node-to-node
C. Point-to-point
D. Data link
C
What is NOT a standard of vector graphic?
A. CAD
B. FLASH
C. TrueType
D. PostScript
E. None of others
E
When we want to store music in a computer, the audio signal must be _____
.A. Sampled only
B. Quantized only only
C. Coded only
D. Sampled, quantized, and coded
D
Different sets of bit patterns have been designed to represent text symbols. Each set is called a _____ ?
A. bit patterns
B. binary
C. code
D. binary text file
C
In the sign-and-magnitude representation, the memory location can hold four bits, assume that we have stored integer -6 in a memory location and we then try to subtract 7 to the integer. The computer's response is _____?
A. 6
В. -6
C. 7
D. -7
C
In a positional number system with base b, we can always find the number of digits of an integer. So how many bits can we find in the decimal number 20 in hexadecimal system?
A. 1
B. 2
C. 3
D. 4
E. None of the others
B
The binary equivalent of the Octal number 13.54 is
A. 1011.1011
B. 1101.1110
C. 1001.1110
D. All of the others
E. None of the others
The base of the binary number system is _____
A. 2
B. 8
C. 10
D. 16
A
What is the name given to the molecular-scale computer?
A. Femtocomputer
B. Nanocomputer
C. Supercomputer
D. Microcomputer
E. None of the others
B
In magnetic disks, the _____ defines how fast the disk is spinning.
A. Seek time
B. Tranfer time
C. Rotational speed
D. None of others
C
_____ is a memory type with capacitors that need to be refreshed periodically.
A. SRAM
B. DRAM
C. ROM
D. CROM
B
Off-line operation is the operation of devices without the control of _____
A. Memory
B. CPU
C. ALU
D. Control unit
E. None of the others
B
The first microprocessors produced by Intel Corpn. and Texas Instruments were used primarily to control small
A. Microwave ovens
B. Washing machines
C. Calculators
D. Personal computers
E. Robotics
C
A step-by-step solution to a problem is called _____.
A. Hardware
B. An operating system
C. A computer language
D. An algorithm
D
In the decade or so, which jobs are most likely to be displaced by AI?
A.Most jobs related to office work (white collar jobs)
B.Jobs that primarily involve routine, repetitive tasks
C.Jobs that mainly involve non-routine, non-repetitive tasks
D.All jobs will be displaced
B
If a developing economy has a strong and thriving coffee bean manufacturing industry (or any other vertical industry), then it has an advantage in applying AI to that that industry.
True
False
TRUE
Which of these are examples of adversarial attacks on an AI system? (Select all that apply)
A.Subtly modifying an audio clip to make a speech recognition system think someone said "Yes, authorized" when they actually said "No, reject."
B.Adding a sticker to a stop sign to make an AI system fail to detect it.
C.Subtly altering an image to mislead an AI system into mistakenly recognizing a dog as a cat.
D.Using AI to synthesize a fake video of a politician saying something they never actually said.
A-B-C
What are recommended practices for mitigating bias in AI? (Select all that apply)
A.Using more inclusive/less biased data
B.Systematic auditing processes to check for bias
C.Technical solution such as "zeroing out" bias
D.Using an adversarial attack on the AI system to change its outputs to be less biased
A-B-C
Using current AI technology, if a machine learning system learns only from text that is completely neutral and does not reflect any gender biases, then we would expect it to exhibit no, or at most minimal, gender bias.
True
False
TRUE
Say you are building an AI system to help make diagnoses from X-ray scans. Which of the following statements about explainability of AI do you agree with?
A.Most AI systems are highly explainable, making it easy for a doctor to understand and give a particular diagnosis.
B.Lack of explainability can hamper users' willingness to trust and adopt an AI system.
C.Explainability is usually achieved through building a chatbot to talk to the user to explain its outputs.
D.AI systems are intrinsically "black box" and cannot give any explanation for their outputs.
B
What is the Goldilocks Rule of AI?
A.Fearing human extinction due to AI development
B.One shouldn't be too optimistic or too pessimistic about AI technology
C.Expecting AI to create Utopia
D.AI's technology will continue to grow and will solve all of humanity's problems
B
What are the current limitations of AI technology? (Select all that apply)1 / 1 point
A.Explainability is hard
B.AI technology can be biased
C.AI technology is susceptible to adversarial attacks
D.There are no limitations to AI technology
E.AI technology can display discriminatory behavior
A-B-C-E
According to the AI Transformation Playbook, broad AI training needs to be provided not only to engineers, but also to executives/senior business leaders and to leaders of divisions working on AI projects.
True
False
TRUE
Why is developing an AI strategy NOT the first step in the AI Transformation Playbook?
A.The strategy should be to use the Virtuous Circle of AI, which comes after building a product.
B.When transforming a company into an AI company, one does not need a strategy, therefore it can't be the first step.
C.Without having some practical AI experience and knowing what it feels like to build an AI project, a company usually does not know enough to formulate a sound strategy.
D.There is no reason. Developing an AI strategy IS the first step in the AI Transformation Playbook.
C
Say you are building a smart speaker, and want to accumulate data for your product through having many users. Which of these represents the "Virtuous circle of AI" for this product?
(A) supervised learning
(B) https://imgur.com/9nasv0n.png
(C) trigger word detection -> speech recognition -> intent recognition -> command execution.
(D) https://imgur.com/9Nasv1N.png
D
According to the AI Transformation Playbook, what is the most important outcome of your first pilot project?
A.Succeed and show traction within 6-12 months
B.Drive extremely high value for the business
C.Be executed by an in-house team
D.None of the above
A
What is the first step in the AI Transformation Playbook for helping your company become good at AI?
A.Provide broad AI training
B.Execute pilot projects to gain momentum
C.Build an in-house AI team
D.Develop an AI strategy
B
Suppose you are building a trigger word detection system, and want to hire someone to build a system to map from Inputs A (audio clip) to Outputs B (whether the trigger word was said), using existing AI technology. Out of the list below, which of the following hires would be most suitable for writing this software?
A.AI Product Manager
B.Machine learning engineer
C.Machine learning researcher
D.Data engineer
B
Question 3Consider this system for building a self-driving car:The component for pedestrian detection is usually built using:
A.A motion planning algorithm
B.GANs
C.Supervised learning
D.Reinforcement learning
C
Because a smart speaker can carry out multiple functions (such as tell a joke, play music, etc.) it is an example of Artificial General Intelligence (AGI).
True
False
FALSE
Which of these are reasons that it's often unrealistic to expect an ML system to be 100% accurate?
A You might not have enough data
B Data can be mislabeled
C Data can be ambiguous
D All of the above.
D
For your automated resume screening application, you are now providing a test set to the AI team. Which of the following statements about the test set are true? (Select all that apply.)
A It will be used by the AI team to evaluate the performance of the algorithm.
B It should give examples of both the input A (resume) and the desired output B (whether to move forward with a candidate)
C The test set should ideally be identical to the training set.
D It should give examples of the input A (resume) but not necessarily the desired output B (whether to move forward with a candidate).
A-B