Modern IT-Technologies.d

Скачать тест — (Modern IT-Technologies.d_8e6070dd.pdf)

  1. Which of the following is not a goal of AI?
  2. Artificial Intelligence has its expansion in the following except …
  3. … is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field.
  4. … is a set of algorithms and techniques, modeled in accordance with the human brain.
  5. The main challenge(s) of NLP is …
  6. Which of the following sentences is true?
  7. Machine Translation can be considered as an application of …
  8. … is a task which assign a class to each token in a single input sequence, so a word will be referred to as a «token»
  9. The following are advantages of neural networks over conventional computers except…
  10. The following are AI programming languages except …
  11. … language using mnemonics like LDA, Sum
  12. Programming language is not …
  13. What is the only thing that computers understand?
  14. A popular programming language created by Bjarne Stroustrup in 1983 is …
  15. … is a component oriented programming language
  16. … is a statistical design and graphics programming language
  17. … is a language used to describe reusable styles for presenting documents written in a markup language
  18. Java and JavaScript are … languages in both concept and design
  19. … is a server side tool for dynamic and interactive pages
  20. … can’t be considered as high level languages
  21. After loading/installing the analysis toolpak in Excel, you can use it from the … tab?
  22. In order to find the standard deviation of a set of data in excel, you need to use …
  23. To use normal distribution function in excel, you need to select … function from statistical functions
  24. In order to find the lower and upper estimate of the mean in Excel, you need to use it from …
  25. To test of hypothesis concerning the population Mean, we should have … hypothesis
  26. In statistics, claim or statement about a property of a population is called …
  27. Alternative Hypothesis can be denoted by …
  28. … is a statistical technique that can show how strongly pairs of variables are related
  29. … is a method that attempts to determine the strength of the relationship between dependent and independent variables.
  30. Excel is used in statistics because it is …
  31. Big Data can do the following except …
  32. A successful story of big data is not in …
  33. … skills are not required for Big Data
  34. … is automatically translates queries into batch MapReduce jobs.
  35. Data in the form of spreadsheet file is known as …
  36. Hadoop is a framework that works with a variety of related tools. Common cohorts include …
  37. In Hadoop HDFS, the master node is called …
  38. There is a website which provides visitor counter (or hit counter) to many websites. Which characteristic of Big Data will this website face?
  39. What Comparing with previous 20 years, devices (computers) have become?
  40. How many bytes are there in 1 Petabyte?
  41. … is a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
  42. The following are the main parts of IoT systems Except …
  43. Smart City is an IoT’s …
  44. To control lights in smart homes from a switch, smartphone or their voice, you need …
  45. If the IoT device contains any security vulnerabilities, all the following can be happen except…
  46. In smart home, all the devices that you want to use in an IoT system must be …
  47. Smart cities are needed to …
  48. 5G technology will be …
  49. What device is not IoT?
  50. … is a technology that is not used in IoT nowadays?
  51. … is, an immutable time-stamped series record of data that is distributed and managed by cluster of computers.
  52. Bitcoin is a(n) …
  53. One of the Augmented reality examples is …
  54. One of the Virtual reality example is …
  55. … is an application design framework and development platform for creating efficient and sophisticated single-page apps
  56. … is a component-based library which is used to develop interactive user interfaces
  57. Applications that advise or assist humans to perform a job exponentially better, is an example of …
  58. Why to use Robotic Process Automation?
  59. The drawback of cognitive computing is …
  60. Why we need to learn the recommended technologies like Blockchain, Robotics, Angular … etc.?
  61. Machine Learning is …
  62. … is a tool that is used for research and production at Google, it is an open-source software library for dataflow programming
  63. … is an open source free machine learning library, it offers algorithms and data structures for machine learning problems.
  64. Technique that involves the grouping of data points.is called …
  65. Stock marketing is a machine learning’s …
  66. IBM Watson Studio is a machine learning’s …
  67. Machine learning is not …
  68. Machine Learning’s goal is …
  69. What is the most important part of machine learning?
  70. Machine learning limitation is …
  71. All Of the following are examples Of real security and privacy threats except …
  72. … monitors user activity on internet and transmit that information in the background to someone else
  73. Firewall is a type of …
  74. Which of the following is an internal threat to a computer or a computer network …
  75. Passwords are used to improve the …
  76. By security in e-Commerce we mean …
  77. To set a secure password you need to …
  78. … is not an examples of cyber attacks
  79. To prevent cyber-attack in your organization you need to …
  80. … is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing
  81. Which of the following is not a goal of AI?
  82. Artificial Intelligence has its expansion in the following except …
  83. … is a computer program that uses artificial intelligence (AI) technologies to simulate the judgment and behavior of a human or an organization that has expert knowledge and experience in a particular field.
  84. … is a set of algorithms and techniques, modeled in accordance with the human brain.
  85. The main challenge(s) of NLP is …
  86. Which of the following sentences is true?
  87. Machine Translation can be considered as an application of …
  88. … is a task which assign a class to each token in a single input sequence, so a word will be referred to as a «token»
  89. The following are advantages of neural networks over conventional computers except…
  90. The following are AI programming languages except …
  91. … language using mnemonics like LDA, Sum
  92. Programming language is not …
  93. What is the only thing that computers understand?
  94. A popular programming language created by Bjarne Stroustrup in 1983 is …
  95. … is a component oriented programming language
  96. … is a statistical design and graphics programming language
  97. … is a language used to describe reusable styles for presenting documents written in a markup language
  98. Java and JavaScript are … languages in both concept and design
  99. … is a server side tool for dynamic and interactive pages
  100. … can’t be considered as high level languages
  101. After loading/installing the analysis toolpak in Excel, you can use it from the … tab?
  102. In order to find the standard deviation of a set of data in excel, you need to use …
  103. To use normal distribution function in excel, you need to select … function from statistical functions
  104. In order to find the lower and upper estimate of the mean in Excel, you need to use it from …
  105. To test of hypothesis concerning the population Mean, we should have … hypothesis
  106. In statistics, claim or statement about a property of a population is called …
  107. Alternative Hypothesis can be denoted by …
  108. … is a statistical technique that can show how strongly pairs of variables are related
  109. … is a method that attempts to determine the strength of the relationship between dependent and independent variables.
  110. Excel is used in statistics because it is …
  111. Big Data can do the following except …
  112. A successful story of big data is not in …
  113. … skills are not required for Big Data
  114. … is automatically translates queries into batch MapReduce jobs.
  115. Data in the form of spreadsheet file is known as …
  116. Hadoop is a framework that works with a variety of related tools. Common cohorts include …
  117. In Hadoop HDFS, the master node is called …
  118. There is a website which provides visitor counter (or hit counter) to many websites. Which characteristic of Big Data will this website face?
  119. What Comparing with previous 20 years, devices (computers) have become?
  120. How many bytes are there in 1 Petabyte?
  121. … is a system of interrelated, internet-connected objects that are able to collect and transfer data over a wireless network without human intervention.
  122. The following are the main parts of IoT systems Except …
  123. Smart City is an IoT’s …
  124. To control lights in smart homes from a switch, smartphone or their voice, you need …
  125. If the IoT device contains any security vulnerabilities, all the following can be happen except…
  126. In smart home, all the devices that you want to use in an IoT system must be …
  127. Smart cities are needed to …
  128. 5G technology will be …
  129. What device is not IoT?
  130. … is a technology that is not used in IoT nowadays?
  131. … is, an immutable time-stamped series record of data that is distributed and managed by cluster of computers.
  132. Bitcoin is a(n) …
  133. One of the Augmented reality examples is …
  134. One of the Virtual reality example is …
  135. … is an application design framework and development platform for creating efficient and sophisticated single-page apps
  136. … is a component-based library which is used to develop interactive user interfaces
  137. Applications that advise or assist humans to perform a job exponentially better, is an example of …
  138. Why to use Robotic Process Automation?
  139. The drawback of cognitive computing is …
  140. Why we need to learn the recommended technologies like Blockchain, Robotics, Angular … etc.?
  141. Machine Learning is …
  142. … is a tool that is used for research and production at Google, it is an open-source software library for dataflow programming
  143. … is an open source free machine learning library, it offers algorithms and data structures for machine learning problems.
  144. Technique that involves the grouping of data points.is called …
  145. Stock marketing is a machine learning’s …
  146. IBM Watson Studio is a machine learning’s …
  147. Machine learning is not …
  148. Machine Learning’s goal is …
  149. What is the most important part of machine learning?
  150. Machine learning limitation is …
  151. All Of the following are examples Of real security and privacy threats except …
  152. … monitors user activity on internet and transmit that information in the background to someone else
  153. Firewall is a type of …
  154. Which of the following is an internal threat to a computer or a computer network …
  155. Passwords are used to improve the …
  156. By security in e-Commerce we mean …
  157. To set a secure password you need to …
  158. … is not an examples of cyber attacks
  159. To prevent cyber-attack in your organization you need to …
  160. … is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing