MCQOPTIONS
Saved Bookmarks
This section includes 313 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.
| 201. |
Social networks are great distribution channel for ___________ |
| A. | Customer feedback |
| B. | Viral Content |
| C. | exclusive coupons |
| D. | marketing messages |
| Answer» E. | |
| 202. |
N-grams are defined as the combination of N keywords together. How many bi-grams can be generated from given sentence? |
| A. | 7 |
| B. | 8 |
| C. | 9 |
| D. | 10 |
| Answer» D. 10 | |
| 203. |
K-means is not deterministic and it also consists of number of iterations. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 204. |
Which of the following ways can be used to represent a graph? |
| A. | Adjacency List and Adjacency Matrix |
| B. | Incidence Matrix |
| C. | Adjacency List, Adjacency Matrix as well as Incidence Matrix |
| D. | No way to represent |
| Answer» D. No way to represent | |
| 205. |
Which of the following is required by K-means clustering? |
| A. | defined distance metric |
| B. | number of clusters |
| C. | initial guess as to cluster centroids |
| D. | all of the mentioned |
| Answer» E. | |
| 206. |
Assume you want to perform supervised learning and to predict number of newborns according to size of storks’ population (http://www.brixtonhealth.com/storksBabies.pdf), it is an example of |
| A. | Classification |
| B. | Regression |
| C. | Clustering |
| D. | Structural equation modeling |
| Answer» C. Clustering | |
| 207. |
To detect fraudulent usage of credit cards, the following data mining task should be used |
| A. | Outlier analysis |
| B. | prediction |
| C. | association analysis |
| D. | feature selection |
| Answer» B. prediction | |
| 208. |
Which of the following activities is a data mining task? |
| A. | Monitoring the heart rate of a patient for abnormalities |
| B. | Extracting the frequencies of a sound wave |
| C. | Predicting the outcomes of tossing a (fair) pair of dice |
| D. | Dividing the customers of a company according to their profitability |
| Answer» B. Extracting the frequencies of a sound wave | |
| 209. |
A definition or a concept is if it classifies any examples as coming within the concept |
| A. | Complete |
| B. | Consistent |
| C. | Constant |
| D. | None of these |
| Answer» C. Constant | |
| 210. |
Data Visualization in mining cannot be done using |
| A. | Photos |
| B. | Graphs |
| C. | Charts |
| D. | Information Graphics |
| Answer» B. Graphs | |
| 211. |
Which of the following issue is considered before investing in Data Mining? |
| A. | Functionality |
| B. | Vendor consideration |
| C. | Compatibility |
| D. | All of the above |
| Answer» E. | |
| 212. |
Data independence means |
| A. | Data is defined separately and not included in programs |
| B. | Programs are not dependent on the physical attributes of data |
| C. | Programs are not dependent on the logical attributes of data |
| D. | Both (B) and (C) |
| Answer» E. | |
| 213. |
Which of the following is not a data mining task? |
| A. | Feature Subset Detection |
| B. | Association Rule Discovery |
| C. | Regression |
| D. | Sequential Pattern Discovery |
| Answer» B. Association Rule Discovery | |
| 214. |
Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.? |
| A. | Cluster Analysis |
| B. | Regression |
| C. | Classification |
| D. | Sequential pattern discovery |
| Answer» C. Classification | |
| 215. |
Which statement is not TRUE regarding a data mining task? |
| A. | Clustering is a descriptive data mining task |
| B. | Classification is a predictive data mining task |
| C. | Regression is a descriptive data mining task |
| D. | Deviation detection is a predictive data mining task |
| Answer» D. Deviation detection is a predictive data mining task | |
| 216. |
Synonym for data mining is |
| A. | Data Warehouse |
| B. | Knowledge discovery in database |
| C. | Business intelligence |
| D. | OLAP |
| Answer» C. Business intelligence | |
| 217. |
The important characteristics of structured data are |
| A. | Sparsity, Resolution, Distribution, Tuples |
| B. | Sparsity, Centroid, Distribution , Dimensionality |
| C. | Resolution, Distribution, Dimensionality ,Objects |
| D. | Dimensionality, Sparsity, Resolution, Distribution |
| Answer» E. | |
| 218. |
The problem of finding hidden structure in unlabeled data is called |
| A. | Supervised learning |
| B. | Unsupervised learning |
| C. | Reinforcement learning |
| Answer» C. Reinforcement learning | |
| 219. |
Identify the example of sequence data |
| A. | weather forecast |
| B. | data matrix |
| C. | market basket data |
| D. | genomic data |
| Answer» E. | |
| 220. |
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 221. |
Incorrect or invalid data is known as ______ |
| A. | Missing data |
| B. | Outlier |
| C. | Changing data |
| D. | Noisy data |
| Answer» E. | |
| 222. |
____________ type of sites are known as friend-of-a-friend site. |
| A. | Chat Messenger |
| B. | Social networking sites |
| C. | Tutorial sites |
| D. | Chat-rooms |
| Answer» C. Tutorial sites | |
| 223. |
Which of the following activities is NOT a data mining task? |
| A. | Predicting the future stock price of a company using historical records |
| B. | Monitoring and predicting failures in a hydropower plant |
| C. | Extracting the frequencies of a sound wave |
| D. | Monitoring the heart rate of a patient for abnormalities |
| Answer» D. Monitoring the heart rate of a patient for abnormalities | |
| 224. |
Many social media sites and services provide _______________ for legitimate account verification. |
| A. | Retina scanning |
| B. | Fingerprint scanning |
| C. | CAPTCHA |
| D. | 2-step verification |
| Answer» E. | |
| 225. |
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 226. |
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. |
| A. | true |
| B. | false |
| Answer» B. false | |
| 227. |
Increase your security for social media account by always ____________ as you step away from the system. |
| A. | signing in |
| B. | logging out |
| C. | signing up |
| D. | logging in |
| Answer» C. signing up | |
| 228. |
Keeping the password by the name of your pet is a good choice. |
| A. | true |
| B. | false |
| Answer» C. | |
| 229. |
________________ is a popular tool to block social-media websites to track your browsing activities. |
| A. | Fader |
| B. | Blur |
| C. | Social-Media Blocker |
| D. | Ad-blocker |
| Answer» C. Social-Media Blocker | |
| 230. |
Which of the following is not a data pre-processing methods |
| A. | Data Visualization |
| B. | Data Discretization |
| C. | Data Cleaning |
| D. | Data Reduction |
| Answer» B. Data Discretization | |
| 231. |
Which of the following is not an appropriate measure for securing social networking accounts? |
| A. | Strong passwords |
| B. | Link your account with a phone number |
| C. | Never write your password anywhere |
| D. | Always maintain a soft copy of all your passwords in your PC |
| Answer» E. | |
| 232. |
Identify the example of Nominal attribute |
| A. | Temperature |
| B. | Salary |
| C. | Mass |
| D. | Gender |
| Answer» E. | |
| 233. |
Which of the following is the most viral section of the internet? |
| A. | Chat Messenger |
| B. | Social networking sites |
| C. | Tutorial sites |
| D. | Chat-rooms |
| Answer» C. Tutorial sites | |
| 234. |
_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist. |
| A. | |
| B. | |
| C. | |
| D. | |
| Answer» D. LInkedIn | |
| 235. |
_____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas. |
| A. | |
| B. | |
| C. | |
| D. | None of the above |
| Answer» B. Facebook | |
| 236. |
Which is the general features can be considered for user migration ? |
| A. | user activity on one site, |
| B. | user network size |
| C. | user rank. |
| D. | all of the above |
| Answer» E. | |
| 237. |
To analyze __________, there is a four-step procedure, |
| A. | individual behavior |
| B. | An observable behavior |
| C. | Feature-Behavior Association. |
| D. | None of these |
| Answer» B. An observable behavior | |
| 238. |
which is the type of migration that take place in social media sites ? |
| A. | site migration |
| B. | attention migration |
| C. | both |
| D. | None of these |
| Answer» D. None of these | |
| 239. |
The user migration behavior is an example of collective behavior. |
| A. | Collective behavior |
| B. | user-user behavior |
| C. | User-Community Behavior |
| D. | None of these |
| Answer» B. user-user behavior | |
| 240. |
_______refers to a population of individuals behaving in a similar way. |
| A. | user-user behavior |
| B. | Collective behavior |
| C. | User-Community Behavior |
| D. | None of these |
| Answer» C. User-Community Behavior | |
| 241. |
_______measures can be used to calculate similarity |
| A. | Katz measure |
| B. | Rooted PageRank. |
| C. | Hitting and Commute Time |
| D. | all of the above |
| Answer» E. | |
| 242. |
__________ examples of individual behavior modeling. |
| A. | Cascade Models |
| B. | threshold models |
| C. | None of these |
| D. | both |
| Answer» E. | |
| 243. |
_________ models receiver-centric. |
| A. | threshold models |
| B. | Cascade Models |
| C. | both |
| D. | None of these |
| Answer» B. Cascade Models | |
| 244. |
_________ models are sender-centric. |
| A. | threshold models |
| B. | Cascade Models |
| C. | both |
| D. | None of these |
| Answer» C. both | |
| 245. |
When a behavior di_x005Fuses in a network, one can use _______model |
| A. | threshold models |
| B. | Cascade Models |
| C. | both |
| D. | None of these |
| Answer» B. Cascade Models | |
| 246. |
__________ Modeling allow for controlled experiments and simulations that can help study individuals in social media |
| A. | An observable behavior |
| B. | Individual Behavior Modeling |
| C. | Feature-Behavior Association. |
| D. | None of these |
| Answer» C. Feature-Behavior Association. | |
| 247. |
In Behavior Analysis Methodology___________ step aims to find the relationship between features and behavior |
| A. | An observable behavior |
| B. | Features. |
| C. | Feature-Behavior Association. |
| D. | observable behavior |
| Answer» D. observable behavior | |
| 248. |
__________algorithms determine features that contribute the most to the prediction of the class attribute. |
| A. | classification |
| B. | Features selection |
| C. | both |
| D. | None of these |
| Answer» C. both | |
| 249. |
_______represents the interactions users have with other users |
| A. | Link data |
| B. | content data |
| C. | both |
| D. | None of these |
| Answer» B. content data | |
| 250. |
________is the behavior individuals exhibit with respect to other individuals. |
| A. | user-user behavior |
| B. | User-Community Behavior |
| C. | User-Entity Behavior |
| D. | None of these |
| Answer» B. User-Community Behavior | |