Explore topic-wise MCQs in Information Technology Engineering (IT).

This section includes 313 Mcqs, each offering curated multiple-choice questions to sharpen your Information Technology Engineering (IT) knowledge and support exam preparation. Choose a topic below to get started.

201.

Social networks are great distribution channel for ___________

A. Customer feedback
B. Viral Content
C. exclusive coupons
D. marketing messages
Answer» E.
202.

N-grams are defined as the combination of N keywords together. How many bi-grams can be generated from given sentence?

A. 7
B. 8
C. 9
D. 10
Answer» D. 10
203.

K-means is not deterministic and it also consists of number of iterations.

A. true
B. false
Answer» B. false
204.

Which of the following ways can be used to represent a graph?

A. Adjacency List and Adjacency Matrix
B. Incidence Matrix
C. Adjacency List, Adjacency Matrix as well as Incidence Matrix
D. No way to represent
Answer» D. No way to represent
205.

Which of the following is required by K-means clustering?

A. defined distance metric
B. number of clusters
C. initial guess as to cluster centroids
D. all of the mentioned
Answer» E.
206.

Assume you want to perform supervised learning and to predict number of newborns according to size of storks’ population (http://www.brixtonhealth.com/storksBabies.pdf), it is an example of

A. Classification
B. Regression
C. Clustering
D. Structural equation modeling
Answer» C. Clustering
207.

To detect fraudulent usage of credit cards, the following data mining task should be used

A. Outlier analysis
B. prediction
C. association analysis
D. feature selection
Answer» B. prediction
208.

Which of the following activities is a data mining task?

A. Monitoring the heart rate of a patient for abnormalities
B. Extracting the frequencies of a sound wave
C. Predicting the outcomes of tossing a (fair) pair of dice
D. Dividing the customers of a company according to their profitability
Answer» B. Extracting the frequencies of a sound wave
209.

A definition or a concept is if it classifies any examples as coming within the concept

A. Complete
B. Consistent
C. Constant
D. None of these
Answer» C. Constant
210.

Data Visualization in mining cannot be done using

A. Photos
B. Graphs
C. Charts
D. Information Graphics
Answer» B. Graphs
211.

Which of the following issue is considered before investing in Data Mining?

A. Functionality
B. Vendor consideration
C. Compatibility
D. All of the above
Answer» E.
212.

Data independence means

A. Data is defined separately and not included in programs
B. Programs are not dependent on the physical attributes of data
C. Programs are not dependent on the logical attributes of data
D. Both (B) and (C)
Answer» E.
213.

Which of the following is not a data mining task?

A. Feature Subset Detection
B. Association Rule Discovery
C. Regression
D. Sequential Pattern Discovery
Answer» B. Association Rule Discovery
214.

Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.?

A. Cluster Analysis
B. Regression
C. Classification
D. Sequential pattern discovery
Answer» C. Classification
215.

Which statement is not TRUE regarding a data mining task?

A. Clustering is a descriptive data mining task
B. Classification is a predictive data mining task
C. Regression is a descriptive data mining task
D. Deviation detection is a predictive data mining task
Answer» D. Deviation detection is a predictive data mining task
216.

Synonym for data mining is

A. Data Warehouse
B. Knowledge discovery in database
C. Business intelligence
D. OLAP
Answer» C. Business intelligence
217.

The important characteristics of structured data are

A. Sparsity, Resolution, Distribution, Tuples
B. Sparsity, Centroid, Distribution , Dimensionality
C. Resolution, Distribution, Dimensionality ,Objects
D. Dimensionality, Sparsity, Resolution, Distribution
Answer» E.
218.

The problem of finding hidden structure in unlabeled data is called

A. Supervised learning
B. Unsupervised learning
C. Reinforcement learning
Answer» C. Reinforcement learning
219.

Identify the example of sequence data

A. weather forecast
B. data matrix
C. market basket data
D. genomic data
Answer» E.
220.

If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

A. true
B. false
Answer» B. false
221.

Incorrect or invalid data is known as ______

A. Missing data
B. Outlier
C. Changing data
D. Noisy data
Answer» E.
222.

____________ type of sites are known as friend-of-a-friend site.

A. Chat Messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Answer» C. Tutorial sites
223.

Which of the following activities is NOT a data mining task?

A. Predicting the future stock price of a company using historical records
B. Monitoring and predicting failures in a hydropower plant
C. Extracting the frequencies of a sound wave
D. Monitoring the heart rate of a patient for abnormalities
Answer» D. Monitoring the heart rate of a patient for abnormalities
224.

Many social media sites and services provide _______________ for legitimate account verification.

A. Retina scanning
B. Fingerprint scanning
C. CAPTCHA
D. 2-step verification
Answer» E.
225.

Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.

A. true
B. false
Answer» B. false
226.

Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.

A. true
B. false
Answer» B. false
227.

Increase your security for social media account by always ____________ as you step away from the system.

A. signing in
B. logging out
C. signing up
D. logging in
Answer» C. signing up
228.

Keeping the password by the name of your pet is a good choice.

A. true
B. false
Answer» C.
229.

________________ is a popular tool to block social-media websites to track your browsing activities.

A. Fader
B. Blur
C. Social-Media Blocker
D. Ad-blocker
Answer» C. Social-Media Blocker
230.

Which of the following is not a data pre-processing methods

A. Data Visualization
B. Data Discretization
C. Data Cleaning
D. Data Reduction
Answer» B. Data Discretization
231.

Which of the following is not an appropriate measure for securing social networking accounts?

A. Strong passwords
B. Link your account with a phone number
C. Never write your password anywhere
D. Always maintain a soft copy of all your passwords in your PC
Answer» E.
232.

Identify the example of Nominal attribute

A. Temperature
B. Salary
C. Mass
D. Gender
Answer» E.
233.

Which of the following is the most viral section of the internet?

A. Chat Messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Answer» C. Tutorial sites
234.

_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.

A. Facebook
B. Instagram
C. Twitter
D. LInkedIn
Answer» D. LInkedIn
235.

_____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas.

A. Twitter
B. Facebook
C. Instagram
D. None of the above
Answer» B. Facebook
236.

Which is the general features can be considered for user migration ?

A. user activity on one site,
B. user network size
C. user rank.
D. all of the above
Answer» E.
237.

To analyze __________, there is a four-step procedure,

A. individual behavior
B. An observable behavior
C. Feature-Behavior Association.
D. None of these
Answer» B. An observable behavior
238.

which is the type of migration that take place in social media sites ?

A. site migration
B. attention migration
C. both
D. None of these
Answer» D. None of these
239.

The user migration behavior is an example of collective behavior.

A. Collective behavior
B. user-user behavior
C. User-Community Behavior
D. None of these
Answer» B. user-user behavior
240.

_______refers to a population of individuals behaving in a similar way.

A. user-user behavior
B. Collective behavior
C. User-Community Behavior
D. None of these
Answer» C. User-Community Behavior
241.

_______measures can be used to calculate similarity

A. Katz measure
B. Rooted PageRank.
C. Hitting and Commute Time
D. all of the above
Answer» E.
242.

__________ examples of individual behavior modeling.

A. Cascade Models
B. threshold models
C. None of these
D. both
Answer» E.
243.

_________ models receiver-centric.

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» B. Cascade Models
244.

_________ models are sender-centric.

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» C. both
245.

When a behavior di_x005F uses in a network, one can use _______model

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» B. Cascade Models
246.

__________ Modeling allow for controlled experiments and simulations that can help study individuals in social media

A. An observable behavior
B. Individual Behavior Modeling
C. Feature-Behavior Association.
D. None of these
Answer» C. Feature-Behavior Association.
247.

In Behavior Analysis Methodology___________ step aims to find the relationship between features and behavior

A. An observable behavior
B. Features.
C. Feature-Behavior Association.
D. observable behavior
Answer» D. observable behavior
248.

__________algorithms determine features that contribute the most to the prediction of the class attribute.

A. classification
B. Features selection
C. both
D. None of these
Answer» C. both
249.

_______represents the interactions users have with other users

A. Link data
B. content data
C. both
D. None of these
Answer» B. content data
250.

________is the behavior individuals exhibit with respect to other individuals.

A. user-user behavior
B. User-Community Behavior
C. User-Entity Behavior
D. None of these
Answer» B. User-Community Behavior