Digital Fluency ATTEMT 2

Digital Fluency ATTEMT 2

University

20 Qs

quiz-placeholder

Similar activities

BSCS 4-3: Elective 4 (Machine Learning) Final Quiz- 6-8-2024

BSCS 4-3: Elective 4 (Machine Learning) Final Quiz- 6-8-2024

University

20 Qs

Virtual TechnOlympics 2021

Virtual TechnOlympics 2021

University

20 Qs

AI in Education

AI in Education

University

17 Qs

OSI Model

OSI Model

University

15 Qs

Information Management

Information Management

University

20 Qs

Machine Learning Imagine Cup Junior

Machine Learning Imagine Cup Junior

1st Grade - University

20 Qs

TA MODUL 13

TA MODUL 13

University

15 Qs

Machine Learning Beginner Set - 2

Machine Learning Beginner Set - 2

12th Grade - University

15 Qs

Digital Fluency ATTEMT 2

Digital Fluency ATTEMT 2

Assessment

Quiz

Instructional Technology

University

Medium

Created by

Chetan Badami

Used 23+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following Cloud Computing offering enables users to develop, manage and deliver applications?

Infrastructure as a service (IaaS)

Platform as a service (PaaS)

Software as a service (SaaS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these attacks is a ‘Smurf attack’?

One where the attacker exploits the use of the buffer space during a Transmission Control Protocol session initialization handshake

One where the attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host

One where the attack involves use of IP spoofing and the ICMP to saturate a target network with traffic

One where the Botnets (millions of systems infected with malware) under hacker control carry out DDoS attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a shortcoming of the two traditional security methods, Risk Assessment and Identifying Vulnerabilities, and Correlation Rules?

False positives

Inability to deal with unique events

Slower incident response

Handle Zero-Day Attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The primary purpose of ________ is to scale the scope of data and to make predictions of unavailable, future or unseen data based on labeled sample data

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arrange the four stages of IoT Architecture in right order.

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Edge IT, Data Center and Cloud

Sensors and Actuators, Data Center and Cloud, Internet Getaways and Data Acquisition Systems, Edge IT

Sensors and Actuators, Edge IT, Internet Getaways and Data Acquisition Systems, Data Center and Cloud

Sensors and Actuators, Internet Getaways and Data Acquisition Systems, Data Center and Cloud, Edge IT

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ allows networks to adjust their hidden layers of neurons in situations where the expected outcome is not achieved.

Backpropagation

Feed Forward Neural Network

Recurrent Neural Network

Convolutional Neural Network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________ uses the classification process to identify data assets and clustering to group data into distinct parts.

Supervised Learning

Unsupervised Learning

Semi-supervised Learning

Reinforcement Learning

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?