Braindare 5.0_Round 1

Braindare 5.0_Round 1

University

25 Qs

quiz-placeholder

Similar activities

AP Biology DNA Practice

AP Biology DNA Practice

12th Grade - University

22 Qs

HIPAA Privacy Rules

HIPAA Privacy Rules

11th Grade - Professional Development

20 Qs

BEED 2A - The Teaching of Science

BEED 2A - The Teaching of Science

University

20 Qs

Planning and Carrying Out Investigations

Planning and Carrying Out Investigations

7th Grade - University

25 Qs

Ability

Ability

KG - Professional Development

20 Qs

Tutorial IoT 2

Tutorial IoT 2

University

20 Qs

Tutorial IoT 4

Tutorial IoT 4

University

20 Qs

Scientific Method

Scientific Method

5th Grade - University

20 Qs

Braindare 5.0_Round 1

Braindare 5.0_Round 1

Assessment

Quiz

Science

University

Medium

Created by

Soumya Sarkar

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

Python is used for data analysis and machine learning

HTML is used for data analytics

Swift can be used to develop machine learning models

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

MOT (Management, Organisation, Technology) is used to identify and evaluate the impact of new technologies on organizations.

MOT is used to develop strategies for implementing new technologies in organizations.

MOT is used to promote the technology for personal use of managers

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

VPN provides anonymity

VPN decreases security and improves connectivity

VPN provides privacy

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

Proof of Work is a crypto mining technique

Proof of Space is not a crypto mining technique

c. Proof of Stake is a crypto mining technique

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Assertion: A VPN (Virtual Private Network) provides a secure and encrypted connection for remote access.
Reasoning: VPNs use encryption protocols to ensure data confidentiality and security over public networks.

Both assertion and reasoning are true

Reasoning is true, but it is not the correct explanation of assertion

Reasoning is true, and it is the correct explanation of assertion

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

NoSql is used in RDBMS

Normalization is supported in RDBMS

RDBMS allows indexing in columns

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Choose the option according to the rules of the game

TRUNCATE, DROP is DDL

ROLLBACK and ALTER are DML

GRANT, REVOKE is DCL

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?