
itc 2
Authored by violetta.pak06 apple_user
Computers
University
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
45 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the proposed list refers to Data mining methods? :
prediction, classification, clustering, association, sequence discovery, visualization, forecasting
data collection, data cleaning, analyzing the data, interpreting the results
data input, processing, data output/interpretation, data storage
source and collect data, process and clean the data, perform exploratory data analysis, select, build, and test models
identify issues, select issues, plan an approach and methods, collect data, analyze and interpret data, act on results
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is smart home?
is a camera-based touch technology for interactive whiteboards and interactive displays uses digital cameras and proprietary software and firmware to detect finger or pen contact with the screen
is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services
is the residential extension of building automation and involves the control and automation of lighting, heating, ventilation, air conditioning, appliances, and security
is a broad and diverse field that exists cross section between computer science and design
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What basic model involving the interaction of consumers with the administration?
B2A
C2C
B2B
C2A
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cyber threat?
is an assurance that an individual or an organization will be evaluated on their performance or behaviour related to something for which they are responsible
is the body of technologies, processes and practices involved in protecting individuals and organizations from cyber crime
is a guarantee of reliable access to the information by authorized people
is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to a set of established criteria
is any malicious act that attempts to gain access to a computer network without authorization or permission from the owners
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a global network?
is a computers that are connected to a special network equipment to exchange data and share resources
is a network in which the computers are located within a room, building or nearby building
is a network on which computers are at a great distance from each other whitin another city or another country
is data flow over a communication chanel or throught a network device, and the volume of this stream (in bytes)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What has the potential to store more data, access data faster, and consume less power than current memory technologies?
magnetic random access memory (MRAM)
application service provider (ASP)
DNA сomputers
extreme-ultraviolet lithography chips (EUVL)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a type of distributed database that stores a permanent and tamper-proof ledger of transaction data?
Expert systems
Neural Networks
Artificial intelligence
Blockchain
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?