Search Header Logo

itc 2

Authored by violetta.pak06 apple_user

Computers

University

Used 19+ times

itc 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the proposed list refers to Data mining methods? :

prediction, classification, clustering, association, sequence discovery, visualization, forecasting

data collection, data cleaning, analyzing the data, interpreting the results

data input, processing, data output/interpretation, data storage

source and collect data, process and clean the data, perform exploratory data analysis, select, build, and test models

identify issues, select issues, plan an approach and methods, collect data, analyze and interpret data, act on results

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is smart home?

is a camera-based touch technology for interactive whiteboards and interactive displays uses digital cameras and proprietary software and firmware to detect finger or pen contact with the screen

is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation and services

is the residential extension of building automation and involves the control and automation of lighting, heating, ventilation, air conditioning, appliances, and security

is a broad and diverse field that exists cross section between computer science and design

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What basic model involving the interaction of consumers with the administration?

B2A

C2C

B2B

C2A

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cyber threat?

 is an assurance that an individual or an organization will be evaluated on their performance or behaviour related to something for which they are responsible

is the body of technologies, processes and practices involved in protecting individuals and organizations from cyber crime

is a guarantee of reliable access to the information by authorized people

is a systematic evaluation of the security of a company’s information system by measuring how well it conforms to a set of established criteria

is any malicious act that attempts to gain access to a computer network without authorization or permission from the owners

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a global network?

is a computers that are connected to a special network equipment to exchange data and share resources

is a network in which the computers are located within a room, building or nearby building

is a network on which computers are at a great distance from each other whitin another city or another country

is data flow over a communication chanel or throught a network device, and the volume of this stream (in bytes)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What has the potential to store more data, access data faster, and consume less power than current memory technologies?

magnetic random access memory (MRAM)

application service provider (ASP)

DNA сomputers

extreme-ultraviolet lithography chips (EUVL)

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a type of distributed database that stores a permanent and tamper-proof ledger of transaction data?

Expert systems

Neural Networks

Artificial intelligence

Blockchain

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?