TechJar Round 1

TechJar Round 1

University

45 Qs

quiz-placeholder

Similar activities

Кәсіби ағылшын 51 - 100

Кәсіби ағылшын 51 - 100

University

50 Qs

SUMATIF Scracth kelas 8

SUMATIF Scracth kelas 8

8th Grade - University

50 Qs

LATIHAN SAS INFORMATIKA KELAS 9

LATIHAN SAS INFORMATIKA KELAS 9

9th Grade - University

45 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

Soal Pilihan Ganda - Arduino

Soal Pilihan Ganda - Arduino

12th Grade - University

40 Qs

Quiz Informatika Kelas VII

Quiz Informatika Kelas VII

7th Grade - University

40 Qs

TIN 6 - ÔT Giữa HK 1 - 24-25

TIN 6 - ÔT Giữa HK 1 - 24-25

6th Grade - University

46 Qs

Ujian Akhir Semester 1

Ujian Akhir Semester 1

8th Grade - University

45 Qs

TechJar Round 1

TechJar Round 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Mihir Thakkar

Used 9+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In machine learning, what does the term “overfitting” signify?

The model trains too quickly without accuracy

The model memorizes training data but performs poorly on new data

The model ignores anomalies in the dataset

The model is unable to recognize complex patterns

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which database type is characterized by its use of collections instead of tables?

Relational Database

Hierarchical Database

NoSQL Database

Object-Oriented Database

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The Turing Test, introduced by Alan Turing, is designed to evaluate what?

Computational efficiency

Artificial intelligence’s ability to mimic human behavior

Security strength of cryptographic systems

Accuracy of numerical algorithms

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In computer networking, the Domain Name System (DNS) primarily performs which function?

Encrypts network traffic

Maps domain names to IP addresses

Provides firewall protection

Allocates bandwidth among devices

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In cybersecurity, what does the term “zero-day vulnerability” refer to?

A virus that deletes files immediately upon infection

A flaw exploited before the vendor is aware of it

An attack that targets outdated hardware

A denial-of-service attack on launch day

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The CAP Theorem in distributed databases highlights the trade-off among which three properties?

Capacity, Accuracy, Performance

Consistency, Availability, Partition tolerance

Connectivity, Authentication, Privacy

Caching, Accessibility, Protocols

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which algorithm is primarily used for finding the shortest path in a graph?

Quick Sort

Dijkstra’s Algorithms

BFS only

Merge Sort

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?