TechJar Round 1

TechJar Round 1

University

45 Qs

quiz-placeholder

Similar activities

Database Management Systems Mid semester

Database Management Systems Mid semester

University

40 Qs

xtgfrt

xtgfrt

University

40 Qs

KISI-KISI CLOUD COMPUTING

KISI-KISI CLOUD COMPUTING

10th Grade - University

45 Qs

QUIZ 3 - Data Design and Database Management

QUIZ 3 - Data Design and Database Management

University

40 Qs

Final Test preparation and recap

Final Test preparation and recap

University

40 Qs

Administrative Domains Quiz

Administrative Domains Quiz

University

45 Qs

UTS Pemrograman Mobile

UTS Pemrograman Mobile

University

50 Qs

Encryption/Decryption

Encryption/Decryption

University

40 Qs

TechJar Round 1

TechJar Round 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Mihir Thakkar

Used 9+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In machine learning, what does the term “overfitting” signify?

The model trains too quickly without accuracy

The model memorizes training data but performs poorly on new data

The model ignores anomalies in the dataset

The model is unable to recognize complex patterns

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which database type is characterized by its use of collections instead of tables?

Relational Database

Hierarchical Database

NoSQL Database

Object-Oriented Database

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The Turing Test, introduced by Alan Turing, is designed to evaluate what?

Computational efficiency

Artificial intelligence’s ability to mimic human behavior

Security strength of cryptographic systems

Accuracy of numerical algorithms

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In computer networking, the Domain Name System (DNS) primarily performs which function?

Encrypts network traffic

Maps domain names to IP addresses

Provides firewall protection

Allocates bandwidth among devices

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In cybersecurity, what does the term “zero-day vulnerability” refer to?

A virus that deletes files immediately upon infection

A flaw exploited before the vendor is aware of it

An attack that targets outdated hardware

A denial-of-service attack on launch day

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The CAP Theorem in distributed databases highlights the trade-off among which three properties?

Capacity, Accuracy, Performance

Consistency, Availability, Partition tolerance

Connectivity, Authentication, Privacy

Caching, Accessibility, Protocols

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which algorithm is primarily used for finding the shortest path in a graph?

Quick Sort

Dijkstra’s Algorithms

BFS only

Merge Sort

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?