SUMIT SINHA

An Education Blogger

Full width home advertisement

Post Page Advertisement [Top]


Answers:-

 Q.Which character is used within a search engine to gather data efficiently by placing the character before and after the name of a particular person?
A. quotation mark (")

 Q.Which two types of institutions do malicious web pages often look like? (Choose two.)
A. bank
    financial

Q.True or False? Comma-separated values (CSV), JSON, and XML are all tools that can be used to manipulate structured data.
A. true

Q.What is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?
A. Arduino

Q.Which type of network consists of wired computers in a college classroom?
A. LAN

Q. What is the largest network in existence?
A. the internet

Q.What are three benefits of cloud computing? (Choose three.)
A. It eliminates or reduces the need for onsite IT equipment, maintenance, and management.
    It enables access to organizational data anywhere and at any time.
    It streamlines the IT operations of an organization by subscribing only to needed services.

Q.What are the two areas of physical security within a data center?
A. outside
     inside

Q.What is the core component of Intent-Based Networking?
A. artificial intelligence

Q. Match the logic structure to the function.
A. allow the code to make decisions - if-then
    execute a block of code while a condition is true - while
    repeat the execution of a specific block of code for a specific number of times - for

Q.What are two characteristics of the Python programming language? (Choose two.)
A. It runs without conversion to machine-language.
     The code is easy to read.

Q.Which two data types would be classified as personally identifiable information (PII)? (Choose two.)
A. Facebook photographs
     vehicle identification number

Q.Which two skills help with IoT prototyping? (Choose two.)
A. programming
     design

Q.What are two requirements to connect a smart device to a home wireless network? (Choose two.)
A. IP addressing
     SSID

Q.What is a key feature of the assurance element of the intent-based networking model?
A. end-to-end verification of network-wide behavior

Q.A company requires using a secure encrypted internet connection when connecting to the corporate network from outside the company. Which technology should be used when employees travel and use a laptop?
A. VPN

Q.Which security best practice involves defining company rules, job duties, and expectations?
A. developing a security policy

Q.What are three attributes of data that would indicate that it may be big data? (Choose three.)
A. variety
    volume
    velocity

Q.Which technology has the intelligence that is demonstrated by machines in a way that mimics human cognitive functions?
A. AI

Q.What is the purpose of data analytics?
A. to gain new insights from data

Q.Mined data can be visualized through the use of charts. Select two criteria that can be used to determine the best chart selection. (Choose two.)

A. number of variables to be shown
    items requiring comparison

Q.What device provides auto discovery services for smart devices that are connected to the network?
A. home gateway

Q.Which type of network is the connection between a Bluetooth headset and a vehicle?
A. PAN

Q.Change will have to occur in the corporate network in order to prepare for the Internet of Things. Which type of testing would a company do to demonstrate the benefits of networking a new "thing" that was not on the network before?
A. prototyping

Q.What are two features of automation? (Choose two.)
A. a process that eventually eliminates the need for human intervention
     a process that is self-driven

Q.What are two things that all digital devices need in order to work? (Choose two.)
A. computer program
     data

Q.What is used to provide IoT sensors with access to the network?
A. a microcontroller

Q.What is the purpose of Packet Tracer?
A. to simulate and visualize one or more networks

Q.Which statement describes global variables in programming languages?
A. They can be used within any function of a program.

Q.How is data that has been collected through sources such as web pages, audio, or tweets categorized?
A. unstructured data


Q.Match the term with the definition. (Not all options are used.)
A. Hadoop - a comprehensive ecosystem...
    distributed processing - breaks large volumes of data...
    fog computing - an architecture that utilizes...
    cloud services - a collection of data centers...

Q. What limits the types of different objects that can become intelligent sensors on the Internet of Things?
A. our imagination

Q.Which technology is a subset of AI that uses statistical techniques to enable computers to "learn" from collected data?
A. ML

Q.True or False? With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.
A. true

Q.Which technology is used as a visual programming tool to create a program by connecting colored blocks?
A. Blockly


1 comment:

  1. Thanks for suggesting good list. I appreciate your work this is really helpful for everyone. Get more information at Commercial Logistics. Keep posting such useful information.

    ReplyDelete

Bottom Ad [Post Page]

Copyright 2020 | Sumit Sinha