Q. Which of the following headers is used to specify the type of content being sent in an HTTP response?
A.
Content-Length
B.
Content-Type
C.
User-Agent
D.
Accept
Show solution
Solution
The Content-Type header is used to specify the media type of the resource being sent in an HTTP response.
Correct Answer:
B
— Content-Type
Learn More →
Q. Which of the following industries commonly uses Support Vector Machines for predictive modeling?
A.
Healthcare
B.
Manufacturing
C.
Retail
D.
All of the above
Show solution
Solution
Support Vector Machines are utilized across various industries, including healthcare, manufacturing, and retail, for predictive modeling.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following IP address ranges is designated for private use in Class B?
A.
10.0.0.0 to 10.255.255.255
B.
172.16.0.0 to 172.31.255.255
C.
192.168.0.0 to 192.168.255.255
D.
169.254.0.0 to 169.254.255.255
Show solution
Solution
The IP address range 172.16.0.0 to 172.31.255.255 is designated for private use in Class B networks.
Correct Answer:
B
— 172.16.0.0 to 172.31.255.255
Learn More →
Q. Which of the following IP address ranges is designated for private use?
A.
192.168.0.0 - 192.168.255.255
B.
172.16.0.0 - 172.31.255.255
C.
10.0.0.0 - 10.255.255.255
D.
All of the above
Show solution
Solution
All the listed IP address ranges are designated for private use according to RFC 1918.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following IP address ranges is reserved for private networks?
A.
192.168.0.0 - 192.168.255.255
B.
10.0.0.0 - 10.255.255.255
C.
172.16.0.0 - 172.31.255.255
D.
All of the above
Show solution
Solution
All the listed ranges are designated for private networks as per RFC 1918.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following IP addresses is a private IP address?
A.
192.168.1.1
B.
172.16.0.1
C.
10.0.0.1
D.
All of the above
Show solution
Solution
All listed IP addresses are private IP addresses as defined by RFC 1918.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following IP addresses is a valid host address in the subnet 10.0.0.0/8?
A.
10.0.0.0
B.
10.255.255.255
C.
10.0.1.1
D.
10.0.0.255
Show solution
Solution
In the subnet 10.0.0.0/8, the valid host addresses range from 10.0.0.1 to 10.255.255.254. Therefore, 10.0.1.1 is a valid host address.
Correct Answer:
C
— 10.0.1.1
Learn More →
Q. Which of the following IP addresses is a valid host address in the subnet 172.16.0.0/20?
A.
172.16.0.0
B.
172.16.15.255
C.
172.16.0.1
D.
172.16.16.1
Show solution
Solution
The valid host addresses in the subnet 172.16.0.0/20 range from 172.16.0.1 to 172.16.15.254, making 172.16.0.1 a valid host address.
Correct Answer:
C
— 172.16.0.1
Learn More →
Q. Which of the following IP addresses is a valid private IP address?
A.
192.168.1.1
B.
172.16.0.1
C.
10.0.0.1
D.
All of the above
Show solution
Solution
All listed IP addresses are valid private IP addresses as defined by RFC 1918.
Correct Answer:
D
— All of the above
Learn More →
Q. Which of the following is a base case in a recursive function?
A.
The case that leads to infinite recursion
B.
The case that stops the recursion
C.
The case that calls the function again
D.
The case that doubles the input size
Show solution
Solution
A base case is the condition under which the recursion stops, preventing infinite recursion.
Correct Answer:
B
— The case that stops the recursion
Learn More →
Q. Which of the following is a benefit of using binary trees in data storage?
A.
Faster access times
B.
Lower memory usage
C.
Simpler data structures
D.
Easier data encryption
Show solution
Solution
Binary trees provide faster access times for searching and retrieving data compared to linear data structures.
Correct Answer:
A
— Faster access times
Learn More →
Q. Which of the following is a benefit of using ensemble methods in model selection?
A.
They always perform better than single models
B.
They reduce the variance of predictions
C.
They require less computational power
D.
They simplify the model interpretation
Show solution
Solution
Ensemble methods combine multiple models to reduce variance and improve prediction accuracy, often leading to better performance than individual models.
Correct Answer:
B
— They reduce the variance of predictions
Learn More →
Q. Which of the following is a benefit of using intermediate code in a compiler?
A.
It eliminates the need for parsing
B.
It allows for easier debugging of the source code
C.
It enables code generation for multiple target architectures
D.
It simplifies lexical analysis
Show solution
Solution
Using intermediate code allows a compiler to generate code for multiple target architectures from the same intermediate representation, enhancing portability.
Correct Answer:
C
— It enables code generation for multiple target architectures
Learn More →
Q. Which of the following is a benefit of using Random Forests in classification tasks?
A.
They are always faster than Decision Trees
B.
They provide feature importance scores
C.
They require less data preprocessing
D.
They are easier to visualize
Show solution
Solution
Random Forests can provide insights into feature importance, helping to understand which features are most influential.
Correct Answer:
B
— They provide feature importance scores
Learn More →
Q. Which of the following is a benefit of using Random Forests in financial applications?
A.
Higher interpretability than Decision Trees
B.
Ability to handle large datasets with high dimensionality
C.
Faster training times
D.
Less computational power required
Show solution
Solution
Random Forests can handle large datasets with many features, making them suitable for financial applications.
Correct Answer:
B
— Ability to handle large datasets with high dimensionality
Learn More →
Q. Which of the following is a challenge in MLOps?
A.
Data privacy and security
B.
Lack of data
C.
Overfitting models
D.
High computational cost
Show solution
Solution
Data privacy and security is a significant challenge in MLOps, especially when deploying models that handle sensitive information.
Correct Answer:
A
— Data privacy and security
Learn More →
Q. Which of the following is a challenge when applying neural networks in real-world applications?
A.
High accuracy
B.
Overfitting
C.
Low computational requirements
D.
Simplicity of models
Show solution
Solution
Overfitting is a common challenge, where a neural network learns the training data too well and performs poorly on unseen data.
Correct Answer:
B
— Overfitting
Learn More →
Q. Which of the following is a characteristic of a binary search tree?
A.
All nodes have two children
B.
Left child < Parent < Right child
C.
Nodes are stored in an array
D.
It is a type of linked list
Show solution
Solution
In a binary search tree, for any given node, the left child is less than the parent and the right child is greater.
Correct Answer:
B
— Left child < Parent < Right child
Learn More →
Q. Which of the following is a characteristic of a binary tree?
A.
Each node has at most two children
B.
Nodes are stored in a linear fashion
C.
All nodes have the same number of children
D.
It is always balanced
Show solution
Solution
In a binary tree, each node has at most two children, which is a defining characteristic.
Correct Answer:
A
— Each node has at most two children
Learn More →
Q. Which of the following is a characteristic of a circular queue?
A.
It can grow dynamically
B.
It uses a fixed size array
C.
It allows for efficient memory usage
D.
Both B and C
Show solution
Solution
A circular queue uses a fixed size array and allows for efficient memory usage by reusing empty spaces created by dequeued elements.
Correct Answer:
D
— Both B and C
Learn More →
Q. Which of the following is a characteristic of a Class C IP address?
A.
Supports up to 16 million hosts
B.
Supports up to 254 hosts
C.
Supports up to 65,534 hosts
D.
Reserved for multicast
Show solution
Solution
Class C IP addresses support up to 254 hosts, making them suitable for small networks.
Correct Answer:
B
— Supports up to 254 hosts
Learn More →
Q. Which of the following is a characteristic of a complete binary tree?
A.
All levels are fully filled except possibly the last
B.
All nodes have two children
C.
It is always balanced
D.
It has a maximum height of log n
Show solution
Solution
A complete binary tree is defined as one where all levels are fully filled except possibly the last, which is filled from left to right.
Correct Answer:
A
— All levels are fully filled except possibly the last
Learn More →
Q. Which of the following is a characteristic of a doubly linked list?
A.
Each node has one pointer
B.
Nodes can be traversed in both directions
C.
It uses less memory than a singly linked list
D.
It cannot be used to implement a stack
Show solution
Solution
A doubly linked list allows traversal in both directions because each node contains two pointers, one to the next node and one to the previous node.
Correct Answer:
B
— Nodes can be traversed in both directions
Learn More →
Q. Which of the following is a characteristic of a Layer 2 switch?
A.
Operates at the Network Layer
B.
Uses IP addresses to forward frames
C.
Operates using MAC addresses
D.
Can connect different networks
Show solution
Solution
A Layer 2 switch operates using MAC addresses to forward frames within the same network.
Correct Answer:
C
— Operates using MAC addresses
Learn More →
Q. Which of the following is a characteristic of a Layer 3 switch?
A.
Operates only at the Data Link Layer
B.
Can perform routing functions
C.
Does not support VLANs
D.
Is slower than a traditional switch
Show solution
Solution
A Layer 3 switch can perform routing functions in addition to switching, allowing it to route traffic between different VLANs.
Correct Answer:
B
— Can perform routing functions
Learn More →
Q. Which of the following is a characteristic of a linked list?
A.
Fixed size
B.
Dynamic size
C.
Random access
D.
Contiguous memory allocation
Show solution
Solution
A linked list can grow and shrink in size dynamically, unlike arrays which have a fixed size.
Correct Answer:
B
— Dynamic size
Learn More →
Q. Which of the following is a characteristic of a queue?
A.
Elements are added at the front
B.
Elements are removed from the front
C.
Elements are accessed randomly
D.
Elements are sorted automatically
Show solution
Solution
In a queue, elements are added at the back and removed from the front, following the FIFO (First In First Out) principle.
Correct Answer:
B
— Elements are removed from the front
Learn More →
Q. Which of the following is a characteristic of a Red-Black tree?
A.
Every node is red
B.
Every path from root to leaf has the same number of black nodes
C.
All leaves are red
D.
The root must be red
Show solution
Solution
In a Red-Black tree, every path from the root to the leaves must have the same number of black nodes, ensuring balanced height.
Correct Answer:
B
— Every path from root to leaf has the same number of black nodes
Learn More →
Q. Which of the following is a characteristic of a runtime environment?
A.
It is only used during compilation
B.
It manages memory allocation and deallocation
C.
It translates high-level code to machine code
D.
It performs syntax analysis
Show solution
Solution
A runtime environment manages memory allocation and deallocation during the execution of a program.
Correct Answer:
B
— It manages memory allocation and deallocation
Learn More →
Q. Which of the following is a characteristic of a stack data structure?
A.
FIFO
B.
LIFO
C.
Sorted order
D.
Dynamic size
Show solution
Solution
A stack is characterized by the Last In First Out (LIFO) principle, where the last element added is the first one to be removed.
Correct Answer:
B
— LIFO
Learn More →
Showing 2491 to 2520 of 3237 (108 Pages)