Computer Science & IT

Download Q&A
Q. Which of the following is a key advantage of using Random Forests?
  • A. They are easier to interpret than Decision Trees
  • B. They can handle missing values well
  • C. They require less computational power
  • D. They always outperform Decision Trees
Q. Which of the following is a key advantage of using Support Vector Machines?
  • A. They require large amounts of data
  • B. They can handle non-linear data using kernels
  • C. They are only suitable for binary classification
  • D. They are easy to interpret
Q. Which of the following is a key advantage of using SVM?
  • A. It can only handle linear data
  • B. It is less effective with high-dimensional data
  • C. It is effective in high-dimensional spaces
  • D. It requires a large amount of training data
Q. Which of the following is a key advantage of using SVMs?
  • A. They require large amounts of data
  • B. They can handle non-linear boundaries
  • C. They are only suitable for binary classification
  • D. They are less interpretable than decision trees
Q. Which of the following is a key application of AVL trees?
  • A. Implementing a priority queue
  • B. Database indexing
  • C. Graph traversal
  • D. Sorting algorithms
Q. Which of the following is a key characteristic of binary search?
  • A. It can find the first occurrence of an element
  • B. It can find the last occurrence of an element
  • C. It requires a sorted array
  • D. It can work on any data structure
Q. Which of the following is a key consideration when deploying a model for real-time predictions?
  • A. Model complexity
  • B. Data quality
  • C. Latency requirements
  • D. Training data size
Q. Which of the following is a key feature of SVMs?
  • A. They can only handle linear data
  • B. They use kernel functions to handle non-linear data
  • C. They require a large amount of labeled data
  • D. They are not suitable for multi-class classification
Q. Which of the following is a key requirement for implementing binary search?
  • A. The array must be sorted
  • B. The array must be of even length
  • C. The array must contain integers only
  • D. The array must be in ascending order
Q. Which of the following is a key step in Dijkstra's algorithm?
  • A. Updating the distance of adjacent vertices
  • B. Sorting the vertices
  • C. Removing the vertex from the graph
  • D. Adding edges to the graph
Q. Which of the following is a key step in the K-means algorithm?
  • A. Calculating the mean of all data points
  • B. Assigning data points to the nearest cluster centroid
  • C. Performing hierarchical clustering
  • D. Normalizing the data
Q. Which of the following is a limitation of binary search?
  • A. It can only be used on sorted data
  • B. It is slower than linear search
  • C. It requires more memory
  • D. It cannot find duplicates
Q. Which of the following is a limitation of Dijkstra's algorithm?
  • A. It cannot handle negative weight edges
  • B. It is not efficient for dense graphs
  • C. It cannot find paths in directed graphs
  • D. It requires a complete graph
Q. Which of the following is a limitation of hierarchical clustering?
  • A. It can only handle small datasets
  • B. It requires prior knowledge of the number of clusters
  • C. It is not sensitive to noise
  • D. It cannot produce a dendrogram
Q. Which of the following is a limitation of K-Means clustering?
  • A. It can handle large datasets
  • B. It is sensitive to outliers
  • C. It can find non-convex clusters
  • D. It requires no prior knowledge of data
Q. Which of the following is a limitation of linear regression?
  • A. It can only be used for binary outcomes
  • B. It assumes a linear relationship between variables
  • C. It requires a large amount of data
  • D. It is not interpretable
Q. Which of the following is a limitation of RNNs?
  • A. They can only process fixed-length sequences.
  • B. They are not suitable for time series data.
  • C. They struggle with long-range dependencies.
  • D. They require more data than feedforward networks.
Q. Which of the following is a limitation of the K-means algorithm?
  • A. It can handle non-spherical clusters
  • B. It requires the number of clusters to be specified in advance
  • C. It is computationally efficient for large datasets
  • D. It can be used for both supervised and unsupervised learning
Q. Which of the following is a method for feature scaling?
  • A. One-hot encoding
  • B. Min-Max scaling
  • C. Label encoding
  • D. Feature extraction
Q. Which of the following is a method for feature selection?
  • A. K-means clustering
  • B. Recursive Feature Elimination
  • C. Gradient Descent
  • D. Support Vector Machines
Q. Which of the following is a method for handling missing data?
  • A. Normalization
  • B. Imputation
  • C. Regularization
  • D. Feature Scaling
Q. Which of the following is a method to visualize clustering results?
  • A. Confusion matrix
  • B. ROC curve
  • C. Dendrogram
  • D. Precision-recall curve
Q. Which of the following is a potential issue when using linear regression?
  • A. Multicollinearity among predictors
  • B. High variance in the dependent variable
  • C. Low sample size
  • D. All of the above
Q. Which of the following is a potential problem when using linear regression?
  • A. Overfitting
  • B. Multicollinearity
  • C. Underfitting
  • D. All of the above
Q. Which of the following is a prerequisite for applying binary search?
  • A. The array must be sorted
  • B. The array must be of even length
  • C. The array must contain integers only
  • D. The array must be in ascending order
Q. Which of the following is a prerequisite for implementing binary search?
  • A. The array must be sorted
  • B. The array must be dynamic
  • C. The array must be of even length
  • D. The array must contain integers only
Q. Which of the following is a prerequisite for using binary search?
  • A. The array must be sorted
  • B. The array must be unsorted
  • C. The array must contain unique elements
  • D. The array must be of fixed size
Q. Which of the following is a private IP address?
  • A. 192.168.1.1
  • B. 172.16.0.1
  • C. 10.0.0.1
  • D. All of the above
Q. Which of the following is a property of a Red-Black tree?
  • A. Every node is red
  • B. Every path from root to leaf has the same number of black nodes
  • C. All leaves are red
  • D. The root must be red
Q. Which of the following is a property of Red-Black Trees?
  • A. Every node is either red or black.
  • B. The root must be black.
  • C. All leaves are black.
  • D. All of the above.
Showing 2641 to 2670 of 3237 (108 Pages)
Soulshift Feedback ×

On a scale of 0–10, how likely are you to recommend The Soulshift Academy?

Not likely Very likely