McqMate
1. |
Data that has been generated with no connection to the Internet, and then registered into a system, which may be accessed via the Internet later called |
A. | offline originated data |
B. | online originated data |
C. | both a & b |
D. | none of the above |
Answer» A. offline originated data |
2. |
What is one of the big differences between traditional media and social media? |
A. | participatory production. |
B. | social media reaches only a few people at a time. |
C. | the management structure of the companies. |
D. | traditional media offers no way for audiences to communicate with media producers. |
Answer» A. participatory production. |
3. |
Estimated metrics include …………. which provide the number of times a user has potentially seen a certain piece of content or advertising. |
A. | views |
B. | impressions |
C. | reach |
D. | all of the above |
Answer» D. all of the above |
4. |
____________is a very fragile and unstable way of gathering data, because when anything changes on the web site, the source code is changed, |
A. | data mining |
B. | web crawling/scraping |
C. | both a & b |
D. | none of the above |
Answer» B. web crawling/scraping |
5. |
It allows a programmer to see a clear structure of the information that is stored in the application Called |
A. | api |
B. | program |
C. | data |
D. | none of the above |
Answer» A. api |
6. |
In terms of Facebook's ranking algorithm, what does "weight" refer to? |
A. | the amount of comments, likes, etc. a content post receives |
B. | how often a profile produces content |
C. | how many highly ranked content posts a profile has in a given week |
D. | how many followers/friends a company has |
Answer» A. the amount of comments, likes, etc. a content post receives |
7. |
What is the name of Facebook's Analytics tool? |
A. | facebook analytics |
B. | edge rank |
C. | page rank |
D. | insights |
Answer» D. insights |
8. |
What is CTR? |
A. | cost through rate |
B. | click table rate |
C. | click through rate |
D. | clicks through rate |
Answer» C. click through rate |
9. |
Which of the following clustering requires merging approach? |
A. | Partitional |
B. | Hierarchical |
C. | Naive Bayes |
D. | None of the mentioned |
Answer» B. Hierarchical |
10. |
Which of the following function is used for k-means clustering? |
A. | k-means |
B. | k-mean |
C. | heatmap |
D. | None of the mentioned |
Answer» A. k-means |
11. |
Hierarchical clustering should be primarily used for exploration. |
A. | true |
B. | false |
Answer» A. true |
12. |
Following are applications of text mining |
A. | Classification |
B. | clustering |
C. | keyword search |
D. | All Above |
Answer» D. All Above |
13. |
Point out the wrong statement. |
A. | k-means clustering is a method of vector quantization |
B. | k-means clustering aims to partition n observations into k clusters |
C. | k-nearest neighbor is same as k-means |
D. | none of the mentioned |
Answer» C. k-nearest neighbor is same as k-means |
14. |
In ___________problems nodes in Social n/w associated with labels |
A. | keyword search |
B. | clustering |
C. | Classification |
D. | mining |
Answer» C. Classification |
15. |
Most well-known keyword search algorithm for relational data is _______ |
A. | DISCOVER |
B. | DBX-plorer |
C. | None of the above |
D. | Both A & B |
Answer» D. Both A & B |
16. |
_____________applies authority-based ranking to keyword search on labeled graphs, |
A. | ObjectRank Algorithm |
B. | Indexbased map |
C. | nodekeyword map |
D. | DISCOVER |
Answer» A. ObjectRank Algorithm |
17. |
Which is not classification algorithm? |
A. | Naive Bayes |
B. | TFIDF |
C. | Probabilistic Indexing |
D. | Indexbased |
Answer» D. Indexbased |
18. |
Data mining is also known as___________ |
A. | FDD |
B. | KDD |
C. | MDD |
D. | NDD |
Answer» B. KDD |
19. |
Clustering is a common____________ data mining technique |
A. | Supervised |
B. | Unsupervised |
C. | both A & B |
D. | None |
Answer» B. Unsupervised |
20. |
___________ is an essential process where intelligent methods are applied to extract data patterns. |
A. | Data warehousing |
B. | Data mining |
C. | Text mining |
D. | Data selection |
Answer» B. Data mining |
21. |
Data ................... is the process of finding a model that describes and distinguishes data classes or concepts. |
A. | Characterization |
B. | Mining |
C. | clustering |
D. | Classification |
Answer» D. Classification |
22. |
_____________ is the application of data mining techniques to discover patterns from the Web |
A. | Text Mining |
B. | Multimedia Mining |
C. | Web Mining |
D. | Link Mining |
Answer» B. Multimedia Mining |
23. |
_______________refers to the process of deriving high-quality information from text. |
A. | Text Mining. |
B. | Image Mining |
C. | Database Mining |
D. | Multimedia Mining. |
Answer» A. Text Mining. |
24. |
What are the different measures of centrality? |
A. | Degree centrality |
B. | Closeness centrality |
C. | Eigen vector centrality |
D. | All of the above |
Answer» D. All of the above |
25. |
Degree centrality is defined as |
A. | The ratio of number of neighbors of the vertex with total number of possible neighbors |
B. | Central nodes of all the given nodes in networks |
C. | Total number of nodes in the given network |
D. | None of the above |
Answer» A. The ratio of number of neighbors of the vertex with total number of possible neighbors |
26. |
Eigenvector centrality is an |
A. | An Important nodes has usually important friends |
B. | Centrality of the given central nodes |
C. | None of the above |
D. | All of the above |
Answer» A. An Important nodes has usually important friends |
27. |
Katz centrality can be |
A. | Used to compute centrality in directed networks |
B. | Suitable in the analysis of directed acyclic graphs |
C. | Also used in estimating relative status of actor |
D. | All of the above |
Answer» D. All of the above |
28. |
Page rank is the method |
A. | For rating the importance of web pages objectively and mechanically. |
B. | Used in google search engine |
C. | A simple way to count the number of times a web page is citated |
D. | All of the above |
Answer» D. All of the above |
29. |
The most popular social networking website twitter makes use of HITS algorithm in suggesting user account to follow |
A. | true |
B. | false |
Answer» A. true |
30. |
PageRank is based on the ‘random suffer’ idea and the web is seen as a markov chain |
A. | true |
B. | false |
Answer» A. true |
31. |
vertices that have a high probability of occurring on a randomly chosen shortest path between two nodes are said to have high |
A. | Centrality |
B. | Betweeness centrality |
C. | Eigenvector centrality |
D. | None of the above |
Answer» B. Betweeness centrality |
32. |
The number of actors outside the group that are connected to the member of that group is |
A. | Eigenvector centrality |
B. | Betweeness centrality |
C. | Degree centrality of the group |
D. | None of the above |
Answer» C. Degree centrality of the group |
33. |
Transitivity is the tendency for friend of friends to be friend and enemy of enemy to be enemy |
A. | true |
B. | false |
Answer» A. true |
34. |
In any directed graph if all edges are reciprocal, can have maximum of |E|= |
A. | 1 |
B. | 0 |
C. | 2 |
D. | None of the above |
Answer» C. 2 |
35. |
Reciprocity can be computed using |
A. | Simple Matrix |
B. | Adjacency Matrix |
C. | Eigen Vector |
D. | None of the above |
Answer» B. Adjacency Matrix |
36. |
Social Status theory measures how inconsistent individuals are in assigning status to their neighbors. |
A. | true |
B. | false |
Answer» B. false |
37. |
A pair of nodes said to be structurally equivalent to the extent that |
A. | They occupy identical locations in a network |
B. | They are connected to exactly the same others |
C. | They have the identical relations to all outside actors. |
D. | All of the above |
Answer» D. All of the above |
38. |
In case the documents do not share any attributes or words, the cosine similarity results in………. |
A. | High |
B. | Intermediate |
C. | 0 |
D. | All of the above |
Answer» C. 0 |
39. |
Which social network is considered the most popular for business to business marketing? |
A. | |
B. | Orkut |
C. | Ryze |
D. | |
Answer» D. LinkedIn |
40. |
The first step when marketing with social networks is to identify the goals and strategies. |
A. | true |
B. | false |
Answer» A. true |
41. |
What is the term adopted for updates by Twitter users? |
A. | Tweets |
B. | Twoots |
C. | Twinks |
D. | Post |
Answer» A. Tweets |
42. |
Web Crawler is also called as |
A. | Link Directory |
B. | Search Optimizer |
C. | Web Spider |
D. | Web Manager |
Answer» C. Web Spider |
43. |
The ‘Sociogram’ technique is used to study |
A. | Human Relations |
B. | Vocational Interest |
C. | Achievement |
D. | Professional |
Answer» A. Human Relations |
44. |
Can decision trees be used for performing clustering? |
A. | true |
B. | false |
Answer» A. true |
45. |
What is the minimum no. of variables/ features required to perform clustering? |
A. | 0 |
B. | 1 |
C. | 2 |
D. | 3 |
Answer» B. 1 |
46. |
For two runs of K-Mean clustering is it expected to get same clustering results? |
A. | Yes |
B. | No |
Answer» B. No |
47. |
Is it possible that Assignment of observations to clusters does not change between successive iterations in K-Means |
A. | Yes |
B. | No |
C. | Can’t say |
D. | None of these |
Answer» A. Yes |
48. |
Which of the following algorithm is most sensitive to outliers? |
A. | K-means |
B. | K-medians |
C. | K-modes |
D. | K-medoids |
Answer» A. K-means |
49. |
Which of the following are the high and low bounds for the existence of F-Score? |
A. | [0,1] |
B. | (0,1) |
C. | [-1,1] |
D. | None of the above |
Answer» A. [0,1] |
50. |
Which of the following method is used for finding optimal of cluster in K-Mean algorithm? |
A. | Elbow method |
B. | Manhattan method |
C. | All of the above |
D. | None of these |
Answer» A. Elbow method |
51. |
___________for a node is simply its degree. |
A. | Degree |
B. | Eigenvector |
C. | Katz |
D. | Closeness |
Answer» A. Degree |
52. |
__________defines how important a node is within a network. |
A. | Centrality |
B. | Degree |
C. | prominence |
D. | None of these |
Answer» A. Centrality |
53. |
______________ centrality takes its maximum value |
A. | Closeness |
B. | Betweenness |
C. | Group |
D. | None of these |
Answer» B. Betweenness |
54. |
__________algorithm will compute shortest paths from a single node to all other nodes. |
A. | Betweenness |
B. | Brandes’ |
C. | Dijkstra’s |
D. | None of these |
Answer» C. Dijkstra’s |
55. |
_____centrality is defined as the number of nodes from outside the group that are connected to group members. |
A. | Group degree |
B. | Closeness |
C. | Betweenness |
D. | None of these |
Answer» A. Group degree |
56. |
_______determines how links (edges) are formed in a social graph. |
A. | Transitivity |
B. | Reciprocity |
C. | Centrality |
D. | Linking behavior |
Answer» D. Linking behavior |
57. |
transitive behavior needs at least ________edges. |
A. | Three |
B. | two |
C. | one |
D. | four |
Answer» A. Three |
58. |
The________ analyzes transitivity in an undirected graph. |
A. | Reciprocity |
B. | clustering coefficient |
C. | Centrality |
D. | Closeness |
Answer» B. clustering coefficient |
59. |
________is a simplified version of transitivity |
A. | clustering coefficient |
B. | Reciprocity |
C. | Centrality |
D. | Transitivity |
Answer» B. Reciprocity |
60. |
__________considers closed loops of length 2 |
A. | Transitivity |
B. | Centrality |
C. | Reciprocity |
D. | None of these |
Answer» C. Reciprocity |
61. |
______ theory measures how consistent individuals are in assigning status to their neighbors. |
A. | Social status |
B. | clustering coefficient |
C. | Closeness |
D. | clustering coefficient |
Answer» A. Social status |
62. |
When using network information, the similarity between two nodes can be computed by measuring their ________ |
A. | structural equivalence |
B. | their regular equivalence. |
C. | both a and b |
D. | None of these |
Answer» C. both a and b |
63. |
To compute structural equivalence, we look at the________ shared by two nodes |
A. | nighborhood |
B. | adjcent |
C. | same |
D. | None of these |
Answer» A. nighborhood |
64. |
In directed graphs_____________variants of degree centrality. |
A. | prestige |
B. | gregariousness |
C. | both a and b |
D. | None of these |
Answer» C. both a and b |
65. |
__________defines a normalized version of Katz centrality. |
A. | PageRank centrality |
B. | eigenvector centrality |
C. | Betweenness centrality |
D. | None of these |
Answer» A. PageRank centrality |
66. |
________is the behavior individuals exhibit with respect to other individuals. |
A. | user-user behavior |
B. | User-Community Behavior |
C. | User-Entity Behavior |
D. | None of these |
Answer» A. user-user behavior |
67. |
_______represents the interactions users have with other users |
A. | Link data |
B. | content data |
C. | both |
D. | None of these |
Answer» A. Link data |
68. |
__________algorithms determine features that contribute the most to the prediction of the class attribute. |
A. | classification |
B. | Features selection |
C. | both |
D. | None of these |
Answer» B. Features selection |
69. |
In Behavior Analysis Methodology___________ step aims to find the relationship between features and behavior |
A. | An observable behavior |
B. | Features. |
C. | Feature-Behavior Association. |
D. | observable behavior |
Answer» C. Feature-Behavior Association. |
70. |
__________ Modeling allow for controlled experiments and simulations that can help study individuals in social media |
A. | An observable behavior |
B. | Individual Behavior Modeling |
C. | Feature-Behavior Association. |
D. | None of these |
Answer» B. Individual Behavior Modeling |
71. |
When a behavior di_x000B_uses in a network, one can use _______model |
A. | threshold models |
B. | Cascade Models |
C. | both |
D. | None of these |
Answer» A. threshold models |
72. |
_________ models are sender-centric. |
A. | threshold models |
B. | Cascade Models |
C. | both |
D. | None of these |
Answer» B. Cascade Models |
73. |
_________ models receiver-centric. |
A. | threshold models |
B. | Cascade Models |
C. | both |
D. | None of these |
Answer» A. threshold models |
74. |
__________ examples of individual behavior modeling. |
A. | Cascade Models |
B. | threshold models |
C. | None of these |
D. | both |
Answer» D. both |
75. |
_______measures can be used to calculate similarity |
A. | Katz measure |
B. | Rooted PageRank. |
C. | Hitting and Commute Time |
D. | all of the above |
Answer» D. all of the above |
76. |
_______refers to a population of individuals behaving in a similar way. |
A. | user-user behavior |
B. | Collective behavior |
C. | User-Community Behavior |
D. | None of these |
Answer» B. Collective behavior |
77. |
The user migration behavior is an example of collective behavior. |
A. | Collective behavior |
B. | user-user behavior |
C. | User-Community Behavior |
D. | None of these |
Answer» A. Collective behavior |
78. |
which is the type of migration that take place in social media sites ? |
A. | site migration |
B. | attention migration |
C. | both |
D. | None of these |
Answer» C. both |
79. |
Which is the general features can be considered for user migration ? |
A. | user activity on one site, |
B. | user network size |
C. | user rank. |
D. | all of the above |
Answer» D. all of the above |
80. |
To analyze __________, there is a four-step procedure, |
A. | individual behavior |
B. | An observable behavior |
C. | Feature-Behavior Association. |
D. | None of these |
Answer» A. individual behavior |
81. |
_____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas. |
A. | |
B. | |
C. | |
D. | None of the above |
Answer» A. Twitter |
82. |
_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist. |
A. | |
B. | |
C. | |
D. | |
Answer» C. Twitter |
83. |
Which of the following is the most viral section of the internet? |
A. | Chat Messenger |
B. | Social networking sites |
C. | Tutorial sites |
D. | Chat-rooms |
Answer» B. Social networking sites |
84. |
Identify the example of Nominal attribute |
A. | Temperature |
B. | Salary |
C. | Mass |
D. | Gender |
Answer» D. Gender |
85. |
Which of the following is not an appropriate measure for securing social networking accounts? |
A. | Strong passwords |
B. | Link your account with a phone number |
C. | Never write your password anywhere |
D. | Always maintain a soft copy of all your passwords in your PC |
Answer» D. Always maintain a soft copy of all your passwords in your PC |
86. |
Which of the following is not a data pre-processing methods |
A. | Data Visualization |
B. | Data Discretization |
C. | Data Cleaning |
D. | Data Reduction |
Answer» A. Data Visualization |
87. |
________________ is a popular tool to block social-media websites to track your browsing activities. |
A. | Fader |
B. | Blur |
C. | Social-Media Blocker |
D. | Ad-blocker |
Answer» B. Blur |
88. |
Keeping the password by the name of your pet is a good choice. |
A. | true |
B. | false |
Answer» B. false |
89. |
Increase your security for social media account by always ____________ as you step away from the system. |
A. | signing in |
B. | logging out |
C. | signing up |
D. | logging in |
Answer» B. logging out |
90. |
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security. |
A. | true |
B. | false |
Answer» A. true |
91. |
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media. |
A. | true |
B. | false |
Answer» A. true |
92. |
Many social media sites and services provide _______________ for legitimate account verification. |
A. | Retina scanning |
B. | Fingerprint scanning |
C. | CAPTCHA |
D. | 2-step verification |
Answer» D. 2-step verification |
93. |
Which of the following activities is NOT a data mining task? |
A. | Predicting the future stock price of a company using historical records |
B. | Monitoring and predicting failures in a hydropower plant |
C. | Extracting the frequencies of a sound wave |
D. | Monitoring the heart rate of a patient for abnormalities |
Answer» C. Extracting the frequencies of a sound wave |
94. |
____________ type of sites are known as friend-of-a-friend site. |
A. | Chat Messenger |
B. | Social networking sites |
C. | Tutorial sites |
D. | Chat-rooms |
Answer» B. Social networking sites |
95. |
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation. |
A. | true |
B. | false |
Answer» A. true |
96. |
Identify the example of sequence data |
A. | weather forecast |
B. | data matrix |
C. | market basket data |
D. | genomic data |
Answer» D. genomic data |
97. |
Incorrect or invalid data is known as ______ |
A. | Missing data |
B. | Outlier |
C. | Changing data |
D. | Noisy data |
Answer» D. Noisy data |
98. |
The important characteristics of structured data are |
A. | Sparsity, Resolution, Distribution, Tuples |
B. | Sparsity, Centroid, Distribution , Dimensionality |
C. | Resolution, Distribution, Dimensionality ,Objects |
D. | Dimensionality, Sparsity, Resolution, Distribution |
Answer» D. Dimensionality, Sparsity, Resolution, Distribution |
99. |
The problem of finding hidden structure in unlabeled data is called |
A. | Supervised learning |
B. | Unsupervised learning |
C. | Reinforcement learning |
Answer» B. Unsupervised learning |
100. |
Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.? |
A. | Cluster Analysis |
B. | Regression |
C. | Classification |
D. | Sequential pattern discovery |
Answer» B. Regression |
Done Reading?