131
96.7k

300+ Social Media Analytics (SMA) Solved MCQs

These multiple-choice questions (MCQs) are designed to enhance your knowledge and understanding in the following areas: Information Technology Engineering (IT) .

51.

___________for a node is simply its degree.

A. Degree
B. Eigenvector
C. Katz
D. Closeness
Answer» A. Degree
52.

__________defines how important a node is within a network.

A. Centrality
B. Degree
C. prominence
D. None of these
Answer» A. Centrality
53.

______________ centrality takes its maximum value

A. Closeness
B. Betweenness
C. Group
D. None of these
Answer» B. Betweenness
54.

__________algorithm will compute shortest paths from a single node to all other nodes.

A. Betweenness
B. Brandes’
C. Dijkstra’s
D. None of these
Answer» C. Dijkstra’s
55.

_____centrality is defined as the number of nodes from outside the group that are connected to group members.

A. Group degree
B. Closeness
C. Betweenness
D. None of these
Answer» A. Group degree
56.

_______determines how links (edges) are formed in a social graph.

A. Transitivity
B. Reciprocity
C. Centrality
D. Linking behavior
Answer» D. Linking behavior
57.

transitive behavior needs at least ________edges.

A. Three
B. two
C. one
D. four
Answer» A. Three
58.

The________ analyzes transitivity in an undirected graph.

A. Reciprocity
B. clustering coefficient
C. Centrality
D. Closeness
Answer» B. clustering coefficient
59.

________is a simplified version of transitivity

A. clustering coefficient
B. Reciprocity
C. Centrality
D. Transitivity
Answer» B. Reciprocity
60.

__________considers closed loops of length 2

A. Transitivity
B. Centrality
C. Reciprocity
D. None of these
Answer» C. Reciprocity
61.

______ theory measures how consistent individuals are in assigning status to their neighbors.

A. Social status
B. clustering coefficient
C. Closeness
D. clustering coefficient
Answer» A. Social status
62.

When using network information, the similarity between two nodes can be computed by measuring their ________

A. structural equivalence
B. their regular equivalence.
C. both a and b
D. None of these
Answer» C. both a and b
63.

To compute structural equivalence, we look at the________ shared by two nodes

A. nighborhood
B. adjcent
C. same
D. None of these
Answer» A. nighborhood
64.

In directed graphs_____________variants of degree centrality.

A. prestige
B. gregariousness
C. both a and b
D. None of these
Answer» C. both a and b
65.

__________defines a normalized version of Katz centrality.

A. PageRank centrality
B. eigenvector centrality
C. Betweenness centrality
D. None of these
Answer» A. PageRank centrality
66.

________is the behavior individuals exhibit with respect to other individuals.

A. user-user behavior
B. User-Community Behavior
C. User-Entity Behavior
D. None of these
Answer» A. user-user behavior
67.

_______represents the interactions users have with other users

A. Link data
B. content data
C. both
D. None of these
Answer» A. Link data
68.

__________algorithms determine features that contribute the most to the prediction of the class attribute.

A. classification
B. Features selection
C. both
D. None of these
Answer» B. Features selection
69.

In Behavior Analysis Methodology___________ step aims to find the relationship between features and behavior

A. An observable behavior
B. Features.
C. Feature-Behavior Association.
D. observable behavior
Answer» C. Feature-Behavior Association.
70.

__________ Modeling allow for controlled experiments and simulations that can help study individuals in social media

A. An observable behavior
B. Individual Behavior Modeling
C. Feature-Behavior Association.
D. None of these
Answer» B. Individual Behavior Modeling
71.

When a behavior di_x000B_uses in a network, one can use _______model

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» A. threshold models
72.

_________ models are sender-centric.

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» B. Cascade Models
73.

_________ models receiver-centric.

A. threshold models
B. Cascade Models
C. both
D. None of these
Answer» A. threshold models
74.

__________ examples of individual behavior modeling.

A. Cascade Models
B. threshold models
C. None of these
D. both
Answer» D. both
75.

_______measures can be used to calculate similarity

A. Katz measure
B. Rooted PageRank.
C. Hitting and Commute Time
D. all of the above
Answer» D. all of the above
76.

_______refers to a population of individuals behaving in a similar way.

A. user-user behavior
B. Collective behavior
C. User-Community Behavior
D. None of these
Answer» B. Collective behavior
77.

The user migration behavior is an example of collective behavior.

A. Collective behavior
B. user-user behavior
C. User-Community Behavior
D. None of these
Answer» A. Collective behavior
78.

which is the type of migration that take place in social media sites ?

A. site migration
B. attention migration
C. both
D. None of these
Answer» C. both
79.

Which is the general features can be considered for user migration ?

A. user activity on one site,
B. user network size
C. user rank.
D. all of the above
Answer» D. all of the above
80.

To analyze __________, there is a four-step procedure,

A. individual behavior
B. An observable behavior
C. Feature-Behavior Association.
D. None of these
Answer» A. individual behavior
81.

_____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas.

A. Twitter
B. Facebook
C. Instagram
D. None of the above
Answer» A. Twitter
82.

_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.

A. Facebook
B. Instagram
C. Twitter
D. LInkedIn
Answer» C. Twitter
83.

Which of the following is the most viral section of the internet?

A. Chat Messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Answer» B. Social networking sites
84.

Identify the example of Nominal attribute

A. Temperature
B. Salary
C. Mass
D. Gender
Answer» D. Gender
85.

Which of the following is not an appropriate measure for securing social networking accounts?

A. Strong passwords
B. Link your account with a phone number
C. Never write your password anywhere
D. Always maintain a soft copy of all your passwords in your PC
Answer» D. Always maintain a soft copy of all your passwords in your PC
86.

Which of the following is not a data pre-processing methods

A. Data Visualization
B. Data Discretization
C. Data Cleaning
D. Data Reduction
Answer» A. Data Visualization
87.

________________ is a popular tool to block social-media websites to track your browsing activities.

A. Fader
B. Blur
C. Social-Media Blocker
D. Ad-blocker
Answer» B. Blur
88.

Keeping the password by the name of your pet is a good choice.

A. true
B. false
Answer» B. false
89.

Increase your security for social media account by always ____________ as you step away from the system.

A. signing in
B. logging out
C. signing up
D. logging in
Answer» B. logging out
90.

Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.

A. true
B. false
Answer» A. true
91.

Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.

A. true
B. false
Answer» A. true
92.

Many social media sites and services provide _______________ for legitimate account verification.

A. Retina scanning
B. Fingerprint scanning
C. CAPTCHA
D. 2-step verification
Answer» D. 2-step verification
93.

Which of the following activities is NOT a data mining task?

A. Predicting the future stock price of a company using historical records
B. Monitoring and predicting failures in a hydropower plant
C. Extracting the frequencies of a sound wave
D. Monitoring the heart rate of a patient for abnormalities
Answer» C. Extracting the frequencies of a sound wave
94.

____________ type of sites are known as friend-of-a-friend site.

A. Chat Messenger
B. Social networking sites
C. Tutorial sites
D. Chat-rooms
Answer» B. Social networking sites
95.

If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

A. true
B. false
Answer» A. true
96.

Identify the example of sequence data

A. weather forecast
B. data matrix
C. market basket data
D. genomic data
Answer» D. genomic data
97.

Incorrect or invalid data is known as ______

A. Missing data
B. Outlier
C. Changing data
D. Noisy data
Answer» D. Noisy data
98.

The important characteristics of structured data are

A. Sparsity, Resolution, Distribution, Tuples
B. Sparsity, Centroid, Distribution , Dimensionality
C. Resolution, Distribution, Dimensionality ,Objects
D. Dimensionality, Sparsity, Resolution, Distribution
Answer» D. Dimensionality, Sparsity, Resolution, Distribution
99.

The problem of finding hidden structure in unlabeled data is called

A. Supervised learning
B. Unsupervised learning
C. Reinforcement learning
Answer» B. Unsupervised learning
100.

Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.?

A. Cluster Analysis
B. Regression
C. Classification
D. Sequential pattern discovery
Answer» B. Regression

Done Studing? Take A Test.

Great job completing your study session! Now it's time to put your knowledge to the test. Challenge yourself, see how much you've learned, and identify areas for improvement. Don’t worry, this is all part of the journey to mastery. Ready for the next step? Take a quiz to solidify what you've just studied.