JY CHEN - Ask Anything, Learn Everything. Logo

Questions in computers-and-technology

[Free] You type in your password, it's hashed, and the system checks if the given hash of the password you just typed matches the stored hash of your password. What happens if it doesn't match? A. You receive a message about having an invalid username or password. B. You are granted access into the system. C. You are immediately locked out of the system indefinitely. D. The system sees you as a threat and sends a message to the security administrator.

[Free] Which of the following challenges must be addressed when generating text embeddings for multilingual models to ensure consistency across different languages? * Translating words from one language to another while preserving contextual meaning * Modeling words in word order, grammatical structures, and syntactic dependencies * Preserving nuances and idiomatic expressions accurately * Ensuring monolingual and multilingual embeddings to enable cross-lingual transfer

[Free] Which statement presents an accurate description of RAG? (A) RAG can use external knowledge sources to generate more accurate and informative responses. (B) RAG is designed to improve the speed of language model training. (C) RAG is primarily used for speech recognition tasks. (D) RAG is a technique for data augmentation in computer vision tasks.

[Free] Which algorithm predicts the surrounding words given a target word?

[Free] A. Tick (✓) the correct option. 1. The speed of a computer is measured in (a) Nanoseconds (b) Megahertz (c) G = gigahertz (d) K = kilometres 2. A computer is an electronic device (a) Which takes data (b) Which takes instructions (c) Which gives results (d) All of the above 3. Which of the following devices can be called a computer? (a) Desktop (b) Projector (c) Calculator (d) Tablet 4. The execution of instructions is called (a) Data (b) Instruction (c) Data processing (d) Output B. Fill in the blanks. 1. The data which goes into a computer is termed as ______. 2. The computer performs action(s) on the data and this is known as ______. 3. The result that comes out after processing the input data is termed as ______. 4. A set of computer instructions is called ______. C. Write 'T' for true and 'F' for false against each of the following statements. 1. The data that comes out after processing the input data is termed as the output. 2. The phenomenon of right output due to wrong input of instructions or data is termed as Garbage In Garbage Out (GIGO). 3. Computers can perform calculations at a very high speed with 100% accuracy. 4. A computer depends upon a calculator for instructions. D. Short answer type questions. 1. What is a computer? 2. Write any two limitations of the computer. 3. Write any two differences between the computer and human beings. 4. Explain the term GIGO.

[Free] If a code block begins with the word "on," it will typically: A. run a function. B. specify a parameter. C. create a variable. D. cause an event.

[Free] Which of the following statements accurately describe playbooks? Select three answers. A. Organizations keep playbooks consistent by applying the same procedures to different business events. B. Organizations use different types of playbooks for different situations. C. A playbook improves accuracy when identifying and mitigating an incident. D. A playbook helps security teams respond to urgent situations quickly.

[Free] Which type of cyberattack involves crafting a personalized message in order to deceive the target? A. Spear phishing B. Vishing C. Malware

[Free] Type the program's output number = 9 print('{:b}, {:d}, {:.2f}'.format(number, number, number))

[Free] AI-generated essays, reflections, research papers, etc. are graded zero in this class and are considered cheating since they are not authorized by the professor in any of these assignments. A. True B. False