TechJar Round 1

TechJar Round 1

University

45 Qs

quiz-placeholder

Similar activities

Latihan psat informatika kelas 11 2025

Latihan psat informatika kelas 11 2025

10th Grade - University

40 Qs

Кәсіби ағылшын 51 - 100

Кәсіби ағылшын 51 - 100

University

50 Qs

STS GASAL PEMROGRAMAN PERANGKAT BERGERAK

STS GASAL PEMROGRAMAN PERANGKAT BERGERAK

11th Grade - University

40 Qs

Pengantar Teknologi Informasi

Pengantar Teknologi Informasi

University

50 Qs

QUIZ SA 314

QUIZ SA 314

University

40 Qs

PTS BASIS DATA

PTS BASIS DATA

10th Grade - University

50 Qs

Cloud Computing Service Models

Cloud Computing Service Models

University

48 Qs

ICT C3 Year 7 Quiz 2024

ICT C3 Year 7 Quiz 2024

7th Grade - University

45 Qs

TechJar Round 1

TechJar Round 1

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Mihir Thakkar

Used 9+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In machine learning, what does the term “overfitting” signify?

The model trains too quickly without accuracy

The model memorizes training data but performs poorly on new data

The model ignores anomalies in the dataset

The model is unable to recognize complex patterns

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which database type is characterized by its use of collections instead of tables?

Relational Database

Hierarchical Database

NoSQL Database

Object-Oriented Database

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The Turing Test, introduced by Alan Turing, is designed to evaluate what?

Computational efficiency

Artificial intelligence’s ability to mimic human behavior

Security strength of cryptographic systems

Accuracy of numerical algorithms

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In computer networking, the Domain Name System (DNS) primarily performs which function?

Encrypts network traffic

Maps domain names to IP addresses

Provides firewall protection

Allocates bandwidth among devices

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In cybersecurity, what does the term “zero-day vulnerability” refer to?

A virus that deletes files immediately upon infection

A flaw exploited before the vendor is aware of it

An attack that targets outdated hardware

A denial-of-service attack on launch day

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

The CAP Theorem in distributed databases highlights the trade-off among which three properties?

Capacity, Accuracy, Performance

Consistency, Availability, Partition tolerance

Connectivity, Authentication, Privacy

Caching, Accessibility, Protocols

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which algorithm is primarily used for finding the shortest path in a graph?

Quick Sort

Dijkstra’s Algorithms

BFS only

Merge Sort

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?