This challenging quiz tests knowledge on search algorithms and problem-solving strategies in AI, assessing understanding of heuristic functions, search strategies, and logical equivalences. Ideal for advanced learners in computer science.
– P => – Q
– P V Q
Q
Q => P
Rate this question:
H( n) = 2n
H( n) = 0
H( n) = 2
H( n) = n
Rate this question:
The solution
The goal state
The initial state
The order of node expansion
Rate this question:
2
1
Infinitely many
0
Rate this question:
Whenever a percept is perceived
After all actions are performed
Before the first action is performed
After the first action is performed
Rate this question:
Uninformed search can find the optimal solution but informed search doesn't
Uninformed search strategy uses knowledge beyond the definition of the problem itself but informed search strategy doesn't
Informed search can find the optimal solution but uninformed search doesn't
Informed search strategy uses knowledge beyond the definition of the problem itself but uninformed search strategy doesn't
Rate this question:
Agent program
Sensors
Agent function
Actuators
Rate this question:
Simulated annealing search
Hill-climbing search
A* search
Genetic algorithm
Rate this question:
Finding the path cost
Finding a initial state
Finding a goal state
Finding a solution
Rate this question:
Data are treated as a two-dimensional table from the users’ point of view. Relationship between records are defined by the value of fields in each record
Relationships between records are expressed by parent-child relationship
Data fields composing a record are stored in the index format by data type. Access to the record is made through the data gathering in these index values.
Relationships between records are expressed by network structure
Rate this question:
A,C
A, C, D, E
A
B, D, E
Rate this question:
The data structure is represented as a network
The data structure is represented by a hierarchy
SQL is used as its standard database language
The data structure is represented by a table format consisting of rows and columns
Rate this question:
One company has one shareholder
There are multiple companies, and each company has multiple shareholders
One company has multiple shareholders
There are multiple companies, and each company has a shareholder
Rate this question:
Operation 1 is PROJECTION and operation 2 is SELECTION
The table extracted by operation 1 has four rows
The table extracted by operation 1 has two columns
The table extracted by operation 2 has two columns
Rate this question:
Relational data model
E-R model
Hierarchical data model
Network data model
Rate this question:
Subschema
Internal schema
Conceptual schema
External schema
Rate this question:
SELECT
INSERT
DELETE
CREATE
Rate this question:
Create a new table by combining tuples satisfying conditions from tuples in more than two tables
Extract the specific columns from the table
Extract the rows satisfying specific conditions from the table
Create a table by combining inquiry results from one table and the ones of the other table
Rate this question:
Answer c.
Answer d.
Answer a.
Answer b.
The completion times for a typical task
The cost of buying a user interface component
User settable preferences
Possibilities for using an object or interface
Rate this question:
Is often conducted with low-fidelity designs
Is usually conducted at the end of the development process
Requires a fully functional prototype
Requires having several alternate designs
Rate this question:
GDI
CAI
CUI
GUI
Rate this question:
Easy to use
Usefulness
Learnability
Generalisability
Rate this question:
The system preventive maintenance is performed in order to extend the MTBF
The system operating ratio is improved by extending the MTTR and MTBF
System remote maintenance improves the operating ratio, by improving the MTBF
The more complicated the system configuration is, the longer the MTBF becomes
Rate this question:
Efficiency
Utility
Learnability
Likeability
Rate this question:
Conceptual models
Interactive sketches
Beta versions
Paper
Rate this question:
CAM
CAD
CIM
CAI
Rate this question:
Efficiency
User satisfaction
Safety
Learnability
Rate this question:
Rubin’s comparison test
Usability test
Heuristic evaluation
Pluralistic walkthrough
Rate this question:
Is not suitable for transmission of information between equipment where transmission speeds and protocols differ.
Enables efficient use of communication circuits (by sharing multiple communication path)
Suitable for transmission of large amounts of consecutive data.
Delays do not occur inside the switched network.
Rate this question:
32
8
16
64
Rate this question:
Ipconfig
Tracert
Ping
Nmap
Rate this question:
Router a learns the location of terminal b from the MAC address of the destination in the packet and relays the packets to router b only.
Router a relays all packets to both router b and router c.
Router a relays packets to router b only based on the destination IP address in the packet.
Router a relays packets to router b only according to the relay router specified in the packet.
Rate this question:
Voice and data are sent by time-divided multiplexing.
Optical fiber cable is laid down to the home to enable various communication services such as telephony, ISDN, and data communications.
It enables high-speed data transmission of differing incoming and outgoing speeds, using the existing telephone line (twisted pair).
Voice and data are separated by a terminal adapter (TA), so they can share the same line.
Rate this question:
SMTP is the protocol for the Internet, and POP3 is the protocol for LAN.
SMTP is the protocol used under normal circumstances when reception is possible, and POP3 is the protocol for fetching mail from the mailbox when connected.
The SMTP is a protocol used when one side is client, and POP3 is a protocol used when both sides to transmit are mail servers.
SMTP is a protocol for receiving, and POP3 is a protocol for sending.
Rate this question:
16,777,214
126
65,534
254
Rate this question:
In order to ensure e-mail confidentiality, it is necessary to employ preventive measures such as encryption.
When e-mail is transmitted, a one-to-one id established with the remote party based on the remote party’s address. Therefore, confidentiality is ensured.
Text files created with word processing programs and the file are translated into a computer’s internal code, so there is no risk that their contents will be read on the communication path.
In order to ensure e-mail confidentiality, it is necessary to request the provider connecting the sender to register a receiver’s ID.
Rate this question:
NTSC
JPEG
MPEG
PCM
Rate this question:
Packet switching service is not possible with ISDN.
In order to carry out communication by packet switching, both the sender and the receiver must be packet mode terminals. (PT)
By setting multiple logical circuits, concurrent communication with multiple parties can be performed using one physical line.
Compare to circuit switching, the latency within the network is short.
Rate this question:
Password
User ID
Access right
IP address
Rate this question:
False detection.
Positive acceptance rate.
Sensitivity
Crossover Error Rate (CER).
Rate this question:
Screen Saver
Vaccine
Trojan hourse
Hidden file
Rate this question:
Reduce all risks regardless of cost
Reduce the risk to a tolerable level.
Transfer any risk to external third parties.
Prosecute any employees that are violating published security policies.
Rate this question:
DIDDDEEPDEERREAM
ERDEIDDDEMRAEPDE
IDDDEPDEERDEEMRA
EDREDDDIARMEEDPE
Rate this question:
A user having multiple user IDs should set the same password for all the IDs.
All the users involved in the same project should use the same user ID.
When privileges are set for a user ID, they should be minimized.
When a user ID is to be deleted, an adequate time interval should be taken after the termination of its use has been notified.
Rate this question:
If a password is not modified within a priviously specified period of time, it will no longer be possible to connect using this password.
If the password is entered wrongly for a number of times determined in advanced, the line will be disconnected.
When there is a request for connection, a callback will be made to a specific telephone number to establish the connection.
To ensure that the user does not forget the password, it is displayed on the terminal at the time of log on.
Rate this question:
Apotential incident that could cause harm
The minimization of loss associated with an incident
Acompany resource that could be lost due to an incident
Aweakness in a system that could be exploited
Rate this question:
Key A: M's private key Key B: M's public key
Key A: Common public key Key B: N's private key
Key A: Common private key Key B: Common public key
Key A: N's public key Key B: N's private key
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.