Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following BI Tools can be used to create digital dashboards ?

819 answers
631 good - 188 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What does NLP stand for ?

313 answers
258 good - 55 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following is an example of a “phishing” attack?

408 answers
298 good - 110 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Where Design Thinking has the biggest impact ?

246 answers
57 good - 189 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is NOT an AI algorithm ?

591 answers
225 good - 366 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How does the robot interpret screen displays?

618 answers
303 good - 315 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the name of a popular library used to manipulate datasets in Python?

164 answers
5 good - 159 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In a digital project team, what is the primary difference between a Data Scientist and Data...

901 answers
478 good - 423 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

On which algorithm is based the chatbot technology ?

188 answers
142 good - 46 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

A group of computers that is networked together and used by hackers to steal information is...

118 answers
55 good - 63 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Machine Learning problems are characterized by specific data challenges.

668 answers
600 good - 68 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

What test motivated the research in chatbots ?

543 answers
527 good - 16 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

In the work environment, what are the robots related to as?

904 answers
7 good - 897 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What describes an UNION in an SQL statement?

702 answers
455 good - 247 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In Deep Learning, what does a neuron compute?

742 answers
298 good - 444 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the difference between Machine Learning and Deep Learning

660 answers
338 good - 322 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following four passwords is the most secure?

255 answers
220 good - 35 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What are the "4 V" in Big Data ?

401 answers
207 good - 194 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is cannot be considered a well-known application of Machine/Deep Learning...

630 answers
313 good - 317 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Criminals access someone’s computer and encrypt the user’s personal files and data.

772 answers
103 good - 669 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following language is NOT recommended for Data Science

890 answers
286 good - 604 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a technology allowing to create chatbots?

662 answers
629 good - 33 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

You are building a binary classifier for recognizing cucumbers (y=1) vs. watermelons (y=0).

421 answers
217 good - 204 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the reason behind the explosion of interest in big data?

532 answers
242 good - 290 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What can a software robot be likened to?

342 answers
171 good - 171 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What does social engineering mean in a security context?

933 answers
840 good - 93 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How is the software robots configured?

457 answers
190 good - 267 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

What are the different steps of Design Thinking ?

883 answers
255 good - 628 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What did the early form of RPA exist as?

483 answers
260 good - 223 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

944 answers
131 good - 813 bad