Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following statements is correct in the context of design thinking

625 answers
267 good - 358 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

590 answers
529 good - 61 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

You are building a binary classifier for recognizing cucumbers (y=1) vs. watermelons (y=0).

406 answers
243 good - 163 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What can a software robot be likened to?

980 answers
495 good - 485 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the name of a popular library used to manipulate datasets in Python?

194 answers
36 good - 158 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is cannot be considered a well-known application of Machine/Deep Learning...

691 answers
614 good - 77 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How is the software robots configured?

739 answers
249 good - 490 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What did the early form of RPA exist as?

343 answers
237 good - 106 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

What are the different steps of Design Thinking ?

119 answers
90 good - 29 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following is NOT an essential characteric of Design Thinking ?

410 answers
169 good - 241 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following language is NOT recommended for Data Science

661 answers
371 good - 290 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Machine Learning problems are characterized by specific data challenges.

694 answers
527 good - 167 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a chatbot application ?

996 answers
887 good - 109 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What describes an UNION in an SQL statement?

365 answers
78 good - 287 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

A group of computers that is networked together and used by hackers to steal information is...

672 answers
620 good - 52 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What are the "4 V" in Big Data ?

832 answers
182 good - 650 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

On which algorithm is based the chatbot technology ?

414 answers
148 good - 266 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

Which of these is not a characteristic of RPA software?

204 answers
141 good - 63 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the difference between Machine Learning and Deep Learning

961 answers
89 good - 872 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In Deep Learning, what does a neuron compute?

274 answers
16 good - 258 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

What test motivated the research in chatbots ?

350 answers
298 good - 52 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following four passwords is the most secure?

954 answers
944 good - 10 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Name some of the digital leaders in the field of Artificial Intelligence

267 answers
58 good - 209 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is NOT an AI algorithm ?

711 answers
147 good - 564 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Where Design Thinking has the biggest impact ?

976 answers
22 good - 954 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a technology allowing to create chatbots?

658 answers
393 good - 265 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What does social engineering mean in a security context?

627 answers
175 good - 452 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What does NLP stand for ?

420 answers
244 good - 176 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following is an example of a “phishing” attack?

252 answers
164 good - 88 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In a digital project team, what is the primary difference between a Data Scientist and Data...

816 answers
657 good - 159 bad