Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How does the robot interpret screen displays?

930 answers
749 good - 181 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

You are building a binary classifier for recognizing cucumbers (y=1) vs. watermelons (y=0).

750 answers
250 good - 500 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is NOT an AI algorithm ?

445 answers
137 good - 308 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a technology allowing to create chatbots?

748 answers
76 good - 672 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

140 answers
79 good - 61 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How is the software robots configured?

767 answers
201 good - 566 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

In the work environment, what are the robots related to as?

577 answers
219 good - 358 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

On which algorithm is based the chatbot technology ?

758 answers
278 good - 480 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

A group of computers that is networked together and used by hackers to steal information is...

228 answers
182 good - 46 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In Deep Learning, what does a neuron compute?

272 answers
51 good - 221 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is cannot be considered a well-known application of Machine/Deep Learning...

755 answers
54 good - 701 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

What are the different steps of Design Thinking ?

640 answers
323 good - 317 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What does social engineering mean in a security context?

307 answers
265 good - 42 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following is NOT an essential characteric of Design Thinking ?

882 answers
124 good - 758 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the name of a popular library used to manipulate datasets in Python?

884 answers
519 good - 365 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following four passwords is the most secure?

725 answers
575 good - 150 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Name some of the digital leaders in the field of Artificial Intelligence

453 answers
188 good - 265 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following language is NOT recommended for Data Science

213 answers
166 good - 47 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following statements is correct in the context of design thinking

752 answers
636 good - 116 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a chatbot application ?

891 answers
685 good - 206 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following BI Tools can be used to create digital dashboards ?

468 answers
290 good - 178 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What can a software robot be likened to?

128 answers
121 good - 7 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In a digital project team, what is the primary difference between a Data Scientist and Data...

1000 answers
763 good - 237 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Among the following personalities, who is an important actor of Deep Learning development ?

376 answers
53 good - 323 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following is an example of a “phishing” attack?

604 answers
301 good - 303 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Criminals access someone’s computer and encrypt the user’s personal files and data.

399 answers
115 good - 284 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What describes an UNION in an SQL statement?

612 answers
571 good - 41 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Machine Learning problems are characterized by specific data challenges.

814 answers
651 good - 163 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What are the "4 V" in Big Data ?

814 answers
538 good - 276 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Where Design Thinking has the biggest impact ?

947 answers
629 good - 318 bad