Library

How to become an EDITx Author?

Let us show you the magic of creating questions for hundreds of IT lovers

EDITx is an open IT Library of questions to share and gain knowledge. Become an EDITx author because you care: share your knowledge to fit everyone benefit with a quality IT education.

What you get...

As contributor of the IT library, you allow others to use your questions, in the same way you can make use of theirs. Nevertheless, you keep the intellectual property on your work and will be notified any time that an author is using your questions or when someone answers your questions. Moreover, your privileged status allows you to set up private and public tests, to share your questions with your students, friends, colleagues or acquaintances and to get the results in real time.

... is what you give !

To become an EDITx Author, you just need to set up 5 QCM questions, in the field of your choice, and indicate the right answer. If your questions allows a better "Education in IT for X", you will receive the status and advantages of an EDITx Author.

Post date Author Category Body Stats
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

On which algorithm is based the chatbot technology ?

948 answers
365 good - 583 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

Which of the following is not a technology allowing to create chatbots?

403 answers
150 good - 253 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What describes an UNION in an SQL statement?

196 answers
185 good - 11 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In a digital project team, what is the primary difference between a Data Scientist and Data...

722 answers
227 good - 495 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How does the robot interpret screen displays?

502 answers
336 good - 166 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

What are the different steps of Design Thinking ?

994 answers
388 good - 606 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

In Deep Learning, what does a neuron compute?

552 answers
315 good - 237 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following BI Tools can be used to create digital dashboards ?

518 answers
78 good - 440 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is NOT an AI algorithm ?

891 answers
842 good - 49 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following is cannot be considered a well-known application of Machine/Deep Learning...

496 answers
336 good - 160 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What does social engineering mean in a security context?

143 answers
16 good - 127 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Name some of the digital leaders in the field of Artificial Intelligence

494 answers
43 good - 451 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

Which of these is not a characteristic of RPA software?

442 answers
404 good - 38 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the difference between Machine Learning and Deep Learning

392 answers
316 good - 76 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Chatbot

What test motivated the research in chatbots ?

465 answers
367 good - 98 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following is an example of a “phishing” attack?

222 answers
77 good - 145 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

What kind of cybersecurity risks can be minimized by using a Virtual Private Network (VPN)?

257 answers
121 good - 136 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following statements is correct in the context of design thinking

748 answers
211 good - 537 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Which of the following is NOT an essential characteric of Design Thinking ?

472 answers
194 good - 278 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Among the following personalities, who is an important actor of Deep Learning development ?

637 answers
549 good - 88 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

What did the early form of RPA exist as?

171 answers
101 good - 70 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Which of the following four passwords is the most secure?

326 answers
190 good - 136 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What does NLP stand for ?

243 answers
174 good - 69 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

What is the reason behind the explosion of interest in big data?

761 answers
28 good - 733 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

How is the software robots configured?

695 answers
121 good - 574 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

You are building a binary classifier for recognizing cucumbers (y=1) vs. watermelons (y=0).

744 answers
528 good - 216 bad
 
23.09.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Data Science & Artificial Intelligence

Which of the following language is NOT recommended for Data Science

357 answers
54 good - 303 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Robotic Process Automation

In the work environment, what are the robots related to as?

818 answers
546 good - 272 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Design Thinking

Where Design Thinking has the biggest impact ?

159 answers
19 good - 140 bad
 
21.08.2019
Eleyeh Abaneh
Junior Data Analyst at Intys Consulting
Cybersecurity

Criminals access someone’s computer and encrypt the user’s personal files and data.

524 answers
247 good - 277 bad