Exam 4: Exploring User Migration, Security, and Data Mining in Social Media Sites
Exam 1: Media, Analytics, and Data Mining Techniques23 Questions
Exam 2: Social Network Analysis and Clustering Algorithms25 Questions
Exam 3: Network Analysis and Behavior Modeling in Social Media25 Questions
Exam 4: Exploring User Migration, Security, and Data Mining in Social Media Sites25 Questions
Exam 5: Data Mining and Clustering: Key Concepts and Tasks23 Questions
Exam 6: Social Media and Networking24 Questions
Exam 7: Exploring Network Visualization and Analysis Tools: Techniques, Measures, and Applications24 Questions
Exam 8: Data Mining and Network Analysis: Key Concepts and Techniques25 Questions
Exam 9: Network Analysis and Individual Behavior: Understanding Centrality, Transitivity, and Social Dynamics25 Questions
Exam 10: Network Analysis and Social Media24 Questions
Exam 11: Social Media Analytics and Data Extraction25 Questions
Exam 12: Social Media Analysis and Modeling Techniques25 Questions
Exam 13: Various Aspects of Social Media and Prediction Techniques6 Questions
Select questions type
The problem of finding hidden structure in unlabeled data is called
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
B
____________ type of sites are known as friend-of-a-friend site.
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
B
Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.
Free
(True/False)
4.7/5
(41)
Correct Answer:
True
Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.?
(Multiple Choice)
4.8/5
(33)
Many social media sites and services provide _______________ for legitimate account verification.
(Multiple Choice)
4.8/5
(46)
which is the type of migration that take place in social media sites ?
(Multiple Choice)
5.0/5
(37)
Which of the following is the most viral section of the internet?
(Multiple Choice)
4.9/5
(48)
_______refers to a population of individuals behaving in a similar way.
(Multiple Choice)
5.0/5
(45)
Which is the general features can be considered for user migration ?
(Multiple Choice)
4.9/5
(37)
Which of the following activities is NOT a data mining task?
(Multiple Choice)
4.9/5
(36)
_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.
(Multiple Choice)
4.8/5
(35)
Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.
(True/False)
4.7/5
(47)
Which of the following is not an appropriate measure for securing social networking accounts?
(Multiple Choice)
4.9/5
(30)
If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.
(True/False)
4.8/5
(32)
________________ is a popular tool to block social-media websites to track your browsing activities.
(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)