Exam 4: Exploring User Migration, Security, and Data Mining in Social Media Sites

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The problem of finding hidden structure in unlabeled data is called

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

B

____________ type of sites are known as friend-of-a-friend site.

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

B

Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.

Free
(True/False)
4.7/5
(41)
Correct Answer:
Verified

True

Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.?

(Multiple Choice)
4.8/5
(33)

Many social media sites and services provide _______________ for legitimate account verification.

(Multiple Choice)
4.8/5
(46)

Which of the following is not a data pre-processing methods

(Multiple Choice)
4.9/5
(38)

which is the type of migration that take place in social media sites ?

(Multiple Choice)
5.0/5
(37)

Which of the following is the most viral section of the internet?

(Multiple Choice)
4.9/5
(48)

The important characteristics of structured data are

(Multiple Choice)
4.8/5
(47)

_______refers to a population of individuals behaving in a similar way.

(Multiple Choice)
5.0/5
(45)

Which is the general features can be considered for user migration ?

(Multiple Choice)
4.9/5
(37)

Which of the following activities is NOT a data mining task?

(Multiple Choice)
4.9/5
(36)

To analyze __________, there is a four-step procedure,

(Multiple Choice)
4.7/5
(39)

Keeping the password by the name of your pet is a good choice.

(True/False)
4.7/5
(37)

_______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.

(Multiple Choice)
4.8/5
(35)

Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.

(True/False)
4.7/5
(47)

Which of the following is not an appropriate measure for securing social networking accounts?

(Multiple Choice)
4.9/5
(30)

Identify the example of Nominal attribute

(Multiple Choice)
5.0/5
(37)

If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

(True/False)
4.8/5
(32)

________________ is a popular tool to block social-media websites to track your browsing activities.

(Multiple Choice)
4.8/5
(28)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)