Quiznetik

Social Media Analytics (SMA) | Set 1

1. Data that has been generated with no connection to the Internet, and then registered into a system, which may be accessed via the Internet later called

Correct : A. offline originated data

2. What is one of the big differences between traditional media and social media?

Correct : A. participatory production.

3. Estimated metrics include …………. which provide the number of times a user has potentially seen a certain piece of content or advertising.

Correct : D. all of the above

4. ____________is a very fragile and unstable way of gathering data, because when anything changes on the web site, the source code is changed,

Correct : B. web crawling/scraping

5. It allows a programmer to see a clear structure of the information that is stored in the application Called

Correct : A. api

6. In terms of Facebook's ranking algorithm, what does "weight" refer to?

Correct : A. the amount of comments, likes, etc. a content post receives

7. What is the name of Facebook's Analytics tool?

Correct : D. insights

8. What is CTR?

Correct : C. click through rate

9. Which of the following clustering requires merging approach?

Correct : B. Hierarchical

10. Which of the following function is used for k-means clustering?

Correct : A. k-means

11. Hierarchical clustering should be primarily used for exploration.

Correct : A. true

12. Following are applications of text mining

Correct : D. All Above

13. Point out the wrong statement.

Correct : C. k-nearest neighbor is same as k-means

14. In ___________problems nodes in Social n/w associated with labels

Correct : C. Classification

15. Most well-known keyword search algorithm for relational data is _______

Correct : D. Both A & B

16. _____________applies authority-based ranking to keyword search on labeled graphs,

Correct : A. ObjectRank Algorithm

17. Which is not classification algorithm?

Correct : D. Indexbased

18. Data mining is also known as___________

Correct : B. KDD

19. Clustering is a common____________ data mining technique

Correct : B. Unsupervised

20. ___________ is an essential process where intelligent methods are applied to extract data patterns.

Correct : B. Data mining

21. Data ................... is the process of finding a model that describes and distinguishes data classes or concepts.

Correct : D. Classification

22. _____________ is the application of data mining techniques to discover patterns from the Web

Correct : B. Multimedia Mining

23. _______________refers to the process of deriving high-quality information from text.

Correct : A. Text Mining.

24. What are the different measures of centrality?

Correct : D. All of the above

25. Degree centrality is defined as

Correct : A. The ratio of number of neighbors of the vertex with total number of possible neighbors

26. Eigenvector centrality is an

Correct : A. An Important nodes has usually important friends

27. Katz centrality can be

Correct : D. All of the above

28. Page rank is the method

Correct : D. All of the above

29. The most popular social networking website twitter makes use of HITS algorithm in suggesting user account to follow

Correct : A. true

30. PageRank is based on the ‘random suffer’ idea and the web is seen as a markov chain

Correct : A. true

31. vertices that have a high probability of occurring on a randomly chosen shortest path between two nodes are said to have high

Correct : B. Betweeness centrality

32. The number of actors outside the group that are connected to the member of that group is

Correct : C. Degree centrality of the group

33. Transitivity is the tendency for friend of friends to be friend and enemy of enemy to be enemy

Correct : A. true

34. In any directed graph if all edges are reciprocal, can have maximum of |E|=

Correct : C. 2

35. Reciprocity can be computed using

Correct : B. Adjacency Matrix

36. Social Status theory measures how inconsistent individuals are in assigning status to their neighbors.

Correct : B. false

37. A pair of nodes said to be structurally equivalent to the extent that

Correct : D. All of the above

38. In case the documents do not share any attributes or words, the cosine similarity results in……….

Correct : C. 0

39. Which social network is considered the most popular for business to business marketing?

Correct : D. LinkedIn

40. The first step when marketing with social networks is to identify the goals and strategies.

Correct : A. true

41. What is the term adopted for updates by Twitter users?

Correct : A. Tweets

42. Web Crawler is also called as

Correct : C. Web Spider

43. The ‘Sociogram’ technique is used to study

Correct : A. Human Relations

44. Can decision trees be used for performing clustering?

Correct : A. true

45. What is the minimum no. of variables/ features required to perform clustering?

Correct : B. 1

46. For two runs of K-Mean clustering is it expected to get same clustering results?

Correct : B. No

47. Is it possible that Assignment of observations to clusters does not change between successive iterations in K-Means

Correct : A. Yes

48. Which of the following algorithm is most sensitive to outliers?

Correct : A. K-means

49. Which of the following are the high and low bounds for the existence of F-Score?

Correct : A. [0,1]

50. Which of the following method is used for finding optimal of cluster in K-Mean algorithm?

Correct : A. Elbow method

51. ___________for a node is simply its degree.

Correct : A. Degree

52. __________defines how important a node is within a network.

Correct : A. Centrality

53. ______________ centrality takes its maximum value

Correct : B. Betweenness

54. __________algorithm will compute shortest paths from a single node to all other nodes.

Correct : C. Dijkstra’s

55. _____centrality is defined as the number of nodes from outside the group that are connected to group members.

Correct : A. Group degree

56. _______determines how links (edges) are formed in a social graph.

Correct : D. Linking behavior

57. transitive behavior needs at least ________edges.

Correct : A. Three

58. The________ analyzes transitivity in an undirected graph.

Correct : B. clustering coefficient

59. ________is a simplified version of transitivity

Correct : B. Reciprocity

60. __________considers closed loops of length 2

Correct : C. Reciprocity

61. ______ theory measures how consistent individuals are in assigning status to their neighbors.

Correct : A. Social status

62. When using network information, the similarity between two nodes can be computed by measuring their ________

Correct : C. both a and b

63. To compute structural equivalence, we look at the________ shared by two nodes

Correct : A. nighborhood

64. In directed graphs_____________variants of degree centrality.

Correct : C. both a and b

65. __________defines a normalized version of Katz centrality.

Correct : A. PageRank centrality

66. ________is the behavior individuals exhibit with respect to other individuals.

Correct : A. user-user behavior

67. _______represents the interactions users have with other users

Correct : A. Link data

68. __________algorithms determine features that contribute the most to the prediction of the class attribute.

Correct : B. Features selection

69. In Behavior Analysis Methodology___________ step aims to find the relationship between features and behavior

Correct : C. Feature-Behavior Association.

70. __________ Modeling allow for controlled experiments and simulations that can help study individuals in social media

Correct : B. Individual Behavior Modeling

71. When a behavior di_x000B_uses in a network, one can use _______model

Correct : A. threshold models

72. _________ models are sender-centric.

Correct : B. Cascade Models

73. _________ models receiver-centric.

Correct : A. threshold models

74. __________ examples of individual behavior modeling.

Correct : D. both

75. _______measures can be used to calculate similarity

Correct : D. all of the above

76. _______refers to a population of individuals behaving in a similar way.

Correct : B. Collective behavior

77. The user migration behavior is an example of collective behavior.

Correct : A. Collective behavior

78. which is the type of migration that take place in social media sites ?

Correct : C. both

79. Which is the general features can be considered for user migration ?

Correct : D. all of the above

80. To analyze __________, there is a four-step procedure,

Correct : A. individual behavior

81. _____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas.

Correct : A. Twitter

82. _______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.

Correct : C. Twitter

83. Which of the following is the most viral section of the internet?

Correct : B. Social networking sites

84. Identify the example of Nominal attribute

Correct : D. Gender

85. Which of the following is not an appropriate measure for securing social networking accounts?

Correct : D. Always maintain a soft copy of all your passwords in your PC

86. Which of the following is not a data pre-processing methods

Correct : A. Data Visualization

87. ________________ is a popular tool to block social-media websites to track your browsing activities.

Correct : B. Blur

88. Keeping the password by the name of your pet is a good choice.

Correct : B. false

89. Increase your security for social media account by always ____________ as you step away from the system.

Correct : B. logging out

90. Different social media services offer tips as of how to use their services and site, still maintaining a high altitude of security.

Correct : A. true

91. Scanning your system and destroying suspicious files can reduce risks of data compromise or leakage of compromised data over social media.

Correct : A. true

92. Many social media sites and services provide _______________ for legitimate account verification.

Correct : D. 2-step verification

93. Which of the following activities is NOT a data mining task?

Correct : C. Extracting the frequencies of a sound wave

94. ____________ type of sites are known as friend-of-a-friend site.

Correct : B. Social networking sites

95. If hackers gain access to your social media accounts, they can do some illicit or shameless act to degrade your reputation.

Correct : A. true

96. Identify the example of sequence data

Correct : D. genomic data

97. Incorrect or invalid data is known as ______

Correct : D. Noisy data

98. The important characteristics of structured data are

Correct : D. Dimensionality, Sparsity, Resolution, Distribution

99. The problem of finding hidden structure in unlabeled data is called

Correct : B. Unsupervised learning

100. Which data mining task can be used for predicting wind velocities as a function of temperature, humidity, air pressure, etc.?

Correct : B. Regression