Question: 1
Which of the following is an example of a Black Box problem where Deep Learning could be used?
Question: 2
At Local Council B, data is monitored extremely closely due to its sensitive nature. A method has been put in place that provides evidence that a user has carried out an action on the IT system.
For example, if an employee changes the end date of a contract with a supplier, this change is time-stamped with their name against the modification. This provides Local Council B with visibility over its data and users' actions.
What is the name given to this type of control?
Question: 3
Zach is the Head of Procurement at a super secret military base. He does not want anyone outside of the base to know what he is procuring or which suppliers he uses as this information could be critical to national defence. He is aware that cyber criminals may be interested in stealing this information so he has decided to disconnect critical machines and systems from the internet. What is this approach to data security known as?
Question: 4
Which of the following is a UK-specific law that deals with the rights of data, particularly data that is shared and gathered online?
Question: 5
Tracy is a logistics manager who is using an algorithm to solve a problem. She needs to work out the shortest travel time between a warehouse and a client's location. She is using past data to help solve the problem. What type of algorithm is she using?