Which of the following concepts refers to actionable intelligence?
Wisdom
Data
Knowledge
Information - ✔✔✔–Knowledge
Knowledge is actionable intelligence because it can reveal some action that must be taken.
You have a dataset of customer information, such as a customer's location, spending habits,
product reviews, and so forth. While you don't have anything specific to predict, you want to
engage in customer segmentation so that customers with similarities are considered a unified
audience in your targeted marketing campaigns. Which type of machine learning outcome is
most appropriate for this situation?
Dimensionality reduction
Classification
Regression
Clustering - ✔✔✔–Clustering
Clustering is a type of unsupervised learning that groups together data points with similarities,
and is therefore an excellent outcome when the goal is customer segmentation.
Which of the following describes the relationship between a machine learning model and a
machine learning algorithm?
A machine learning model represents the input data before it is fed into a machine learning
algorithm.
A machine learning model generates a machine learning algorithm through training.
A machine learning model is the sum of multiple machine learning algorithms.
A machine learning model is created by applying a machine learning algorithm to input data. -
✔✔✔–A machine learning model is created by applying a machine learning algorithm to input
data.
,CAIP CERTNEXUS EXAM WITH QUESTIONS AND ANSWERS (100% SOLVED)
The algorithm is a set of rules upon which the model is built. The model uses these rules to
estimate something about the world through available data. Think of an algorithm as a
blueprint or recipe, and the model as the finished building when given resources or the finished
meal when given ingredients.
What does it mean for a machine learning model to be "stochastic"? - ✔✔✔–The same input
can produce different outputs over multiple training sessions.
Which of the following is a Python tool that provides a frontend environment to the TensorFlow
deep learning library?
SciPy
Apache Spark MLlib
Keras
PyTorch - ✔✔✔–Keras
Keras is a high-level interface into TensorFlow, and is particularly useful for beginners new to
deep learning.
SciPy is a component of the Python data science stack that provides mathematical functions,
not a frontend to TensorFlow.
PyTorch is a deep learning library that is similar to TensorFlow, but it is not a frontend to
TensorFlow.
Apache Spark MLlib is a framework for machine learning that leverages clustering computing,
not a frontend to TensorFlow.
Which of the following cloud services is used as a teaching tool for reinforcement learning?
AWS DeepRacer
Cloud AutoML
Watson OpenScale
Azure Databricks - ✔✔✔–AWS DeepRacer
, CAIP CERTNEXUS EXAM WITH QUESTIONS AND ANSWERS (100% SOLVED)
AWS DeepRacer promotes reinforcement learning to beginners by enabling them to train a toy
race car.
Watson OpenScale is an enterprise-grade AI project management platform, not a service that
teaches reinforcement learning to beginners.
Cloud AutoML is a managed machine learning service that is beginner friendly, but it doesn't
promote reinforcement learning in particular.
Azure Databricks is a managed machine learning and deep learning service, not a service that
teaches reinforcement learning to beginners.
Which of the following graphics processing units (GPUs) supports the proprietary Compute
Unified Device Architecture (CUDA) used in applications like deep learning?
Intel Xe series
ARM Mali series
Nvidia GeForce series
AMD RX series - ✔✔✔–Nvidia GeForce series
CUDA is a proprietary Nvidia standard, and is usable by modern GPUs in the GeForce line.
AMD GPUs do not support CUDA.
Attrition bias - ✔✔✔–occurs when participants drop out of a long-term experiment or study
prejudice, bias - ✔✔✔–a result of training data that is influenced by cultural or other
stereotypes
Which of the following is an example of an inference attack?
A customer database includes name and address information. An attacker is able to find the
address of a specific customer just by looking up their name.
An account database includes user names and cryptographically secured passwords. An attacker
finds a database on the Internet that matches plaintext passwords with their secured versions,
enabling the attacker to steal users' credentials.