List of Questions CSIS
List of Questions CSIS
a. Open-addressing is one strategy for resolving collisions in hash tables (mixed arrays).
6. A task of size n implemented with an algorithm of complexity f(n) has been reduced to two sub-tasks of size 1/n and the execution of n
operations with a fixed execution cost. The complexity of f(n) is
a. O(n log n)
7. A random set of n mutually different numbers was inserted into the BST tree. Which answer is true?
a. The pessimistic complexity of the operation to insert the next element in the tree is O(log n).
8. A mound-building operation has been started for an array of ten elements: 1,2,3,4,5,6,7,8,9,0. Are the following statements true about the
resulting tree:
a. The smallest elements, i.e. 0, 1 and 2, can be found among the leaves.
11. A binary tree was built containing the numbers from 1, 2, to 15 in such a way that 1 was taken as the root of the tree, as its children the
numbers 2 and 3 and in the next row 4,5,6,7 so that 4 and 5 are the children of the node with key 2 and 6, 7 are the children of the node with key 4.
Similarly, in the next row, nodes 8 through 15 were created.
a. On the undirected graph thus created, the DFS algorithm was run starting from node 15, adopting the principle that in the neighborhood
list of each node, the neighbors are ordered from the smallest key to the largest. The order in which the nodes were browsed was as
follows: 15, 7, 14, 3, 6, 12, 13, 1, 2, 4, 8, 9, 5, 10, 11
12. A binary tree containing the numbers from 1, 2, to 15 was built in such a way that 1 was taken as the root of the tree, as its children the
numbers 2 and 3 and in the next row 4,5,6,7 so that 4 and 5 are children of the node with key 2 and 6, 7 are children of the node with key 4.
Similarly, in the next row, nodes 8 to 15 were created. Determine the truth of the following statements:
a. 15, 7, 3, 14, 1 , 6 ,2, 21, 13, 4, 5, 8, 9, 10, 11
17. The completeness theorem for classical propositional calculus states that:
a. every sentence of classical propositional calculus is a formula (in its language), but not every formula is a sentence.
19. The sentence "If Słowacki was a great poet, then if the Nile flows through Krakow, then Słowacki was a great poet" is:
a. false
22. The quantifiers "there exists an x such that" and "for every x such that":
a. have their semantic interpretations in models for the language in which they appear.
23. The semantic interpretation function defined for the language of predicate calculus:
a. interprets this language into the language of classical propositional calculus.
27. The symmetry group of a geometric figure is the group of plane transformations under which the figure remains invariant. The group operation
is the composition of transformations.
a. In the symmetry group of a regular dodecagon, there are two different inverses of a 30-degree rotation.
a. (GL(n, ℝ), +) - the set of all non-singular n×n real matrices with addition.
30. The hypercube Qn is a graph whose vertices are labeled with all possible zero-one sequences of length n, and edges connect vertices whose
labels differ in exactly one position.
a. The cube Q3 has 8 vertices.
31. The chromatic number of a graph is the minimal number of colors needed to color the vertices so that no two adjacent vertices share the same
color.
a. The graph formed by the vertices and edges of a cube has a chromatic number equal to 2.
34. If X is a set with n elements and Y is a set with m elements, n > 0, m > 0, then
a. the cardinality of the power set of X is equal to 2n.
38. Let denote non-zero numbers stored on a computer in floating-point format with machine precision . The number is a result of an
arithmetic operation performed by a computer and stored in the same floating-point format.
Let denotes the relative error of the result of the operation (more precisely: its absolute value).
In which case(s) the error of the result can be many times greater (several orders of magnitude) than the errors of the arguments and , i.e.
39. Finding the roots of a continuous function of one real variable with iterative methods.
The function values for the first two elements of the iterative sequence and satisfy the inequality .
The iterative sequence will converge to zero for any function satisfying the above conditions for
a. bisection method.
40. We are solving a system of linear equations with any real, non-singular matrix .
The computational complexity of the algorithm used to solve this system is lower than the computational complexity of the Gaussian elimination
method if the matrix has the form (select correct statement(s)):
a. . In this case, we have to solve two systems of equations, but both are systems with triangular matrices ( and ), so
they can be solved by forward and backward substitution.
46. Let us consider the following example of a linear least squares approximation
Data:
47. According to the two-point formula with step , the error related to approximating the value of the derivative of the analytic function at the
point using the difference quotient method can be written as
.
a. The difference quotient methods require us to know the formula for the derivative.
49. We are approximating the mass-height relationship with the affine function based on measurements containing masses and
heights of 100 people. The set of conditions ensuring the consistency of the data with the approximating function can be written as
A. a system of 100 equations with one unknown.
50. Which of the following sentences is one of the Kolmogorow axioms of probability for the tuple :
a. :
a. the set of all possible entities about which information is being gathered
54. The amount of all -length sequences created from a set of elements is given by the formula:
a.
55. In probability theory the formula for total probability is used to:
a. to find alternative representations of events in conditional probability
56. In probability theory events that are independent of any other event:
a. exist, but must be only an empty set or the whole probability space
59. Which of the below are properties of the cumulative distribution function of the random variable :
a. is right-continuous
61. If we know that the random variables and are independent then:
a. the expected value of their multiplication is the multiplication of the expected values of and
62. Given a graph G created from an n-vertex clique (n>5), by removing 3 edges. Indicate the true statements:
a. G is Eulerian only for one specific value of n
64. Given a graph G with six vertices, having degrees 2,2,3,4,4,5. Can G be a planar graph?
a. No
65. Given is a dodecahedron with 11 vertices, seven of whose faces are triangles and four are quadrilaterals. The last face is:
a. None of the other answers are correct
66. The graph G is constructed from Hamiltonian graphs, G1=(V1,E1) and G2=(V2,E2), in the following way. From V1, a subset W1 (W1 different
from V1) of vertices is selected, constituting successive nodes of the Hamiltonian cycle in G1, and from V2, a subset W2 (W2 different from V2) of
vertices, constituting successive nodes of the Hamiltonian cycle in G2, and then nodes W1 and W2 are connected by additional edges, so that each
node W1 is adjacent to each node W2. Indicate the true statements:
a. G is a Hamiltonian graph
67. The chromatic index of a complete n-ary tree (n>1) of height h>3*n, T=(V,E), is:
a. |E|
68. Given any connected graph G=(V,E), having |E| bridges. Which of the following statements are true:
a. |E| = |V|-1
69. Give the smallest non-zero number of edges that should be removed from a complete bipartite graph Kn,n (n>=3) to obtain a regular graph:
a. 2n
70. Given a clique K8 with vertices v1, v2,..., v8. The number of subgraphs of K8 that are isomorphic to K5 is:
a. 8!/5!
71. Given a clique K8 with vertices v1, v2,..., v8.. The number of simple paths in this graph from v1 to v2 having at most 3 edges is:
a. 56
72. The number of simple paths in a K8 clique having at most 3 edges is:
a. 3! + 2! + 1!
73. Given a graph G with 21 edges, having 7 vertices of degree 1, 3 vertices of degree 2, 7 vertices of degree 3 and the remaining vertices of
degree 4. G has:
a. 21 vertices
74.
The following language is given . It codes the decision problem:
75.
Język is:
77. The decision problem „whether given Turing Machines M and N accept the same language?” is:
a. Semi-decidable for multi-tape Turing machines
78. Let S be some property (class) of recursively enumerable sets. If S is non-trivial then:
a.
Language L = {<M>: L(M) ÎS} is finite
79. Let S be a certain property (class) of recursively enumerable sets. If S is not monotonic then:
a. S is enumerable
82. Language
a. Is not recursively enumerable
83. Language
a. Is recursively enumerable
84. The decision problem whether a language accepted by a given Turing machine is empty, is:
a. Semi-decidable
85. The decision problem whether a language accepted by a given Turing machine is nonempty, is
a.
Is not even a semi-decidable problem
86. The language is given. It codes the following decision problem:
a. Whether a transition function of a given Turing machine M is recursive?
88. Language
a. Is not recursively enumerable
92. Processor
a. addressing modes of the processor executed using FPGA must be consistent with the modes provided by the FPGA manufacturer
a. the same step of two consecutive instructions can be executed at the same time
101. Indicate which of the following statements describes the true properties of relational database systems.
a. A database is a set of relations.
102. Indicate which of the following statements about foreign keys in relational database systems are true.
a. A foreign key may be a composite key that refers to a simple key.
103. Given the relation R, its schema H={A,B,C,D} and a set of functional dependencies F={{A,B} -> C, {A,C} -> D}. The only key of this
relation is the pair {A,B}. Which is the highest normal form of the relation R assuming it is in 1NF?
a. BCNF
104. Given the relation R, its schema H={A,B,C,D} and a set of functional dependencies F={A -> B, C -> D}. The only key of this relation is the
pair {A,C}. How should the relation R be decomposed to obtain a set of relations in 3NF?
a. {A,B,C}, {A,C,D}
105. Indicate which of the following statements about keys in relational database systems are true.
a. The set of all attributes included in the header of a relation is a key.
106. Indicate which of the following statements about normalisation are true in a relational data model.
a. Any relation can be transformed into 3NF with lossless decomposition that preserves functional dependencies
107. Indicate which of the following statements about relationships between tables in relational database systems are true.
a. In case of a key - foreign key connection, there may be records in the parent table without corresponding records in the child table.
108. Indicate which of the following statements about subqueries are true in PostgreSQL.
a. Only scalar subqueries may be used inside an INSERT statement.
109. Indicate which of the following statements about join types in relational database systems are true.
a. An outer union join contains only unmatched records from both tables.
110. Indicate which of the properties of transactional processing is denoted by the acronym ACID.
a. Atomicity, consistency, isolation and durability.
111. Indicate which of the following statements about the use of aggregate functions are true in PostgreSQL.
a. An aggregate function cannot be used inside of a WHERE clause unless it is placed in a subquery.
112. Indicate which of the following statements about the relationship between relational database systems and mathematical theory of relations
are true.
a. A number of operations on tables are specified, which are derived from relation algebra.
114. In the context of formal languages, (notation: ^ denotes exponentiation, with arguments potentially enclosed in curly brackets), the following
statements are true:
a. L1 = {f^{2^{n}}: n > 0} is not regular and L2 = {f^{2n} : n > 0} is not regular
115. We have a grammar (uppercase letters are non-terminal symbols, lowercase letters are terminal symbols, and S is the start symbol) with the
following productions: S→AB, A→Aa ∣ bB, A→Aa∣bB, B→a ∣ Sb, B→a∣Sb, and the sentence form baaABb. Which statement is true?
a. This sentence form is leftmost derivable
116. In reference to regular expressions and the generated strings, which statements are true?
119. Which of the following statements regarding formal grammars are true:
a.
Every left-recursive grammar can be converted into a right-recursive grammar, and vice versa - this statement is true
120. Regarding the Myhill-Nerode theorem, the following statements are true:
a. The theorem is significant in the context of converting a DFA (Deterministic Finite Automaton) to an NFA (Non-deterministic Finite
Automaton)
121. In the context of formal languages, the following statements are true:
a. A context-sensitive language is accepted by an NFA (Non-deterministic Finite Automaton)
124. In Phong's illumination model, the calculated intensity of specular reflection is:
a. dependent on the angle between the normal vector to the surface and the vector in the direction of the light source and the angle between
the vector in the direction of the reflection and the vector in the direction of the observer.
127. Which of the following color models, are subtractive color models:
a. CMYK
137. If a virtual address in a program is 16-bit and the page size is 0.5K, we can address up to the following number of pages:
a. 16
138. If the operating system wants to run more than one program at a given moment in time:
a. it must meet requirements a), b), and c)
140. The initial value of a generalized semaphore implementing a critical section is:
a. -1
143. To avoid timing-dependent errors, the maximum number of processes that can be inside the critical section is:
a. 0
145. Which scheduling algorithm allows a process that can be executed to be temporarily suspended:
a. FIFO
147. LR parser:
a. reads input symbols from right to left
148. If grammar G is contex-free, the question whether G belongs to LL(k) for a given k
a. is decidable
151.
For a context-free grammar with the productions:
E→E+E
E→E*E
E → id
the following derivations are rightmost derivations:
a. E => E*E => E+E*E => E+E*id => E+id*id => id+id*id
158. The following statements are true about parsers belonging to the LL(k) class:
a. parameter k represents the number of errors after which a parser terminates
159. Which of the following options best describes Chomsky's classification of formal grammars?
a. Chomsky's classification includes four levels of grammars: regular, context-free, context-sensitive, and grammars with context-free
dependency
160. Which of the following statements best describes the role of a metalanguage in the context of semantic antinomies?
161. Which of the following statements best describes the difference between the selected programming language paradigms?
a. The imperative paradigm focuses on defining functions and avoiding state, while the declarative paradigm focuses on state mutation
through instructions
162. In the context of programming language paradigms, which of the following statements best characterize their properties?
a. The functional paradigm uses first-order logic to define problems, while the logical paradigm relies on recursion and the elimination of
global variables
163. Which of the following statements best describes the difference between certain types of algorithms?
a. A deterministic algorithm requires a large amount of memory, while a nondeterministic algorithm requires a minimal amount of memory
165. Which of the following statements about Hamming code are true:
a. Hamming code allows correcting errors involving the alteration of two bits
168. Mark correct results if you run the following command while working with the BASH shell in the Unix or Linux environment: rm / && echo
ok
a. there will be the following message on the standard output: ok
169. While working with the BASH shell in the Unix or Linux environment the file name pattern: data.{txt,sql,iq} will match the following files:
a. data.
171. While working with the BASH shell in the Unix or Linux environment a question mark (?) in a file name means:
a. a string of at least one character
173. While working with the BASH shell in the Unix or Linux environment a variable $? holds a value of:
a. the first character of the recently opened file
174. While working with the BASH shell in the Unix or Linux environment the following commend: ls | less will result in:
a. forwarding the standard output of less to the standard input of ls
175. While working with the BASH shell in the Unix or Linux environment setting 700 access permissions on a file means that:
a. no permissions for the group owner
176. While working with the BASH shell in the Unix or Linux environment using a keyboard shortcut: Control-c results in:
a. putting currently running process on hold
177. While working with the BASH shell in the Unix or Linux environment using a keyboard shortcut: Control-z results in:
a. putting the currently running process on hold
178. While working with the BASH shell in the Unix or Linux environment an asterisk (*) in a file name means:
a. any string of characters
179. While working in the Unix or Linux environment if a file name starts with a dot (.) it is:
a. write protected
180. While working with the BASH shell in the Unix or Linux environment the pattern: [123]data will match the following files:
a. data
181. What is the significance of the extension relationship in the context of UML use case diagrams?
a. Indicates that one use case can operate independently of others
182. What is the purpose of using the "include" («include») relationship in UML use case diagrams?
a. It specifies that one use case is entirely dependent on the functionality of another use case
183. What are the key features of Yourdon's structured approach to systems analysis?
a. Division of the system into functions that are independently analyzed and developed
184. What is the main characteristic of the spiral model in the software development lifecycle?
a. All requirements and design must be finalized before starting the first iteration
185. What are the main objectives of using the Scrum methodology?
a. Ensuring that the final product precisely matches the specifications defined at the beginning of the project
192. To limit the scope of changes in the system when modifying a part of the system, it is necessary to apply:
a. the dependency inversion principle
193. In the context of the model-driven approach to software development, it is not true that:
a. quality attributes do not affect the system architecture
201. In reference to and in the context of UML (Unified Modeling Language), the following can be stated:
a. Forward engineering involves analyzing an existing system and manually creating UML diagrams that reflect its structure and behavior
202. In reference to and in the context of UML (Unified Modeling Language), the following can be stated:
a. Backward engineering is the process of generating source code based on existing UML diagrams and design models
203. After executing a code fragment written in C:
int a,b=1;
a=b++ + b;
a. a will take on the value 4
205. Let's assume that the pointer variables t and s are of type char, additionally s points to a non-empty text string, and t to the memory address
starting the area allocated to our process. After executing the code fragment written in C:
while(*t++=*s++);
a. the pointers will increase their values accordingly without changing the contents of memory
a. in order to search for an element with a given value we have to perform exactly n steps in the worst case
211. If we have n numbers sorted and placed in a dynamic singly linked list, then:
a. to search for an element with a given value we have to look through half of all the elements of the list on average
212. When we have a dynamic data structure of the type unidirectional list, then:
a. you cannot remove any element from the list, because you can only remove the last element of the list
214. If we have a dynamic structure of the binary search tree (BST) type, where this is a tree that satisfies the property that for each node
containing value x and having a left child containing value l and a right child containing value p, we have: l<=x and x<=p, then:
a. in a balanced tree, in which the length of any two branches differs by at most 1, finding a node containing the value we are looking for
has logarithmic time complexity
215. Analyze fragments of C++ code containing variables, pointers, and references. Which of them have correct syntax?
a. int x;
int*ptr=&x;
int&r=*ptr;
216. Which statements regarding the restrictions imposed by C++ syntax on constructors and destructors are true?
a. A class can define at most one constructor and at most one destructor.
a.
The this pointer is the default argument for every class method (both non-static and static).
218.
Two C++ classes were declared
class A{
int value;
public:
A(int _v):value(_v){}
int getValue(){return value;}
const char*getName(){return "AAA";}
};
and
class B:public A {
public:
// place for constructor
a. B::B(){value=0;}
class B{
public:
B(){std::cout<<"B";}
};
class C{
A a;
public:
C(){std::cout<<"C";}
};
class D : public C{
public:
B b;
D(){std::cout<<"D";}
};
class B:public A {
public:
~B(){f();}
};
class C:public B {
public:
~C(){f();}
void f(){std::cout<<"C";}
};
When an object is deleted, its destructor is called. Which statements regarding the invoked destructors are true?
a. The destructor of class A will be invoked, and the virtual function called within it will print C.
221.
Which statements regarding operator overloading are true?
a. The operator is declared as:
TYPE operator+(std::string s, double v)
Assuming the operator does not cause side effects, the return type TYPE could be a reference type std::string&.
223. Which statements regarding the exception handling mechanism in C++ are true?
The std::vector container stores the data of its elements in an array. If is the number of elements in the vector returned by the
method std::vector<E>::size(), and is the size of an element returned by the operator sizeof(E), the memory size allocated for
this array is exactly .
225. Assume that A is a class in C++. What conditions must be met in order to store objects of this class in a std::set container or use them as
keys in a std::map?
a. If a specific comparator class is not provided when defining the container, a bool operator < must be defined to allow comparison of
objects of class A.
226. Which statements regarding iterators in C++ are true?
a. The iterator of the std::list container allows unrestricted access, meaning the iterator can be moved by any number of positions
forward or backward.
227. Which statements related to lambda expressions in C++ are true
a. Compilation of identical lambda expressions repeated in the code yields a single shared function object
229. What HTML5 tag should be use to display the video file content?
a. mp4
a. links
231. What is the goal of using the for attribute in the <label> tag in HTML5?
a. to specify the form element associated to the label
232. What is the purpose of using the defer attribute in the <script> tag in HTML5?
a. to delay the execution of a script until the page has finished parsing
234. Which http operation should be use to update some data of an existing user
a. PUT
235.
Which of the following API addresses (according to the REST API convention) should be used to return information about all user's cars with
id = 4
a. /users?id=4/cars/all
236.
indicate valid JSON format
a.
{
user : "Jan Kowalski",
age: "100"
}
Class C {
public static void main(String[] args) {
int[]a1[]=new int[3][3]; //3
a.
Exception during program execution
241.
The following source code was written in Java:
public class A extends Thread {
public int i;
public void run() { i = 1; }
public static void main(String[] args) throws Exception {
A a = new A();
a.start();
System.out.print(a.i);
Thread.sleep(1000);
System.out.print(a.i);
}}
What is the outcome of compilatiomn and execution of the above program?
242.
The following source code was written in Java:
class C{
public static void main(String[] args) {
try {
try {
try {}
catch(RuntimeException e){}
}
catch(Exception e) {}
}
catch(NullPointerException e) {}
finally {
System.out.println("finally");
}
}}
What is the result of compiling and running the program?
public class C {
public static void main ( String a[]) {
Thread t = Thread.currentThread ( ) ;
t.setPriority(-1);
System.out.println("Done!");
}
}
244.
The following source code was written in Java:
interface I{
void f1(); // 1
public void f2(); // 2
protected void f3(); // 3
private void f4(); // 4
}
Which lines are responsible for compilation errors? (line no in comments)
class C {
static int s;
public static void main(String a[]){
C obj=new C();
obj.m1();
System.out.println(s);
}
void m1() {
int x=1;
m2(x);
System.out.println(x+"");
}
void m2(int x){
x=x*2;
s=x;
}
}
What is the result of compiling and running the program?
246.
The following source code was written in Java:
class C {
public static void main(String[] args) {
int i1=1;
switch(i1){
case 1:
System.out.println("one ");
case 2:
System.out.println("two ");
case 3:
System.out.println("three ");
}}}
a. Compilation error
247.
}
public static void main(String a[]) {
C1.I.C2 ob1=new C1.I.C2();
System.out.println("obj created");
}
}
What is the result of compiling and running the program?
a. Compilation error
}
What is the result of compiling and running the program?
a. Will print: "0"
249.
How many objects (instances of class StringBuffer) will be created while executing the below program:
StringBuffer s1 = new StringBuffer("abc");
StringBuffer s2 = s1;
StringBuffer s3 = new StringBuffer("abc");
a. 4
250.
Which of the following methods is a static method in the Thread class available in the standard API for Java?
a. sleep
251.
Given the following program in Java:
class c1 {
public void m1() {
System.out.println("m1 in anonimous class");
}
}
class c2 {
public c1 m1() {
return new c1(){
public void m1() {
System.out.println("m1 in anonimous class");
}
}
}
public static void main(String a[]) {
c1 ob1 =new c2().m1();
ob1.m1();
}}
What will be the result of compiling and running this code as a program?
a.
Program will print string: "m1 in anonimous class"
252.
Given the following program in Java:
class C{
int i;
public static void main (String[] args) {
int i; //1
private int a = 1; //2
}}
What is the result of compilation and execution ot the program (line no in comments)?
a.
Compilation error in lines indicated by comments: //1, //2, //3, //4, //5
253.
Given the above code in Java:
}}
What is the result of trying to compile and run the above program using the following command?
command: java Command A B C
a.
Printing: BCD
254.
Given the above code in Java:
class C{
static String m(int i) {return "int";}
static String m(float i) {return "float";}
public static void main (String[] args) {
long a1 = 1; double b1 = 2;
System.out.print(m(a1)+","+ m(b1));
}}
What is the result of compilation and execution of the program?
a.
Printing: double,float
255. The Model-View-Controller (MVC) architecture pattern in ASP .NET Core MVC technology includes:
a. Controllers layer - defines a set of remotely invoked methods executed by the HTTP protocol.
256. To store the state of a web application (ephemeral data that you don't want to persist in a database) in ASP.NET CORE MVC, you can use:
a. Application cache (IMemoryCache)
257. Registering an event (the method that will be called to handle the event) in the C# language is done using an operator:
a. ++
260. Is it possible to create nested classes (declare a class inside the declaration of another class) in C#?
a. Yes.
262. In the C# language, you can use thread synchronization with the aid of:
a. Synchronization signals (“EventWaitHandle”).
263. Top-level statements in the C# language are subject to certain rules. Among them are:
a. There can be only one top-level code file in the project.
264. Which of the following type conversions (type casts) in the C# language are allowed?
a. Casting a reference to an object of any class to a reference to the class “Object”
265. The IPv4 address pool for IP Multicast groups (class D IPv4 address pool) is:
a.
0.0.0.0 – 127.255.255.255
266. Examples of the ISO OSI RM model layers (ISO Open Systems Interconnection Reference Model) used in computer networks are:
a. Presentation layer
267. A protocol used to avoid broadcast frame transmission loop in an Ethernet network (a so-called broadcast storm), is:
269. What technique will you use to connect the Internet when an IP network in the organization you work for have run out of IPv4 addresses for
new devices and additionally these devices should not be directly addressable from the Internet?
a. RPF (Reverse Path Forwarding)
270. The so-called salt, i.e. random data added to the password when calculating the hash function stored in computer systems, is intended to:
a. making difficult for users to re-use some old passwords
a. Verikey
274. Does TCP protocol have a transmission data length limit for each connection?
a. No
275. The length of MAC (Media Access Control) address used for NIC (Network Interface Card) addressing in layer 2 ISO OSI is:
a. 48 bits
276. An optical fiber in which a beam of light of the same wavelength can travel only in one path and several beams of the same wavelength
cannot be sent through this optical fiber at the same time is identified as:
a. mono-optical
278. Examples of communication protocol specifications for wireless networks or wireless communication systems are:
a. Dot1Q
280. The Big-M method finds an initial solution for the simplex algorithm. Select the true statements about this method:
a. Is sensitive to numerical errors.
281. The branch and bound method relies on comparing two values:
the lower bound of the objective function
the upper bound of the objective function
282. Select true (proven) statements about the computational complexity of the decision version of the knapsack problem:
a. Belongs to class NP-Complete.
a. The direction of the objective function (maximization/minimization) is reversed compared to the primal program.
285. What conditions must be met by the equality (canonical) form of linear programming:
a. The objective function must be maximized.
287. What characterizes the branch and bound method based on linear relaxation:
a. Allows solving problems with nonlinear constraints.
288. Select methods that can be used to solve the classical assignment problem:
a. Any algorithm that solves integer programming problems.
289. How many optimal solutions can exist for a linear programming problem:
a. Exactly two.
290. What does problem relaxation involve in the context of operations research:
a.
Relaxation involves adding surplus variables to the linear program.
a. Works in two phases, that is, it solves two models: first, it finds an initial solution, and then it solves the original problem.
293. Which of the following commands are correct, assuming that df is a DataFrame object of the Pandas library?
a. df.agg({'one': 'mean', 'four': 'sum'})
294. Which of the following statements are true regarding the Pandas library?
a. The merge command allows you to combine two DataFrame objects by matching values of selected columns (column-to-column),
without making additional modifications to these objects.
295. Assuming that s is a Series object in the Pandas library, the command s.map(x) will:
a. if x is a string, filter only those values in the Series object that contain the string x
296. Spherical reference systems (spatial reference systems, coordinate reference systems), such as WGS-84:
a. use coordinates given in degrees
297. Flat (isometric, projected) reference systems (spatial reference systems, coordinate reference systems), such as PUWG 2000:
a. allow calculating distances in their base unit (e.g., meters) between two points using the Pythagorean theorem alone, without additional
transformations
298. If data processing time is too long, one should:
a. distribute computations across multiple nodes in a cluster.
299. If data does not fit into available RAM during analysis, one should:
a. use a database.
300. Assuming that df is a DataFrame object in the Pandas library, the command df.apply(my_function) will:
a. call the function my_function each time the df object is modified
301. Assuming that df is a DataFrame object in the Pandas library, the command df.apply(my_function, axis=1) will:
a. execute the function my_function once
302. Which of the following data storage methods allow you to explicitly specify whether a value is an integer, a floating-point number, or text?
a. a JSON file
304. What are the standard methods used to evaluate models in supervised machine learning?
a. Monte Carlo method.
310. Which of the following methods are not typically used to evaluate models in supervised machine learning?
a. Area under the ROC curve.
311. What can be said about a machine learning model in the context of overfitting?
a. The machine learning model is too well-fitted to the training data.
316. What are examples of machine learning tasks used in supervised learning?
a. Regression
317. What are examples of machine learning tasks used in unsupervised learning?
a. Classification
318. One of the fundamental architectures of agent systems is the BDI architecture. In the context of agent systems, the abbreviation BDI is
explained as:
a. Belief-Desire-Intention
319. Select the true statements concerning the reversibility of cellular automata:
a. For reversible automata, the mapping realized by the transition function (transition rule) is a bijection.
322. What is the concept of emergence in complex systems modeling based on?
a. The use of the Model-View-Controller scheme
323. The simplest agent that makes a basic adaptation of its actions depending on environmental changes (without memory or learning effects) is
called:
a. A cognitive agent
324. The most important properties of complex systems in the domain of scale and time are:
a. Self-organization
325. Select which statements are true with respect to a homogeneous and synchronous Cellular Automaton (CA):
a. It is a discrete dynamic system whose behavior is strictly defined by local relationships.
328. Select the true statements concerning DES (Discrete Event Simulation) systems:
a. In the DES approach, the system is designed based on central control of processes and planning from the whole to the details (a top-
down approach).
329. Periodic boundary conditions for a Cellular Automaton imply the following properties for an object moving on the grid:
a. The moving object bounces off the edge after reaching the boundary cells of the grid and returns back onto the grid according to defined
reflection rules.
332. Which algorithms are used to assess the effectiveness of a predictive model?
a. Calculating eigenvalues
337. For features X and Y, a linear correlation coefficient of -0.95 was obtained. What does it mean?
a. Features X and Y are not correlated.
338. Having a complete confusion matrix, which metrics can be calculated to assess model quality?
a. Precision
341. Indicate the correct properties related to Principal Component Analysis (PCA).
a. Subsequent principal components are uncorrelated with each other.
342. What objections did Turing foresee against the validity of his proposed test?
a. The consequences of machine thinking will be too unpredictable, so let's hope they won't start doing it.
344. In binary classification, the following results were obtained: TP = 90; TN = 30; FP = 10; FN = 70. What is the positive predictive value?
a. 0.5
345. Predicting a person's one favorite color (out of 5 possible: {yellow, pink, blue, green, red}) is:
a. Regularization
347. What parameters need to be set in the DBSCAN algorithm for data clustering?
a. Neighborhood radius around a point.
348. Which of the following features best describe the k-means algorithm?
349. Which diagrams, due to their visual properties, are most effective for presenting the results of clustering by the k-means algorithm?
a. Scatter plot.
350. Which of the following options describe features or applications of the agglomerative clustering algorithm?
a. Ability to gain insight into data through visualization in the form of a dendrogram.
351. Which of the following statements accurately describe the Principal Component Analysis (PCA) method?
a. PCA creates components that are mutually orthogonal.
352. Which of the following applications are appropriate for the Apriori algorithm?
a. Data encryption.
353. Which of the following methods, algorithms, or techniques are used in unsupervised learning?
a. Decision Trees, Random Forests