Start learning 50% faster. Sign in now
The correct answer is B
Which of the following Big Data processing models is based on the concept of continuous data flow processing?
...What is the primary goal of Cyber Security?
Which of the following protocols is most commonly used in IoT devices to enable communication between smart devices?
Which file structure is best suited for handling large datasets and ensuring fast access in C, C++, Java, or Python?
Which of the following is a critical concern for securing critical infrastructure?
Which of the following algorithms is most appropriate for a sorting task that requires minimal auxiliary space?
Which of the following is a fundamental challenge in Natural Language Processing (NLP)?
Which algorithm is best suited for finding a Hamiltonian cycle in an undirected graph?
Which of the following is true about the time complexity of Merge Sort?
In mobile computing, what is the main feature of pervasive computing?