Top 350+ Solved Social Media Analytics (SMA) MCQ Questions Answer
Q. _________ models are sender-centric.
a. threshold models
b. Cascade Models
c. both
d. None of these
Q. _________ models receiver-centric.
a. threshold models
b. Cascade Models
c. both
d. None of these
Q. __________ examples of individual behavior modeling.
a. Cascade Models
b. threshold models
c. None of these
d. both
Q. _______measures can be used to calculate similarity
a. Katz measure
b. Rooted PageRank.
c. Hitting and Commute Time
d. all of the above
Q. _______refers to a population of individuals behaving in a similar way.
a. user-user behavior
b. Collective behavior
c. User-Community Behavior
d. None of these
Q. The user migration behavior is an example of collectivebehavior.
a. Collective behavior
b. user-user behavior
c. User-Community Behavior
d. None of these
Q. which is the type of migration that take place in social media sites ?
a. site migration
b. attention migration
c. both
d. None of these
Q. Which is the general features can be considered for user migration ?
a. user activity on one site,
b. user network size
c. user rank.
d. all of the above
Q. To analyze __________, there is a four-step procedure,
a. individual behavior
b. An observable behavior
c. Feature-Behavior Association.
d. None of these
Q. _____is as a microblogging service that allows people to communicate with short, 140-character messages that roughly correspond to thoughts or ideas.
a. Twitter
b. Facebook
c. Instagram
d. None of the above
Q. _______relationship model allows you to keep up with the latest happenings of any other user, even though that other user may not choose to follow you back or even know that you exist.
a. Facebook
b. Instagram
c. Twitter
d. LInkedIn
Q. Which of the following is the most viral section of the internet?
a. Chat Messenger
b. Social networking sites
c. Tutorial sites
d. Chat-rooms
Q. Which of the following is not an appropriate measure for securing social networking accounts?
a. Strong passwords
b. Link your account with a phone number
c. Never write your password anywhere
d. Always maintain a soft copy of all your passwords in your PC
Q. Which of the following is not a data pre-processing methods
a. Data Visualization
b. Data Discretization
c. Data Cleaning
d. Data Reduction