Top 350+ Solved Social Media Analytics (SMA) MCQ Questions Answer

From 151 to 165 of 304

Q. _________ models are sender-centric.

a. threshold models

b. Cascade Models

c. both

d. None of these

  • b. Cascade Models

Q. _________ models receiver-centric.

a. threshold models

b. Cascade Models

c. both

d. None of these

  • a. threshold models

Q. __________ examples of individual behavior modeling.

a. Cascade Models

b. threshold models

c. None of these

d. both

  • d. both

Q. _______measures can be used to calculate similarity

a. Katz measure

b. Rooted PageRank.

c. Hitting and Commute Time

d. all of the above

  • d. all of the above

Q. _______refers to a population of individuals behaving in a similar way.

a. user-user behavior

b. Collective behavior

c. User-Community Behavior

d. None of these

  • b. Collective behavior

Q. The user migration behavior is an example of collectivebehavior.

a. Collective behavior

b. user-user behavior

c. User-Community Behavior

d. None of these

  • a. Collective behavior

Q. which is the type of migration that take place in social media sites ?

a. site migration

b. attention migration

c. both

d. None of these

  • c. both

Q. Which is the general features can be considered for user migration ?

a. user activity on one site,

b. user network size

c. user rank.

d. all of the above

  • d. all of the above

Q. To analyze __________, there is a four-step procedure,

a. individual behavior

b. An observable behavior

c. Feature-Behavior Association.

d. None of these

  • a. individual behavior

Q. Which of the following is the most viral section of the internet?

a. Chat Messenger

b. Social networking sites

c. Tutorial sites

d. Chat-rooms

  • b. Social networking sites

Q. Identify the example of Nominal attribute

a. Temperature

b. Salary

c. Mass

d. Gender

  • d. Gender

Q. Which of the following is not an appropriate measure for securing social networking accounts?

a. Strong passwords

b. Link your account with a phone number

c. Never write your password anywhere

d. Always maintain a soft copy of all your passwords in your PC

  • d. Always maintain a soft copy of all your passwords in your PC

Q. Which of the following is not a data pre-processing methods

a. Data Visualization

b. Data Discretization

c. Data Cleaning

d. Data Reduction

  • a. Data Visualization
Subscribe Now

Get All Updates & News