question
stringlengths 4
6.13k
| question_id
int64 0
49.1k
| dataset
stringclasses 3
values | category
stringclasses 75
values |
|---|---|---|---|
The Shannon theorem states that perfect secrecy implies...
| 0
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \emph{incorrect} assertion. The perfect cipher over $\left\{ 0,1 \right\}^\ell$ is \dots?
| 1
|
epfl_qa
|
epfl_dpo_qa
|
Let $n$ be an integer. What is the cardinality of $\mathbf{Z}^*_n$?
| 2
|
epfl_qa
|
epfl_dpo_qa
|
(Nearest Neighbor) The training error of the 1-nearest neighbor classifier is zero.
| 3
|
epfl_qa
|
epfl_dpo_qa
|
You are given the task of choosing the parameters of a hash function. What value of the output will you recommend in order to be minimal and secure against second preimage attacks?
| 4
|
epfl_qa
|
epfl_dpo_qa
|
A query transformed into the concept space of LSI has?
| 5
|
epfl_qa
|
epfl_dpo_qa
|
How many different simple substitution ciphers do exist with respect to an alphabet of 26 characters?
| 6
|
epfl_qa
|
epfl_dpo_qa
|
In JOS, suppose one Env sends a page to another Env. Is the page copied?
| 7
|
epfl_qa
|
epfl_dpo_qa
|
(Bayes Nets) We are given a Bayes net involving the variables $X_{1}, \cdots, X_{n}$. We determine, using our standard rules, that $X_{1} \perp X_{2} \mid X_{3}$. Assume now that you delete some edges in the original Bayes net. For the modified Bayes net, is it always true that $X_{1} \perp X_{2} \mid X_{3}$ ?
| 8
|
epfl_qa
|
epfl_dpo_qa
|
A MAC forgery is\dots?
| 9
|
epfl_qa
|
epfl_dpo_qa
|
Select the morpho-syntactic categories that do not carry much semantic content and are thus usually filtered-out from indexing.
| 10
|
epfl_qa
|
epfl_dpo_qa
|
Let $n$ be an integer. Which of the following is \emph{not} a group in the general case?
| 11
|
epfl_qa
|
epfl_dpo_qa
|
Determine which of the following conditional statements evaluate to true (more than one answer can be correct):?
| 12
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{false} assertion. $C(P_0,P_1)\ldots$?
| 13
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following statement(s) is/are correct?
| 14
|
epfl_qa
|
epfl_dpo_qa
|
In JOS, after finishing the execution of a user-level page fault handler, how is the program control flow transferred back to the program? (You may get insights from the code snippet of _pagefault_upcall.)?
| 15
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following statements regarding distant supervision is correct?
| 16
|
epfl_qa
|
epfl_dpo_qa
|
When computing PageRank iteratively, the computation ends when:?
| 17
|
epfl_qa
|
epfl_dpo_qa
|
The multiplication of two quadratic residues ...
| 18
|
epfl_qa
|
epfl_dpo_qa
|
Information extraction:?
| 19
|
epfl_qa
|
epfl_dpo_qa
|
Church booleans are a representation of booleans in the lambda calculus. The Church encoding of true and false are functions of two parameters: Church encoding of tru: t => f => t Church encoding of fls: t => f => f What should replace ??? so that the following function computes not(b and c)? b => c => b ??? (not b)?
| 20
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following is/are typical AddressSanitizer use cases?
| 21
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \emph{false} answer. In a group, the operation\dots?
| 22
|
epfl_qa
|
epfl_dpo_qa
|
When using linear regression, which techniques improve your result? (One or multiple answers)?
| 23
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{false} assertion.
| 24
|
epfl_qa
|
epfl_dpo_qa
|
Select the \emph{incorrect} statement. Problems in Bluetooth includes:?
| 25
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following is \textbf{not} a finite field.
| 26
|
epfl_qa
|
epfl_dpo_qa
|
Thick the \emph{incorrect} assertion.
| 27
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following statements is extbf{incorrect} ? Training a model with $L_1$-regularization ...
| 28
|
epfl_qa
|
epfl_dpo_qa
|
Let $\mathcal{C}$ be the $(6,3)$ linear code on $\mathbb{F}_3$ whose parity-check matrix is egin{equation*} H = egin{pmatrix} 2 &0 &1 &1 &1 &0 \ 1 &2 &0 &0 &1 &1 \ 0 &0 &0 &1 &1 &1 \end{pmatrix}. \end{equation*} True or false: The matrix egin{equation*} ilde{H} = egin{pmatrix} 1 &0 &2 &2 &2 &0 \ 2 &1 &0 &0 &2 &2 \ 0 &0 &0 &2 &2 &2 \end{pmatrix} \end{equation*} is also a valid parity-check matrix for $\mathcal{C}$.
| 29
|
epfl_qa
|
epfl_dpo_qa
|
Feature degeneracy:?
| 30
|
epfl_qa
|
epfl_dpo_qa
|
What is WRONG regarding the Transformer model?
| 31
|
epfl_qa
|
epfl_dpo_qa
|
What is $\lambda (91)$, i.e. the exponent of $\mathbb{Z}_{91}^*$?
| 32
|
epfl_qa
|
epfl_dpo_qa
|
Let $n$ be an integer. Which of the following is \emph{not} a group in the general case?
| 33
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \emph{wrong} assertion concerning 3G.
| 34
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{false} statement regarding the DES round function.
| 35
|
epfl_qa
|
epfl_dpo_qa
|
Let $G$, be a valid generator matrix of dimensions $\mathbb F^{k imes n}$. Recall that ``valid'' means that $k \leq n$ and $ ext{rank}(G) = k$. Let $D_1 \in \mathbb F^{k imes k}$ and $D_2 \in \mathbb F^{n imes n}$ be diagonal matrices with non-zero diagonal elements. True or false: $D_1 \cdot G \cdot D_2$ is also a valid generator matrix.
| 36
|
epfl_qa
|
epfl_dpo_qa
|
The Vernam cipher \ldots?
| 37
|
epfl_qa
|
epfl_dpo_qa
|
When using linear regression, which techniques improve your result? (One or multiple answers)?
| 38
|
epfl_qa
|
epfl_dpo_qa
|
When using linear regression, what can cause numerical instabilities? (One or multiple answers)?
| 39
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{true} assertion. Let $X$ be a random variable that is equal to zero with probability 1/2 and to 1 with probability 1/2. Since the variance of $X$ is $V(X)=E((X-E(X))^2)= E(X^2)-(E(X))^2$, here $V(X)$ is:?
| 40
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following scheduler policies are preemptive?
| 41
|
epfl_qa
|
epfl_dpo_qa
|
Suppose that an item in a leaf node N exists in every path. Which one is correct?
| 42
|
epfl_qa
|
epfl_dpo_qa
|
When using linear regression, which techniques improve your result? (One or multiple answers)?
| 43
|
epfl_qa
|
epfl_dpo_qa
|
Which adversarial model corresponds to Linear Cryptanalysis?
| 44
|
epfl_qa
|
epfl_dpo_qa
|
Suppose that an item in a leaf node N exists in every path. Which one is correct?
| 45
|
epfl_qa
|
epfl_dpo_qa
|
In an FP tree, the leaf nodes are the ones with:?
| 46
|
epfl_qa
|
epfl_dpo_qa
|
Which protocol does \emph{not} use RC4.
| 47
|
epfl_qa
|
epfl_dpo_qa
|
(Robustness) The $l_{1}$ loss is less sensitive to outliers than $l_{2}$.
| 48
|
epfl_qa
|
epfl_dpo_qa
|
What is the support of the itemset {beer, chocolate} and the confidence of the rule {chocolate} → {beer} in the dataset below?TID: Items BoughtT1: milk, butter, beerT2: milk, diaper, beer, eggsT3: butter, diaper, beer, chocolate
T4: milk, butter, diaper, beerT5: milk, butter, diaper, chocolate
?
| 49
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{false} statement.
| 50
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{non-commutative} operation.
| 51
|
epfl_qa
|
epfl_dpo_qa
|
In order to have security of $2^{128}$ against key recovery attack for a (secure) symmetric key encryption scheme \ldots?
| 52
|
epfl_qa
|
epfl_dpo_qa
|
The Kerckhoffs Principle states that ...
| 53
|
epfl_qa
|
epfl_dpo_qa
|
How many different simple substitution ciphers do exist with respect to an alphabet of 26 characters?
| 54
|
epfl_qa
|
epfl_dpo_qa
|
Recall that we say that a kernel $K: \R imes \R
ightarrow \R $ is
valid if there exists $k \in \mathbb{N}$ and $\Phi: \R
ightarrow \R^k$
such that for all $(x, x') \in \R imes \R $, $K(x, x') = \Phi(x)^ op \Phi(x')$. The kernel $K(x, x') = \cos(x + x')$ is a valid kernel.
| 55
|
epfl_qa
|
epfl_dpo_qa
|
When representing the adjacency list of a Web page in a connectivity server by using a reference list from another Web page, the reference list is searched only in a neighboring window of the Web page's URL, because:?
| 56
|
epfl_qa
|
epfl_dpo_qa
|
Let $X$, $Y$, and $K$ be respectively the plaintext, ciphertext, and key distributions. $H$ denotes the Shannon entropy. The consequence of perfect secrecy is \dots?
| 57
|
epfl_qa
|
epfl_dpo_qa
|
For $K$ a field, $a,b\in K$ with $4a^3+27b^2 \neq 0$, $E_{a,b}(K)$ is?
| 58
|
epfl_qa
|
epfl_dpo_qa
|
MD5 is?
| 59
|
epfl_qa
|
epfl_dpo_qa
|
For $p$ prime and an arbitrary odd $n$, the symbol $\left( {p \over n} \right)$ denotes?
| 60
|
epfl_qa
|
epfl_dpo_qa
|
Select the \emph{incorrect} statement.
| 61
|
epfl_qa
|
epfl_dpo_qa
|
A vending machine dispensing books of stamps accepts only $1 bills, $2 bills and $5 bills.
Find a recurrence relation for the number of ways to deposit $$n$$ dollars in the vending machine, where the order in which the coins and bills are deposited matters.
| 62
|
epfl_qa
|
epfl_dpo_qa
|
Mean Square Error loss:?
| 63
|
epfl_qa
|
epfl_dpo_qa
|
What should be the type of value ? // list: List[String] list.foldLeft(value)((x, y) => x + y.length)?
| 64
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following statement(s) is/are correct?
| 65
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following statements are true?
| 66
|
epfl_qa
|
epfl_dpo_qa
|
Given graph 1→2, 1→3, 2→3, 3→2, switching from Page Rank to Teleporting PageRank will have an influence on the value(s) of:?
| 67
|
epfl_qa
|
epfl_dpo_qa
|
What adversarial model does not make sense for a message authentication code (MAC)?
| 68
|
epfl_qa
|
epfl_dpo_qa
|
Given 3 users with ratings
u1: 1, 3
u2: 2, 4
u3: 1, 4?
| 69
|
epfl_qa
|
epfl_dpo_qa
|
CBC can deal with three types of IV. Tick the \emph{false} answer.
| 70
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following congruence classes has a multiplicative inverse?
| 71
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{true} assertion. In a zero-knowledge interactive proof for $L$, \ldots?
| 72
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following is true regarding the random forest classification algorithm?
| 73
|
epfl_qa
|
epfl_dpo_qa
|
Let $n$ be any positive integer. Three of the following assertions are equivalent. Tick the remaining one.
| 74
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \emph{true} assertion among the followings:?
| 75
|
epfl_qa
|
epfl_dpo_qa
|
In WEP\dots?
| 76
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following integers has the square roots $\{2,3\}$ when taken modulo $5$ \textbf{and} the square roots $\{3,10\}$ when taken modulo $13$.
| 77
|
epfl_qa
|
epfl_dpo_qa
|
Given that JOS has correctly initialized the IDT and installed all the interrupt handlers. Which of the following will JOS do if the CPU with CPL = 3 tries to read the memory in data segment with DPL = 0?
| 78
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following is true for Recommender Systems (RS)?
| 79
|
epfl_qa
|
epfl_dpo_qa
|
The feature ``deck structure type'' can have the following values:
Cast-in-place Concrete,
Concrete Precast Panel,
Open Grating,
Closed Grating,
Steel plate,
Corrugated Steel,
Aluminum and
Timber.
For logistic regression, what is the best encoding for these values? (One or multiple answers)?
| 80
|
epfl_qa
|
epfl_dpo_qa
|
The multiplication of two quadratic residues ...
| 81
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following algorithms is \emph{not} a hash function?
| 82
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following scheduler policies are preemptive?
| 83
|
epfl_qa
|
epfl_dpo_qa
|
The worst case complexity of an exaustive search (with memory) against DES is\dots?
| 84
|
epfl_qa
|
epfl_dpo_qa
|
Let $(G,+)$ be a group of order $n$. If $g$ is a generator of this group, then it has order\dots?
| 85
|
epfl_qa
|
epfl_dpo_qa
|
Bluetooth pairing v2.0 is based on\dots?
| 86
|
epfl_qa
|
epfl_dpo_qa
|
Let $E$ be an elliptic curve. Solving which of the following problems would help you to break Elliptic Curve Diffie-Hellman (ECDH) over $E$?
| 87
|
epfl_qa
|
epfl_dpo_qa
|
The CRT implies?
| 88
|
epfl_qa
|
epfl_dpo_qa
|
What is the mean squared error of $f$ for a sample, where $\textbf{x}$ is an input, $y$ a target and $f(\textbf{x},W)$ the mapping function ?
(One answer)?
| 89
|
epfl_qa
|
epfl_dpo_qa
|
You are given the following collection of premises:
If I go to the museum, it either rains or snows.
I went to the museum on Saturday or I went to the museum on Sunday.
It did not rain and it did not snow on Saturday.
It did not rain on Sunday.
Which conclusions can be drawn from these premises ? (more than one answer can be correct)?
| 90
|
epfl_qa
|
epfl_dpo_qa
|
In the first pass over the database of the FP Growth algorithm?
| 91
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{false} assertion.
| 92
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following graph analysis techniques do you believe would be most appropriate to identify communities on a social graph?
| 93
|
epfl_qa
|
epfl_dpo_qa
|
Which of the following is correct regarding schemas and ontologies?
| 94
|
epfl_qa
|
epfl_dpo_qa
|
In RSA, we use CRT ...
| 95
|
epfl_qa
|
epfl_dpo_qa
|
Suppose that q is density reachable from p. The chain of points that ensure this relationship are {t,u,g,r}. Which of the following is always true?
| 96
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textbf{correct} assertion. Let $G$ be a cyclic multiplicative group of order $101$, let $g$ be a generator of $G$, and let $e_G$ be the neutral element of $G$.
| 97
|
epfl_qa
|
epfl_dpo_qa
|
Tick the \textit{correct} assertion.
| 98
|
epfl_qa
|
epfl_dpo_qa
|
Let $\mathcal{C}$ be a binary $(6,3)$ linear code containing the codewords $\mathbf{x}_1 = 011011$, $\mathbf{x}_2 = 101101$ and $\mathbf{x}_3 = 111000$. True or false: The minimum distance of the code is $d_{\min} = 3$.
| 99
|
epfl_qa
|
epfl_dpo_qa
|
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 35