0% found this document useful (0 votes)
330 views

Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
330 views

Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 50

Which of the following is/are anonymous social networking sites ?

Whisper

Sarahah

Facebook

X (Formerly Twitter)
Accepted Answers: Whisper Sarahah

Which of the following statements is/are true about ephemeral content on social
networks ?

Content on social networks disappears after a fixed period of time.

Snaps on Snapchat are an example of ephemeral content.

Stories on Instagram are an example of ephemeral content.

None of the above.


Accepted Answers: Content on social networks disappears after a fixed period of time.
Snaps on Snapchat are an example of ephemeral content.
Stories on Instagram are an example of ephemeral content.
Which of the following 4 V’s of Social Media addresses the correctness of information
posted online ?

Velocity

Veracity

Volume

Variety
Accepted Answers: Veracity

Facebook Friends and Instagram Followers follow the principles of a unidirectional


network.

True

False
Accepted Answers: False

____ helps users on social media to find posts related to a specific topic by clicking or
searching.

Mentions

Hashtags

Shares

Likes
Accepted Answers: Hashtags

Degrees of Separation has reduced on Social Media due to:


Facilitating Connections and Interactions across various locations

Interconnected Networks

Share Information and Communicate Globally

None of the Above


Accepted Answers: Facilitating Connections and Interactions across various locations
Interconnected Networks
Share Information and Communicate Globally
Which of the following is the correct syntax for installing numpy version 1.21.5

pip3 install numpy==1.21.5

pip3 install package==numpy version==1.21.5

pip3 install numpy --v=1.21.5

None of the above


Accepted Answers: pip3 install numpy==1.21.5
Which of the following libraries can be used to send and receive requests to a server?

numpy

requests

math

None of the above


Accepted Answers: requests
A self-contained directory containing its own Python installation (for a particular version
of Python) and libraries, allowing it to manage and isolate project dependencies.

Python Standard Libraries

PIP

Virtual Environment

None of the above


Accepted Answers: Virtual Environment
Which of the following are the advantages of a version control system ?

Helps in keeping a record of all changes made to a file in its history.

Allows for collaboration between various people working on the same project.

Allows for backup and recovery in a project.

None of the Above


Accepted Answers: Helps in keeping a record of all changes made to a file in its history.
Allows for collaboration between various people working on the same project.
Allows for backup and recovery in a project.
Social Media constitutes:

Social Networks (Facebook, LinkedIn etc.)

Virtual Worlds (Habbo, Club Penguin etc.)


Livecasts (Twitch, Yahoo! Live etc.)

Content Sharing Platforms (YouTube, Flickr etc.)


Accepted Answers: Social Networks (Facebook, LinkedIn etc.)
Virtual Worlds (Habbo, Club Penguin etc.)
Livecasts (Twitch, Yahoo! Live etc.)
Content Sharing Platforms (YouTube, Flickr etc.)
Which of the following platforms allow for managing/hosting git repositories ?

GitHub

GitLab

Bitbucket

All of the above


Accepted Answers: All of the above
Select the correct syntax for allowing git to track all files in a repository (assume you are
in the root of the repository)

git add --all

git commit -m "track"

git status

git log
Accepted Answers: git add --all
Creating a new file in a git repository adds it to :

Tracked Files

Untracked Files

Remote Repository

None of the Above


Accepted Answers: Untracked Files

Select the correct syntax for pushing an existing repository to a remote repository on
GitHub

git push origin master

git commit -m "Push to GitHub"

git add remote origin

git pull origin master


Accepted Answers: git push origin master

Which of the following is the correct syntax for installing a package Ubuntu computer ?

sudo apt install <PACKAGE_NAME>

sudo apt-<PACKAGE_NAME> install ubuntu

sudo apt-install <PACKAGE_NAME>


sudo get <PACKAGE_NAME>
Accepted Answers: sudo apt install <PACKAGE_NAME>

What does JSON stand for ?

JavaScript Object Notation

Java Standard Object Notation

JSON Scripted Object Name

Joint Syntax Object Network


Accepted Answers: JavaScript Object Notation

In which of the following formats does an API usually return its response?

JSON

XML

TSV

None of the above


Accepted Answers: JSON & XML

MongoDB stores data in a structure most similar to ____.

JSON

SQL

XML

None of the above


Accepted Answers: JSON

MySQL can be used for querying relational databases.

True

False
Accepted Answers: True

Given a MongoDB collection named "words" with the following document structure:
{
"_id":ObjectId("615243d88f0ae43f255874c1"),
"count": 300,
"department": "the"
}
Which MongoDB query would you use to retrieve all words with count in descending order
?

db.words.find().sort({ count: -1 })

db.words.find().sort({ count: 1 })

db.words.find().order_by("count", DESCENDING}
db.words.find().sort({ descending: 1 })
Accepted Answers: db.words.find().sort({ count: -1 })

Which of the following are the components of a graph ?

Vertices

Edges

Unique Identifier/ID

All of the Above


Accepted Answers: All of the Above
Which of the following is true regarding the situation depicted in the graph below

False information/rumors spreads faster than facts/true information on social media

True information spreads faster than false information/rumors on social media

Cannot be Determined
Accepted Answers: False information/rumors spreads faster than facts/true information
on social media

Select the correct sequence of steps taken towards evaluating social media data.

Data Collection/Filtering > Data Characterization > Data Classification > Data
Evaluation

Data Collection/Filtering > Data Characterization > Data Evaluation > Data
Classification
Data Characterization > Data Collection/Filtering > Data Evaluation > Data
Classification

Data Characterization > Data Collection/Filtering > Data Classification > Data
Evaluation
Accepted Answers: Data Collection/Filtering > Data Characterization > Data
Classification > Data Evaluation

Which of the following attributes can be inferred from data collected via X (formerly
Twitter) ?

Number of Likes of the Tweet

Number of times the Tweet has been viewed

Unique identifier of the user/author of the Tweet

None of the above


Accepted Answers: Number of Likes of the Tweet, Number of times the Tweet has been
viewed
Unique identifier of the user/author of the Tweet

Which of the following processes can be used to receive annotated posts while
determining their legitimacy ?

A group of friends annotating posts given to them

Crowd-sourcing / Mechanical Turk

Getting Data from Fact Checking / News Outlets

All of the above


Accepted Answers: All of the above

TweetCred is a chrome extension that ranks the credibility of each tweet on Twitter.

True

False
Accepted Answers: True

Which Python library would you most likely use to get the top 10 hot posts from the
subreddit "r/politics" using the Reddit API?

praw

requests

urllib

json
Accepted Answers: praw

An indicator similar to hashtags is called ______ on Reddit.


Flair

Karma

Comment

Upvote
Accepted Answers: Flair

Communities on Reddit are called ______

Subreddits

Flairs

Threads

None of the above


Accepted Answers: Subreddits

A higher Follower-Friend ratio on Twitter can be associated with the popularity of the
user

True

False
Accepted Answers: True

Select the correct sequence of steps as used by Facebook Inspector (as Discussed in
Lecture)

Data Collection > Ground Truth Extraction > Feature Generation > Supervised
Learning > Result via RESTful API

Feature Generation > Data Collection > Supervised Learning > Ground Truth
Extraction > Result via RESTful API

Ground Truth Extraction > Data Collection > Supervised Learning > Feature
Generation > Result via RESTful API

Data Collection > Feature Generation > Ground Truth Extraction > Supervised
Learning > Result via RESTful API
Accepted Answers: Data Collection > Ground Truth Extraction > Feature Generation >
Supervised Learning > Result via RESTful API

Which of the following is/are correct statements in context of Web of Trust Score?

Web of Trust score outputs the reputation of an input website

Domain Age can be used as a feature for a Web of Trust score

Domain Owner can be used a feature for a Web of Trust score

None of the Above


Accepted Answers: Web of Trust score outputs the reputation of an input website
Domain Age can be used as a feature for a Web of Trust score
Domain Owner can be used a feature for a Web of Trust score
“Shantanu never likes people taking his photo because he doesn’t want it to be posted
online”. According to Westin’s 3 Categories, Shantanu is a :

Fundamentalist

Pragmatist

Unconcerned

None of the above


Accepted Answers: Fundamentalist

"Geeta browses all social media websites on her laptop casually, but always opens her
banking website in incognito for checking her balance” According to Westin’s 3
Categories, Geeta is a :

Fundamentalist

Pragmatist

Unconcerned

None of the above


Accepted Answers: Pragmatist

According to Westin’s 3 Categories, the lowest percentage of US citizens fall into the
category of (as discussed in the lecture):

Fundamentalist

Pragmatist

Unconcerned
Accepted Answers: Unconcerned

According to Westin’s 3 Categories, the highest percentage of US citizens fall into the
category of (as discussed in the lecture) :

Fundamentalist

Pragmatist

Unconcerned
Accepted Answers: Pragmatist

Which of the following can be used in authentication for the Twitter API ?

Bearer Token

Client ID

Client Secret

None of the above


Accepted Answers: Bearer Token, Client ID & Client Secret

Which of the following can be achieved using Twitter API ?

Retrieving reverse chronological home timeline

Retrieving user Tweet timeline

Retrieving user mention timeline

None of the above


Accepted Answers: Retrieving reverse chronological home timeline
Retrieving user Tweet timeline & Retrieving user mention timeline
Which of the following is the correct syntax for creating a tweets table with the specified
attributes?

tweet_id : Primary Key, Not Null


text: Not Null

CREATE TABLE tweets (


tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id)
);

CREATE tweets TABLE (


tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id)
);

CREATE TABLE (
tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id),
TABLE NAME(tweets)
);
CREATE TABLE tweets (
tweet_id VARCHAR(50),
text VARCHAR(500),
PRIMARY KEY (tweet_id),
NOT NULL (text)
);

Accepted Answers: CREATE TABLE tweets (


tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id)
);
Consider a table named “users” containing user profiles from Twitter, which of the
following attributes can be used as a primary key in the table :

Full Name of the User

User ID of the User

No. of Followers of the User

No. of Tweets by the User


Accepted Answers: User ID of the User

Read through the report “Privacy in India: Attitudes and Awareness V 2.0”
at https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/research/privacyindia/
PI_2012_Complete_Report.pdf And answer the following questions [11-12] :
Which of the following method(s) were used for gathering information across India in the
report above ?

Surveys

Focus Group Discussions

Interviews

None of the above


Accepted Answers: Surveys, Focus Group Discussions & Interviews
Which of the following methods resulted in the largest number of respondents across
India ?

Surveys

Focus Group Discussions

Interviews

None of the above


Accepted Answers: Surveys
A table in SQL is called a ______ in MongoDB.

Database

Index

Document
Collection
Accepted Answers: Collection
A row in SQL is called a ______ in MongoDB.

Collection

Field

Index

Document
Accepted Answers: Document
Which of the following can be used to create a new database called “project” and create
a collection named “users” inside it in MongoDB ?

1. use project;
2. db.users.insert({});

1. use project;
2. db.users.insert();

1. create_db project;
2. db.users.insert({});

1. create project;
2. db.users.insert();
Accepted Answers: 1. use project; 2. db.users.insert({});

What are the different forms of Privacy?

Information

Communication

Territorial

Bodily
Accepted Answers: Information Communication Territorial Bodily

“Please Rob Me” highlighted issues specifically stemming from:

Public Self-Disclosure of Information on Social Media by users

Data leaks from social media websites due to hacking attempts

Sharing passwords with your friends on Social Media

None of the Above


Accepted Answers: Public Self-Disclosure of Information on Social Media by users

Using an unidentified source of information to extract an individual’s sensitive


information is called :

Re-identification

Personally Identifiable Information


Self-Disclosure

None of the above


Accepted Answers: Re-identification
Considering each attribute in isolation, which of the following are examples of Personally
Identifiable Information (PII):

Race

Age

Aadhaar Number

College Student ID
Accepted Answers: Aadhaar Number College Student ID

What is the purpose of k-anonymity as discussed in the lecture?

Protect PIIs of re-identified individuals

Anonymise data without losing utility

Make datasets larger for analysis

None of the above


Accepted Answers: Protect PIIs of re-identified individuals Anonymise data without
losing utility
Latanya Sweeney’s experiments aimed to :

Re-identify individuals from Match.com using their Facebook profiles

Identification of individuals walking on a campus with data from Facebook

Predict social security number from publicly available data

Study behaviors of individuals aged 14-18 on Instagram


Accepted Answers: Re-identify individuals from Match.com using their Facebook profiles
Identification of individuals walking on a campus with data from Facebook
Predict social security number from publicly available data
What are the advantages of NumPy Arrays over Lists in Python?

NumPy arrays are faster and more compact than Python lists.

NumPy uses much less memory to store data and it provides a mechanism of
specifying the data types.

This allows the code to be optimized even further.

None of the above.


Accepted Answers: NumPy arrays are faster and more compact than Python lists.
NumPy uses much less memory to store data and it provides a mechanism of specifying
the data types.
This allows the code to be optimized even further.
Write Python code to convert the list [1,2,3,4] to a NumPy array.

import numpy as np
arr = np.array([1,2,3,4])

import numpy as np
arr = numpy.array([1,2,3,4])

import numpy as np
arr = np.array(1,2,3,4)

All of the above


Accepted Answers: import numpy as np arr = np.array([1,2,3,4])
What is the output of the following code:

import numpy as np
a = np.array([range(i,i+3) for i in [1,2,3]])
print(a)

[[1 2 3]
[2 3 4]
[3 4 5]]

[[1 2 3]
[1 2 3]
[1 2 3]]

[[1 2 3]
[4 5 6]
[7 8 9]]

None of the above


Accepted Answers:
[[1 2 3]
[2 3 4]
[3 4 5]]

Which of the following codes can be used to make a NumPy array of 10 random numbers?

import numpy as np
import random

l = []
for i in range(10):
l.append(random.random())

zeros_array = np.array(l)
print(zeros_array)

import numpy as np
random_array = np.random.rand(10)
import numpy as np
random_array = np.random.random(10)

None of the above


Accepted Answers:
import numpy as np
import random

l = []
for i in range(10):
l.append(random.random())

zeros_array = np.array(l)
print(zeros_array)
import numpy as np
random_array = np.random.rand(10)

import numpy as np
random_array = np.random.random(10)
Which of the following NumPy functions can be used to generate an NxN diagonal
matrix ?

np.eye (5)

np.diagonal(np.eye (5))

np.diagonal (5)

None of the above


Accepted Answers: np.eye (5)

Which of the following Python code can be used to read a CSV file using Pandas

import pandas as pd
data = pd.read_excel('file.csv')

import pandas as pd
data = pandas.readcsv('file.csv')

import pandas as pd
data = pd.read_csv('file.csv')

None of the above.


Accepted Answers: import pandas as pd
data = pd.read_csv('file.csv')

Consider the below structure of a dataframe.


Which of the following Python snippets can be used to plot a histogram of the amount
column ?
Assume df is defined as the above dataframe with 100 rows.

df['amount'].plot.hist()

df[df.columns[4]].plot.hist()

import matplotlib.pyplot as plt


plt.hist(df['amount'])
plt.xlabel('Amount')
plt.ylabel('Frequency')
plt.title('Histogram of Amount')
plt.show()

None of the Above


Accepted Answers: df['amount'].plot.hist()
df[df.columns[4]].plot.hist()
import matplotlib.pyplot as plt
plt.hist(df['amount'])
plt.xlabel('Amount')
plt.ylabel('Frequency')
plt.title('Histogram of Amount')
plt.show()
What is the output of the following code?
pd.Series(['A', 'B', 'C'], index=[1, 2, 3])

1 A
2 B
3 C

A 1
B 2
C 3

A B
C 1
2 3

None of the above


Accepted Answers:
1 A
2 B
3 C

Select the correct option for plotting the below function using matplotlib

plt.plot(np.cos(x))
plt.show()

plt.scatter(x, np.sin(x))
plt.show()

plt.scatter(np.cos(x), x)
plt.show()

None of the above


Accepted Answers: plt.plot(np.cos(x)) plt.show()

What are the outcomes of publicizing police interactions on X (formerly Twitter) ?

Appreciation of the Police by the Public

Increased Trust in the Police

Quick Resolutions of Public Grievances

None of the above


Accepted Answers: Appreciation of the Police by the Public
Increased Trust in the Police
Quick Resolutions of Public Grievances
As discussed in the lectures, which of the following campaigns on social media to create
trust in the police backfired ?

#myNYPD

#myLAPD

#myDelhiPolice

All of the above


Accepted Answers: #myNYPD
As of January 1, 2024 : Which of the following verification check marks are applied to
Law Enforcement Accounts on X (formerly Twitter) ?

Blue Check Mark

Grey Check Mark

Gold Check Mark

None of the above


Accepted Answers:

Grey Check Mark


Which of the following attributes is the most effective in differentiating a real Police
account from a fake Police account on X (formerly Twitter) as discussed in the lecture ?

User Handle

Profile Picture

Verification Status of the Account

None of the above


Accepted Answers: Verification Status of the Account
Analyzing data without any preconceptions is called _____

Inductive Thematic Analysis

Lexical Analysis

Natural Language Processing

None of the above


Accepted Answers: Inductive Thematic Analysis
Which of the following is/are true about the visualization shown below ?

The visualization is called a Heatmap

The data used to plot the above visualization is called Temporal Data

This type of visualization falls under the category of Geospatial Analysis

None of the above


Accepted Answers: The visualization is called a Heatmap
This type of visualization falls under the category of Geospatial Analysis

What type of actionable information is highlighted in (bold) in the above example?

Temporal data

Spatial data

Linguistic data
None of the above
Accepted Answers: Temporal data
Consider the following tweet : “There is a huge pothole on the main road,Kindly repair it
Address:- Opposite Kachieguda police station, Hyderabad”. This is an example of ____

Actionable Information

Unactionable Information
Accepted Answers: Actionable Information

As discussed in the lectures, communication of the police with the citizens on Social
Media is ______

Formal

Informal
Accepted Answers: Formal
What is meant by an n-gram ?

A sequence of n alternative characters in a text or speech corpus

A method for optimizing databases using caching

A continuous sequence of n items extracted from a text or speech corpus

A method for optimizing big data queries using indexing


Accepted Answers: A continuous sequence of n items extracted from a text or speech
corpus
All students taking the PSOSM course are divided into “groups” of students from each
state of India. This can be best achieved using _____.

n-gram

k-means clustering

LIWC

None of the above


Accepted Answers: k-means clustering
As discussed in the lecture, which of the following measures of behaviors can be studied
while analyzing communications between the police and citizens on social media.

Topic Characteristics

Engagement Measures

Emotional Measures

Social and Cognitive Measures


Accepted Answers: Topic Characteristics Engagement Measures
Emotional Measures Social and Cognitive Measures
LIWC can categorize an input corpus into the following categories:

Positive Emotions

Negative Emotions
Anxiety

Sadness
Accepted Answers: Positive Emotions Negative Emotions Anxiety Sadness

Select the correct option(s) below while analyzing a post on social media:

Valence refers to the negative or positive sentiment of the post

Valence refers to the intensity of the sentiment expressed in the post

Arousal refers to the negative or positive sentiment of the post

Arousal refers to the intensity of the sentiment expressed in the post


Accepted Answers:
Valence refers to the negative or positive sentiment of the post
Arousal refers to the intensity of the sentiment expressed in the post
Given below are two types of communication as discussed in the lecture.

Select the correct labels for A and B :

A = Direct Communication ; B = Indirect Communication

A = Indirect Communication ; B = Indirect Communication

A = Direct Communication ; B = Direct Communication


A = Indirect Communication ; B = Direct Communication
Accepted Answers: A = Direct Communication ; B = Indirect Communication

You receive an email from “Facebook Technical Support” from an unverified email, not
related to Facebook.com, asking you to reset your password via a suspicious form. This
is called ______.

Phishing

Clickbaiting

Compromised Account

None of the above


Accepted Answers: Phishing

While browsing a social media website, you come across the post shown above.
According to the lecture, the post falls under :

Work From Home Scam

Hashtag Hijacking

Compromised Account

None of the above


Accepted Answers: Work From Home Scam
A group of hackers decide to target the Managing Director of a Company with the
intention of stealing his/her credit card details by sending suspicious emails. As
discussed in the lecture,this is called ______ .

Clickbaiting

Whaling

Account Compromise

None of the above


Accepted Answers: Whaling
The above image is an example of ______ .

Hashtag Hijacking

Compromised Account

Fake Customer Service Accounts

None of the above


Accepted Answers: Fake Customer Service Accounts
As discussed in the lecture, which of the following helps in improving the Pagerank of a
website (say, abc.com) on search engines ?

Reputed websites creating reciprocal links with abc.com

abc.com creating unidirectional links to many websites

Number of links on abc.com’s homepage

None of the above


Accepted Answers: Reputed websites creating reciprocal links with abc.com
Spamming the index of search engines is called

Spamdexing

Spamexing

Spamming

None of the above


Accepted Answers: Spamdexing Spamexing
Abhishek and Suresh are college batchmates. Abhishek sees Suresh’s profile on
Instagram and follows him. Suresh after seeing this notification, feels compelled to
follow back Abhishek. This phenomenon is called ______ .

Spamming

Reciprocity

Link farming

All of the above


Accepted Answers: Reciprocity
Consider three accounts on Twitter:

Anushka with 500 followers and 250 following


Ramesh with 1,500 followers and 1,000 following
Himanshu with 500 followers and 200 following

Consider, all of them tweeted about #BLRrains expressing their happiness experiencing
rain.

According to the lecture, consider the indegree of these accounts and select which of
the following accounts are likely to rank higher while searching for #BLRrains on Twitter.

Anushka

Ramesh

Himanshu
Accepted Answers: Ramesh
Which of the following is/are the most widely used formats to represent node-edge graphs
on computers ?

Adjacency Matrix

CSV

GraphML

None of the above


Accepted Answers: Adjacency Matrix CSV GraphML

The above adjacency matrix (Figure 1) is an example of _______

Directed Graph

Undirected Graph
Accepted Answers: Directed Graph
Consider the above image (Figure 2), and select the correct adjacency matrix
representation of the above shown undirected graph.

D
Accepted Answers: D
An NxN adjacency matrix implies there are ______ nodes in the graph.

N/2

N-1

2N-1

None of the above


Accepted Answers: None of the above
Observe the graph below (Figure 3).

The indegree of Node 2 is ________ .

4
Accepted Answers: 2

Consider each node to be an account on Instagram in the graph above (Figure 4). Which
of the above nodes is/are the most influential ?

Node 1

Node 2
Node 4

Node 5
Accepted Answers: Node 4
Which of the following is/are graph centrality measures?

Node degree

Betweenness centrality

Closeness centrality

None of the above


Accepted Answers: Node degree Betweenness centrality Closeness centrality

According to the study discussed in the lecture, which of the following users were most
likely to reciprocate links from spammers ?

Users with less than 100 followers

Users with less than 1,000 followers

Users with more than 10,000 followers

None of the above

Accepted Answers: Users with more than 10,000 followers


According to the study discussed in the lecture, which of the following users usually
engaged themselves in Link Farming ?

People talking about Business, Internet Marketing, Money etc.

People promoting their own business or content or trends in a domain.

Equally distributed among Random Samples of users all across Twitter.

None of the above

Accepted Answers: People talking about Business, Internet Marketing, Money etc.
People promoting their own business or content or trends in a domain.
The above image from Gmail is an example of the ideas proposed by Facemail from MIT.

True
False

Accepted Answers: True

Observe the image below and answer the following questions [4-5] :

Which of the following nudge has been shown in the picture above ?

Sentiment Nudge

Timer Nudge

Picture Nudge

None of the above

Accepted Answers: Picture Nudge


Select the utility of the above type of nudge :

Making sure that you are sharing content with the intended audience/people.

Giving you the opportunity to cancel your post during a certain timeframe.

Making sure your posts are not perceived as negative by other users.

None of the above

Accepted Answers: Making sure that you are sharing content with the intended
audience/people.
As discussed in the lecture, which of the following is/are not a social media nudge?

Picture Nudge

Timer Nudge

Voice Nudge

Video Nudge

Accepted Answers: Voice Nudge Video Nudge


Which of the following statements is/are correct about nudges?
Interventions help users make better decisions about posting on social media.

The primary aim of nudges is to reduce user generated content on social media.

Nudges help individuals avoid regrettable online disclosures.

All of the above

Accepted Answers: Interventions help users make better decisions about posting on
social media.
Nudges help individuals avoid regrettable online disclosures.
Hemant wanted to steal data from a rival business by going to their office and
transferring the required files by connecting a USB Flash Drive to the target computer.
This type of attack is called ________.

Physical Attack

Semantic Attack

Syntactic Attack

All of the above

Accepted Answers: Physical Attack


Denial of Service Attacks and Buffer Overflow Attacks fall under:

Physical Attacks

Semantic Attacks

Syntactic Attacks

None of the above

Accepted Answers: Syntactic Attacks


Shivani, in order to steal login credentials from Anisha, sends an email to her with the
subject “Check your NPTEL Certification Exam Results Here !” which directs Anisha
towards a login form with a website domain not associated with NPTEL. This is a type of
_______ attack.

Syntactic

Semantic

Physical

None of the above

Accepted Answers: Semantic


Himesh, a college student, gets a malicious SMS from an unidentified source saying
“Your Bank Account has been suspended: Click here to re-activate your account”. This
example most closely resembles:
Whaling

Vishing

Smsishing

None of the above

Accepted Answers: Smsishing

Consider the following code snippet :

What is the output from line 3 (word_tokenize function) above?

['W', 'e', 'l', 'c', 'o', 'm', 'e', ' ', 't', 'o', ' ', 'P', 'S', 'O', 'S', 'M', '.']

['Welcome', 'to', 'PSOSM', '.']

['Welcome', 'to', 'PSOSM']

None of the above

Accepted Answers: ['Welcome', 'to', 'PSOSM', '.']


Consider the following list of words generated using nltk
[our, are, yourself, yourselves, apple, orange, have, doesn’t, aren't, out, most, where]

Which of the following are not stop words ?

apple

orange

yourself

most

Accepted Answers: apple orange


Consider the below code snippet, consider the variable token holds 1000+ words
extracted from a text corpus.

What is the purpose of the translate function as shown above ?

To map uppercase characters to lowercase characters in the tokens list

To map all punctuations to a null character in the tokens list

To map all null characters to punctuations in the tokens list

None of the above


Accepted Answers: To map all punctuations to a null character in the tokens list
Which of the following code snippets can be used to count the number of words in a list
named tokens with 1000+ elements(words).

L = {}

for i in tokens:
if i not in L:
L[i] = 1
else:
L[i] += 1
print(l)

from collections import Counter


print(Counter(tokens))

Counter(tokens).count()

None of the above

Accepted Answers:
L = {}

for i in tokens:
if i not in L:
L[i] = 1
else:
L[i] += 1
print(l)
from collections import Counter
print(Counter(tokens))
Which of the following refers to profile linking on social media as discussed in the
lectures ?

The ability to connect profiles of a user on different social networks.

Posting on multiple social media from a single platform.

A common verification check mark across two or more social networks.

None of the above

Accepted Answers: The ability to connect profiles of a user on different social networks.
Which of the following OSNs contain quality and descriptive information for the purposes
of profile linking, as discussed in the lecture ?

4Chan

Reddit

Whisper
LinkedIn

Accepted Answers: LinkedIn

The above X(formerly Twitter) profile helps in profile linking through self-identification.

True

False

Accepted Answers: True

Select the correct observations for the above image.

The above image is a representation of username changes across Facebook and


Twitter over time

As time passes, similarity between usernames across Facebook and Twitter


decreases.

As time passes, similarity between usernames across Facebook and Twitter


increases.

None of the above

Accepted Answers: The above image is a representation of username changes across


Facebook and Twitter over time
As time passes, similarity between usernames across Facebook and Twitter decreases.
Which of the following feature(s) can be used for profile linking on social media. Say,
between Facebook and X(formerly Twitter) for a boy called Arjun ?

Profile Picture

Username

Similarity between people followed by the Arjun on both platforms

Similarity between people who follow Arjun on both platforms

Accepted Answers: Profile Picture Username


Similarity between people followed by the Arjun on both platforms
Similarity between people who follow Arjun on both platforms
Why is studying username change behavior is/are preferable for social media
researchers?

This is one of the unique attributes of the user

It is usually restricted in character length, allowing for smaller datasets

It is the publicly available attribute

None of the above

Accepted Answers: This is one of the unique attributes of the user


It is usually restricted in character length, allowing for smaller datasets
It is the publicly available attribute
Which of the following is/are the reason(s) behind using anonymous social networks ?

Increasing awareness of privacy amongst social media users

Preventing use of personal information available publicly for surveillance purposes

Avoiding consequences of controversial political opinions posted on social media

None of the above

Accepted Answers: Increasing awareness of privacy amongst social media users


Preventing use of personal information available publicly for surveillance purposes
Avoiding consequences of controversial political opinions posted on social media
Which of the following is/are anonymous social networks?

Whisper

Yik Yak

Blind

None of the above


Accepted Answers: Whisper Yik Yak Blind
“Whispers” on Whisper are equivalent to _______ on X (formerly Twitter)

Replies

Likes

Tweets

None of the above

Accepted Answers: Tweets


Observe the graph below regarding replies on Whisper and answer the question below.

“If a whisper does not get attention shortly after posting, it is unlikely to get attention
later.” This statement is :

True

False

Accepted Answers: True

Observe the table given below and answer the following questions [11-13]

For the same number of Nodes/Users on Whisper, Facebook and Twitter, users on
Whisper create more connections/edges than on Facebook/Twitter.

True

False

Accepted Answers: True


Users on Whisper tend to create more close-knit groups than on Facebook/Twitter.
True

False

Accepted Answers: False


Assortativity Coefficient being closer to zero implies the graph is more random than
“small world”

True

False

Accepted Answers: True


The measure of how close a graph is to complete, with 0 indicating an incomplete and 1
indicating a complete graph is called _________.

Average Degree

Clustering Coefficient

Graph Density

None of the above

Accepted Answers: Graph Density

Consider the above Degree Distribution graph generated in Gephi. Which of the following
statements is/are correct about this ?

The average degree of the graph is greater than 70

The average degree of the graph is lesser than 50

The average degree of the graph is 125

The average degree of the graph is less than 10

Accepted Answers: The average degree of the graph is lesser than 50


Which of the following is/are location-based services?

Foursquare

Ola

Yelp

Uber

Accepted Answers: Foursquare Ola Yelp Uber


Mayorships on Foursquare are given to:

The first person to check in at a location

The person who leaves the most tips at a location

The person who checks in most frequently at a location in a given period

People who write the most reviews on a location

Accepted Answers: The person who checks in most frequently at a location in a given
period

Which of the following is publicly available data on Foursquare?

Mayorships

Tips

Dones

Checkins

Accepted Answers: Mayorships Tips Dones


Look at the figure (Figure 1) given below for the Cumulative Distribution of the Number of
Mayorships, Tips and Dones per User:
Majority of the users on Foursquare do not contribute to the Mayorships, Tips or Dones.
This statement is :

True

False

Accepted Answers: True


In the paper as discussed in the lecture, a high correlation between the number of
mayorships and the number of tips across cities, with a Spearman’s correlation
coefficient ρρ equal to 0.78 indicates that :

There is a high monotone increasing relation between the number of mayorships and
the number of tips.

There is a high monotone decreasing relation between the number of mayorships


and the number of tips.

There is no relation regarding monotonicity between the number of mayorships and


the number of tips.

None of the above.

Accepted Answers: There is a high monotone increasing relation between the number of
mayorships and the number of tips.
Look at the figure (Figure 2) given below for the Cumulative Distribution of Displacements
Between Consecutive Tips/Dones Posted per User:

About _____% of the users have spatial differences between their tips/dones at more than
or equal to 6,000km on average.

10

20

30

40

Accepted Answers: 10
Look at the (Figure 3) for the Cumulative Distribution of Time Interval Between
Consecutive Tips/Dones Posted per User :

50% of the users post tips/dones in intervals of less than 500 hours on average. This
statement is :

True

False

Accepted Answers: True


What is the difference between Pearson and Spearman rank correlation?
Hint: https://en.wikipedia.org/wiki/Pearson_correlation_coefficient

Pearson correlation assesses linear relationships, while Spearman correlation


evaluates monotonic relationships.

Spearman correlation is always between -1 and 1, while Pearson correlation can


have values outside this range.

Spearman correlation is calculated using a formula involving the sum of squared


differences, whereas Pearson correlation is based on the product of z-scores.

All of the above

Accepted Answers: Pearson correlation assesses linear relationships, while Spearman


correlation evaluates monotonic relationships.
Which plot is shown in the below figure (Figure 4) ?

Scatter Plot

Bar Chart

Bubble Plot

Histogram

Accepted Answers: Bubble Plot


Which of the following charts can be generated using highcharts ?

Bar Chart

Line Chart

Scatter Plot

Bubble Chart

Accepted Answers: Bar Chart Line Chart Scatter Plot Bubble Chart

Common Information for Q11-14:

To import highcharts into Python version >=3.10 use the following code:

// Fix for python version >= 3.10


import collections.abc
collections.Iterable = collections.abc.Iterable
collections.Mapping = collections.abc.Mapping
collections.MutableSet = collections.abc.MutableSet
collections.MutableMapping = collections.abc.MutableMapping
// then import highcharts
from highcharts import Highchart
Which of the following is the correct chart type in the options dictionary to print a
horizontal bar chart ?

bar

column

horizontal_bar

None of the above

Accepted Answers: bar


Refer to the options dictionary for a line chart as shown in Figure 5 and complete the
code with the correct option for enabling the legend

"legend": {'enabled': True},

"legend": True,

"legend": {‘legend’: True},

None of the above

Accepted Answers: "legend": {'enabled': True},


Ravi wanted to plot his number of followers on Instagram for 2023 in a line chart using
Highcharts. When he ran the code given below, it gave an unexpected output as shown
below in (Figure 6) :
Study the code below (Figure 7) and determine the line due to which he might be getting
the unexpected output (assume all necessary imports have already been made) :

Line 11

Line 12

Line 22

Line 26

Accepted Answers: Line 26


Which of the following is the correct syntax for labeling the legend for some given data in
a scatter plot using Highcharts ?

chart.add_data_set(data1, 'scatter', name = 'label_name')

chart.add_data_set(data1, 'scatter', 'label_name')

chart.add_data_set(data1, 'scatter', label = 'label_name')

None of the above

Accepted Answers:
chart.add_data_set(data1, 'scatter', name = 'label_name')
chart.add_data_set(data1, 'scatter', 'label_name')

Which of the following social networks was NOT mentioned in the paper as a source for
the dataset ?

Twitter

Foursquare

Facebook

Google Plus

Accepted Answers: Facebook


What is the main focus of the study mentioned in the paper ?

Inference of Social Security Number from Home Location in Social Networks

Inference of Home Location in Social Networks

Impact of Nudges on Location Sharing in Social Networks

None of the Above

Accepted Answers: Inference of Home Location in Social Networks


What is a valid AGI?

Valid Artificial General intelligence

Valid Ambiguous Geographical Information

Valid Artificial Geographical Interface

None of the above

Accepted Answers: Valid Ambiguous Geographical Information


Look at the Figure below (Figure 1) and answer the following question :

“Majority of the users on each of the above mentioned platforms provide home location
information at the street level.” This statement is:

True

False
Accepted Answers: False
Refer to the figure below (Figure 2) and answer the following question :

The distance between inferred and declared user home cities on Twitter is less than 40
km for ____ of users.

20 %

40 %

80 %

None

Accepted Answers: 20 %

Please go through the following paper, “On the dynamics of username change behavior
on Twitter” https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf and
answer the following questions from [Q6-Q10]
1 point
From the following figure (Figure 3), what is the correct inference?

80% of users rarely change usernames and 20% change user names frequently.

20% of users frequently change usernames and 80% change usernames rarely.

The percentage of users attributed to the change of usernames follows a Pareto


Distribution.

The percentage of users attributed to the change of usernames does not follow a
Pareto Distribution.

Accepted Answers:
80% of users rarely change usernames and 20% change user names frequently.
20% of users frequently change usernames and 80% change usernames rarely.
The percentage of users attributed to the change of usernames follows a Pareto
Distribution.
Which of the following method(s) were used in the paper for measuring the similarity
between two consecutive usernames ?

Cosine Similarity

Longest Common Subsequence

Longest Common Substring

All of the Above

Accepted Answers: Longest Common Subsequence


Observe the figure below (Figure 4) about the additions or deletions of characters to
usernames of several users on Twitter while changing their usernames and select the
correct option(s) :

Most users added or deleted characters either from the start, middle or end of their
username.

Most users deleted characters at the end of their usernames.

Most users added characters to the middle of their usernames.

None of the Above.

Accepted Answers:
Most users added or deleted characters either from the start, middle or end of their
username.
Most users deleted characters at the end of their usernames.
Which of the following statements is/are true ?

Changing usernames rapidly in a short period of time is called Space Gain.

Actively using common usernames like “@happy” or “@smile” is called Username


Squatting.

Inactive users preventing others from using that specific username is called
Username Squatting.

None of the above

Accepted Answers:
Inactive users preventing others from using that specific username is called Username
Squatting.
Refer to the figure below (Figure 5) about a partner account promoting another in a tweet
and answer the following question:
Which of the following phenomena is shown in the above figure as discussed in the
paper ?

Username Squatting

Obscured Username Promotion

Adjust to Events

Space Gain

Accepted Answers: Obscured Username Promotion

Please go through the following paper, “Boston Marathon Analyzing Fake Content on
Twitter” https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf
and answer the following questions from [Q11-Q15]
1 point
Which of the following statements is true about Boston blasts?

Twin blasts occurred during the Boston Marathon on April 15th, 2013 at 18:50 GMT

Twin blasts occurred during the Boston Marathon on April 15th, 2009 at 18:50 GMT

Four people were killed and 264 were injured in the incident

All of the above

Accepted Answers: Twin blasts occurred during the Boston Marathon on April 15th, 2013
at 18:50 GMT
What does the following figure depict (Figure 6) ?

The figure shows the temporal distribution of tweets after the Boston blast

The figure shows the spatial distribution of tweets after the Boston blast

Both (a) and (b)

None of the above

Accepted Answers: The figure shows the temporal distribution of tweets after the Boston
blast

Refer to the table below (Table 1) about some parameters of Aditya’s account and
answer the following questions [Q13-15]
Calculate the GlobalEngagement for Aditya.

Hint: please refer to the n(status) and age


definitions as provided in the paper. The age is to be taken in hours.

263.15

10.96

1.096

None of the above

Accepted Answers: 10.96


Calculate the Likeability for Aditya.

Hint: , please refer to the n(favourited) and


n(status) definitions as provided in the paper.

0.1

0.05

10

None of the above

Accepted Answers: 0.1


“The credibility of a verified user according to the method in the paper will be
considered as 1”. This statement is:

True

False

Accepted Answers: True


Which of the following can be used for writing Python Programs in an Ubuntu Terminal ?

vim

neovim

vi

All of the Above

Accepted Answers: All of the Above


What is used to install and manage packages for Python?

pip
npm

apt get

Anaconda

Accepted Answers: pip


Why is a "Graph" API called so?

It allows users to draw and create graphs and charts

It represents social connections and relationships as a graph data structure

It primarily deals with geographical mapping and location-based services

It is used exclusively for graph theory and mathematical computations

Accepted Answers: It represents social connections and relationships as a graph data


structure
What characteristics did the researchers find among top link farmers?

They had low in-degree compared to random samples

They were unpopular and inactive users

They had high in-degree compared to random samples

None of the Above

Accepted Answers: They had high in-degree compared to random samples


Which of the following are/were virtual worlds in Social Media ?

Club Penguin

Habbo

Twitter

All of the above

Accepted Answers: Club Penguin Habbo


Which V of social media represents “Amount of content generated across social media
platforms.”

Value

Velocity

Volume

Veracity

Accepted Answers: Volume


Which of the following is/are e-crimes on online social media ?
Phishing

Clickbaiting

Work From Home Scam

All of the Above

Accepted Answers: All of the Above


Which of the following is/are the goals of a phishing attack ?

Stealing personal information

Stealing your financial information

Stealing your identity

Attacking your social networking contacts

Accepted Answers: Stealing personal information Stealing your financial


information
Stealing your identity Attacking your social networking contacts
Hitesh has 400 followers on Twitter, 500 followers on Facebook and 1400 followers on
Instagram. The act of finding the actual number of unique followers across all his social
media profiles is called de-duplicating. This statement is:

True

False

Accepted Answers: True


A node in a graph has an in-degree of 2 and an out-degree of 4. The degree of this node is:

Accepted Answers: 6
Which of the following is the correct command for initializing a git repository in a newly
created empty folder ?

git initialize

git create

git initiate

git init
Accepted Answers: git init
Latanya Sweeney's research highlighted how two seemingly unrelated pieces of
information can be linked to reidentify an individual. Which term best describes this
concept?

Data Anonymization

Data Aggregation

Reidentification

All of the above

Accepted Answers: Reidentification


Which of the following OSNs have an API ?

X (formerly Twitter)

Facebook

YouTube

None of the above

Accepted Answers: X (formerly Twitter) Facebook YouTube


Which of the following are not stopwords in the following list?

stopwords = ["i", "me", "my", "myself", "we", "our", "ours", "ourselves", "you", "your",
"yours", "yourself", "yourselves", "he", "him", "his", "himself", "she", "her", "hers",
"herself", "it", "its", "had", "having", "do", "does", "did", "doing", “mango”, "a", "an", "the",
"and", "but", "if", "or", "because", "as", "until", "while", "of", "at", "by", "for", "with",
"about", "against", "between", "into",”now"]

because, against, mango, yourself

mango, now

mango

All the words in the list are stopwords

Accepted Answers: mango


A sentiment analysis study analyzes a text passage for valence and arousal values. On a
scale of -1 to 1, the valence and arousal score is 0.80 and 0.90. What do these values
suggest about the emotional characteristics of the text?

Negative sentiment, low emotional intensity

Positive sentiment, High emotional intensity

Negative sentiment, high emotional intensity

Positive sentiment, low emotional intensity


Accepted Answers: Positive sentiment, High emotional intensity

You might also like