3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following models are text vectorization methods? (Select two.)
Which two encodes can be used to transform categories data into numerical features? (Select two.)
Which of the following unsupervised learning models can a bank use for fraud detection?
Which database is designed to better anticipate and avoid risks of AI systems causing safety, fairness, or other ethical problems?
You have a dataset with many features that you are using to classify a dependent variable. Because the sample size is small, you are worried about overfitting. Which algorithm is ideal to prevent overfitting?
Your dependent variable data is a proportion. The observed range of your data is 0.01 to 0.99. The instrument used to generate the dependent variable data is known to generate low quality data for values close to 0 and close to 1. A colleague suggests performing a logit-transformation on the data prior to performing a linear regression. Which of the following is a concern with this approach?
Definition of logit-transformation
If p is the proportion: logit(p)=log(p/(l-p))
Word Embedding describes a task in natural language processing (NLP) where:
Which of the following is the primary purpose of hyperparameter optimization?
What is the open framework designed to help detect, respond to, and remediate threats in ML systems?
You train a neural network model with two layers, each layer having four nodes, and realize that the model is underfit. Which of the actions below will NOT work to fix this underfitting?
An organization sells house security cameras and has asked their data scientists to implement a model to detect human feces, as distinguished from animals, so they can alert th customers only when a human gets close to their house.
Which of the following algorithms is an appropriate option with a correct reason?
Which three security measures could be applied in different ML workflow stages to defend them against malicious activities? (Select three.)
Which of the following approaches is best if a limited portion of your training data is labeled?
Which two techniques are used to build personas in the ML development lifecycle? (Select two.)
In which of the following scenarios is lasso regression preferable over ridge regression?
A data scientist is tasked to extract business intelligence from primary data captured from the public. Which of the following is the most important aspect that the scientist cannot forget to include?
Which of the following can take a question in natural language and return a precise answer to the question?
You are implementing a support-vector machine on your data, and a colleague suggests you use a polynomial kernel. In what situation might this help improve the prediction of your model?
An HR solutions firm is developing software for staffing agencies that uses machine learning.
The team uses training data to teach the algorithm and discovers that it generates lower employability scores for women. Also, it predicts that women, especially with children, are less likely to get a high-paying job.
Which type of bias has been discovered?