Login
Remember
Register
MCQ Village Q&A
Questions
Unanswered
Categories
Ask a Question
User admin
Wall
Recent activity
All questions
All answers
Ask a Question
Answers by admin
0
votes
86
views
Which of the following is not an example of Large Language Model
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
68
views
Giving more than one examples as a part of the input prompt is called
answered
May 26, 2024
in
AI Questions
infosys
ai
0
votes
59
views
Which GPT -3 model can be used for generating high level requirements for a given problem statement such as
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
71
views
A prompt is_______'
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
54
views
GPT-3 model can respond to queries pertaining to several domains
answered
May 26, 2024
in
AI Questions
infosys
ai
0
votes
82
views
Which technique can be used if you want to train the LLM to respond specific type of questions in a specific manner?
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
54
views
Variations in completion generated by GPT-3 can be achieved by
answered
May 26, 2024
in
AI Questions
infosys
ai
0
votes
57
views
Which of the following is not a potential application of GPT-3?
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
71
views
Which model will you use for translating C# code into Python code
answered
May 26, 2024
in
AI Questions
ai
infosys
0
votes
92
views
What is the most suitable MS Azure Information Protection (AIP) label while sharing a presentation with project
answered
May 16, 2024
in
General
infosys
0
votes
88
views
Does Infosys have the right to monitor, investigate and wipe the corporate data from personal devices / BYOD (Bring Your
answered
May 16, 2024
in
General
infosys
0
votes
93
views
During a client audit, the external auditor seeks your credentials. How would you respond?
answered
May 16, 2024
in
General
infosys
0
votes
118
views
You need to take an emergency Jeave. Since you are working on a critical task, your manager seeks your credentials to
answered
May 16, 2024
in
General
infosys
0
votes
96
views
Which of the following is one of the best password security practices?
answered
May 16, 2024
in
General
infosys
0
votes
86
views
You come across a useful and free reporting utility which can be easily downloaded from the Internet to create appealing
answered
May 16, 2024
in
General
infosys
0
votes
102
views
Your colleague tells you about a vulnerability in one of the internal applications
answered
May 16, 2024
in
General
infosys
0
votes
142
views
Which of the below action/s exemplify Clear Desk and Clear Screen policy?
answered
May 16, 2024
in
General
infosys
0
votes
182
views
What are the primary advantages of adhering to Secure SDLC best practices?
answered
May 16, 2024
in
General
infosys
0
votes
103
views
You accidentally find appraisal information of your team mate in the shared project folder. What would you do?
answered
May 16, 2024
in
General
infosys
0
votes
116
views
Which global policy of Accenture does ADS meet?
answered
May 16, 2024
in
TQ
tq
accenture
Page:
« prev
1
...
22
23
24
25
26
27
28
...
149
next »
3.0k
questions
3.0k
answers
0
comments
76
users
Welcome to MCQ Village Q&A, where you can ask questions and receive answers from other members of the community.
3.0k
questions
3.0k
answers
0
comments
76
users
...