How many connections are necessary to make a connected packet-switched network with n nodes?
n−1, but a sufficient number will be much larger.
What are the factors that should be taken into account when designing a recommender system?
accuracy,
diversity,
privacy,
persistence (repetitions), demographics,
robustness (to frauds), serendipity (elements of surprise),
trust,
labelling.
Which of the following best describes Groupon’s business model?
What is not true about the TCP?
The Internet Protocol Stack 5-layer model has 4 logical layers (application, transport, network, link) and 1 physical layer.
Which of the following can be an IP address?
143.33.208.45 (first), as address consists of 4 integers.
IPv6 addresses have colon (:) separators.
Which protocol allows files to be copied from one computer to another across the Internet?
FTP (File Transfer Protocol).
Which of the following is an advantage of SEO, compared to sponsored advertising?
Customers are more inclined to click links on search engine result pages.
Advertisers A, B, C with:
CTR A = 0.5,
CTR B = 0.2,
CTR C = 0.1
bid for two slots:
bid A = 1.5,
bid B = 2,
bid C = 1 per click.
By the GSP rule which advertiser wins which slot and what are their actual payments per click?
1) A
2) B
3) C
Pa = Bid_B * CTR B/CTR A = 0.4/0.5 = 0.8
Pb = Bid_C * CTR_c/CTR_B = 0.1/0.2 = 0.5
Pc = 0
Which of the following best describes the Brokerage business model?
All of them.
What layer of the Internet Protocol 5-layer Stack model contains the TCP and UDP protocols?
Transport layer.
Which can shopbots not do?
Collect data from Flash-based banners.
In a sealed-bid auction the valuations and bids are:
1) v1 = 5, b1 = 4,
2) v2 = 4, b2 = 2,
3) v3 = 1, b3 = 3.
Who wins in a first-price sealed-bid auction?
1) v1 = 5, b1 = 4
With payoff 5-4=1.
Is the first-price sealed-bid auction truthful?
No.
In a second-price sealed-bid auction the valuations of 3 bidders are:
1) v1 = 5
2) v2 = 4
3) v3 = 1.
If all bidders in this auction bid truthfully, who wins and what is their payoff?
1) v1 = 5 with a bid of b1=4, and a payoff of 5-4=1.
Is the second-price sealed-bid auction truthful?
Yes.
All bids are private. The bidder with a highest bid gets the item, but neither gets nor pays any money. Everyone else gets the highest bid.
Is this auction truthful?
Yes.
Which player prefers the highest expected payoff?
Risk-neutral.
Name two sources of privacy risks on the internet ?
HTTP cookies, search engines.
In which type of attack an intruder modifies data stored in a database ?
Integrity.
Compute 213 (mod 85), which is between 0 and 84 ?
26 = 64 is close enough to 85, so at least 26 21 (mod 85) is simpler than 64.
Then 2^7 = 2 * ( 21) (mod 85) and
2^8 = 4 * ( 21) (mod85) = 1 (mod 85).
Then 2^13 = 2^(8+5) = 2^5 * (mod 85) = 32 * (mod 85).
Compute 32^5 (mod 85), which is between 0 and 84 ?
32^5 = (2^5)5 = 2^(5*)5 = 2^(25).
We’ll find 2^(25) (mod 85).
2^(25) = 2^(8*3+1) = 2 * (mod 85)
Describe one strength and one weakness of asymmetric key encryptions ?
Strength: a public key distribution, which is needed for encryption.
Weakness: computational cost for long messages
Which cryptographic protocol requires two keys (public and private)?
Digital signatures.