0% found this document useful (0 votes)
718 views

PSCOM

The document contains questions about social networks and online platforms. It asks about features of networks like Facebook, Twitter, LinkedIn and platforms like StackOverflow and Quora. It also contains questions about anonymous networks and verification of accounts on different platforms.

Uploaded by

Mahima Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
718 views

PSCOM

The document contains questions about social networks and online platforms. It asks about features of networks like Facebook, Twitter, LinkedIn and platforms like StackOverflow and Quora. It also contains questions about anonymous networks and verification of accounts on different platforms.

Uploaded by

Mahima Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 28

Week-0

1) Which of the following is NOT a social network?

Facebook
Koo
Naukri
LinkedIn

2) StackOverflow and Quora belong to which class of online networks?


a) Discussion forums and Community-based Question Answering
b) Bookmarking and content curation networks
c) Consumer review networks
d) Blogging and publishing networks

3) Which of the following is the verified twitter handle of Bengaluru City Police?
a) @BlrCityPolice
b) @blrcp
c) @bangalore_police
d) @bengaluru_police

4) Which of the following Twitter handle likely belongs to a bot account (i.e. likely a fake account)?
a) @DelhiPolice
b) @delhipolice1
c) @hydcitypolice
d) @Navimumpolice

5) Visit Dr. Ponnurangum Kumaraguru’s twitter profile (https://twitter.com/ponguru). When did he


join twitter?
a) September 2009
b) January 2010
c) October 2009
d) August 2009

6) Trending is a feature of which of the following networks?


a) Twitter
b) Facebook
c) Youtube
d) All of the above

7) Which of the following is a Facebook feature?


a) Charity Donations
b) Groups
c) Pages
d) All of the above

8) Which of the following are anonymous networks?


a) Whisper
b) Blind
c) 4chan
d) Indeed

9) When a person blocks someone on Facebook, the other party gets a notification.
a) True
b) False

10) Orkut was owned by:


a) Google
b) Microsoft
c) Amazon
d) Uber
Week-1

1) Which of the following is/are anonymous social networking sites ?


a) Whisper
b) Sarahah
c) Facebook
d) X (Formerly Twitter)
2) Which of the following statements is/are true about ephemeral content on social networks ?
a) Content on social networks disappears after a fixed period of time.
b) Snaps on Snapchat are an example of ephemeral content.
c) Stories on Instagram are an example of ephemeral content.
d) None of the above.

3) Which of the following 4 V’s of Social Media addresses the correctness of information posted
online ?
a) Velocity
b) Veracity
c) Volume
d) Variety

4) Facebook Friends and Instagram Followers follow the principles of a unidirectional network.
a) True
b) False

5) ____ helps users on social media to find posts related to a specific topic by clicking or searching.
a) Mentions
b) Hashtags
c) Shares
d) Likes

6) Degrees of Separation has reduced on Social Media due to:


a) Facilitating Connections and Interactions across various locations
b) Interconnected Networks
c) Share Information and Communicate Globally
d) None of the Above

7) Which of the following is the correct syntax for installing numpy version 1.21.5
a) pip3 install numpy==1.21.5
b) pip3 install package==numpy version==1.21.5
c) pip3 install numpy --v=1.21.5
d) None of the above

8) Which of the following libraries can be used to send and receive requests to a server?
a) numpy
b) requests
c) math
d) None of the above

9) A self-contained directory containing its own Python installation (for a particular version of
Python) and libraries, allowing it to manage and isolate project dependencies.
a) Python Standard Libraries
b) PIP
c) Virtual Environment
d) None of the above

10) Which of the following are the advantages of a version control system ?
a) Helps in keeping a record of all changes made to a file in its history.
b) Allows for collaboration between various people working on the same project.
c) Allows for backup and recovery in a project.
d) None of the Above

11) Social Media constitutes:


a) Social Networks (Facebook, LinkedIn etc.)
b) Virtual Worlds (Habbo, Club Penguin etc.)
c) Livecasts (Twitch, Yahoo! Live etc.)
d) Content Sharing Platforms (YouTube, Flickr etc.)

12) Which of the following platforms allow for managing/hosting git repositories ?
a) GitHub
b) GitLab
c) Bitbucket
d) All of the above

13) Select the correct syntax for allowing git to track all files in a repository (assume you are in the
root of the repository)
a) git add --all
b) git commit -m "track"
c) git status
d) git log

14) Creating a new file in a git repository adds it to :


a) Tracked Files
b) Untracked Files
c) Remote Repository
d) None of the Above

15) Select the correct syntax for pushing an existing repository to a remote repository on GitHub
a) git push origin master
b) git commit -m "Push to GitHub"
c) git add remote origin
d) git pull origin master

16) Which of the following is the correct syntax for installing a package Ubuntu computer ?
a) sudo apt install <PACKAGE_NAME>
b) sudo apt-<PACKAGE_NAME> install ubuntu

c) sudo apt-install <PACKAGE_NAME>


d) sudo get <PACKAGE_NAME>

Week-2
1. What does JSON stand for ?

JavaScript Object Notation


Java Standard Object Notation
JSON Scripted Object Name
Joint Syntax Object Network

2. In which of the following formats does an API usually return its response ?

JSON
XML
TSV
None of the above

3. MongoDB stores data in a structure most similar to ____.

JSON
SQL
XML
None of the above

4. MySQL can be used for querying relational databases.

True
False

5. Given a MongoDB collection named "words" with the following document structure:

{
"_id":ObjectId("615243d88f0ae43f255874c1"),
"count": 300,
"department": "the"
}

Which MongoDB query would you use to retrieve all words with count in descending order ?

db.words.find().sort({ count: -1 })
db.words.find().sort({ count: 1 })
db.words.find().order_by("count", DESCENDING}
db.words.find().sort({ descending: 1 })

6. Which of the following are the components of a graph ?

Vertices
Edges
Unique Identifier/ID
All of the Above

7. Which of the following is true regarding the situation depicted in the graph below

False information/rumors spreads faster than facts/true information on social media


True information spreads faster than false information/rumors on social media
Cannot be Determined

8. Select the correct sequence of steps taken towards evaluating social media data.

Data Collection/Filtering > Data Characterization > Data Classification > Data Evaluation
Data Collection/Filtering > Data Characterization > Data Evaluation > Data Classification
Data Characterization > Data Collection/Filtering > Data Evaluation > Data Classification
Data Characterization > Data Collection/Filtering > Data Classification > Data Evaluation

9. Which of the following attributes can be inferred from data collected via X (formerly Twitter) ?

Number of Likes of the Tweet


Number of times the Tweet has been viewed
Unique identifier of the user/author of the Tweet
None of the above

10. Which of the following processes can be used to receive annotated posts while determining their
legitimacy ?

A group of friends annotating posts given to them


Crowd-sourcing / Mechanical Turk
Getting Data from Fact Checking / News Outlets
All of the above

11. TweetCred is a chrome extension that ranks the credibility of each tweet on Twitter.

True
False

12. Which Python library would you most likely use to get the top 10 hot posts from the subreddit
"r/politics" using the Reddit API?
a. praw
b. requests
c. urllib
d. json

13. An indicator similar to hashtags is called ______ on Reddit.


a. Flair
b. Karma
c. Comment
d. Upvote

14. Communities on Reddit are called ______


a. Subreddits
b. Flairs
c. Threads
d. None of the above

15. A higher Follower-Friend ratio on Twitter can be associated with the popularity of the user
a. True
b. False

Week-3
1. Select the correct sequence of steps as used by Facebook Inspector (as Discussed in Lecture)

a. Data Collection > Ground Truth Extraction > Feature Generation > Supervised Learning >
Result via RESTful API
b. Feature Generation > Data Collection > Supervised Learning > Ground Truth Extraction >
Result via RESTful API
c. Ground Truth Extraction > Data Collection > Supervised Learning > Feature Generation >
Result via RESTful API
d. Data Collection > Feature Generation > Ground Truth Extraction > Supervised Learning >
Result via RESTful API

2. Which of the following is/are correct statements in context of Web of Trust Score?
a. Web of Trust score outputs the reputation of an input website
b. Domain Age can be used as a feature for a Web of Trust score
c. Domain Owner can be used a feature for a Web of Trust score
d. None of the Above
3. “Shantanu never likes people taking his photo because he doesn’t want it to be posted online”.
According to Westin’s 3 Categories, Shantanu is a :
a. Fundamentalist
b. Pragmatist
c. Unconcerned
d. None of the above

4. "Geeta browses all social media websites on her laptop casually, but always opens her banking
website in incognito for checking her balance” According to Westin’s 3 Categories, Geeta is a :
a. Fundamentalist
b. Pragmatist
c. Unconcerned
d. None of the above

5. According to Westin’s 3 Categories, the lowest percentage of US citizens fall into the category
of (as discussed in the lecture):
a. Fundamentalist
b. Pragmatist
c. Unconcerned

6. According to Westin’s 3 Categories, the highest percentage of US citizens fall into the category
of (as discussed in the lecture) :
a. Fundamentalist
b. Pragmatist
c. Unconcerned

7. Which of the following can be used in authentication for the Twitter API ?
a. Bearer Token
b. Client ID
c. Client Secret
d. None of the above

8. Which of the following can be achieved using Twitter API ?


a. Retrieving reverse chronological home timeline
b. Retrieving user Tweet timeline
c. Retrieving user mention timeline
d. None of the above

9. Which of the following is the correct syntax for creating a tweets table with the specified
attributes?

tweet_id : Primary Key, Not Null


text: Not Null
a. CREATE TABLE tweets (
tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id)
);

b. CREATE tweets TABLE (


tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id)
);

c. CREATE TABLE (
tweet_id VARCHAR(50) NOT NULL,
text VARCHAR(500) NOT NULL,
PRIMARY KEY (tweet_id),
TABLE NAME(tweets)
);
d. CREATE TABLE tweets (
tweet_id VARCHAR(50),
text VARCHAR(500),
PRIMARY KEY (tweet_id),
NOT NULL (text)
);

10. Consider a table named “users” containing user profiles from Twitter, which of the following
attributes can be used as a primary key in the table :
a. Full Name of the User
b. User ID of the User
c. No. of Followers of the User
d. No. of Tweets by the User

Read through the report “Privacy in India: Attitudes and Awareness V 2.0”
at https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/research/privacyindia/PI_2012_Complete_Report.pdf And
answer the following questions [11-12] :

11. Which of the following method(s) were used for gathering information across India in the report
above ?
a. Surveys
b. Focus Group Discussions
c. Interviews
d. None of the above

12. Which of the following methods resulted in the largest number of respondents across India ?
a. Surveys
b. Focus Group Discussions
c. Interviews
d. None of the above

13. A table in SQL is called a ______ in MongoDB.


a. Database
b. Index
c. Document
d. Collection

14. A row in SQL is called a ______ in MongoDB.


a. Collection
b. Field
c. Index
d. Document

15. Which of the following can be used to create a new database called “project” and create a
collection named “users” inside it in MongoDB ?
a. 1. use project;
2. db.users.insert({});
b. 1. use project;
2. db.users.insert();
c. 1. create_db project;
2. db.users.insert({});
d. 1. create project;
2. db.users.insert();

Week-4

1. What are the different forms of Privacy?


a. Information
b. Communication
c. Territorial
d. Bodily

2. “Please Rob Me” highlighted issues specifically stemming from:


a. Public Self-Disclosure of Information on Social Media by users
b. Data leaks from social media websites due to hacking attempts
c. Sharing passwords with your friends on Social Media
d. None of the Above

3. Using an unidentified source of information to extract an individual’s sensitive information is


called :
a. Re-identification
b. Personally Identifiable Information
c. Self-Disclosure
d. None of the above

4. Considering each attribute in isolation, which of the following are examples of Personally
Identifiable Information (PII):
a. Race
b. Age
c. Aadhaar Number
d. College Student ID

5. What is the purpose of k-anonymity as discussed in the lecture?


a. Protect PIIs of re-identified individuals
b. Anonymise data without losing utility
c. Make datasets larger for analysis
d. None of the above

6. Latanya Sweeney’s experiments aimed to :


a. Re-identify individuals from Match.com using their Facebook profiles
b. Identification of individuals walking on a campus with data from Facebook
c. Predict social security number from publicly available data
d. Study behaviors of individuals aged 14-18 on Instagram

7. What are the advantages of NumPy Arrays over Lists in Python?


a. NumPy arrays are faster and more compact than Python lists.
b. NumPy uses much less memory to store data and it provides a mechanism of specifying the
data types.
c. This allows the code to be optimized even further.
d. None of the above.

8. Write Python code to convert the list [1,2,3,4] to a NumPy array.


a. import numpy as np
arr = np.array([1,2,3,4])
b. import numpy as np
arr = numpy.array([1,2,3,4])
c. import numpy as np
arr = np.array(1,2,3,4)
d. All of the above

9. What is the output of the following code:

import numpy as np
a = np.array([range(i,i+3) for i in [1,2,3]])
print(a)

a. [[1 2 3]
[2 3 4]
[3 4 5]]
b. [[1 2 3]
[1 2 3]
[1 2 3]]
c. [[1 2 3]
[4 5 6]
[7 8 9]]
d. None of the above

10. Which of the following codes can be used to make a NumPy array of 10 random numbers?

import numpy as np
import random

l = []
for i in range(10):
l.append(random.random())

zeros_array = np.array(l)
print(zeros_array)
import numpy as np
random_array = np.random.rand(10)

import numpy as np
random_array = np.random.random(10)
None of the above

11. Which of the following NumPy functions can be used to generate an NxN diagonal matrix ?

np.eye(5)
np.diagonal(np.eye(5))
np.diagonal(5)
None of the above

12. Which of the following Python code can be used to read a CSV file using Pandas

import pandas as pd
data = pd.read_excel('file.csv')
import pandas as pd
data = pandas.readcsv('file.csv')

import pandas as pd
data = pd.read_csv('file.csv')

None of the above.

13. Consider the below structure of a dataframe.

Which of the following Python snippets can be used to plot a histogram of the amount column ?
Assume df is defined as the above dataframe with 100 rows.
df['amount'].plot.hist()
df[df.columns[4]].plot.hist()
import matplotlib.pyplot as plt
plt.hist(df['amount'])
plt.xlabel('Amount')
plt.ylabel('Frequency')
plt.title('Histogram of Amount')
plt.show()
None of the Above

14. What is the output of the following code ?


pd.Series(['A', 'B', 'C'], index=[1, 2, 3])

1 A
2 B
3 C

A 1
B 2
C 3

A B
C 1
2 3
None of the above

15. Select the correct option for plotting the below function using matplotlib

plt.plot(np.cos(x))
plt.show()
plt.scatter(x, np.sin(x))
plt.show()

plt.scatter(np.cos(x), x)
plt.show()

None of the above

Week – 5
What are the outcomes of publicizing police interactions on X (formerly Twitter) ?

a. Appreciation of the Police by the Public


b. Increased Trust in the Police
c. Quick Resolutions of Public Grievances
d. None of the above

As discussed in the lectures, which of the following campaigns on social media to create trust in
the police backfired ?

a. #myNYPD
b. #myLAPD
c. #myDelhiPolice
d. All of the above
As of January 1, 2024 : Which of the following verification check marks are applied to Law
Enforcement Accounts on X (formerly Twitter) ?

a. Blue Check Mark

b. Grey Check Mark

c. Gold Check Mark


d. None of the above

Which of the following attributes is the most effective in differentiating a real Police account from a
fake Police account on X (formerly Twitter) as discussed in the lecture ?

a. User Handle
b. Profile Picture
c. Verification Status of the Account
d. None of the above

Analyzing data without any preconceptions is called _____

a. Inductive Thematic Analysis


b. Lexical Analysis
c. Natural Language Processing
d. None of the above

Which of the following is/are true about the visualization shown below ?

a. The visualization is called a Heatmap


b. The data used to plot the above visualization is called Temporal Data
c. This type of visualization falls under the category of Geospatial Analysis
d. None of the above

What type of actionable information is highlighted in (bold) in the above example?

a. Temporal data
b. Spatial data
c. Linguistic data
d. None of the above

Consider the following tweet : “There is a huge pothole on the main road,Kindly repair it Address:-
Opposite Kachieguda police station, Hyderabad”. This is an example of ____

a. Actionable Information
b. Unactionable Information

As discussed in the lectures, communication of the police with the citizens on Social Media is ______

a. Formal
b. Informal
What is meant by an n-gram ?

a. A sequence of n alternative characters in a text or speech corpus


b. A method for optimizing databases using caching
c. A continuous sequence of n items extracted from a text or speech corpus
d. A method for optimizing big data queries using indexing

All students taking the PSOSM course are divided into “groups” of students from each state of India.
This can be best achieved using _____.

a. n-gram
b. k-means clustering
c. LIWC
d. None of the above

As discussed in the lecture, which of the following measures of behaviors can be studied while
analyzing communications between the police and citizens on social media.

a. Topic Characteristics
b. Engagement Measures
c. Emotional Measures
d. Social and Cognitive Measures

LIWC can categorize an input corpus into the following categories:

a. Positive Emotions
b. Negative Emotions
c. Anxiety
d. Sadness

Select the correct option(s) below while analyzing a post on social media:

a. Valence refers to the negative or positive sentiment of the post


b. Valence refers to the intensity of the sentiment expressed in the post
c. Arousal refers to the negative or positive sentiment of the post
d. Arousal refers to the intensity of the sentiment expressed in the post

Given below are two types of communication as discussed in the lecture.

Select the correct labels for A and B :

a. A = Direct Communication ; B = Indirect Communication


b. A = Indirect Communication ; B = Indirect Communication
c. A = Direct Communication ; B = Direct Communication
d. A = Indirect Communication ; B = Direct Communication

Week – 6
You receive an email from “Facebook Technical Support” from an unverified email, not related to
Facebook.com, asking you to reset your password via a suspicious form. This is called ______.

a. Phishing
b. Clickbaiting
c. Compromised Account
d. None of the above
While browsing a social media website, you come across the post shown above. According to the
lecture, the post falls under :

a. Work From Home Scam


b. Hashtag Hijacking
c. Compromised Account
d. None of the above

A group of hackers decide to target the Managing Director of a Company with the intention of
stealing his/her credit card details by sending suspicious emails. As discussed in the lecture,this is
called ______ .

a. Clickbaiting
b. Whaling
c. Account Compromise
d. None of the above

The above image is an example of ______ .

a. Hashtag Hijacking
b. Compromised Account
c. Fake Customer Service Accounts
d. None of the above

As discussed in the lecture, which of the following helps in improving the Pagerank of a website
(say, abc.com) on search engines ?

a. Reputed websites creating reciprocal links with abc.com


b. abc.com creating unidirectional links to many websites
c. Number of links on abc.com’s homepage
d. None of the above

Spamming the index of search engines is called

a. Spamdexing
b. Spamexing
c. Spamming
d. None of the above

Abhishek and Suresh are college batchmates. Abhishek sees Suresh’s profile on Instagram and
follows him. Suresh after seeing this notification, feels compelled to follow back Abhishek. This
phenomenon is called ______ .

a. Spamming
b. Reciprocity
c. Link farming
d. All of the above
Consider three accounts on Twitter:

a. Anushka with 500 followers and 250 following


b. Ramesh with 1,500 followers and 1,000 following
c. Himanshu with 500 followers and 200 following

Consider, all of them tweeted about #BLRrains expressing their happiness experiencing rain.

According to the lecture, consider the indegree of these accounts and select which of the following
accounts are likely to rank higher while searching for #BLRrains on Twitter.

a. Anushka
b. Ramesh
c. Himanshu

Which of the following is/are the most widely used formats to represent node-edge graphs on
computers ?

a. Adjacency Matrix
b. CSV
c. GraphML
d. None of the above

The above adjacency matrix (Figure 1) is an example of _______

a. Directed Graph
b. Undirected Graph

Consider the above image (Figure 2), and select the correct adjacency matrix representation of the
above shown undirected graph.

a. A
b. B
c. C
d. D

An NxN adjacency matrix implies there are ______ nodes in the graph.

a. N/2
b. N-1
c. 2N-1
d. None of the above
Observe the graph below (Figure 3).

The indegree of Node 2 is ________ .

a. 1
b. 2
c. 3
d. 4

Consider each node to be an account on Instagram in the graph above (Figure 4). Which of the
above nodes is/are the most influential ?

a. Node 1
b. Node 2
c. Node 4
d. Node 5

Which of the following is/are graph centrality measures?

a. Node degree
b. Betweenness centrality
c. Closeness centrality
d. None of the above

Week – 7
According to the study discussed in the lecture, which of the following users were most likely to
reciprocate links from spammers ?

a. Users with less than 100 followers


b. Users with less than 1,000 followers
c. Users with more than 10,000 followers
d. None of the above

According to the study discussed in the lecture, which of the following users usually engaged
themselves in Link Farming ?

a. People talking about Business, Internet Marketing, Money etc.


b. People promoting their own business or content or trends in a domain.
c. Equally distributed among Random Samples of users all across Twitter.
d. None of the above

The above image from Gmail is an example of the ideas proposed by Facemail from MIT.

a. True
b. False
Observe the image below and answer the following questions [4-5] :

Which of the following nudge has been shown in the picture above ?

a. Sentiment Nudge
b. Timer Nudge
c. Picture Nudge
d. None of the above

Select the utility of the above type of nudge :

a. Making sure that you are sharing content with the intended audience/people.
b. Giving you the opportunity to cancel your post during a certain timeframe.
c. Making sure your posts are not perceived as negative by other users.
d. None of the above

As discussed in the lecture, which of the following is/are not a social media nudge?

a. Picture Nudge
b. Timer Nudge
c. Voice Nudge
d. Video Nudge

Which of the following statements is/are correct about nudges ?

a. Interventions help users make better decisions about posting on social media.
b. The primary aim of nudges is to reduce user generated content on social media.
c. Nudges help individuals avoid regrettable online disclosures.
d. All of the above

Hemant wanted to steal data from a rival business by going to their office and transferring the
required files by connecting a USB Flash Drive to the target computer. This type of attack is called
________.

a. Physical Attack
b. Semantic Attack
c. Syntactic Attack
d. All of the above

Denial of Service Attacks and Buffer Overflow Attacks fall under :

a. Physical Attacks
b. Semantic Attacks
c. Syntactic Attacks
d. None of the above

Shivani, in order to steal login credentials from Anisha, sends an email to her with the subject
“Check your NPTEL Certification Exam Results Here !” which directs Anisha towards a login form
with a website domain not associated with NPTEL. This is a type of _______ attack.

a. Syntactic
b. Semantic
c. Physical
d. None of the above

Himesh, a college student, gets a malicious SMS from an unidentified source saying “Your Bank
Account has been suspended : Click here to re-activate your account”. This example most closely
resembles :
a. Whaling
b. Vishing
c. Smsishing
d. None of the above

Consider the following code snippet :

What is the output from line 3 (word_tokenize function) above ?

a. ['W', 'e', 'l', 'c', 'o', 'm', 'e', ' ', 't', 'o', ' ', 'P', 'S', 'O', 'S', 'M', '.']
b. ['Welcome', 'to', 'PSOSM', '.']
c. ['Welcome', 'to', 'PSOSM']
d. None of the above

Consider the following list of words generated using nltk


[our, are, yourself, yourselves, apple, orange, have, doesn’t, aren't, out, most, where]

Which of the following are not stop words ?

a. apple
b. orange
c. yourself
d. most

Consider the below code snippet, consider the variable token holds 1000+ words extracted from a
text corpus.

What is the purpose of the translate function as shown above ?

a. To map uppercase characters to lowercase characters in the tokens list


b. To map all punctuations to a null character in the tokens list
c. To map all null characters to punctuations in the tokens list
d. None of the above

Which of the following code snippets can be used to count the number of words in a list named
tokens with 1000+ elements(words).

L = {}

for i in tokens:
if i not in L:
L[i] = 1
else:
L[i] += 1
print(l)
a. from collections import Counter
b. print(Counter(tokens))
c. Counter(tokens).count()
d. None of the above

Week – 8
Which of the following refers to profile linking on social media as discussed in the lectures ?

a. The ability to connect profiles of a user on different social networks.


b. Posting on multiple social media from a single platform.
c. A common verification check mark across two or more social networks.
d. None of the above

Which of the following OSNs contain quality and descriptive information for the purposes of profile
linking, as discussed in the lecture ?
a. 4Chan
b. Reddit
c. Whisper
d. LinkedIn

The above X(formerly Twitter) profile helps in profile linking through self-identification.

a. True
b. False

Select the correct observations for the above image.

a. The above image is a representation of username changes across Facebook and Twitter over
time
b. As time passes, similarity between usernames across Facebook and Twitter decreases.
c. As time passes, similarity between usernames across Facebook and Twitter increases.
d. None of the above

Which of the following feature(s) can be used for profile linking on social media. Say, between
Facebook and X(formerly Twitter) for a boy called Arjun ?

a. Profile Picture
b. Username
c. Similarity between people followed by the Arjun on both platforms
d. Similarity between people who follow Arjun on both platforms

Why is studying username change behavior is/are preferable for social media researchers?

a. This is one of the unique attributes of the user


b. It is usually restricted in character length, allowing for smaller datasets
c. It is the publicly available attribute
d. None of the above

Which of the following is/are the reason(s) behind using anonymous social networks ?

a. Increasing awareness of privacy amongst social media users


b. Preventing use of personal information available publicly for surveillance purposes
c. Avoiding consequences of controversial political opinions posted on social media
d. None of the above

Which of the following is/are anonymous social networks?

a. Whisper
b. Yik Yak
c. Blind
d. None of the above
“Whispers” on Whisper are equivalent to _______ on X (formerly Twitter)

a. Replies
b. Likes
c. Tweets
d. None of the above

Observe the graph below regarding replies on Whisper and answer the question below.

“If a whisper does not get attention shortly after posting, it is unlikely to get attention later.” This
statement is :

a. True
b. False

Observe the table given below and answer the following questions [11-13]

For the same number of Nodes/Users on Whisper, Facebook and Twitter, users on Whisper create
more connections/edges than on Facebook/Twitter.

a. True
b. False

Users on Whisper tend to create more close-knit groups than on Facebook/Twitter.

a. True
b. False

Assortativity Coefficient being closer to zero implies the graph is more random than “small world”

a. True
b. False

The measure of how close a graph is to complete, with 0 indicating an incomplete and 1 indicating a
complete graph is called _________.

a. Average Degree
b. Clustering Coefficient
c. Graph Density
d. None of the above

Consider the above Degree Distribution graph generated in Gephi. Which of the following statements
is/are correct about this ?
a. The average degree of the graph is greater than 70
b. The average degree of the graph is lesser than 50
c. The average degree of the graph is 125
d. The average degree of the graph is less than 10

Week-9
Which of the following is/are location-based services?

a. Foursquare
b. Ola
c. Yelp
d. Uber

Mayorships on Foursquare are given to:

a. The first person to check in at a location


b. The person who leaves the most tips at a location
c. The person who checks in most frequently at a location in a given period
d. People who write the most reviews on a location

Which of the following is publicly available data on Foursquare?

a. Mayorships
b. Tips
c. Dones
d. Checkins

Look at the figure (Figure 1) given below for the Cumulative Distribution of the Number of
Mayorships, Tips and Dones per User:

Majority of the users on Foursquare do not contribute to the Mayorships, Tips or Dones. This
statement is :

a. True
b. False

In the paper as discussed in the lecture, a high correlation between the number of mayorships and
the number of tips across cities, with a Spearman’s correlation coefficient ρρ equal to 0.78
indicates that :

a. There is a high monotone increasing relation between the number of mayorships and the
number of tips.
b. There is a high monotone decreasing relation between the number of mayorships and the
number of tips.
c. There is no relation regarding monotonicity between the number of mayorships and the
number of tips.
d. None of the above.

Look at the figure (Figure 2) given below for the Cumulative Distribution of Displacements Between
Consecutive Tips/Dones Posted per User:
About _____% of the users have spatial differences between their tips/dones at more than or equal to
6,000km on average.

a. 10
b. 20
c. 30
d. 40

Look at the (Figure 3) for the Cumulative Distribution of Time Interval Between Consecutive
Tips/Dones Posted per User :

50% of the users post tips/dones in intervals of less than 500 hours on average. This statement is :

a. True
b. False

What is the difference between Pearson and Spearman rank correlation?


Hint: https://en.wikipedia.org/wiki/Pearson_correlation_coefficient

a. Pearson correlation assesses linear relationships, while Spearman correlation evaluates


monotonic relationships.
b. Spearman correlation is always between -1 and 1, while Pearson correlation can have values
outside this range.
c. Spearman correlation is calculated using a formula involving the sum of squared differences,
whereas Pearson correlation is based on the product of z-scores.
d. All of the above

Which plot is shown in the below figure (Figure 4) ?

a. Scatter Plot
b. Bar Chart
c. Bubble Plot
d. Histogram

Which of the following charts can be generated using highcharts ?

a. Bar Chart
b. Line Chart
c. Scatter Plot
d. Bubble Chart

Common Information for Q11-14:

To import highcharts into Python version >=3.10 use the following code:

// Fix for python version >= 3.10


import collections.abc
collections.Iterable = collections.abc.Iterable
collections.Mapping = collections.abc.Mapping
collections.MutableSet = collections.abc.MutableSet
collections.MutableMapping = collections.abc.MutableMapping
// then import highcharts
from highcharts import Highchart

Which of the following is the correct chart type in the options dictionary to print a horizontal bar
chart ?

a. bar
b. column
c. horizontal_bar
d. None of the above

Refer to the options dictionary for a line chart as shown in Figure 5 and complete the code with the
correct option for enabling the legend

a. "legend": {'enabled': True},


b. "legend": True,
c. "legend": {‘legend’: True},
d. None of the above

Ravi wanted to plot his number of followers on Instagram for 2023 in a line chart using Highcharts.
When he ran the code given below, it gave an unexpected output as shown below in (Figure 6) :

Study the code below (Figure 7) and determine the line due to which he might be getting the
unexpected output (assume all necessary imports have already been made) :

a. Line 11
b. Line 12
c. Line 22
d. Line 26

Which of the following is the correct syntax for labeling the legend for some given data in a scatter
plot using Highcharts ?

a. chart.add_data_set(data1, 'scatter', name = 'label_name')


b. chart.add_data_set(data1, 'scatter', 'label_name')
c. chart.add_data_set(data1, 'scatter', label = 'label_name')
d. None of the above

Week-10
Which of the following social networks was NOT mentioned in the paper as a source for the
dataset ?

a. Twitter
b. Foursquare
c. Facebook
d. Google Plus

What is the main focus of the study mentioned in the paper ?

a. Inference of Social Security Number from Home Location in Social Networks


b. Inference of Home Location in Social Networks
c. Impact of Nudges on Location Sharing in Social Networks
d. None of the Above

What is a valid AGI?

a. Valid Artificial General intelligence


b. Valid Ambiguous Geographical Information
c. Valid Artificial Geographical Interface
d. None of the above

Look at the Figure below (Figure 1) and answer the following question :

“Majority of the users on each of the above mentioned platforms provide home location information
at the street level.” This statement is:

a. True
b. False
Refer to the figure below (Figure 2) and answer the following question :

The distance between inferred and declared user home cities on Twitter is less than 40 km for ____
of users.

a. 20 %
b. 40 %
c. 80 %
d. None

Please go through the following paper, “On the dynamics of username change behavior on
Twitter” https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/04-Jain.pdf and answer the
following questions from [Q6-Q10]

From the following figure (Figure 3), what is the correct inference?

a. 80% of users rarely change usernames and 20% change user names frequently.
b. 20% of users frequently change usernames and 80% change usernames rarely.
c. The percentage of users attributed to the change of usernames follows a Pareto Distribution.
d. The percentage of users attributed to the change of usernames does not follow a Pareto
Distribution.

Which of the following method(s) were used in the paper for measuring the similarity between two
consecutive usernames ?

a. Cosine Similarity
b. Longest Common Subsequence
c. Longest Common Substring
d. All of the Above

Observe the figure below (Figure 4) about the additions or deletions of characters to usernames of
several users on Twitter while changing their usernames and select the correct option(s) :
a. Most users added or deleted characters either from the start, middle or end of their
username.
b. Most users deleted characters at the end of their usernames.
c. Most users added characters to the middle of their usernames.
d. None of the Above.

Which of the following statements is/are true ?

a. Changing usernames rapidly in a short period of time is called Space Gain.


b. Actively using common usernames like “@happy” or “@smile” is called Username Squatting.
c. Inactive users preventing others from using that specific username is called Username
Squatting.
d. None of the above

Refer to the figure below (Figure 5) about a partner account promoting another in a tweet and
answer the following question:

Which of the following phenomena is shown in the above figure as discussed in the paper ?

a. Username Squatting
b. Obscured Username Promotion
c. Adjust to Events
d. Space Gain

Please go through the following paper, “Boston Marathon Analyzing Fake Content on
Twitter” https://cdn.iiit.ac.in/cdn/precog.iiit.ac.in/Publications_files/ecrs2013_ag_hl_pk.pdf and
answer the following questions from [Q11-Q15]

Which of the following statements is true about Boston blasts?

a. Twin blasts occurred during the Boston Marathon on April 15th, 2013 at 18:50 GMT
b. Twin blasts occurred during the Boston Marathon on April 15th, 2009 at 18:50 GMT
c. Four people were killed and 264 were injured in the incident
d. All of the above

What does the following figure depict (Figure 6) ?

a. The figure shows the temporal distribution of tweets after the Boston blast
b. The figure shows the spatial distribution of tweets after the Boston blast
c. Both (a) and (b)
d. None of the above
Refer to the table below (Table 1) about some parameters of Aditya’s account and answer the
following questions [Q13-15]

Calculate the GlobalEngagement for Aditya.

Hint: please refer to the n(status) and age definitions as provided in


the paper. The age is to be taken in hours.

a. 263.15
b. 10.96
c. 1.096
d. None of the above

Calculate the Likeability for Aditya.

Hint: , please refer to the n(favourited) and n(status) definitions as


provided in the paper.

a. 0.1
b. 0.05
c. 10
d. None of the above

“The credibility of a verified user according to the method in the paper will be considered as 1”. This
statement is:

a. True
b. False

Week-11
1. Which of the following can be used for writing Python Programs in an Ubuntu Terminal ?
a) vim
b) neovim
c) vi
d) All of the Above

2. What is used to install and manage packages for Python?


a) pip
b) npm
c) apt get
d) Anaconda

3. Why is a "Graph" API called so?


a) It allows users to draw and create graphs and charts
b) It represents social connections and relationships as a graph data structure
c) It primarily deals with geographical mapping and location-based services
d) It is used exclusively for graph theory and mathematical computations

4. What characteristics did the researchers find among top link farmers?
a) They had low in-degree compared to random samples
b) They were unpopular and inactive users
c) They had high in-degree compared to random samples
d) None of the Above

5. Which of the following are/were virtual worlds in Social Media ?


a) Club Penguin
b) Habbo
c) Twitter
d) All of the above

6. Which V of social media represents “Amount of content generated across social media
platforms.”
a. Value
b. Velocity
c. Volume
d. Veracity

7. Which of the following is/are e-crimes on online social media ?


a. Phishing
b. Clickbaiting
c. Work From Home Scam
d. All of the Above

8. Which of the following is/are the goals of a phishing attack ?


a. Stealing personal information
b. Stealing your financial information
c. Stealing your identity
d. Attacking your social networking contacts

9. Hitesh has 400 followers on Twitter, 500 followers on Facebook and 1400 followers on
Instagram. The act of finding the actual number of unique followers across all his social media
profiles is called de-duplicating. This statement is:
a. True
b. False

10. A node in a graph has an in-degree of 2 and an out-degree of 4. The degree of this node is:
a. 2
b. 4
c. 6
d. 8

11. Which of the following is the correct command for initializing a git repository in a newly created
empty folder ?
a. git initialize
b. git create
c. git initiate
d. git init

12. Latanya Sweeney's research highlighted how two seemingly unrelated pieces of information can
be linked to reidentify an individual. Which term best describes this concept?
a. Data Anonymization
b. Data Aggregation
c. Reidentification
d. All of the above

13. Which of the following OSNs have an API ?


a. X (formerly Twitter)
b. Facebook
c. YouTube
d. None of the above

14. Which of the following are not stopwords in the following list?

stopwords = ["i", "me", "my", "myself", "we", "our", "ours", "ourselves", "you", "your", "yours",
"yourself", "yourselves", "he", "him", "his", "himself", "she", "her", "hers", "herself", "it", "its",
"had", "having", "do", "does", "did", "doing", “mango”, "a", "an", "the", "and", "but", "if", "or",
"because", "as", "until", "while", "of", "at", "by", "for", "with", "about", "against", "between",
"into",”now"]
a. because, against, mango, yourself
b. mango, now
c. mango
d. All the words in the list are stopwords

15. A sentiment analysis study analyzes a text passage for valence and arousal values. On a scale
of -1 to 1, the valence and arousal score is 0.80 and 0.90. What do these values suggest about
the emotional characteristics of the text?
a. Negative sentiment, low emotional intensity
b. Positive sentiment, High emotional intensity
c. Negative sentiment, high emotional intensity
d. Positive sentiment, low emotional intensity

You might also like