This general term refers to all kinds of harmful software, including viruses, worms, trojan horses and spyware
What is Malware?
The process of achieving a very high accuracy for the training dataset, but poor accuracy in predicting a new dataset
What is Overfitting?
The common abbreviation that represents the management of identity, authentication and authorization in products and processes
What is IAM (Identity and Access Management)?
This is a cloud deployment model in which infrastructure and application services are accessed via the internet from a third-party provider in a multi-tenant environment
What is Public Cloud?
This is our internal platform, based on the Kubernetes clusters, which we use to deploy the respective container configuration & code files to the repository
What is Walmart Cloud-Native Platform (WCNP)?
What is so fragile that saying its name breaks it?
Silence
Alpha and Beta testing comes under this type of Testing
What is Acceptance testing?
A graphical representation of the contrast between the true positive rate and the false positive rate at various thresholds
What is an ROC curve?
The solution approach adopted by Walmart for the security of Hadoop cluster
What are Ranger policies?
This is a cloud computing service category in which a provider hosts an application on its own infrastructure that users can access via the internet.
What is SaaS (Software as a Service)?
This data describes other data. An example is a document contains information about when the document was dictated, who the provider is, and a short summary of the document.
What is metadata?
What five-letter word becomes shorter when you add two letters to it?
Short
This is the phase in which there is minimum error distribution in the period of software development
What is Requirements analysis?
It is the acronym for a neural network hardware accelerator in smartphone application processors, analogous to GPU for graphics processing unit
What is an NPU?
The regulatory framework that provides guidelines on collecting, storing and processing of personal data
What is GDPR (General Data Protection Regulation)?
This concept aligns business and IT assets, helps provide flexible IT capacity, and provides real-time allocation of IT resources in line with demand from business processes
What is Dynamic Infrastructure?
They are designed to hold a modest amount of data specific to a particular client and website, and can be accessed either by the web server or the client computer.
What is Cookie?
The more you take, the more you leave behind. What are they?
Footsteps
A set of programming tools provided to access an operating system or online service in order to create software based on that operating system or online service.
What is an application programming interface (API)?
A method to computationally estimate probability distributions, especially in Bayesian statistics.
What is MCMC (Markov Chain Monte Carlo)?
3 types of data classifications in Walmart
What are Highly Sensitive, Sensitive, Non-sensitive classification?
These network tools protects apps from distributed denial of service(DDoS) attacks
What is Google Cloud Armour?
This is a centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services.
What is Zookeeper?
From the beginning of eternity
To the end of time and space
To the beginning of every end
And the end of every place.
What am I?
The letter 'e'
Has the power and functionality of a desktop application, but is delivered over the Web and used in a Web browser window.
What is a Rich Internet Application (RIA)?
This error back propagation training method randomly but gradually reduces the mistakes that a network makes and is the dominant training method used nowadays.
What is stochastic gradient descent?
The solution design and risk review process in Walmart
What is SRCR - Solution Risk and Compliance Review?
This is when an enterprise moves an application from on-premises to cloud-based infrastructure without making any changes to the application's design.
What is Rehost?
The intentional combination of tables which reduces the number of joins necessary to query related data, making it efficient for analysis.
What is OLAP or online analytical processing?
What has 13 hearts, but no other organs?
A deck of cards
It defines where an aspect will be woven into the program, and includes advice (the code that implements the cross-cutting concern).
What is a Pointcut?
It is a model-free, off-policy type of reinforcement learning. It computes action-value functions which indicate the expected utility of taking a certain action in a given state, while following the optimal policy afterwards.
What is Q learning?
The security framework for managing credentials for cloud/WCNP based applications
What is HashcorpVault?
This refers to a deployment model where an application primarily runs on premises or in an enterprise's private cloud but bursts to the public cloud when demand for compute capacity spikes.
What is Cloud Bursting?
This is a set of properties of database transactions intended to guarantee data validity despite errors, power failures, and other mishaps.
What is ACID (atomicity, consistency, isolation, durability)?
When I am filled I can point the way. When I am empty, nothing moves me. I have two skins; One without and one within. What am I?
A glove