Archive for January, 2016:

Exam MB6-889 Microsoft Dynamics AX 2012 Service Management

Published: April 26, 2012
Languages: English
Audiences: Information workers
Technology: Microsoft Dynamics AX 2012
Credit toward certification: MCTS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

If you have other questions or feedback about Microsoft Certification exams or about the certification program, registration, or promotions, please contact your Regional Service Center.

Manage service agreements (13%)
Create a service agreement header
Understand the use and impact of project management, project accounting and validation settings; set up project or category validation; set up or use service agreement groups; create service agreement headers
Create service agreement lines
Create new service agreement lines, search for service agreement lines to copy, understand the concept of service objects, set up service object groups, create service tasks, create service object relations or service task relations, specify service task notes
Create a service agreement from another source
Copy lines from another service agreement, create service templates and service template groups, copy a service template into a service agreement, create a service agreement from a sales order

Preparation resources
Working with service agreements [Microsoft Dynamics AX 2012]
Create service agreements [Microsoft Dynamics AX 2012]
Create service-agreement lines manually [Microsoft Dynamics AX 2012]

Manage service orders (13%)
Set up service parameters
Define settings for service order creation, set up service order default activities, set up service stages, set up and view stage reason codes
Create a service order manually
Create service order headers, create service orders or service order lines manually, create service object relations or service task relations with service orders, create CRM activities when creating service orders
Create a service order automatically
Combine service orders, describe service intervals, describe and use time windows, create a service order from a service agreement or sales order
Manage a service order
Process service orders; create item requirements; cancel or delete service orders; post a service order from a service order, service agreement, or project; post a service order to a project; invoice service orders

Preparation resources
Create service orders manually [Microsoft Dynamics AX 2012]
Create or modify service orders and repair lines [Microsoft Dynamics AX 2012]
Create service orders automatically [Microsoft Dynamics AX 2012]

Manage Service Level Agreements (SLAs) (12%)
Set up SLAs
Create SLAs, view information about SLAs and service orders, create service agreement groups, filter service agreements by group
Set up time recording
Start, stop, and restart time recording; create reason codes; understand the process of service order sign-off; define the different service order stages; use service order stages to stop time recording

Preparation resources
About Service Level Agreements [Microsoft Dynamics AX 2012]
Create service agreement groups [Microsoft Dynamics AX 2012]

Manage the Service Dispatcher (14%)
Set up the Dispatch board
Set a preferred technician, create activity types, create dispatch teams and assign resources, describe the concept of color-based priorities, set the default date interval on the Dispatch board
Manage service orders by using the Dispatch board
Describe service order integration, create new service orders and assign activity types, set a default start time on service order headers, set default values on service orders
Manage activities by using the Dispatch board
Describe activity management in the Dispatch board, create activities on lines, perform typical activity actions, assign time values to activities, reassign activities, change time assignments, monitor activities, view undispatched activities, jump between forms to view activities

Preparation resources
About the Dispatch board [Microsoft Dynamics AX 2012]
Set up service activity types [Microsoft Dynamics AX 2012]
Dispatch board (form) [Microsoft Dynamics AX 2012]

Manage repairs (12%)
Set up a management process
Understand the repair management process; set up or define symptom areas, symptom codes, and conditions for specified symptoms; set up diagnosis areas and diagnosis codes
Diagnose and repair
Set up resolutions and repair stages, create and finish repair lines, create service order transactions for repairs

Preparation resources
About repair management [Microsoft Dynamics AX 2012]
Service management – Repair configuration key (SMARepair) [Microsoft Dynamics AX 2012]
View service repair lines [Microsoft Dynamics AX 2012]

Manage bills of materials (BOMs) versioning (11%)
Create and modify a template BOM
Create or modify template BOMs
Create and modify a service BOM
Create service BOMs, describe the functions available for service BOMs, move a service BOM from one service object relation to another, update service BOMs, view service BOM reports, replace component items, modify service BOMs by using the BOM Designer

Preparation resources
Create a template BOM [Microsoft Dynamics AX 2012]
Setting up and maintaining bills of materials [Microsoft Dynamics AX 2012]
Modify a service BOM [Microsoft Dynamics AX 2012]

Manage service subscriptions (12%)
Create and modify subscriptions and transactions
Create subscription groups, subscription fee categories, or subscriptions; create and invoice projects; create or adjust subscription fee transactions; set up or update an indexed base price for a subscription
Manage subscription revenue
Invoice subscription fee transactions, create credit notes for subscription transactions, accrue revenue from subscription fee transactions, reverse subscription accruals, examine ledger transactions and posting of accrued revenue, set up subscription parameters

Preparation resources
About service subscriptions [Microsoft Dynamics AX 2012]
About subscription groups [Microsoft Dynamics AX 2012]
Accrue subscription revenue [Microsoft Dynamics AX 2012]

Manage services in the Enterprise Portal (13%)
Manage service orders in the Enterprise Portal for technicians
Describe service order management in the Enterprise Portal; create, access, or edit service orders; create or edit service order lines; create repair lines; view repair lines, object relation lines, and task relation lines; view service agreements; describe Role Center concepts
Manage service orders in the Enterprise Portal for customers
Access and view the status of service orders in the Enterprise Portal, create service orders, view subscriptions, review web service orders, transfer web service orders to the service orders form

Preparation resources
What’s new: Enterprise Portal in Microsoft Dynamics AX 2012
About Enterprise Portal roles and user groups
Verify a service web order and assign it to a technician [Microsoft Dynamics AX 2012]



QUESTION 1
You are reviewing a service order to determine whether it is in compliance with the associated service level agreement.
What does the Compliance value shown in the service order header represent?

A. The number of hours of work completed on the service order.
B. The percentage of hours remaining compared to the limit of the service level agreement.
C. The percentage of hours completed on the service order compared to the limit of the service level agreement.
D. The number of hours remaining within the limit of the service level agreement.

Answer: C

Explanation:


QUESTION 2
You are configuring service level agreements in Microsoft Dynamics AX 2012.
What is the purpose of the Calendar setting on a service level agreement?

A. To determine whether a service order can be automatically created for the service agreement
B. To determine the start time of an incoming service order.
C. To determine the sign-off date of an incoming service order.
D. To determine whether the status of an incoming service order will be set to Started.

Answer: A

Explanation:


QUESTION 3
You suspend a service level agreement (SLA) in Microsoft Dynamics AX 2012.
What is the result?

A. The SLA cannot be assigned to service agreements or service agreement groups.
B. The SLA cannot be assigned to service agreements but can be assigned to service agreement groups
C. The SLA cannot be assigned to service agreements but can be assigned to service orders.
D. The SLA cannot be assigned to service agreements or service orders.

Answer: A

Explanation:


QUESTION 4
Which of the following is a result of cancelling the service level agreement on a service order in Microsoft Dynamics AX 2012?

A. The service order is signed off.
B. The status is set to blank.
C. The time recording records are deleted.
D. The service stage is set to Cancel.

Answer: C

Explanation:


QUESTION 5
You are working with service orders in Microsoft Dynamics AX 2012.
In which situation will advancing the service order stage stop time recording?

A. If Stop time recording is selected for the service stage.
B. If the service order has no lines.
C. If the service order stage is changed to Cancel.
D. If Cancel is selected for the service stage.

Answer: A

Explanation:

Click here to view complete Q&A of MB6-889 exam

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MB6-889 Training at certkingdom.com


Continue Reading

LastPass phishing attack may have snagged passwords

The simple attack shows how software needs to be more phishing resistant

A relatively simple phishing attack could be used to compromise the widely used password manager LastPass, according to new research.

Notifications displayed by LastPass version 4.0 in a browser window can be spoofed, tricking people into divulging their login credentials and even snatching a one-time passcode, according to Sean Cassidy, who gave a presentation at the Shmoocon conference on Saturday.

Cassidy, who is CTO of Praesido Inc., notified LastPass of the issues. In a blog post, LastPass said it has made improvements that should make such an attack harder to pull off without a user knowing.

Cassidy released a tool on GitHub called LostPass that shows how an attacker can spoof alerts from LastPass, eventually tricking a user into giving up their login credentials.

In a blog post, Cassidy describes how LastPass will alert users if they’re logged out of the application. But the alert is shown through the browser’s viewport, and the exact same alert could be created and triggered by an attacker if someone can be lured to a malicious website.

For his proof-of-concept attack, he bought the domain “chrome-extension.pw,” which looks similar to Chrome’s protocol for browser extensions and unlikely raise eyebrows.

The bogus LostPass alert, if clicked on, could then lead to the malicious domain that asks for a user’s credentials. If two-factor authentication is enabled, the access token could also be stolen. At that point, all of the victim’s passwords can be collected using the LastPass API, Cassidy wrote.

Strangely, those LastPass customers who have two-factor authentication could have been more vulnerable to the attack.

Cassidy wrote that LastPass sent an email notification if a login attempt is made from a new IP address. But that alert is only sent if a person doesn’t have two-factor authentication enabled, so those with it enabled wouldn’t know of a suspicious login.

LastPass has since changed the notification to also go to people who have two-factor enabled if a login attempt is made from a new location or device.

Cassidy contends his research shows how software needs to be more resistant to phishing attacks.

“Many responses to the phishing problem are ‘train the users,’ as if it was their fault that they were phished,” Cassidy wrote. “Training is not effective at combating LostPass because there is little to no difference in what is shown to the user.”

Although Cassidy wrote that the problems are hard to fix, he decided to go public.

“As soon as I published details of this attack, criminals could make their own version in less than a day,” he wrote. “I am publishing this tool so that companies can pen-test themselves to make an informed decision about this attack and respond appropriately.”

LastPass has implemented some new defenses in response to Cassidy’s research and also plans “to release additional notification options that bypass the viewport.”

The company has also blocked web pages from logging someone out of LastPass. Even if users see a warning that they’re logged out, in theory they should notice that LastPass is actually still logged in.

 

Click here to view complete Q&A of 70-341 exam

MCTS Training, MCITP Trainnig

Best Juniper Certification, Juniper Training at certkingdom.com

Posted in: TECH

Continue Reading

How secure are wearables, anyway?

Whether you’re using that new wearable for yourself or managing IT at a company where fit trackers and smart watches are becoming more popular, wearables just might be the next big bullseye for cybercriminals.

Congratulations on getting that new wearable device over the holidays. You’re on your way to a new, trackable, data-filled life.

Or you’re about to be hacked.

“Every digital technology, as its use has expanded, has drawn attention from hackers and criminals,” says Stephen Cobb of ESET. “So if wearables get to the point where criminals can see a way to exploit them for gain, they will try to do that.”

In his role as senior security researcher at ESET, Cobb says he hasn’t seen that happen yet, but that doesn’t mean it isn’t on the horizon.

He points to a recent issue with VTech, which makes a wearable for kids. Its customer database, which includes the information of 5 million parents and 200,000 children, was recently compromised.

“Some of their toys took photographs and some of those photographs were shared on their back-end system,” Cobb says. “In the case of a wearable, this could have location information, it could have health related information.”

Some good news amid the dark: Consumers already have a healthy dose of skepticism about wearables. According to a study conducted by Auth0, 52 percent of consumers don’t think that IoT devices have the necessary security that they need. So consumers are going to get into the wearable market already being on guard about the security of their device.

However, as the VTech breach shows and as Cobb predicts, it’s not the devices themselves that are the weak link in the chain. It’s the databases where that information being collected is stored.

“If somebody was going to target the data that a wearable company collected about its consumers, typically criminals are looking for a name, address, personally identifiable information,” he says. They could do a wash of things with that information. Also, if they have location information that’s updated in real time, they could be looking for when you’re not home, which could make you a burglary target — much like the earlier days of Facebook when criminals targeted people who were posting vacation pictures while still on vacation.

Most likely, Cobb says, companies will build the necessary security around their databases because otherwise they could face wrath of the Federal Trade Commission.
INSIDER: 5 ways to prepare for Internet of Things security threats

He stresses that consumers should do research on the companies that they’re getting wearables from as well third-party apps that use the data, too, and to read their privacy policies to see what’s being done with that data. If the app doesn’t have one? Move onto another app.

The wearable workplace worry

If you’re the CIO of a company that deals with sensitive information — whether that’s health information, company trade secrets, financial data, attorney-client privilege — there could be legal repercussions for letting wearables into the workspace.

“I’m going to be worried about things like Google Glass and cameras on smartwatches and anything that’s either able to record audio or visual,” says Mark McCreary, chief privacy officer and partner at Fox Rothschild LLP. “That’s your primary concern as far as protecting your own data.”

Even if employees are recording without thinking anything of it (making a goofy video about totally unrelated to work but at work, for example) that video or audio could have sensitive information in it and be uploaded into different places – like a cloud – that are not as secure as your own company’s systems.

“It’s about there being multiple copies. It’s about not having control of the data,” McCreary says. He likens it to employees using Dropbox at home. Copies of the information in that Dropbox are no longer just at work. The same may be true with what wearable are picking up.

And that’s not even getting into people who may come into your company’s office with the intention of recording and stealing information (remember, the Target hack happened because of a heating and air conditioning company). It’s a lot less obvious that they’re doing that if they’re a wearable than if they were to take out their phone and hit record.

In those cases, McCreary says, especially if your company deals with sensitive information, it may be worth banning wearables that have the capability to record entirely in the workplace, or not allowing them in areas where sensitive information is out in the open and being discussed.

Some companies are giving out tracking devices like Fitbits to their employees as part of wellness programs. While the intention behind that decision might be a good one, Beth Zoller, legal editor at XphertHR, says that it presents possible human resources and legal issues in terms of who gets to see that data.

“There are invasion of privacy issues,” she says, especially if the employer has access to health information of an individual. Every Fitbit except the Zip, for example, records activity but can also record sleep patterns, which an employee may not want an employer to have.

A company-given wearable also raises issues of what is personal time and what is private time. “There is the risk of employees who are wearing wearable devices that the lines between work and nonworking time is a blur,” she says. “The employer might be able to pay overtime.”

She adds that if a device records video or audio, employers need to make sure that they are not accessing information that they do not have privilege to, such as those having to do with union activity, or else they risk running up against the National Labor Relations Act.

The best way to handle wearables in the workplace, says Zoller, is to “create a policy as to what the employers’ position is going to be, how employees are going to be able to use wearabales, and also train employers and supervisors and employees” on how wearables can and cannot be used at work. They’ve also published a guide to wearables on their website.

Wearables are a big industry, but still shiny and new, and are bound to be tested by the hacker world, even if we don’t know how, when or where. “Every wave of technology gets scrutinized for weakness and weaknesses that are found are exploited,” says Cobb. “It’s certainly an area we need to keep an eye on for emerging threats down the road.

 

Click here to view complete Q&A of MB2-706 exam

Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MB2-706 Training at certkingdom.com

 

Posted in: TECH

Continue Reading

98-366 Networking Fundamentals

Published: August 2, 2010
Languages: English, Chinese (Simplified), Chinese (Traditional), French, German, Italian, Japanese, Korean, Portuguese (Brazil), Russian, Spanish, Spanish (Latin America)
Audiences: Academic
Technology:  Windows Server 2008
Credit toward certification: MTA

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Understanding network infrastructures (30–35%)
Understand the concepts of Internet, intranet, and extranet
Virtual Private Network (VPN), security zones, firewalls
Understand local area networks (LANs)
Perimeter networks; addressing; reserved address ranges for local use (including local loopback IP), VLANs; wired LAN and wireless LAN
Understand wide area networks (WANs)
Leased lines, dial-up, ISDN, VPN, T1, T3, E1, E3, DSL, cable, and more, and their characteristics (speed, availability)
Understand wireless networking
Types of wireless networking standards and their characteristics (802.11a,b,g,n, including different GHz ranges), types of network security (WPA, WEP, 802.1X, and others), point-to-point (P2P) wireless, wireless bridging
Understand network topologies and access methods

Preparation resources
Solution Design Considerations for Network Topologies
Wireless LAN Service Overview
Wired and Wireless Networking with 802.1X Authentication

Understanding network hardware (20–25%)
Understand switches
Transmission speed, number and type of ports, number of uplinks, speed of uplinks, managed or unmanaged switches, VLAN capabilities, Layer 2 and Layer 3 switches and security options, hardware redundancy, support, backplane speed, switching types and MAC table, understand capabilities of hubs versus switches
Understand routers
Transmission speed considerations, directly connected routes, static routing, dynamic routing (routing protocols), default routes; routing table and how it selects best route(s); routing table memory, network address translation (NAT), software routing in Windows Server
Understand media types
Cable types and their characteristics, including media segment length and speed; fiber optic; twisted pair shielded or nonshielded; catxx cabling, wireless; susceptibility to external interference (machinery and power cables); susceptibility to electricity (lightning), susceptibility to interception

Preparation resources
Computer Hardware and Windows Server
Routing

Understanding protocols and services (45-50%)
Understand the Open Systems Interconnection (OSI) model
OSI model; Transmission Control Protocol (TCP) model; examples of devices, protocols, applications, and which OSI/TCP layer they belong to; TCP and User Datagram Protocol (UDP); well-known ports for most used purposes (not necessarily Internet); packets and frames
Understand IPv4
Subnetting, IPconfig, why use Internet Protocol version 4 (IPv4), addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand IPv6
Subnetting, IPconfig, why use IPv6, addressing, ipv4toipv6 tunneling protocols to ensure backward compatibility, dual IP stack, subnetmask, gateway, ports, packets, reserved address ranges for local use (including local loopback IP)
Understand names resolution
DNS, Windows Internet Name Service (WINS), steps in the name resolution process
Understand networking services
Dynamic Host Configuration Protocol (DHCP), remote access
Understand TCP/IP
Tools (such as ping), tracert, pathping, Telnet, IPconfig, netstat, reserved address ranges for local use (including local loopback IP), protocols


QUESTION 1
You are employed as a network designer at ABC.com.
A ABC.com client has requested a network setup for his home office. The network has to be cost
effective, and easy to extend and implement. Furthermore, the client wants his workstations
connected by a single cable.
Which of the following network topologies should you use?

A. A star network topology.
B. A bus network topology.
C. A mesh network topology.
D. A ring network topology.

Answer:


QUESTION 2
You are employed as a network designer at ABC.com.
You have recently designed a home office network for ABC.com that includes a switch.
Which of the following are TRUE with regards to network switches? (Choose all that apply.)

A. It keeps track of the MAC addresses attached to each of its ports and directs traffic intended for
a particular address only to the port to which it is attached.
B. It keeps track of the IP addresses attached to each of its ports and directs traffic intended for a
particular address only to the port to which it is attached.
C. It operates at the Physical layer of the OSI model.
D. It operates at the Data-Link layer of the OSI model.

Answer:


QUESTION 3
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
As part of a training exercise, you have been asked to identify the layer that allows applications
and a number of user functions access to the network.
Which of the following options represents your response?

A. The document layer.
B. The application layer.
C. The system layer.
D. The Data-link layer.

Answer:

Explanation:


QUESTION 4
You are employed as a network administrator at ABC.com. The ABC.com network consists of a
single domain named ABC.com.
You have been tasked with making sure that ABC.com’s network includes a server that converts
NetBIOS names to IP addresses.
Which of the following actions should you take?

A. You should consider adding a DHCP server to the ABC.com network.
B. You should consider adding a DNS server to the ABC.com network.
C. You should consider adding a Web server to the ABC.com network.
D. You should consider adding a WINS server to the ABC.com network.

Answer:


QUESTION 5
You are employed as a network designer at ABC.com.
ABC.com’s network is made up of two network segments, named Subnet A and Subnet B. DHCP
clients are located on Subnet
A. A DHCP server, named ABC-SR07, is located on Subnet B.
You need to make sure that DHCP clients are able to connect to ABC-SR07.
Which of the following actions should you take?

A. You should make sure that the RRAS service is configured.
B. You should make sure that the Web service is configured.
C. You should make sure that the DNS service is configured.
D. You should make sure that the DHCP relay agent service is configured.

Answer:

Explanation:

Click here to view complete Q&A of 98-366 exam

Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft 98-366 Training at certkingdom.com


Continue Reading

10 amazing algorithms

Figuring out mysteries
Cyber technology couldn’t get by without algorithms to encrypt, analyze metadata and find traffic anomalies, but they are used more and more widely in other fields. Here are 10 algorithms that perform functions as varied as scanning for disease genes, catching classroom cheats and figuring out murder mysteries as well as Agatha Christie’s heroine Miss Marple.

Scan genes for disease
An algorithm developed by doctors at Massachusetts General Hospital and Hebrew University could scan gene maps for genes that are associated with diseases. By doing so across organisms they could reveal how these genes evolved and what useful function they might have originally served. From The Algemeiner.

Find patient zero
Researchers in Croatia have an algorithm that performs statistical analysis to discover the first person infected by a disease in an epidemic or at least come close. It works better when the disease spreads quickly and the algorithm is applied soon after the epidemic is discovered. The algorithm could be used to track down the first machine infected in a malware outbreak as well, they say. From phys.org.

Perform facial ID without a face
Facebook has an experimental algorithm that can identify people in photos 83% of the time even if their face is obscured. It uses other cues such as attire, hair style, posture and body type to figure out who’s who. From New Scientist.

Figure out whodunnit
Agatha Christie murder mysteries can be solved by an algorithm that takes into account the relationship between the victim and suspects, modes of transportation used in the crime, when suspects are introduced and how they are described, among other factors. Authors of the algorithm came up with it after analyzing 27 of Christie’s 83 novels. From The Guardian.

Capitalize on tele-boredom
Boredom of phone users is detectable up to 82.9% of the time using an algorithm that looks at usage logs and self-reporting of how bored users are. One useful result for marketers: users are more likely to investigate suggested content when they are bored. From research paper “When Attention is not Scarce Detecting Boredom from Mobile Phone Usage”.

Eradicate photo-bombers
An experimental application from Adobe called Monument Mode can improve vacation photos by digitally removing people who wander into and obstruct the view while someone is shooting a picture of a tourist attraction like the Grand Canyon or Statue of Liberty. Users shoot several frames and an algorithm in the app analyzes them, discerns the difference between the attraction and the people, and excises them. See a demo here.

Catch exam cheats
Freakonomics author Steven Levitt and economist Ming-Jen Lin of National Taiwan University wrote an algorithm to figure out who cheated on college exams. They considered where students sat and what answers they got wrong to discover that about 10% of the students cheated. After assigning random seats and beefing up monitoring, cheating virtually disappeared. See the

Create memories in damaged brains
An algorithm in a prosthetic device figures out how to take the electrical signature of a short-term memory and convert it to the signature of a long-term memory, bypassing the damaged part of the brain that would otherwise perform the translation. “It’s like being able to translate from Spanish to French without being able to understand either language,” researcher Ted Berger of University of Southern California told The Financial Times.

Control blood sugar with diet recommendations
Monitoring what people eat and how their blood sugar levels respond led to an algorithm that tells them what to consume in order to prevent spiking that diabetics experience. Using 137 data points such as age, body mass index and even gut bacteria, the algorithm could predict seven out of 10 times how subjects would react to the foods they ate. From The Atlantic.

Predict success of couples therapy
Voice qualities – pitch, intensity, jitter, warbles and shimmer among many others – when run through an algorithm created at the University of Southern California and the University of Utah was better at predicting whether or not couples would succeed in marriage counseling than the words they spoke. The algorithm broke down speech recordings into acoustic features that the algorithm analyzed. The predictions were compared to marital status after five years and were 79% accurate. From a USC press release.

Click here to view complete Q&A of MB2-706 exam

Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MB2-706 Training at certkingdom.com

Posted in: TECH

Continue Reading

Follow Us

Bookmark and Share


Popular Posts