New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You have the Predicted vs. True chart shown in the following exhibit.

Which type of model is the chart used to evaluate?

A.

classification

B.

regression

C.

clustering

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

Select the answer that correctly completes the sentence.

You are designing a system that will generate insurance quotes automatically.

Match the Microsoft responsible Al principles to the appropriate requirements.

To answer, drag the appropriate principle from the column on the left to its requirement on the right Each principle may be used once, more than once, or not at all.

NOTE: Each correct match is worth one point.

Select the answer that correctly completes the sentence

You have a dataset that contains experimental data for fuel samples.

You need to predict the amount of energy that can be obtained from a sample based on its density.

Which type of Al workload should you use?

A.

Classification

B.

Clustering

C.

Knowledge mining

D.

Regression

Select the answer that correctly completes the sentence.

For each of the following statements, select Yes if the statement is true. Otherwise, select No.

NOTE: Each correct selection is worth one point.

You are developing a natural language processing solution in Azure. The solution will analyze customer reviews and determine how positive or negative each review is.

This is an example of which type of natural language processing workload?

A.

language detection

B.

sentiment analysis

C.

key phrase extraction

D.

entity recognition

What is an example of the Microsoft responsible Al principle of transparency?

A.

helping users understand the decisions made by an Al system

B.

ensuring that developers are accountable for the solutions they create

C.

ensuring that opportunities are allocated equally to all applicants

D.

ensuring that the privileged data of users is stored in a secure manner