0% found this document useful (0 votes)
17 views2 pages

Glo Ve

Uploaded by

krish15patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views2 pages

Glo Ve

Uploaded by

krish15patil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

) GloVe

d) ElMo

Answer: a) BERT

25. Which method is used to break down a sentence into its grammatical components?

a) Chunking

b) Lemmatization

c) Stemming

d) Tokenization

Answer: a) Chunking

26. Which technique is used to generate word representations based on the co-occurrence patterns
of words in a large corpus?

a) Word sense disambiguation

b) Named entity recognition

c) Latent Semantic Analysis (LSA)

d) Text summarization

Answer: c) Latent Semantic Analysis (LSA)

27. Which of the following is an example of a deep learning model architecture used in NLP?

a) Random Forests

b) Support Vector Machines (SVM)


c) Bidirectional LSTM
d) K-means clustering

Answer: c) Bidirectional LSTM

28. Which technique is used to handle imbalanced datasets in text classification?

a) Oversampling

b) Undersampling

c) SMOTE (Synthetic Minority Over-sampling Technique)

d) All of the above

Answer: d) All of the above


29. Which method is used to assign a sentiment label to a given text?

a) Named entity recognition

b) Sentiment analysis

c) Part-of-speech tagging

d) Dependency parsing

Answer: b) Sentiment analysis

30. Which technique is used to identify and extract specific pieces of information from unstructured
text?

a) Sentiment analysis

b) Text classification

c) Named entity recognition

d) Word sense disambiguation

Answer: c) Named entity recognition

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy