Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Oracle 1z0-1110-25 - Oracle Cloud Infrastructure 2025 Data Science Professional

Page: 1 / 5
Total 158 questions

You have received machine learning model training code, without clear information about the optimal shape to run the training. How would you proceed to identify the optimal compute shape for your model training that provides a balanced cost and processing time?

A.

Start with a smaller shape and monitor the Job Run metrics and time required to complete the model training. If the compute shape is not fully utilized, tune the model parameters, and rerun the job. Repeat the process until the shape resources are fully utilized

B.

Start with the strongest compute shape Jobs support and monitor the Job Run metrics and time required to complete the model training. Tune the model so that it utilizes as much compute resources as possible, even at an increased cost

C.

Start with a smaller shape and monitor the utilization metrics and time required to complete the model training. If the compute shape is fully utilized, change to compute that has more resources and rerun the job. Repeat the process until the processing time does not improve

D.

Start with a random compute shape and monitor the utilization metrics and time required to finish the model training. Perform model training optimizations and performance tests in advance to identify the right compute shape before running the model training as a job

What is the primary difference between a data scientist and a data engineer?

A.

A data engineer collects and prepares data, and a data scientist then analyzes it.

B.

A data engineer analyzes data after a data scientist collects and prepares it.

C.

A data engineer builds data pipelines and helps prepare data, while a data scientist is responsible for data collection, preparation, and analysis.

D.

A data engineer creates data flows to be used as templates by the data analyst.

You have been given a collection of digital files required for a business audit. They consist of several different formats that you would like to annotate using Oracle Cloud Infrastructure (OCI) Data Labeling. Which THREE types of files could this tool annotate?

A.

Video footage of a conversation in a conference room

B.

Images of computer server racks

C.

A typewritten document that details an annual budget

D.

A collection of purchase orders for office supplies

E.

An audio recording of a phone conversation

Which step is unique to MLOps, as opposed to DevOps?

A.

Continuous deployment

B.

Continuous integration

C.

Continuous delivery

D.

Continuous training

How can you convert a fixed load balancer to a flexible load balancer?

A.

There is no way to convert the load balancer

B.

Use Update Shape workflows

C.

Delete the fixed load balancer and create a new one

D.

Using the Edit Listener option

Which statement about Oracle Cloud Infrastructure Data Science Jobs is true?

A.

Jobs provisions the infrastructure to run a process on-demand

B.

Jobs comes with a set of standard tasks that cannot be customized

C.

You must create and manage your own Jobs infrastructure

D.

You must use a single Shell/Bash or Python artifact to run a job

You are given the task of writing a program that sorts document images by language. Which Oracle service would you use?

A.

Oracle Digital Assistant

B.

OCI Language

C.

OCI Speech

D.

OCI Vision

You are a data scientist working for a manufacturing company. You have developed a forecasting model to predict the sales demand in the upcoming months. You created a model artifact that contained custom logic requiring third-party libraries. When you deployed the model, it failed to run because you did not include all the third-party dependencies in the model artifact. What file should be modified to include the missing libraries?

A.

model_artifact_validate.py

B.

score.py

C.

runtime.yaml

D.

requirements.txt

Which Security Zone policy is NOT valid?

A.

A boot volume can be moved from a security zone to a standard compartment

B.

A compute instance cannot be moved from a security zone to a standard compartment

C.

Resources in a security zone should not be accessible from the public internet

D.

Resources in a security zone must be automatically backed up regularly

Six months ago, you created and deployed a model that predicts customer churn for a call centre. Initially, it was yielding quality predictions. However, over the last two months, users are questioning the credibility of the predictions. Which TWO methods would you employ to verify the accuracy of the model?

A.

Retrain the model

B.

Validate the model using recent data

C.

Drift monitoring

D.

Redeploy the model

E.

Operational monitoring