COMCTN4 Second Grading Exam - Artificial Intelligence and Machine Learning (PDF)
Document Details
Uploaded by Deleted User
Baguio
2024
Baguio
Cabingas, SearL Lawrence A.
Tags
Related
- Chapter 1 Introduction to Machine Learning PDF
- Unit 1 - Introduction to Machine Learning PDF
- DST301 Artificial Intelligence Applications Lecture 02 - Machine Learning PDF
- V Semester Diploma Make-Up Examination, July 2024 Artificial Intelligence & Data Science PDF
- Week 15-16 Lecture Notes on AI, Deep Learning, and Machine Learning PDF
- DS 340 Final Study Guide PDF
Summary
This is a past paper from Baguio University for a COMCTN4 course, covering Artificial Intelligence and Machine Learning, with multiple choice questions and other assessment materials. It was given on October 07, 2024.
Full Transcript
**COMCTN4 -- SECOND GRADING EXAM** **Topic: [ Artificial Intelligence and Machine Learning] Date: [October 07, 2024]** **Schedule: [T/Th 12:30-2:00] Reporter Name: [Cabingas, SearL Lawrence A.]** **I. A. MULTIPLE CHOICE:** Read each of the statements carefully and choose the letter of the correct...
**COMCTN4 -- SECOND GRADING EXAM** **Topic: [ Artificial Intelligence and Machine Learning] Date: [October 07, 2024]** **Schedule: [T/Th 12:30-2:00] Reporter Name: [Cabingas, SearL Lawrence A.]** **I. A. MULTIPLE CHOICE:** Read each of the statements carefully and choose the letter of the correct answer. Write your answer in the space provided. Use CAPITAL LETTERS only. (2 points each) \_\_\_\_\_ 1. The process of detecting unusual patterns or behaviors in data that deviate from the norm is \_\_\_\_\_ 2. A system in which AI can independently optimize network performance, troubleshoot issues, and make decisions is **A. AI-driven network** C. Network slicing B. Traditional network **D. Load balancing** \_\_\_\_\_ 3. A branch of AI that focuses on learning from data without requiring labeled datasets is called A. Supervised learning C. Semi-supervised learning **B. Unsupervised learning** D. Deep learning \_\_\_\_\_ 4. A technology where AI models are deployed closer to the source of data collection to reduce latency is **A. Cloud computing** **C. Edge AI** \_\_\_\_\_ 5. The subset of machine learning that involves learning through rewards and penalties is called A. Unsupervised learning **C. Reinforcement learning** \_\_\_\_\_ 6. The AI technique that automatically groups data points into clusters based on their similarities is A. Regression analysis **C. Clustering** B. Decision trees D. Anomaly detection \_\_\_\_\_ 7. A machine learning model used to identify patterns and relationships in labeled data is called A. Reinforcement learning C. Unsupervised learning **B. Supervised learning** D. Transfer learning \_\_\_\_\_ 8. The technique in AI used to explain and interpret the decision-making processes of complex models is the A. Artificial Neural Networks C. **Black-box modeling** B. Data normalization **D. Explainable AI (XAI)** \_\_\_\_\_ 9. A common challenge in anomaly detection where rare events are difficult to identify due to their scarcity in \_\_\_\_\_ 10. The process of using AI to dynamically allocate bandwidth, manage traffic, and improve network performance is called A. Network slicing B. **Sixth Generation** C. Data-driven automation **D. AI-driven network management** \_\_\_\_\_ 1. It is a powerful storage optimization technique that eliminates redundant data copies **A. Data deduplication** C. Data Center B. Data duplication D. Data Integrity \_\_\_\_\_ 2. data is generated from existing sets, and structural redundancy seen in database management systems. A. Integrity C. Efficiency **B. Redundancy** D. Optimization \_\_\_\_\_ 3. Data is broken down into smaller chunks, typically of fixed sizes, known as blocks A. Hashing **C. Data Segmentation** B. Deduplication and Storage D. Comparison \_\_\_\_\_ 4. Only unique blocks are stored, while duplicates are replaced with references to the original block A. Hashing C. Data Segmentation **B. Deduplication and Storage** D. Comparison \_\_\_\_\_ 5. Generating a unique fingerprint. These fingerprints are compared to identify duplicate blocks. **A. Hashing and comparison** C. Data Segmentation B. Deduplication and Storage D. Comparison \_\_\_\_\_ 6. It is a data storage technique that dynamically adjusts its deduplication strategies A. Adaptive Algorithms C. Optimized Deduplication B. Dynamic Data Environments **D. Adaptive Deduplication** \_\_\_\_\_ 7. Data patterns can change over time, affecting deduplication effectiveness. A. Adaptive Algorithms C. Optimized Deduplication **B. Dynamic Data Environments** D. Adaptive Deduplication \_\_\_\_\_8. Deduplication is performed at this level, identifying and eliminating duplicate files. A. Block-Level Deduplication C. Inline Deduplication B. Target-Based Deduplication **D. File-Level Deduplication** \_\_\_\_\_9. Deduplication takes place at the destination storage location, eliminating duplicates after data has been written. A. Block-Level Deduplication C. Inline Deduplication B. **Target-Based Deduplication** D. File-Level Deduplication \_\_\_\_\_10. Deduplication is performed at this level, identifying and eliminating duplicate data blocks within files. **A. Block-Level Deduplication** C. Inline Deduplication B. Target-Based Deduplication D. File-Level Deduplication \_\_\_\_\_ 1. The revolutionary approach that brings data processing closer to the source is **A. Edge computing** C. Hybrid B. Cloud computing D. Multi clouds \_\_\_\_\_ 2. The ability to process data at the edge significantly reduces A. Integrity C. Efficiency **B. Bandwidth** D. Optimization \_\_\_\_\_ 3. The type of computing that relies on centralized data centers A. Edge computing C. Hybrid **B. Cloud computing** D. Multi clouds \_\_\_\_\_ 4. Involves executing computations and analytics at the location where data is generated A. Cloud computing C. Fog computing B. Edge computing **D. Edge data processing** \_\_\_\_\_ 5. Edge computing is important to \_\_\_\_\_ 6. Key components of an edge computing infrastructure A. Adaptive Algorithms C. 5G B. Computer **D. IoT** \_\_\_\_\_ 7. Challenges associated with implementing edge computing is A. Privacy C. Management **B. Cost** D. Computer \_\_\_\_\_8. Edge computing be used to improve Internet of Things (IoT) applications A. Power C. Sustainability B. Centralized **D. Latency** \_\_\_\_\_9. Difference from Cloud computing and Edge computing is A. Power C. Sustainability **B. Latency** D. Centralized \_\_\_\_\_10. Future trends and developments in edge computing A. Power **C. Sustainability** B. Latency D. Centralized \_\_\_\_\_ 1. The primary mechanism by which fiber optics transmit data is: **A. Light pulses** C. Electrical pulses B. Radio waves D. Magnetic fields \_\_\_\_\_ 2. The part of the fiber optic cable that prevents light from escaping the core is the: A. Reflective coating C. Plastic casing **B. Cladding** D. Copper shielding \_\_\_\_\_ 3. Single-mode fiber is used for \_\_\_distance transmission due to its smaller core diameter. A. Short **C. Long** B. Medium D. Local \_\_\_\_\_ 4. Dense Wavelength Division Multiplexing (DWDM) increases the \_\_\_\_\_\_ of fiber optic networks by using multiple light wavelengths. A. Distance **C. Bandwidth** B. Reliability D. Speed \_\_\_\_\_ 5. Two common applications of fiber optics are: **A. Internet and cable television** C. Satellite and GPS B. Broadcasting and photography D. Aviation and radar systems \_\_\_\_\_ 6. The zigzag pattern in which light pulses travel through the fiber optic cable is called: A. Refraction C. Diffusion B. Bending **D. Total internal reflection** \_\_\_\_\_ 7. Repeaters are used in fiber optics to boost \_\_\_\_\_\_ over long distances. A. Data speed C. Cable durability B. Bandwidth **D. Signal strength** \_\_\_\_\_8. Fiber optic cables are immune to: A. Water damage C. Signal attenuation B. Heat **D. Electromagnetic interference** \_\_\_\_\_9. The core of a multimode fiber is \_\_\_\_\_\_ than that of a single-mode fiber, making it suitable for shorter distances. A. Thinner C. More fragile **B. Larger** D. Smaller \_\_\_\_\_10. Fiber optics are often used in \_\_\_\_\_\_ environments because they can be submerged in water and don't need frequent replacement. **A. Undersea** C. Desert B. Urban D. Arctic \_\_\_\_\_ 1. This best describes Software-Defined Networking (SDN). **A. Centralized control with decoupled planes for programmability.** B. Decentralized control of network traffic with no central controller. C. Hardware-based networking with static configurations. D. A type of network virtualization that abstracts hardware resources. \_\_\_\_\_ 2. These are the primary components of an SDN architecture A. Control Plane, Network Switches, Security Plane, and Orchestration Layer. **B. Control Plane, Data Plane, Southbound Interface, and Northbound Interface.** C. Management Plane, Control Layer, Physical Layer, and Security Layer. D. Virtualized Network Functions, Hypervisors, Orchestration, and Data Layer. \_\_\_\_\_ 3. The interface used for communication between the SDN controller and the network devices is A. Eastbound Interface C. Westbound Interface B. Northbound Interface **D. Southbound Interface** \_\_\_\_\_ 4. The key benefit of network virtualization **is** A. Tightly couples control and data planes. **B. Allows for the rapid provisioning and deployment of networks.** C. Adjustable compression levels (up to 22) D. Limits network automation and scalability. \_\_\_\_\_ 5. **The component of the NFV architecture responsible for coordinating the Virtualized Network Functions (VNFs) and infrastructure is**\ A. Data Plane C. Hypervisor B. Southbound Interface **D. Management and Orchestration (MANO)** \_\_\_\_\_ 6. The Benefit of network automation is **A. Rapid adjustments** C. Hardware setup B. Manual Changes D. Increased costs \_\_\_\_\_ 7. One SDN implementation challenge is A. High cost C. Manual setups **B. Legacy integration** D. Data coupling \_\_\_\_\_ 8. An advantage of NFV in telecommunications is A. Hardware reliance C. Slow deployment **B. Service virtualization** D. Limited scalability \_\_\_\_\_ 9. **An example of a Virtual Network Function (VNF) is** A. Router **C. Firewall** B. Switch D. Cable \_\_\_\_\_ 10. SDN and NFV integration results in A. Static configurations **B. Programmable networks** C. Increased latency D. Hardware dependence \_\_\_\_\_ 1. The ability to process data and perform complex calculations at high speeds is A. Cloud Computing **C. High Performance Computing** B. Quantum computing D. Traditional Computing \_\_\_\_\_ 2. The type of HPC cluster that all machines have similar performance and configuration, and are often treated as the same and interchangeable is A. Heterogenous Cluster C. Monogenous Cluster **B. Homogenous Cluster** D. Hypogenous Cluster \_\_\_\_\_ 3. The HPC nodes that execute the computations. **A. Worker Nodes** C. Login Nodes B. Controller Nodes D. Controller nodes \_\_\_\_\_ 4. The tasks may share common storage, but they are not context-dependent and thus do not need to communicate results with each other as they are completed. A. Static workload C. Database workload B. Tightly coupled workloads **D. Loosely Coupled Workloads** \_\_\_\_\_ 5. The special type of computer, whose computing speed is a thousand times more than a personal computer present in our homes **A. Supercomputer** C. Mainframe Computer B. Quantum Computer D. Personal Computer \_\_\_\_\_ 6. The computer that has the ability to solve complex computational problems more efficiently than classical computers A. Supercomputer C. Mainframe Computer **B. Quantum Computer** D. Personal Computer \_\_\_\_\_ 7. Computation that quantum computers perform is called A. Quantum C. Traditional Mechanics **B. Quantum Mechanics** D. Quantum Key distribution \_\_\_\_\_ 8. HPC design done with a collection of computers (clusters) working together, such as a connected group of servers placed closely to one another both physically and in network topology, to minimize the latency between nodes is called A. Distributed Computing C. Cloud Computing B. Digital Computing **D. Parallel Computing** \_\_\_\_\_ 9. The Model connects the computing power of multiple computers in a network that is either in a single location (often on-premises) or distributed across several locations, which may include on-premises hardware and cloud resources is **A. Distributed Computing** C. Cloud Computing B. Cluster Computing D. Parallel Computing \_\_\_\_\_ 10. HPC can take the form of custom-built supercomputers or groups of individual computers called A. Network **C. Cluster** B. Nodes D. Storage \_\_\_\_\_ 1. An objects---"things"---that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet is called **A. Internet of Things** C. Intranet of Things B. Edge Computing D. Module \_\_\_\_\_ 2. The device used to collect data in the IOT is called A. Connectivity C. Cloud B. Gathering Tools **D. Sensor** \_\_\_\_\_ 3. The network protocol of an IOT that rely on the 4G protocol is A. Bluetooth C. ZigBee **B. Cellular** D. Z-Wave \_\_\_\_\_ 4. The network protocol of an IOT that is wireless and uses radio Frequency cased communication technology is A. Thread C. Cloud B. Wi-Fi **D. Z-Wave** \_\_\_\_\_ 5. The network protocol of an IOT that is new and based from Zigbee is **A. Thread** C. Z-Wave B. Wi-Fi D. Bluetooth \_\_\_\_\_ 6. The network protocol of an IOT that tends to frequency hop to find a better channel is A. Thread C. Z-Wave B. Wi-Fi **D. Bluetooth** \_\_\_\_\_ 7. The network protocol of an IOT that provides an internet connection to nearby devices within a specific range is A. Thread **C. Wi-Fi** B. ZigBee D. Z-Wave \_\_\_\_\_ 8. The network protocol of an IOT that has a significant user base in the world of IOT is A. Thread C. Wi-Fi **B. ZigBee** D. Z-Wave \_\_\_\_\_ 9. The component of an IOT that sends the data gathered to the cloud is A. Sensor C. Wi-Fi **B. Connectivity** D. Internet \_\_\_\_\_ 10. Another component of IOT that makes the data useful is A. User Interface **C. Data Processing** B. Cloud Computing D. Cloud Processing \_\_\_\_\_ 1. The primary characteristic of **lossless compression is** A. It sacrifices some data for higher compression ratios **B. It reduces file sizes while preserving all original data** C. It compresses media files only D. It only works for text-based files \_\_\_\_\_ 2. The developer of **Zstandard (Zstd)** compression algorithm is A. Google **C. Facebook** B. Microsoft D. Amazon \_\_\_\_\_ 3. The primary purpose of the **Brotli** compression algorithm is **A. Compressing web content like HTML, CSS, and JavaScript** B. Real-time streaming of audio and video data C. Compressing databases and backups D. Compressing images for faster loading \_\_\_\_\_ 4. The key feature of **Zstandard (Zstd) is** A. Web-centric optimization C. Exclusive support for HTTP/3 **B. Adjustable compression levels (up to 22)** D. Fixed compression ratio \_\_\_\_\_ 5. **Brotli** is best known for its high compression efficiency in A. Media files C. Database storage **B. Web-related text compression** D. Real-time streaming data \_\_\_\_\_ 6. The highest compression level offered by **Brotli is** A. 7 C. 22 **B. 11** D. 15 \_\_\_\_\_ 7. This compression algorithm is typically faster in terms of **compression speed** A. Brotli C. DEFLATE **B. Zstandard (Zstd)** D. LZW \_\_\_\_\_ 8. The following use cases is more aligned with **Zstandard (Zstd)** A. Compressing web pages for HTTP/2 and HTTP/3 **B. Transparent file system compression in Btrfs and ZFS** C. Optimizing content delivery networks (CDNs) D. Compressing streaming audio and video data \_\_\_\_\_ 9. **Brotli** is supported by **A. All major web browsers** C. Desktop applications but not web browsers B. Only Google Chrome D. Operating systems only \_\_\_\_\_ 10. the following is true regarding **Zstandard (Zstd)** and **Brotli** A. Zstandard is better for compressing web content B. Brotli is primarily used in file systems **C. Brotli has higher compression ratios for web text, while Zstandard is more versatile** D. Zstandard is slower than Brotli in all use cases \_\_\_\_\_ 1. A satellite that has an altitude of 160 km to 2,000 km is called **A. LEO Satellite** C. GEO Satellite B. MEO Satellite D. PEO Satellite \_\_\_\_\_ 2. A satellite that has an altitude of 2,000 km to 35,786 km is called A. LEO Satellite C. GEO Satellite **B. MEO Satellite** D. PEO Satellite \_\_\_\_\_ 3. A satellite that has an altitude of 35,786 km to 22,236 miles is called A. LEO Satellite **C. GEO Satellite** B. MEO Satellite D. PEO Satellite \_\_\_\_\_ 4. Terminals on the ground that can communicate directly to the satellites is called A. LEO Satellite **C. Antenna** B. Internet D. Gadgets \_\_\_\_\_ 5. The primary benefits of LEO broadband are its **A. Low Latency** C. Medium Latency B. High Latency D. Swift Latency \_\_\_\_\_ 6. The effort to provide high speed connectivity to people around the world regardless of location, including underserved and remote regions is called A. Broadband ng Masa C. Internet of Things B. Internet for All **D. Global Broadband Access** \_\_\_\_\_ 7. The satellite can communicate with each other via A. Radar C. Spectrum B. Radio **D. Inter-Satellite Links** \_\_\_\_\_8. The largest and most advanced LEO broadband project is the A. NASA C. One Web B. Amazon Kuiper **D. Starlink by Space X** \_\_\_\_\_9. The process that ensures users experience a continuous and uninterrupted internet connection is called A. Stable C. Stay put **B. Handover** D. Continuous \_\_\_\_\_10. The satellite that one full orbit the Earth in about 90 to 120 minutes is called **A. LEO Satellite** C. GEO Satellite B. MEO Satellite D. PEO Satellite \_\_\_\_\_ 1. Uses specific formulas and carefully designed algorithms used by software to reduce the size of various kinds of data. A. JPEG XL C. Opus Codec **B. Data Compression Technique** D. RAM \_\_\_\_\_ 2. What is the primary reason for compressing data? A. To enhance the aesthetic of text data **C. To save scarce resources** B. To reduce the need for internet D. To increase image quality \_\_\_\_\_ 3. What compression ratios are typically associated with JPEG XL A. 5:1 to 15:1 C. 50:1 to 100:1 **B. 20:1 to 50:1** D. 1:1 to 5:1 \_\_\_\_\_ 4. What Key advantage does JPEG XL have over legacy JPEG? A. Compatibility **C. Dynamic range and precision** B. Supports larger file sizes D. Faster download speeds \_\_\_\_\_ 5. Which aspect is NOT a criterion for users when applying JPEG XL? A. High fidelity to the source image C. Compression Ratio B. Encoding/Decoding speed **D. Enhanced editing capabilities** \_\_\_\_\_ 6. Which audio codec is considered widely used and part of the WebRTC standard? A. AAC C. WAV **B. OPUS** D. MP3 \_\_\_\_\_ 7. What makes Opus particularly suitable for Voice over IP communications? **A. Low Latency** C. High bitrate encoding B. Compatible with all audio formats D. lossless compression \_\_\_\_\_ 8. Which organization played a significant role in the development of Opus A. ISO **C. IETF** B. IEEE D. W3C \_\_\_\_\_ 9. What is one of the primary uses of the Opus Codec? A. Image processing? C. Real-time video compression B. Text document formatting **D. Live music distribution** \_\_\_\_\_ 10. What year was the Opus standard submitted for approval? A. 2012 C. 2013 B. 2011 **D. 2010** \_\_\_\_\_ 1. The Basic password protection was among the first security measures implemented. A. 1990s **C. 1960s-1980s** B. 2010s D. **Late 1990s** \_\_\_\_\_ 2. The rise of advanced persistent threats (APTs) led to the development of more sophisticated security solutions, including Security Information and Event Management (SIEM) systems and machine learning-based anomaly detection. A. 1990s C. 1960s-1980s **B. 2010s** D. **Late 1990s** \_\_\_\_\_ 3. This period also saw the introduction of Virtual Private Networks (VPNs). **A. 1990s** C. 1960s-1980s B. 2010s D. **Late 1990s** \_\_\_\_\_ 4. As cyber threats evolved, IDS technologies were developed to monitor networks for suspicious activity, marking a shift toward proactive security measures. A. 1990s C. 1960s-1980s B. 2010s **D.** Late 1990s \_\_\_\_\_ 5. The first firewalls appeared in the late 1980s A. 1987s **C. 1980s** B. 1989s D. 1985s \_\_\_\_\_ 6. The core principle of Zero Trust security is called **A. Never Trust** C. Continuous Monitoring B. Granular Access D. Zero Trust \_\_\_\_\_ 7. A constant monitoring of user and device behavior is called A. Never Trust **C. Continuous Monitoring** B. Granular Access D. Zero Trust \_\_\_\_\_8. A fine-grained access controls that are based on user identity is called A. Never Trust C. Continuous Monitoring **B. Granular Access** D. Zero Trust \_\_\_\_\_9. Provides organizations with a comprehensive view of their network, users, devices, and applications. **A. Enhanced Visibility** C. Micro-segmentation B. Application Verification D. Zero Trust \_\_\_\_\_10. Help prevent the execution of malicious code and ensure the integrity of critical applications. A. Enhanced Visibility C. Micro-segmentation **B. Application Verification** D. Zero Trust \_\_\_\_\_ 1. Turbo codes were first introduced in which year? A. 1990 **C. 1993** B. 1995 D. 2000 \_\_\_\_\_ 2. Turbo codes approach the theoretical limit of data transmission known as the A. Nyquist limit **C. Shannon limit** B. Fourier limit D. Heisenberg limit \_\_\_\_\_ 3. The type of encoder used in Turbo Codes that includes feedback is called A. Block encoder C. Reed-Solomon encoder **B. Recursive convolutional encoder** D. Hamming encoder \_\_\_\_\_ 4. In Turbo Codes, the technique that improves performance in low signal-to-noise environments is called A. Interleaving **C. Concatenation** B. Parity check D. Bit stuffing \_\_\_\_\_ 5. The primary purpose of a Forward Error Correction (FEC) system is to A. Increase transmission speed C. Reduce power consumption **B. Correct errors without retransmission** D. Compress data for storage \_\_\_\_\_ 6. Parallel concatenated codes use how many constituent encoders? **A. 2** C. 3 B. 4 D. 5 \_\_\_\_\_ 7. Which type of concatenated code typically involves both an inner and outer code? A. Parallel concatenated code **C. Serial concatenated code** B. Reed-Solomon code D. Block code \_\_\_\_\_ 8. Turbo codes are best suited for A. Short message **C. Long data blocks** B. Audio signals D. Power saving \_\_\_\_\_ 9. Which coding technique uses an interleaver between encoders? A. Block coding **C. Parallel concatenated** B. Serial concatenated D. Reed-Solomon \_\_\_\_\_ 10. A recursive convolutional encoder generates **A. Low weight output** C. High weight output B. Random bits D. Uncoded bits \_\_\_\_\_ 1. It is the process of transmitting information over a distance using a technology or electronic means is called \_\_\_\_\_ 2. This type of telecommunication involves the transmission of information over a distance without the help of wires, cables,or any other forms of electrical conductor, defined as A. Optical Networks C. Radio and Television Networks B. Internet **D. Wireless Communication Networks** \_\_\_\_\_ 3. RAN is a major component of a wireless telecommunications system that connects individual devices to other parts of a network through a radio link, which is better known as A. User Terminals C. Backhaul **B. Cell Sites** D. Core Sites \_\_\_\_\_ 4. The devices that is use to connect to the radio access network, some of the example of these are the cellphones,laptop,tablets and other mobile devices that is using wireless connectivity, defined as **A. User Terminals** C. Backhaul \_\_\_\_\_ 5. The first generation of telephone technology was introduced in 1980, voice calling is only available that can be transmitted and received using analog signals in that year. 1G used these analog technologies except: A. NMT C. AMPS \_\_\_\_\_ 6. It uses digital signaling to allow more efficient use of radio spectrum, it also introduced call and text encryption, along with data services such as SMS, picture messages, and MMS. This telephone technology is called A. Third Generation **C. Second Generation** B. Fifth Generation D. Sixth Generation \_\_\_\_\_ 7. It was introduced in early 2000, it brought faster data speed enabling more advanced services like mobile internet, video calls and multimedia messaging. This telephone technology is called A. First Generation C. Second Generation **B. Third Generation** D. Fourth Generation \_\_\_\_\_ 8. It was introduced in 2010, these are the androids that we are using until now. It enables a lot of services such as streaming videos, online gaming, mobile payments, and also makes way for us to introduce IOT and AI that is existing as of the moment. This telephone technology is called A. First Generation C. Second Generation B. Third Generation **D. Fourth Generation** \_\_\_\_\_ 9. 5G offers download speeds of up to 10 Gbps and latency as low as 1 millisecond, it is designed to provide faster internet speeds, improved reliability, and lower latency to users.This technology is also called