prompt
stringlengths 48
3.72k
| chosen
listlengths 2
2
| rejected
listlengths 2
2
| messages
listlengths 2
2
| score_chosen
float64 1
1
| score_rejected
float64 0
0
|
---|---|---|---|---|---|
Reduction of D-xylose with NaBH4 yields a product that is a
A. racemic mixture
B. single pure enantiomer
C. mixture of two diastereomers in equal amounts
D. meso compound | [
{
"content": "Reduction of D-xylose with NaBH4 yields a product that is a\nA. racemic mixture\nB. single pure enantiomer\nC. mixture of two diastereomers in equal amounts\nD. meso compound ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Reduction of D-xylose with NaBH4 yields a product that is a\nA. racemic mixture\nB. single pure enantiomer\nC. mixture of two diastereomers in equal amounts\nD. meso compound ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Reduction of D-xylose with NaBH4 yields a product that is a\nA. racemic mixture\nB. single pure enantiomer\nC. mixture of two diastereomers in equal amounts\nD. meso compound ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Calculate the polarization of a proton in a magnetic field of 335 mT and 10.5 T at 298 K.
A. 6.345 x 10^-4 at 0.335 T; 9.871 x 10^-5 at 10.5 T
B. 0.793 x 10^-4 at 0.335 T; 6.931 x 10^-7 at 10.5 T
C. 1.148 x 10^-6 at 0.335 T; 3.598 x 10^-5 at 10.5 T
D. 4.126 x 10^-3 at 0.335 T; 2.142 x 10^-6 at 10.5 T | [
{
"content": "Calculate the polarization of a proton in a magnetic field of 335 mT and 10.5 T at 298 K.\nA. 6.345 x 10^-4 at 0.335 T; 9.871 x 10^-5 at 10.5 T\nB. 0.793 x 10^-4 at 0.335 T; 6.931 x 10^-7 at 10.5 T\nC. 1.148 x 10^-6 at 0.335 T; 3.598 x 10^-5 at 10.5 T\nD. 4.126 x 10^-3 at 0.335 T; 2.142 x 10^-6 at 10.5 T ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Calculate the polarization of a proton in a magnetic field of 335 mT and 10.5 T at 298 K.\nA. 6.345 x 10^-4 at 0.335 T; 9.871 x 10^-5 at 10.5 T\nB. 0.793 x 10^-4 at 0.335 T; 6.931 x 10^-7 at 10.5 T\nC. 1.148 x 10^-6 at 0.335 T; 3.598 x 10^-5 at 10.5 T\nD. 4.126 x 10^-3 at 0.335 T; 2.142 x 10^-6 at 10.5 T ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Calculate the polarization of a proton in a magnetic field of 335 mT and 10.5 T at 298 K.\nA. 6.345 x 10^-4 at 0.335 T; 9.871 x 10^-5 at 10.5 T\nB. 0.793 x 10^-4 at 0.335 T; 6.931 x 10^-7 at 10.5 T\nC. 1.148 x 10^-6 at 0.335 T; 3.598 x 10^-5 at 10.5 T\nD. 4.126 x 10^-3 at 0.335 T; 2.142 x 10^-6 at 10.5 T ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The anhydride of Ba(OH)2 is
A. BaH2
B. BaOH
C. Ba
D. BaO | [
{
"content": "The anhydride of Ba(OH)2 is\nA. BaH2\nB. BaOH\nC. Ba\nD. BaO ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "The anhydride of Ba(OH)2 is\nA. BaH2\nB. BaOH\nC. Ba\nD. BaO ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The anhydride of Ba(OH)2 is\nA. BaH2\nB. BaOH\nC. Ba\nD. BaO ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A 1 M solution of TEMPO in chloroform at room temperature shows broader EPR spectrum than that of a 1 mM solution. Which sentence describes this phenomenon most accurately?
A. in the more concentrated solution, the lines are broadened due to the dipole-dipole interaction between the TEMPO molecules
B. in the more concentrated solution, the lines are broadened by the slow tumbling of TEMPO molecules
C. in the more concentrated solution, the lines are broadened due to the exchange interaction between the TEMPO molecules
D. in the more concentrated solution, the lines are broadened by the hyperfine interaction between the TEMPO molecules | [
{
"content": "A 1 M solution of TEMPO in chloroform at room temperature shows broader EPR spectrum than that of a 1 mM solution. Which sentence describes this phenomenon most accurately?\nA. in the more concentrated solution, the lines are broadened due to the dipole-dipole interaction between the TEMPO molecules\nB. in the more concentrated solution, the lines are broadened by the slow tumbling of TEMPO molecules\nC. in the more concentrated solution, the lines are broadened due to the exchange interaction between the TEMPO molecules\nD. in the more concentrated solution, the lines are broadened by the hyperfine interaction between the TEMPO molecules ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A 1 M solution of TEMPO in chloroform at room temperature shows broader EPR spectrum than that of a 1 mM solution. Which sentence describes this phenomenon most accurately?\nA. in the more concentrated solution, the lines are broadened due to the dipole-dipole interaction between the TEMPO molecules\nB. in the more concentrated solution, the lines are broadened by the slow tumbling of TEMPO molecules\nC. in the more concentrated solution, the lines are broadened due to the exchange interaction between the TEMPO molecules\nD. in the more concentrated solution, the lines are broadened by the hyperfine interaction between the TEMPO molecules ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A 1 M solution of TEMPO in chloroform at room temperature shows broader EPR spectrum than that of a 1 mM solution. Which sentence describes this phenomenon most accurately?\nA. in the more concentrated solution, the lines are broadened due to the dipole-dipole interaction between the TEMPO molecules\nB. in the more concentrated solution, the lines are broadened by the slow tumbling of TEMPO molecules\nC. in the more concentrated solution, the lines are broadened due to the exchange interaction between the TEMPO molecules\nD. in the more concentrated solution, the lines are broadened by the hyperfine interaction between the TEMPO molecules ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
A set of hybrid sp^3 orbitals for a carbon atom is given above. Which of the following is NOT true about the orbitals?
A. The orbitals are degenerate.
B. The set of orbitals has a tetrahedral geometry.
C. These orbitals are constructed from a linear combination of atomic orbitals.
D. Each hybrid orbital may hold four electrons. | [
{
"content": "A set of hybrid sp^3 orbitals for a carbon atom is given above. Which of the following is NOT true about the orbitals?\nA. The orbitals are degenerate.\nB. The set of orbitals has a tetrahedral geometry.\nC. These orbitals are constructed from a linear combination of atomic orbitals.\nD. Each hybrid orbital may hold four electrons. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "A set of hybrid sp^3 orbitals for a carbon atom is given above. Which of the following is NOT true about the orbitals?\nA. The orbitals are degenerate.\nB. The set of orbitals has a tetrahedral geometry.\nC. These orbitals are constructed from a linear combination of atomic orbitals.\nD. Each hybrid orbital may hold four electrons. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A set of hybrid sp^3 orbitals for a carbon atom is given above. Which of the following is NOT true about the orbitals?\nA. The orbitals are degenerate.\nB. The set of orbitals has a tetrahedral geometry.\nC. These orbitals are constructed from a linear combination of atomic orbitals.\nD. Each hybrid orbital may hold four electrons. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Sometimes the object module produced by a compiler includes information (from the symbol table) mapping all source program names to their addresses. The most likely purpose of this information is
A. for use as input to a debugging aid
B. to increase the run-time efficiency of the program
C. for the reduction of the symbol-table space needed by the compiler
D. to tell the loader where each variable belongs | [
{
"content": "Sometimes the object module produced by a compiler includes information (from the symbol table) mapping all source program names to their addresses. The most likely purpose of this information is\nA. for use as input to a debugging aid\nB. to increase the run-time efficiency of the program\nC. for the reduction of the symbol-table space needed by the compiler\nD. to tell the loader where each variable belongs ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Sometimes the object module produced by a compiler includes information (from the symbol table) mapping all source program names to their addresses. The most likely purpose of this information is\nA. for use as input to a debugging aid\nB. to increase the run-time efficiency of the program\nC. for the reduction of the symbol-table space needed by the compiler\nD. to tell the loader where each variable belongs ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Sometimes the object module produced by a compiler includes information (from the symbol table) mapping all source program names to their addresses. The most likely purpose of this information is\nA. for use as input to a debugging aid\nB. to increase the run-time efficiency of the program\nC. for the reduction of the symbol-table space needed by the compiler\nD. to tell the loader where each variable belongs ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Suppose there is an open (external) hash table with four buckets, numbered 0,1,2,3, and integers are hashed into these buckets using hash function h(x) = x mod 4. If the sequence of perfect squares 1,4,9, ... , i^2, ... is hashed into the table, then, as the total number of entries in the table grows, what will happen?
A. Two of the buckets will each get approximately half the entries, and the other two will remain empty.
B. All buckets will receive approximately the same number of entries.
C. All entries will go into one particular bucket.
D. All buckets will receive entries, but the difference between the buckets with smallest and largest number of entries will grow. | [
{
"content": "Suppose there is an open (external) hash table with four buckets, numbered 0,1,2,3, and integers are hashed into these buckets using hash function h(x) = x mod 4. If the sequence of perfect squares 1,4,9, ... , i^2, ... is hashed into the table, then, as the total number of entries in the table grows, what will happen?\nA. Two of the buckets will each get approximately half the entries, and the other two will remain empty.\nB. All buckets will receive approximately the same number of entries.\nC. All entries will go into one particular bucket.\nD. All buckets will receive entries, but the difference between the buckets with smallest and largest number of entries will grow. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Suppose there is an open (external) hash table with four buckets, numbered 0,1,2,3, and integers are hashed into these buckets using hash function h(x) = x mod 4. If the sequence of perfect squares 1,4,9, ... , i^2, ... is hashed into the table, then, as the total number of entries in the table grows, what will happen?\nA. Two of the buckets will each get approximately half the entries, and the other two will remain empty.\nB. All buckets will receive approximately the same number of entries.\nC. All entries will go into one particular bucket.\nD. All buckets will receive entries, but the difference between the buckets with smallest and largest number of entries will grow. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose there is an open (external) hash table with four buckets, numbered 0,1,2,3, and integers are hashed into these buckets using hash function h(x) = x mod 4. If the sequence of perfect squares 1,4,9, ... , i^2, ... is hashed into the table, then, as the total number of entries in the table grows, what will happen?\nA. Two of the buckets will each get approximately half the entries, and the other two will remain empty.\nB. All buckets will receive approximately the same number of entries.\nC. All entries will go into one particular bucket.\nD. All buckets will receive entries, but the difference between the buckets with smallest and largest number of entries will grow. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Of the following page-replacement policies, which is guaranteed to incur the minimum number of page faults?
A. Replace the page whose next reference will be the longest time in the future.
B. Replace the page whose next reference will be the shortest time in the future.
C. Replace the page whose most recent reference was the shortest time in the past.
D. Replace the page whose most recent reference was the longest time in the past. | [
{
"content": "Of the following page-replacement policies, which is guaranteed to incur the minimum number of page faults?\nA. Replace the page whose next reference will be the longest time in the future.\nB. Replace the page whose next reference will be the shortest time in the future.\nC. Replace the page whose most recent reference was the shortest time in the past.\nD. Replace the page whose most recent reference was the longest time in the past. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Of the following page-replacement policies, which is guaranteed to incur the minimum number of page faults?\nA. Replace the page whose next reference will be the longest time in the future.\nB. Replace the page whose next reference will be the shortest time in the future.\nC. Replace the page whose most recent reference was the shortest time in the past.\nD. Replace the page whose most recent reference was the longest time in the past. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Of the following page-replacement policies, which is guaranteed to incur the minimum number of page faults?\nA. Replace the page whose next reference will be the longest time in the future.\nB. Replace the page whose next reference will be the shortest time in the future.\nC. Replace the page whose most recent reference was the shortest time in the past.\nD. Replace the page whose most recent reference was the longest time in the past. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Let f(X) = if x = 1 then 0 else [x * f(x - 1) + x**2]. The value of f(4) is
A. 53
B. 29
C. 50
D. 100 | [
{
"content": "Let f(X) = if x = 1 then 0 else [x * f(x - 1) + x**2]. The value of f(4) is\nA. 53\nB. 29\nC. 50\nD. 100 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Let f(X) = if x = 1 then 0 else [x * f(x - 1) + x**2]. The value of f(4) is\nA. 53\nB. 29\nC. 50\nD. 100 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Let f(X) = if x = 1 then 0 else [x * f(x - 1) + x**2]. The value of f(4) is\nA. 53\nB. 29\nC. 50\nD. 100 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Church's thesis equates the concept of "computable function" with those functions computable by, for example, Turing machines. Which of the following is true of Church's thesis?
A. It was first proven by Alan Turing.
B. It has not yet been proven, but finding a proof is a subject of active research.
C. It can never be proven.
D. It is now in doubt because of the advent of parallel computers. | [
{
"content": "Church's thesis equates the concept of \"computable function\" with those functions computable by, for example, Turing machines. Which of the following is true of Church's thesis?\nA. It was first proven by Alan Turing.\nB. It has not yet been proven, but finding a proof is a subject of active research.\nC. It can never be proven.\nD. It is now in doubt because of the advent of parallel computers. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Church's thesis equates the concept of \"computable function\" with those functions computable by, for example, Turing machines. Which of the following is true of Church's thesis?\nA. It was first proven by Alan Turing.\nB. It has not yet been proven, but finding a proof is a subject of active research.\nC. It can never be proven.\nD. It is now in doubt because of the advent of parallel computers. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Church's thesis equates the concept of \"computable function\" with those functions computable by, for example, Turing machines. Which of the following is true of Church's thesis?\nA. It was first proven by Alan Turing.\nB. It has not yet been proven, but finding a proof is a subject of active research.\nC. It can never be proven.\nD. It is now in doubt because of the advent of parallel computers. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Which of the following statements is FALSE about memory reclamation based on reference counting?
A. Reference counting is well suited for reclaiming cyclic structures.
B. Reference counting incurs additional space overhead for each memory cell.
C. Reference counting is an alternative to mark-and-sweep garbage collection.
D. Reference counting need not keep track of which cells point to other cells. | [
{
"content": "Which of the following statements is FALSE about memory reclamation based on reference counting?\nA. Reference counting is well suited for reclaiming cyclic structures.\nB. Reference counting incurs additional space overhead for each memory cell.\nC. Reference counting is an alternative to mark-and-sweep garbage collection.\nD. Reference counting need not keep track of which cells point to other cells. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Which of the following statements is FALSE about memory reclamation based on reference counting?\nA. Reference counting is well suited for reclaiming cyclic structures.\nB. Reference counting incurs additional space overhead for each memory cell.\nC. Reference counting is an alternative to mark-and-sweep garbage collection.\nD. Reference counting need not keep track of which cells point to other cells. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following statements is FALSE about memory reclamation based on reference counting?\nA. Reference counting is well suited for reclaiming cyclic structures.\nB. Reference counting incurs additional space overhead for each memory cell.\nC. Reference counting is an alternative to mark-and-sweep garbage collection.\nD. Reference counting need not keep track of which cells point to other cells. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Suppose it takes 1 second to factor a general 100 x 100 matrix using Gaussian elimination. Of the following, which is the best estimate of the number of seconds it will take to factor a 500 x 500 matrix based on the relative dimensions?
A. 5
B. 10
C. 25
D. 125 | [
{
"content": "Suppose it takes 1 second to factor a general 100 x 100 matrix using Gaussian elimination. Of the following, which is the best estimate of the number of seconds it will take to factor a 500 x 500 matrix based on the relative dimensions?\nA. 5\nB. 10\nC. 25\nD. 125 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Suppose it takes 1 second to factor a general 100 x 100 matrix using Gaussian elimination. Of the following, which is the best estimate of the number of seconds it will take to factor a 500 x 500 matrix based on the relative dimensions?\nA. 5\nB. 10\nC. 25\nD. 125 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose it takes 1 second to factor a general 100 x 100 matrix using Gaussian elimination. Of the following, which is the best estimate of the number of seconds it will take to factor a 500 x 500 matrix based on the relative dimensions?\nA. 5\nB. 10\nC. 25\nD. 125 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The main difference between a network operating system and a distributed operating system is that
A. A network operating system hides the existence of many machines from the user, but a distributed operating system makes the existence of many machines visible
B. A distributed operating system hides the existence of many machines from the user, but a network operating system makes the existence of many machines visible
C. A network operating system uses a local-area network, while a distributed operating system uses a wide-area network
D. A distributed operating system uses a local-area network, while a network operating system uses a wide-area network | [
{
"content": "The main difference between a network operating system and a distributed operating system is that\nA. A network operating system hides the existence of many machines from the user, but a distributed operating system makes the existence of many machines visible\nB. A distributed operating system hides the existence of many machines from the user, but a network operating system makes the existence of many machines visible\nC. A network operating system uses a local-area network, while a distributed operating system uses a wide-area network\nD. A distributed operating system uses a local-area network, while a network operating system uses a wide-area network ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "The main difference between a network operating system and a distributed operating system is that\nA. A network operating system hides the existence of many machines from the user, but a distributed operating system makes the existence of many machines visible\nB. A distributed operating system hides the existence of many machines from the user, but a network operating system makes the existence of many machines visible\nC. A network operating system uses a local-area network, while a distributed operating system uses a wide-area network\nD. A distributed operating system uses a local-area network, while a network operating system uses a wide-area network ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The main difference between a network operating system and a distributed operating system is that\nA. A network operating system hides the existence of many machines from the user, but a distributed operating system makes the existence of many machines visible\nB. A distributed operating system hides the existence of many machines from the user, but a network operating system makes the existence of many machines visible\nC. A network operating system uses a local-area network, while a distributed operating system uses a wide-area network\nD. A distributed operating system uses a local-area network, while a network operating system uses a wide-area network ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
If L is a language accepted by some automaton M, which of the following is (are) true?
I. If M is a nondeterministic finite automaton, then L is accepted by some deterministic finite automaton.
II. If M is a deterministic pushdown automaton, then L is accepted by some nondeterministic pushdown automaton.
III. If M is a nondeterministic pushdown automaton, then L is accepted by some deterministic Turing machine.
A. III only
B. I and II only
C. II and III only
D. I, II, and III | [
{
"content": "If L is a language accepted by some automaton M, which of the following is (are) true?\nI. If M is a nondeterministic finite automaton, then L is accepted by some deterministic finite automaton.\nII. If M is a deterministic pushdown automaton, then L is accepted by some nondeterministic pushdown automaton.\nIII. If M is a nondeterministic pushdown automaton, then L is accepted by some deterministic Turing machine.\nA. III only\nB. I and II only\nC. II and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "If L is a language accepted by some automaton M, which of the following is (are) true?\nI. If M is a nondeterministic finite automaton, then L is accepted by some deterministic finite automaton.\nII. If M is a deterministic pushdown automaton, then L is accepted by some nondeterministic pushdown automaton.\nIII. If M is a nondeterministic pushdown automaton, then L is accepted by some deterministic Turing machine.\nA. III only\nB. I and II only\nC. II and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "If L is a language accepted by some automaton M, which of the following is (are) true?\nI. If M is a nondeterministic finite automaton, then L is accepted by some deterministic finite automaton.\nII. If M is a deterministic pushdown automaton, then L is accepted by some nondeterministic pushdown automaton.\nIII. If M is a nondeterministic pushdown automaton, then L is accepted by some deterministic Turing machine.\nA. III only\nB. I and II only\nC. II and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Consider the following possible data structures for a set of n distinct integers.
I. A min-heap
II. An array of length n sorted in increasing order
III. A balanced binary search tree
For which of these data structures is the number of steps needed to find and remove the 7th largest element O(log n) in the worst case?
A. I only
B. II only
C. I and II
D. II and III | [
{
"content": "Consider the following possible data structures for a set of n distinct integers.\nI. A min-heap\nII. An array of length n sorted in increasing order\nIII. A balanced binary search tree\nFor which of these data structures is the number of steps needed to find and remove the 7th largest element O(log n) in the worst case?\nA. I only\nB. II only\nC. I and II\nD. II and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Consider the following possible data structures for a set of n distinct integers.\nI. A min-heap\nII. An array of length n sorted in increasing order\nIII. A balanced binary search tree\nFor which of these data structures is the number of steps needed to find and remove the 7th largest element O(log n) in the worst case?\nA. I only\nB. II only\nC. I and II\nD. II and III ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Consider the following possible data structures for a set of n distinct integers.\nI. A min-heap\nII. An array of length n sorted in increasing order\nIII. A balanced binary search tree\nFor which of these data structures is the number of steps needed to find and remove the 7th largest element O(log n) in the worst case?\nA. I only\nB. II only\nC. I and II\nD. II and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Which of the following evaluation strategies must be defined in order to execute a logic program on a sequential machine?
I. Evaluation order of rules
II. Evaluation order of clauses
III. Evaluation order of arguments in each clause
A. II only
B. I and II only
C. I and III only
D. I, II, and III | [
{
"content": "Which of the following evaluation strategies must be defined in order to execute a logic program on a sequential machine?\nI. Evaluation order of rules\nII. Evaluation order of clauses\nIII. Evaluation order of arguments in each clause\nA. II only\nB. I and II only\nC. I and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Which of the following evaluation strategies must be defined in order to execute a logic program on a sequential machine?\nI. Evaluation order of rules\nII. Evaluation order of clauses\nIII. Evaluation order of arguments in each clause\nA. II only\nB. I and II only\nC. I and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following evaluation strategies must be defined in order to execute a logic program on a sequential machine?\nI. Evaluation order of rules\nII. Evaluation order of clauses\nIII. Evaluation order of arguments in each clause\nA. II only\nB. I and II only\nC. I and III only\nD. I, II, and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
If a polynomial f(x) over the real numbers has the complex numbers 2 + i and 1 - i as roots, then f(x) could be
A. x^3 + 5x^2 + 4x + 1
B. x^4 - 6x^3 + 15x^2 - 18x + 10
C. x^3 - x^2 + 4x + 1
D. x^4 + 7x^2 + 10 | [
{
"content": "If a polynomial f(x) over the real numbers has the complex numbers 2 + i and 1 - i as roots, then f(x) could be\nA. x^3 + 5x^2 + 4x + 1\nB. x^4 - 6x^3 + 15x^2 - 18x + 10\nC. x^3 - x^2 + 4x + 1\nD. x^4 + 7x^2 + 10 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "If a polynomial f(x) over the real numbers has the complex numbers 2 + i and 1 - i as roots, then f(x) could be\nA. x^3 + 5x^2 + 4x + 1\nB. x^4 - 6x^3 + 15x^2 - 18x + 10\nC. x^3 - x^2 + 4x + 1\nD. x^4 + 7x^2 + 10 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "If a polynomial f(x) over the real numbers has the complex numbers 2 + i and 1 - i as roots, then f(x) could be\nA. x^3 + 5x^2 + 4x + 1\nB. x^4 - 6x^3 + 15x^2 - 18x + 10\nC. x^3 - x^2 + 4x + 1\nD. x^4 + 7x^2 + 10 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
What is the volume of the solid in xyz-space bounded by the surfaces y = x^2, y = 2 - x^2, z = 0, and z = y + 3?
A. 8/3
B. 16/3
C. 32/3
D. 104/105 | [
{
"content": "What is the volume of the solid in xyz-space bounded by the surfaces y = x^2, y = 2 - x^2, z = 0, and z = y + 3?\nA. 8/3\nB. 16/3\nC. 32/3\nD. 104/105 ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "What is the volume of the solid in xyz-space bounded by the surfaces y = x^2, y = 2 - x^2, z = 0, and z = y + 3?\nA. 8/3\nB. 16/3\nC. 32/3\nD. 104/105 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "What is the volume of the solid in xyz-space bounded by the surfaces y = x^2, y = 2 - x^2, z = 0, and z = y + 3?\nA. 8/3\nB. 16/3\nC. 32/3\nD. 104/105 ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Suppose A, B, and C are statements such that C is true if exactly one of A and B is true. If C is false, which of the following statements must be true?
A. If A is true, then B is false.
B. If A is false, then B is false.
C. If A is false, then B is true.
D. Both A and B are true. | [
{
"content": "Suppose A, B, and C are statements such that C is true if exactly one of A and B is true. If C is false, which of the following statements must be true?\nA. If A is true, then B is false.\nB. If A is false, then B is false.\nC. If A is false, then B is true.\nD. Both A and B are true. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "Suppose A, B, and C are statements such that C is true if exactly one of A and B is true. If C is false, which of the following statements must be true?\nA. If A is true, then B is false.\nB. If A is false, then B is false.\nC. If A is false, then B is true.\nD. Both A and B are true. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose A, B, and C are statements such that C is true if exactly one of A and B is true. If C is false, which of the following statements must be true?\nA. If A is true, then B is false.\nB. If A is false, then B is false.\nC. If A is false, then B is true.\nD. Both A and B are true. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
In a survey of 100 undergraduate math majors at a certain college, the following information is
obtained about the courses they are taking during the Spring semester:
41 are enrolled in real analysis,
44 are enrolled in differential equations, 48 are enrolled in linear algebra,
11 are enrolled in both real analysis and linear algebra,
14 are enrolled in both real analysis and differential equations,
19 are enrolled in both differential equations and linear algebra, and 10 are not enrolled in any of these three courses.
How many of the students surveyed are enrolled in all three of these courses?
A. 1
B. 2
C. 3
D. 4 | [
{
"content": "In a survey of 100 undergraduate math majors at a certain college, the following information is\r\nobtained about the courses they are taking during the Spring semester:\r\n41 are enrolled in real analysis,\r\n44 are enrolled in differential equations, 48 are enrolled in linear algebra,\r\n11 are enrolled in both real analysis and linear algebra,\r\n14 are enrolled in both real analysis and differential equations,\r\n19 are enrolled in both differential equations and linear algebra, and 10 are not enrolled in any of these three courses.\r\nHow many of the students surveyed are enrolled in all three of these courses?\nA. 1\nB. 2\nC. 3\nD. 4 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "In a survey of 100 undergraduate math majors at a certain college, the following information is\r\nobtained about the courses they are taking during the Spring semester:\r\n41 are enrolled in real analysis,\r\n44 are enrolled in differential equations, 48 are enrolled in linear algebra,\r\n11 are enrolled in both real analysis and linear algebra,\r\n14 are enrolled in both real analysis and differential equations,\r\n19 are enrolled in both differential equations and linear algebra, and 10 are not enrolled in any of these three courses.\r\nHow many of the students surveyed are enrolled in all three of these courses?\nA. 1\nB. 2\nC. 3\nD. 4 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "In a survey of 100 undergraduate math majors at a certain college, the following information is\r\nobtained about the courses they are taking during the Spring semester:\r\n41 are enrolled in real analysis,\r\n44 are enrolled in differential equations, 48 are enrolled in linear algebra,\r\n11 are enrolled in both real analysis and linear algebra,\r\n14 are enrolled in both real analysis and differential equations,\r\n19 are enrolled in both differential equations and linear algebra, and 10 are not enrolled in any of these three courses.\r\nHow many of the students surveyed are enrolled in all three of these courses?\nA. 1\nB. 2\nC. 3\nD. 4 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
k digits are to be chosen at random (with repetitions allowed) from {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. What is the probability that 0 will not be chosen?
A. (9/10)^k
B. (1/10)^k
C. (k-1)/k
D. 1/10 | [
{
"content": "k digits are to be chosen at random (with repetitions allowed) from {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. What is the probability that 0 will not be chosen?\nA. (9/10)^k\nB. (1/10)^k\nC. (k-1)/k\nD. 1/10 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "k digits are to be chosen at random (with repetitions allowed) from {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. What is the probability that 0 will not be chosen?\nA. (9/10)^k\nB. (1/10)^k\nC. (k-1)/k\nD. 1/10 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "k digits are to be chosen at random (with repetitions allowed) from {0, 1, 2, 3, 4, 5, 6, 7, 8, 9}. What is the probability that 0 will not be chosen?\nA. (9/10)^k\nB. (1/10)^k\nC. (k-1)/k\nD. 1/10 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
In the complex z-plane, the set of points satisfying the equation z^2 = |z|^2 is a
A. pair of points
B. circle
C. half-line
D. line | [
{
"content": "In the complex z-plane, the set of points satisfying the equation z^2 = |z|^2 is a\nA. pair of points\nB. circle\nC. half-line\nD. line ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "In the complex z-plane, the set of points satisfying the equation z^2 = |z|^2 is a\nA. pair of points\nB. circle\nC. half-line\nD. line ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "In the complex z-plane, the set of points satisfying the equation z^2 = |z|^2 is a\nA. pair of points\nB. circle\nC. half-line\nD. line ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Let S, T, and U be nonempty sets, and let f: S -> T and g: T -> U be functions such that the function g ∘ f : S -> U is one-to-one (injective). Which of the following must be true?
A. f is one-to-one.
B. f is onto.
C. g is one-to-one.
D. g is onto. | [
{
"content": "Let S, T, and U be nonempty sets, and let f: S -> T and g: T -> U be functions such that the function g ∘ f : S -> U is one-to-one (injective). Which of the following must be true?\nA. f is one-to-one.\nB. f is onto.\nC. g is one-to-one.\nD. g is onto. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Let S, T, and U be nonempty sets, and let f: S -> T and g: T -> U be functions such that the function g ∘ f : S -> U is one-to-one (injective). Which of the following must be true?\nA. f is one-to-one.\nB. f is onto.\nC. g is one-to-one.\nD. g is onto. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Let S, T, and U be nonempty sets, and let f: S -> T and g: T -> U be functions such that the function g ∘ f : S -> U is one-to-one (injective). Which of the following must be true?\nA. f is one-to-one.\nB. f is onto.\nC. g is one-to-one.\nD. g is onto. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
A fair die is tossed 360 times. The probability that a six comes up on 70 or more of the tosses is
A. greater than 0.50
B. between 0.16 and 0.50
C. between 0.02 and 0.16
D. between 0.01 and 0.02 | [
{
"content": "A fair die is tossed 360 times. The probability that a six comes up on 70 or more of the tosses is\nA. greater than 0.50\nB. between 0.16 and 0.50\nC. between 0.02 and 0.16\nD. between 0.01 and 0.02 ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A fair die is tossed 360 times. The probability that a six comes up on 70 or more of the tosses is\nA. greater than 0.50\nB. between 0.16 and 0.50\nC. between 0.02 and 0.16\nD. between 0.01 and 0.02 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A fair die is tossed 360 times. The probability that a six comes up on 70 or more of the tosses is\nA. greater than 0.50\nB. between 0.16 and 0.50\nC. between 0.02 and 0.16\nD. between 0.01 and 0.02 ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
For what value of b is the line y = 10x tangent to the curve y = e^(bx) at some point in the xy-plane?
A. 10/e
B. 10
C. 10e
D. e^10 | [
{
"content": "For what value of b is the line y = 10x tangent to the curve y = e^(bx) at some point in the xy-plane?\nA. 10/e\nB. 10\nC. 10e\nD. e^10 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "For what value of b is the line y = 10x tangent to the curve y = e^(bx) at some point in the xy-plane?\nA. 10/e\nB. 10\nC. 10e\nD. e^10 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "For what value of b is the line y = 10x tangent to the curve y = e^(bx) at some point in the xy-plane?\nA. 10/e\nB. 10\nC. 10e\nD. e^10 ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
If the finite group G contains a subgroup of order five but no element of G other than the identity is its own inverse, then the order of G could be
A. 8
B. 20
C. 30
D. 35 | [
{
"content": "If the finite group G contains a subgroup of order five but no element of G other than the identity is its own inverse, then the order of G could be\nA. 8\nB. 20\nC. 30\nD. 35 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "If the finite group G contains a subgroup of order five but no element of G other than the identity is its own inverse, then the order of G could be\nA. 8\nB. 20\nC. 30\nD. 35 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "If the finite group G contains a subgroup of order five but no element of G other than the identity is its own inverse, then the order of G could be\nA. 8\nB. 20\nC. 30\nD. 35 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
If one arch of the curve y = sin x is revolved around the x-axis, what's the volume of the generated solid?
A. π^2 / 4
B. π^2 / 2
C. 2π
D. π^2 | [
{
"content": "If one arch of the curve y = sin x is revolved around the x-axis, what's the volume of the generated solid?\nA. π^2 / 4\nB. π^2 / 2\nC. 2π\nD. π^2 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "If one arch of the curve y = sin x is revolved around the x-axis, what's the volume of the generated solid?\nA. π^2 / 4\nB. π^2 / 2\nC. 2π\nD. π^2 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "If one arch of the curve y = sin x is revolved around the x-axis, what's the volume of the generated solid?\nA. π^2 / 4\nB. π^2 / 2\nC. 2π\nD. π^2 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
A student observes that mercury forms a convex meniscus in the graduated cylinder but that water forms a concave one. This behavior is best explained by the fact that:
A. the two liquids are being kept in graduated cylinders made of different materials.
B. the adhesive forces between water and the walls of the graduated cylinder are greater than the adhesive forces between the mercury and the walls of the graduated cylinder.
C. the cohesive forces between two mercury atoms are stronger than the cohesive forces between two water molecules.
D. the mercury has strong cohesive than adhesive forces, whereas water has strong adhesive than cohesive ones. | [
{
"content": "A student observes that mercury forms a convex meniscus in the graduated cylinder but that water forms a concave one. This behavior is best explained by the fact that:\nA. the two liquids are being kept in graduated cylinders made of different materials.\nB. the adhesive forces between water and the walls of the graduated cylinder are greater than the adhesive forces between the mercury and the walls of the graduated cylinder.\nC. the cohesive forces between two mercury atoms are stronger than the cohesive forces between two water molecules.\nD. the mercury has strong cohesive than adhesive forces, whereas water has strong adhesive than cohesive ones. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "A student observes that mercury forms a convex meniscus in the graduated cylinder but that water forms a concave one. This behavior is best explained by the fact that:\nA. the two liquids are being kept in graduated cylinders made of different materials.\nB. the adhesive forces between water and the walls of the graduated cylinder are greater than the adhesive forces between the mercury and the walls of the graduated cylinder.\nC. the cohesive forces between two mercury atoms are stronger than the cohesive forces between two water molecules.\nD. the mercury has strong cohesive than adhesive forces, whereas water has strong adhesive than cohesive ones. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A student observes that mercury forms a convex meniscus in the graduated cylinder but that water forms a concave one. This behavior is best explained by the fact that:\nA. the two liquids are being kept in graduated cylinders made of different materials.\nB. the adhesive forces between water and the walls of the graduated cylinder are greater than the adhesive forces between the mercury and the walls of the graduated cylinder.\nC. the cohesive forces between two mercury atoms are stronger than the cohesive forces between two water molecules.\nD. the mercury has strong cohesive than adhesive forces, whereas water has strong adhesive than cohesive ones. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Human beings require many outside resources in order to survive. An individual will not survive without water, air, etc. Thankfully, the human brain is wired to seek out these resources when they are depleted before harm occurs to the individual. The downside of this, however, is that they can produce too much reward, and become a temptation. Which of the following statements would mean a desire has become a temptation?
A. A person desiring to lose weight makes a late night snack to quell a craving.
B. A marathon runner seeks out water after finishing a race.
C. A free diver delays leaving the beach after a dive by a few minutes in order to regain their breath.
D. A person pauses their show on TV in order to grab a blanket because they are cold. | [
{
"content": "Human beings require many outside resources in order to survive. An individual will not survive without water, air, etc. Thankfully, the human brain is wired to seek out these resources when they are depleted before harm occurs to the individual. The downside of this, however, is that they can produce too much reward, and become a temptation. Which of the following statements would mean a desire has become a temptation?\nA. A person desiring to lose weight makes a late night snack to quell a craving.\nB. A marathon runner seeks out water after finishing a race.\nC. A free diver delays leaving the beach after a dive by a few minutes in order to regain their breath.\nD. A person pauses their show on TV in order to grab a blanket because they are cold. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Human beings require many outside resources in order to survive. An individual will not survive without water, air, etc. Thankfully, the human brain is wired to seek out these resources when they are depleted before harm occurs to the individual. The downside of this, however, is that they can produce too much reward, and become a temptation. Which of the following statements would mean a desire has become a temptation?\nA. A person desiring to lose weight makes a late night snack to quell a craving.\nB. A marathon runner seeks out water after finishing a race.\nC. A free diver delays leaving the beach after a dive by a few minutes in order to regain their breath.\nD. A person pauses their show on TV in order to grab a blanket because they are cold. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Human beings require many outside resources in order to survive. An individual will not survive without water, air, etc. Thankfully, the human brain is wired to seek out these resources when they are depleted before harm occurs to the individual. The downside of this, however, is that they can produce too much reward, and become a temptation. Which of the following statements would mean a desire has become a temptation?\nA. A person desiring to lose weight makes a late night snack to quell a craving.\nB. A marathon runner seeks out water after finishing a race.\nC. A free diver delays leaving the beach after a dive by a few minutes in order to regain their breath.\nD. A person pauses their show on TV in order to grab a blanket because they are cold. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
How many chromosomes do all human somatic cells contain?
A. 3
B. 20
C. 23
D. 46 | [
{
"content": "How many chromosomes do all human somatic cells contain?\nA. 3\nB. 20\nC. 23\nD. 46 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "How many chromosomes do all human somatic cells contain?\nA. 3\nB. 20\nC. 23\nD. 46 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "How many chromosomes do all human somatic cells contain?\nA. 3\nB. 20\nC. 23\nD. 46 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
In all-out exercise such as sprinting the first fibre types to fatigue are the:
A. Type I fibres.
B. Type Ia fibres.
C. Type IIa fibres.
D. Type IIX fibres. | [
{
"content": "In all-out exercise such as sprinting the first fibre types to fatigue are the:\nA. Type I fibres.\nB. Type Ia fibres.\nC. Type IIa fibres.\nD. Type IIX fibres. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "In all-out exercise such as sprinting the first fibre types to fatigue are the:\nA. Type I fibres.\nB. Type Ia fibres.\nC. Type IIa fibres.\nD. Type IIX fibres. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "In all-out exercise such as sprinting the first fibre types to fatigue are the:\nA. Type I fibres.\nB. Type Ia fibres.\nC. Type IIa fibres.\nD. Type IIX fibres. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The term gene doping refers to:
A. the use of drugs to modify gene transcription.
B. the use of genetic manipulation techniques to enhance performance in sport.
C. the activation or inhibition of genes to mask drug taking by athletes.
D. the use of drugs to modify the myostatin gene. | [
{
"content": "The term gene doping refers to:\nA. the use of drugs to modify gene transcription.\nB. the use of genetic manipulation techniques to enhance performance in sport.\nC. the activation or inhibition of genes to mask drug taking by athletes.\nD. the use of drugs to modify the myostatin gene. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "The term gene doping refers to:\nA. the use of drugs to modify gene transcription.\nB. the use of genetic manipulation techniques to enhance performance in sport.\nC. the activation or inhibition of genes to mask drug taking by athletes.\nD. the use of drugs to modify the myostatin gene. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The term gene doping refers to:\nA. the use of drugs to modify gene transcription.\nB. the use of genetic manipulation techniques to enhance performance in sport.\nC. the activation or inhibition of genes to mask drug taking by athletes.\nD. the use of drugs to modify the myostatin gene. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Which of the following would be the most accurate definition of Nietzsche’s Will to Truth?"
A. An intrinsic desire to know the truth.
B. Moral drive to act toward what is good.
C. A subset of our ego that acts towards what is right.
D. Our desire for love. | [
{
"content": "Which of the following would be the most accurate definition of Nietzsche’s Will to Truth?\"\nA. An intrinsic desire to know the truth.\nB. Moral drive to act toward what is good.\nC. A subset of our ego that acts towards what is right.\nD. Our desire for love. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Which of the following would be the most accurate definition of Nietzsche’s Will to Truth?\"\nA. An intrinsic desire to know the truth.\nB. Moral drive to act toward what is good.\nC. A subset of our ego that acts towards what is right.\nD. Our desire for love. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following would be the most accurate definition of Nietzsche’s Will to Truth?\"\nA. An intrinsic desire to know the truth.\nB. Moral drive to act toward what is good.\nC. A subset of our ego that acts towards what is right.\nD. Our desire for love. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Which of the following physiological characteristics is not important for success in endurance events such as the marathon race?
A. The ability to regulate body temperature.
B. The ability to supply oxygen to the exercising muscles.
C. The availability of body stores of carbohydrate.
D. Muscle ATP and phosphocreatine content. | [
{
"content": "Which of the following physiological characteristics is not important for success in endurance events such as the marathon race?\nA. The ability to regulate body temperature.\nB. The ability to supply oxygen to the exercising muscles.\nC. The availability of body stores of carbohydrate.\nD. Muscle ATP and phosphocreatine content. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Which of the following physiological characteristics is not important for success in endurance events such as the marathon race?\nA. The ability to regulate body temperature.\nB. The ability to supply oxygen to the exercising muscles.\nC. The availability of body stores of carbohydrate.\nD. Muscle ATP and phosphocreatine content. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following physiological characteristics is not important for success in endurance events such as the marathon race?\nA. The ability to regulate body temperature.\nB. The ability to supply oxygen to the exercising muscles.\nC. The availability of body stores of carbohydrate.\nD. Muscle ATP and phosphocreatine content. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
During exercise, adrenaline secretion from the adrenal glands is stimulated by:
A. increased plasma glucose.
B. increased plasma fatty acids.
C. increased plasma ACTH.
D. increased sympathetic nerve activity. | [
{
"content": "During exercise, adrenaline secretion from the adrenal glands is stimulated by:\nA. increased plasma glucose.\nB. increased plasma fatty acids.\nC. increased plasma ACTH.\nD. increased sympathetic nerve activity. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "During exercise, adrenaline secretion from the adrenal glands is stimulated by:\nA. increased plasma glucose.\nB. increased plasma fatty acids.\nC. increased plasma ACTH.\nD. increased sympathetic nerve activity. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "During exercise, adrenaline secretion from the adrenal glands is stimulated by:\nA. increased plasma glucose.\nB. increased plasma fatty acids.\nC. increased plasma ACTH.\nD. increased sympathetic nerve activity. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A young adult man begins seeing a therapist and tells the therapist that he has homosexual feelings, and that he self-identifies as gay. He is plagued by feelings of worthlessness and fears that he will be subject to what his religion terms “eternal damnation”. He feels alienated from his family and friends, as he knows of no other homosexuals in his peer group or family. In the course of working with the man, the therapist helps him see that his feelings are exceptionally common among people who have recently discovered their same-sex feelings, and encourages him to attend a support group for newly “out” gay men. The therapist’s approach demonstrates which of the following phenomena?
A. Stereotype threat
B. Groupthink
C. Universalization
D. Spatial discrimination | [
{
"content": "A young adult man begins seeing a therapist and tells the therapist that he has homosexual feelings, and that he self-identifies as gay. He is plagued by feelings of worthlessness and fears that he will be subject to what his religion terms “eternal damnation”. He feels alienated from his family and friends, as he knows of no other homosexuals in his peer group or family. In the course of working with the man, the therapist helps him see that his feelings are exceptionally common among people who have recently discovered their same-sex feelings, and encourages him to attend a support group for newly “out” gay men. The therapist’s approach demonstrates which of the following phenomena?\nA. Stereotype threat\nB. Groupthink\nC. Universalization\nD. Spatial discrimination ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A young adult man begins seeing a therapist and tells the therapist that he has homosexual feelings, and that he self-identifies as gay. He is plagued by feelings of worthlessness and fears that he will be subject to what his religion terms “eternal damnation”. He feels alienated from his family and friends, as he knows of no other homosexuals in his peer group or family. In the course of working with the man, the therapist helps him see that his feelings are exceptionally common among people who have recently discovered their same-sex feelings, and encourages him to attend a support group for newly “out” gay men. The therapist’s approach demonstrates which of the following phenomena?\nA. Stereotype threat\nB. Groupthink\nC. Universalization\nD. Spatial discrimination ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A young adult man begins seeing a therapist and tells the therapist that he has homosexual feelings, and that he self-identifies as gay. He is plagued by feelings of worthlessness and fears that he will be subject to what his religion terms “eternal damnation”. He feels alienated from his family and friends, as he knows of no other homosexuals in his peer group or family. In the course of working with the man, the therapist helps him see that his feelings are exceptionally common among people who have recently discovered their same-sex feelings, and encourages him to attend a support group for newly “out” gay men. The therapist’s approach demonstrates which of the following phenomena?\nA. Stereotype threat\nB. Groupthink\nC. Universalization\nD. Spatial discrimination ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
A 1 meter tall jug of water, while sitting on a countertop 2 meters high with its lid open, springs a leak from a weak spot in the plastic at the very bottom of the side. How fast will water empty from the jug?
A. 4.47 m/s
B. 6.25 m/s
C. 8.26 m/s
D. 2.22 m/s | [
{
"content": "A 1 meter tall jug of water, while sitting on a countertop 2 meters high with its lid open, springs a leak from a weak spot in the plastic at the very bottom of the side. How fast will water empty from the jug?\nA. 4.47 m/s\nB. 6.25 m/s\nC. 8.26 m/s\nD. 2.22 m/s ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "A 1 meter tall jug of water, while sitting on a countertop 2 meters high with its lid open, springs a leak from a weak spot in the plastic at the very bottom of the side. How fast will water empty from the jug?\nA. 4.47 m/s\nB. 6.25 m/s\nC. 8.26 m/s\nD. 2.22 m/s ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A 1 meter tall jug of water, while sitting on a countertop 2 meters high with its lid open, springs a leak from a weak spot in the plastic at the very bottom of the side. How fast will water empty from the jug?\nA. 4.47 m/s\nB. 6.25 m/s\nC. 8.26 m/s\nD. 2.22 m/s ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
The two principal contractile proteins found in skeletal muscle are:
A. actin and troponin.
B. actin and myosin.
C. troponin and tropomyosin.
D. myosin and tropomyosin. | [
{
"content": "The two principal contractile proteins found in skeletal muscle are:\nA. actin and troponin.\nB. actin and myosin.\nC. troponin and tropomyosin.\nD. myosin and tropomyosin. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "The two principal contractile proteins found in skeletal muscle are:\nA. actin and troponin.\nB. actin and myosin.\nC. troponin and tropomyosin.\nD. myosin and tropomyosin. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The two principal contractile proteins found in skeletal muscle are:\nA. actin and troponin.\nB. actin and myosin.\nC. troponin and tropomyosin.\nD. myosin and tropomyosin. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
A psychology study run on a college campus was set up right outside of the gym on a weekday. Chocolate chip cookies were offered right outside the door, and then a sign was placed 15 feet further down the hall that asked people to avoid using the stairs, forcing them to go around in a longer hallway. There were no barriers to using the stairs other than the sign. The results returned, and it showed that individuals who took a sweet from the tray were twice as likely to use the longer hallway as individuals who refused. This is an example of what psychological concept?
A. Learned helplessness
B. Insecure attachment
C. Ego depletion
D. Tyranny of choice | [
{
"content": "A psychology study run on a college campus was set up right outside of the gym on a weekday. Chocolate chip cookies were offered right outside the door, and then a sign was placed 15 feet further down the hall that asked people to avoid using the stairs, forcing them to go around in a longer hallway. There were no barriers to using the stairs other than the sign. The results returned, and it showed that individuals who took a sweet from the tray were twice as likely to use the longer hallway as individuals who refused. This is an example of what psychological concept?\nA. Learned helplessness\nB. Insecure attachment\nC. Ego depletion\nD. Tyranny of choice ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A psychology study run on a college campus was set up right outside of the gym on a weekday. Chocolate chip cookies were offered right outside the door, and then a sign was placed 15 feet further down the hall that asked people to avoid using the stairs, forcing them to go around in a longer hallway. There were no barriers to using the stairs other than the sign. The results returned, and it showed that individuals who took a sweet from the tray were twice as likely to use the longer hallway as individuals who refused. This is an example of what psychological concept?\nA. Learned helplessness\nB. Insecure attachment\nC. Ego depletion\nD. Tyranny of choice ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A psychology study run on a college campus was set up right outside of the gym on a weekday. Chocolate chip cookies were offered right outside the door, and then a sign was placed 15 feet further down the hall that asked people to avoid using the stairs, forcing them to go around in a longer hallway. There were no barriers to using the stairs other than the sign. The results returned, and it showed that individuals who took a sweet from the tray were twice as likely to use the longer hallway as individuals who refused. This is an example of what psychological concept?\nA. Learned helplessness\nB. Insecure attachment\nC. Ego depletion\nD. Tyranny of choice ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Cystic Fibrosis (CF) patients often have a loss of pancreas activity during their adolescent years. Loss of which enzyme, if isolated would lead to the most extensive effects on nutrient absorption?
A. Lipase
B. Elastinogen
C. Trypsinogen
D. Carboxypeptidase | [
{
"content": "Cystic Fibrosis (CF) patients often have a loss of pancreas activity during their adolescent years. Loss of which enzyme, if isolated would lead to the most extensive effects on nutrient absorption?\nA. Lipase\nB. Elastinogen\nC. Trypsinogen\nD. Carboxypeptidase ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Cystic Fibrosis (CF) patients often have a loss of pancreas activity during their adolescent years. Loss of which enzyme, if isolated would lead to the most extensive effects on nutrient absorption?\nA. Lipase\nB. Elastinogen\nC. Trypsinogen\nD. Carboxypeptidase ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Cystic Fibrosis (CF) patients often have a loss of pancreas activity during their adolescent years. Loss of which enzyme, if isolated would lead to the most extensive effects on nutrient absorption?\nA. Lipase\nB. Elastinogen\nC. Trypsinogen\nD. Carboxypeptidase ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Somatic eukaryotic cells in the human body proceed normally through repetitive phases of the cell cycle in order to divide and make replicates of themselves. The point at which a cell commits to dividing is known as the restriction point (R). Prior to this, how many chromosomes and chromatids does the cell have?
A. 23 chromosomes, 46 chromatids
B. 46 chromosomes, 92 chromatids
C. 23 chromosomes, 23 chromatids
D. 46 chromosomes, 46 chromatids | [
{
"content": "Somatic eukaryotic cells in the human body proceed normally through repetitive phases of the cell cycle in order to divide and make replicates of themselves. The point at which a cell commits to dividing is known as the restriction point (R). Prior to this, how many chromosomes and chromatids does the cell have?\nA. 23 chromosomes, 46 chromatids\nB. 46 chromosomes, 92 chromatids\nC. 23 chromosomes, 23 chromatids\nD. 46 chromosomes, 46 chromatids ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Somatic eukaryotic cells in the human body proceed normally through repetitive phases of the cell cycle in order to divide and make replicates of themselves. The point at which a cell commits to dividing is known as the restriction point (R). Prior to this, how many chromosomes and chromatids does the cell have?\nA. 23 chromosomes, 46 chromatids\nB. 46 chromosomes, 92 chromatids\nC. 23 chromosomes, 23 chromatids\nD. 46 chromosomes, 46 chromatids ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Somatic eukaryotic cells in the human body proceed normally through repetitive phases of the cell cycle in order to divide and make replicates of themselves. The point at which a cell commits to dividing is known as the restriction point (R). Prior to this, how many chromosomes and chromatids does the cell have?\nA. 23 chromosomes, 46 chromatids\nB. 46 chromosomes, 92 chromatids\nC. 23 chromosomes, 23 chromatids\nD. 46 chromosomes, 46 chromatids ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A person suffering from severe dehydration and starvation would NOT be expected to have elevated plasma concentrations for which of the following hormones?
A. ADH
B. Cortisol
C. Aldosterone
D. Insulin | [
{
"content": "A person suffering from severe dehydration and starvation would NOT be expected to have elevated plasma concentrations for which of the following hormones?\nA. ADH\nB. Cortisol\nC. Aldosterone\nD. Insulin ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "A person suffering from severe dehydration and starvation would NOT be expected to have elevated plasma concentrations for which of the following hormones?\nA. ADH\nB. Cortisol\nC. Aldosterone\nD. Insulin ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A person suffering from severe dehydration and starvation would NOT be expected to have elevated plasma concentrations for which of the following hormones?\nA. ADH\nB. Cortisol\nC. Aldosterone\nD. Insulin ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The recommended dose of creatine to load the muscles of a 70 kg man within one week is:
A. 2 g/day.
B. 5 g/day.
C. 10 g/day.
D. 20 g/day. | [
{
"content": "The recommended dose of creatine to load the muscles of a 70 kg man within one week is:\nA. 2 g/day.\nB. 5 g/day.\nC. 10 g/day.\nD. 20 g/day. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "The recommended dose of creatine to load the muscles of a 70 kg man within one week is:\nA. 2 g/day.\nB. 5 g/day.\nC. 10 g/day.\nD. 20 g/day. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The recommended dose of creatine to load the muscles of a 70 kg man within one week is:\nA. 2 g/day.\nB. 5 g/day.\nC. 10 g/day.\nD. 20 g/day. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The creatine kinase reaction is:
A. irreversible.
B. slow compared with glycolysis.
C. not activated until all the ATP has been used up.
D. inhibited by low pH in the muscle. | [
{
"content": "The creatine kinase reaction is:\nA. irreversible.\nB. slow compared with glycolysis.\nC. not activated until all the ATP has been used up.\nD. inhibited by low pH in the muscle. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "The creatine kinase reaction is:\nA. irreversible.\nB. slow compared with glycolysis.\nC. not activated until all the ATP has been used up.\nD. inhibited by low pH in the muscle. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The creatine kinase reaction is:\nA. irreversible.\nB. slow compared with glycolysis.\nC. not activated until all the ATP has been used up.\nD. inhibited by low pH in the muscle. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A young woman comes to the clinic for feeling like her “heart is beating too fast”. When her pulse is recorded it is in normal range. Upon interview, you learn that she is often concerned about lots of things. In fact, she can’t remember many instances in which she has not had some event playing over and over in her head. She says that she often seeks out relationships to comfort her self-esteem, and admits she stays in these relationships too long for fear of being alone. What personality cluster would this person fall under?
A. Cluster A
B. Cluster B
C. Cluster C
D. This does not seem like a personality disorder. | [
{
"content": "A young woman comes to the clinic for feeling like her “heart is beating too fast”. When her pulse is recorded it is in normal range. Upon interview, you learn that she is often concerned about lots of things. In fact, she can’t remember many instances in which she has not had some event playing over and over in her head. She says that she often seeks out relationships to comfort her self-esteem, and admits she stays in these relationships too long for fear of being alone. What personality cluster would this person fall under?\nA. Cluster A\nB. Cluster B\nC. Cluster C\nD. This does not seem like a personality disorder. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A young woman comes to the clinic for feeling like her “heart is beating too fast”. When her pulse is recorded it is in normal range. Upon interview, you learn that she is often concerned about lots of things. In fact, she can’t remember many instances in which she has not had some event playing over and over in her head. She says that she often seeks out relationships to comfort her self-esteem, and admits she stays in these relationships too long for fear of being alone. What personality cluster would this person fall under?\nA. Cluster A\nB. Cluster B\nC. Cluster C\nD. This does not seem like a personality disorder. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A young woman comes to the clinic for feeling like her “heart is beating too fast”. When her pulse is recorded it is in normal range. Upon interview, you learn that she is often concerned about lots of things. In fact, she can’t remember many instances in which she has not had some event playing over and over in her head. She says that she often seeks out relationships to comfort her self-esteem, and admits she stays in these relationships too long for fear of being alone. What personality cluster would this person fall under?\nA. Cluster A\nB. Cluster B\nC. Cluster C\nD. This does not seem like a personality disorder. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
An allele that is masked is referred to as:
A. recessive.
B. redundant.
C. repressed.
D. reclusive. | [
{
"content": "An allele that is masked is referred to as:\nA. recessive.\nB. redundant.\nC. repressed.\nD. reclusive. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "An allele that is masked is referred to as:\nA. recessive.\nB. redundant.\nC. repressed.\nD. reclusive. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "An allele that is masked is referred to as:\nA. recessive.\nB. redundant.\nC. repressed.\nD. reclusive. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
In general, the higher the intensity of exercise, the greater the proportional contribution of:
A. aerobic energy production.
B. anaerobic energy production.
C. the TCA cycle (Krebs' cycle) to the production of ATP.
D. the electron transfer chain to the production of ATP. | [
{
"content": "In general, the higher the intensity of exercise, the greater the proportional contribution of:\nA. aerobic energy production.\nB. anaerobic energy production.\nC. the TCA cycle (Krebs' cycle) to the production of ATP.\nD. the electron transfer chain to the production of ATP. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "In general, the higher the intensity of exercise, the greater the proportional contribution of:\nA. aerobic energy production.\nB. anaerobic energy production.\nC. the TCA cycle (Krebs' cycle) to the production of ATP.\nD. the electron transfer chain to the production of ATP. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "In general, the higher the intensity of exercise, the greater the proportional contribution of:\nA. aerobic energy production.\nB. anaerobic energy production.\nC. the TCA cycle (Krebs' cycle) to the production of ATP.\nD. the electron transfer chain to the production of ATP. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
The main factors determining success in sport are:
A. a high energy diet and large appetite.
B. high intelligence and motivation to succeed.
C. a good coach and the motivation to succeed.
D. innate ability and the capacity to respond to the training stimulus. | [
{
"content": "The main factors determining success in sport are:\nA. a high energy diet and large appetite.\nB. high intelligence and motivation to succeed.\nC. a good coach and the motivation to succeed.\nD. innate ability and the capacity to respond to the training stimulus. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "The main factors determining success in sport are:\nA. a high energy diet and large appetite.\nB. high intelligence and motivation to succeed.\nC. a good coach and the motivation to succeed.\nD. innate ability and the capacity to respond to the training stimulus. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The main factors determining success in sport are:\nA. a high energy diet and large appetite.\nB. high intelligence and motivation to succeed.\nC. a good coach and the motivation to succeed.\nD. innate ability and the capacity to respond to the training stimulus. ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The social phenomenon of groupthink is characterized by all of the following EXCEPT:
A. A significant over-rating of the decision-making abilities of members of the ingroup.
B. A decrease in the creativity of individual group members in contributing to solutions the ingroup wants to achieve.
C. High loyalty and group cohesiveness causing members to feel safe raising controversial issues and proposing alternative solutions.
D. An effort to minimize conflict and ensure consensus. | [
{
"content": "The social phenomenon of groupthink is characterized by all of the following EXCEPT:\nA. A significant over-rating of the decision-making abilities of members of the ingroup.\nB. A decrease in the creativity of individual group members in contributing to solutions the ingroup wants to achieve.\nC. High loyalty and group cohesiveness causing members to feel safe raising controversial issues and proposing alternative solutions.\nD. An effort to minimize conflict and ensure consensus. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "The social phenomenon of groupthink is characterized by all of the following EXCEPT:\nA. A significant over-rating of the decision-making abilities of members of the ingroup.\nB. A decrease in the creativity of individual group members in contributing to solutions the ingroup wants to achieve.\nC. High loyalty and group cohesiveness causing members to feel safe raising controversial issues and proposing alternative solutions.\nD. An effort to minimize conflict and ensure consensus. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The social phenomenon of groupthink is characterized by all of the following EXCEPT:\nA. A significant over-rating of the decision-making abilities of members of the ingroup.\nB. A decrease in the creativity of individual group members in contributing to solutions the ingroup wants to achieve.\nC. High loyalty and group cohesiveness causing members to feel safe raising controversial issues and proposing alternative solutions.\nD. An effort to minimize conflict and ensure consensus. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Characteristic X rays, appearing as sharp lines on a continuous background, are produced when high-energy electrons bombard a metal target. Which of the following processes results in the characteristic X rays?
A. Electrons producing Čerenkov radiation
B. Electrons colliding with phonons in the metal
C. Electrons filling inner shell vacancies that are created in the metal atoms
D. Electrons combining with protons to form neutrons | [
{
"content": "Characteristic X rays, appearing as sharp lines on a continuous background, are produced when high-energy electrons bombard a metal target. Which of the following processes results in the characteristic X rays?\nA. Electrons producing Čerenkov radiation\nB. Electrons colliding with phonons in the metal\nC. Electrons filling inner shell vacancies that are created in the metal atoms\nD. Electrons combining with protons to form neutrons ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Characteristic X rays, appearing as sharp lines on a continuous background, are produced when high-energy electrons bombard a metal target. Which of the following processes results in the characteristic X rays?\nA. Electrons producing Čerenkov radiation\nB. Electrons colliding with phonons in the metal\nC. Electrons filling inner shell vacancies that are created in the metal atoms\nD. Electrons combining with protons to form neutrons ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Characteristic X rays, appearing as sharp lines on a continuous background, are produced when high-energy electrons bombard a metal target. Which of the following processes results in the characteristic X rays?\nA. Electrons producing Čerenkov radiation\nB. Electrons colliding with phonons in the metal\nC. Electrons filling inner shell vacancies that are created in the metal atoms\nD. Electrons combining with protons to form neutrons ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Two students perform an experiment in which they drop a ball from rest from a known height above the ground and measure the speed of the ball just before it strikes the ground. From repeated measurement, the students estimate the uncertainty in the measured speed of the ball to be 10 percent. Which of the following gives the uncertainty in the kinetic energy of the ball? (Assume the uncertainty in the ball’s mass is negligibly small.)
A. 5%
B. 10%
C. 15%
D. 20% | [
{
"content": "Two students perform an experiment in which they drop a ball from rest from a known height above the ground and measure the speed of the ball just before it strikes the ground. From repeated measurement, the students estimate the uncertainty in the measured speed of the ball to be 10 percent. Which of the following gives the uncertainty in the kinetic energy of the ball? (Assume the uncertainty in the ball’s mass is negligibly small.)\nA. 5%\nB. 10%\nC. 15%\nD. 20% ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Two students perform an experiment in which they drop a ball from rest from a known height above the ground and measure the speed of the ball just before it strikes the ground. From repeated measurement, the students estimate the uncertainty in the measured speed of the ball to be 10 percent. Which of the following gives the uncertainty in the kinetic energy of the ball? (Assume the uncertainty in the ball’s mass is negligibly small.)\nA. 5%\nB. 10%\nC. 15%\nD. 20% ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Two students perform an experiment in which they drop a ball from rest from a known height above the ground and measure the speed of the ball just before it strikes the ground. From repeated measurement, the students estimate the uncertainty in the measured speed of the ball to be 10 percent. Which of the following gives the uncertainty in the kinetic energy of the ball? (Assume the uncertainty in the ball’s mass is negligibly small.)\nA. 5%\nB. 10%\nC. 15%\nD. 20% ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The rest mass of a particle with total energy 5.0 GeV and momentum 4.9 GeV/c is approximately
A. 0.1 GeV/c^2
B. 0.2 GeV/c^2
C. 0.5 GeV/c^2
D. 1.0 GeV/c^2 | [
{
"content": "The rest mass of a particle with total energy 5.0 GeV and momentum 4.9 GeV/c is approximately\nA. 0.1 GeV/c^2\nB. 0.2 GeV/c^2\nC. 0.5 GeV/c^2\nD. 1.0 GeV/c^2 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "The rest mass of a particle with total energy 5.0 GeV and momentum 4.9 GeV/c is approximately\nA. 0.1 GeV/c^2\nB. 0.2 GeV/c^2\nC. 0.5 GeV/c^2\nD. 1.0 GeV/c^2 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The rest mass of a particle with total energy 5.0 GeV and momentum 4.9 GeV/c is approximately\nA. 0.1 GeV/c^2\nB. 0.2 GeV/c^2\nC. 0.5 GeV/c^2\nD. 1.0 GeV/c^2 ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A grating spectrometer can just barely resolve two wavelengths of 500 nm and 502 nm, respectively. Which of the following gives the resolving power of the spectrometer?
A. 2
B. 250
C. 5,000
D. 10,000 | [
{
"content": "A grating spectrometer can just barely resolve two wavelengths of 500 nm and 502 nm, respectively. Which of the following gives the resolving power of the spectrometer?\nA. 2\nB. 250\nC. 5,000\nD. 10,000 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "A grating spectrometer can just barely resolve two wavelengths of 500 nm and 502 nm, respectively. Which of the following gives the resolving power of the spectrometer?\nA. 2\nB. 250\nC. 5,000\nD. 10,000 ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A grating spectrometer can just barely resolve two wavelengths of 500 nm and 502 nm, respectively. Which of the following gives the resolving power of the spectrometer?\nA. 2\nB. 250\nC. 5,000\nD. 10,000 ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Electromagnetic radiation emitted from a nucleus is most likely to be in the form of
A. gamma rays
B. microwaves
C. ultraviolet radiation
D. visible light | [
{
"content": "Electromagnetic radiation emitted from a nucleus is most likely to be in the form of\nA. gamma rays\nB. microwaves\nC. ultraviolet radiation\nD. visible light ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Electromagnetic radiation emitted from a nucleus is most likely to be in the form of\nA. gamma rays\nB. microwaves\nC. ultraviolet radiation\nD. visible light ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Electromagnetic radiation emitted from a nucleus is most likely to be in the form of\nA. gamma rays\nB. microwaves\nC. ultraviolet radiation\nD. visible light ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
For which of the following thermodynamic processes is the increase in the internal energy of an ideal gas equal to the heat added to the gas?
A. Constant temperature
B. Constant volume
C. Constant pressure
D. Adiabatic | [
{
"content": "For which of the following thermodynamic processes is the increase in the internal energy of an ideal gas equal to the heat added to the gas?\nA. Constant temperature\nB. Constant volume\nC. Constant pressure\nD. Adiabatic ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "For which of the following thermodynamic processes is the increase in the internal energy of an ideal gas equal to the heat added to the gas?\nA. Constant temperature\nB. Constant volume\nC. Constant pressure\nD. Adiabatic ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "For which of the following thermodynamic processes is the increase in the internal energy of an ideal gas equal to the heat added to the gas?\nA. Constant temperature\nB. Constant volume\nC. Constant pressure\nD. Adiabatic ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
An ideal monatomic gas expands quasi-statically to twice its volume. If the process is isothermal, the work done by the gas is Wi. If the process is adiabatic, the work done by the gas is Wa. Which of the following is true?
A. Wi = Wa
B. 0 = Wi < Wa
C. 0 < Wi < Wa
D. 0<Wa <Wi | [
{
"content": "An ideal monatomic gas expands quasi-statically to twice its volume. If the process is isothermal, the work done by the gas is Wi. If the process is adiabatic, the work done by the gas is Wa. Which of the following is true?\nA. Wi = Wa\nB. 0 = Wi < Wa\nC. 0 < Wi < Wa\nD. 0<Wa <Wi ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "An ideal monatomic gas expands quasi-statically to twice its volume. If the process is isothermal, the work done by the gas is Wi. If the process is adiabatic, the work done by the gas is Wa. Which of the following is true?\nA. Wi = Wa\nB. 0 = Wi < Wa\nC. 0 < Wi < Wa\nD. 0<Wa <Wi ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "An ideal monatomic gas expands quasi-statically to twice its volume. If the process is isothermal, the work done by the gas is Wi. If the process is adiabatic, the work done by the gas is Wa. Which of the following is true?\nA. Wi = Wa\nB. 0 = Wi < Wa\nC. 0 < Wi < Wa\nD. 0<Wa <Wi ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The hydrogen lines observed in the spectrum of the quasar 3C9 are shifted so far into the red that their wavelengths are three times as long as those observed in the light from hydrogen atoms at rest in a laboratory on Earth. If it is assumed that the shift is entirely due to the relative motion of 3C9 and Earth, the relative speed of the quasar is
A. 2c
B. c
C. 0.8c
D. 0.5c | [
{
"content": "The hydrogen lines observed in the spectrum of the quasar 3C9 are shifted so far into the red that their wavelengths are three times as long as those observed in the light from hydrogen atoms at rest in a laboratory on Earth. If it is assumed that the shift is entirely due to the relative motion of 3C9 and Earth, the relative speed of the quasar is\nA. 2c\nB. c\nC. 0.8c\nD. 0.5c ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "The hydrogen lines observed in the spectrum of the quasar 3C9 are shifted so far into the red that their wavelengths are three times as long as those observed in the light from hydrogen atoms at rest in a laboratory on Earth. If it is assumed that the shift is entirely due to the relative motion of 3C9 and Earth, the relative speed of the quasar is\nA. 2c\nB. c\nC. 0.8c\nD. 0.5c ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The hydrogen lines observed in the spectrum of the quasar 3C9 are shifted so far into the red that their wavelengths are three times as long as those observed in the light from hydrogen atoms at rest in a laboratory on Earth. If it is assumed that the shift is entirely due to the relative motion of 3C9 and Earth, the relative speed of the quasar is\nA. 2c\nB. c\nC. 0.8c\nD. 0.5c ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Which of the following statements is (are) true for a Maxwell-Boltzmann description of an ideal gas of atoms in equilibrium at temperature T?
I. The average velocity of the atoms is zero.
II. The distribution of the speeds of the atoms has a maximum at v = 0.
III. The probability of finding an atom with zero kinetic energy is zero.
A. I only
B. II only
C. I and II
D. I and III | [
{
"content": "Which of the following statements is (are) true for a Maxwell-Boltzmann description of an ideal gas of atoms in equilibrium at temperature T?\r\nI. The average velocity of the atoms is zero.\r\nII. The distribution of the speeds of the atoms has a maximum at v = 0.\r\nIII. The probability of finding an atom with zero kinetic energy is zero.\nA. I only\nB. II only\nC. I and II\nD. I and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Which of the following statements is (are) true for a Maxwell-Boltzmann description of an ideal gas of atoms in equilibrium at temperature T?\r\nI. The average velocity of the atoms is zero.\r\nII. The distribution of the speeds of the atoms has a maximum at v = 0.\r\nIII. The probability of finding an atom with zero kinetic energy is zero.\nA. I only\nB. II only\nC. I and II\nD. I and III ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following statements is (are) true for a Maxwell-Boltzmann description of an ideal gas of atoms in equilibrium at temperature T?\r\nI. The average velocity of the atoms is zero.\r\nII. The distribution of the speeds of the atoms has a maximum at v = 0.\r\nIII. The probability of finding an atom with zero kinetic energy is zero.\nA. I only\nB. II only\nC. I and II\nD. I and III ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
During a hurricane, a 1,200 Hz warning siren on the town hall sounds. The wind is blowing at 55 m/s in a direction from the siren toward a person 1 km away. With what frequency does the sound wave reach the person? (The speed of sound in air is 330 m/s.)
A. 1,000 Hz
B. 1,030 Hz
C. 1,200 Hz
D. 1,400 Hz | [
{
"content": "During a hurricane, a 1,200 Hz warning siren on the town hall sounds. The wind is blowing at 55 m/s in a direction from the siren toward a person 1 km away. With what frequency does the sound wave reach the person? (The speed of sound in air is 330 m/s.)\nA. 1,000 Hz\nB. 1,030 Hz\nC. 1,200 Hz\nD. 1,400 Hz ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "During a hurricane, a 1,200 Hz warning siren on the town hall sounds. The wind is blowing at 55 m/s in a direction from the siren toward a person 1 km away. With what frequency does the sound wave reach the person? (The speed of sound in air is 330 m/s.)\nA. 1,000 Hz\nB. 1,030 Hz\nC. 1,200 Hz\nD. 1,400 Hz ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "During a hurricane, a 1,200 Hz warning siren on the town hall sounds. The wind is blowing at 55 m/s in a direction from the siren toward a person 1 km away. With what frequency does the sound wave reach the person? (The speed of sound in air is 330 m/s.)\nA. 1,000 Hz\nB. 1,030 Hz\nC. 1,200 Hz\nD. 1,400 Hz ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Fermat’s principle of ray optics states, “A ray of light follows the path between two points which requires the least time.” This principle can be used to derive which of the following?
I. Snell’s law of refraction
II. The law of reflection
III. Rayleigh’s criterion for resolution
A. I only
B. II only
C. III only
D. I and II | [
{
"content": "Fermat’s principle of ray optics states, “A ray of light follows the path between two points which requires the least time.” This principle can be used to derive which of the following?\r\nI. Snell’s law of refraction\r\nII. The law of reflection\r\nIII. Rayleigh’s criterion for resolution\nA. I only\nB. II only\nC. III only\nD. I and II ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Fermat’s principle of ray optics states, “A ray of light follows the path between two points which requires the least time.” This principle can be used to derive which of the following?\r\nI. Snell’s law of refraction\r\nII. The law of reflection\r\nIII. Rayleigh’s criterion for resolution\nA. I only\nB. II only\nC. III only\nD. I and II ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Fermat’s principle of ray optics states, “A ray of light follows the path between two points which requires the least time.” This principle can be used to derive which of the following?\r\nI. Snell’s law of refraction\r\nII. The law of reflection\r\nIII. Rayleigh’s criterion for resolution\nA. I only\nB. II only\nC. III only\nD. I and II ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
What is penetration testing?
A. A procedure for testing libraries or other program components for vulnerabilities
B. Whole-system testing for security flaws and bugs
C. A security-minded form of unit testing that applies early in the development process
D. All of the above | [
{
"content": "What is penetration testing?\nA. A procedure for testing libraries or other program components for vulnerabilities\nB. Whole-system testing for security flaws and bugs\nC. A security-minded form of unit testing that applies early in the development process\nD. All of the above ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "What is penetration testing?\nA. A procedure for testing libraries or other program components for vulnerabilities\nB. Whole-system testing for security flaws and bugs\nC. A security-minded form of unit testing that applies early in the development process\nD. All of the above ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "What is penetration testing?\nA. A procedure for testing libraries or other program components for vulnerabilities\nB. Whole-system testing for security flaws and bugs\nC. A security-minded form of unit testing that applies early in the development process\nD. All of the above ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Suppose a user has an iPhone (running iOS) and downloads an app called Innocent from the Apple App Store and installs it. The user unlocks the phone and runs Innocent. Innocent exploits a bug in the iOS kernel which allows Innocent to redirect execution inside the kernel to code that Innocent controls. Now Innocent can execute any instructions it likes inside the iOS kernel. Innocent is not able to exploit any bugs in the phone’s secure enclave. Can Innocent read the user’s private information stored in the phone’s flash (e.g. Contacts and messages), or will the security measures described in the paper keep the data private? If Innocent is only able to see encrypted data, then the phone has successfully kept the data private. Circle the security features of the phone (if any) that will prevent Innocent from reading information from the flash on the phone.
A. Secure boot chain
B. System software authorization
C. The secure enclave’s ephemeral key
D. None of the above | [
{
"content": "Suppose a user has an iPhone (running iOS) and downloads an app called Innocent from the Apple App Store and installs it. The user unlocks the phone and runs Innocent. Innocent exploits a bug in the iOS kernel which allows Innocent to redirect execution inside the kernel to code that Innocent controls. Now Innocent can execute any instructions it likes inside the iOS kernel. Innocent is not able to exploit any bugs in the phone’s secure enclave. Can Innocent read the user’s private information stored in the phone’s flash (e.g. Contacts and messages), or will the security measures described in the paper keep the data private? If Innocent is only able to see encrypted data, then the phone has successfully kept the data private. Circle the security features of the phone (if any) that will prevent Innocent from reading information from the flash on the phone.\nA. Secure boot chain\nB. System software authorization \nC. The secure enclave’s ephemeral key\nD. None of the above ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Suppose a user has an iPhone (running iOS) and downloads an app called Innocent from the Apple App Store and installs it. The user unlocks the phone and runs Innocent. Innocent exploits a bug in the iOS kernel which allows Innocent to redirect execution inside the kernel to code that Innocent controls. Now Innocent can execute any instructions it likes inside the iOS kernel. Innocent is not able to exploit any bugs in the phone’s secure enclave. Can Innocent read the user’s private information stored in the phone’s flash (e.g. Contacts and messages), or will the security measures described in the paper keep the data private? If Innocent is only able to see encrypted data, then the phone has successfully kept the data private. Circle the security features of the phone (if any) that will prevent Innocent from reading information from the flash on the phone.\nA. Secure boot chain\nB. System software authorization \nC. The secure enclave’s ephemeral key\nD. None of the above ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose a user has an iPhone (running iOS) and downloads an app called Innocent from the Apple App Store and installs it. The user unlocks the phone and runs Innocent. Innocent exploits a bug in the iOS kernel which allows Innocent to redirect execution inside the kernel to code that Innocent controls. Now Innocent can execute any instructions it likes inside the iOS kernel. Innocent is not able to exploit any bugs in the phone’s secure enclave. Can Innocent read the user’s private information stored in the phone’s flash (e.g. Contacts and messages), or will the security measures described in the paper keep the data private? If Innocent is only able to see encrypted data, then the phone has successfully kept the data private. Circle the security features of the phone (if any) that will prevent Innocent from reading information from the flash on the phone.\nA. Secure boot chain\nB. System software authorization \nC. The secure enclave’s ephemeral key\nD. None of the above ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Why is it that anti-virus scanners would not have found an exploitation of Heartbleed?
A. It's a vacuous question: Heartbleed only reads outside a buffer, so there is no possible exploit
B. Anti-virus scanners tend to look for viruses and other malicious
C. Heartbleed attacks the anti-virus scanner itself
D. Anti-virus scanners tend to look for viruses and other malicious code, but Heartbleed exploits steal secrets without injecting any code | [
{
"content": "Why is it that anti-virus scanners would not have found an exploitation of Heartbleed?\nA. It's a vacuous question: Heartbleed only reads outside a buffer, so there is no possible exploit \nB. Anti-virus scanners tend to look for viruses and other malicious\nC. Heartbleed attacks the anti-virus scanner itself\nD. Anti-virus scanners tend to look for viruses and other malicious code, but Heartbleed exploits steal secrets without injecting any code ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Why is it that anti-virus scanners would not have found an exploitation of Heartbleed?\nA. It's a vacuous question: Heartbleed only reads outside a buffer, so there is no possible exploit \nB. Anti-virus scanners tend to look for viruses and other malicious\nC. Heartbleed attacks the anti-virus scanner itself\nD. Anti-virus scanners tend to look for viruses and other malicious code, but Heartbleed exploits steal secrets without injecting any code ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Why is it that anti-virus scanners would not have found an exploitation of Heartbleed?\nA. It's a vacuous question: Heartbleed only reads outside a buffer, so there is no possible exploit \nB. Anti-virus scanners tend to look for viruses and other malicious\nC. Heartbleed attacks the anti-virus scanner itself\nD. Anti-virus scanners tend to look for viruses and other malicious code, but Heartbleed exploits steal secrets without injecting any code ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Suppose we define h(H, m) = E(m, H)h(H,m)=E(m,H). Then the resulting h(\cdot,\cdot)h(⋅,⋅) is not collision resistant: to build a collision (H,m)(H,m) and (H’,m’)(H’,m’) choose random (H,m,m’)(H,m,m’) and construct H’H’ as follows:
A. H’=D(m’, E(m,H))
B. H’=E(m’,D(m,H))
C. H’=E(m’,E(m,H))
D. H’=D(m’,D(m,H)) | [
{
"content": "Suppose we define h(H, m) = E(m, H)h(H,m)=E(m,H). Then the resulting h(\\cdot,\\cdot)h(⋅,⋅) is not collision resistant: to build a collision (H,m)(H,m) and (H’,m’)(H’,m’) choose random (H,m,m’)(H,m,m’) and construct H’H’ as follows:\nA. H’=D(m’, E(m,H))\nB. H’=E(m’,D(m,H))\nC. H’=E(m’,E(m,H))\nD. H’=D(m’,D(m,H)) ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Suppose we define h(H, m) = E(m, H)h(H,m)=E(m,H). Then the resulting h(\\cdot,\\cdot)h(⋅,⋅) is not collision resistant: to build a collision (H,m)(H,m) and (H’,m’)(H’,m’) choose random (H,m,m’)(H,m,m’) and construct H’H’ as follows:\nA. H’=D(m’, E(m,H))\nB. H’=E(m’,D(m,H))\nC. H’=E(m’,E(m,H))\nD. H’=D(m’,D(m,H)) ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose we define h(H, m) = E(m, H)h(H,m)=E(m,H). Then the resulting h(\\cdot,\\cdot)h(⋅,⋅) is not collision resistant: to build a collision (H,m)(H,m) and (H’,m’)(H’,m’) choose random (H,m,m’)(H,m,m’) and construct H’H’ as follows:\nA. H’=D(m’, E(m,H))\nB. H’=E(m’,D(m,H))\nC. H’=E(m’,E(m,H))\nD. H’=D(m’,D(m,H)) ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Which of the following does authentication aim to accomplish?
A. Restrict what operations/data the user can access
B. Determine if the user is an attacker
C. Flag the user if he/she misbehaves
D. Determine who the user is | [
{
"content": "Which of the following does authentication aim to accomplish?\nA. Restrict what operations/data the user can access\nB. Determine if the user is an attacker\nC. Flag the user if he/she misbehaves\nD. Determine who the user is ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Which of the following does authentication aim to accomplish?\nA. Restrict what operations/data the user can access\nB. Determine if the user is an attacker\nC. Flag the user if he/she misbehaves\nD. Determine who the user is ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of the following does authentication aim to accomplish?\nA. Restrict what operations/data the user can access\nB. Determine if the user is an attacker\nC. Flag the user if he/she misbehaves\nD. Determine who the user is ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don’t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?
1. An attacker stealing the server’s private key and reading the plaintext of recorded past connections.
2. An attacker breaking into a certificate authority and creating a fake certificate for the server.
A. True, True
B. False, False
C. True, False
D. False, True | [
{
"content": "Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don’t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker stealing the server’s private key and reading the plaintext of recorded past connections.\n2. An attacker breaking into a certificate authority and creating a fake certificate for the server.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don’t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker stealing the server’s private key and reading the plaintext of recorded past connections.\n2. An attacker breaking into a certificate authority and creating a fake certificate for the server.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Assume that a TLS connection has been established successfully between a client and a server. Establishing the session included checking the server certificate and executing a DiffieHelmann exchange, but the client did not provide a client certificate. Further, assume that the client and server are honest, that the client and server don’t leak their keys, and that the cryptography is good. Which of the following attacks does TLS protect against?\n1. An attacker stealing the server’s private key and reading the plaintext of recorded past connections.\n2. An attacker breaking into a certificate authority and creating a fake certificate for the server.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Can we build a secure PRP from a secure PRG?
A. No, it cannot be done
B. Yes, just plug the GGM PRF into the Luby-Rackoff theorem
C. It depends on the underlying PRG
D. Option text | [
{
"content": "Can we build a secure PRP from a secure PRG?\nA. No, it cannot be done\nB. Yes, just plug the GGM PRF into the Luby-Rackoff theorem\nC. It depends on the underlying PRG\nD. Option text ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "Can we build a secure PRP from a secure PRG?\nA. No, it cannot be done\nB. Yes, just plug the GGM PRF into the Luby-Rackoff theorem\nC. It depends on the underlying PRG\nD. Option text ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Can we build a secure PRP from a secure PRG?\nA. No, it cannot be done\nB. Yes, just plug the GGM PRF into the Luby-Rackoff theorem\nC. It depends on the underlying PRG\nD. Option text ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
A hash function guarantees the integrity of a message. It guarantees that the message has not be
A. Replaced
B. Overview
C. Changed
D. Violated | [
{
"content": "A hash function guarantees the integrity of a message. It guarantees that the message has not be\nA. Replaced\nB. Overview\nC. Changed\nD. Violated ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A hash function guarantees the integrity of a message. It guarantees that the message has not be\nA. Replaced\nB. Overview\nC. Changed\nD. Violated ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A hash function guarantees the integrity of a message. It guarantees that the message has not be\nA. Replaced\nB. Overview\nC. Changed\nD. Violated ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Statement 1| U2F is a stronger second factor than sending an SMS code to a user’s smartphone. Statement 2| An attacker that knows a user’s password can easily guess the U2F key to access the user’s account.
A. True, True
B. False, False
C. True, False
D. False, True | [
{
"content": "Statement 1| U2F is a stronger second factor than sending an SMS code to a user’s smartphone. Statement 2| An attacker that knows a user’s password can easily guess the U2F key to access the user’s account.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Statement 1| U2F is a stronger second factor than sending an SMS code to a user’s smartphone. Statement 2| An attacker that knows a user’s password can easily guess the U2F key to access the user’s account.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Statement 1| U2F is a stronger second factor than sending an SMS code to a user’s smartphone. Statement 2| An attacker that knows a user’s password can easily guess the U2F key to access the user’s account.\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
The openSSL implementation described in “Remote Timing Attacks are Practical” (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?
1. CR, MR, KM, and RS.
2. RS
A. True, True
B. False, False
C. True, False
D. False, True | [
{
"content": "The openSSL implementation described in “Remote Timing Attacks are Practical” (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR, MR, KM, and RS.\n2. RS\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "The openSSL implementation described in “Remote Timing Attacks are Practical” (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR, MR, KM, and RS.\n2. RS\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The openSSL implementation described in “Remote Timing Attacks are Practical” (by Brumley and Boneh) uses the following performance optimizations: Chinese Remainder (CR), Montgomery Representation (MR), Karatsuba Multiplication (KM), and Repeated squaring and Sliding windows (RS). Which of the following options would close the timing channel attack described in the paper if you turned the listed optimizations off?\n1. CR, MR, KM, and RS.\n2. RS\nA. True, True\nB. False, False\nC. True, False\nD. False, True ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.
A. Wireless Traffic Sniffing
B. WiFi Traffic Sniffing
C. Wireless Traffic Checking
D. Wireless Transmission Sniffing | [
{
"content": "___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.\nA. Wireless Traffic Sniffing\nB. WiFi Traffic Sniffing\nC. Wireless Traffic Checking\nD. Wireless Transmission Sniffing ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.\nA. Wireless Traffic Sniffing\nB. WiFi Traffic Sniffing\nC. Wireless Traffic Checking\nD. Wireless Transmission Sniffing ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue.\nA. Wireless Traffic Sniffing\nB. WiFi Traffic Sniffing\nC. Wireless Traffic Checking\nD. Wireless Transmission Sniffing ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
A real image can be cast on a screen by a
A. converging lens
B. diverging lens
C. Either of these
D. Neither of these | [
{
"content": "A real image can be cast on a screen by a\nA. converging lens\nB. diverging lens\nC. Either of these\nD. Neither of these ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "A real image can be cast on a screen by a\nA. converging lens\nB. diverging lens\nC. Either of these\nD. Neither of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A real image can be cast on a screen by a\nA. converging lens\nB. diverging lens\nC. Either of these\nD. Neither of these ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Consider a ball rolling down an inclined plane. The normal force on the ball (the force perpendicular to the plane).
A. is mg
B. is greater than mg always
C. may be greater or less than mg
D. is less than mg always | [
{
"content": "Consider a ball rolling down an inclined plane. The normal force on the ball (the force perpendicular to the plane).\nA. is mg\nB. is greater than mg always\nC. may be greater or less than mg\nD. is less than mg always ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Consider a ball rolling down an inclined plane. The normal force on the ball (the force perpendicular to the plane).\nA. is mg\nB. is greater than mg always\nC. may be greater or less than mg\nD. is less than mg always ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Consider a ball rolling down an inclined plane. The normal force on the ball (the force perpendicular to the plane).\nA. is mg\nB. is greater than mg always\nC. may be greater or less than mg\nD. is less than mg always ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Which of these can NOT be deflected by electrical or magnetic means?
A. Alpha rays
B. Beta rays
C. Gamma rays
D. All can | [
{
"content": "Which of these can NOT be deflected by electrical or magnetic means?\nA. Alpha rays\nB. Beta rays\nC. Gamma rays\nD. All can ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Which of these can NOT be deflected by electrical or magnetic means?\nA. Alpha rays\nB. Beta rays\nC. Gamma rays\nD. All can ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which of these can NOT be deflected by electrical or magnetic means?\nA. Alpha rays\nB. Beta rays\nC. Gamma rays\nD. All can ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Immediately after two separated charged particles are released from rest both increase in speed. The particles therefore have
A. the same sign of charge.
B. opposite signs of charge.
C. either the same or opposite signs of charge.
D. Need more information. | [
{
"content": "Immediately after two separated charged particles are released from rest both increase in speed. The particles therefore have\nA. the same sign of charge.\nB. opposite signs of charge.\nC. either the same or opposite signs of charge.\nD. Need more information. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Immediately after two separated charged particles are released from rest both increase in speed. The particles therefore have\nA. the same sign of charge.\nB. opposite signs of charge.\nC. either the same or opposite signs of charge.\nD. Need more information. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Immediately after two separated charged particles are released from rest both increase in speed. The particles therefore have\nA. the same sign of charge.\nB. opposite signs of charge.\nC. either the same or opposite signs of charge.\nD. Need more information. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
A high-temperature source radiates relatively
A. short wavelengths
B. long wavelengths
C. low frequencies of radiation
D. None of these | [
{
"content": "A high-temperature source radiates relatively\nA. short wavelengths\nB. long wavelengths\nC. low frequencies of radiation\nD. None of these ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "A high-temperature source radiates relatively\nA. short wavelengths\nB. long wavelengths\nC. low frequencies of radiation\nD. None of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A high-temperature source radiates relatively\nA. short wavelengths\nB. long wavelengths\nC. low frequencies of radiation\nD. None of these ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
According to the correspondence principle,
A. new theory must agree with old theory where they overlap.
B. Newton’s mechanics is as valid as Einstein’s mechanics.
C. relativity equations apply to high speeds while Newton’s equations apply to low speeds.
D. special relativity and general relativity are two sides of the same coin. | [
{
"content": "According to the correspondence principle,\nA. new theory must agree with old theory where they overlap.\nB. Newton’s mechanics is as valid as Einstein’s mechanics.\nC. relativity equations apply to high speeds while Newton’s equations apply to low speeds.\nD. special relativity and general relativity are two sides of the same coin. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "According to the correspondence principle,\nA. new theory must agree with old theory where they overlap.\nB. Newton’s mechanics is as valid as Einstein’s mechanics.\nC. relativity equations apply to high speeds while Newton’s equations apply to low speeds.\nD. special relativity and general relativity are two sides of the same coin. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "According to the correspondence principle,\nA. new theory must agree with old theory where they overlap.\nB. Newton’s mechanics is as valid as Einstein’s mechanics.\nC. relativity equations apply to high speeds while Newton’s equations apply to low speeds.\nD. special relativity and general relativity are two sides of the same coin. ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
A magnetic force can act on an electron even when it
A. is at rest
B. moves parallel to magnetic field lines
C. Both of these
D. Neither of these | [
{
"content": "A magnetic force can act on an electron even when it\nA. is at rest\nB. moves parallel to magnetic field lines\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "A magnetic force can act on an electron even when it\nA. is at rest\nB. moves parallel to magnetic field lines\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A magnetic force can act on an electron even when it\nA. is at rest\nB. moves parallel to magnetic field lines\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
The sound waves that most humans cannot hear are
A. infrasonic
B. ultrasonic
C. Both of these
D. Neither of these | [
{
"content": "The sound waves that most humans cannot hear are\nA. infrasonic\nB. ultrasonic\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "The sound waves that most humans cannot hear are\nA. infrasonic\nB. ultrasonic\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The sound waves that most humans cannot hear are\nA. infrasonic\nB. ultrasonic\nC. Both of these\nD. Neither of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
A machine cannot multiply
A. forces
B. distances
C. energy
D. None of these | [
{
"content": "A machine cannot multiply\nA. forces\nB. distances\nC. energy\nD. None of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "A machine cannot multiply\nA. forces\nB. distances\nC. energy\nD. None of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A machine cannot multiply\nA. forces\nB. distances\nC. energy\nD. None of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Atmospheric pressure is due to the weight
A. of the atmosphere
B. and volume of the atmosphere
C. density and volume of the atmosphere
D. of planet Earth itself | [
{
"content": "Atmospheric pressure is due to the weight\nA. of the atmosphere\nB. and volume of the atmosphere\nC. density and volume of the atmosphere\nD. of planet Earth itself ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Atmospheric pressure is due to the weight\nA. of the atmosphere\nB. and volume of the atmosphere\nC. density and volume of the atmosphere\nD. of planet Earth itself ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Atmospheric pressure is due to the weight\nA. of the atmosphere\nB. and volume of the atmosphere\nC. density and volume of the atmosphere\nD. of planet Earth itself ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Einstein’s second postulate tells us that the speed of light
A. depends on one’s frame of reference.
B. is a constant in all frames of reference.
C. provides accurate clocks.
D. slows in a transparent medium. | [
{
"content": "Einstein’s second postulate tells us that the speed of light\nA. depends on one’s frame of reference.\nB. is a constant in all frames of reference.\nC. provides accurate clocks.\nD. slows in a transparent medium. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "Einstein’s second postulate tells us that the speed of light\nA. depends on one’s frame of reference.\nB. is a constant in all frames of reference.\nC. provides accurate clocks.\nD. slows in a transparent medium. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Einstein’s second postulate tells us that the speed of light\nA. depends on one’s frame of reference.\nB. is a constant in all frames of reference.\nC. provides accurate clocks.\nD. slows in a transparent medium. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Planck’s constant can be found by dividing the energy of a photon by its
A. wavelength
B. frequency
C. amplitude
D. None of these | [
{
"content": "Planck’s constant can be found by dividing the energy of a photon by its\nA. wavelength\nB. frequency\nC. amplitude\nD. None of these ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "Planck’s constant can be found by dividing the energy of a photon by its\nA. wavelength\nB. frequency\nC. amplitude\nD. None of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Planck’s constant can be found by dividing the energy of a photon by its\nA. wavelength\nB. frequency\nC. amplitude\nD. None of these ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
The "greenhouse gases" that contribute to global warming absorb
A. more visible radiation than infrared.
B. more infrared radiation than visible.
C. visible and infrared about equally.
D. very little radiation of any kind. | [
{
"content": "The \"greenhouse gases\" that contribute to global warming absorb\nA. more visible radiation than infrared.\nB. more infrared radiation than visible.\nC. visible and infrared about equally.\nD. very little radiation of any kind. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "The \"greenhouse gases\" that contribute to global warming absorb\nA. more visible radiation than infrared.\nB. more infrared radiation than visible.\nC. visible and infrared about equally.\nD. very little radiation of any kind. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The \"greenhouse gases\" that contribute to global warming absorb\nA. more visible radiation than infrared.\nB. more infrared radiation than visible.\nC. visible and infrared about equally.\nD. very little radiation of any kind. ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Standing waves are the result of
A. interference
B. waves overlapping in phase and out of phase
C. waves reflecting upon themselves
D. All of these | [
{
"content": "Standing waves are the result of\nA. interference\nB. waves overlapping in phase and out of phase\nC. waves reflecting upon themselves\nD. All of these ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "Standing waves are the result of\nA. interference\nB. waves overlapping in phase and out of phase\nC. waves reflecting upon themselves\nD. All of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Standing waves are the result of\nA. interference\nB. waves overlapping in phase and out of phase\nC. waves reflecting upon themselves\nD. All of these ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
Heat is simply another word for
A. temperature.
B. internal energy.
C. internal energy that flows from hot to cold.
D. radiant energy. | [
{
"content": "Heat is simply another word for\nA. temperature.\nB. internal energy.\nC. internal energy that flows from hot to cold.\nD. radiant energy. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Heat is simply another word for\nA. temperature.\nB. internal energy.\nC. internal energy that flows from hot to cold.\nD. radiant energy. ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Heat is simply another word for\nA. temperature.\nB. internal energy.\nC. internal energy that flows from hot to cold.\nD. radiant energy. ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
The greenhouse gases that contribute to global warming are
A. water vapor
B. carbon dioxide
C. Both
D. Neither | [
{
"content": "The greenhouse gases that contribute to global warming are\nA. water vapor\nB. carbon dioxide\nC. Both\nD. Neither ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "The greenhouse gases that contribute to global warming are\nA. water vapor\nB. carbon dioxide\nC. Both\nD. Neither ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "The greenhouse gases that contribute to global warming are\nA. water vapor\nB. carbon dioxide\nC. Both\nD. Neither ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
How many electrons are there in the third shell of sodium, Na (atomic number 11)?
A. None
B. One
C. Two
D. Three | [
{
"content": "How many electrons are there in the third shell of sodium, Na (atomic number 11)?\nA. None\nB. One\nC. Two\nD. Three ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "How many electrons are there in the third shell of sodium, Na (atomic number 11)?\nA. None\nB. One\nC. Two\nD. Three ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "How many electrons are there in the third shell of sodium, Na (atomic number 11)?\nA. None\nB. One\nC. Two\nD. Three ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Which process would release energy from gold: fission or fusion? From carbon?
A. Gold: fission; carbon: fusion
B. Gold: fusion; carbon: fission
C. Gold: fission; carbon: fission
D. Gold: fusion; carbon: fusion | [
{
"content": "Which process would release energy from gold: fission or fusion? From carbon?\nA. Gold: fission; carbon: fusion\nB. Gold: fusion; carbon: fission\nC. Gold: fission; carbon: fission\nD. Gold: fusion; carbon: fusion ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Which process would release energy from gold: fission or fusion? From carbon?\nA. Gold: fission; carbon: fusion\nB. Gold: fusion; carbon: fission\nC. Gold: fission; carbon: fission\nD. Gold: fusion; carbon: fusion ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Which process would release energy from gold: fission or fusion? From carbon?\nA. Gold: fission; carbon: fusion\nB. Gold: fusion; carbon: fission\nC. Gold: fission; carbon: fission\nD. Gold: fusion; carbon: fusion ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
Immediately after two separated charged particles are released from rest, both increase in speed. The sign of charge of the particles is therefore
A. the same
B. opposite
C. Either of these
D. Need more information | [
{
"content": "Immediately after two separated charged particles are released from rest, both increase in speed. The sign of charge of the particles is therefore\nA. the same\nB. opposite\nC. Either of these\nD. Need more information ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Immediately after two separated charged particles are released from rest, both increase in speed. The sign of charge of the particles is therefore\nA. the same\nB. opposite\nC. Either of these\nD. Need more information ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Immediately after two separated charged particles are released from rest, both increase in speed. The sign of charge of the particles is therefore\nA. the same\nB. opposite\nC. Either of these\nD. Need more information ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
Sound will travel fastest in
A. a steel beam
B. a wooden plank
C. ocean water
D. air in a balloon | [
{
"content": "Sound will travel fastest in\nA. a steel beam\nB. a wooden plank\nC. ocean water\nD. air in a balloon ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "Sound will travel fastest in\nA. a steel beam\nB. a wooden plank\nC. ocean water\nD. air in a balloon ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Sound will travel fastest in\nA. a steel beam\nB. a wooden plank\nC. ocean water\nD. air in a balloon ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
When energy is released by the process of fusion, the total mass of the material after the event is
A. less
B. the same
C. more
D. zero | [
{
"content": "When energy is released by the process of fusion, the total mass of the material after the event is\nA. less\nB. the same\nC. more\nD. zero ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | [
{
"content": "When energy is released by the process of fusion, the total mass of the material after the event is\nA. less\nB. the same\nC. more\nD. zero ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "When energy is released by the process of fusion, the total mass of the material after the event is\nA. less\nB. the same\nC. more\nD. zero ",
"role": "user"
},
{
"content": "A",
"role": "assistant"
}
] | 1 | 0 |
A 5.0 kg mass is placed in an elevator that is accelerating upwards at 4.0 m/s2. The apparent weight of this mass is
A. 20. N
B. 29 N
C. 49 N
D. 69 N | [
{
"content": "A 5.0 kg mass is placed in an elevator that is accelerating upwards at 4.0 m/s2. The apparent weight of this mass is\nA. 20. N\nB. 29 N\nC. 49 N\nD. 69 N ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "A 5.0 kg mass is placed in an elevator that is accelerating upwards at 4.0 m/s2. The apparent weight of this mass is\nA. 20. N\nB. 29 N\nC. 49 N\nD. 69 N ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A 5.0 kg mass is placed in an elevator that is accelerating upwards at 4.0 m/s2. The apparent weight of this mass is\nA. 20. N\nB. 29 N\nC. 49 N\nD. 69 N ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
An object that absorbs energy well also
A. conducts well
B. convects well
C. radiates well
D. None of these | [
{
"content": "An object that absorbs energy well also\nA. conducts well\nB. convects well\nC. radiates well\nD. None of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "An object that absorbs energy well also\nA. conducts well\nB. convects well\nC. radiates well\nD. None of these ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "An object that absorbs energy well also\nA. conducts well\nB. convects well\nC. radiates well\nD. None of these ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |
When you breathe on your hand, the temperature of the exhaled air reaching your hand
A. increases
B. decreases
C. remains unchanged
D. depends on how you blow | [
{
"content": "When you breathe on your hand, the temperature of the exhaled air reaching your hand\nA. increases\nB. decreases\nC. remains unchanged\nD. depends on how you blow ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | [
{
"content": "When you breathe on your hand, the temperature of the exhaled air reaching your hand\nA. increases\nB. decreases\nC. remains unchanged\nD. depends on how you blow ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "When you breathe on your hand, the temperature of the exhaled air reaching your hand\nA. increases\nB. decreases\nC. remains unchanged\nD. depends on how you blow ",
"role": "user"
},
{
"content": "D",
"role": "assistant"
}
] | 1 | 0 |
A hologram best illustrates
A. polarization
B. diffraction
C. superposition
D. electron interference | [
{
"content": "A hologram best illustrates\nA. polarization\nB. diffraction\nC. superposition\nD. electron interference ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "A hologram best illustrates\nA. polarization\nB. diffraction\nC. superposition\nD. electron interference ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "A hologram best illustrates\nA. polarization\nB. diffraction\nC. superposition\nD. electron interference ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
From quantum mechanics we learn that a radioactive nucleus is governed by
A. Newton’s laws
B. probability
C. certainty
D. no laws at all | [
{
"content": "From quantum mechanics we learn that a radioactive nucleus is governed by\nA. Newton’s laws\nB. probability\nC. certainty\nD. no laws at all ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "From quantum mechanics we learn that a radioactive nucleus is governed by\nA. Newton’s laws\nB. probability\nC. certainty\nD. no laws at all ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "From quantum mechanics we learn that a radioactive nucleus is governed by\nA. Newton’s laws\nB. probability\nC. certainty\nD. no laws at all ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Suppose that a test that the true value of the intercept coefficient is zero results in non-rejection. What would be the appropriate conclusion?
A. Drop the intercept and re-run the regression
B. Retain the intercept
C. Re-compute the test statistic
D. The regression line is running exactly through the origin | [
{
"content": "Suppose that a test that the true value of the intercept coefficient is zero results in non-rejection. What would be the appropriate conclusion?\nA. Drop the intercept and re-run the regression\nB. Retain the intercept\nC. Re-compute the test statistic\nD. The regression line is running exactly through the origin ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "Suppose that a test that the true value of the intercept coefficient is zero results in non-rejection. What would be the appropriate conclusion?\nA. Drop the intercept and re-run the regression\nB. Retain the intercept\nC. Re-compute the test statistic\nD. The regression line is running exactly through the origin ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose that a test that the true value of the intercept coefficient is zero results in non-rejection. What would be the appropriate conclusion?\nA. Drop the intercept and re-run the regression\nB. Retain the intercept\nC. Re-compute the test statistic\nD. The regression line is running exactly through the origin ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
In order to determine whether to use a fixed effects or random effects model, a researcher conducts a Hausman test. Which of the following statements is false?
A. For random effects models, the use of OLS would result in consistent but inefficient parameter estimation
B. If the Hausman test is not satisfied, the random effects model is more appropriate.
C. Random effects estimation involves the construction of "quasi-demeaned" data
D. Random effects estimation will not be appropriate if the composite error term is correlated with one or more of the explanatory variables in the model | [
{
"content": "In order to determine whether to use a fixed effects or random effects model, a researcher conducts a Hausman test. Which of the following statements is false?\nA. For random effects models, the use of OLS would result in consistent but inefficient parameter estimation\nB. If the Hausman test is not satisfied, the random effects model is more appropriate.\nC. Random effects estimation involves the construction of \"quasi-demeaned\" data\nD. Random effects estimation will not be appropriate if the composite error term is correlated with one or more of the explanatory variables in the model ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | [
{
"content": "In order to determine whether to use a fixed effects or random effects model, a researcher conducts a Hausman test. Which of the following statements is false?\nA. For random effects models, the use of OLS would result in consistent but inefficient parameter estimation\nB. If the Hausman test is not satisfied, the random effects model is more appropriate.\nC. Random effects estimation involves the construction of \"quasi-demeaned\" data\nD. Random effects estimation will not be appropriate if the composite error term is correlated with one or more of the explanatory variables in the model ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "In order to determine whether to use a fixed effects or random effects model, a researcher conducts a Hausman test. Which of the following statements is false?\nA. For random effects models, the use of OLS would result in consistent but inefficient parameter estimation\nB. If the Hausman test is not satisfied, the random effects model is more appropriate.\nC. Random effects estimation involves the construction of \"quasi-demeaned\" data\nD. Random effects estimation will not be appropriate if the composite error term is correlated with one or more of the explanatory variables in the model ",
"role": "user"
},
{
"content": "B",
"role": "assistant"
}
] | 1 | 0 |
Suppose that observations are available on the monthly bond prices of 100 companies for 5 years. What type of data are these?
A. Cross-sectional
B. Time-series
C. Panel
D. Qualitative | [
{
"content": "Suppose that observations are available on the monthly bond prices of 100 companies for 5 years. What type of data are these?\nA. Cross-sectional\nB. Time-series\nC. Panel\nD. Qualitative ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | [
{
"content": "Suppose that observations are available on the monthly bond prices of 100 companies for 5 years. What type of data are these?\nA. Cross-sectional\nB. Time-series\nC. Panel\nD. Qualitative ",
"role": "user"
},
{
"content": "null",
"role": "assistant"
}
] | [
{
"content": "Suppose that observations are available on the monthly bond prices of 100 companies for 5 years. What type of data are these?\nA. Cross-sectional\nB. Time-series\nC. Panel\nD. Qualitative ",
"role": "user"
},
{
"content": "C",
"role": "assistant"
}
] | 1 | 0 |