cmis test 4
Unlock all answers in this set
Unlock answersquestion
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
answer
artificial intelligence
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
answer
an intelligent agent
question
A common form of authentication is a ____.
answer
pass word
question
____ artificial intelligence is very popular in the programming of robots.
answer
behavior-based
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
question
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
answer
pattern
question
A ____ may be used to filter data that may be undesirable.
answer
firewall
question
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
answer
authentication
question
AI applications are ways in which AI methodologies are applied to ____ and provide services.
answer
solve problems
question
An expert system relies on ____ to provide subject-specific knowledge.
answer
human experts
question
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
answer
disasters
question
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
answer
machine learning
question
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
answer
SSL connection
question
A strong advocate of the Singularity concept is ____.
answer
ray Kurzweil
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
question
____ proposed a test to determine whether a computer can be said to "think."
answer
Alan turing
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
answer
high precision
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
The concept of the Singularity predicts that computers will be ____.
answer
super intelligent
question
Communication and language are key elements in the ____.
answer
turing test
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phishing