MISY 160 Concept Test Chapters 6-11 – Flashcards with Answers

Unlock all answers in this set

Unlock answers
question
Criminals collect items such as credit card numbers without the knowledge of the user through the use of ____. a. a worm b. phishing c. a trojan d. spyware
answer
D. spyware
question
All of the following are examples of malware EXCEPT ____. a. worms b. viruses c. spyware d. updates
answer
D. Updates
question
All of the following help keep your information secure EXCEPT ____. a. practicing safe, cautious online bahvior b. using antivirus software c. accessing P2P networks d. using a firewall
answer
C. Accessing P2P Networks
question
An individual who illegally downloads copyright-protected software is referred to as a ____. A. spy B. plagiarist C. pirate D. hacker
answer
C. pirate
question
A popular encryption method used to protect data that travels over a network is ____. A. WPA B. IRD C. FTP D. ENC
answer
A. WPA
question
A(n) ____ may be used to censor data that may not be dangerous but may be undesirable. A. ISP B. firewall C. hacker D. intruder
answer
B. Firewall
question
The job of the ____ administrator is to control who has access to various network resources such as files and folders. A. multiuser B. network C. software D. technology
answer
B. Network
question
A(n) ____ certificate confirms your credentials when conducting business or other transactions on the Web. A. ISP B. IP C. SSL D. HTTP
answer
C. SSL
question
People's mistakes can lead to problems with ____ of computer systems and information. A. security B. accuracy C. reliability D. all of the above
answer
D. all of the above
question
An e-mail with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam. A. Trojan B. phishing C. decryption D. domain
answer
B. phishing
question
An Internet-based crime is referred to as a(n) ____ crime. A. piracy B. forensic C. cyber D. iTech
answer
C. cyber
question
Receiving a fraudulent e-mail that closely resembles a legitimate Web site, such as one from your bank, is known as a(n) ____ attack. A. phishing B. ad hominem C. log scam D. encrypt
answer
A. phishing
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws A. key-logging B. packet-sniffing C. WAP D. updates
answer
D. updates
question
Through the use of ____, data is secured when it is stored and transported over a network. A. biometrics B. pattern recognition C. retinal patterning D. encryption
answer
D. encryption
question
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource. A. shareware B. peer C. zombie D. malware
answer
C. Zombie
question
Which of the following is NOT a realistic way to ensure Internet security? A. Avoid client/server networks. B. Don't forward e-mail virus hoaxes. C. Select strong passwords and change them regularly. D. Do not open attachments unless they are expected and scanned for viruses.
answer
A. avoid client/server networks
question
Businesses prefer to use technology known as ____ to create an exact copy of their files for backup. A. RFID B. RAID C. USB D. OnTrack
answer
B. RAID
question
Corporate network administrators have the right to do all of the following EXCEPT ____. A. install a Web cam in an employee's home B. listen in on network communications C. electronically monitor employees' Web activities D. read employee e-mail
answer
A. install a Web cam in an employee's home
question
A company called ____ provides digital certifications for Web transactions. A. GoDaddy B. VeriSign C. Microsoft D. US-CERT
answer
B. VeriSign
question
The https:// protocol in a URL indicates the use of a(n) _____ by the Web site. A. domain name B. PCI C. SSL connection D. RAID
answer
C. SSL connection
question
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of _____. A. a data-entry error B. improper setup of a computer system C. an error in computer programming D. mishandling of computer output
answer
A. a data-entry error
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources. A. Server B. Client C. Network D. User
answer
D. User
question
An item such as a smart card is an example of the ____ form of authentication. A. Something you know B. Something you have C. Something about you D. None of the above
answer
B. Something you have
question
A company may hire a ____ hacker to learn about vulnerabilities in its system. A. black-hat B. white-hat C. gray-hat D. red-hat
answer
B. white-hat
question
The ____ was established to secure and monitor security risks to U.S. networks and the Internet. A. NTSB B. W3C C. US-CERT D. NSF
answer
C. US-CERT
question
Sites such as eBay are a popular target for ____. A. scripters B. Internet fraud C. port-scanning D. cookies
answer
B. Internet Fraud
question
The Mac computer employs the ____ system to encrypt its file data. A. BitLocker Drive B. FileVault C. File Transfer Protocol D. digital certificate
answer
B. FileVault
question
In a Wi-Fi network, ____ can be configured to help protect your security. A. SSIDs B. war drivers C. access points D. IP addresses
answer
C. Access Points
question
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. A. dumpster diving B. social engineering C. packet sniffing D. port scanning
answer
B. Social Engineering
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data. A. nodes B. ports C. cables D. viruses
answer
B. Ports
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted. A. hard drive B. Internet server C. CPU D. e-mail client
answer
Internet Server
question
A ____ is commonly packaged with a new computer system. A. token B. keychain fob C. rescue disk D. scan
answer
C. Rescue Disk
question
A ____ allows hackers to gain access to important code or information in a software program. A. Trojan B. worm C. security hole D. firewall
answer
C. Security Hole
question
Stolen information can be used by all of the following EXCEPT ____. A. hackers to illegally access computer accounts B. unethical businesses to gain an advantage in a competitive market C. government agencies to garnish wages D. spammers to target advertisements at consumers
answer
C. government agencies to garnish wages
question
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources. A. network usage policy B. access user contract C. password agreement D. Internet notification policy
answer
A. Network Usage Policy
question
A common form of authentication is a ____. A. password B. computer name C. keystroke D. card reader
answer
A. password
question
Information security is implemented at the individual machine level, the computer network level, and the ____ level. A. Internet B. software C. data D. hardware
answer
A. Internet
question
The _____ of a digital camera is measured in megapixels. A. focus control B. photo file format C. lens type D. resolution
answer
D. Resolution
question
Online newspapers are delivered through _____ to news readers. A. MIDI B. RSS C. PDF D. CAD
answer
B. RSS
question
Geographical technology advances to the iPhone such as user location and _____ software have improved augmented reality. A. virtual B. directional C. environmental D. immersive
answer
B. Directional
question
All of the following offer photo-editing software applications EXCEPT _____. A. Adobe Illustrator B. Google Picasa C. Adobe Photoshop D. Photoshop Elements
answer
A. Adobe Illustrator
question
When you digitize a sound wave, you measure and record its _____ at regular time intervals called the sampling rate. A. conversion B. length C. amplitude D. width
answer
C. Amplitude
question
_____ is the technology used to distribute blogs and other regularly updated online content to which people can subscribe. A. DAC B. RSS C. MIDI D. HTML
answer
B. RSS
question
The _____ works using blended colors such as those applied by your printer's ink cartridges when printing. A. RGB palette B. CMYK color model C. color angle D. bit depth
answer
B. CMYK Color Model
question
Criminal cases have been solved through the process of identifying a digitally recorded human voice known as _____ identification. A. audio B. sound-output C. language D. voice-print
answer
D. Voice-Print
question
All of the following are examples of graphics file formats EXCEPT for _____. A. .tif B. .jpg C. .gif D. .xls
answer
D. .xls
question
A basic example of _____ is the use of graphs and charts to illustrate numeric data. A. vectorization B. visualization C. animation D. construction
answer
B. Visualization
question
_____ media is programming or music that can be accessed any time of the day, regardless of the television and radio schedules. A. Integrated B. On-demand C. Ambient D. Client-based
answer
B. On-Demand
question
When deciding whether to purchase a photo printer, it is important to consider the cost of printer paper and _____. A. electricity B. port connectivity C. print speed D. toner
answer
D. Toner
question
The most popular way to access podcasts on the Web is through _____ software. A. Podworld B. iPodder C. Podcast Alley D. iTunes
answer
D. iTunes
question
Computer-aided design software provides tools to ____. A. construct 3D objects on the computer screen B. test the properties of 3D objects C. examine 3D objects from all angles D. all of the above
answer
D. All of the above
question
_____ software allows you to improve the look of your captured image. A. Computer-aided design B. Vector graphic C. Photo-editing D. Pixel
answer
C. Photo-Editing
question
A game console relies on a fast _____ to handle the lively animations in a graphics game. A. hard drive B. microprocessor C. display D. joystick
answer
B. Microprocessor
question
Digital photography captures, stores, and manipulates photographs digitally as a series of _____. A. maps B. 1s and 0s C. resolutions D. indices
answer
B. 1s and 0s
question
Digital images are made up of a grid of small points called _____. Incorrect A. bits B. pixels C. dots D. increments
answer
B. Pixels
question
_____ is a Web-based music service and player that builds a streaming "radio station" around the listener's musical tastes. A. Spotify B. Pandora C. Amazon D. FindMySong
answer
B. Pandora
question
Which of the following is a social network with photo album capabilities? A. Facebook B. Picasa C. Snapfish D. Kodak Gallery
answer
A. Facebook
question
An example of a vector graphic image is _____. A. a photograph B. clip art C. a frame D. a 3D model
answer
B. Clip-art
question
Designers rely on _____ software to help them build prototypes for further research and testing. A. CAD B. CAC C. CAX D. CAE
answer
A. CAD
question
Apple, Amazon, and Google provide services that let users store their music _____, making it accessible to the owner from any Internet-connected device. A. on your hard drive B. in the cloud C. on a CD D. on a flash drive
answer
B. in the cloud
question
An important consideration when purchasing a digital camcorder is the _____. A. pixels supported in each frame B. shutter speed C. button speed D. color
answer
A. pixels supported in each frame
question
Digitized sound can be _____ for secure communications. A. animated B. encrypted C. compressed D. ripped
answer
B. encrypted
question
Animation uses successive _____ to create the impression of an object moving. A. slides B. pixels C. frames D. prototypes
answer
C. Frames
question
An example of a vector graphics software application is _____. A. Flickr B. Visio C. Photoshop D. PowerPoint
answer
D. powerpoint
question
The _____ audio format is most popular among digital music users. A. .mp3 B. .aiff C. .wma D. .m4p
answer
A. .mp3
question
Digital cameras are ranked by the amount of _____ they can capture. A. storage B. pictures C. clicks D. megapixels
answer
D. megapixels
question
_____ media are unique in that the audience is not composed of passive viewers. A. Engaged B. Embedded C. Interactive D. Indexed
answer
C. Interactive
question
A videographer uses a(n) _____ to organize and arrange video scenes. A. storyline B. animator C. kiosk D. toolbox
answer
A. storyline
question
_____ graphics software allows the user to layer and group objects. A. Bitmapped B. RGB C. Line-based D. Vector
answer
D. Vector
question
A digital voice recorder receives sound through a(n) _____. A. radio signal B. speaker C. keyboard D. microphone
answer
D. microphone
question
Which of the following is NOT an example of digital media? A. MP3 music B. animated movies C. Blu-ray movies D. spreadsheets
answer
D. Spreadsheets
question
One major limitation of native digital audio formats is their _____. Correct A. file size B. sampling rate C. .mp3 format D. bit depth
answer
A. File Size
question
The process of transferring music from CD to MP3 or another digital audio format is known as _____ a CD. A. synchronizing B. defining C. ripping D. distributing
answer
C. Ripping
question
A 2D model can be changed into a 3D model by adding _____ and light. A. shadows B. color C. graphics D. boxes
answer
A. shadows
question
A digital camera uses a _____ card as its storage device. A. flash memory B. ROM C. strike memory D. video
answer
A. flash memory
question
A _____ is a program that lets computer users create and access a collection of organized data. A. data definition language B. data manipulation language C. database management system D. query by example
answer
C. database management system
question
_____ are an important element of the database hierarchy because they are used to store the database entities. A. Records B. Units C. Fields D. Files
answer
A. records
question
A(n) _____ database organizes data into multiple tables that are related by common fields. A. hierarchical B. object-oriented C. network D. relational
answer
D. relational
question
A primary key is a _____ within a database table that uniquely identifies each record. A. field B. record C. file D. unit
answer
A. field
question
With _____, users are able to store data on Internet servers housed in data centers. A. relational databases B. data mining C. ED D. cloud computing
answer
D. cloud computing
question
A data _____ is a small data warehouse that is developed for a specific person or purpose. A. capsule B. mini C. mart D. market
answer
C. Mart
question
Through _____, businesses can analyze inventory and costs for more efficiency. A. primary keys B. data mining C. master files D. transaction files
answer
B. Data Mining
question
A data dictionary includes all of the following EXCEPT _____. A. the name of the data item B. who prepared the data C. who approved the data D. the digital certificate
answer
D. the digital certificate
question
In a database, a collection of related fields that describes some object or activity is referred to as a _____. A. field B. record C. file D. unit
answer
B. record
question
Microsoft Outlook and Quicken are examples of _____ DBMSs that collect personal data for user access. A. special-purpose B. flat C. multi-user D. single-user
answer
A. special-purpose
question
Installation and the ongoing maintenance of software in a database system are the job of the database _____. A. system B. maintainer C. administrator D. analyst
answer
C. administrator
question
A data warehouse _____ data from several databases to provide useful information. A. deletes B. moves C. copies D. merges
answer
D. merges
question
A data _____ extracts data from various systems to analyze and process it. A. inventory B. warehouse C. dictionary D. container
answer
B. warehouse
question
In a database, your first name would be categorized as a _____. A. field B. record C. file D. unit
answer
A. field
question
The data manipulation language _____ is the most popular tool when working with a database. A. SQL B. C++ C. HTML D. CSS
answer
A. SQL
question
The _____ data manipulation language is used to build databases in both mainframe and personal computers. A. SLQ B. DDL C. SQL D. DLD
answer
C. SQL
question
Data _____ refers to the quality and accuracy of the data. A. warehousing B. redundancy C. modification D. integrity
answer
D. integrity
question
With _____, users are able to store data on Internet servers housed in data centers. A. relational databases B. data mining C. EDI D. cloud computing
answer
D. cloud computing
question
A _____ is a collection of data that has been organized and made available to a user. A. file B. database C. relationship D. snippet
answer
B. Database
question
The power of a database lies in the ability to do all of the following EXCEPT _____ in order to answer questions and discover patterns. A. sift data B. sort data C. save data D. query data
answer
C. save data
question
When a database problem occurs, its tables may be split up during the _____ process to correct a data problem. A. GIGO B. visualization C. normalization D. data integrity
answer
C. normalization
question
In a database, a collection of related records is referred to as a table or a _____. A. field B. record C. file D. unit
answer
C. File
question
Inaccurate data entered into a database resulting in incorrect output is also known as _____. A. data failure B. GIGO C. data redundancy D. DBMS
answer
B. GIGO
question
Database administrators are responsible for all of the following areas EXCEPT _____. A. developing the data dictionary B. establishing emergency or failure-recovery procedures C. implementing the DBMS D. hiring and training the users
answer
D. hiring and training the users
question
To avoid data _____, it is advisable to make sure data is carefully copied, stored, and organized in one place. A. redundancy B. verification C. relationship D. storage
answer
A. redundancy
question
Global supply management companies assist businesses in finding the best _____ relationships. A. B2C B. B2B C. C2C D. C2B
answer
B. B2B
question
All of the following are names for e-cash EXCEPT _____. A. digicash B. digital money C. e-money D. digital currency
answer
A. digicash
question
Online _____ provide a method to sell items that manufacturers want to liquidate quickly at a competitive price. A. e-tailers B. manufacturers C. grocers D. clearinghouses
answer
D. clearinghouses
question
All of the following are used by location-based m-commerce applications EXCEPT _____. A. GSM B. the cellular network C. GPS D. Wi-Fi connections
answer
A. GSM
question
A proximity payment system delivers m-commerce services to small devices through the use of _____-range wireless data communications. A. close B. long C. wide D. short
answer
D. short
question
In the _____ form of e-commerce, the Web is used to connect individual consumers directly with sellers to purchase products. A. B2C B. B2B C. C2C D. 2BC
answer
A. B2C
question
Online advertising techniques make use of _____ to control the ranking of a product in a search result list. A. m-commerce B. search engine optimization C. search electronic exchange D. B2B
answer
B. search engine optimization
question
The popularity of _____ e-commerce is a good example of how customers can successfully implement their own sales strategy on the Web. A. B2C B. B2B C. C2C D. 2BC
answer
C. C2C
question
A(n) _____ provides software and a network that connects businesses within an industry. A. electronic exchange B. cybermall C. GSM D. online community
answer
A, C. electronic exchange, GSM
question
All of the following support the cybermall concept EXCEPT _____. A. AOL B. Yahoo! C. Craigslist D. MSN
answer
C. Craigslist
question
An online B2B transaction uses a(n) _____ network to exchange information on the Web. A. GSM B. m-commerce C. NSF D. EDI
answer
D. EDI
question
Downloading apps, games, and media to your smart phone is an example of _____. A. cloud computing B. data commerce C. m-commerce D. electronic exchange
answer
C. m-commerce
question
The online business _____ was one of the first e-tailers to partner with retail merchandisers to sell products alongside their regular products. A. ESPN B. Amazon C. Dell D. Apple
answer
B. Amazon
question
Electronic data interchange uses private network services called _____ networks. A. virtual-private B. value-added C. PayPal D. Intellifit
answer
B. Value-added
question
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT _____. A. an online catalog B. transaction processing C. a shopping cart D. shipping
answer
D. shipping
question
All of the following technologies play an important role in e-commerce EXCEPT _____. A. EDI B. DHTML C. e-cash D. digital certificates
answer
B. DHTML
question
Which of the following is NOT a true statement about e-commerce technologies? A. Working with an e-commerce host requires knowledge of the underlying technologies in order to maximize the benefits and minimize the costs. B. Understanding the benefits and challenges of various e-commerce technologies is useful for anyone involved with e-commerce. C. It has become easier to create a reliable online business yourself than to hire a company to do it. D. A poorly executed e-commerce site could tarnish the reputation of an otherwise well-respected company.
answer
C. It has become easier to create a reliable online business yourself than to hire a company to do it.
question
_____ supply management services play an important role in building relationships between corporate buyers and sellers. A. E-tail B. Multi- C. Local D. Global
answer
D. Global
question
A good example of an e-commerce site is _____. A. Gmail B. CNN C. Amazon D. ESPN
answer
C. Amazon
question
The B2B electronic exchange differs from global supply management in that it focuses on _____. A. consumer-to-consumer commerce B. spending management C. consumer demand D. a specific industry
answer
D. A Specific Industry
question
E-commerce hosting companies offer _____ that provide all the necessary software tools to deliver e-commerce applications. A. domains B. certifications C. servers D. devices
answer
C. Servers
question
The main idea behind online auction platforms, such as eBay, is _____. A. enabling consumers to compete as sellers against retailers B. providing excellent service C. offering a variety of products D. offering deep discounts on merchandise
answer
A. enabling consumers to compete as sellers against retailers
question
An example of a popular daily-deal model for advertising is the online marketing company _____. A. Groupon B. Amazon C. Twitter D. Covisint
answer
A. Groupon
question
The best-known e-cash provider is ______. A. Amazon Payments B. PayPal C. Google Checkout D. Microsoft Money
answer
B. Paypal
question
A typical example of a geographic information system is a _____. A. blueprint B. drawing C. map D. chart
answer
C. map
question
An effective enterprise resource planning system includes which of the following? A. transaction processing systems B. informatics C. batch processing D. supply chain management
answer
D. supply chain management
question
A management information system automatically produces a(n) _____ report when a situation is unusual or requires action. A. automatic B. action-item C. demand D. exception
answer
D. exception
question
The first step in systems analysis is to _____ of the organization and how the computer system can help solve them. A. identify the overall goals B. list the customers C. analyze the financials D. identify the employees
answer
A. identify the overall goals
question
Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT _____. A. human resources B. sales C. market research D. product development
answer
A. human resources
question
In the systems development process, the _____ report determines whether the project is still feasible and worthwhile to proceed to the systems design stage. A. PERT B. request for information C. systems review D. systems analysis
answer
D. system analysis
question
A(n) _____ system serves as a foundation to the other systems of information management. A. transaction processing B. management information C. decision support D. enterprise resource planning
answer
A. transaction processing
question
A(n) _____ system is the ultimate information system in an organization because it incorporates all enterprise systems into one centralized system. A. CRM B. ISS C. ERP D. MSS
answer
C. ERP
question
In a Gantt chart, each time a _____ is completed, a grid cell is marked to indicate its completion. A. task B. project C. unit D. contact
answer
A. task
question
Using a _____ system, employees can share their expertise in different areas of a company to build upon its success. A. decision support B. management information C. business intelligence D. knowledge management
answer
D. knowledge management
question
In a transaction processing cycle, the data _____ stage checks the validity of the data entered, such as whether an item number and credit card number are valid. A. collection B. editing C. correction D. manipulation
answer
B. editing
question
Before developing a software program, a programmer will first _____. A. develop an algorithm B. review the program specifications C. build a prototype D. perform quality testing
answer
B. review the program specifications
question
Management information systems are powered by _____. A. transactions B. expert systems C. key performance indicators D. databases
answer
D. databases
question
In systems development, the _____ method divides a system's problem and solution into fundamental parts, such as the system's data and processes. A. supply chain B. object-oriented C. informatics D. agile
answer
Object-oriented
question
A corporation relies on its _____ statistics to provide insight into the state of the business and its overall health. A. key performance indicator B. exception C. structured D. optimized
answer
A. key performance indicator
question
When a systems analyst is developing an information system with several conditions, a(n) _____ can be used to analyze the possible actions taken. A. ERP B. CASE tool C. decision table D. CRM
answer
C. decision table
question
Bioinformatics is sometimes called _____ biology. A. concatenated B. computer-based C. computational D. calculated
answer
C. computational
question
Good _____ systems provide a framework for best practices in business management. A. input B. technology C. data D. information
answer
C. Data
question
In _____ processing, transactions are collected over time and processed together in groups. A. online transaction B. expert C. commercial D. batch
answer
D. batch
question
A(n) _____ system can help a business alleviate the need for multiple information system programs. A. decision support B. enterprise resource planning C. employee relationship management D. management information
answer
B. enterprise resource planning
question
The final stage of decision making and problem solving is known as the _____ stage, where the results of a decision are reviewed A. intelligence B. choice C. implementation D. monitoring
answer
D. Monitoring
question
_____ is the process of planning, monitoring, and controlling the sequence of events and resources required in a project, often using software tools. A. Systems development B. Project management C. Supply chain management D. Enterprise resource planning
answer
B. Project management
question
When deciding whether to update existing software or build a new software program, one thing to consider is the cost of maintenance versus _____. A. critical success factors B. the request for identification C. site preparation D. the cost of development
answer
D. the cost of development
question
Which of the following is NOT a benefit of an ERP system? A. low expense in time and money B. streamlined work processes C. improved access to data throughout the enterprise with less redundancy D. improved communication between functional areas
answer
A. low expense in time and money
question
Computers support the problem-solving process in decision making in all of the following stages EXCEPT _____. A. intelligence B. output C. choice D. design
answer
B. output
question
Using symbols, _____ show the logical relationships between system components. A. CASE tools B. decision tables C. flowcharts D. PERT charts
answer
C. Flowcharts
question
A graphical representation of a company's key performance indicators can be displayed in a(n) _____ for easier access to important data. A. scheduled report B. executive dashboard C. database D. optimized model
answer
B. executive dashboard
question
With the help of _____ software, new housing developments can be easily planned and analyzed. A. global information system B. batch processing C. decision support system D. geographic information system
answer
D. geographic information system
question
A(n) _____ system provides details related to specific tasks for higher-level decision making. A. transaction processing B. management information C. decision support D. enterprise resource planning
answer
C. decision support
question
Informatics is widely used in the combined disciplines of computer science and _____. A. mathematics B. medical research C. human factors D. management information systems
answer
B. medical research
question
A(n) _____ review is applied to a software package to determine a schedule for monitoring changes and updates. A. calendar-based B. scheduled C. time-driven D. event-driven
answer
C. time-driven
question
Through the use of a _____ system, information on prospective, current, and past customers is stored and analyzed for future planning. A. CSM B. CTM C. CRM D. CPM
answer
C. CRM
question
In a(n) ____ systems review, an error in the software triggers a review of the problem. A. time-driven B. event-driven C. hardware maintenance D. algorithm
answer
B. event-driven
question
Often, software engineers develop _____ of software to test a concept or gather feedback from users. A. flowcharts B. Gantt charts C. prototypes D. simulations
answer
C. prototypes
question
A collaborative framework, like _____, provides an ideal tool for collecting and sharing knowledge in an organization. A. email B. a wiki C. a lecture D. blogging
answer
B. a wiki
question
A management information system uses a(n) _____ report when a request is made by a specific person for a specific purpose. A. demand B. key-indicator C. automatic D. exception
answer
A. demand
question
During the systems _____ stage, the system is enhanced and validated to make sure it is achieving its goal. A. review B. development C. maintenance D. analysis
answer
C. maintenance
question
The primary source of input for a business management information system is its _____ database. A. relational B. transaction C. credit D. employee
answer
B. transaction
question
What are the 6 stages in the systems development life cycle?
answer
1. Systems Investigation Stage 2. Systems Analysis Stage 3. Systems Design Stage 4. Systems Implementation Stage 5. Systems Maintenance Stage 6. Systems Review Stage
question
All of the following are AI methodologies that rely on a human to give instructions for problem solving EXCEPT ____. A. expert systems B. Bayesian networks C. case-based reasoning D. neural networks
answer
D. neural networks
question
AI neural networks use ____ to simulate the processing that takes place between neurons in the brain. A. synapses B. software C. expert systems D. cognition
answer
B. software
question
Facial recognition is used as a(n) ____ process to tag photos in Facebook. A. computational intelligence B. authentication C. heuristics D. automated reasoning
answer
B. authentication
question
The ____ Grand Challenge is the ultimate robotic test. A. NASA B. W3C C. DARPA D. NSF
answer
C. DARPA
question
A man named ____ proposed a test to determine whether a computer can be said to "think." A. Alan Turing B. Ray Kurzweil C. Bill Gates D. Albert Einstein
answer
A. Alan Turing
question
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meanings. A. store B. delete C. spell D. recognize
answer
D. recognize
question
AI systems typically include all of the following EXCEPT ____. A. the ability to improve performance through experience B. the ability to handle unexpected input and still produce useful output C. the ability to apply judgement to a problem D. a set of logical rules for processing
answer
C. the ability to apply judgement to a problem
question
A popular video game system that has applied the AI application computer vision is ____. A. Kinect B. PlayStation 3 C. Nintendo DS D. Wii
answer
A. Kinect
question
Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____. A. touchpads B. typing C. simulation D. visual imagery
answer
B. Typing
question
An expert system relies on ____ to solve a problem or make recommendations. A. heuristics B. behavior C. computational analysis D. iterative processes
answer
A. heuristics
question
The concept of Singularity predicts that computers will be ____. A. faster B. superintelligent C. larger D. more compact
answer
B. superintelligent
question
AI applications add knowledge and ____ to existing applications. A. statistics B. networking C. reasoning D. language
answer
C. Reasoning
question
One important characteristic of artificial intelligence is when a device modifies its own behavior based on its ability to learn, also known as ____. A. the Blue Brain project B. machine learning C. Singularity D. an algorithm
answer
B. machine learning
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries. A. interpreted B. high-precision C. natural D. segmented
answer
B. high-precision
question
In artificial intelligence, ____ computation is based on a genetic algorithm to solve complex problems. A. fuzzy B. evolutionary C. neural D. intelligent
answer
B. evolutionary
question
Combining hardware and AI software provides the opportunity for ____. A. simulation B. evolution C. decision making D. automation
answer
D. automation
question
All of the following are examples of AI methodologies EXCEPT ____. A. conventional B. expert systems C. emotional intelligence D. neural network
answer
C. emotional intelligence
question
The ____ area of conventional AI relies on the four Rs for problem solving. A. simulations B. belief network C. case-based reasoning D. embedded
answer
C. Case-based reasoning
question
What are the four R's for solving new problems?
answer
1. Retrieve 2. Reuse 3. Revise 4. Retain
question
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____. A. informatics B. artificial intelligence C. expert systems D. knowledge management
answer
B. artificial intelligence
question
Communication and language are key elements in the ____. A. Blue Brain project B. neural network C. Turing Test D. Fuzzy Test
answer
C. Turing Test
question
A feature of neural networks includes the ability to quickly ____ stored data when new information is identified. A. delete B. transfer C. modify D. export
answer
C. modify
question
A strong advocate of the Singularity concept is ____. A. Bill Gates B. Steve Wozniak C. Ray Kurzweil D. Al Gore
answer
C. Ray Kurzweil
question
One use for a(n) ____ is to search for information pertaining to a specific query. A. intelligent agent B. expert system C. task automation agent D. natural language
answer
A. Intelligent Agent
question
AI expert ____ has created an AI program he calls the Cybernetic Poet that can create poetry in the style of human poets. A. Ray Kurzweil B. Alan Turing C. William Dobelle D. Paul Hodgson
answer
A. Ray Kurzweil
question
____ artificial intelligence is very popular in the programming of robots. A. Case-based B. Expert C. Subject-specific D. Behavior-based
answer
D. behavior-based
question
Singularity embraces the idea of ____ and other recent trends in technology. A. the Turing Test B. Moore's Law C. fuzzy logic D. a Bayesian network
answer
B. Moore's Law
question
Computational intelligence is directly related to ____. A. artificial intelligence B. knowledge management C. expert systems D. the Blue Brain project
answer
A. artificial intelligence
question
Computational intelligence is directly related to ____. A. artificial intelligence B. knowledge management C. expert systems D. the Blue Brain project
answer
A. artificial intelligence
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New