COMP SCI LECTURE TEST
In the R language, "mean" is an example of a:
Function
Which of the following terms could be used to refer to a database that is NOT relational?
NoSQL, Flat-Table
Compiler
Translator
What type of data structure can hold many values?
array
Blockchain-
software/protocol for the secure transfer of money, property or contract via the internet without a third party (bank or business). Blockchain is a distributed ledger technology that is currently "used" by about 60% of the world's largest corporations.
________________ is a piece of code that performs a malicious action and will replicate or spread by itself
worm
The Social Marketing Process • Five steps in social marketing, also applicable to local and mobile marketing
1. Fan acquisition, 2. Engagement, 3. Amplification, 4. Community, 5. Brand Strength
Provide the next number in the following Fibonacci sequence: 1, 1, 2, 3, _______
5
Cookies
A small file Web sites place on a user's computer; can be legitimate (to capture items in a shopping cart) but can be abused (to track individuals' browsing habits) and can contain sensitive information (like credit card numbers) and pose a security risk
What is a model?
AI produces a model of how different things are related, which allows it to make predictions.
IS Systems security system
Access rick, develop security strategy, implement controls, monitor security, reveiw and update security
Advanced Analytics
Advanced analytics are designed to help users gain a deeper understanding of why things happen and then build predictive models to support decision making • Data science describes the advanced analytics field of study and practice • Advanced analytics are often used by business analysts to take decisions out of their hands, thus freeing up valuable resources
Online Analytical Processing
An OLAP cube is a multidimensional database structure to support slicing, dicing, and drill-down
Which tool allows text or images to move, appear, or otherwise change appearance within a single presentation slide?
Animations
Select the reasons why we avoid using animations in PowerPoint?
Animations = lot of time unless good PowerPoint skills Correct! Animations = problems with mouse during presentation
What are two operations a computer can perform directly on binary data?
Arithmetic Correct! Logical
artificial intelligence
As a very broad definition, we can say that AI involves computer systems that aim to perform tasks normally carried out by humans.
The computer code "g = 4" is an example of which of the following?
Assignment
Use of Blockchain in Cases
Background checks: education credentials, criminal records Secure document storage: home deed, auto title Birth registries Land registries Financial services: securities clearing, syndicated loans Global supply chain: automotive recalls and counterfeit airbags Healthcare: EMRs, insurance claims, genome research Airlines: registration, re-booking, vouchers, loyalty Tokenized economy: Tech Coworking space 1 token = 1 seat Payment channels: Starbucks or for bandwidth consumption
Big Data
Big data represents a massive amount of data that organizations use to contribute to business success and meet the challenges of operating with their industry. Big data is characterized by volume, variety, and velocity.
Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate?
Blockchain
CLion
C/C++
_____________________ allows you to change the hourly pay rate of an employee in one table and that change is automatically made to every table in the database that contains data about the employee
Cascade update
Source Code
Collection of computer instructions written in a human-readable programming language, usually as plain text.
Which of the following best describes "Artificial Intelligence"?
Computer software that attempts to perform human-like tasks
Programming Language Compiler Machine Language
Computer-readable
Which of the following would be considered a database, or could utilize a database (select all that apply)?
Customer transaction records, Library card catalog,An inventory
If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using?
Data mining
Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface...
Difficult to find great picture
Information Visualization (Digital Dashboards)
Digital dashboards are used to visually present key performance indicators used by management • Data usually highly aggregate • They use a variety of design elements to present data in a user-friendly w
Data Mining
Discovering "hidden" predictive relationships in the data • Complicated algorithms run on large data warehouses • Types of data mining algorithms - Association discovery - Clustering - Classification - Text and Web content mining
Deliberate Threat to Information Security
Espionage or trespass • Information extortion • Sabotage or vandalism • Theft of equipment or information • Identity theft • Compromises to intellectual property • Software attacks • Alien software • Supervisory Control and Data Acquisition (SCADA) attacks • Cyberterrorism and cyberwarfare
A compiler transforms human-readable code into an executable that can be run on any computer architecture.
False
A graphic organizer in PowerPoint includes the reading view
False
Computer programming commonly involves input and manipulation of binary data (0's and 1's) by the programmer.
False
Write code in an editor program 2. Compile the code, which produces an executable file 3. Run the program (executable file)
False
A relational database typically consists of one large two-dimensional table.
False.
Low level employees pose the greatest threat to information security.
False.
The data collected by Big Data is organized in relational databases before it is used for business decision making.
False.
Google Slide
Freeware, cloud based, not as robust of functionallity
Prezi
Freeware, non linear, some things to pay for lacking collaboration,
All of the following are characteristics of cloud computing EXCEPT
High Cos
Programming Language
Human-readable
Information security refers to all of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction
IS
Running R code usually involves compiling the code into an executable file, from which the program can be run.
Incorrect, R is an "interpreted language" in which the code is interpreted on the fly rather than re-compiling each time.
Humans most commonly represent number data in base 2 format.
Inorrect, humans typically represent numbers in base-10 format.
Which of the following would NOT be considered an advantage of non-linear presentation software?
It follows a clear and logical sequence.
Which of the following are common elements of a computer program (select all that apply)?
Logical test, Function, Loop
A Database management system (DBMS)
Manages structure and controls access to data
OLAP Terms and Concepts
Measures - Facts, numerical data that can be aggregated • Dimensions - Provides a way to summarized the data - Hierarchically arranged to enable drill-down and roll-up • Cubes - Multidimensional structure of dimensions and measures (could be structured and unstructured NOT relational) • Slicing and Dicing - Analyzing data on a subset of dimensions
Current Uses of Blockchain Technology
Now: Online banking transaction growth SME's/Retail acceptance of electronic transactions Online purchases/Commerce In-App purchases Virtual currencies in games International Transaction growth (Commerce and Remittance) Value storage cards (loyalty cards, ERP, gift cards etc etc)
All of the following are reasons to use a database except
Perform calculations and display charts
Twitter Marketing Tools
Promoted Tweets • Promoted Trends • Promoted Accounts • Enhanced Profile Page • Amplify • Promoted Video • Television Ad Retargeting • Lead Generation Cards • Mobile Ads
Pinterest Marketing Tools
Promoted pins • Buyable Pins/Shop Our Picks • Add Pin It and Follow buttons • Pin as display ad • Theme-based (lifestyle) boards • Brand pages • URL link to stores • Retail brand Pins • Integration with other social sites • Network with users, followers, others
Spyder
Python
Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply)
Relational databases reduce or eliminate storage of redundant data. Relational databases eliminate storage of blank data values
Which feature would you activate to enable the tools needed to measure and locate your objects on the slide?
Ruler, Grid
A standardized programming language used in working with relational databases is called ___________.
SQL
In which of the following instances would you likely NOT want to use Microsoft Access for database management?
The database is used by a large company with dozens of simultaneous users Correct, Microsoft Access is only intended for a few to maybe tens of simultaneous users. Correct! The database is very large with hundreds of Gigabytes of information Correct, Microsoft Access starts to have problems when the database exceeds about 2GB.
Block chain built different
The uniqueness of blockchain lies in its capacity to store and retain person-toperson transactional history, so that chances of fraud, hacking, and thirdparty interference are eliminated
In which scenario might a company be most likely to chose to use a NoSQL database?
Their database will be extremely large and have unknown or complicated relationships between data.
Which of the following are advantages of using an IDE for computer programming (select all that apply)?
They facilitate debugging at the same time code is being written. Correct! They highlight commands/functions (syntax highlighting) Correct! They provide graphical elements such as buttons and plots
Which of the following is typically needed to support decision-making?
Translation of data into information
A programming language defines a set of rules you have to adhere to (i.e., syntax).
True
Layering effects in PowerPoint can affect the printed handouts readability
True
The primary key is a field that uniquely and completely identifies a record.
True
Which of the following is NOT a characteristic of Big Data?
Validity
All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________
Virus
Denial-of-service attack
Which of the following cyber attack does not require user action?
Base 10 Number System
a number system in which all numbers are expressed using the digits 0-9
spear phishing
a phishing expedition in which the emails are carefully designed to target a particular person or organization
Social Engineering
an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords
Apple Keynote
asthetics, property, free, not widely used, very few updates, compitble with power, not actively updated.
Another name for Intelligent agent is ____________________
bot
Free Office presentation
both prop and free, perfect clone, no cloud collabration,
A(n) _______ is a common term for a coding error that causes a program to fail or produce an incorrect result.
bug
Bitcoin mining-
fee-based accounting function for recording transactions (as high as $130,000/block for 10 minutes). Mining allows participants to discover and record new blocks
Bitcoin-
is a decentralized digital currency that is transferred on a peer-to-peer network
Cryptocurrency
is a medium of exchange, created and stored electronically in the blockchain, using encryption techniques to control the creation of monetary units and to verify the transfer of funds. Bitcoin is the best-known example
Prezi
non linear based presentation involving a tree
Libreoffice Impress
open source, lots of computing languages, no animation, no collabrations, Buggy
Microsoft PowerPoint
proprietery, very popular, fully featured, bad asthetics
A function...
provides a defined output given a set of inputs
__________ refers to the rules used to ensure that data between related tables are valid
referential inegriy
A recipe is an example of an algorithm.
true (a recipe contains the basic elements defining an algorithm)
Facebook Marketing Tools
• Like Button • Brand Pages • News Feed Page Post Ads • Right-Hand Column Sidebar Ads • Mobile Ads • Facebook Exchange (FBX)
Visual Analytics
• Visual analytics is the combination of various analysis techniques and interactive visualization to solve complex problems