COMP SCI LECTURE TEST

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

In the R language, "mean" is an example of a:

Function

Which of the following terms could be used to refer to a database that is NOT relational?

NoSQL, Flat-Table

Compiler

Translator

What type of data structure can hold many values?

array

Blockchain-

software/protocol for the secure transfer of money, property or contract via the internet without a third party (bank or business). Blockchain is a distributed ledger technology that is currently "used" by about 60% of the world's largest corporations.

________________ is a piece of code that performs a malicious action and will replicate or spread by itself

worm

The Social Marketing Process • Five steps in social marketing, also applicable to local and mobile marketing

1. Fan acquisition, 2. Engagement, 3. Amplification, 4. Community, 5. Brand Strength

Provide the next number in the following Fibonacci sequence: 1, 1, 2, 3, _______

5

Cookies

A small file Web sites place on a user's computer; can be legitimate (to capture items in a shopping cart) but can be abused (to track individuals' browsing habits) and can contain sensitive information (like credit card numbers) and pose a security risk

What is a model?

AI produces a model of how different things are related, which allows it to make predictions.

IS Systems security system

Access rick, develop security strategy, implement controls, monitor security, reveiw and update security

Advanced Analytics

Advanced analytics are designed to help users gain a deeper understanding of why things happen and then build predictive models to support decision making • Data science describes the advanced analytics field of study and practice • Advanced analytics are often used by business analysts to take decisions out of their hands, thus freeing up valuable resources

Online Analytical Processing

An OLAP cube is a multidimensional database structure to support slicing, dicing, and drill-down

Which tool allows text or images to move, appear, or otherwise change appearance within a single presentation slide?

Animations

Select the reasons why we avoid using animations in PowerPoint?

Animations = lot of time unless good PowerPoint skills Correct! Animations = problems with mouse during presentation

What are two operations a computer can perform directly on binary data?

Arithmetic Correct! Logical

artificial intelligence

As a very broad definition, we can say that AI involves computer systems that aim to perform tasks normally carried out by humans.

The computer code "g = 4" is an example of which of the following?

Assignment

Use of Blockchain in Cases

Background checks: education credentials, criminal records Secure document storage: home deed, auto title Birth registries Land registries Financial services: securities clearing, syndicated loans Global supply chain: automotive recalls and counterfeit airbags Healthcare: EMRs, insurance claims, genome research Airlines: registration, re-booking, vouchers, loyalty Tokenized economy: Tech Coworking space 1 token = 1 seat Payment channels: Starbucks or for bandwidth consumption

Big Data

Big data represents a massive amount of data that organizations use to contribute to business success and meet the challenges of operating with their industry. Big data is characterized by volume, variety, and velocity.

Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate?

Blockchain

CLion

C/C++

_____________________ allows you to change the hourly pay rate of an employee in one table and that change is automatically made to every table in the database that contains data about the employee

Cascade update

Source Code

Collection of computer instructions written in a human-readable programming language, usually as plain text.

Which of the following best describes "Artificial Intelligence"?

Computer software that attempts to perform human-like tasks

Programming Language Compiler Machine Language

Computer-readable

Which of the following would be considered a database, or could utilize a database (select all that apply)?

Customer transaction records, Library card catalog,An inventory

If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using?

Data mining

Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface...

Difficult to find great picture

Information Visualization (Digital Dashboards)

Digital dashboards are used to visually present key performance indicators used by management • Data usually highly aggregate • They use a variety of design elements to present data in a user-friendly w

Data Mining

Discovering "hidden" predictive relationships in the data • Complicated algorithms run on large data warehouses • Types of data mining algorithms - Association discovery - Clustering - Classification - Text and Web content mining

Deliberate Threat to Information Security

Espionage or trespass • Information extortion • Sabotage or vandalism • Theft of equipment or information • Identity theft • Compromises to intellectual property • Software attacks • Alien software • Supervisory Control and Data Acquisition (SCADA) attacks • Cyberterrorism and cyberwarfare

A compiler transforms human-readable code into an executable that can be run on any computer architecture.

False

A graphic organizer in PowerPoint includes the reading view

False

Computer programming commonly involves input and manipulation of binary data (0's and 1's) by the programmer.

False

Write code in an editor program 2. Compile the code, which produces an executable file 3. Run the program (executable file)

False

A relational database typically consists of one large two-dimensional table.

False.

Low level employees pose the greatest threat to information security.

False.

The data collected by Big Data is organized in relational databases before it is used for business decision making.

False.

Google Slide

Freeware, cloud based, not as robust of functionallity

Prezi

Freeware, non linear, some things to pay for lacking collaboration,

All of the following are characteristics of cloud computing EXCEPT

High Cos

Programming Language

Human-readable

Information security refers to all of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

IS

Running R code usually involves compiling the code into an executable file, from which the program can be run.

Incorrect, R is an "interpreted language" in which the code is interpreted on the fly rather than re-compiling each time.

Humans most commonly represent number data in base 2 format.

Inorrect, humans typically represent numbers in base-10 format.

Which of the following would NOT be considered an advantage of non-linear presentation software?

It follows a clear and logical sequence.

Which of the following are common elements of a computer program (select all that apply)?

Logical test, Function, Loop

A Database management system (DBMS)

Manages structure and controls access to data​

OLAP Terms and Concepts

Measures - Facts, numerical data that can be aggregated • Dimensions - Provides a way to summarized the data - Hierarchically arranged to enable drill-down and roll-up • Cubes - Multidimensional structure of dimensions and measures (could be structured and unstructured NOT relational) • Slicing and Dicing - Analyzing data on a subset of dimensions

Current Uses of Blockchain Technology

Now: Online banking transaction growth SME's/Retail acceptance of electronic transactions Online purchases/Commerce In-App purchases Virtual currencies in games International Transaction growth (Commerce and Remittance) Value storage cards (loyalty cards, ERP, gift cards etc etc)

All of the following are reasons to use a database except

Perform calculations and display charts

Twitter Marketing Tools

Promoted Tweets • Promoted Trends • Promoted Accounts • Enhanced Profile Page • Amplify • Promoted Video • Television Ad Retargeting • Lead Generation Cards • Mobile Ads

Pinterest Marketing Tools

Promoted pins • Buyable Pins/Shop Our Picks • Add Pin It and Follow buttons • Pin as display ad • Theme-based (lifestyle) boards • Brand pages • URL link to stores • Retail brand Pins • Integration with other social sites • Network with users, followers, others

Spyder

Python

Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply)

Relational databases reduce or eliminate storage of redundant data. Relational databases eliminate storage of blank data values

Which feature would you activate to enable the tools needed to measure and locate your objects on the slide?

Ruler, Grid

A standardized programming language used in working with relational databases is called ___________.

SQL

In which of the following instances would you likely NOT want to use Microsoft Access for database management?

The database is used by a large company with dozens of simultaneous users Correct, Microsoft Access is only intended for a few to maybe tens of simultaneous users. Correct! The database is very large with hundreds of Gigabytes of information Correct, Microsoft Access starts to have problems when the database exceeds about 2GB.

Block chain built different

The uniqueness of blockchain lies in its capacity to store and retain person-toperson transactional history, so that chances of fraud, hacking, and thirdparty interference are eliminated

In which scenario might a company be most likely to chose to use a NoSQL database?

Their database will be extremely large and have unknown or complicated relationships between data.

Which of the following are advantages of using an IDE for computer programming (select all that apply)?

They facilitate debugging at the same time code is being written. Correct! They highlight commands/functions (syntax highlighting) Correct! They provide graphical elements such as buttons and plots

Which of the following is typically needed to support decision-making?

Translation of data into information

A programming language defines a set of rules you have to adhere to (i.e., syntax).

True

Layering effects in PowerPoint can affect the printed handouts readability

True

The primary key is a field that uniquely and completely identifies a record.

True

Which of the following is NOT a characteristic of Big Data?

Validity

All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________

Virus

Denial-of-service attack

Which of the following cyber attack does not require user action?

Base 10 Number System

a number system in which all numbers are expressed using the digits 0-9

spear phishing

a phishing expedition in which the emails are carefully designed to target a particular person or organization

Social Engineering

an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords

Apple Keynote

asthetics, property, free, not widely used, very few updates, compitble with power, not actively updated.

Another name for Intelligent agent is ____________________

bot

Free Office presentation

both prop and free, perfect clone, no cloud collabration,

A(n) _______ is a common term for a coding error that causes a program to fail or produce an incorrect result.

bug

Bitcoin mining-

fee-based accounting function for recording transactions (as high as $130,000/block for 10 minutes). Mining allows participants to discover and record new blocks

Bitcoin-

is a decentralized digital currency that is transferred on a peer-to-peer network

Cryptocurrency

is a medium of exchange, created and stored electronically in the blockchain, using encryption techniques to control the creation of monetary units and to verify the transfer of funds. Bitcoin is the best-known example

Prezi

non linear based presentation involving a tree

Libreoffice Impress

open source, lots of computing languages, no animation, no collabrations, Buggy

Microsoft PowerPoint

proprietery, very popular, fully featured, bad asthetics

A function...

provides a defined output given a set of inputs

__________ refers to the rules used to ensure that data between related tables are valid

referential inegriy

A recipe is an example of an algorithm.

true (a recipe contains the basic elements defining an algorithm)

Facebook Marketing Tools

• Like Button • Brand Pages • News Feed Page Post Ads • Right-Hand Column Sidebar Ads • Mobile Ads • Facebook Exchange (FBX)

Visual Analytics

• Visual analytics is the combination of various analysis techniques and interactive visualization to solve complex problems


Kaugnay na mga set ng pag-aaral

McCuistion Ch 16: Cholinergic Agonists and Antagonists

View Set

Chapter 5: Marketing Information Systems and Marketing Research

View Set

ATI Urinary Elimination - practice assessment

View Set

Health assessment review chapter 19

View Set

Final Exam Review Communications

View Set

Hydrostatic vs. Oncotic Pressure

View Set