UNIT 14 and 15

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

____ is the process of verifying the identity of the receiver of the data. Identification Encryption Authorization Authentication

Authentication

____ is a very high-level language in which a single instruction is quite powerful. SQL COBOL C FORTRAN

SQL

IBM recently announced a new computer chip, called ____, that mimics the way the brain works through the use of "neurosynaptic" cores. SynChip iChip TrueNorth Intellisis

TrueNorth

A ____ is a graph with nodes and connecting arcs. connection architecture semantic net knowledge scheme neural network

semantic net

In a ____ transmission, no information about the exchange is permanently retained by the server. stateless ephemeral persistent transitory

stateless

The ____ intelligence model captures the behavior of an ant colony by using simple agents that operate independently. heuristic brute-force cognitive swarm

swarm

The axon of a neuron sends signals over small gaps called ____. synapses breaches schisms lacunae

synapses

Using multiple ____ in a single database decreases the amount of redundant information that must be stored. queries tables functions procedures

tables

Your website ____ describes how information is classified and organized so customers can easily find what they want. taxonomy middleware hierarchy CRM

taxonomy

The algorithmic approach called ____ has been used commercially in vehicle routing, job scheduling, and sensing biological or chemical contaminants. ACO B2C TCK ASIMO

ACO

____ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems. Artificial intelligence Mechanical reasoning Natural language processing Machine learning

Artificial intelligence

If your company sells products or materials to other companies rather than to the general public, you might maintain a ____ presence. B2S B2B S2B B2C

B2B

If your company is a retail business, you might maintain a(n) ____ website to advertise and sell your products. B2B S2B B2S B2C

B2C

A ____ manages files in a database. BDS DBS DBMS DBNS

DBMS

The Internet has been around for quite a while, but it did not have much impact on our everyday lives until the appearance of the ____ in the early 1990s. World Wide Web 4G network Telnet FTP protocol

World Wide Web

A ____ approach for finding a solution path traces all branches of the state-space graph so that all possible choices are tested and no test cases are repeated. stochastic divide and conquer brute force heuristic

brute force

The "instance" relationship shows that something is an object of a ____. function module class method

class

All of the following are characteristics that must be contained in any knowledge representation scheme EXCEPT ____. efficiency extendibility adequacy comprehensiveness

comprehensiveness

The human brain uses a ____ architecture, characterized by a large number of simple "processors" with multiple interconnections. cognitive parallel chained connectionist

connectionist

____ is the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose. Cybersquatting Phishing Social engineering Cyber warfare

cybersquatting

A ____ for a binary search reflects the fact that if the current item is not the target, there are only two next choices: the midpoint of the sublist before the node or the midpoint of the sublist after the node. back propagation algorithm decision tree connectionist architecture solution path

decision tree

When choosing your ____ you want to make sure it relates so closely to your business name that potential customers can easily guess it if they don't have it in front of them. user password IP address domain name integrated protocol

domain name

A ____ is an aircraft under autonomous control via a computer system on board or controlled by a human controller at a remote site. wizard robot drone intelligent agent

drone

____ facilitates peer-to-peer relationships in an "auction" mode. Google Craigslist Groupon eBay

eBay

____ encodes data to be transmitted into a scrambled form, using a scheme agreed upon between the sender and the receiver. Representation Verification Encryption Authentication

encryption

In a database management system a table represents information about a(n) ____, which is a fundamental distinguishable component. property index entity attribute

entity

____ is software that allows separate, existing programs to communicate and work together seamlessly. Groupware Middleware Portal software Open source software

middleware

When reading a ____ language, we use our understanding of the richness of the language's vocabulary to extract the meaning. geopolitical conventional natural formal

natural

A ____ network can learn from experience by modifying the weights on its connections. learned cognitive trained neural

neural

At the end of its training, the ____ is ready to go to work on new recognition problems that are similar to the training data but for which the answers are unknown. forward chaining system wizard neural network intelligent instance

neural network

SQL is a ____ language. composite procedural functional nonprocedural

nonprocedural

Once you decide to move into the ecommerce arena, the first major decision is choosing between in-house development and ____. remote serving spoofing outsourcing distributed computing

outsourcing

Information can be stored in ____ form as an image, which is a grid of pixels that have attributes of shading and color. pictorial graphical labeled artificial

pictorial

A ____ key is an attribute or combination of attributes that uniquely identifies a tuple. primary foreign characteristic secondary

primary

____ technology can download updates to personalized information, such as the weather conditions in your geographic area, to your cell phone. Push Swarm Rule-based Solution

push

Database management systems usually require specialized ____ that enable the user to ask questions of a database to retrieve information. structured languages query interfaces query languages question languages

query languages

Artificial intelligence seeks ways to improve a computer's capabilities in ____ and reasoning tasks. mathematical computational recognition intellectual

recognition

The ____ integrity rule specifies that any value of a foreign key attribute in a given table must match a value in the corresponding primary keys of the related table. primary referential entity data

referential

The term ____ implies a device that can gather sensory information from its surroundings and to autonomously perform mechanical actions in response. robot intelligent agent wizard drone

robot

A(n) ____ must contain the following components: a knowledge base and an inference engine. rule-based system forward chaining system intelligent agent wizard

rule-based system


Kaugnay na mga set ng pag-aaral

Wireless Communications- Chapters 1-3 Test Study Guide

View Set

Chapter 11: Creating the Right Type of Report

View Set

Accounting: Chapter 1 Practice Test

View Set

Unit 27 - Prefixes (bi, tri, mid, semi)

View Set