Midterm 2 Study Guide

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

hat would be the value of the variable "c" after running the following R code? a = 3 b = 5 if( a <= b ){ c = 2 }else{ c = 5 }

<= is less than or equal to, c=2

What are two operations a computer can perform directly on binary data?

Arithmetic, Logical

What type of data structure can hold many values? Float Array Character Integer

Array

The computer code "g = 4" is an example of which of the following? Binary Loop Function Assignment

Assignment

An __ is a common term for coding error that causes a program to fail or produce an incorrect result

Bug

Which of the following is not a social engineering technique? Group of answer choices Careless Internet surfing Sending an email posing as an IT technician requesting a password change. Posing as an exterminator to enter a restricted building None of the choices are social engineering techniques.

Careless internet surfing

Which of the following best describes "Artificial Intelligence"? Group of answer choices Computer software that attempts to perform human-like tasks Computer algorithms that are able to learn and adapt without explicit instructions A a process or set of rules to be followed by a computer in calculations or other problem-solving operations Acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, such as in the forms of decisions.

Computer software that attempts to perform human-like tasks

When cyber attackers send more information requests than the target computer system can handle, the computer system crashes and this is referred to as________________________ Group of answer choices Denial-of-service attack Distributed denial-of-service attack Hacking Logic Bomb

Denial-of-service attack

Backup and recovery procedures are recommended only to safeguard against hardware/software failures. Group of answer choices True False

False

Computer programming commonly involves input and manipulation of binary data (0s and 1s) by the programmer. True/False

False

Exact text and shape alignment doesn't play a big role in a slides readability. Group of answer choices True False

False

Low level employees pose the greatest threat to information security. Group of answer choices True False

False

Running R code usually involves compiling the code into an executable file, from which the program can be run. True/False

False, not re-compiled every time, interpreted code

A compiler transforms human-readable code into an executable that can be run on any computer architecture. True/False

False, not specific computer architecture.

Humans most commonly represent number data in base 2 format. True/False

False. Base 10

Select the fonts from the list that are best suited for use in a presentation Group of answer choicesHelveticaArialGeorgiaTimes New RomanComic SansFreestyle Script

Helvetica, arial, georgia

Which of the following are intentional threats to information security (select all that apply)? Group of answer choices Information extortion Cyberterrorism Opening questionable e-mails Using weak passwords

Information extortion, cyberterrorism

Backing up computer data to an external hard drive will reduce information security risks. Group of answer choices It depends False True

It depends

Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface... Group of answer choices because it is difficult to find a great picture It is expensive to subscribe to a royalty free website It is difficult to edit pictures to fit a slide None of the options All of the options

It is expensive to subscribe to a royalty free website

Match the IDE with its programming language. RStudio, Spyder, CLion. R, Python, C/C++, Xcode, Dolphyn

RStudio- R, Spyder- Python, CLion- C/C++

A Trojan horse is _________________________ Group of answer choices Software programs that hide in other computer programs and reveal their designed behavior only when they are activated A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive act at certain time or date Segment of computer code that performs malicious actions by attaching to another computer program Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)

Reveal only when activated

A standardized programming language used in working with relational databases is called ___________. Group of answer choices SQL Java R Oracle

SQL

What is the basic unit of organization within linear presentation software? Group of answer choices Slide Deck Cell Photo

Slide

Which of the following are advantages of using an IDE for computer programming (select all that apply)? They highlight commands/functions (syntax highlighting) It gives the clearest view of what is happening "behind the scenes" during code build and development They provide graphical elements such as buttons and plots They facilitate debugging at the same time code is being written.

They highlight command/functions, provide graphical elements such as buttons and plots, facilitate debugging

What are four types of threats? Group of answer choices Trojan Worm Virus Malware Malintent Virology Annelids Troy

Trojan/Worm/Virus/Malware

A recipe is an example of an algorithm. T/F

True

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. Group of answer choices True False

True

T/F: A programming language defines a set of rules you have to adhere to

True

Which of the following is an unintentional threat to information security? Group of answer choices Using weak passwords Cyberterrorism Information extortion Alien software

Using weak pass

All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________ Group of answer choices Virus Trojan horse Logic Bomb Back Door

VIRUS

Match the following threats with their definitions: Group of answer choicesVirus [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Worm [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Phishing Attack [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Spear Phishing [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program.

Virus - Segment of computer code that performs malicious actions by attaching to another computer program. Worm - Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). Phishing attack- Deception Spear- find out as much as tey can

________________ is a piece of code that performs a malicious action and will replicate or spread by itself Group of answer choicesWormVirusPhishing attackSpear phishing

Worm

A compiler translates ____ commands into ___ commands.

human readable, computer readable

Provide the next number in the following Fibonacci sequence: 1, 1, 2, 3, _______

add up two numbers before next, next = 5

In which scenario might a company be most likely to chose to use a NoSQL database? Their database will have many repeated/redundant entries and blank data fields Their database will be extremely large and have unknown or complicated relationships between data. It is a small business, and will mostly use the database to manage customers and transactions.

large and unknown/complicated relationships btwn data

Which of the following are common elements of a computer program (select all that apply)? Loop Logical test Function, R IDE

loop, logical test, function

Which of the following terms could be used to refer to a database that is NOT relational? All of these NoSQL SQL None of these Flat-Table

nosql, flat able

______________ is a decentralized currency that is transferred on a peer-to-peer network Bitcoin eMoney Cryptocurrency Blockchain

bitcoin

The protocol for the secure transfer of money via the internet without a third party is referred to as_________________ Blockchain Cryptocurrency Bitcoin Cash App

blockchain

Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate? Group of answer choices Blockchain Bitcoin Cryptocurrency eStorage

blockchain

Another name for Intelligent agent is ____________________ Group of answer choices bot Artificial Intelligence OLAP No answer text provided.

bot

_____________________ allows you to change the hourly pay rate of an employee in one table and that change is automatically made to every table in the database that contains data about the employee

cascade update

Which of the following AI software applications would most likely not work 'off-the-shelf' and instead require a company's custom training data? Group of answer choices A "chatbot" to provide customer support Speech-to-text software Facial recognition software for a security company.

chatbot

Which of the following would NOT be considered an advantage of non-linear presentation software? Group of answer choices It follows a clear and logical sequence. It provides a graphical overview of the presentation content. It allows the presenter to easily customize the presentation to the audience or discussion. It helps to create an aesthetically pleasing and interactive presentation format

clear and logical sequence

Which of the following would be considered a database, or could utilize a database (select all that apply)? Customer transaction records A cloud server. Library card catalog An inventory

customer transaction, library card, inventory

Which of the following is typically needed to support decision-making? Group of answer choices Translation of information into data Translation of data into information

data -> information

If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using? Group of answer choices Data Mining Marketing Advertising Database

data mining

A relational database typically consists of one large two-dimensional table. T/F

false

The data collected by Big Data is organized in relational databases before it is used for business decision making. Group of answer choices True False

false

In the R language, "mean" is an example of a: Group of answer choices Function Loop Definition Assignment

function

Which of the following are common examples of artificial intelligence software you are likely to encounter on a daily basis? Group of answer choicesGoogle image search suggests images similar to the one you clicked on.YouTube suggests videos similar to the one you are watchingAmazon suggests other products you might be interested in purchasing based on past purchasesCanvas automatically gives feedback on why you missed a quiz question based on data from the whole class

google images, yt, amazon

All of the following are characteristics of cloud computing EXCEPT Group of answer choices High cost On-Demand Service Flexibility to scale up Pooling resources

high cost

All of the following are reasons to use a database except Manage and analyze complex data stores large data Perform calculations and display charts Manages more data

perform calc and display

A function... Group of answer choices provides a defined output given a set of inputs provides an unstructured output given a set of inputs provides an undefined output given a set of inputs provides an structured output given a set of inputs

provides a defined output given a set of inputs

Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply) Group of answer choices Relational databases reduce or eliminate storage of redundant data Relational databases eliminate storage of blank data values Relational databases are easier to understand and visualize None of these All of these

reduce storage, blank

__________ refers to the rules used to ensure that data between related tables are valid.

referential integrity

Whereas phishing attacks are ________, denial of service attacks are ________. Group of answer choices remote attacks requiring user action; remote attacks requiring no user action remote attacks requiring no user action; remote attacks requiring user action remote attacks requiring no user action; attacks by a programmer developing a system distributed remote attacks requiring user action; attacks by a programmer developing a system

remote attacks requiring user action; remote attacks requiring NO user action

All of the following are unintentional threats to information security EXCEPT Group of answer choices Sabotage or vandalism Carelessness with computer devices opening questionable emails Poor password selection and use

sabotage or vandalism

Which of the following is an application in which artificial intelligence can potentially provide a competitive advantage in the field of marketing and business? (select all that apply) Group of answer choices Selecting advertisements based on purchase history Automatically adjusting the cost of a product based on supply and demand Predicting future product demand in order to determine warehouse needs Predicting which products may be most desirable for customers

selecting ads, auto adjusting based on s&d, predicting future product, predicting which products may be most desirable for customers

__________________ collects personal information about users' behavior without their knowledge Group of answer choices Spyware Adware Spamware

spyware

A standardized programming language used in working with relational databases is called ___________. SQL Oracle R Java

sql

A DBMS Manages structure and controls access to data​ Manages access to data None of the options Manages structure of data

sturcture and control acccess

Not all cash app transfers require users to have a bank account Group of answer choicesTrueFalse

true

T/F: The primary key is a field that uniquely and completely identifies a record.

true

You should regularly delete any spyware that might be residing on your computer, because it may be dangerous. Group of answer choicesTrueFalse

true

Which of the following statements best describes a "phishing attack"? Group of answer choices Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that hacking techniques will obtain sensitive, personal information.

use of deception to acquire sensitive

In which of the following instances would you likely NOT want to use MS access for database management? The database is very large with hundreds of Gigabytes of information The company wants a user-friendly interface for inputting and querying data The database has well-defined and known relationships between different data tables. The database is used by a large company with dozens of simultaneous users

very large, dozens of users

What are the three attributes of Big Data Volume, variety, velocity Volume, Type, and diversity Volume, structure and velocity Volume, velocity and visualization

volume, varieyt, veloivty

An information system's _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks. Group of answer choices vulnerability; threat; exposure threat; vulnerability; exposure vulnerability; security; threat threat; vulnerability; liability

vulnerability, threat, exposure


Ensembles d'études connexes

IB Psychology : Research Methods

View Set

Class Hydrozoa, Scyphozoa, and Anthozoa

View Set

Medical Terminology (CSU, OT-215)

View Set