Quiz 1-8
Convert the binary 10001 to hex notation and write the digits in the space below with no spaces.
11
What is the output of the following Bash code? num_pushups=10 ((num_pushups+=1)) echo $num_pushups
11
The starting index of an array most often starts at ___________.
0
How many possible values are there in decimal notation?
10
Laura is trying to connect her computer to the Internet manually. She reads that a computer's operating system connects to other computers on the Internet through an IP __________ and port __________.
address number
A record contains related variables known as __________.
attributes
Providing a function's purpose, but not its implementation, is known as ___________.
blackboxing
Variables that are available to an entire program are ___________.
global
Associative arrays provide access to elements through a ___________.
hash key
Associative arrays in PowerShell can be implemented as ___________.
hash tables
What does ethics imply?
human choice
According to the Methods section on the ChatGPT site, ChatGPT uses __________ in its RLHF algorithhm.
human feedback
Sara is a programmer whose primary role is to write code for the software development division of her company. Her work aligns with which phase of the Systems Development Life Cycle?
implementation
Automatic conversion of a value from one data type to another by a programming language, without the programmer specifically doing so, is called implicit type conversion.
implicit
The values of an array element are typically accessed by their ___________.
index
What is a decision-making system that is not built from a model, but from training data?
inductive approach
According to Wilde's paper, Cyber Operations in Ukraine: Russia's Unmet Expectations. cyber analysts should not make the mistake of attributing intentionality to chance nor foreign orchestration to chaos .
intentionality chaos
Ensuring access and fair distribution of technologies is a matter of technology _____.
justice
In his work on catching scammers, Browning keeps a(n) ______ running on his computer to catch the password or payment gateway of the scammer.
key logger
The __________ chain proposes that the more points at which you can __________ the bad guys, the better the chance you have to __________ them from their objective or force them to make enough noise where you can more easily __________ them.
kill intercept deny detect
Self-contained and swappable components in a system are best described as ___________.
modular
In the code below, the user is asked to input a number. The code checks whether the number is even or odd. There is a missing variable or constant, indicating by the blank (___________). What should replace the blank for this code to execute properly? read -p "Enter a number: " __________ if [ $((num % 2)) -eq 0 ] then echo "This number is even." else echo "This number is odd." fi
num
In the loop below, which expression tests the loop condition? for (( num = 1; num <= 5; num++ )) do if (( $num % 2 == 0 )) then echo "$num is even" else echo "$num is odd" fi done
num <= 5
One goal of artificial intelligence is to __________.
optimize
Data is communicated in to and out of a function through ___________.
parameter passing
Which operation has the highest order of precedence?
parentheses
Malware delivers _____, which are pieces of code that do damage.
payloads
Supriya wants to identify which number or numbers on her computer are enabling the operating system to route communications traffic over the Internet. What is the term for these numbers?
port
We use regression to predict ___________ values.
real
Finding cybersecurity solutions that are clearly right or justifiable by reasonable professional standards requires careful ethical _____, analysis, and problem-solving.
reflection
What agile process involves a detailed analysis at the end of the project?
retrospective
The video on functions in this module discusses two basic benefits of functions? What are they?
reusability and fault finding
Your peer programming buddy emphasizes the importance of a program anticipating problems due to errors such as incorrect, inappropriate or corrupt data and unavailability of needed resources such as memory, operating system services, and network connections. Doing so, she explains, reflects its _____.
robustness
You are writing a program in which the lines of code simply execute in the order listed, one after another. What is this type of control structure?
sequence
Andrea uses deceptive techniques to manipulate people into disclosing personal information and then takes this information to commit fraud. This technique is known as ______ ___________. (two words)
social engineering
An operator evaluates whether two given operands are equal or not. If the operands are not equal, the expression will return true. What is this operator?
!=
What character is placed before a comment in Bash?
#
Convert the hexadecimal value 243 to a decimal integer and write the digits in the space below with no spaces.
579
You want to write an expression that evaluates whether the variable age is equal to 50. What operator should replace the ? in the assignment statement below?
==
_____ is a seven-bit encoding scheme, with enough bits to store 128 different values.
ASCII
The PBS News Hour article (Twitter has a misinformation problem. Here's how Elon Musk could make it worse.) suggests what about the potential addition of a "Edit" button? Select all that apply.
Adding the option to edit tweets could become another weapon in the disinformation war. Analyzing user pattems of editing behavior could provide insights into Twitter users' motivations. Adding an Edit button to tweets could complicate efforts to trace misinformation.
Rosie needs to access her computer's setup program as it boots up to check on certain system and device settings. What is the name of this setup program?
BIOS
What type of conditional expression, such as the one below, may evaluate to true or false depending on the test condition? In this case, the color of the sky at the time of execution is evaluated. (Hint: Some choices for answers might be assignment, Boolean, if-elseif-else, or switch.)
Boolean
The Bash shell executes input or commands after what key is pressed at the terminal?
Enter
In Browning's scammer videos, 'Ricky' claims that the user's IP address has been compromised and that in this case, Windows ______ typically displays an error message.
Defender
Arrays are heterogeneous data structures.
False
Byron is a systems analyst who documents the inputs, processing, and outputs of each program within an application.True or False? Byron work aligns best with the maintenance phase of the Systems Development Life Cycle.
False
In a spreadsheet, one column is analogous to a "record".
False
Lila and Joseph are debating the elements of "cyberspace". Can you help them out? True or False: Cyberspace primarily refers to the interaction of hardware components.
False
Lowercase letter 'm' is represented by '77' in ASCII.
False
PowerShell uses camel casing for most public identifiers.
False
What does this Bash expression evaluate to? if ((25 < 7)) || ((15 > 36))
False
According to the Artificial Intelligence video, what could beat human beings in Jeopardy?
IBM Watson
__________, used in home automation systems, provides data sources and opportunities for artificial intelligence to embed itself.
Internet Of Things
Kevin Mitnick named ____ as a secure and free messaging app.
Signal
A Boolean data type represents a logical true or false state.
True
A polyglot can incorporate several languages into one application.
True
Attribution is a key concept and concern in cybersecurity. True or False: The RAND Corporation video on attribution reports that recent attacks are no longer the work of lone actors, but groups acting on behalf of nation-states.
True
Cryptojacking is a web-based attack.
True
Laws and regulations are being outpaced by the speed, scale, and complexity of new technological developments.
True
Records are heterogeneous data types.
True
Reinforcement learning involves a process of learning an optimal control policy via trial and error in an environment.
True
The WhatsApp flaw described by Kevin Mitnick requires no interaction from the user.
True
There is no consistent legal framework governing the type of data collection associated with today's technologies.
True
Variable names cannot contain blank spaces.
True
White hat hackers are also referred to as ethical hackers.
True
An array is best represented by a series of _________ memory locations.
contiguous
What is a decision-making system approach that is first built with a model, and then, an analysis, synthesis, deployment, and evaluation of a problem?
deductive approach
As we've seen with the Texas blackout of spring 2021, losing electricity or cell connectivity can be a serious problem, psychologically or even medically (if there is an emergency). Brian Patrick Greene notes that with artificial intelligence, we will increasingly need to prepare for the risks associated with intelligence ___________.
dependency
Security is a trade-off between functionality and _____ of use.
ease
What command can be used in Bash to display a string?
echo
The term "cybersecurity" can mean many things to many people! We're relying the NISTIR definition in this course. Fill in the blanks below. Cybersecurity can be defined as the prevention of damage to, unauthorized use of, __________ of, and—if needed—the __________ of electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, __________ and availability of these systems.
exploitations restoration integrity
In this PowerShell looping construct, you want to print integers from 0 to 5, one integer per line. What keyword should replace the blank (__________) in the code? ___________ ($x = 0;$x -le 5;$x++) { Write-Host $x }
for
Where would you place parameters in a function implementation?
function header
Which type of data structure is illustrated in the C code below? Hint: You simply need to look at the structure of the code and keywords to determine this answer; you do not need to "know" C. #include <stdio.h> int main() { int language = 10; switch (language) { case 1: printf("C#\n"); break; case 2: printf("C\n"); break; case 3: printf("C++\n"); break; default: printf("Other programming language\n"); }}
switch statement
At its core, software __________.
tells computers what to do using logic
As discussed in the Machine Learning video, sample data is taken in supervised learning, and a model is built based on that data. What is this phase called?
training phase
The most important thing to preserve a healthy relationship between cybersecurity practitioners and the public is to understand the importance of __________, autonomy, and trustworthiness in that relationship.
transparency
You can refer to an entire array by using its ___________.
variable name
According to Atlantic's article, What Happens When Everything Becomes TikTok., ____________ has proven to be challenging to moderate and at the same time, useful for optimizing recommendation engines.
video data