cis exam 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of these browsers was developed by Microsoft?

Internet Explorer

It will be even more difficult to know if students are paying attention when they're wearing the ________ that Sony is developing. They play and record video!

contact lenses

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally

creating your visuals.

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullying

Trying to answer questions such as "what happened?" or "what is occurring?" or "what was the ROI?" is the role of

descriptive analytics.

Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with ________.

diabetes

A ________ name identifies a server site on the Internet.

domain

Transferring a file to your digital device from the Internet is called ________.

downloading

Software that limits the material that a browser fetches or that a search engine displays are called ________.

filters

A zombie is a computer controlled by a ________.

hacker

Which of the following is not a category of Intellectual property?

software use

An unwelcome e-mail message is called ________.

spam

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.

structured

A common SQL term used in queries is FROM. FROM allows the user to choose the _____ of the database in which the query is located.

table

When selecting the right data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered ______ data.

third-party

In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are)

two dashes: "- -."

Cookies stored on a computer store information about ________.

user preferences

Software that infects a computer and is created by computer code is called a ________.

virus

Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________.

white hat hackers

Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except

your antivirus software will always ensure your files are safe.

A hacker-controlled computer is called a ________.

zombie

Select three critical factors to consider when determining the right data to select?

-What types of data do you need to solve a specific problem? -How much data should be collected? -How will the data be collected?

Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which three of the following?

-curiosity -understanding context -data strategy

The main tools used by data analysts include which three of the following?

-data visualization tools -databases and query languages -spreadsheets

Uses of data analytics include which three of the following?

-improved decision making -improved patient experiences and internal procedures in health care -improved customer service

Tweets can be a maximum of ________ characters.

280

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

A gene-editing technique called ________ may one day provide a cure for cancer.

CRISPR

Hepregen, a company originating from MIT, received a large donation to develop a device that mimics a liver. This technology is called an Organ on a ________.

Chip

SAGE was developed during the ________ War.

Cold

The first commercially available computer with a graphical user interface was NeXT's ________ computer.

Cube

Because of the significant information it can reveal about the electorate, ________ mining has become increasingly important to campaign managers.

Data

One of Google's companies that is investigating AI and Machine Learning is called ________.

DeepMind

What technology enables business-oriented transactions and information to be communicated electronically between people and organizations?

EDI

Prototypes of this company's technology lets deaf people's skin mimic the ear's cochlea that translates sound into specific frequencies for the brain.

Facebook

A protocol commonly used to transfer large files from one server to another on the Internet is the ________.

File Transfer Protocol

Which is not considered an e-commerce transaction?

G2B

A popular cloud collaboration site for lawyers and other legal professionals is ________.

Glasscubes

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP address

The following are all true for Instagram except

Instagram charges a fee to download the app.

________ property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

Intellectual

Firewall software used to block Internet-specific content of a user is called an ________ filter.

Internet

Cyberattacks include all the following except

Internet browsing.

Developed and designed to help teams collaborate globally in real-time, Canvus Connect collaboration software that makes it possible for remote users to share, draw, manipulate, and input information in on a single board was developed by ________.

MultiTaction

Luke Skywalker lost an arm in Episode V. In the movie it was replaced with an artificial limb that was connected to his body's nervous system. This technology is coming closer to reality in the field of ________.

Neuroprosthetics

Replacement body parts that interact with a person's nervous system is a technology called ________.

Neuroprosthetics

Because they are both Apple products, the browser that works smoothest with Macintosh OS X is ________.

Safari

Data-driven decision making (DDDM) can be facilitated through a six-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

It is possible to limit the amount of time snaps can be viewed on ________.

Snapchat

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

The highest level in the domain name hierarchy is known as the ________.

Top Level Domain

Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a ________.

Trojan horse

Popular social media sites include all except

TwitterIn.

Sometimes spam messages are referred to as ________.

UBE

URL stands for ________ Resource Locator.

Uniform

The original wireless network privacy and protection standard for Wi-Fi was known as ________.

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ________.

WPA

In addition to activating ________ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

Many cellular ISPs offer modem/router combination devices that can create a ________ wherever there is adequate cell service.

Wi-Fi hot spot

A learning platform that uses algorithms to adjust the content that each student sees in order to maximize learning efficiency is called a(n) ________ learning platform.

adaptive

Social media apps integrate all of the multimedia listed except

addresses.

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.

asymmetric

The volume of data that can be carried on an Internet transmission media in an amount of time is called ________.

bandwidth

Personal ________ is the process used by individuals to make them stand out from other by identifying and expressing their unique traits and values.

branding

Software applications that allow users to access and surf the World Wide Web are called ________.

browsers

Data analysts must blend facts and data with knowledge about the

business or organization.

A virus signature is the software ________ of a particular computer virus.

code

Fluid Interfaces developed a device that assists the blind to access printed text. The device has a camera that scans text and then reads the text to the user. The device is worn on the user's ________.

finger

A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.

firewall

A security system separating two networks or even computers on the same network is called a ________.

firewall

Data transformation is the process of converting the _____ of data.

format

A person with unlawful access to networks to steal and corrupt information and data is called a ________.

hacker

Software piracy include all the following except

illegally learning about software.

The amount of time it takes data to travel from devices to a data center and back is called ________.

latency

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a ________.

memristor

Electronic etiquette is also known as ________.

netiquette

The following are all part of an RFID transmission system except for ________.

network

Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked, for example) is considered _____ data.

ordinal

The three most common types of e-mail viruses include all except

password savers.

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.

persistent

When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.

personally

A big problem when travelling is not being able to converse in a foreign language. To address this issue, Waverly Labs developed ________, an earpiece that links by Bluetooth to a translating app.

pilot

These best practices are used in LinkedIn except

post vacation photos to show your friends where you have traveled.

Your posts on LinkedIn should be kept ________.

professional

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing.

quantum

SQL, usually pronounced "sequel," is quite useful when working with large data sets. The Q in SQL stands for

query.

IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ________.

radiologists

Collections of related fields in a database are referred to as

records.

In order to be considered open data, databases must provide access rights so that they can be

redistributed.

The device that connects two networks is a ________.

router

Your ________ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as ______ AI.

scalable

Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.

script kiddies

Privacy and ________ are the two main factors related to your digital identity.

security

Pulsed laser technology called LIDAR to detect and monitor the environment is an integral part of ________.

self-driving trucks

Contact your ISP if your actual Internet speed is ________ than advertised.

slower

Taken and shared photos or videos on Snapchat are called ________.

snaps

Specialized hardware or software that capture packets transmitted over a network are called packet ________.

sniffers

If copyrighted software is illegally copied, distributed, modified or sold and is regarded as a direct infringement of copyright, this is called ________.

software piracy


संबंधित स्टडी सेट्स

Circuitory system aids to understandment

View Set

58. Peritoneum - parietal, visceral, peritoneal cavity, omen bursa

View Set

LAB 12: urinalysis lab (urine characteristics and abnormal urinary constitutes)

View Set

Chapter 48: Assessment and Management of Patients with Obesity 1

View Set