Exam #2 - Lecture

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

W5. A compiler transforms human-readable code into an executable that can be run on any computer architecture (T/F)

False --> a compiler generates an executable file to be run on a specific computer architecture.

W7. The emergence of the Internet has decreased the threats to information security (T/F)

False --> exposing information to the world via the Internet introduces a massive number of potential threats to information security

W5. Humans most commonly represent number data in base 2 format (T/F)

False --> humans typically represent numbers in base-10 format

W5. Computer programming commonly involves input and manipulation of binary data (0's and 1's) by the programmer (T/F)

False --> modern programming does not require programmers to deal directly with binary data

L14. How was info presented before? - the origin of pp - linear presentations - nonlinear presentations - mark up language based

Flip Charts, Projector slideshow, Overhead Projector - powerpoint originally called "presenter" 87' - powerpoints use slides as basic unit of organization, moving through each slidein order one at a time --> animations change,move, modify appearance of text - software (ex prezi) uses a map or storyboard like interface that moves the camera around B-T ideas - mark up language based (Latex beamer)

W8. Select the typical components of a slide Footer Slide number Body Header Margin Layout Width Border

Footer Slide number Body Header

W6. In the R language, "mean" is an example of a: Assignment Function Loop Definition

Function

W7. Whereas phishing attacks are ________, denial of service attacks are ________. Remote attacks requiring user action; remote attacks requiring no user action Remote attacks requiring no user action; remote attacks requiring user action Remote attacks requiring no user action; attacks by a programmer developing a system Distributed remote attacks requiring user action; attacks by a programmer developing a system

remote attacks requiring user action; remote attacks requiring no user action

W6. A Database management system (DBMS) . . . Manages structure and controls access to data​ None of the options Manages access to data Manages structure of data

Manages structure and controls access to data​

L9. How do humans program computers?

Programming Language --> Human-readable Compiler --> Translator Machine Language --> Computer-readable A compiler translates human-readable code to a set of computer readable instructions for a particular architecture.

W5. Match the IDE (left) with its programming language (right) RStudio ==> ___________ Spyder ==> ___________ CLion ==> ___________ options: Dolphyn Xcode R Python C/C++

RStudio ==> R Spyder ==> Python CLion ==> C/C++

L13. Big Data

Represents a massive amount of data that organizations use to contribute to business success and meet the challenges of operating with their industry. Characterized by volume, variety, and velocity.

W8. Which feature would you activate to enable the tools needed to measure and locate your objects on the slide? Rulers Tabs Grid Measure Inspect

Rulers + Grid

W6. A recipe is an example of an algorithm. (T/F)

True

W6. The primary key is a field that uniquely and completely identifies a record. (T/F)

True

W7. Not all cash app transfers require users to have a bank account (T/F)

True

W7. Risk management identifies, controls, and minimizes the impact of threats to the organization's information security (T/F)

True

W7. You should regularly delete any spyware that might be residing on your computer, because it may be dangerous (T/F)

True

W8. Layering effects in PowerPoint can affect the printed handouts readability (T/F)

True

W7. Low level employees pose the greatest threat to information security (T/F)

false --> anyone within an organization can pose threats to information security, including managers

L13. Cloud Computing

is a way to allocate resources much like a utility sells power - Resources are used "on-demand," as needed - Customers only pay for what they consume - Resources can be rapidly allocated and reallocated - Consumption becomes an operating expense - % utilization and efficiency increase dramatically

L10. Arithmetic Operations Logic Statements ('if') Loops

math --> 2+2 use 'if' statements when we have some question to ask in our program if( 3 == 5 ) Comparing values: we usually use 'if' statements when we have some question to ask in our program We usually use 'for' loops if we want to do something in our code repeatedly a certain number of times (based on a question we ask about our program)

L13. Potential Issues - small issues or out of pattern situations (an struggle with common-sense decisions)

potential solution to data limitations is to create simulated data

W6. A function... provides an undefined output given a set of inputs provides an structured output given a set of inputs provides a defined output given a set of inputs provides an unstructured output given a set of inputs

provides a defined output given a set of inputs

W6. A relational database typically consists of one large two-dimensional table. (T/F)

False

W7. Backup and recovery procedures are recommended only to safeguard against hardware/software failures (T/F)

False

W7. The data collected by Big Data is organized in relational databases before it is used for business decision making (T/F)

False

W8. A graphic organizer in PowerPoint includes the reading view (T/F)

False

W8. Customizing your toolbars will slow down your workflow (T/F)

False

W8. Exact text and shape alignment doesn't play a big role in a slides readability (T/F)

False

L13. A model

- AI produces a model of how different things are related, which allows it to make predictions. Conceptual --> You have a conceptual model of how various aspects of the world works - Mostly qualitative way of describing relationships between variables -- AI task is to be able to describe these relationships quantitatively based on data, such that they can be used to program a computer (ex "conceptual" -- if the weather is hot your plants will need more water)

L9. Why might you want to use MATLAB? Why might you want to use Python? Why might you want to use R? Why might you want to use C/C++? Why might you want to use Java?

- The biggest strength of MATLAB is in working with matrices (MATrix LABoratory) - Matrices come up frequently in physics and engineering problems where you have grids Python was developed to be user-friendly and easily readable. - It is generally free. - It is becoming very popular (third most popular language behind Java and C). Why might you want to use R? R was originally developed for statistical data analysis, but it can also do most things that other programming languages can do. - It is generally free, in contrast to other commonly used statistical software such as SAS and SPSS. - It is probably the most commonly used programming language in modern life sciences. A strength of C is that it is very general and fast. - Often considered as most popular programming language. - Popular in application development, operating systems. Java's strength is in application development because compiled Java code can run on any hardware architecture (write once, run anywhere; WORA). - Generally requires installation of a Java utility on the machine. - Widely used in application development.

L12. Communications Controls (network controls)

-secure the movement of data across networks. Examples of Communications controls include: Firewalls, anti-malware systems, whitelisting and blacklisting, encryption, virtual private networks (VPNs), transport layer security (TLS), and employee monitoring systems

W5. Running R code usually involves compiling the code into an executable file, from which the program can be run (T/F)

False --> R is an "interpreted language" in which the code is interpreted on the fly rather than re-compiling each time

L9. Types of Programming Languages

1. Compiled Language: Code is written, then compiled for one or more computer architectures, then the resulting executable program is run (e.g., C/C++, Swift). 2. Interpreted Language: The computer program is smart enough to interpret code on the fly without having to re-compile. (e.g., R, Python, MATLAB). 3. "Just-in-time" Compiled Language: The computer program interprets code on the fly, then determines if it will be faster to re-compile (JavaScript, C#, Julia). There is no "one size fits all" programming language that can do everything perfectly. They all make trade-offs.

L9. Why Should You Learn about Programming?

1. Develops structured and creative thinking 2. Developing simple computer programs can help automate tedious or mundane tasks 3. Likely to interact with them

L9. How do we actually write code?

1. In a Text Editor program (plain text) ex) notepad, vim 2. In an Integrated Development Environment (IDE - provides a graphical interface for running and debugging code) --> multi language You can view variables, debug in realtime, use autocomplete, access version control (e.g., Git), and other things ex) xcode, visual studio, R, JAVA One reason not to use an IDE, is that you can lose understanding of what is happening "behind the scenes", and it can offer so many features that may be confusing

L10. Principles of a good database design

1. Organize data so there is no duplication of information 2. Use techniques to ensure that data is consistent Normalization is important because your goal in creating a database is to have it perform as expected (reduce redundancy) -Tables in a relational database are joined to one another on a common field Field list— list of the field names in a table Common fields—fields in one or more tables that store the same data A relationship—is an association that is established between two tables using a common field

L9. Computer Program Development Workflow

1. Write code in an editor program 2. Compile the code, which produces an executable file 3. Run the program (executable file) 4. Debug the code/program

W6. What would be the value of the variable "c" after running the following R code? a = 3 b = 5 if( a <= b ){ c = 2 }else{ c = 5 } ------- 5 2 8 3

2

W6. Provide the next number in the following Fibonacci sequence: 1, 1, 2, 3, _______

5

W7. Which of the following AI software applications would most likely not work 'off-the-shelf' and instead require a company's custom training data? A "chatbot" to provide customer support Speech-to-text software Facial recognition software for a security company

A "chatbot" to provide customer support

L10. Functions

A function provides a defined output given a set of inputs - Hides away details of the set of operations and simply gives you the output you want

L10. Algorithms

A set of rules to be followed in performing some operation or task. Important aspects of an algorithm: - Non-ambiguity: should have clearly defined outcome that is not ambiguous. - Finite: should terminate in a finite amount of time (must have an end).

L11. Types of Databases - Key concepta

A) Flat File Model If we were to store this information in a computer database, how might we arrange it? - You could actually arrange it in tabular format like a spreadsheet. This is also called the "Flat File Model". - As our database becomes more complicated, this type of arrangement becomes inefficient. B) Hierarchical Database Model C) Relational Database Model - Structured Query Language (SQL; sometimes pronounced "sequel") is a programming language for working with relational databases. - You will often see non-relational databases referred to as "NoSQL", and relational databases referred to as "SQL". Database—organized collection of data Information—data organized in a useful manner Flat database—simple database, not related to other data Relational database—database, multiple collections are related Tables— foundation of an Access database Record— all the data relating to one person, place, event, thing, or idea is stored Field— a single piece of information for every record

W5. A compiler translates [ human-readable ] commands into _____________ commands. A) computer-readable B) software-readable C) hardware-readable

A) computer-readable

L13. Artificial Intelligence

AI involves computer systems that aim to perform tasks normally carried out by humans (provides the promise of enabling computers to perform virtually any task with higher speed, accuracy, and using more data than humans can) - Artificial intelligence tools may provide businesses with a competitive advantage

L13. Application in Business

AI is more commonly used as a supporting tool that can help narrow down the number of options for human decision-making. Targeted Marketing --> Targeted advertisements based on previous shopping/browsing history Sales forecasting Understanding customer wants and needs Dynamic pricing Customer Support --> Chatbots for customer support Can help with simple questions before transferring to human

L13. mathematical model?

AI produces a model of how different things are related, which allows it to make predictions.

L12. Alien Software

Alien software(pestware) is malicious software that is installed and run without the user's knowledge. Adware: causes "pop-up" advertisements to appear on your screen. Spamware: Uses your contacts to send Spam emails Spyware: Collects personal information about users' behavior without their knowledge Keystroke loggers- records keyboard input Screen scrapers- records your screen activity Info stealers- steals sensitive information such as passwords, usernames etc.

W7. Which of the following is an application in which artificial intelligence can potentially provide a competitive advantage in the field of marketing and business? (select all that apply) Selecting advertisements based on purchase history Automatically adjusting the cost of a product based on supply and demand Predicting future product demand in order to determine warehouse needs Predicting which products may be most desirable for customers

All

W8. Select the reasons why we avoid using animations in PowerPoint? Animations = lot of time unless good PowerPoint skills Animations = problems with mouse during presentation Animations = PC & mouse far from you during presentation Animations = 'show', not 'facts'

All correct

W6. In which of the following instances would you likely NOT want to use Microsoft Access for database management? The company wants a user-friendly interface for inputting and querying data The database has well-defined and known relationships between different data tables. Answer The database is very large with hundreds of Gigabytes of information The database is used by a large company with dozens of simultaneous users

Answer The database is very large with hundreds of Gigabytes of information The database is used by a large company with dozens of simultaneous users

W5. What are two operations a computer can perform directly on binary data? Sequential Arithmetic Discrimination Transcendental Logical

Arithmetic + Logical

L13. Intelligent Systems

Artificial intelligence (AI) is the science of enabling information technologies to simulate human intelligence An intelligent agent (also called a bot) is a program that works in the background to provide some service when a specific event occurs Ex) Apple's Siri / Microsoft's Cortana

W6. The computer code "g = 4" is an example of which of the following? Assignment Function Loop Binary

Assignment

L12. Software Attacks

Attacks by a PROGRAMMER developing a system Trojan Horse --> Software programs that hide in other computer programs and reveal their designed behavior only when they are activated Back Door --> Typically a password known only to the attacker and allows the attackers to access a computer system at will, without having to go through any security procedures (also called trap door) Logic Bomb --> A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive act at certain time or date Remote Attacks requiring User Action

W5. Which of the following are advantages of using an IDE for computer programming (select all that apply)? A) It gives the clearest view of what is happening "behind the scenes" during code build and development Incorrect, IDE's usually hide a lot of details, particularly when it comes to code configuration and building, which can lead to confusion and a false sense of security for new programmers. B) They provide graphical elements such as buttons and plots C) They highlight commands/functions (syntax highlighting) D) They facilitate debugging at the same time code is being written.

B) They provide graphical elements such as buttons and plots C) They highlight commands/functions (syntax highlighting) D) They facilitate debugging at the same time code is being written.

W5. A(n) _______ is a common term for a coding error that causes a program to fail or produce an incorrect result Cause Ditto Root Blunder Bug

BUG

W7. The protocol for the secure transfer of money via the internet without a third party is referred to as_________________ Blockchain Cryptocurrency Bitcoin Cash App

Blockchain

W7. Which of the following is not a social engineering technique? Careless Internet surfing Sending an email posing as an IT technician requesting a password change. Posing as an exterminator to enter a restricted building All of the choices are social engineering techniques. None of the choices are social engineering techniques.

Careless Internet surfing

W6. _____________________ allows you to change the hourly pay rate of an employee in one table and that change is automatically made to every table in the database that contains data about the employee Normalization Referential Integrity Common field update Cascade update

Cascade update

L9. Source Code

Collection of computer instructions written in a human-readable programming language, usually as plain text.

W7. Which of the following best describes "Artificial Intelligence"? Computer software that attempts to perform human-like tasks Computer algorithms that are able to learn and adapt without explicit instructions A process or set of rules to be followed by a computer in calculations or other problem-solving operations Acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, such as in the forms of decisions. Incorrect, this is the definition of "computer vision", which is a sub-discipline of artificial intelligence focused on processing images or visual information (such as the example we discussed in lecture).

Computer software that attempts to perform human-like tasks

W6. Which of the following would be considered a database, or could utilize a database (select all that apply)? A) Customer transaction records B) An inventory C) Library card catalog D) A cloud server

Customer transaction records --> Correct, this would typically consist of many items corresponding to each customer, which has attributes such as transaction #, items purchased, etc. An inventory --> Correct, an inventory typically consists of many items, each of which have attributes that need to be logged (e.g., item #, vendor, quantity, etc.). Library card catalog --> Correct, this is a classical example of a database.

L11. Difference Between Data and Information

Data --> raw numbers, words, letters, values, etc. - Databases essentially seek to turn data into information.Databases are absolutely essential for most modern businesses. - Most modern businesses have to manage large amounts of data, such as inventories, customer orders, customer accounts, transactions Information --> combination of different pieces of data to convey a certain message, often to support decision-making

W7. If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using? Data Mining Marketing Advertising Database

Data Mining

L12. Remote attacks needing no User Action

Denial-of-service attack --> An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically results in a crashes (ceases to function). Distributed denial-of-service attack --> An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots- which form a botnet-to deliver a coordinated stream of information requests to a target computer, causing it to crash

W7. Backing up computer data to an external hard drive will reduce information security risks (T/F / Depends)

Depends; while the risk of ransomware or information extortion may be reduced, this could increase other security threats such as theft if the drive is not encrypted. Furthermore, since the external disk is connected to the same computer it is backing up, a hacker could steal the data off of the main computer and the backup drive.

L9. GUI vs. Programming-based Environments

GUI (graphical interfaces) --> Pros Cons: Easy to use Less flexible/general Programming-based Environments --> Pros Cons Highly general and flexible More difficult to use Advantages (Statistical Processing of Datasets) - All datasets are different, and can vary substantially in terms of data type, layout, etc. - Some basic universal aspects of processing that data may be suited for a GUI interface, but more advanced processing may require customization (programming interface). - R is a programming language that was originally written for customizable statistical analysis of datasets - RStudio is an application that allows you to write your own code in R, but also provides a GUI for some basic analyses. - We call this combination of a programming and graphical interface an integrated development environment (IDE).

W7. Which of the following are common examples of artificial intelligence software you are likely to encounter on a daily basis? Google image search suggests images similar to the one you clicked on. YouTube suggests videos similar to the one you are watching Amazon suggests other products you might be interested in purchasing based on past purchases Canvas automatically gives feedback on why you missed a quiz question based on data from the whole class

Google image search suggests images similar to the one you clicked on. YouTube suggests videos similar to the one you are watching Amazon suggests other products you might be interested in purchasing based on past purchases

W8. Select the fonts from the list that are best suited for use in a presentation Helvetica Arial Georgia Times New Roman Comic Sans Freestyle Script

Helvetica Arial Georgia

W7. All of the following are characteristics of cloud computing EXCEPT : High cost On-Demand Service Flexibility to scale up Pooling resources

High cost

L9. Humans vs Computers represent information?

Humans --> Representing numbers in a base-10 system Computers --> Digital computers are based on circuits that can either be on or off - base-2 (i.e., binary) system / (0's and 1's)

L10. Representation of Numbers - Variables and Assignments

In order to represent data in our program, we need to allocate some amount of computer memory to store the information ex) R a = 5 a -- variable name = -- assignment operator 5 = value you need to tell it the data type of the variable (i.e., how much memory to allocate) Arrays --> data structures that can hold multiple values R example : star = c(1,2,3,4)

W7. Which of the following are intentional threats to information security (select all that apply)? Information extortion Cyberterrorism Opening questionable e-mails Using weak passwords

Information extortion + Cyberterrorism

L12. Factors Contributing to Information System Vulnerability - what is it

Information security --> the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction. 1. Today's inter-connected/dependent, wirelessly networked business environment (Sharing data across a network also potentially exposes it to unwanted access) 2. Smaller, faster, cheaper computers and storage devices (Increases in data portability makes it easier to physically steal or lose) 3. Decreasing skills necessary to be a computer hacker (Software is developed and shared across the dark web for anyone to use) 4. International organized crime taking over cybercrime (Cybercrime is very lucrative and difficult to prosecute, which has fueled sophisticated organized crime rings) 5. Lack of management support (Information security is often not taken seriously or given adequate resources by upper-level management)

L9. Strategies to help with code debugging

Liberal Code Commenting - Essentially every programming language has a way to leave comments in your code (in R, you start the line with '#' symbol) - When you come back to code days, months, or years later, you often forget what that code does. Comments help you remember and follow the code more easily. Using and IDE - An IDE will usually highlight errors in real-time as you type, and suggest corrections. - They usually have built-in debugging tools to debug during run-time. Unit testing and version control - (Usually automated) tests that can be run to isolate and test small pieces of code. - Version control (e.g., Git) can track changes in code development and allow for stepping back in time

L9. What computations can a computer actually do?

Logic -- Compare values Arithmetic -- Add Essentially all calculations can be boiled down to a series of addition operations

W6. Which of the following are common elements of a computer program (select all that apply)? Logical test IDE R Loop Function

Logical test Loop Function

W6. Which of the following terms could be used to refer to a database that is NOT relational? NoSQL SQL All of these Flat-Table None of these

NoSQL Flat-Table --> a flat-table database does not establish relationships between tables and data.

W6. A standardized programming language used in working with relational databases is called ___________. SQL R Oracle Java

SQL

L11. When use SQL database? NoSQL?

SQL databases are most commonly used when the data is not too large and not too complex. - If we know how data will be related, and it fits within the SQL model, we can choose an SQL database. - SQL databases do not scale well across multiple servers. - If the data is extremely large and needs many servers, SQL may not be an option. No SQL Companies will usually make the choice to go to a NoSQL database when the database is extremely large and complicated. - A limitation with SQL databases is that they do not scale well across multiple servers. - Companies like Facebook, Amazon, Adobe, J.P. Morgan use NoSQL databases for this reason. - The most popular NoSQL databases are Apache Cassandra (which was once Facebook's proprietary database software) and MongoDB.

W8. The six "S" to success include the following items Scope Sequence Story Structure Schedule Simplicity Speed Service Sequel Seminal experience Sophistication

Scope Story Structure Schedule Simplicity Speed

L11. Spreadsheets VS Databases

Spreadsheet - Used to perform calculations and display charts - Non-relational - Has smaller storage capacity compared to database Database --> an organized collection of structured information or data (ex. phone/email contacts.) - Used to store and manage data - Relational - Has larger storage capacity compared to spreadsheets

W6. In which scenario might a company be most likely to chose to use a NoSQL database? It is a small business, and will mostly use the database to manage customers and transactions. Their database will have many repeated/redundant entries and blank data fields Their database will be extremely large and have unknown or complicated relationships between data.

Their database will be extremely large and have unknown or complicated relationships between data.

L12. Information Security Terminology

Threat --> any danger to which a system may be exposed Exposure --> the harm, loss, or damage that can result if the threat compromises that resource Vulnerability --> possibility that a resource might be harmed by the threat

W6. Which of the following is typically needed to support decision-making? Translation of data into information Translation of information into data

Translation of DATA into information

W7. What are four types of threats? Trojan Worm Virus Malware Malintent Virology Annelids Troy

Trojan Worm Virus Malware

L12. Unintentional VS Deliberate Threats to Information Security

Unintentional --> - Carelessness with computer devices - Opening questionable e-mails - Careless internet surfing - Poor password selection and use - Carelessness with office security - Carelessness with unmanaged devices - Carelessness with discarded equipment Deliberate --> - Espionage or trespass - Information extortion - Sabotage or vandalism - Theft of equipment or information - Identity theft - Compromises to intellectual property - Software attacks - Alien software - Supervisory Control and Data Acquisition (SCADA) attack - Cyberterrorism and cyberwarfare

L12. What can be done? fight against cybersecurity threats - threats + solutions

Using Virtual Protected Networks (VPNs) to enhance security (like creating a LAN but between computers located anywhere around the world) - Recall that LANs are easier to secure because they are not directly exposed to the world. Software attack --> Use anti-virus/malware software, VPN, common sense Theft of Equipment --> Encrypting all drives or storage media, password-protected screen lock, multiple back-ups Information Extortion --> Multiple back-ups of data, not paying ransom Espionage or Trespass --> Securing gates/doors, security guards, keycard or biometric required for access, ID system

W7. Which of the following is NOT a characteristic of Big Data? Validity Volume Velocity Variety

Validity

W7. Match the following (Remote Attacks requiring User Action) threats with their definitions: Virus / Worm / Phishing Attack / Spear Phishing A) The Perpetrators find out as much information about an individual as much as possible to improve their chances that to improve their chances that phishing techniques will obtain sensitive, personal info . . . B)Segment of computer code that performs malicious actions by attaching to another computer program. C) Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. D) Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).

Virus Segment of computer code that performs malicious actions by attaching to another computer program. Worm Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). Phishing Attack Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Spear Fishing The Perpetrators find out as much information about an individual as much as possible to improve their chances that to improve their chances that phishing techniques will obtain sensitive, personal info . . .

L12. Social Engineering

attack in which perpetrator uses social skills to trick/manipulate legitimate employees into providing confidential comapny info ex) email sent to employee psoing as higher up ex) attacker entring building using fake ID

W8. Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface... because it is difficult to find a great picture It is expensive to subscribe to a royalty free website It is difficult to edit pictures to fit a slide None of the options All of the options

because it is difficult to find a great picture

W7. An information system's _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks vulnerability; threat; exposure threat; vulnerability; exposure vulnerability; security; threat threat; vulnerability; liability

vulnerability; threat; exposure


संबंधित स्टडी सेट्स

PATHO CH 13 Structure and Function of the Neurologic System

View Set

Driver's Ed: Undesirable Traits for Drivers

View Set

Integumentary System and Adipose Tissue

View Set

Social Studies - Week 7 Pyramids

View Set