FinTech Final
(FIX) 50% of truck drivers are expected to lose their jobs to AI and driverless vehicles by 2020.
False
(FIX) A solution to the great cultural problems of the networked age will also originate from adults.
False
(FIX) In 1865 Gordon Moore invented his eponymous law in an article called Cramming More Components onto Integrated Circuits
False
(FIX) In an ideal society, More believes leisure matters but work matters more
False
(FIX) In an ideal society, More believes leisure matters but work matters more.
False
(Fix the Future)Keen believes we are in a techno apocalypse?
False
(Fix the Future)Keen writes that computers have goals and know how to fix the future.
False
(Fix the Future)There is a Moore s Law for human progress?
False
A KPI is a written, negotiated, and executed agreement between service provider and customer.
False
A Lean core capability is to actively suppress issues about continuous operations as a distraction.
False
A time series data structure is difficult to see and yet easy to save.
False
An example of an indirect risk to market defined by SCI would be a security hack of a core financial market infrastructure.
False
As far as emerging technologies go, AI should be viewed in isolation forgetting the other technologies like blockchain, quantum computing and the cloud.
False
Blue Tooth is exclusively used for audio conversation transmittal and receipt.
False
C# is a computer language derived from Cobol.
False
Cloud computing and mobile devices have had little impact on financial services.
False
ETL stands for a data technique Enterprise Table Logic.
False
Etherium is the only blockchain fabric which support the concept of smart contracts
False
Ethical questions should be ignored and left to the compliance department since it is their job.
False
Fix - In 2016, tech firms gave out less stock-based compensation than Wall Street paid out in bonuses.
False
Fix - Realists believe that the digital revolution will solve all of society's problems.
False
GDPR adoption reduces cost of cyber-security.
False
GPS supports POS transactions like buying a cup of coffee with your phone.
False
General AI exist today.
False
Hadoop is an object oriented Excel add-in for the delivery of standard financial services calculations and valuations.
False
Hardware and building infrastructures are the primary focus of SaaS.
False
Hyper-ledger has its own coin like Ethereum.
False
ITIL methodology advantage if found by defining service as delivering value to customer detached from outcomes the customer wants to achieve.
False
If we change the block data in front, we don t have to update the block after it.
False
Interpreted computer programming languages typically execute much faster than compiled computer programming languages.
False
It is the decision of each individual bank to determine when and how to recover from infrastructure interruptions to the markets.
False
Knight Capital is a great example of how Algo trading can earn large profit with almost no risk.
False
Laws confining FinTech disruptions are inherently unfair.
False
Moore s Law states that the processing speed of CPU doubles every 30 month
False
Once a business decision to change the technology is made the business can ignore the process until the new system is ready.
False
Professor Riley places low odds that during a student's career in financial services they will ever be presented an ethical dilemma.
False
Programs have no human comments stored in them because these statements would only confuse the computer.
False
Relational Data Bases allow for parent/child relationships with a variable number of children per parent record.
False
Research finds penalties for misbehaving female advisors are justified as women are three times as likely to engage in misconduct as male advisors.
False
Sales data show that apple is clearly America's favorite pie.
False
Technology being so critical today to the financial industry business processes means technology change always has priority.
False
The concept of APIs did not even exist until the recent advent of mobile smart device applications.
False
The current Dodd/Frank Act requires the SEC to get a subpoena when inspecting a bank's computer source code.
False
The insurance industry is experimenting with greenfield strategies to invest in their legacy systems.
False
The purpose of the Volker Rule is to ensure banks may continue to participate in high risk but only with their own capital.
False
There are more lines of code dedicated to processing the happy path in a typical production program than lines of code to complete the error processing.
False
There is a way to derive a private key from a public key.
False
Three tier, or fat app and gui, application architectures are the most efficient and least expensive by matching each tier function with the least cost solution.
False
Value At Risk (VAR) is a simple light weight algo used by retail insurance.
False
Venmo allows payments related to gambling or drugs in its user agreement,
False
Wealth management is a shrinking industry.
False
Wearable devices have little use as wellness care data collectors.
False
When discussing the ABCD's of technical disruption, the D stands for disruption.
False
Zero-Day bugs are insignificant errors that are so small that most PC vendors can repair them in zero days.
False
"British day trader, Navinder Singh Sarao, made tens of millions of dollars using an illegal practice called spoofing."
True
"Ethical behavior involves demonstrating respect for dignity, diversity and individual rights."
True
A primary key will serve to uniquely define a row of data in the table.
True
As much as 3% of the electricity created in the U.S. each year powers data centers.
True
Challenger banks are driving a tech-first approach in an attempt to move away from the traditional perceptions of the banking sector.
True
Changing yourself and your personal beliefs requires quieting the ego.
True
Entanglement property, when two particles become inextricable interlinked, is what Einstein termed spooky action at a distance.
True
Enterprises can use APIs in myriad ways, and not just for client facing applications.
True
Historically, early Manufacturing Automation was defined as 'real time' equipment controlled to repeatedly produce a product.
True
ITIL identifies best practices for IT service management.
True
In the early days of computing, machine programming languages were vendor specified.
True
Norbert Wiener addressed the alternative to mathematical innocence, taking responsibility, after he enhanced the effectiveness of WWII anti-aircraft fire using statistical theory of communication.
True
One of the three main types of ciphers is ID-based encryption
True
Public exchange floors were traditionally co-located with their data centers.
True
The C computer language is a traditional 3rd generation computer language.
True
The digital wallet technology revolution facilitates the parallel emergence of virtual purchasing power.
True
The dominance of Process concepts over Data concepts began during the early decades of computer science.
True
The high frequency & low latency trader makes money on the speed advantaged price discovery .
True
Time, in place of process and data, has become the top computer science focus during our current decade.
True
Today's financial services consumer APIs are mainly focused on managing bank accounts and financial transactions.
True
Turing invented and built a calculating machine that helped crack the German WWII encryption messages from Enigma.
True
With blockchain technology it is not possible to spend or transfer money that you don t possess.
True
With cloud computing pricing models it costs no more to use 1,000 servers for an hour than one server for 1,000 hours.
True
Your car insurance policy rate can now be set by your car's performance data.
True
(FIX) Regulations will hurt startups in their bid to disrupt the incombant monopolistic multi-billion dollar companies in the industry.
false
One of the three main types of ciphers is ID-based encryption.
true
(FIX) DMCA stands for Decentralized Markets Controlled Action.
False
(FIX) Edward Snowden taught us how little USA government knows about the citizens.
False
(FIX) Five hundred years after the publication of Utopia, More's Renaissance humanism in now used to fight universal basic income where government will give all its citizens a living wage whether or not they have a job.
False
(FIX) Gary Reback insists, it s not only possible but simple to bring a federal antitrust investigation against the Mountain View giant.
False
(FIX) In the UK, 25% of 18-24 year olds voted to stay in the EU.
False
(FIX) Labor strikes have been one of the most ineffective ways for employees to force reform of their working conditions and pay.
False
(FIX) Margarethe is trying to take away trust from the economy by fighting against Uber for the drivers.
False
(FIX) Regulations will hurt startups in their bid to disrupt the incombant monopolistic multi-billion dollar companies in the industry
False
(FIX) Strikes within disruptive tech industries or artist strikes are just as common as historical labor strikes.
False
(FIX) The Economist Magazine believes that we should embrace the binary option of either a full-time employment model or an independent model
False
(FIX) The Economist Magazine believes that we should embrace the binary option of either a full-time employment model or an independent model.
False
(FIX) The United States government is prepared for the technological disruption that is currently taking place.
False
(FIX) The vision, to borrow a term from the World Wide Web inventor Tim Berners-Lee, is the re-centralization of economic power; where power lies at the center rather than the edge leaf node.
False
(Fix the Future)Currently, the internet can fix the world.
False
(Fix the Future)Gordon Moore is a cofounder of IBM?
False
ADA is the name of a modern computer language because it stands for Analytical Data Algorithms.
False
APIs, by their very nature, provide only one attack point through the underlying operating system.
False
Abdication of technology decisions to trained technologists is a business best practice in financial services.
False
All InsurTech disruption companies are small startup companies today.
False
All global financial industry regulatory rules are aimed at the seller of the asset, never the buyer
False
Always best to get all the change effort completed at once and schedule technology changes to be completed simultaneously with business process changes.
False
An ERD primary key is an optional attribute
False
Both Private and Public key are visible to everyone.
False
Collaboration is an example of unnatural human behavior.
False
Cryptocurrencies have rarely lost assets due to their use of modern encryption methods.
False
ERP stands for Extended Reference Processing.
False
Global flows of trade and finance are growing exponentially
False
Global flows of trade and finance are growing exponentially.
False
In reality 99% of our office work time is spent executing revenue business transactions.
False
Individual Investors may buy & sell securities directly in the listed market exchanges.
False
Leaf node devices tend to be based on the latest high-end performance and functionality for personal computing, like local data bases and statistical analysis.
False
Machines think like humans
False
Managing corporate data in today's hybrid cloud environments has become secure and inexpensive.
False
Moving data between private and public clouds is made simple in the hybrid cloud solution.
False
NFC is used in all modern cell phones to assist in defining your map location information.
False
Objects are the combination of Data + Process + Network.
False
Once again the United States tops the MGI rankings for global trade.
False
Oxford University research indicates a high probability that technology will replace less that 10% of U.S. jobs by 2033.
False
Psychology informs us that good people can always be counted on over the long haul.
False
Python is as hard to learn as Basic Assembler Language.
False
REG NMS, the major National Market System regulation, was repealed by President Clinton in 2005 leading to the financial crisis.
False
REG SCI established the basis of Glass Stiegel Act in 1944 defining the stock exchange functional requirements.
False
REG SCI requires an ATS to maintain and enforce written policies and procedures designed to ensure its SCI systems operate as intended.
False
Securities Trading Organizations are encouraged by Reg NMS but are not required to have an active BCP.
False
Special Needs Interfaces refers to extremely wealthy high net worth clients.
False
Steve Jobs thinks that learning to program a computer is a huge waste of time to learn.
False
Technology always increases transparency of business activity and responsible actors in the process.
False
The CEO reports to the COO.
False
The Consumer Financial Protection Board has no enforcement capacity
False
The EU equivalent of the U.S. CFPB is the FFIEC council
False
The FBI refers all financial services fraud cases to the NSA for prosecution in the U.S.
False
The FINRA KYC Rule 2090 is a clear detailed guide of specific requirements to meet standards.
False
The FINRA Rule 2020 is a clear detailed guide of specific requirements for the use of technology.
False
The Madoff IT staff had no idea the company was engaged in fraud
False
The Madoff IT staff had no idea the company was engaged in fraud.
False
The OFR is a wholly-owned subsidiary of the member-owned organization SIFMA.
False
The Office of the Controller of the Currency is deferring to the SEC for all FinTech companies regulation responsibilities.
False
The best reason to change your business technology is to decrease revenue and increase costs.
False
The four Lovelace principals of computing were documented by Ada Byron in 1983.
False
Today's well known products, Windows or Facebook or SAP, all tightly coded with less than 1 million lines of code.
False
When faced with a new complex data problem to solve it is best to start with identifying the underlying algo.
False
While APIs share function and data, actual source code sharing is far more efficient and less costly.
False
Whistleblowers reporting to FINRA enjoy full protection under the Dodd-Frank Act from corporate retribution.
False
The Consumer Financial Protection Board has no enforcement capacity.
Fasle
"Ethical behavior involves demonstrating respect for honesty, fairness, and equality."
True
"The CEO of Barclays, Bob Diamond, was implicated in the LIBOR manipulation scandal. "
True
(FIX) Adam Smith s invisible hand remains the best guarantor of innovation
True
(FIX) Apple was paying .005% tax on its revenue from its Irish based European subsidiary to the Irish government.
True
(FIX) DeepMind with Microsoft, Facebook, IBM, and Amazon formed Partnership on Artificial Intelligence to Benefit People and Society to make the world a better place.
True
(FIX) Eighteenth-century Prussian philosopher Immanuel Kant reminds us that with agency comes responsibility.
True
(FIX) In March 2017, a number of blue-chip firms including the UK offices of McDonald s, L Oreal, Volkswagen, Audi, Vodafone, Sky, HSBC, Lloyds, and Royal Bank of Scotland all suspended their advertising on Google and YouTube because their ads were too expensive.
True
(FIX) Keen believes that we must fuse technology and humanity for a brighter looking future
True
(FIX) The Economist Magazine argues: antitrust authorities need to move from the industrial era into the 21st century in order to reboot antitrust for the information age.
True
(FIX) The main goal of the self-policing initiative known as the Partnership on Artificial Intelligence to Benefit People and Society is to make the world a better place.
True
(FIX) Trust in government institutions and its politicians is highly important for a society evolving to a post privacy world.
True
(Fix the Future) Increased innovation, transparency, creativity and healthy disruption are all methods of getting us out of today's technology related issues.
True
(Fix the Future)Apple s 1984 Superbowl commercial launched the personal computer age?
True
(Fix the Future)Jaan Tallinn Inventor of Skype and Kazaa. Joins with Bill Gates, Elon Musk, Stephen Hawking in his concern that AI represents an existential risk. He states that it may be the biggest event in human history.
True
(Fix the Future)One paradox Keen mentions is that we are living in the most dystopian and utopian times simultaneously.
True
(Fix the Future)Singapore is today one of the most wired countries in the world with mobile phone penetration of 152%.
True
(Fix the Future)The 5 tools for fixing the future are: Regulation, competitive innovation, social responsibility, worker and consumer choice, and education.
True
(Fix the Future)The Edelman Trust Barometer measure s a population s trust in its own institutions.
True
(Fix the Future)The Edelman trust barometer is the gold standard for measuring trust around the world?
True
(Fix the Future)The identity card system puts digital identity and trust at the heart of a new social contract.
True
30% of all business failures are caused by employee theft
True
A 3 Qubit quantum computer would find an answer from a set of 8 options, and a 4 qubit from a set of 16, or 2 to the n power where n is the number of qubits.
True
A Data Lake (Hadoop Farm) is a shared centralized repository of raw copies of both internal and external data with minimal data structures.
True
A SHA 256 hash is nothing more than a fingerprint for some digital data.
True
A binary digit can be one of two states.
True
A data lake is a large object-based storage repository that holds data in its native format until it is needed.
True
A human brain decision requires a minimum of 650 milliseconds while a NASDAQ order takes 100 microseconds.
True
A hybrid cloud solution is nothing more than using the same virtualized server architecture internally and combing a private cloud with a public cloud.
True
A key get-right of a successful consumer API strategy requires minimal integration with existing systems.
True
A major benefit of using APIs is to decouple consuming applications from infrastructure service providers allowing transparent change and flexibility.
True
A major data management utility class is Extract, Translate, and Load (ETL).
True
A methodology can help identify business needs.
True
A modern smart phone utilizes at least 4 different networks depending on the function.
True
A new report by S&P Global Market Intelligence projects that digital lenders across the personal, small and medium enterprise, and student-focused segments will originate $62.84 billion in new loans in 2021; a compound growth rate of 16%.
True
A recent Radware study reported more than 25% of organizations experienced attacks on a daily basis, with the majority experiencing attacks weekly
True
A recent Radware study reported more than 25% of organizations experienced attacks on a daily basis, with the majority experiencing attacks weekly.
True
A significant project management issue is the unwillingness of a business unit to remain committed to project participation over a multi-year implementation.
True
A valid, or signed block, will have a hash that begins with x number of leading zeroes.
True
A voting use case would likely be best implemented on Etherium as it has a public network model.
True
AEI stands for artifical emotional intelligence
True
AI is a trial and error learner with an infinite capacity to acquire skills.
True
APIs are maps for hackers to exploit when attacking systems.
True
Access to data analysis only available in a corporate data processing center became more flexible and accessible as computer science matured into a business tool.
True
According to the video, a blockchain is simply multiple blocks linked together with the new block pointing to the hash of the prior block.
True
Acord Conference 2015 takeaway: Forcing yourself to speculate what types of problems people will be concerned about before they happen is the best path to (InsurTech) innovation.
True
Ada Byron invented algorithmic processing, including subroutines, in 1843.
True
Ada Byron stated general purpose calculating machines have no capacity for originality in 1843.
True
Admiral Grace Hopper, while leading a U.S. Navy team, is credited with inventing COBOL.
True
Alan Turing is considered the father of computer science and AI
True
Algorithmic trading is now conducted at speeds the human brain can not recognize in real time.
True
An API can be thought of as the grammar that exposes functions and data between programs.
True
An ATS is regulated as broker-dealers, not as a traditional exchange.
True
An ETL is used to move data from an ODS to a DW.
True
Another name for a program or a collection of programs is an application.
True
Apple s new peer-to-peer payment service has a chance to upset existing leaders in the space, including PayPal, Square Cash, and the aforementioned poster child of peer-to-peer payments, Venmo.
True
Application complexity is created by multiple applications for the same task, multiple revisions of the same single application, and multiple users from differing time zone and language locations.
True
Applications declare at least two entry points when defining an API, one for the initialization and one for the event entry.
True
Archimedes point is the view from nowhere is the ideal observation point.
True
As API management becomes more popular, organizations are looking to deliver more sophisticated and complex enterprise-class APIs that transmit sensitive information or execute business transactions.
True
BASIC, Python, and Perl are all interpreted languages.
True
BIS identified one of the most significant lessons learned from the global financial crisis that began in 2007 was that banks information technology (IT) and data architectures were inadequate to support the broad management of financial risks.
True
Block chain is used to prevent modification of transactions.
True
Blockchain consists of Blocks, Nonce, Data, Previous link and a Hash .
True
Bond ETFs provide the trading benefits of equities and the diversified exposure of a bond portfolio.
True
Both a teller and an ATM can process pre-defined simple account operations well.
True
Britain is investing more into financial technology companies that are direct challengers to traditional lenders, as opposed to FinTech collaborators.
True
Business motivated technology change can be driven by competitive pressure.
True
Business motivated technology change can be driven by internal innovation.
True
Business motivated technology change can be driven by regulatory requirements.
True
C and C++ and COBOL are all examples of High Level Languages and are compiled.
True
COBOL was the first major general purpose computer language for multiple computer vendors.
True
CPU, processing speed and algorithms are all important but data is the single most important resource for enabling a car to drive.
True
CRM stands for Customer Relationship Management.
True
Chinese banks are collaborating with technical partners like Baidu cloud services and Intel to meet performance and security requirements.
True
Clearing agencies are included in the definition of SCI entities.
True
Clock cycles were reduced in size with the move from mechanical to analog devices.
True
Comparing Q3 2017 to Q3 2016, there was a 200% increase in web application attacks sourcing from the U.S.
True
Compiled computer programming languages are pre-translated into executable code before they are executed.
True
Correctness of data extracted from a data lake is the responsibility of the business, not IT.
True
Correlation is not causation. Correlation indicates that two variables move in relation to one another. Causation indicates that the second variable is dependent upon the first.
True
Cryptojacking has now displaced ransomware as the top malware threat.
True
Cybernetics is the study of communication and control.
True
Cybersecurity is as much a human behavior challenge as it is a technology challenge
True
Cybersecurity is as much a human behavior challenge as it is a technology challenge.
True
DLT stands for Distributed Ledger Technology.
True
DMZ is a network security technique often used for protecting a corporate private network that is also attached to the internet.
True
Data Mart are decentralized repositories of customized extractions for a local use.
True
Data for insurance research now includes social media sourced data.
True
Data processing is the repeatable sequences of arithmetic operation on a supplied data set.
True
Determining a real human user vs bots is a challenge of modern application security.
True
Digital bandwidth measures the amount of information that can flow from one place to another in a given amount of time.
True
During the past 20 years JPM and Wells Fargo had several instances when the business and the technology had to change on the same day.
True
Each ERD entity has a primary key.
True
Encoding is a method of converting a stream of data bits into a predefined code.
True
Excel is not scalable as a corporate database solution.
True
FIX) The main goal of the self-policing initiative known as the Partnership on Artificial Intelligence to Benefit People and Society is to make the world a better place.
True
Faster delivery of market data has historically been an early funding source of new communication technologies.
True
Fed Reserve Board of Governors Lael Brainard recent speech included AI within the scope of the existing Guidance on Model Risk Management.
True
FinCen is a network of domestic and international law enforcement and financial communities.
True
Finance is said to be the combination of Time and Risk.
True
Financial Intermediaries participate in a market on-behalf of an investor.
True
Fix -In 2016, the World Economic Forum on Digital Transformation focused on the combinatorial effects of the new internet based technologies.
True
GDPR changes the answer to the question personal data ownership, giving ownership to the individual data subject and not the harvesting organization
True
GDPR changes the answer to the question personal data ownership, giving ownership to the individual data subject and not the harvesting organization.
True
Generally only limited data on ATSs is publicly available.
True
Global data center energy consumption is larger than all of the energy consumed by the U.K.
True
Global flows of data has grown 45X from 2005 - 2014.
True
Google corporations information stores are Big Data examples of Exabyte data sets.
True
Google recently announced a series of new clean energy purchases that bring its total wind and solar capacity to more than 3 gigawatts, enough to cover 100% of the energy it required to run its products in 2017.
True
Grace Hopper was an Admiral in the U.S. Navy.
True
HFT claim they providing liquidity to the market.
True
HFT if focused on low latency transactions.
True
Hash is a fingerprint of digital data that the user enters.
True
HealthTech is connecting health care with health insurance.
True
Hierarchical Data Bases allow for parent/child relationships with a variable number of children per parent record.
True
Identity Based Cryptography mechanisms require a centralized server
True
Identity Based Cryptography mechanisms require a centralized server.
True
Identity Based Cryptography mechanisms requires a secure channel between sender or recipient and the IBE server for transmitting the private keys.
True
If business and technology change is achieved then throw a party.
True
If machine learning algorithms are the new combustion engine then data is the new oil.
True
In Financial Services Lean thinking employee performance should be directly linked to customer value.
True
In the event of a dispute a distributed peer to peer set of nodes will work in a democratic fashion to determine the truth.
True
In the past customer retention has been built upon high cost of entry and big barriers to switching firms, in the near future engaging clients will be driven by continuously improving product performance.
True
In the past market power of financial institutions came from scale of assets, in the near term the competitive edge will come from the scale of data and the ability to draw insights from that data.
True
Individuals are participating in globalization directly, using digital platforms to learn, find work, showcase their talent, and build personal networks.
True
Interpreted computer programming languages are translated into executable code during the time the program is executed.
True
Interpreters have the lowest cost-of-ownership.
True
It is only a matter of time before the global capital markets infrastructure is compromised, hacked, resulting in a major chaotic event.
True
LIBOR is being eliminated as an industry benchmark.
True
Lean is intuitive and accessible to just about anyone throughout an organization.
True
MIKE 2.0 is a delivery methodology for Enterprise Information Management projects.
True
Machines are now being used to predict the liklihood of a future cardiac event
True
Manual paper lists were naturally kept in arrival order in time, and sequentially organized.
True
Manufacturing automation required the abstraction of events to enable interrupting a processing sequence.
True
Migration from rotating to solid state technology is a reference to disk storage.
True
Mike 2.0 is an Open Source delivery methodology for Enterprise Information Management projects.
True
Monet's real Lilly Pond, not the painting, is located in France.
True
Moore s Law states that the power of a CPU doubles every 18 months
True
Multiple parties can access a block chain at once
True
Natural language processing will aid in contract interpretation.
True
Non-U.S. citizens who break U.S. trading laws and violate regulations accessing U.S. markets from overseas are subject to arrest and extradition (depending on the country).
True
Once general AI is reached, the AI algorithm will engage in recursive self improvement resulting in an exponential growth in intelligence.
True
Once the iPhone came about and mobile commerce began to take hold, Apple extended this model to iTunes, and Google followed with Google Play, both providing a software solution for repeat online purchase via the mobile device.
True
One best-practice is to evaluate the decay rate of an application and forecast the date for retirement based on the minimum required business functionality.
True
One of the barriers for researching ethics of technology in the domain of finance is that financial technologies usually remain invisible and poorly defined
True
One of the barriers for researching ethics of technology in the domain of finance is that financial technologies usually remain invisible and poorly defined.
True
One of the major sources of production enterprise operational data is a CRM.
True
One of the three main types of ciphers is asymmetric encryption.
True
One of the three main types of ciphers is symmetric encryption.
True
One of top three sources of project cost over run is a lack of training requiring external experts to aid in production support.
True
One of top three sources of project cost over run is the cost of running both the new and the old systems.
True
Over a decade, global flows have raised world GDP by at least 10 percent; this value totaled $7.8 trillion in 2014 alone.
True
Physical restrictions on hardware were masked by the creation of physical to virtual substitutions as in physical memory replaced by virtual memory.
True
Placement of your servers directly changes the order of the market data you will be seeing.
True
Portfolio Optimization is often cited as a possible quantum computing problem space.
True
Post-Only orders, found on several markets in Canada, are designed to not cross the spread.
True
Programming is translating complicated processes into simple uncomplicated steps.
True
Provisioning is the process of taking an acquisition from a purchased state to an operational state.
True
Public key is for everyone to know and there is no harm in letting anyone know.
True
Qubits usually have a spin-up or spin-down state as well as a quantum super position.
True
REG SCI relies on industry standards to define compliance metrics.
True
REG SCI requires the collection, safe-keeping, and commission accessibility of records on all matters related to REG SCI.
True
ROI analysis is often sensitive to short term P&L impacts.
True
Relating tables to each other resulted in the invention of RDBMS where the fields from one table were the index into another table, defining a relation.
True
Robotic Process Automation (RPA) has reduced audit and contractual processing times from several months to a few weeks.
True
SME is an acronym for small to medium enterprises.
True
Securitization involves the process where banks find borrowers, originate loans but then sell the loans, repackaged as securities, on to investors.
True
Solvency II Directive concerns the amount of capital that insurance companies must hold to reduce the risk of insolvency.
True
Solvency II Directive is a Directive in European Union law that codifies and harmonizes the EU insurance regulations.
True
Solvency II regulations are aimed at the insurance industry.
True
Standard IEEE 802.11 is commonly referred to as Wi-Fi.
True
TPM, Technology Process Modeling is built on the manufacturing time & motion analysis methods.
True
Tesla currently is the leader in accumulating real life driving miles, besting Google, nVidia and Uber.
True
The 3 v's stand for velocity, volume and variety
True
The 5 major application silos can be mapped to the 5 categories of work: corporate, reporting, projects, analysis, and transactions.
True
The CBOT trading pits are closed or closing.
True
The CFP Board published a Code of Ethics and Standards that defines fiduciary duty.
True
The CFP Code of Ethics requires the duty of loyalty: Place the interests of the Client above the interests of the CFP professional and CFP Professional's Firm
True
The CFP Code of Ethics requires the duty of loyalty: Place the interests of the Client above the interests of the CFP professional and CFP Professional's Firm.
True
The CFPB is the primary securities enforcement body in China.
True
The CFPB, FTC, DOJ may each bring cases against Fintech companies for noncompliance
True
The CME exchanges is where the world comes to manage risk.
True
The Financial Stability Board was established by the G20 and has a global enforcement responsibility.
True
The Human Use of Human Beings was first published in 1950.
True
The OFR defines a stable financial system when price discovery is provided even during stress events.
True
The OFR defines a stable financial system when risk transfer is provided even during stress events.
True
The OFR promotes financial stability by delivering high-quality financial data, standards, and analysis for the Financial Stability Oversight Council and the public.
True
The OFR states their main job is to shine a light in the dark corners of the financial system.
True
The SEC rewards whistle blowers with millions of dollars for successful prosecution of fraud.
True
The SIP is often used for client order pricing but rarely for proprietary principal trades.
True
The U.S. Department of the Treasury has a dual mandate to maintain a strong economy and create job opportunities.
True
The US is the current leader of AI development
True
The WEF's report The new physics of financial services cuts through sensationalism to talk about industry structure and impact on business models and regulation.
True
The Windows API categories includes one category dedicated just to security.
True
The book Filter Shift claims that in 9 hours of training an individual can identify their own biases as well as the biases in others.
True
The evolutionary process of physical to virtual resulted in lower costs for identical functionality emulating the original service in a software construction.
True
The human labor required for the complex listed security trade assembly, like the complex process of car assembly before it, is being automated.
True
The initial BPM design question begins with is this process fit for purpose.
True
The insurance industry disrupting tech companies have the advantage with a culture of innovation compared to the traditional insurance company.
True
The insurance industry disrupting tech companies have the advantage with superior digital communication capabilities compared to the traditional insurance company.
True
The management view of the company supports compensation decisions.
True
The need for importing foreign data into the data environment began at the Data Mart level, migrated to the Data Warehouse with the resulting complexity delaying any change to the environment.
True
The new insurance products will be priced based on your behavior as collected.
True
The preferred wealth management trust relationship will remain between two humans, states Schild and Riley.
True
The priority of Process or Data or Time is defined by the perception of the viewer.
True
The process of mining is nothing more than finding and adding a nonce to the block such that the resulting hash begins with x leading zeroes.
True
The purpose of every tool should be to help us to do something we want to do more effectively.
True
The reality is that the Financial Services Industry is very much a service business.
True
The required use of a clearing organization is being regulated across an increasing number of asset classes.
True
The security information network is separate and independent of the production information network.
True
The shift to a more digital form of globalization changes who is participating, how business is done across borders, and where the economic benefits are flowing.
True
The singularity is the point at which AI is capable of recursively improving itself to the point of super intelligence.
True
The technology infrastructure functional requirements for the capital markets are defined by the compliance and integrity regulations of the financial industry.
True
The term INFORMATION can be defined as a numerical quantity that measures the uncertainty in the outcome of an experiment to be performed.
True
The thought experiment of a Turing Machine is to prove computability of a problem.
True
The trading speed wars are now being replaced by the A.I. trade wars.
True
The transactional history on a blockchain is immutable not because the data cannot be changed, but because any change will be immediately visible across the fabric.
True
The typical quantum computer has a slower execution speed than a general purpose computer for each execution step.
True
The typical quantum computer is much faster than a general purpose computer at calculating a result because it needs less steps.
True
There are three types of ERD cardinality: 1:1, 1:M, M:M.
True
There can be public and private block chains.
True
Three in every four applications have at least one vulnerability
True
Throughput is the measure of the transfer of bits across the media over a given period of time.
True
Two prominent blockchain platforms are Etherium and Hyperledger.
True
VIX Weeklys futures began trading at Cboe Futures Exchange
True
When a serverless application has completed its task, it goes dormant, waiting for another event trigger before executing again.
True
When discussing serverless computing, two key concepts are important to understand; functions and events.
True
When faced with a new complex data problem to solve it is best to start with identifying what is known
True
When faced with a new complex data problem to solve it is best to start with identifying what is known.
True
While both accounting and operations view the same assets, the categories and groupings are often significantly different.
True
Apple's iOS provides APIs while Microsoft Windows provides none.
false
BAL and XML were both introduced as proprietary computer languages by IBM in the early 1960s.
false
State transition diagrams are used to encode the organizational structure of state government officials.
false
Waiting for the business vision to prioritize technology change options is a step that should be skipped.
false