MIS FINAL: Emerging Technologies , Methods of Securing Information , Data Analytics, Databases

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Computer viruses are not frequently disguised as attachments of funny images, greeting cards, or audio and video files.

False

In a database, data is organized in complex and meaningful collections specified by the database administrator. These collections are referred to as ___ .

Fields

Characteristics of databases include which 3 of the following?

Fields Characters Records

Data transformation is the process of converting the __ of data.

Format

Amazon is offering a new way to shop for groceries using IoT and machine vision called Amazon _____.

GO

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

Trojan

There are multiple ways ransomware attacks can be launched. Which of the following are methods a ransomware attack can be launched?

Trojan Horse Phishing

Which of the following are identified in the reading as current users of differential privacy?

U.S. Census Bureau Apple Facebook

A leading manufacturer of fitness trackers partners with a large health insurance network. Insurance network members receive a discounted fitness tracker and financial rewards for setting and achieving tracked personal fitness goals. Which characteristic of the resulting Big Data would be most directly affected by a tracker software error that counted users' arm movements as steps?

Veracity

Where could you click to switch to the Design view?

View

When working in Tableau, users can assume which 3 roles?

Viewers Creators Explorers

The _____ Hyperloop, created by Richard Branson, recently completed the world's first hyperloop ride with passengers on board.

Virgin

Malware is short for malicious software and is designed to steal information, destroy data, impact the operations of a computer or network, or frustrate the user. Common types of malware include:

Viruses Trojans Worms

The graphical and structured representation of data is known as data___.

Visualization

There are three main tools data analysts and other members of an organization use to analyze data. They are spreadsheets, databases and query languages, and data ___tools.

Visualization

There are three main tools data analysts and other members of an organization use to analyze data. They are spreadsheets, databases, and query languages, and data ____tools.

Visualization

A differentiated scientific approach that utilizes observational data, analysis of range models, peer-reviewed research, and in-person reports to assess and possibly predict climate events has been developed by World ____ Attribution.

Weather

Database management system (DBMS) make it easier to secure data and information because they ______.

allow for the creation of access constraints

Working on data analytics teams to extract data from large data sets, creating reports that outline key findings, monitoring key performance indicators (KPIs) to identify success or failure, and analyzing data to identify trends are just a few of the responsibilities of a data ____ .

analyst

Improving decision making, customer service, production and operations processes are just a few of the trends in data _.

analytics

The process of investigating raw data of various types to uncover trends and correlations, and to answer specifically crafted questions is the role of data _.

analytics

The four steps in a data quality audit are ______.

assessment, design, transformation, and monitoring

Security risk can be calculated using the following calculation: Risk = Threat x Vulnerability x ___ .

asset

Organizations often use data scrubbing software because it ______.

automatically analyzes data, then fixes any errors, and consistently formats the data according to an organization's guidelines

Referential integrity states that structural relationships in relational databases must ______.

be consistent: a foreign key field that references a primary key field must agree with that primary key

One method organizations are using to deal with the increase in cybersecurity threats and the decrease in the effectiveness of traditional security means is through the use of ___ science in their data and network security policies.

behavioral

A _ hat hacker breaks into computer systems with the intent of causing damage or stealing data.

black

Allowing people to share a digital ledger across a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

Serving as the technology behind cryptocurrencies such as Bitcoin, _______provides a level playing field for all users.

blockchain

A group of computers under the control of a hacker is referred to as a ___ .

botnet

Hepregen, a company originating at MIT, received a large donation to develop a device that mimics a liver. This technology is called an organ on a ___.

chip

Working with others by using Internet-accessible services such as Software As a Service (SAAS) and shared data storage sites is called ___ collaboration.

cloud

Which type of database maintains the hardware and operating system offsite and is accessed via Internet-based applications?

cloud database

Facebook's Building 8 is an innovation-driven business unit that is working on a Brain- ____ Interface.

computer

Measurable and counted data that can have almost any numeric value is called ____ data.

continuous

Bitcoin, Etherium, and LiteCoin all use blockchain algorithms to control quantity and verify the validity of transactions. They are referred to as ___.

cryptocurrency

A deliberate misuse of computers and networks via the Internet that uses malicious code to modify the normal operations of a computer or network is called a _______ .

cyberattack

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called ______.

cybercrime

Cyberattacks that originate and are executed by foreign governments is called state-sponsored ___ . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

cyberwarfare

Cyberattacks that originate and are executed by foreign governments is called state-sponsored_______ . These attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack.

cyberwarfare

A major challenge facing software designers and database managers involved with ERP is that, with the Internet of Things, the amount of ___ becomes unmanageable.

data

Because of the significant information it can reveal about the electorate, ___ mining has become increasingly important to campaign managers.

data

The information technology (IT) architecture and infrastructure, software applications, programming languages, and storage technologies used for the collection, storage, analysis, and interpretation of meaningful data is referred to as the ______ecosystem.

data

Establishing how an organization manages its data and making sure the organization adheres to these methods is a function called ______.

data administration

Data integrity is increased when ______.

data are centralized

Because so much information regarding voters' political attitudes is available online, campaign managers increasingly rely on:

data mining

Organizing data so that data are in simple tables without any redundancies is known as __________.

data normalization

A SQL statement is used to ask a question or communicate a request of the ____ _ management system.

database

SQL is quite useful when working with large data sets and is widely used in today's business environment. It allows the user to query the data contained in a___.

database

DDDM refers to Data Driven ____Making.

decision

Using ___ Twin technology, smart components that use sensors gather data about real-time status, working conditions, or positions and are integrated with a physical item. The components are connected to a Cloud-based system that receives and processes all the data monitored by the sensors.

digital

A ___ denial-of-service (DDoS) attack takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

distributed

The practice of data scrubbing is a vital part of data quality management because it ______.

ensures ongoing data validity by identifying and then fixing data errors

Executives rely on:

enterprise resource planning software

Entry-level data analysts frequently start with no prior ______ , but go through extensive on-the-job training that teaches them how to apply information learned in college as well as training on organizational policies and procedures.

experience

_____ is exploring language learning through feel, where the deaf can hear through their skin. Prototypes let skin mimic the ear's cochlea to translate sound into specific frequencies for the brain.

facebook

Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ___ software.

facial recognition

Who has not suffered the embarrassment of a misplaced debit card? Some companies allow consumers in China to make purchases without cards or cash. The system uses:

facial recognition

Organizations use data warehouses mainly to ______.

facilitate the analysis of data from multiple sources

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Personal software ___ are typically included with the operating system and can be configured based on user preference.

firewalls

Data that has been collected internally by the organization is known as ___ -party data.

first

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

Organizations perform data quality audits in order to ______.

gain an overall assessment of the strengths and weaknesses of their data

Clustered Regularly Interspaced Short Palindromic Repeatsis (CRISPR) uses bacteria's immune systems to allow scientists to edit individual___ .

genes

Magenta, currently in development, uses artificial intelligence algorithms to create music through inputs such as stories, colors, and feelings. Magenta is being developed by programmers at ___.

google

The XE-HP GPU, designed to support the Aurora supercomputer, was built in a collaboration between Intel, Hewlett Packard, and the Chicago's Argonne National Laboratory. GPU stands for ___ processing unit.

graphics

Engineers at MIT have designed a photonic crystal that works in conjunction with solar cells to double their efficiency. These crystals convert _____ into energy

heat

Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's ___.

heat

The primary purpose of a business intelligence (BI) system is to ______.

help a business make strategic decisions based on its own data

A database management system (DBMS) is a computer program that is used to ______.

help organize the data found in a database

Businesses use business intelligence (BI) systems to ___.

help them make decisions that are informed by business data and facts

For data to be considered open data, it must have what 3 characteristics?

- Datasets must have access rights that allow them to be reused and redistributed. - Datasets must be universally available so that anyone can use the data. - The public must have access and datasets must be available for use.

The three major advantages of using the light-absorbing characteristics of black phosphorus to build computer chips are:

- This technology is much faster than existing technologies. - These chips would be more energy efficient. - These chips would be much smaller than traditional computer chips.

One method organizations are using to deal with the increase in cybersecurity threats and the decrease in the effectiveness of traditional security means is through the use of behavior science in their data and network security policies. One of these methods is called UEBA. Select the true statements about UEBA.

- UEBA stands for user and entity behavior analytics - It is a type of cybersecurity that observes and records the conduct of computer and network users - UEBA uses a variety of different tactics to create a map of pattern behavior including machine learning, statistical analysis, and artificial intelligence (AI)

Select the true statements about packet sniffers.

- Unauthorized sniffers are used to steal information - Legitimate sniffers are used for routine examination and problem detection

According to the Federal Emergency Management Agency (FEMA), which of the following are steps businesses can take to help protect systems, data, and information from natural disasters?

- Utilize off-site cloud storage - Create a business continuity plan - Store data in different areas across the United States (geographic data redundancy)

According to the National Institute of Standards Technology (NIST), cybersecurity personnel can take steps to ensure data and systems are protected. The first thing an organization should conduct is a cybersecurity risk assessment. The cybersecurity risk assessment is concerned with answering which of the following questions?

- What are the internal and external vulnerabilities? - What are the relevant threats and the threat sources to our organization? - What are our organization's most important information technology assets?

Select 3 critical factors to consider when determining the right data to select?

- What types of data do you need to solve a specific problem? - How will the data be collected? - How much data should be collected?

Questions that data analysts often ask include which 3 of the following?

- Who will receive the information and analysis? - What are the time constraints for the project? - What overall outcomes and results that are needed?

Which of the following is an example of an advantage of being able to access a database via the web? More than one answer may be correct.

- Your product is primarily sold in developing countries where most of your suppliers are small business owners who access the Internet via a mobile device instead of a computer. - Turnover among telephone customer service representatives at your company is high and they receive only brief training before they interact with customers. Reps need to be able to access your sales database to assist customers who call. - Your company needs suppliers in all countries to be able to access your inventory database.

Considerations must be made in order to successfully integrate the usage of business intelligence systems in a company. These considerations include:

- if the system does not add value to the users' mission, they simply would not use it. - the system must be accepted and utilized by the users in order for it to add value to the organization. - success can be improved by involving senior management to help make BI a part of the organizational culture.

TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. Match the correct percentage to the correct statement. 1. What percentage of cyberattacks are aimed at small business? 2. What percentage of cyberattacks are launched with a phishing email? 3. What percentage of daily email attachments are harmful for their intended recipient? 4. What percentage of malicious attachments are masked as Microsoft Office files?

1. 43% 2. 91% 3. 85% 4. 38%

Put the steps for how a virus infects a digital device in the correct order.

1. The virus arrives via email attachment, file download, or by visiting a website that has been infected. 2. An action such as running or opening a file activates the virus. 3. The infection spreads to other computers via infected email, files, or contact with infected web sites. 4. The payload or the component of a virus that executes the malicious activity hits the computer and the other infected devices.

In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are) ___.

2 dashes: "- -"

Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?

43%

More cellular antenna arrays with each antenna sending out weaker microwave signals will most likely be a key factor in the creation of ___ cellular networks.

5G

Researchers at IBM are on the verge of using machine learning and artificial intelligence technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease. The system can produce data and conclusions within only a couple of minutes with an accuracy rate of _____, which is far better than the test currently used today.

71%

Which statement explains the difference between a database and a database management system (DBMS)?

A DBMS is a software program designed to organize and administer databases.

For the past 10 years, a restaurant has been running a customer loyalty program, rewarding customers with discounts and treats. Records of these rewards have been kept in odd notes and multiple spreadsheets used in different ways by various employees who have come and gone over the years. Because of this, some customers are not getting their rewards, while others are receiving rewards they have not earned. Overall, the restaurant is losing money and business with this program. How can a database management system (DBMS) help with this problem?

A DBMS will help the owners manage the data they already have to run their customer loyalty program more efficiently.

Given the Four V's of Big Data, which of the following organizations most likely uses Big Data?

A leading news website that uses data about its visitors' and followers' activities to shape its news coverage, customize news alerts, and gain advertisers and subscribers.

Facing an adversary that has overwhelming military strength leads many groups to consider using cyberattacks, such as North Korea's May-June 2017 WannaCry ransomware attack. Which of the following three areas that might be vulnerable to cyberattacks?

A water supply An electrical grid A transportation system

The illegitimate use of an email message that appears to be from an established organization such as a bank, financial institution, or insurance company is referred to as ___ . In order to appear legitimate, the message often contains the company's logo and identifying information.

phishing

A type of semiconductor that requires high-energy ultraviolet light to generate electrons involved in the transformation of carbon dioxide is called a _____.

photocatalyst Reason: This choice should be selected. According to Scientific American, photocatalysts are a type of semiconductor that requires high-energy ultraviolet light to generate the electrons involved in the transformation of carbon dioxide.

Which of the following statements about computer viruses are true?

- A computer virus is software that infects computers and is created using computer code. - Viruses can destroy programs or alter the operations of a computer or network.

Which of the following is an example of what an information policy could specify? More than one answer may apply.

- A health insurance company stores data that patients self-report as inputs on its website, but does not link that data with information about the patient's search history. - A user agreement on a website indicates that it will store the browsing history linked to the IP address for an indefinite amount of time and reserves the right to sell that information to interested parties. - A large corporation grants access to salary information to the direct supervisors of employees and to members of the Human Resources department who administer payroll.

Which of the following would be a reason why an organization would use web usage mining? More than one answer may be correct.

- A new social media platform wants to increase engagement and is looking to know what content its most frequent users spend the most time engaging with. - An e-commerce business looking to improve the customer experience on its website to boost sales wants to know what types of sites users go to after visiting their website and putting items in their cart, but not completing a purchase.

Which of the following sets of characteristics specifically apply to relational databases? More than one answer may be correct.

- A relational database organizes data in tables composed of records or objects (the rows), and fields (the columns). - Data tables in a relational database are linked by the fields they have in common.

Which of the following is an example of why a database should be accessible through the web? More than one answer may apply.

- A small distributor with limited staffing wants customers to be able to track the status of their orders without having to contact a customer service representative. - A company has recently scaled its operations so that it competes internationally and needs business partners all over the world to have access to its database. - A large portion of a company's workforce are contract workers who work offsite, using their own devices to complete their work.

Which of the following is an example of a web experience that could be improved by web mining? More than one answer may be correct.

- A travel company wants to know what amenities people search for before booking a hotel for a vacation so that the company can increase the coverage of those amenities on their website. - A subscription learning app that targets kindergarten students wants to meaningfully update its lessons so that visually impaired children can use them. - A small online retailer has noticed that most people viewing products from its gaming pages browse for about 5 minutes and end up making purchases, but over 75 percent of people viewing products from its home goods pages leave within the first 30 seconds. It wants information on how the two pages are different.

The process of converting the format of data from one form to another is called data ___.

Transformation

Select the true statements about grocery delivery robots developed by Starship.

- They use rechargeable batteries to create zero-emission deliveries. - They move no faster than pedestrian pace.

In the relationship shown in the image, the Owners table is linked to the Pets table by a one-to-many relationship. This means that each entry in the OwnerID field can be linked to many ___.

Pets

Airbus announced three concepts for the world's first zero-emission commercial aircraft. They are hopeful they can have these aircraft ready for service by 2035. This carbon-neutral technology would reduce the environmental impact of aircraft operations. The three concepts they are exploring include which of the following?

- A turboprop design that can seat up to 100 people that uses a turboprop engine that is capable of traveling more than 1,000 nautical miles. - A turbofan design that can seat 120-200 passengers with a range of over 2,000 nautical miles.

Select all that apply A query is a request for information stored in a database. One of the benefits of using a database to store information is the ability to run a query. In relational database management systems (RDBMS), there are a variety of query tools that are used to execute and run queries. Which of the following are tools used to run queries in an RDBMS? More than one answer may be correct.

- Action queries - SQL specific queries - Crosstab queries

Which of the following are the concepts behind adaptive learning?

- Adaptive learning platforms provide a unique learning experience for each student. - Adaptive learning platforms use questions and algorithms to ensure students are provided with needed information.

Which of the following are examples of data objects that a relational database management system (RDBMS) may include? More than one answer may be correct.

- Addresses of the company's wholesalers and the number of items in a company's inventory - Names of customers and records of when merchandise was returned

Because many business executives desire to create a data-driven decision making culture, which 3 of the following are competencies organizations invest in to support DDDM?

- Agility in analytics and data analysis - Data proficiency - Building a data-driven community

Which of the following tasks can businesses perform with the help of in-memory computing? More than one answer may be correct.

- Alerting online customers that the desired item is out of stock, before the order is placed - Mapping alternate driving routes to help truckers avoid bad weather and traffic jams - Predicting the impact of news on stock prices and conducting immediate transactions

Which of the following are advantages of cloud databases over a traditional database? More than one answer may be correct.

- Are maintained by an external provider, such as Amazon or Oracle - Can support both SQL and NoSQL databases - Can be accessed through an application programming interface (API)

White hat hackers use the same techniques and tools that are used by illegitimate hackers. These tools include which of the following?

- Back door programs - Rootkits - Social engineering

Select the true statements about keystroke loggers.

- Can be hardware devices and software applications - Keystroke loggers can record passwords and confidential information - Software based keystroke loggers are often a Trojan that is installed without the user's knowledge

You are speaking with a friend about how to protect yourself from phishing scams. Your friend (who works in cybersecurity) gives you some advice about what to do if you receive a phishing message. Which of the following statements would be considered good advice?

- Contact US-CERT. - If you receive a suspicious message, contact the institution that the message was allegedly sent from. - Banks and credit card companies will never ask you to provide personal information via email messages.

Rootkits are typically used to allow hackers to do which of the following?

- Create a backdoor into a computer - Remotely control the operations of a computer.

Which of the following tasks are NoSQL databases designed to do? More than one answer may be correct.

- Create queries from the data created from web apps - Analyze nonstructured data - Manage large datasets across different platforms

Select all that apply Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. According to Google, there are five essential aspects of analytical skills including which 3 of the following?

- Curiosity - Understanding context - Data strategy

Select the reasons a government may choose to get involved in state-sponsored cyberwarfare.

- Cyberwarfare is often difficult to trace and identify. - Cyberwarfare is relatively inexpensive when compared to traditional warfare. - Cyberwarfare can cause widespread damage to IT infrastructure.

Because many business executives desire to create a data-driven decision-making culture, which 3 of the following are competencies organizations invest in to support DDDM?

- Data proficiency - Agility in analytics and data analysis - Building a data-driven community

Select the two statements that correctly explain the roles of data marts and data warehouses in a decision support system (DSS).

- Data warehouses are used to analyze long-term, historical data for an organization's strategic purposes, because they store data from different time periods and subject areas. - Data marts are used to analyze recent data that a department needs for operational troubleshooting and management, because they collect and measure data specific to that area.

The main tools used by data analysts include which 3 of the following?

- Databases and query languages - Data visualization tools - Spreadsheets

Which of the following is a task that data administration would be responsible for? More than one answer may apply.

- Determining that two-factor identification must be used to access data that the company has determined to be confidential. - Defining policies stating that employees may not share data with people who are not employees of the organization. - Deciding that the organization will begin collecting and storing users' locations upon the release of the next generation software for its mobile app.

According to Norton, which of the following steps should be taken to defend against rootkits?

- Don't ignore software updates - Watch out for drive-by-downloads - Be aware of phishing emails

Select what's true about how a Trojan infects a computer system.

- Hackers use Trojans to create a backdoor into a user's system which allows them to spy on the computer's activities. - Trojans are designed using some sort of social engineering tactic. - Trojans are commonly used by hackers to gain access to systems and devices.

Which of the following statements are true about Nanorobots?

- Have the capacity to carry medication or miniature tools - Can build and manipulate things precisely where components are at a scale of a nanometer - Used to constantly monitor our bodies for maladies and other symptoms

Select all that apply Uses of data analytics include which 3 of the following?

- Improved decision making - Improved patient experiences and internal procedures in healthcare - Improved customer service

Which of the following correctly describes a type of data mart? More than one answer may be correct.

- Independent data marts are separate from a data warehouse and are created in order to collect data relating only to particular business functions. - Hybrid data marts combine data from a data warehouse and other collection systems. - Dependent data marts extract data from a data warehouse when it is needed.

Characteristics of spreadsheets include which 2 of the following?

- Information is organized into cells - Data is structured in rows and columns

Before data security strategies are created, which questions must be answered?

- Is this the highest priority security risk? - Am I reducing the risk in the most cost-effective way? - What is the risk I am reducing?

Why is online analytical processing (OLAP) software included in many business intelligence (BI) software applications? More than one answer may be correct.

- It allows users to view data from different perspectives or angles and gain new insights. - It allows for sophisticated data and trend analysis, data modeling, and forecasting. - It allows reports and analytics to be exported to more user-friendly, front-end tools.

Select three platforms that will use the Pluton chip.

- Many IoT devices such as smart refrigerators and thermostats - Windows-based computers that use processors developed by Intel and AMD - Xbox One

Which of the following is an example of an organization analyzing predictive behavior with the goal of creating new offerings? More than one answer may be correct.

- Netflix tracks what users who viewed all three seasons of Stranger Things also had in their queues. - An in-home healthcare provider tracks the hospital readmission rates of elderly people who live alone after they received care for falling in their homes.

The WWA applies a differentiated scientific approach that utilizes which of the following when analyzing climate events?

- Observational data - Analysis of range models - Satellite imaging

For which of the following tasks would it be more appropriate to use a NoSQL database than a SQL database? More than one answer may be correct.

- Organizing user-generated comments from your company's Twitter, Facebook, and Instagram pages - Analyzing large volumes of data that are stored in the cloud

Select the true statements about state-sponsored cyberwarefare.

- Originate and are executed by foreign governments. - Can be used to send warnings or to create conflict between countries. - Attacks can be directly launched by a foreign government or by a group or individual who has been paid by to execute the attack

Which of the following statements correctly describes phishing?

- Phishing scams use legitimate looking email messages to con a user into giving up private information. - Phishing is the illegitimate use of an email message that appears to be from an established organization such as a bank.

Which of the following statements describe the capabilities of relational database management system (RDBMS)? More than one answer may be correct.

- RDBMS allow users to view, add, revise, and remove data. - RDBMS have features that support the quality and security of data.

Select the true statements about ransomware attacks.

- Ransomware attacks invade computers via Trojan Horse viruses, worms, or by a user opening a legitimate looking email. - Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. - One of the most popular methods used in ransomware attacks is through phishing.

Which of the following are ways Internet of Medical Things (IoMT) has been used during the pandemic?

- Rapid COVID-19 screening - Regional integration of health records - Self-screening at home

Which of the following improvements might be the direct outcome of a data quality audit? More than one answer may be correct.

- Recommendations for a new data management design and prescriptions for preserving data quality - Corrections in source data issues and ways to examine data over time - Elimination of redundant metadata and strengthened referential integrity

Which of the following statements correctly describes referential integrity? More than one answer may be correct.

- Referential integrity applies to data quality within the structure of a relational database. - For referential integrity to exist, data on both sides of the table relationship must be present.

Tips to avoid falling victim to a social engineering attack includes which of the following?

- Slow down and think about the scenario. - Be mindful of web searches to make sure you are landing on legitimate sites. - Make sure to research the facts contained in an email message.

Select three challenges that faced traditional (large) lunar rovers that the CubeRover addresses.

- Smaller size means less power consumption. - Less weight and smaller footprint reduce the high launch cost of traditional rovers. - Multiple small rovers allow for greater area coverage than one large rover.

Select what's true about spear phishing attacks.

- Spear phishing attacks are designed to steal data and some attacks may also be designed to install malicious software on a device. - Spear phishing is a type of email scam that is directed toward a specific person or organization.

Your college has a database with a Students table. Which two of the following could be a primary key in the table?

- Student number - Social Security Number

Key skills required of data analysts include which 3 of the following?

- Technical writing skills - Experience with SQL and computer code - Oral communication skills

Which of the following are true about Project Soli, the new touchless sensing interactive technology being developed ATAP?

- The Soli chip will be embedded in wearables, phones, computers, cars, and IoT devices. - ATAP envisions a future in which the human hand becomes a universal input device for interacting with technology. - Project Soli is a microchip that uses miniature radar to detect touchless gesture interactions.

Which of the following statements are true about Digital Twin technology?

- The components are connected to a Cloud-based system that receives and processes all the data monitored by the sensors. - It contains smart components that use sensors to gather data about real-time status and working conditions. - It is a dynamic software representation of a piece of equipment or system that emulates the original operational behavior.

From the following list, select all of the examples of a relationship that an entity-relationship diagram (ERD) could be used to describe.

- The employees who report to a specific manager in an organizational chart - The courses a student is taking - Products a customer has ordered

Which of the following statements are true about the Brain-Computer Interface?

- The goal is for the system to allow humans to type even faster than with their physical hands. - It allows for the user to communicate with a computer using only thoughts. - It uses optical imaging to scan your brain one hundred times per second to detect how you are speaking silently in your head.

Which of the following is an example of the type of information data mining can yield? More than one answer may be correct.

- The likelihood of a Gen-X female who makes $50,000 and is divorced with no children will take a trip within a year of her divorce being finalized - Middle-aged males who are members of their local church bible study group are more inclined to vote than younger males who are also members of local bible study groups.

Mohammed is experiencing issues with his work computer. He speaks to the IT department and they identify various symptoms of a computer virus. Symptoms of a computer virus include:

- The operating system may not launch properly - Critical files may be automatically deleted - Unexpected error messages

Which of the following are key features of Violet the virus-killing robot?

- The robot prototype uses Intel® Movidius™ Myriad™ X Vision Processing Unit (VPU). - The robot uses ultraviolet light to sanitize (destroy bacteria and viruses) rooms and equipment quickly, helping humans avoid possible exposure when sanitizing.

Which of the following are true about 3D crime scene imaging cameras?

- These cameras allow law enforcement officers to verify witness testimony or evaluate plausible hypotheses. - Using 3D scanning forensic scientists can analyze line of sight, blood spatter, and bullet trajectories. - 3D forensic technology replicates the entire crime scene before it is altered.

Recently, scientists at Hong Kong-based Insilico Medicine and the University of Toronto used ___ algorithms to synthesize several drug candidates, which demonstrated the strategy can work. Firms at the forefront of this new strategy are Insilico Medicine, Kebotix, and Atomwise. The technology is expected to be widely available within 3-5 years.

AI

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ___ can make robots much more flexible and safer.

Adaptive Robotics Reason: This choice should be selected. Adaptive robots, developed by Flexiv Robotics Inc., combine advanced sensors and extraordinarily capable force-sensing and disturbance rejection capabilities.

The world's first concept for zero-emission commercial aircraft was recently discussed by _____.

Airbus

Violet is a 4-foot 7-inch robot with a humanoid appearance that was developed by _____, an Irish startup that specializes in designing artificially intelligent helpers for the healthcare industry. The goal is to help overburdened hospitals better cope with the challenges they are currently facing due to COVID-19.

Akara

Select what you need in order to visit an Amazon Go store.

Amazon account A smartphone The Amazon Go app

Taryn Southern released an album called I AM AI after having composed and produced the music using artificial intelligence algorithms with a program called ___.

Amper

Working on data analytics teams to extract data from large data sets, creating reports that outline key findings, monitoring key performance indicators (KPIs) to identify success or failure, and analyzing data to identify trends are just a few of the responsibilities of a data .

Analyst

Someone who possesses the knowledge of processing software, business strategy, and analytical skill to deliver data and reports that guide management and executives as they create well-informed decision making is known as a data ___.

Analyst Data analysts are employed in a variety of fields including finance, e-commerce, healthcare, government, and science.

Curiosity, understanding context, having a technical mindset, data design, and data strategy are the 5 essential aspects of __ thinking and skills

Analytical

Protecting private or sensitive information by eliminating or encrypting information is the goal of data ___.

Anonymization

What is the purpose of an SQL statement?

Answer questions about the database

Relational database management systems (RDBMS) have a variety of tools that can be used to execute/run queries. One of these query tools is the ability to execute/run action queries. Which of the following are common types of action queries? More than one answer may be correct.

Append query Update query Delete query

Microsoft joined forces with SpaceX to connect their _____ cloud computing network to Elon Musk's Starlink satellite Internet service.

Azure

Which statement best summarizes the primary advantages of performing a data quality audit?

The audit recommends ways the organization can improve its data quality and reduce costs through increasing data consistency.

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

When talking about business decision making, the acronym BDA stands for _____.

Big Data Analytics

In analyzing transactions, Walmart discovered that many people who buy Children's Tylenol in their stores also buy orange juice in the same transaction. They used this information to discount Children's Tylenol but raise the price of orange juice during flu season. What is the name of the approach Walmart used to discover this information?

Big data

What type of hacker breaks into computer systems with the intent of causing damage or stealing data?

Black hat hackers

Headquartered in Toronto, _____ has developed a software application that serves as an early warning system for identifying pandemics.

BlueDot

Data analysts must blend facts and data with knowledge about the ___.

Business or organization

A gene editing technique called ___ may one day provide a cure for cancer.

CRISPR

In the ClassList table, the primary key is probably the __ field.

Classnumber

The process of taking components from data sources and analytics platforms to create a more user-friendly experience that makes finding critical insights easier is called _ data and analytics.

Composable

Which of the following are considered cybercrimes?

Computer hacking Trojan horse viruses Digital identity theft

Researchers at _____ University have created a fiber-optic sensor that uses low-cost, light-emitting diodes (LEDs) and dyes to create a stretchable skin that detects deformations such as bending, strain, and pressure.

Cornell

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally ___.

Creating your visuals

In the statement: SELECT * FROM Customers, the asterisk (*) indicates that the user wants to extract all the columns of data FROM ___ the table.

Customers

Activities where white-hat hackers are paid to hack into private networks and applications is referred to as ___ testing.

Penetration

When data is anonymized, the PII is eliminated or encrypted. PII includes names, social security numbers, addresses, and more and stands for ___ identifiable information.

Personally

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

How are data marts different from data warehouses?

Data marts focus on an individual department or business function and manage less data than a data warehouse.

What term describes the process organizations use to discover meaningful relationships and patterns among the data sets it has collected?

Data mining

Brooks Accounting is no stranger to audits—for their customers. Managers discovered some issues in services and billing they suspected were linked to their database practices rather than to employee competence. Brooks hired an outside firm to perform a data quality audit. Which statement best describes how the audit process identified problems?

Data profiling analyzed the accounting firm's data sources.

Which statement best summarizes how organizations use data warehouses?

Data warehouses are used to store data from multiple sources for collective analysis.

SQL is quite useful when working with large data sets and is widely used in today's business environment. It allows the user to query the data contained in a ___.

Database

Which statement most accurately describes the value of data integrity to an organization?

Databases and database management system (DBMS) with a high level of data integrity enable more efficient data maintenance in support of organizational goals.

One of Google's companies that is investigating AI and Machine Learning is called __________.

DeepMind

Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.

Descriptive analytics . Descriptive analytics seeks to uncover historical trends in data sets.

Which 3 of the following are major varieties of data formats?

Discrete data Unstructured data Structured data

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _ attack.

DoS

A hacker launches an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests. This would be considered a _____ attack.

DoS A distributed denial-of-service (DoS) attack takes place when a hacker gains unauthorized access and control of a network of computers that are connected to the Internet.

Which of the following are examples of cyberattacks?

DoS attacks Information theft DDoS attacks

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

Researchers at _____ are on the verge of using machine learning and AI technologies to identify patterns in human speech that may be predictive of an eventual diagnosis of Alzheimer's disease.

IBM

Because it has no motor and is made from cardboard, the _____ is a lower cost and disposable delivery option.

ICARUS

Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas.

ICARUS

IoMT stands for:

Internet of Medical Things

How does the structure of an online analytical processing (OLAP) database shape its core functionality?

Its use of data cubes allows users to conduct complex queries, analyses, and modeling by taking multiple dimensions of data (types or levels) into account and viewing data from multiple viewpoints or "slices" (such as by date and location).

Machine-learning software is being used to explore databases of existing molecules (and their associated properties) to generate information that can be used to develop new drugs to treat a variety of conditions expeditiously and at lower costs. Firms at the forefront of this new strategy include:

Kebotix Insilico Medicine Atomwise

Amazon's satellite-based broadband solution is called Project _____.

Kuiper

Self-driving trucks may soon be a common sight on interstate highways thanks to pulsed laser technology known as:

LIDAR

Which of the following three are examples of cryptocurrency?

Litecoin Bitcoin Ethereum

The Imaging Analytics Engine developed by Zebra-Med can be used to uncover which of the following conditions that may be present in CT scans?

Lung conditions Brain conditions Liver disease

Which of these steps in the data mining process most likely involves the actual "mining" or "Knowledge Discovery in Data"?

Model building and evaluation

Developed and designed to help teams collaborate globally in real-time, Canvus Connect collaboration software makes it possible for remote users to share, draw, manipulate, and input information on a single board. It was developed by __________.

MultiTaction

Plans to put a 4G network on the moon were announced by Nokia and _____.

NASA

The technology that provides a type of firewall protection by hiding internal IP addresses is called _____.

NAT Network Address Translation (NAT) is used to protect data. It was developed by Cisco and is used by firewalls, routers, and computers that are part of a network and are connected to the Internet.

A ___ Robot is a machine that can build and precisely manipulate things whose components are of a nanometer scale. These machines detect diseases and can repair or manipulate damaged cells, potentially providing humans with longer lifespans.

Nano

The May-June 2017 cyberattack, known as the WannaCry ransomware attack, struck hospitals in England particularly hard. British security agencies claim this attack originated in:

North Korea

Data that offers free access, distribution, and usage is known as ___ data.

Open

Qualitative data that is not categorized is called nominal data. Qualitative data that is categorized (ranked, for example) is considered ___ data.

Ordinal

Why is it important for all organizations, no matter how small, to create and implement organizational information policies?

Organizational data are a critical asset; it is important to ensure its security.

Social engineering hacks are designed to get a victim to divulge which of the following types of information?

Passwords Account information

Microsoft's analytics software that allows for the processing, manipulation, and visualization of data is called Microsoft ___BI.

Power

Which of the following is a popular Microsoft data analytics program that offers business intelligence as well as data visualization?

Power BI

The 6-step process analysts use to create data-driven decision making includes which 3 of the following?

Prepare Ask Analysis

In the six-step process analysts use to create data-driven decisions, the step during which data cleansing occurs to ensure that high-quality data is ready for processing is the ____ step.

Process

Using atoms to create binary digits (bits) to replace transistors in processors and memory is the basis of ___ computing.

Quantum

SQL, usually pronounced "sequel", is quite useful when working with large data sets. The Q in SQL stands for ___.

Query

Malware that encrypts a computer's data, forcing the victim to purchase a decryption code, is called ___ .

Ransomware

Collections of related fields in a database are referred to as ___.

Records

For which task is a data mart more useful or appropriate than a data warehouse?

Resolving a current problem with a specific type of inventory, purchase transaction, or supply chain

Which of the following is a task that an SQL statement would be expected to perform?

Retrieve data

Common SQL terms include which 3 of the following?

SELECT WHERE FROM

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable of impacting decisions in the present. This is known as __ AI.

Scalable Scalable AI is designed to be more responsive, smarter, and allows for better learning algorithms and shorter development times.

Data-driven decision making (DDDM) can be facilitated through a 6-step processes of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders?

Share

Currently apps that run on the Cloud are __________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing

Slower

When discussing personally identifiable information (PII), which 3 of the following are usually anonymized?

Social security numbers Phone numbers Names

NASA stands for the National Aeronautics and _____ Administration.

Space

Which program is typically limited to one user at a time?

Spreadsheet

_____ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.

Starship

Malware is designed to do which of the following?

Steal information. Destroy data. Incapacitate a computer or network

One way to visualize a data ecosystem is to apply it to the data project life cycle. The Data Science Ready project outlines the 5 steps of the data project life cycle. The final stage in this life cycle is ___.

Storage Data storage involves hardware, software, and procedures for securing, maintaining, and accessing data.

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ___ query language.

Structured

Machine learning is the field of study that gives computers the ability to learn without being explicitly programmed. Which of the following three are categories of machine learning?

Supervised Unsupervised Reinforced

Providing the ability to explore and analyze data in seconds using a drag and drop interface as well as natural language processing which allows for the presentation of questions are major attributes of ___ , which offers licenses for Creators, Explorers, and Viewers.

Tableau

A mid-sized independent hardware store has recently merged with a large national chain. The local owners have long used a reliable database to manage inventory. Their database has been essential in balancing orders for seasonal merchandise with the problem of limited shelf space. The merger will soon entail managing many more types of data, as the national chain has approved lists of suppliers, precise requirements for recording transactions, specific human resources procedures, and more. Which statement best summarizes what the local managers will be able to do for the first time when they start using the parent company's database management system (DBMS)?

The managers will be able to create, edit, and store data in a secure manner across all data types required by the parent company.

Which statement best summarizes how a data governance (DG) plan is created?

The plan is tailored to the organization's specific goals, objectives, and activities.

Select the true statements about BlueDot's pandemic detection software.

The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time. The software uses artificial intelligence to predict pandemics. Serves as an early warning system for identifying pandemics.

Why do large, data-driven companies use analytic platforms?

They generate vast amounts of organizational data and need to be able to rapidly analyze and interpret this information to make informed business decisions.

Why must database administrators (DBA) be trained or experienced in using an organization's specific database platform?

They must troubleshoot or solve problems with the database when necessary.

What is the primary role of a database administrator (DBA)?

To monitor the database and ensure that it functions when needed

A corporate sales organization is hosting its annual regional meeting. It needs to book a hotel within the region where attendees will stay for three days and two nights. The hotel must have: 30 standard hotel rooms for its sales reps, 5 suites for the regional managers, and 5 conference rooms to hold training sessions. There also must be two restaurants within walking distance of the hotel that can accommodate a dinner reservation for 40 people. Which web mining technique would the organization use to narrow down the choices of hotels to those that fit these parameters?

Web content mining

Which statement best explains why traditional file systems have certain issues?

Which statement best explains why traditional file systems have certain issues?

Software that uses artificial intelligence to analyze millions of clinical and imaging records to create high-performance algorithms that automatically detect conditions is being developed by _____.

Zebra-Med

Data mining is best described as ______.

a research and analysis technique in which data analysts employ mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends

Forms structure data_____ input to help ensure data , meaning the information entered is accurate, timely, and useful.

accuracy

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ___ learning.

adaptive Reason: An adaptive learning product poses numerous questions to determine students' prior subject knowledge. In adaptive learning systems, algorithms determine how well a student is performing and identify the student's knowledge gaps. These algorithms then determine when review is necessary to ensure retention. Adaptive Learning is an innovative concept for today's educators.

Developed by Cisco and used by firewalls, routers, and computers that are part of a network and are connected to the Internet, Network ___ Translation provides a type of firewall protection by hiding internal IP addresses.

address

Pulsed laser technology called LIDAR (Light Detection and Ranging) to detect and monitor the environment is an integral part of ___.

self-driving trucks

A company's periodic web mining exercise to determine its best-selling products resulted in the discovery that a product sold in conjunction with a movie released 10 years ago has recently become coveted by nostalgia fans. The company redesigned its website so that interested consumers can purchase the product right on the homepage. This company has used web mining to ______.

improve site usability

Like all trusted platform modules (TPMs), the Pluton chip stores encryption keys and user login identities. What makes the Pluton unique is that it emulates a TPM for each specific API, whether the API is on the computer's hard drive or in the cloud. API stands for application programming ___ .

interface

Businesses can use in-memory computing to conduct or support almost any task that ______.

involves the near-instantaneous processing and analysis of huge volumes of data

A form of spyware that records all actions typed on a keyboard is called a _ logger.

keystroke or key

The amount of time taken by data to travel from devices to a data center and back is called __________.

latency

Tesla's autonomous driving system has raised some concerns from industry experts. They fear the technology used in Tesla's vehicles lacks the use of _____, a critical component in most autonomous vehicles.

lidar Reason: This choice should be selected. One of the major issues is that Tesla's plan for autonomous vehicles lacks a key piece of hardware that is commonly used for autonomous driving. Almost all self-driving vehicles currently being designed include lidar sensors.

Using ultra-thin layers of black phosphorus, the processor-on-a-chip developed by researchers at the Royal Melbourne Institute of Technology (RMIT) creates electrical impulses based on the wavelength of incoming ___.

light

Hedan Bai, one of the lead researchers on the project to give VR a human touch, stated "The solution is to make a stretchable _____ for multimodal sensing (SLIMS). This long tube contains a pair of polyurethane elastomeric cores. One core is transparent; the other is filled with absorbing dyes at multiple locations and connects to an LED. Each core is coupled with a red-green-blue sensor chip to register geometric changes in the optical path of light."

lightguide

Hyperloop systems use ___ levitation to achieve nearly silent high-speed transportation. Virgin hopes to eventually develop a hyperloop system that will carry both passengers and cargo at speeds of more than 600 mph.

magnetic

Malware is short for ___ software.

malicious

In computer programming, a set of rules and guidelines that define a specific computer language is referred to as the language's ___.

matches Choice Syntax

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___.

memristor

With billions of IoT devices installed at disparate geographies and operating at the Edge, from autonomous cars and drones to door openers, air-conditioning units, and refrigerators, a major challenge for designers of Enterprise Resource Planning (ERP) software is that there is too

much data

Businesses need to take steps to protect computer systems, data, and information from ______ disasters.

natural

Replacement body parts that interact with a person's nervous system is a technology called .

neuroprosthetics

Using replacement body parts that interact with a person's nervous system is a technology called ___.

neuroprosthetics

In contrast to computerized systems, traditional file management systems can create issues with ______.

organization, repetition, and lack of consistency

In a relational database, an important field that contains a unique value that identifies each record as individual is the____ key

primary

The U.S. Census Bureau is using differential _____ to make census data secure and private.

privacy

In the six-step process, analysts use to create data-driven decisions, the step during which data cleansing occurs to ensure that high-quality data is ready for processing is the step.

process

Google Advanced Technology and ___ (ATAP) is an in-house technology incubator.

project

The Important goals of data governance (DG) are to ______.

protect data from risk, misuse, regulatory noncompliance, and quality and cost issues

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing.

quantum

So that users can find specific information quickly by using filters based on specific criteria, databases allow the creation of ___.

queries

To search a database for information, create a ___.

query

To search a database for information, create a ___. Multiple choice question. field

query

Analytic platforms are designed to ______.

quickly gather and analyze specific organizational data to provide information that guides decision making

Forms structure data input to help ensure data_____ , meaning the information entered is accurate, timely, and useful.

record

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a

record

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ______

record

A link between tables in a relational database that defines how the data are related is called a _____.

relationship

Forms allow data to go into a database, ___ displays information coming out of a database.

reports

To display or distribute information from a database, programmers or database administrators create ___.

reports

Because they are not aware of their surroundings and can easily injure humans, industrial ___ arms must be housed in cages or completely shut off when workers are nearby. This is where force-sensing and disturbance recognition capabilities are extremely useful.

robot

Using the correct syntax allows the user to extract data from multiple fields found in data tables. In order to extract information from multiple tables, the ___ command is used to indicate multiple fields in conjunction with FROM and WHERE to narrow the search and get specific results.

select

A relational database management system (RDBMS) is a type of DBMS whose primary function is to ______.

show how data are connected through relationships

In its Building 8 labs, Facebook has been developing a technology that may one day allow deaf people to hear through their______.

skin

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers Packet sniffers are specialized hardware or software that capture packets transmitted over a network.

The use of computers and digital technology to manipulate people so they divulge confidential information such as usernames, passwords, account information is called ___ engineering.

social

With Twitter reporting over 1 billion political tweets during the 2016 U.S. presidential campaign, ___ media was a big winner during the election

social

Until recent elections, candidates were largely dependent on news agencies to deliver their messages to the electorate. Thanks to ___ candidates can now instantly and frequently transmit messages directly to voters.Until recent elections, candidates were largely dependent on news agencies to deliver their messages to the electorate. Thanks to ___ candidates can now instantly and frequently transmit messages directly to voters.

social media

Scientists are working to create ___ refineries that produce useful compounds from the waste gas that can serve as raw materials for the synthesis of various products such as medicines, detergents, fertilizers, and textiles.

solar

James Bond used to carry a secret spy camera. That would not be necessary if he wears the new contact lenses being developed by ___ . They can record and play video as well as take photos.

sony

Unlike phishing which does not have a specific target and is designed to reach the maximum amount of people, ___ phishing is a precise type of attack.

spear

The primary characteristic of a relational database is that it ______.

stores and allows access to data objects that are related to one another

Intel's XE-HP GPU, built in a collaboration between Intel, Hewlett Packard, and the Argonne National Laboratory is designed to support the Aurora ___.

supercomputer Reason: This choice should be selected. The XE-HP gives the Aurora project a large number of immediate applications, including massive-scale astronomical simulations that give scientists the ability to observe data and simultaneously test cosmological theories.

According to National Institute for Standards ___ , once a cybersecurity risk assessment has been conducted and the various questions in the risk assessment have been answered, an organization will be able to decide what to protect.

technology

The founder of , Elon Musk, recently announced the release of autonomous driving software for their vehicles.

tesla

A program that appears legitimate, but executes an unwanted activity when activated is called a ___ horse virus.

trojan

As reported by Andrei Ene, Tiny Banker ___ (TBT) is one of the worst malware attacks in the last 10 years.

trojan

Sharing infected files and opening an infected email attachment are ways that a computer _ can infect a digital device.

virus

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.

weaker

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions are called _____-hat hackers.

white

Many organizations hire computer experts who test the security measures of an organization's information systems to ensure they are protected against intrusions. These experts use a variety of techniques including hacking, penetration testing, and vulnerability testing. These types of experts are known as _____ hackers. Multiple choice question. white-hat

white-hat White hat hackers are non-malicious computer security experts who test the security measures of an organization's information systems to ensure they are protected against malicious intrusions.

To address the challenges posed by the moon's regolith, WiBotic opted to use ___ -charging technology to charge CubeRover's battery pack.

wireless


संबंधित स्टडी सेट्स

Chapter 16: Nursing Management During the Postpartum Period

View Set

Geography 1010 - Chapter 13: Streams and flooding

View Set

Ch. 2 The World Trade Organization and the World Trade System

View Set