ACCT 308 Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the precision ratio?

0.83

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the recall ratio?

0.83

if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the recall ratio?

0.88

if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the precision ratio?

0.92

if a confusion matrix shows 46 TP, 6 FN, 500 TN, and 4 FP, what is the accuracy ratio?

0.98

If a confusion matrix shows 25 TP, 5 FN, 1000 TN, and 5FP, what is the accuracy ratio?

0.99

Authentication is the process by which the

A system verifies the identity of the user

Which of the following is not true with respect to artificial intelligence?

AI is also called cognitive technologies

Which organization created the Reporting on an Entity's Cybersecurity Risk Management Program and Controls: Attestation Guide in 2017?

AICPA

Which of the following statements is FALSE?

Because a distributed ledger exists in a blockchain network, a computer consisting of all transaction records may crash and cause the syncing issue in the blockchain network.

Which of the following is created mainly for cryptocurrency application?

Bitcoin

Which of the following statements is FALSE?

Bitcoin uses smart contract to specify the business rules

Which of the following can be considered as a good alternative to back up data and applications?

Cloud computing

A selected set of organizations may run a blockchain node separately for keeping the transaction records. Administrators from the organizations establish the access rights and permissions for each participant. This type of blockchain is often called

Consortium blockchain

Which of the following best describes deep learning?

Deep learning involves complex, multiplayer neural networks

An information technology director collected the names and locations of key vendors, current hardware configuration, names of team members, and an alternative processing location. What is the director most likely preparing?

Disaster recovery plan

Which feature CANNOT be found in Bitcoin?

Double spend

Which of the following statements is correct?

Fault Tolerance uses redundant units to provide a system with the ability to continue functioning when part of the system fails

A message digest is the result of hashing. which of the following statements about the hashing process is true?

Hashing is the best approach to make sure that two files are identical

Which of the following statements is FALSE?

Hyperledger is a public domain

Which of the following best describes the difference between artificial intelligence and machine learning?

Machine learning is a subset of AI

Which of the following best describes machine learning?

Machine learning is a technique where a software model is trained using data

Which of the following is not part of the virtuous cycle of machine learning?

Model

Which of the following best describes artificial neural networks?

Neural networks consist of inputs, neurons or nodes, and outputs

To ensure the data sent over the internet are protected, which of the following keys is required to encrypt the data (before transmission) using an asymmetric-key encryption method?

Receiver's public key

Which of the following groups/laws was the earliest to encourage auditors to incorporate fraud examination into audit programs?

SAS No. 99

To authenticate the message sender in an asymmetric-key encryption system, which of the following keys is required to decrypt the received message?

Sender's public key

Which of the following statements is true?

Smart contract was introduced in Ethereum

Which of the following best describes reinforcement learning?

The model learns by trail-and-error

Which of the following best describes supervised learning?

The training data contain input-output pairs

which of the following best describes semi-supervised learning?

The training data contain some missing labels or incomplete data

Which of the following best describes unsupervised learning?

The training data only include input values

Which of the following is not directly related to one of the five questions that machine learning/AI is best suited to answer?

Which business strategy will be most successful?

What is a requirement of the proof of authority algorithm?

a few members have known identities

When we refer to smart contract in blockchain, we mean

a piece of software code that can be executed or triggered by business activities

to prevent repudiation in conducting e-business, companies must be able to authenticate their trading partners. which of the following encryption methods can be used for authentication purpose?

asymmetric-key encryption method

select a correct statement regarding encryption methods

asymmetric-key encryption method is sued to create digital signatures

To ensure confidentiality in an asymmetric-key encryption system, knowledge of which key is required to decrypt the receive message?

both Public and Private keys

Business continuity management is a:

corrective control

disaster recovery plan

corrective control

select a correct statement describing encryption or hashing process

encryption process is reversible

comparing encryption with hashtag

encryption results are called cyphertext

Incentive to commit fraud usually will include all of the following

inadequate segregation of duties

A digital certificate

indicates that the subscriber identified has sole control and access to the private key

regarding GDPR, which of the following statements is/are correct?

it is a regulation enforced by EU and it is to protect EU citizens' personal data

Which of the following best describes a confusion matrix?

it is a table summarizing the prediction results

Ben goes to his bank to wire transfer $1,000 to his sister Jennifer. the role of the bank in this transaction is best described as

middleman

In the Ethereum network

mining of Ether occurs at a constant rate

encryption is a

preventive control

The fraud triangle indicates which of the following condition(s) exist for a fraud to be perpetrated?

rationalization, pressure, legal environment

Data processing activities may be classified in terms of three stages or processes: input, processing, and output. An activity that is not normally associated with the input stage

reporting

What information does a block in the Bitcoin network contain?

the sender, the receiver, the quantity of Bitcoins to transfer

Which of the following vulnerabilities would create the most serious risk to a firm?

unauthorized access to the firm's network

The symmetric-key encryption method:

uses the same key for both senders and receivers for encryption and decryption

What is fault tolerance?

using redundant units to continue functioning when a system is failing


Set pelajaran terkait

Pregnancy, Labour, Childbirth, Postpartum - Uncomplicated

View Set

Floriculture Test Questions 1-100

View Set

Chapter 37: The Experience of Loss, Death and Grief-Questions

View Set

CIS Unit 2 - Internet Safety Quiz, Computer Basics Quiz, Basic Computer Skills quiz

View Set

Lesson 1: Principles of Digital Marketing

View Set

Entrepreneurship Chapter 5-6 Review

View Set