CIS EXAM 3
If you have compromised your U.S. debit card Federal law says that if you tell your bank within two business days of learning about it
$50.00
Twitter recommends that no more than ________ hashtags should be used per Tweet.
2
An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ________.
Acceptable USe Policy
Taryn Southern released an album called I AM AI after having composed and produced the music using artificial intelligence algorithms with a program called ___.
Amper
SAGE was developed during the _____ war.
Cold
Which of the following Facebook statements are true
Cyberstalking
The internet service that tends to provide the most consistent speeds is _____
DSL
Because of the significant information it can reveal about the electorate, mining has become increasingly important to campaign managers
Data
In the United Sates, most consumer
EFT Act
EDI is the electronic interchange of business information using a standardized format. EDI is the acronym for ________.
Electronic Data Interchange
The acronym EFT stands fro
Electronic Funds Transfer
Which social media company has invested in technology that might allow the deaf to hear through their skin
A protocol commonly used to transfer large files from one server to another on the Internet is the _____
File Transfer Protocol
The protocol used for transmitting large files from one server to another over the internet is known as the _____Protocol (FTP)
File transfer
The following are all true for Instagram except
Instagram charges a fee to download the app.
Although it sounds ironic, searching the ______ in your area is an efficient way to search for an ISP.
Internet
A switch disinguishes between various devices within a network by their _____addresses.
MAC
Broadband is usually measured in __.
Mbps
Luke Skywalker lost his arm in episode 5.
Neuroprosthetics
A request for an electronic "echo" or response from another computer or server is called a _____
Ping
A signal transmitted every few seconds by a wireless router so that users' computers can find the WI-FI hotspot is called an______
SSID
Data-driven decision making (DDDM) can be faacilitated through a six-step process of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders.
Share
The main tools used by data analysts include which three of the following?
Spreadsheets Databases and query languages Data visualization tools
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C)
The World Wide Web was created through a collaboration led by ____
Tim Berners-Lee
The Federal ______ Commision is the main government organization that oversees Internet privacy
Trade
The central controlling agency of the Internet is:
Trick question - the Internet has no central controlling agency
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ____
WPA
In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
A learning platform that uses algorithims to adjust the content that each student sees in order to maximize learning efficency is called _____
adaptive
Social media apps integrate all of the multimedia listed except
addresses
The capacity of a particular transmission medium is called its
bandwidth
Allowing people to share a digital leger accross a network of computers
blockchain
Waze differs from Google Maps by allowing users to do all the following except
call each other
The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally
creating your visuals
RFID chips are found in many important items such as
credit cards
Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. Accourding to Google, there are five essential aspects of analytical skills including which three of the following?
curiosity, understanding context, and data strategy
E-commerse is short for
electric commerse
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
filters
Data transformation is the process of converting the ____ of data.
format
A popular cloud collaboration site for lawyers and other legal professionals is ________
glasscubes
Software piracy include all the following except
illegally learning about software.
Uses of data analytics include which 3 of the following?
improved decision making, improved patient experiences and internal procedures in health care, and improved customer service
When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.
personally
A big problem when travelling is not being able to converse in a foreign language. To address this issue, Waverly Labs developed ____an earpiece that links by bluetooth to translating apps
pilot
Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except
your anti-virus software will always ensure your files are safe
Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by _____
Artificial Intelligence
One category of E-commerse include
B2B
Which is not considered an e-commerse transaction
G2B
Select three critical factors to consider when determining the right data to select?
How will the data be collected? What types of data do you need to solve a specific problem? How much data should be selected?
Pulsed laser technology called LIDAR (Light Detection and Ranging) to detect and monitor the environment is an integral part of ___.
self-driving trucks
Taken and shared photos
snaps
Your Internet signal is carried on a ___
transmission media
Data analysts are likely to have achieved what education level when beginning their career?
Bachelor's degree
When talking about business decision-making, the acronym BDA stands for
Big Data Analyst
AviCenna is smart software being developed by IBM that will be used to assist radiologists with interpreting medical images such as ___.
CT scans
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called _____
browsers
Data analysts must blend facts and data with knowledge about the
business or organization
A major challenge facing software designers and database managers involved with ERP is that with the internet of things, the amount of ______ becomes unmanageable
data
Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.
descriptive analytics
Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.
diabetes
Theft of software occurs when someone engages in all the following except ________.
erasing a program you have purchased
Which transmission media had the largest bandwidth?
fiber optic
Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's ___.
heat
When determining how much cell phone data you need, it is important to consider
how much data you currently use
The amount of time it takes data to travel from devices to a data center and back is called _____
latency
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___.
memristor
Fiber-optic cable is ___ to install than coaxial (television) cable.
more expensive
Electronic etiquette is also known as ____
netiquette
Qualitative data that is not categorized is called nominal data. Qualitative data that is catergorized (ranked, for example) is considered ______data.
ordinal
Information is transferred over the Internet in small data groupings called __.
packets
Once you accept a Facebook friend request, you have access to their ________ Facebook page.
personal
Software that can be added to a browser to increase its functionality are called _____
plug-ins
Your posts on LinkedIn should be kept ________.
professional
A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable if impacting decisions in the present. This is known as _____AI.
scalable
WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).
send
Anything you share on Facebook can be easily ________ to others.
sent
Social networking is based on the six-degree of _____ concept that argues you can connect to anyone through a chain of no more than six introductions or personal connections.
separation
The first social media site to allow users make profiles
sixdegrees.com
In professional messages, avoid the use of emoticons and
smiley faces
It is possible to limit the amount of time snaps can be viewed on
snapchat
URL stands for ___ Resource Locator.
uniform
Your _____ on Facebook is a collection of photos and stories telling people about you and your experiences.
profile
A set of rules for communication between devices that determine how data are transmitted and received is called a
protocol
IP, FTP, HTTP, and HTTPS are all acronyms that describe different
protocols
A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called _____computing
quantum
SQL, usually pronounced "sequel", is quite useful when working with large data sets. The Q in SQL stands for ___.
query
IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .
radiologists
In order to be considered open data, databases must provide access rights so that they can be
redistributed
SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.
structured
A common SQL term used in queries is FROM. FROM allows the user to choose the ____of the database in which the query is located.
table
Domain names and Ip addresses
the Internet Corporation of Assigned Names and Numbers (ICANN)
When selecting the rigjt data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered _____data.
third-party
The specific means by which your Internet signal is carried is called its __ media. Examples include fiber optic cable, coaxial (television) cable, twisted-pair (telephone) wire, and Ethernet cable.
transmission
For a network to connect to the Internet, it must use the ___ suite of protocols.
transmission control protocol/Internet protocol (TCP/IP)
In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are)
two dashes "- -"
5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.
weaker
Collections of related fields in a database are referred to as
records