CIS EXAM 3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

If you have compromised your U.S. debit card Federal law says that if you tell your bank within two business days of learning about it

$50.00

Twitter recommends that no more than ________ hashtags should be used per Tweet.

2

An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ________.

Acceptable USe Policy

Taryn Southern released an album called I AM AI after having composed and produced the music using artificial intelligence algorithms with a program called ___.

Amper

SAGE was developed during the _____ war.

Cold

Which of the following Facebook statements are true

Cyberstalking

The internet service that tends to provide the most consistent speeds is _____

DSL

Because of the significant information it can reveal about the electorate, mining has become increasingly important to campaign managers

Data

In the United Sates, most consumer

EFT Act

EDI is the electronic interchange of business information using a standardized format. EDI is the acronym for ________.

Electronic Data Interchange

The acronym EFT stands fro

Electronic Funds Transfer

Which social media company has invested in technology that might allow the deaf to hear through their skin

Facebook

A protocol commonly used to transfer large files from one server to another on the Internet is the _____

File Transfer Protocol

The protocol used for transmitting large files from one server to another over the internet is known as the _____Protocol (FTP)

File transfer

The following are all true for Instagram except

Instagram charges a fee to download the app.

Although it sounds ironic, searching the ______ in your area is an efficient way to search for an ISP.

Internet

A switch disinguishes between various devices within a network by their _____addresses.

MAC

Broadband is usually measured in __.

Mbps

Luke Skywalker lost his arm in episode 5.

Neuroprosthetics

A request for an electronic "echo" or response from another computer or server is called a _____

Ping

A signal transmitted every few seconds by a wireless router so that users' computers can find the WI-FI hotspot is called an______

SSID

Data-driven decision making (DDDM) can be faacilitated through a six-step process of Ask, Prepare, Process, Analysis, Share, and Act. Which of these steps refers to creating visualizations and presentations for key stakeholders.

Share

The main tools used by data analysts include which three of the following?

Spreadsheets Databases and query languages Data visualization tools

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

The World Wide Web was created through a collaboration led by ____

Tim Berners-Lee

The Federal ______ Commision is the main government organization that oversees Internet privacy

Trade

The central controlling agency of the Internet is:

Trick question - the Internet has no central controlling agency

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ____

WPA

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

A learning platform that uses algorithims to adjust the content that each student sees in order to maximize learning efficency is called _____

adaptive

Social media apps integrate all of the multimedia listed except

addresses

The capacity of a particular transmission medium is called its

bandwidth

Allowing people to share a digital leger accross a network of computers

blockchain

Waze differs from Google Maps by allowing users to do all the following except

call each other

The 3-step data visualization process consists of exploring the data sets for pattern, then planning for visuals, and finally

creating your visuals

RFID chips are found in many important items such as

credit cards

Analytical skills necessary for a data analyst include the characteristics and capabilities that allow for the observation, research, and interpretation of a problem or change in a desired state. Accourding to Google, there are five essential aspects of analytical skills including which three of the following?

curiosity, understanding context, and data strategy

E-commerse is short for

electric commerse

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

filters

Data transformation is the process of converting the ____ of data.

format

A popular cloud collaboration site for lawyers and other legal professionals is ________

glasscubes

Software piracy include all the following except

illegally learning about software.

Uses of data analytics include which 3 of the following?

improved decision making, improved patient experiences and internal procedures in health care, and improved customer service

When data is anonymized, the PII is eliminated or encrypted. PII includes names, Social Security numbers, addresses, and more and stands for ______ identifiable information.

personally

A big problem when travelling is not being able to converse in a foreign language. To address this issue, Waverly Labs developed ____an earpiece that links by bluetooth to translating apps

pilot

Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except

your anti-virus software will always ensure your files are safe

Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by _____

Artificial Intelligence

One category of E-commerse include

B2B

Which is not considered an e-commerse transaction

G2B

Select three critical factors to consider when determining the right data to select?

How will the data be collected? What types of data do you need to solve a specific problem? How much data should be selected?

Pulsed laser technology called LIDAR (Light Detection and Ranging) to detect and monitor the environment is an integral part of ___.

self-driving trucks

Taken and shared photos

snaps

Your Internet signal is carried on a ___

transmission media

Data analysts are likely to have achieved what education level when beginning their career?

Bachelor's degree

When talking about business decision-making, the acronym BDA stands for

Big Data Analyst

AviCenna is smart software being developed by IBM that will be used to assist radiologists with interpreting medical images such as ___.

CT scans

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called _____

browsers

Data analysts must blend facts and data with knowledge about the

business or organization

A major challenge facing software designers and database managers involved with ERP is that with the internet of things, the amount of ______ becomes unmanageable

data

Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.

descriptive analytics

Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____.

diabetes

Theft of software occurs when someone engages in all the following except ________.

erasing a program you have purchased

Which transmission media had the largest bandwidth?

fiber optic

Under development at MIT, photonic crystals allow solar panels to be twice as efficient by absorbing and converting the sun's ___.

heat

When determining how much cell phone data you need, it is important to consider

how much data you currently use

The amount of time it takes data to travel from devices to a data center and back is called _____

latency

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___.

memristor

Fiber-optic cable is ___ to install than coaxial (television) cable.

more expensive

Electronic etiquette is also known as ____

netiquette

Qualitative data that is not categorized is called nominal data. Qualitative data that is catergorized (ranked, for example) is considered ______data.

ordinal

Information is transferred over the Internet in small data groupings called __.

packets

Once you accept a Facebook friend request, you have access to their ________ Facebook page.

personal

Software that can be added to a browser to increase its functionality are called _____

plug-ins

Your posts on LinkedIn should be kept ________.

professional

A major trend in data analytics is the use of artificial intelligence to focus on small data which is more precise, using small datasets that are capable if impacting decisions in the present. This is known as _____AI.

scalable

WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).

send

Anything you share on Facebook can be easily ________ to others.

sent

Social networking is based on the six-degree of _____ concept that argues you can connect to anyone through a chain of no more than six introductions or personal connections.

separation

The first social media site to allow users make profiles

sixdegrees.com

In professional messages, avoid the use of emoticons and

smiley faces

It is possible to limit the amount of time snaps can be viewed on

snapchat

URL stands for ___ Resource Locator.

uniform

Your _____ on Facebook is a collection of photos and stories telling people about you and your experiences.

profile

A set of rules for communication between devices that determine how data are transmitted and received is called a

protocol

IP, FTP, HTTP, and HTTPS are all acronyms that describe different

protocols

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called _____computing

quantum

SQL, usually pronounced "sequel", is quite useful when working with large data sets. The Q in SQL stands for ___.

query

IBM is developing smart software called AviCenna. AviCenna reviews medical images such as CT scans, potentially decreasing the workload and increasing the diagnoses accuracy of ___ .

radiologists

In order to be considered open data, databases must provide access rights so that they can be

redistributed

SQL allows users to isolate specific information contained in a database, as well as to aid in the selection, creation, addition, and extraction of data from a database. SQL stands for ______ query language.

structured

A common SQL term used in queries is FROM. FROM allows the user to choose the ____of the database in which the query is located.

table

Domain names and Ip addresses

the Internet Corporation of Assigned Names and Numbers (ICANN)

When selecting the rigjt data, it is important to be aware of the source of the data. For example, data that is sold by an entity that didn't actually collect the data is considered _____data.

third-party

The specific means by which your Internet signal is carried is called its __ media. Examples include fiber optic cable, coaxial (television) cable, twisted-pair (telephone) wire, and Ethernet cable.

transmission

For a network to connect to the Internet, it must use the ___ suite of protocols.

transmission control protocol/Internet protocol (TCP/IP)

In order to make understanding and interpretation of SQL queries easier, users have the ability to add comments. The symbol(s) that will tell SQL that an entry is a comment and should not be used in the query is(are)

two dashes "- -"

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ___ microwave signals.

weaker

Collections of related fields in a database are referred to as

records


Set pelajaran terkait

Sagittal section of Brain Figure 11.15

View Set

Chapter 3 : The Energetics of Life

View Set

Module 33: Forgetting, Memory Construction, and Memory Improvement

View Set