IS2200 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

In an Excel file, if a label (such as the word "panda") is used in a formula, what will appear in the cell when the Enter key is pressed? 0 ##### #REF! #VALUE!

#VALUE! #VALUE! means that the operation or function that is entered in the cell is not possible.

The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip? $14.00 $10.50 $85.00 $7.00

$10.50 (Percent in decimals * Amount) .15 * 70 = 10.50

The NIST Cybersecurity Framework is a software package for IT teams .suggested course for IT students .mandated policy from the government .voluntary guide for organizations.

.voluntary guide for organizations. The NIST Cybersecurity Framework offers voluntary guidance to organizations that help them assess and reduce cybersecurity risks.

Put the steps for how an image of a house can be created using GANs in the correct order.

1. The GAN is fed actual images of houses 2.The generator is fed random inputs 3.The generator creates a sample based on these inputs 4.If the discriminator chooses the real image instead of the generated (fake) image, the system will continue to develop/adjust generated images until the discriminator chooses the generated image, thus identifying it as real.

If you type =2 + 3 * 6 into a cell in a spreadsheet and then press Enter, what will appear in the cell? 20 30 #VALUE! Error

20

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell? 15 27 42 #VALUE!

27

The number 27 in the cell depicted above is a value, not a formula. If the user drags the cursor to the right, what will appear in the cell to the right? 0 27 #VALUE! nothing

27

A friend asks if you want to go see the new Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2.00 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase? = (10 - 8) / 8 * 100 = (10 - 8 / 8) * 100 = 10 - 8 / 8 * 100 = (10 - 8) / 10 * 100

= (10 - 8) / 8 * 100 To calculate a percentage change, first from the increased price subtract the original number, then divide the difference by the original number and then multiply x 100.

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 25, 50, and 75. (25 + 50 + 75) / 3 = = (25 + 50 + 75) * 3 = (25 + 50 + 75 ) / 4 = (25 + 50 + 75) / 3

= (25 + 50 + 75) / 3

Select the spreadsheet formula that would correctly calculate the average (mean) of the following values: 4, 2, 5, and 5. = 4 + 2 + 5 + 5 / 4 = (4 + 2 + 5 + 5) / 4 = 4 + 2 + 5 + 5 * 4 = (4 + 2 + 5 + 5) * 4

= (4 + 2 + 5 + 5) / 4

Present Value (PV)

Amount of money (principal) originally borrowed or owed

Rate

Annual percentage rate (APR) of interest

Machine-learning software is being used to explore databases of existing molecules (and their associated properties) to generate information that can be used to develop new drugs to treat a variety of conditions expeditiously and at lower costs. Firms at the forefront of this new strategy include Atomwise.. Insilico Medicine. Kebotix.. Genetex..

Atomwise.. Insilico Medicine. Kebotix..

Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions. linkchain MEM pulsar blockchain

Blockchain

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics. Pfizer Novartis BlueDot Johnson & Johnson

BlueDot

The term virus is a useful way to identify this malware for which of the following reasons? More than one answer may be correct.

Both biological and computer viruses have the ability to reproduce themselves. A virus needs a host body or computer system to do its work

Why is a denial-of-service attack (DoS attack) a threat to data availability? By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it. A DoS attack changes the data that is stored on the server, rendering it inaccurate. A DoS attack floods a system with incoming messages designed to trick an unsuspecting employee into granting unauthorized access to data. DoS attacks remove any encryptions that are placed around data, making them available without proper authentication.

By flooding a system with incoming messages, a DoS attack forces the system to shut down, rendering it inaccessible to the users who legitimately have access to it.

Who is protected by California's SB-327 for IoT Security and who is accountable for ensuring the guidelines are met? California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet. California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with Internet service providers. California's SB-327 for IoT Security helps to protect companies; the responsibility lies with Internet service providers. California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with companies who provide Internet security software.

California's SB-327 for IoT Security helps to protect consumers; the responsibility lies with makers of devices that connect with the Internet. As a measure of consumer protection, California's SB-327 for IoT Security requires that manufacturers of devices able to connect to the Internet include features that prevent unauthorized access or use of the information contained within, for instance.

Which of the following is the clearest definition of a computer virus? Malware that lives in the operating system and attacks system functionality. One of a class of cybersecurity threats that compromise a user's confidential information. Code-created malware that, when executed, damages programs and performance. Surveillance software introduced through a seemingly innocuous link.

Code-created malware that, when executed, damages programs and performance.

Transparency

Creating output that can be shared with the public about how systems use data and interact with populations should be available. Additionally, education about AI systems and processes should be more readily available.

Which type of cybersecurity breach makes a computer, network, or online service malfunction or become unavailable to users? impersonation viruses spyware DDOS attacks

DDOS attacks Distributed Denial of Service (DDOS) attacks are cybersecurity breaches that deny people the use of their computer or resource by flooding it with meaningless requests from multiple online sources.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.

Data will be altered by unauthorized users. Data will be viewed by unauthorized users.

One of Google's companies that is investigating AI and Machine Learning is called MachineDeep MindSweep MindDeep DeepMind

DeepMind.

In Google Sheets, what are two methods that allow a user to move data from one cell to another cell? Drag the data to the desired cell when the cursor changes to a drag hand. Double-click the cell and then drag the data to the desired cell. Click on the cell then choose the move data option from the Data menu. Right-click the cell and then cut and paste the data into the desired cell.

Drag the data to the desired cell when the cursor changes to a drag hand. Right-click the cell and then cut and paste the data into the desired cell.

Benefits and Costs

Executive Order 12866 requires agencies to "select those approaches that maximize net benefits (including potential economic, environmental, public health and safety, and other advantages; distributive impacts; and equity)."

Collaboration

Experts agree that a multidisciplinary effort to advance AI is needed. Authorities across many disciplines need to establish a common set of standards and platforms.

According to the National Institute of Standards Technology (NIST), the PR function of the framework involves public relations in the form of communications between organizations and their stakeholders, specifically after a cybersecurity event. True or False

False

Entry-level professionals usually have very high professional credibility. True or False

False

In financial institutions, the color red represents positive values. True or False

False

A man-in-the-mobile and a man-in-the-middle attack have what similar qualities? More than one answer may be correct. Harvesting personal information is the goal of each cyber intrusion. The user may not know the malware has infected the device. Disrupting of the device operating system is a common symptom of the attack. The malware relies on programming computer code.

Harvesting personal information is the goal of each cyber intrusion. The user may not know the malware has infected the device.

According to John McCarthy from Stanford University, artificial intelligence (AI) is "the science and engineering of making intelligent machines and intelligent computer programs. It is related to the similar task of using computers to understand ________ intelligence, but AI does not have to confine itself to biologically observable methods." business human data machine

Human

Human Values in AI

Humans have to calculate the potential risks and consequences of their actions based on a number of factors, including morals and values. Building this thinking and behavior into AI systems is one step toward increasing trust.

To quickly show if the values in a column or row are greater than, less than, or equal to a certain value, use the ________ function. IF Program AutoSUM COUNT

IF

Which of the following are neural network layers? Input Layer Hidden Layer Uncovered Layer Secured Layer

Input Layer Hidden Layer

Pivot tables provide a quick way to organize information. In most spreadsheet programs, click the ________ tab to create a pivot table. Insert Data File Style

Insert

Term

Length of loan in years

Which of the following statements best illustrates why a rootkit is described as creating a back door? A rootkit invites a cyberattack on an individual computer through a network opening. Booting up a computer without proper security effectively opens the door to cybersecurity risks. A rootkit collects confidential information, paving the way for future risks. Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system.

Like an intruder coming through a back door, a rootkit allows an unknown user into an operating system. A rootkit creates an unsafe back door though which a perpetrator gains the same access to the OS as the owner or user.

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function. AutoSUM Average PMT COUNT

PMT (The PMT function allows you to quickly determine how much a car payment would be and allows you to enter arguments such as the APR, the term of the loan, and the loan amount.)

In which of the following health care areas is AI used? Pharmaceuticals Robotic Surgery IT Operations (AIOps) Health Tracking

Pharmaceuticals Robotic Surgery Health Tracking

A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle? plan protect respond This example represents the integrity phase of the CIA triad, not the plan-protect-respond cycle.

Respond

In which of the following business areas is AI used? Sales and Marketing Accounting IT Operations (AIOps) Health Tracking

Sales and Marketing Accounting IT Operations (AIOps)

Select two methods of selecting a range of adjoining cells in Excel. Double-click on the first cell in the range and enter the last cell in the range Select the first cell in the range and drag down to the last cell. Right-click on the first cell in the range and enter the last cell in the range. Select the first cell in the range then hold down the shift key and select the last cell in the range.

Select the first cell in the range and drag down to the last cell. Select the first cell in the range then hold down the shift key and select the last cell in the range.

Interagency Coordination

Sharing of experiences and best practices for AI governance should be maintained between governmental agencies.

Period

Single payment

Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing. much faster faster slower about the same

Slower

Computer programs that allow users to easily arrange, calculate, and present numerical data are called ________.

Spreadsheets

________ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius. GroceryStop Spaceship Starship Segway

Starship

Scientific Integrity and Information Quality

The establishment and maintenance of high standards as they relate to AI information quality and decision making can assist in gaining public trust and confidence in AI.

Select the true statements about BlueDot's pandemic detection software. Analysis of data does not help to determine the probability of a pandemic. The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time. Serves as an early warning system for identifying pandemics. The software uses artificial intelligence to predict pandemics.

The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time. Serves as an early warning system for identifying pandemics. The software uses artificial intelligence to predict pandemics.

Disclosure and Transparency

There must be a method to detect when AI is in use as well as a way to address possible impacts of AI on end-users.

What do all cybersecurity threats have in common? They are connected to the loss of information, software, or hardware. Their impact is entirely preventable with proper assessment and actions. They are created by hackers and other people seeking to do harm. Their specific causes are not as important as their potential for ongoing harm.

They are connected to the loss of information, software, or hardware.

How does spyware potentially harm the individual user? This malware steals confidential information from the user. Spyware effects changes in a user's operating system. Spyware erases data without the user's knowledge. As a virus, spyware replicates itself and invades many areas of a system.

This malware steals confidential information from the user.

Exaggeration adversely impacts readers' perception of the credibility of a business message. True or False

True

Hacking into an organization's email servers is a crime that can be prosecuted under the Stored Communications Act. True or False

True The Stored Communications Act prohibits the intentional unauthorized access of an organization's electronic communication services, including email.

A function that looks for a value in the leftmost column of a table, and then returns a value located in the same row as the first value, is called a Value code. Payment function. VLookup. IF-THEN formula.

VLookup.

In Apple iWork's Numbers the freeze options are located under the Table tab. In Microsoft Excel and Google sheets the freeze cells or panes options are found in the ________ menu. View Windows Home Insert

View

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals. longer weaker shorter stronger

Weaker

Public Participation

When financially feasible and including adherence to legal requirements, organizations should allow the public to be part of the AI rule-making processes and procedures.

From the following list, select all situations that lead you to suspect the presence of adware. When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology. Almost anything you select while shopping at an online retailer comes with suggestions "you might also like" and "frequently purchased together."

When looking up information on the Dallas Cowboys, you notice an ad for a Dallas Cowboys jersey. You have been looking for a car bike rack, and four out of five ads popping up on your browser show types of racks and other sporting gear. After you buy and download a drawing program, you begin seeing ads for interactive drawing games and other creative technology.

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning. experiential modified adaptive changing

adaptive

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer. advanced audionics adaptive robotics improved aroma distinction capabilities secure transmission protocols

adaptive robotics

Which of the following would be prohibited under the Electronic Communications Protection Act? an employee leaking a confidential conversation they overheard negligence with consumer's data cyberstalking an employee leaking confidential emails they were not authorized to receive

an employee leaking confidential emails they were not authorized to receive The Electronic Communications Protection Act provides protection for electronic communications that are stored or in transit. As such, the employee who leaks a confidential email that they were not authorized to view would be prohibited under the Electronic Communication Protection Act.

Social engineering is used to target people whom are likely to be aware of cybersecurity threats. are not cautious about giving out confidential or sensitive information. are less likely to notice that their identity has been stolen and misused. do not use strong passwords or do not change their passwords frequently.

are not cautious about giving out confidential or sensitive information.

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare. unfair peaceful artificial asymmetric

asymmetric

Most business arguments employ a deductive approach. When employing this approach, you are most likely to avoid stating your position regarding any business issue. provide supporting reasons first followed by the primary message. begin by stating the primary message, which is typically a recommendation. begin by making a call to action for your audience to follow. begin by stating the supporting reasons followed by your call to action.

begin by stating the primary message, which is typically a recommendation.

Saving a spreadsheet file in .csv format only saves the cell values. cell styles. cell formulas. text cells.

cell values.

The use of computer models that are designed to simulate human thought processes is referred to as ________ computing and is often used in complex environments where solutions may be ambiguous or difficult to uncover. psychosomatic psychological cognitive memory

cognitive

A type of artificial intelligence that uses data and algorithms to create learning is called ________ learning. The algorithms that are developed are designed to execute specific tasks. artificial machine deep assisted

deep

Which of the following are guiding principles for the ethical use of AI? design AI technologies that are socially beneficial avoid forming or reinforcing unfair bias in AI systems follow laws, rules, and standards covering AI design AI systems that focus on profitability

design AI technologies that are socially beneficial avoid forming or reinforcing unfair bias in AI systems follow laws, rules, and standards covering AI

Sadie, the expeditor at RingGro Manufacturing, writes a memo asking her manager to buy her a new computerized system for tracking customer orders. She claims that if she does not get this system, chronically late deliveries will ensue. Her manager turns down her request. Sadie made the mistake of using either/or logic .an indirect structure. an unsupported generalization. a weak analogy. you-voice.

either/or logic

What is typically included in the reviewing stage of writing an effective business message? setting a positive and other-oriented tone ensuring that the communication is fair finding the needs of the audience identifying the primary message and key points making the message easy to navigate

ensuring that the communication is fair

Which of the following statements are true about Nanorobots? have the capacity to carry medication or miniature tool are intended to stay in the patient forever used to constantly monitor our bodies for maladies and other symptoms can build and manipulate things precisely where components are at a scale of a nanometer

have the capacity to carry medication or miniature tool can build and manipulate things precisely where components are at a scale of a nanometer used to constantly monitor our bodies for maladies and other symptoms

The active cell in a spreadsheet is the cell into which the user can input data. In most spreadsheet programs the active cell can be identified by which three items? heavy border red lettering highlighted column and row headings name box (in the upper left corner of the sheet)

heavy border highlighted column and row headings name box (in the upper left corner of the sheet)

Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter. optical flash holographic cloud

holographic (Since the beams strike from different angles, many bits of data can be stored in the same space.)

Analyzing a business problem typically involves ignoring audience constraints. making conclusions based on facts. imposing your priorities on the situation. exaggerating the problem. being flexible and not taking positions.

making conclusions based on facts.

Which of the following is a goal of confidentiality as defined by the CIA triad? preventing information from being readily available classifying information as essential or unessential making sure the right people have access to secure information determining who has access to essential data

making sure the right people have access to secure information

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a memristor. pixel. capacitor. receptor.

memristor.

Each loan payment is referred to as a(n) principal. period. term. interest.

period.

Which of the following is an example of data at rest? More than one answer may be correct.

photos stored on a phone's memory card backup files stored on an offsite server (Data at rest is data that is not moving through a network. Photos on a memory card and files stored on an offsite server are both examples of data that remain in one place.)

The amount of money borrowed in a loan is often referred to as the loan's balance or the ________ of the loan. period principal term interest

principal

The U.S. Census Bureau is using differential ________ to make census data secure and private. security privacy firewall encryption

privacy

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing. nuclear atomic quantum plasma

quantum

A cybersecurity exploit allows a hacker or intruder to add information about the system's vulnerability to a database shared with other hackers. identify the cybersecurity vulnerabilities in an organization's system or network. remotely access a network, gain privileges, and make unauthorized changes. flood a network with troublesome requests from multiple sources across the web.

remotely access a network, gain privileges, and make unauthorized changes.

What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework? restore function respond function reset function restrict function

respond function

To Insert a Column to the left of Column D in an OpenOffic Calc file, select Column D and then ________ and select Insert. right-click left-click double-click shift-click

right-click

In a spreadsheet, a horizontal line of cells is called a column. row. cell. field.

row

Which of the following are ways Internet of Medical Things (IoMT) has been used during the pandemic? self-screening at home administration of COVID-19 vaccines regional integration of health records rapid COVID-19 screening

self-screening at home regional integration of health records rapid COVID-19 screening

Machine learning is the field of study that gives computers the ability to learn without being explicitly programmed. Which of the following are categories of machine learning? supervised unsupervised reinforced regression

supervised unsupervised reinforced

Which two of the following refer to the amount of money a lender charges for borrowing money (excluding any origination fees)? principal the APR (annual percentage rate) the interest rate term

the APR (annual percentage rate) the interest rate

Which of the following must remain confidential to achieve cybersecurity goals? More than one answer may be correct.

the logins and passwords of authorized users private or sensitive data and information the specifications of the organization's IT systems

You see ###### in a cell. This means that this is an error. The cell contains an invalid cell reference. this is not an error. The cell needs to be expanded in order to display the entire value. this is an error. It indicates that a label has been entered into a formula. this is not an error. A series of #### symbols indicates that the formula is dividing a value by zero.

this is not an error. The cell needs to be expanded in order to display the entire value.

Which type of cybersecurity breach can cause the most damage to an organization's systems, data, and information? DDOS attacks spyware viruses packet sniffers

viruses

Chavez, a human resources manager of K8 Fabrics believes that the company can improve employee retention rates by improving employee benefits. In outlining his argument to the company's leadership team, he points out that a large technology firm had success with such a strategy. Chavez' message fails to convince K8's leadership team. What is the likely cause of their reaction? slanting of facts exaggeration unsupported generalization weak analogy faulty cause/effect argument

weak analogy As you make sense of business issues, you will often try to identify analogies with other organizations, people, or things. Strong analogies serve to bolster your arguments. However, weak analogies may lead to inaccurate conclusions and recommendations. Chavez made an analogy to a completely dissimilar business, so it was weak.

A meta message is the gist of the primary message that the subject line of a topic communicates. what people take away from a communication. the unofficial message that travels through the grapevine .the message communicated using an asynchronous mode of communication .the direct message in which the autonomous voice of the speaker is most prominent.

what people take away from a communication.

In which situation should the origin of information be authenticated to protect data integrity? when a news website subscriber logs in to access articles when electronic votes are submitted during an election when a bank customer checks her account balance at an ATM when a store cashier enters a coupon code for a purchase

when electronic votes are submitted during an election

Ransomware is typically introduced into a network by a ________ and to an individual computer by a Trojan horse. worm spyware web crawler MitM

worm Ransomware usually infects a network through a worm, or a virus that moves through it. It often infects an individual computer through a Trojan horse, or a virus carried by an innocent-looking message.


Set pelajaran terkait

Module 12: Healthy Weight and Body Composition

View Set

Accident and Health Insurance- Basics

View Set

Ethics: Chapter 3 - Tort Law & Intentional Torts

View Set

Anatomy & Physiology: Cardiac Conduction System

View Set

Exam 2 med surg chapter level 1-5

View Set

3 - Life Insurance Policies - Provisions, Options and Riders Part A (15 questions)

View Set

Enterprise Networks Exam 1 Study Guide

View Set