Midterm 2 Study Guide
hat would be the value of the variable "c" after running the following R code? a = 3 b = 5 if( a <= b ){ c = 2 }else{ c = 5 }
<= is less than or equal to, c=2
What are two operations a computer can perform directly on binary data?
Arithmetic, Logical
What type of data structure can hold many values? Float Array Character Integer
Array
The computer code "g = 4" is an example of which of the following? Binary Loop Function Assignment
Assignment
An __ is a common term for coding error that causes a program to fail or produce an incorrect result
Bug
Which of the following is not a social engineering technique? Group of answer choices Careless Internet surfing Sending an email posing as an IT technician requesting a password change. Posing as an exterminator to enter a restricted building None of the choices are social engineering techniques.
Careless internet surfing
Which of the following best describes "Artificial Intelligence"? Group of answer choices Computer software that attempts to perform human-like tasks Computer algorithms that are able to learn and adapt without explicit instructions A a process or set of rules to be followed by a computer in calculations or other problem-solving operations Acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, such as in the forms of decisions.
Computer software that attempts to perform human-like tasks
When cyber attackers send more information requests than the target computer system can handle, the computer system crashes and this is referred to as________________________ Group of answer choices Denial-of-service attack Distributed denial-of-service attack Hacking Logic Bomb
Denial-of-service attack
Backup and recovery procedures are recommended only to safeguard against hardware/software failures. Group of answer choices True False
False
Computer programming commonly involves input and manipulation of binary data (0s and 1s) by the programmer. True/False
False
Exact text and shape alignment doesn't play a big role in a slides readability. Group of answer choices True False
False
Low level employees pose the greatest threat to information security. Group of answer choices True False
False
Running R code usually involves compiling the code into an executable file, from which the program can be run. True/False
False, not re-compiled every time, interpreted code
A compiler transforms human-readable code into an executable that can be run on any computer architecture. True/False
False, not specific computer architecture.
Humans most commonly represent number data in base 2 format. True/False
False. Base 10
Select the fonts from the list that are best suited for use in a presentation Group of answer choicesHelveticaArialGeorgiaTimes New RomanComic SansFreestyle Script
Helvetica, arial, georgia
Which of the following are intentional threats to information security (select all that apply)? Group of answer choices Information extortion Cyberterrorism Opening questionable e-mails Using weak passwords
Information extortion, cyberterrorism
Backing up computer data to an external hard drive will reduce information security risks. Group of answer choices It depends False True
It depends
Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface... Group of answer choices because it is difficult to find a great picture It is expensive to subscribe to a royalty free website It is difficult to edit pictures to fit a slide None of the options All of the options
It is expensive to subscribe to a royalty free website
Match the IDE with its programming language. RStudio, Spyder, CLion. R, Python, C/C++, Xcode, Dolphyn
RStudio- R, Spyder- Python, CLion- C/C++
A Trojan horse is _________________________ Group of answer choices Software programs that hide in other computer programs and reveal their designed behavior only when they are activated A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive act at certain time or date Segment of computer code that performs malicious actions by attaching to another computer program Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program)
Reveal only when activated
A standardized programming language used in working with relational databases is called ___________. Group of answer choices SQL Java R Oracle
SQL
What is the basic unit of organization within linear presentation software? Group of answer choices Slide Deck Cell Photo
Slide
Which of the following are advantages of using an IDE for computer programming (select all that apply)? They highlight commands/functions (syntax highlighting) It gives the clearest view of what is happening "behind the scenes" during code build and development They provide graphical elements such as buttons and plots They facilitate debugging at the same time code is being written.
They highlight command/functions, provide graphical elements such as buttons and plots, facilitate debugging
What are four types of threats? Group of answer choices Trojan Worm Virus Malware Malintent Virology Annelids Troy
Trojan/Worm/Virus/Malware
A recipe is an example of an algorithm. T/F
True
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security. Group of answer choices True False
True
T/F: A programming language defines a set of rules you have to adhere to
True
Which of the following is an unintentional threat to information security? Group of answer choices Using weak passwords Cyberterrorism Information extortion Alien software
Using weak pass
All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________ Group of answer choices Virus Trojan horse Logic Bomb Back Door
VIRUS
Match the following threats with their definitions: Group of answer choicesVirus [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Worm [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Phishing Attack [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Spear Phishing [ Choose ] Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information. Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program.
Virus - Segment of computer code that performs malicious actions by attaching to another computer program. Worm - Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). Phishing attack- Deception Spear- find out as much as tey can
________________ is a piece of code that performs a malicious action and will replicate or spread by itself Group of answer choicesWormVirusPhishing attackSpear phishing
Worm
A compiler translates ____ commands into ___ commands.
human readable, computer readable
Provide the next number in the following Fibonacci sequence: 1, 1, 2, 3, _______
add up two numbers before next, next = 5
In which scenario might a company be most likely to chose to use a NoSQL database? Their database will have many repeated/redundant entries and blank data fields Their database will be extremely large and have unknown or complicated relationships between data. It is a small business, and will mostly use the database to manage customers and transactions.
large and unknown/complicated relationships btwn data
Which of the following are common elements of a computer program (select all that apply)? Loop Logical test Function, R IDE
loop, logical test, function
Which of the following terms could be used to refer to a database that is NOT relational? All of these NoSQL SQL None of these Flat-Table
nosql, flat able
______________ is a decentralized currency that is transferred on a peer-to-peer network Bitcoin eMoney Cryptocurrency Blockchain
bitcoin
The protocol for the secure transfer of money via the internet without a third party is referred to as_________________ Blockchain Cryptocurrency Bitcoin Cash App
blockchain
Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate? Group of answer choices Blockchain Bitcoin Cryptocurrency eStorage
blockchain
Another name for Intelligent agent is ____________________ Group of answer choices bot Artificial Intelligence OLAP No answer text provided.
bot
_____________________ allows you to change the hourly pay rate of an employee in one table and that change is automatically made to every table in the database that contains data about the employee
cascade update
Which of the following AI software applications would most likely not work 'off-the-shelf' and instead require a company's custom training data? Group of answer choices A "chatbot" to provide customer support Speech-to-text software Facial recognition software for a security company.
chatbot
Which of the following would NOT be considered an advantage of non-linear presentation software? Group of answer choices It follows a clear and logical sequence. It provides a graphical overview of the presentation content. It allows the presenter to easily customize the presentation to the audience or discussion. It helps to create an aesthetically pleasing and interactive presentation format
clear and logical sequence
Which of the following would be considered a database, or could utilize a database (select all that apply)? Customer transaction records A cloud server. Library card catalog An inventory
customer transaction, library card, inventory
Which of the following is typically needed to support decision-making? Group of answer choices Translation of information into data Translation of data into information
data -> information
If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using? Group of answer choices Data Mining Marketing Advertising Database
data mining
A relational database typically consists of one large two-dimensional table. T/F
false
The data collected by Big Data is organized in relational databases before it is used for business decision making. Group of answer choices True False
false
In the R language, "mean" is an example of a: Group of answer choices Function Loop Definition Assignment
function
Which of the following are common examples of artificial intelligence software you are likely to encounter on a daily basis? Group of answer choicesGoogle image search suggests images similar to the one you clicked on.YouTube suggests videos similar to the one you are watchingAmazon suggests other products you might be interested in purchasing based on past purchasesCanvas automatically gives feedback on why you missed a quiz question based on data from the whole class
google images, yt, amazon
All of the following are characteristics of cloud computing EXCEPT Group of answer choices High cost On-Demand Service Flexibility to scale up Pooling resources
high cost
All of the following are reasons to use a database except Manage and analyze complex data stores large data Perform calculations and display charts Manages more data
perform calc and display
A function... Group of answer choices provides a defined output given a set of inputs provides an unstructured output given a set of inputs provides an undefined output given a set of inputs provides an structured output given a set of inputs
provides a defined output given a set of inputs
Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply) Group of answer choices Relational databases reduce or eliminate storage of redundant data Relational databases eliminate storage of blank data values Relational databases are easier to understand and visualize None of these All of these
reduce storage, blank
__________ refers to the rules used to ensure that data between related tables are valid.
referential integrity
Whereas phishing attacks are ________, denial of service attacks are ________. Group of answer choices remote attacks requiring user action; remote attacks requiring no user action remote attacks requiring no user action; remote attacks requiring user action remote attacks requiring no user action; attacks by a programmer developing a system distributed remote attacks requiring user action; attacks by a programmer developing a system
remote attacks requiring user action; remote attacks requiring NO user action
All of the following are unintentional threats to information security EXCEPT Group of answer choices Sabotage or vandalism Carelessness with computer devices opening questionable emails Poor password selection and use
sabotage or vandalism
Which of the following is an application in which artificial intelligence can potentially provide a competitive advantage in the field of marketing and business? (select all that apply) Group of answer choices Selecting advertisements based on purchase history Automatically adjusting the cost of a product based on supply and demand Predicting future product demand in order to determine warehouse needs Predicting which products may be most desirable for customers
selecting ads, auto adjusting based on s&d, predicting future product, predicting which products may be most desirable for customers
__________________ collects personal information about users' behavior without their knowledge Group of answer choices Spyware Adware Spamware
spyware
A standardized programming language used in working with relational databases is called ___________. SQL Oracle R Java
sql
A DBMS Manages structure and controls access to data Manages access to data None of the options Manages structure of data
sturcture and control acccess
Not all cash app transfers require users to have a bank account Group of answer choicesTrueFalse
true
T/F: The primary key is a field that uniquely and completely identifies a record.
true
You should regularly delete any spyware that might be residing on your computer, because it may be dangerous. Group of answer choicesTrueFalse
true
Which of the following statements best describes a "phishing attack"? Group of answer choices Use of deception to acquire sensitive personal information by masquerading as official looking e-mails or instant messages. Segment of computer code that performs malicious actions by attaching to another computer program. Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). The perpetrators find out as much information about an individual as possible to improve their chances that hacking techniques will obtain sensitive, personal information.
use of deception to acquire sensitive
In which of the following instances would you likely NOT want to use MS access for database management? The database is very large with hundreds of Gigabytes of information The company wants a user-friendly interface for inputting and querying data The database has well-defined and known relationships between different data tables. The database is used by a large company with dozens of simultaneous users
very large, dozens of users
What are the three attributes of Big Data Volume, variety, velocity Volume, Type, and diversity Volume, structure and velocity Volume, velocity and visualization
volume, varieyt, veloivty
An information system's _________ is the likelihood that the system or resource will be compromised by a ________ that will result in its ________ to further attacks. Group of answer choices vulnerability; threat; exposure threat; vulnerability; exposure vulnerability; security; threat threat; vulnerability; liability
vulnerability, threat, exposure