Pt 2
What is a mathmatical model?
how different things are related so it can make predictions
Ai produces a model...what is that?
how things relate to one another, mental or conceptual (qualitative)
non linear slides
hyperlinked, can go from slide 5 to 97
WHat is crypocurrency + ex
medium of exchange, created and stored
Different database software solutions?
nMySQL, Microsoft Access, Microsoft SQL Server, Libre Office Base
Spreadsheet vs. Database
no relational vs relational
what is the current use of Blockchain technology
online banking transaction growth retail acceptance of electronic transactions online purchases in app purchases
current and future uses of blockchain technology
online banking, in ap purchase internet of things, autonomous objects
Why is there so much attention on cybersecurity?
online commerce global trade and travel remote/flexible work
Infostealers
passowrds and usernames steal
Adware
pop ups
Linear Slides
ppt, most of time
denial of service attack
too much info that the computer crashes
trojan horse vs back door vs logic bomb
trojan horse = hide in other programs reveal designed behavior when activated back door=password only know to attacker to access a system at will logic bomb= segment of code embedded within organization designed to be destructive at certain time or date
social engineering
use of social skills to trick or manipulate ex person poses as IT enter building with fake identification
Customizing your toolbars will slow down your workflow
False
The data collected by Big Data is organized in relational databases before it is used for business decision making.
False
Backup and recovery procedures are recommended only to safeguard against hardware/software failures.
False backups can protect against threats such as information extortion attacks.
potential issues with AI
-can find patterns that are not there ex google dogs and a moose comes up, - can be unpredictable
What is the different btwn data and information?
1. The key difference between data and information is that data itself is numerical values but information is the combination of such data
social marketing proccess
1. fan acquisition 2. engagement 3. amplification 4. community 5. brand strength fea acb
Which of the following would NOT be considered an advantage of non-linear presentation software? A. It follows a clear and logical sequence. B. It provides a graphical overview of the presentation content. C. It allows the presenter to easily customize the presentation to the audience or discussion. D. It helps to create an aesthetically pleasing and interactive presentation format.
A
__________________ collects personal information about users' behavior without their knowledge A. Spyware B. Adware C. Spamware
A
Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface... A. because it is difficult to find a great picture B. It is expensive to subscribe to a royalty free website C. It is difficult to edit pictures to fit a slide D. None of the options E. All of the options
A because it is difficult to find a great picture
Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply) A. Relational databases eliminate storage of blank data values B. Relational databases reduce or eliminate storage of redundant data C. All of these D. Relational databases are easier to understand and visualize None of these
A, B
Which of the following are common examples of artificial intelligence software you are likely to encounter on a daily basis? A. Google image search suggests images similar to the one you clicked on. B. YouTube suggests videos similar to the one you are watching C. Amazon suggests other products you might be interested in purchasing based on past purchases D. Canvas automatically gives feedback on why you missed a quiz question based on data from the whole class
A, B. C
Which of the following would be considered a database, or could utilize a database (select all that apply)? A. An inventory B. A cloud server C. Customer transaction records D. Library card catalog
A,C,D
All of the following are characteristics of cloud computing EXCEPT A. High cost B. On-Demand Service C. Flexibility to scale up D. Pooling resources
A.
What are the three attributes of Big Data A. Volume, variety, velocity B. Volume, Type, and diversity C. Volume, structure and velocity D. Volume, velocity and visualization
A.
Which of the following AI software applications would most likely not work 'off-the-shelf' and instead require a company's custom training data? A. A "chatbot" to provide customer support B. Speech-to-text software C. Facial recognition software for a security company.
A.
What is the basic unit of organization within linear presentation software? Slide Deck Cell Photo
A. Slide
Select the reasons why we avoid using animations in PowerPoint? Animations = lot of time unless good PowerPoint skills Animations = problems with mouse during presentation Animations = PC & mouse far from you during presentation Animations = 'show', not 'facts'
All
Which of the following is an application in which artificial intelligence can potentially provide a competitive advantage in the field of marketing and business? (select all that apply) Selecting advertisements based on purchase history Automatically adjusting the cost of a product based on supply and demand Predicting future product demand in order to determine warehouse needs Predicting which products may be most desirable for customers
All
Which tool allows text or images to move, appear, or otherwise change appearance within a single presentation slide? Animations Transitions Presenter view Hyperlinks
Animations
A Trojan horse is _________________________ A. Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program) B. Software programs that hide in other computer programs and reveal their designed behavior only when they are activated C. A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive act at certain time or date D. Segment of computer code that performs malicious actions by attaching to another computer program
B
Which of the following is typically needed to support decision-making? A. Translation of information into data B. Translation of data into information
B
All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________ A. Trojan horse B. Virus C. Back Door D. Logic Bomb
B virus
______________ is a decentralized currency that is transferred on a peer-to-peer network Bitcoin eMoney Cryptocurrency Blockchain
Bitcoin
The protocol for the secure transfer of money via the internet without a third party is referred to as_________________ Blockchain Cryptocurrency Bitcoin Cash App
Blockchain
Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate? Blockchain Bitcoin Cryptocurrency eStorage
Blockchain
Which of the following best describes "Artificial Intelligence"? A. Computer software that attempts to perform human-like tasks B. Computer algorithms that are able to learn and adapt without explicit instructions C. A process or set of rules to be followed by a computer in calculations or other problem-solving operations D. Acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, such as in the forms of decisions.
Computer software that attempts to perform human-like tasks
When cyber attackers send more information requests than the target computer system can handle, the computer system crashes and this is referred to as________________________ Hacking Distributed denial-of-service attack Logic Bomb Denial-of-service attack
D
If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using? A. Data Mining B. Marketing C. Advertising D. Database
Data Mining
A graphic organizer in PowerPoint includes the reading view
F
Low level employees pose the greatest threat to information security.
FAlse
Select the typical components of a slide Footer Slide number Body Header Margin Layout Width Border
Footer Slide number Body Header
Select the fonts from the list that are best suited for use in a presentation Helvetica Arial Georgia Times New Roman Comic Sans Freestyle Script
Helvecta, Arial, Georgia
What is the primary tool that allows users to create non-linear presentations using software such as Powerpoint or Keynote? Hyperlinks Text Boxes Transitions Magic Move
Hyperlinks
Backing up computer data to an external hard drive will reduce information security risks. T F It depends
It depends
Presentations created in Microsoft Powerpoint follow a _______________ format. Linear and/or Non-Linear Linear Non-Linear
Linear and/or Non-Linear
Which feature would you activate to enable the tools needed to measure and locate your objects on the slide? Rulers Tabs Grid Measure Inspect
Rulers, grid,
The six "S" to success include the following items Scope Sequence Story Structure Schedule Simplicity Speed Service Sequel Seminal experience Sophistication
Scope Story Structure Schedule Simplicity Speed
What is the basic unit of organization within linear presentation software? Slide Deck Cell Photo
Slide
What is SaaS?
Software as a Service (SaaS) is a derivative of Platform as a Service (PaaS). Software as a Service provides on-demand online access to specific software applications or suites without the need for local installation (or even local hardware and OS requirements in many cases).
To change the distance between grid lines you would adjust the Spacing Interval Measurement Association None of the options
Spacing
the six S for effective slides
Story Scope Simplicity Structure Scedule Speed
Keyboard shortcuts save time
True
Layering effects in PowerPoint can affect the printed handouts readability
True
Not all cash app transfers require users to have a bank account
True most mobile money transfers do not require a bank account.
Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.
Trye
spear phishing
as much info as possible to improve chances that it will obtain personal info
uses of Blockchain in cases
blockchain can be used for background checks secure documents storage birth registries land registries financial services healthcare airlines
Another name for Intelligent agent is ____________________
bot
Applications of AI in BUsiness
chat bots, system forecasting whether customer will buy,
crypocurrency
cryptocurrency is a medium of exchange created stored electronically in the Blockchain using encryption techniques to control the creation of monitor units in to verify the transfer of funds bitcoin is the best known example
Bitcoin
decentralized digital currency transferred peer-peer network
phishing attack
emails or spam masquerade
bitcoin mining
fee based accounting function for recording transactions ( as high as 130000 block for 10 minutes ) mining allows participants to discover and record new blocks
keystroke loggers
records keyboard input
screen scrapers
recordsscreen actuivity
Communication controls
secure the movement of data across networks
blockchain technology
software protocol for the secure transfer of money property or contact via the Internet without a third-party Blockchain is a distributed ledger technology that is currently used by about 60% of the worlds largest corporations
spamware vs spyware
spamware uses ur contacts to send spam emails spyware collects info w/o knowledge
spyware vs spam vs cookies
spyware is software monitoring activities on computer spam is unsolicited emails to conduct phishing attack cookies= small file placed on computer can contain sensitive info and pose security risk
Distributed Denial of Service (DDoS)
take over of many computers makes them zombie bots then uses to attack target computer