Pt 2

Ace your homework & exams now with Quizwiz!

What is a mathmatical model?

how different things are related so it can make predictions

Ai produces a model...what is that?

how things relate to one another, mental or conceptual (qualitative)

non linear slides

hyperlinked, can go from slide 5 to 97

WHat is crypocurrency + ex

medium of exchange, created and stored

Different database software solutions?

nMySQL, Microsoft Access, Microsoft SQL Server, Libre Office Base

Spreadsheet vs. Database

no relational vs relational

what is the current use of Blockchain technology

online banking transaction growth retail acceptance of electronic transactions online purchases in app purchases

current and future uses of blockchain technology

online banking, in ap purchase internet of things, autonomous objects

Why is there so much attention on cybersecurity?

online commerce global trade and travel remote/flexible work

Infostealers

passowrds and usernames steal

Adware

pop ups

Linear Slides

ppt, most of time

denial of service attack

too much info that the computer crashes

trojan horse vs back door vs logic bomb

trojan horse = hide in other programs reveal designed behavior when activated back door=password only know to attacker to access a system at will logic bomb= segment of code embedded within organization designed to be destructive at certain time or date

social engineering

use of social skills to trick or manipulate ex person poses as IT enter building with fake identification

Customizing your toolbars will slow down your workflow

False

The data collected by Big Data is organized in relational databases before it is used for business decision making.

False

Backup and recovery procedures are recommended only to safeguard against hardware/software failures.

False backups can protect against threats such as information extortion attacks.

potential issues with AI

-can find patterns that are not there ex google dogs and a moose comes up, - can be unpredictable

What is the different btwn data and information?

1. The key difference between data and information is that data itself is numerical values but information is the combination of such data

social marketing proccess

1. fan acquisition 2. engagement 3. amplification 4. community 5. brand strength fea acb

Which of the following would NOT be considered an advantage of non-linear presentation software? A. It follows a clear and logical sequence. B. It provides a graphical overview of the presentation content. C. It allows the presenter to easily customize the presentation to the audience or discussion. D. It helps to create an aesthetically pleasing and interactive presentation format.

A

__________________ collects personal information about users' behavior without their knowledge A. Spyware B. Adware C. Spamware

A

Adding pictures to a presentation is not easy... even though all you do is press insert --> picture on the ribbon interface... A. because it is difficult to find a great picture B. It is expensive to subscribe to a royalty free website C. It is difficult to edit pictures to fit a slide D. None of the options E. All of the options

A because it is difficult to find a great picture

Which of the following would normally be considered a reason to use a relational database over a flat-file database model?(Check all that apply) A. Relational databases eliminate storage of blank data values B. Relational databases reduce or eliminate storage of redundant data C. All of these D. Relational databases are easier to understand and visualize None of these

A, B

Which of the following are common examples of artificial intelligence software you are likely to encounter on a daily basis? A. Google image search suggests images similar to the one you clicked on. B. YouTube suggests videos similar to the one you are watching C. Amazon suggests other products you might be interested in purchasing based on past purchases D. Canvas automatically gives feedback on why you missed a quiz question based on data from the whole class

A, B. C

Which of the following would be considered a database, or could utilize a database (select all that apply)? A. An inventory B. A cloud server C. Customer transaction records D. Library card catalog

A,C,D

All of the following are characteristics of cloud computing EXCEPT A. High cost B. On-Demand Service C. Flexibility to scale up D. Pooling resources

A.

What are the three attributes of Big Data A. Volume, variety, velocity B. Volume, Type, and diversity C. Volume, structure and velocity D. Volume, velocity and visualization

A.

Which of the following AI software applications would most likely not work 'off-the-shelf' and instead require a company's custom training data? A. A "chatbot" to provide customer support B. Speech-to-text software C. Facial recognition software for a security company.

A.

What is the basic unit of organization within linear presentation software? Slide Deck Cell Photo

A. Slide

Select the reasons why we avoid using animations in PowerPoint? Animations = lot of time unless good PowerPoint skills Animations = problems with mouse during presentation Animations = PC & mouse far from you during presentation Animations = 'show', not 'facts'

All

Which of the following is an application in which artificial intelligence can potentially provide a competitive advantage in the field of marketing and business? (select all that apply) Selecting advertisements based on purchase history Automatically adjusting the cost of a product based on supply and demand Predicting future product demand in order to determine warehouse needs Predicting which products may be most desirable for customers

All

Which tool allows text or images to move, appear, or otherwise change appearance within a single presentation slide? Animations Transitions Presenter view Hyperlinks

Animations

A Trojan horse is _________________________ A. Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program) B. Software programs that hide in other computer programs and reveal their designed behavior only when they are activated C. A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive act at certain time or date D. Segment of computer code that performs malicious actions by attaching to another computer program

B

Which of the following is typically needed to support decision-making? A. Translation of information into data B. Translation of data into information

B

All of the following are most likely to be used by a disgruntled computer programmer (fired by the organization) to sabotage information security EXCEPT____________ A. Trojan horse B. Virus C. Back Door D. Logic Bomb

B virus

______________ is a decentralized currency that is transferred on a peer-to-peer network Bitcoin eMoney Cryptocurrency Blockchain

Bitcoin

The protocol for the secure transfer of money via the internet without a third party is referred to as_________________ Blockchain Cryptocurrency Bitcoin Cash App

Blockchain

Which of the following could be used to securely save documents such as home deeds, birth certificates or marriage certificate? Blockchain Bitcoin Cryptocurrency eStorage

Blockchain

Which of the following best describes "Artificial Intelligence"? A. Computer software that attempts to perform human-like tasks B. Computer algorithms that are able to learn and adapt without explicit instructions C. A process or set of rules to be followed by a computer in calculations or other problem-solving operations D. Acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, such as in the forms of decisions.

Computer software that attempts to perform human-like tasks

When cyber attackers send more information requests than the target computer system can handle, the computer system crashes and this is referred to as________________________ Hacking Distributed denial-of-service attack Logic Bomb Denial-of-service attack

D

If you are shopping online and you purchase a bed and the platform recommends pillows. What type of algorithm is the website using? A. Data Mining B. Marketing C. Advertising D. Database

Data Mining

A graphic organizer in PowerPoint includes the reading view

F

Low level employees pose the greatest threat to information security.

FAlse

Select the typical components of a slide Footer Slide number Body Header Margin Layout Width Border

Footer Slide number Body Header

Select the fonts from the list that are best suited for use in a presentation Helvetica Arial Georgia Times New Roman Comic Sans Freestyle Script

Helvecta, Arial, Georgia

What is the primary tool that allows users to create non-linear presentations using software such as Powerpoint or Keynote? Hyperlinks Text Boxes Transitions Magic Move

Hyperlinks

Backing up computer data to an external hard drive will reduce information security risks. T F It depends

It depends

Presentations created in Microsoft Powerpoint follow a _______________ format. Linear and/or Non-Linear Linear Non-Linear

Linear and/or Non-Linear

Which feature would you activate to enable the tools needed to measure and locate your objects on the slide? Rulers Tabs Grid Measure Inspect

Rulers, grid,

The six "S" to success include the following items Scope Sequence Story Structure Schedule Simplicity Speed Service Sequel Seminal experience Sophistication

Scope Story Structure Schedule Simplicity Speed

What is the basic unit of organization within linear presentation software? Slide Deck Cell Photo

Slide

What is SaaS?

Software as a Service (SaaS) is a derivative of Platform as a Service (PaaS). Software as a Service provides on-demand online access to specific software applications or suites without the need for local installation (or even local hardware and OS requirements in many cases).

To change the distance between grid lines you would adjust the Spacing Interval Measurement Association None of the options

Spacing

the six S for effective slides

Story Scope Simplicity Structure Scedule Speed

Keyboard shortcuts save time

True

Layering effects in PowerPoint can affect the printed handouts readability

True

Not all cash app transfers require users to have a bank account

True most mobile money transfers do not require a bank account.

Risk management identifies, controls, and minimizes the impact of threats to the organization's information security.

Trye

spear phishing

as much info as possible to improve chances that it will obtain personal info

uses of Blockchain in cases

blockchain can be used for background checks secure documents storage birth registries land registries financial services healthcare airlines

Another name for Intelligent agent is ____________________

bot

Applications of AI in BUsiness

chat bots, system forecasting whether customer will buy,

crypocurrency

cryptocurrency is a medium of exchange created stored electronically in the Blockchain using encryption techniques to control the creation of monitor units in to verify the transfer of funds bitcoin is the best known example

Bitcoin

decentralized digital currency transferred peer-peer network

phishing attack

emails or spam masquerade

bitcoin mining

fee based accounting function for recording transactions ( as high as 130000 block for 10 minutes ) mining allows participants to discover and record new blocks

keystroke loggers

records keyboard input

screen scrapers

recordsscreen actuivity

Communication controls

secure the movement of data across networks

blockchain technology

software protocol for the secure transfer of money property or contact via the Internet without a third-party Blockchain is a distributed ledger technology that is currently used by about 60% of the worlds largest corporations

spamware vs spyware

spamware uses ur contacts to send spam emails spyware collects info w/o knowledge

spyware vs spam vs cookies

spyware is software monitoring activities on computer spam is unsolicited emails to conduct phishing attack cookies= small file placed on computer can contain sensitive info and pose security risk

Distributed Denial of Service (DDoS)

take over of many computers makes them zombie bots then uses to attack target computer


Related study sets

Module 6 Computer Concepts Exam, Computer Concepts Module 8, Computer Concept Module 9, Module 10 Computer Concepts Exam

View Set

Rosetta Stone Unit 13, lesson 1 French

View Set

List #3 (Unit 6), Question Words, qué vs cuál vs cuales

View Set

3th mid practice quiz. ch #44, and 45

View Set