Quiz 1-8

Ace your homework & exams now with Quizwiz!

Convert the binary 10001 to hex notation and write the digits in the space below with no spaces.

11

What is the output of the following Bash code? num_pushups=10 ((num_pushups+=1)) echo $num_pushups

11

The starting index of an array most often starts at ___________.

0

How many possible values are there in decimal notation?

10

Laura is trying to connect her computer to the Internet manually. She reads that a computer's operating system connects to other computers on the Internet through an IP __________ and port __________.

address number

A record contains related variables known as __________.

attributes

Providing a function's purpose, but not its implementation, is known as ___________.

blackboxing

Variables that are available to an entire program are ___________.

global

Associative arrays provide access to elements through a ___________.

hash key

Associative arrays in PowerShell can be implemented as ___________.

hash tables

What does ethics imply?

human choice

According to the Methods section on the ChatGPT site, ChatGPT uses __________ in its RLHF algorithhm.

human feedback

Sara is a programmer whose primary role is to write code for the software development division of her company. Her work aligns with which phase of the Systems Development Life Cycle?

implementation

Automatic conversion of a value from one data type to another by a programming language, without the programmer specifically doing so, is called implicit type conversion.

implicit

The values of an array element are typically accessed by their ___________.

index

What is a decision-making system that is not built from a model, but from training data?

inductive approach

According to Wilde's paper, Cyber Operations in Ukraine: Russia's Unmet Expectations. cyber analysts should not make the mistake of attributing intentionality to chance nor foreign orchestration to chaos .

intentionality chaos

Ensuring access and fair distribution of technologies is a matter of technology _____.

justice

In his work on catching scammers, Browning keeps a(n) ______ running on his computer to catch the password or payment gateway of the scammer.

key logger

The __________ chain proposes that the more points at which you can __________ the bad guys, the better the chance you have to __________ them from their objective or force them to make enough noise where you can more easily __________ them.

kill intercept deny detect

Self-contained and swappable components in a system are best described as ___________.

modular

In the code below, the user is asked to input a number. The code checks whether the number is even or odd. There is a missing variable or constant, indicating by the blank (___________). What should replace the blank for this code to execute properly? read -p "Enter a number: " __________ if [ $((num % 2)) -eq 0 ] then echo "This number is even." else echo "This number is odd." fi

num

In the loop below, which expression tests the loop condition? for (( num = 1; num <= 5; num++ )) do if (( $num % 2 == 0 )) then echo "$num is even" else echo "$num is odd" fi done

num <= 5

One goal of artificial intelligence is to __________.

optimize

Data is communicated in to and out of a function through ___________.

parameter passing

Which operation has the highest order of precedence?

parentheses

Malware delivers _____, which are pieces of code that do damage.

payloads

Supriya wants to identify which number or numbers on her computer are enabling the operating system to route communications traffic over the Internet. What is the term for these numbers?

port

We use regression to predict ___________ values.

real

Finding cybersecurity solutions that are clearly right or justifiable by reasonable professional standards requires careful ethical _____, analysis, and problem-solving.

reflection

What agile process involves a detailed analysis at the end of the project?

retrospective

The video on functions in this module discusses two basic benefits of functions? What are they?

reusability and fault finding

Your peer programming buddy emphasizes the importance of a program anticipating problems due to errors such as incorrect, inappropriate or corrupt data and unavailability of needed resources such as memory, operating system services, and network connections. Doing so, she explains, reflects its _____.

robustness

You are writing a program in which the lines of code simply execute in the order listed, one after another. What is this type of control structure?

sequence

Andrea uses deceptive techniques to manipulate people into disclosing personal information and then takes this information to commit fraud. This technique is known as ______ ___________. (two words)

social engineering

An operator evaluates whether two given operands are equal or not. If the operands are not equal, the expression will return true. What is this operator?

!=

What character is placed before a comment in Bash?

#

Convert the hexadecimal value 243 to a decimal integer and write the digits in the space below with no spaces.

579

You want to write an expression that evaluates whether the variable age is equal to 50. What operator should replace the ? in the assignment statement below?

==

_____ is a seven-bit encoding scheme, with enough bits to store 128 different values.

ASCII

The PBS News Hour article (Twitter has a misinformation problem. Here's how Elon Musk could make it worse.) suggests what about the potential addition of a "Edit" button? Select all that apply.

Adding the option to edit tweets could become another weapon in the disinformation war. Analyzing user pattems of editing behavior could provide insights into Twitter users' motivations. Adding an Edit button to tweets could complicate efforts to trace misinformation.

Rosie needs to access her computer's setup program as it boots up to check on certain system and device settings. What is the name of this setup program?

BIOS

What type of conditional expression, such as the one below, may evaluate to true or false depending on the test condition? In this case, the color of the sky at the time of execution is evaluated. (Hint: Some choices for answers might be assignment, Boolean, if-elseif-else, or switch.)

Boolean

The Bash shell executes input or commands after what key is pressed at the terminal?

Enter

In Browning's scammer videos, 'Ricky' claims that the user's IP address has been compromised and that in this case, Windows ______ typically displays an error message.

Defender

Arrays are heterogeneous data structures.

False

Byron is a systems analyst who documents the inputs, processing, and outputs of each program within an application.True or False? Byron work aligns best with the maintenance phase of the Systems Development Life Cycle.

False

In a spreadsheet, one column is analogous to a "record".

False

Lila and Joseph are debating the elements of "cyberspace". Can you help them out? True or False: Cyberspace primarily refers to the interaction of hardware components.

False

Lowercase letter 'm' is represented by '77' in ASCII.

False

PowerShell uses camel casing for most public identifiers.

False

What does this Bash expression evaluate to? if ((25 < 7)) || ((15 > 36))

False

According to the Artificial Intelligence video, what could beat human beings in Jeopardy?

IBM Watson

__________, used in home automation systems, provides data sources and opportunities for artificial intelligence to embed itself.

Internet Of Things

Kevin Mitnick named ____ as a secure and free messaging app.

Signal

A Boolean data type represents a logical true or false state.

True

A polyglot can incorporate several languages into one application.

True

Attribution is a key concept and concern in cybersecurity. True or False: The RAND Corporation video on attribution reports that recent attacks are no longer the work of lone actors, but groups acting on behalf of nation-states.

True

Cryptojacking is a web-based attack.

True

Laws and regulations are being outpaced by the speed, scale, and complexity of new technological developments.

True

Records are heterogeneous data types.

True

Reinforcement learning involves a process of learning an optimal control policy via trial and error in an environment.

True

The WhatsApp flaw described by Kevin Mitnick requires no interaction from the user.

True

There is no consistent legal framework governing the type of data collection associated with today's technologies.

True

Variable names cannot contain blank spaces.

True

White hat hackers are also referred to as ethical hackers.

True

An array is best represented by a series of _________ memory locations.

contiguous

What is a decision-making system approach that is first built with a model, and then, an analysis, synthesis, deployment, and evaluation of a problem?

deductive approach

As we've seen with the Texas blackout of spring 2021, losing electricity or cell connectivity can be a serious problem, psychologically or even medically (if there is an emergency). Brian Patrick Greene notes that with artificial intelligence, we will increasingly need to prepare for the risks associated with intelligence ___________.

dependency

Security is a trade-off between functionality and _____ of use.

ease

What command can be used in Bash to display a string?

echo

The term "cybersecurity" can mean many things to many people! We're relying the NISTIR definition in this course. Fill in the blanks below. Cybersecurity can be defined as the prevention of damage to, unauthorized use of, __________ of, and—if needed—the __________ of electronic information and communications systems, and the information they contain, in order to strengthen the confidentiality, __________ and availability of these systems.

exploitations restoration integrity

In this PowerShell looping construct, you want to print integers from 0 to 5, one integer per line. What keyword should replace the blank (__________) in the code? ___________ ($x = 0;$x -le 5;$x++) { Write-Host $x }

for

Where would you place parameters in a function implementation?

function header

Which type of data structure is illustrated in the C code below? Hint: You simply need to look at the structure of the code and keywords to determine this answer; you do not need to "know" C. #include <stdio.h> int main() { int language = 10; switch (language) { case 1: printf("C#\n"); break; case 2: printf("C\n"); break; case 3: printf("C++\n"); break; default: printf("Other programming language\n"); }}

switch statement

At its core, software __________.

tells computers what to do using logic

As discussed in the Machine Learning video, sample data is taken in supervised learning, and a model is built based on that data. What is this phase called?

training phase

The most important thing to preserve a healthy relationship between cybersecurity practitioners and the public is to understand the importance of __________, autonomy, and trustworthiness in that relationship.

transparency

You can refer to an entire array by using its ___________.

variable name

According to Atlantic's article, What Happens When Everything Becomes TikTok., ____________ has proven to be challenging to moderate and at the same time, useful for optimizing recommendation engines.

video data


Related study sets

Correct the sentences and write the sentences with the correct punctuation.

View Set

EMT Chapter 28 - Head and Spine Injuries

View Set

Square Root/ Perfect cubes Flash Cards

View Set

INFO263 Final Text Book Questions

View Set

World Regional Geography (Chapter 5) Exam II

View Set

Passpoint - Gastrointestinal Disorders

View Set