Study Guide Final Exam

Ace your homework & exams now with Quizwiz!

The stylist just did a great job and your hair is going to look good for weeks. The stylist charged $70 and you decide to add a 15% cash tip. How big is the tip?

$10.50

You just had a great lunch at a nice restaurant and decide to leave a 15% tip on your $18 meal. What will be the total charge on your debit card?

$20.70

Match the part of the loan with its definition. Term Present Value (PV) Period Rate

1. Length of loan in years 2. Amount of money (principal) originally borrowed or owed 3. Single payment 4. Annual percentage rate (APR) of interest

Put the steps for how an image of a house can be created using GANs in the correct order.

1. The GAN is fed actual images of houses 2. The generator is fed random inputs 3. The generator creates a sample based on these inputs 4. If the discriminator chooses the real image instead of the generated (fake) image, the system will continue to develop/adjust generated images until the discriminator chooses the generated image, thus identifying it as real.

If you type =3+2^2*6 into a cell in a spreadsheet and then press Enter, what will appear in the cell?

27

Every time you go to the gas station you're amazed by how much prices have increased. At this time last year the price was $3.20 per gallon and now the price is $4.25 per gallon. Which of the following spreadsheet formulas correctly calculates the percentage change?

= ((4.25 - 3.20) / 3.20) * 100

A friend asks if you want to go see the new Avengers movie but you say it's too expensive. "No it's not, tickets have only gone up $2.00 since last year," says your friend. You reply, "tickets went from $8 to $10 for a matinee. That is a large percentage increase. What formula would provide the percentage increase?

= (10 - 8) / 8 * 100

What if any difference is there between a Trojan horse and a regular computer virus?

A Trojan horse does not self-replicate.

According to the CIA triad, in which of the following examples is an organization ensuring data integrity? More than one answer may be correct.

A corporation backs up all of its data to a cloud server every night. An organization has a formal policy for alerting the IT department when employees leave the company.

Select the true statements about neural networks.

A neural network is a method in artificial intelligence that teaches computers to process data in a way that is inspired by the human brain. Neural networks are a type of machine learning process called deep learning. Interconnected artificial neurons are the main building blocks of simple neural networks.

Select the true statements about the process of learning AI.

AI programs need data to create output. AI relies heavily on algorithms to process data and create output.

Learning platforms that use algorithms to adjust the content that each student sees in order to maximize learning efficiency is called ________ learning.

Adaptive

Machine-learning software is being used to explore databases of existing molecules (and their associated properties) to generate information that can be used to develop new drugs to treat a variety of conditions expeditiously and at lower costs. Firms at the forefront of this new strategy include

Atomwise. Insilico Medicine. Kebotix.

Headquartered in Toronto, ________ has developed a software application that serves as an early warning system for identifying pandemics.

Bluedot

Which of the following are steps of the Amazon Web Services (AWS) deep learning process?

Choose and Optimize the Algorithm Train, Retrain, and Tune the Models Scale and Manage the Production Environment

The use of computer models that are designed to simulate human thought processes is referred to as ________ computing and is often used in complex environments where solutions may be ambiguous or difficult to uncover.

Cognitive

From the following list, select all of the ways in which cybersecurity helps preserve the integrity of data, information, and systems.

Cybersecurity policies and procedures are designed to protect the consistency, accuracy, and dependability of these assets. Cybersecurity tools such as user-access controls, file permission, and version controls help prevent unauthorized changes. Cybersecurity systems are designed to detect unauthorized or unanticipated changes to data that suggest a loss of integrity.

Which of the following is considered a cybersecurity threat to data at rest? More than one answer may be correct.

Data will be altered by unauthorized users. Data will be viewed by unauthorized users.

One of Google's companies that is investigating AI and Machine Learning is called

DeepMind

In Google Sheets, what are two methods that allow a user to move data from one cell to another cell?

Drag the data to the desired cell when the cursor changes to a drag hand. Right-click the cell and then cut and paste the data into the desired cell.

The FTC acknowledged that AI has the potential to advance almost every industry, but with all of this potential comes with some negative risks that must be addressed. Concerning AI, which of the following does the FTC urge organizations to provide evidence of?

Explain how algorithms make decisions. Ensure that decisions are fair, robust, and empirically sound. Hold themselves accountable for compliance, ethics, fairness, and non-discrimination.

In cybersecurity, the term "integrity" refers to safety of IT assets, such that data maintains its integrity so long as it is not stolen, deleted, or lost.

False

Select the true statements about information architecture (IA).

IA is a crucial component of the overall AI strategy of an organization. IA is about helping people understand their surroundings and allowing them to find what they're looking for in the real world and online. Many experts agree that there is no AI without the analysis and implementation of IA.

Identify the terms as either a potential positive outcome or drawback of AI.

Increased productivity Potential Positive Outcomes of AI Job losses due to automation Potential Drawbacks of AI Privacy concerns Potential Drawbacks of AI Decreased human risk and injury Potential Positive Outcomes of AI Decreased human risk and injury Potential Positive Outcomes of AI

The cost of borrowing money, quoted as an annual percentage rate (APR), is a loan's

Interest

Which of the following are cloud-based AI applications?

IoT AIaaS Chatbots

Identify the advantages and disadvantages of cloud-based AI

Lack of platform control Disadvantages of cloud-based AI Data privacy Disadvantages of cloud-based AI Enhanced security Advantages of cloud-based AI Internet connectivity concerns Disadvantages of cloud-based AI Cost savings Advantages of cloud-based AI Increased efficiency Advantages of cloud-based AI Data management Advantages of cloud-based AI

Select the true statements about how machine learning can be used to solve a problem.

Machine learning uses various data inputs such to build an algorithm. Algorithms created by machine learning take data and answers to questions and use this to develop a machine learning model. If-then statements are often used in machine learning models.

Select the two spreadsheet programs.

OpenOffice Calc Apple Numbers

Why are probable loss calculations important?

Organizations have limited funds to use toward system protections.

To determine how much a recurring monthly payment would be for a car loan or a mortgage, use the ________ function.

PMT

In which of the following health care areas is AI used?

Pharmaceuticals Robotic Surgery Health Tracking

A mathematical framework that can be used to analyze how much an algorithm recalls data and information about individuals is called differential ________.

Privacy

The U.S. Census Bureau is using differential ________ to make census data secure and private.

Privacy

Which of the following are ethical considerations of AI?

Privacy Human Judgment

Many AI and Computer Science degree paths have inter-related requirements, including coursework in computer programing, especially ________.

Python

Why is data that is located in the RAM of a device considered data in transit?

RAM only holds data and instructions temporarily; nothing is permanently stored in RAM.

________ was launched in 2014 by Skype co-founders, Ahti Heinla and Janus Friis. The company's vision is to revolutionize food and package deliveries across the globe. Starship robots can carry items within a 4-mile radius.

Starship

Which of the following are steps you can take to learn about artificial intelligence (AI)?

Study computer programming languages Learn about the math used in AI Take free online courses and find free online resources covering AI

Select the true statements about BlueDot's pandemic detection software.

The software scans over 100,000 worldwide media sources in over 65 different languages to determine outbreaks in real-time. Serves as an early warning system for identifying pandemics. The software uses artificial intelligence to predict pandemics.

Cybersecurity vulnerabilities can be intentionally exploited or accidentally allowed to compromise system security.

True

Excellent business thinkers explore issues deeply by gathering information from a variety of sources.

True

Positions are stances that you take or recommendations that you make based on a set of conclusions.

True

5G cellular technology offers the promise of download speeds as high as 20 Gbps. This will likely require more antenna arrays with each antenna sending out ________ microwave signals.

Weaker

A university's network was severely compromised by a systemwide attack that made accessing records impossible. All files were encrypted and the tech team didn't have the key. Administrators received what was essentially a ransom note: the network would be restored after they paid a million dollars to an unknown actor. Which factors most strongly influenced university administrators' decision whether or not to comply? More than one answer may be correct.

Whether the university's tech support team could decrypt the files themselves. Whether law enforcement could be identified and force the bad actor to decrypt the files.

Conrad was disturbed to find evidence of applications he did not download, system configurations unexpectedly altered, and files mysteriously that disappeared and moved. Which cybersecurity threat best explains the problems he was having?

a rootkit

Because the technology allows a robot arm to act more like a human's with regard to spatial recognition and safety awareness, while maintaining all of the advantages of a traditional industrial robot, ________ can make robots much more flexible and safer.

adaptive robotics

"Cybersecurity threat mitigation" includes all of the policies, procedures, and tools that help organizations

anticipate and counter threats from security vulnerabilities or incidents and reduce their impact.

Using cyberattacks, such as the May 2017 WannaCry ransomware attack which struck British hospitals particularly hard, is an example of how a nation with less military strength can level the field using technology. This is an example of ________ warfare.

asymmetric

In content and form, a business message should typically

avoid any form of self-centeredness.

The variance that exists in the output provided by AI algorithms is referred to as AI

bias

In the financial world, which color represents credits or profits?

black

Allowing people to share a digital ledger across a network of computers, ________ uses computer code to create concatenated (linked together) blocks of transactions.

blockchain

Malicious bots are cybersecurity risks because they

can reproduce and link to an outside server.

Saving a spreadsheet file in .csv format only saves the

cell values

In addition to planning, analysis, and mitigation, select the remaining two categories of the respond (RS) function of the NIST Cybersecurity Framework from the list below.

communication improvements to cybersecurity response plans

What function would you use to display how many entries are made in Column A above Cell A37?

count

The White House Office of Science and Technology Policy has identified ten principles to consider when articulating regulatory and nonregulatory methods for the development and use of AI. Principles identified by the White House Office of Science and Technology include which of the following?

create public trust in AI cost/benefit analysis analysis of safety and security

Bitcoin, Ethereum, and LiteCoin all use blockchain algorithms to control quantity and verify the validity of transactions. They are referred to as

cryptocurrency

What is the "DE" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?

detect function

When you enter a calculation into a spreadsheet, you start by entering a(n) ________ sign.

equals

Which of the following are examples of cryptocurrencies?

ethereum bitcoin litecoin

The CSV format saves the cell values and formulas.

false

Which of these online functions are most susceptible to MitM attacks? More than one answer may be correct.

financial applications e-commerce

The Rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ________ of the investment.

future value (FV)

Which of the following statements are true about Nanorobots?

have the capacity to carry medication or miniature tools used to constantly monitor our bodies for maladies and other symptoms can build and manipulate things precisely where components are at a scale of a nanometer

The active cell in a spreadsheet is the cell into which the user can input data. In most spreadsheet programs the active cell can be identified by which three items?

heavy border highlighted column and row headings name box (in the upper left corner of the sheet)

Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically, this could store gigabytes of data within a cubic millimeter.

holographic

Which of the NIST Cybersecurity Framework functions investigates an organization's cybersecurity management in the context of their business needs and resources?

identify (ID) function

Which of the following are guiding principles for the ethical use of AI?

incorporate transparency and accountability concerning AI practices implement data security and privacy principles follow laws, rules, and standards covering AI

Which of the following are potential positive outcomes of AI?

increased productivity decreased human risk and injury diminished human-caused errors

Which of the following are neural network layers?

input layer hidden layer

Advertised as an annual percentage rate (APR), the amount of money a lender charges for a loan is the loan's ________.

interest rate

Which of the following are potential drawback of AI

job losses due to automation privacy concerns

Two subfields of AI include which of the following?

machine learning deep learning

Ransomware basically holds a target hostage because it

makes the target's own data inaccessible.

Which of the following is a goal of confidentiality as defined by the CIA triad?

making sure the right people have access to secure information

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a

memristor

In order to make business messages more positive, business writers should focus on actions they can accomplish and demonstrate a realistic optimism. However, they should be careful

not to set unrealistic expectations.

What does the identify (ID) function of the NIST Cybersecurity Framework focus on?

organizational understanding of how to manage cybersecurity risks

Each loan payment is referred to as a(n)

period

From the following list, select all the primary components of cybersecurity threat mitigation.

policies and procedures for threat prevention tools and procedures for threat identification policies, tools, and strategies for threat "curing" or minimization

Which of the following serviced are provided by cloud computing networks

processing storage software applications

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ________ computing.

quantum

When displaying financial information, the accepted practice is that ________ indicates negative values.

red

What is most likely to show that the writer of a business message has concern for the audience?

respecting the autonomy of the reader

Which of the NIST Cybersecurity Framework functions calls for quick action on the part of an organization's cybersecurity team to mitigate damage to systems?

respond (RS) function

Describe the categories of the Recover (RC) function of the NIST Cybersecurity Framework. More than one answer may be correct.

restoration of impaired systems improvements to cybersecurity plans communication with all stakeholders

A common method to delete a column or row in most spreadsheet programs is to ________ on the column or row heading, and then select Delete from the menu.

right-click

To Insert a Column to the left of Column D in an OpenOffic Calc file, select Column D and then ________ and select Insert.

right-click

Which of the following are ways Internet of Medical Things (IoMT) has been used during the pandemic?

self-screening at home regional integration of health records rapid COVID-19 screening

Currently, apps that run on the Cloud are ________ as compared to apps that run on local machines. Edge computing is a method of optimizing cloud computing systems by performing data processing at the edge of the network, near the source of the data and it is possible that cloud computing may take a back seat to edge computing.

slower

Programs such as Microsoft Excel, iWork's (Apple) Numbers, Google Sheets, and OpenOffice Calc, that allow users to arrange numerical data are called

spreadsheets

Sports analysts often use ________ to keep track of statistics, times, and scores of nearly every sporting event.

spreadsheets

Which two of the following refer to the amount of money a lender charges for borrowing money (excluding any origination fees)?

the APR (annual percentage rate) the interest rate

What does the General Data Protection Regulation (GDPR) strive to achieve?

to ensure EU companies protect the privacy and personal data of EU citizens

Which of the following are steps you can take to learn about artificial intelligence (AI)?

understand algorithm procedures and development learn about data collection and analysis join online AI communities

According to the identify (ID) function of the NIST Cybersecurity Framework, what allows an organization to prioritize its efforts where cybersecurity risk is involved?

understanding of its business environment and resources

From the following list, select all the examples of different cybersecurity breaches.

viruses spyware impersonation Distributed Denial of Service (DDOS)


Related study sets

PSY 108 7a) Basic Learning Concepts and Classical Conditioning

View Set

English: Chapter 3: Adjectives and Adverbs

View Set

Liberal Challenges and Revolutions

View Set

CS165 Exam 4 StudySet: Stacks/Queues/Priority Queue

View Set

W2 elbow, wrist and hand with CS

View Set