UNIT 14 and 15
____ is the process of verifying the identity of the receiver of the data. Identification Encryption Authorization Authentication
Authentication
____ is a very high-level language in which a single instruction is quite powerful. SQL COBOL C FORTRAN
SQL
IBM recently announced a new computer chip, called ____, that mimics the way the brain works through the use of "neurosynaptic" cores. SynChip iChip TrueNorth Intellisis
TrueNorth
A ____ is a graph with nodes and connecting arcs. connection architecture semantic net knowledge scheme neural network
semantic net
In a ____ transmission, no information about the exchange is permanently retained by the server. stateless ephemeral persistent transitory
stateless
The ____ intelligence model captures the behavior of an ant colony by using simple agents that operate independently. heuristic brute-force cognitive swarm
swarm
The axon of a neuron sends signals over small gaps called ____. synapses breaches schisms lacunae
synapses
Using multiple ____ in a single database decreases the amount of redundant information that must be stored. queries tables functions procedures
tables
Your website ____ describes how information is classified and organized so customers can easily find what they want. taxonomy middleware hierarchy CRM
taxonomy
The algorithmic approach called ____ has been used commercially in vehicle routing, job scheduling, and sensing biological or chemical contaminants. ACO B2C TCK ASIMO
ACO
____ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems. Artificial intelligence Mechanical reasoning Natural language processing Machine learning
Artificial intelligence
If your company sells products or materials to other companies rather than to the general public, you might maintain a ____ presence. B2S B2B S2B B2C
B2B
If your company is a retail business, you might maintain a(n) ____ website to advertise and sell your products. B2B S2B B2S B2C
B2C
A ____ manages files in a database. BDS DBS DBMS DBNS
DBMS
The Internet has been around for quite a while, but it did not have much impact on our everyday lives until the appearance of the ____ in the early 1990s. World Wide Web 4G network Telnet FTP protocol
World Wide Web
A ____ approach for finding a solution path traces all branches of the state-space graph so that all possible choices are tested and no test cases are repeated. stochastic divide and conquer brute force heuristic
brute force
The "instance" relationship shows that something is an object of a ____. function module class method
class
All of the following are characteristics that must be contained in any knowledge representation scheme EXCEPT ____. efficiency extendibility adequacy comprehensiveness
comprehensiveness
The human brain uses a ____ architecture, characterized by a large number of simple "processors" with multiple interconnections. cognitive parallel chained connectionist
connectionist
____ is the practice of registering a domain name that uses the name or trademark of an existing business, with the intent to sell the name to that business at a profit or to capitalize on that name for some other purpose. Cybersquatting Phishing Social engineering Cyber warfare
cybersquatting
A ____ for a binary search reflects the fact that if the current item is not the target, there are only two next choices: the midpoint of the sublist before the node or the midpoint of the sublist after the node. back propagation algorithm decision tree connectionist architecture solution path
decision tree
When choosing your ____ you want to make sure it relates so closely to your business name that potential customers can easily guess it if they don't have it in front of them. user password IP address domain name integrated protocol
domain name
A ____ is an aircraft under autonomous control via a computer system on board or controlled by a human controller at a remote site. wizard robot drone intelligent agent
drone
____ facilitates peer-to-peer relationships in an "auction" mode. Google Craigslist Groupon eBay
eBay
____ encodes data to be transmitted into a scrambled form, using a scheme agreed upon between the sender and the receiver. Representation Verification Encryption Authentication
encryption
In a database management system a table represents information about a(n) ____, which is a fundamental distinguishable component. property index entity attribute
entity
____ is software that allows separate, existing programs to communicate and work together seamlessly. Groupware Middleware Portal software Open source software
middleware
When reading a ____ language, we use our understanding of the richness of the language's vocabulary to extract the meaning. geopolitical conventional natural formal
natural
A ____ network can learn from experience by modifying the weights on its connections. learned cognitive trained neural
neural
At the end of its training, the ____ is ready to go to work on new recognition problems that are similar to the training data but for which the answers are unknown. forward chaining system wizard neural network intelligent instance
neural network
SQL is a ____ language. composite procedural functional nonprocedural
nonprocedural
Once you decide to move into the ecommerce arena, the first major decision is choosing between in-house development and ____. remote serving spoofing outsourcing distributed computing
outsourcing
Information can be stored in ____ form as an image, which is a grid of pixels that have attributes of shading and color. pictorial graphical labeled artificial
pictorial
A ____ key is an attribute or combination of attributes that uniquely identifies a tuple. primary foreign characteristic secondary
primary
____ technology can download updates to personalized information, such as the weather conditions in your geographic area, to your cell phone. Push Swarm Rule-based Solution
push
Database management systems usually require specialized ____ that enable the user to ask questions of a database to retrieve information. structured languages query interfaces query languages question languages
query languages
Artificial intelligence seeks ways to improve a computer's capabilities in ____ and reasoning tasks. mathematical computational recognition intellectual
recognition
The ____ integrity rule specifies that any value of a foreign key attribute in a given table must match a value in the corresponding primary keys of the related table. primary referential entity data
referential
The term ____ implies a device that can gather sensory information from its surroundings and to autonomously perform mechanical actions in response. robot intelligent agent wizard drone
robot
A(n) ____ must contain the following components: a knowledge base and an inference engine. rule-based system forward chaining system intelligent agent wizard
rule-based system