____ instructions are processed sequentially by fetching an instruction from memory,
and then executing that instruction.
a. Binary c. DRAM
b. MRAM d. USB ** Answ** Binary
A(n) ____ is a theoretical framework, or a way of doing things.
a. expert system c. polymer
b. paradigm d. MRAM ** Answ** paradigm
____ is the study of matter and radiation at the atomic level.
a. Fuzzy logic c. Robotics
b. Pattern recognition d. Quantum mechanics ** Answ** Quantum mechanics
A specialized computer designed to record and play back video content from cable and
satellite sources is called a(n) ____.
a. expert system c. quantum computer
b. digital video recorder d. robot ** Answ** digital video recorder
____ is a method of splitting a laser beam and using a device called a spatial light
modulator to store full pages of information in layers on a crystal material.
a. Fuzzy logic c. Holographic storage
b. Pattern recognition d. Speech recognition ** Answ** Holographic storage
____ functions as erasable, rewritable ROM memory.
a. Flash memory c. Speech recognition
b. Natural language processing d. Machine learning ** Answ** Flash memory
Which of the following terms describes flash memory in a small, durable portable case
that can be plugged into a USB port of a computer and used in the same manner as a
disk drive?
a. USB cache c. USB disk
b. USB port d. USB drive ** Answ** USB drive
Which of the following terms describes memory that uses the polarization of
microscopic magnetic layers to store ones and zeros that remain after the power source
is removed?
a. DRAM c. ROM
b. MRAM d. SRAM ** Answ** MRAM
____ is the science and engineering of making intelligent machines.
a. Nanotechnology c. Quantum mechanics
b. Magnetic storage d. Artificial intelligence ** Answ** Artificial intelligence
,____ is a superset of conventional logic that has been extended to handle the concept
of partial truth.
a. Neural networks c. Fuzzy logic
b. Robotics d. Speech recognition ** Answ** Fuzzy logic
____ are well suited for applications such as visual speech recognition applications.
a. DVRs c. Turing tests
b. Quantum computers d. Neural networks ** Answ** Neural networks
A(n) ____ is a computer program that simulates the judgement and behavior of a
human or an organization that has expert knowledge and experience in a particular
field.
a. flash memory c. expert system
b. neural network d. USB drive ** Answ** expert system
Telephone support and hot lines, such as a poison control center, can make use of
____.
a. expert systems c. SDRAM
b. MRAM d. ROM ** Answ** expert systems
____ processing involves computer applications that can recognize and interact with
natural language text.
a. Assembly language c. High-level language
b. Machine language d. Natural language ** Answ** Natural language
The science of ____ is primarily concerned with the mechanics and electronics that are
used to carry out the results of the other areas of artificial intelligence.
a. fuzzy logic c. pattern recognition
b. robotics d. natural language processing ** Answ** robotics
It is thought that each neuron in the brain may have as many as connections to adjacent
neurons.
a. 10 c. 10,000
b. 100 d. 1,000,000 ** Answ** 10,000
In order for a computer to emulate human behavior and reasoning, it needs to have the
ability to ____.
a. walk c. learn
b. talk d. hear ** Answ** learn
The concept of each person interacting with many, sometimes invisible computers has
been named "____" by computer scientist Mark Weiser.
a. 1984 c. massive parallelism
b. ubiquitous computing d. nanotechnology ** Answ** ubiquitous computing
,Effort is ongoing to make ____ available on cell phones.
a. HDTV c. VCRs
b. streaming audio d. streaming video ** Answ** streaming video
At present, flash memories come in sizes up to ____.
a. 1 MB c. 2 GB
b. 100 MB d. 4 TB ** Answ** 2 GB
A(n) ____ is an unwelcome system intruder with malicious intent.
a. honey pot c. cracker
b. software engineer d. spammer ** Answ** cracker
The term ____ is used to describe the process of subverting the phone system in order
to get free service.
a. phreaking c. biometrics
b. honey pot d. callback ** Answ** phreaking
A(n) ____ is a cracker motivated by the challenge of breaking into a system.
a. script kiddie c. undirected hacker
b. Trojan horse d. directed hacker ** Answ** undirected hacker
A(n) ____ is generally a cracker motivated by greed and/or politics.
a. undirected hacker c. Trojan horse
b. script kiddies d. directed hacker ** Answ** directed hacker
A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
developed by others.
a. cracker c. script kiddie
b. reverse engineer d. Trojan horse ** Answ** script kiddie
Cracking into a system as a political act is known as ____.
a. hacktivism c. social engineering
b. repudiation d. phreaking ** Answ** hacktivism
An anonymous document that justifies cracking into a systems as an ethical exercise is
called ____.
a. spyware c. the cracker bible
b. the Hacker's Manifesto d. Phreaker's Way ** Answ** the Hacker's Manifesto
____ are shortcuts into programs created by system designers to facilitate system
maintenance but used and abused by crackers.
a. Checksums c. Backdoors
b. Heuristics d. Bots ** Answ** Backdoors
A(n) ____ occurs when a program tries to place more information into a memory
location than it can handle.
, a. access attack c. virus attack
b. buffer overflow d. modification attack ** Answ** buffer overflow
Code designed to breach your system security and threaten your digital information is
known as ____.
a. malicious code c. honey pots
b. digital certificates d. patents ** Answ** malicious code
A(n) ____ is an uninvited guest program on your computer with the potential to damage
files and the operating system.
a. proxy firewall c. virus
b. sniffer d. DMZ ** Answ** virus
A(n) ____ is a software program that can roam the Internet autonomously.
a. cookie c. honey pot
b. digital certificate d. bot ** Answ** bot
A(n) ____ is a software program that allows the user to listen in on network traffic.
a. Trojan horse c. worm
b. sniffer d. honey pot ** Answ** sniffer
Transforming original data into coded data so that only authorized parties can interpret it
is known as ____.
a. authentication c. piracy
b. packet filtering d. encryption ** Answ** encryption
The term ____ is used to describe biological identification, such as fingerprints, voice
dynamics, or retinal scans.
a. biometrics c. ergonomics
b. cookie d. hacktivism ** Answ** biometrics
A(n) ____ firewall establishes a new link between each packet of information and its
destination.
a. proxy c. biometric
b. digital d. packet-filtering ** Answ** proxy
____ are the moral principles for judging right or wrong behavior held by an individual or
group.
a. Digital certificates c. Ethics
b. Laws d. Ergonomics ** Answ** Ethics
____ is the illegal copying of software .
a. Software piracy c. Social engineering
b. Biometrics d. Dumpster diving ** Answ** Software piracy