Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSI101 FULL Questions and Answers 2024

Beoordeling
-
Verkocht
-
Pagina's
53
Cijfer
A+
Geüpload op
11-08-2024
Geschreven in
2024/2025

CSI101 FULL Questions and Answers 2024 ____ instructions are processed sequentially by fetching an instruction from memory, and then executing that instruction. a. Binary c. DRAM b. MRAM d. USB ** Answ** Binary A(n) ____ is a theoretical framework, or a way of doing things. a. expert system c. polymer b. paradigm d. MRAM ** Answ** paradigm ____ is the study of matter and radiation at the atomic level. a. Fuzzy logic c. Robotics b. Pattern recognition d. Quantum mechanics

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CSI101 FULL Questions and Answers 2024

____ instructions are processed sequentially by fetching an instruction from memory,
and then executing that instruction.
a. Binary c. DRAM
b. MRAM d. USB ** Answ** Binary

A(n) ____ is a theoretical framework, or a way of doing things.
a. expert system c. polymer
b. paradigm d. MRAM ** Answ** paradigm

____ is the study of matter and radiation at the atomic level.
a. Fuzzy logic c. Robotics
b. Pattern recognition d. Quantum mechanics ** Answ** Quantum mechanics

A specialized computer designed to record and play back video content from cable and
satellite sources is called a(n) ____.
a. expert system c. quantum computer
b. digital video recorder d. robot ** Answ** digital video recorder

____ is a method of splitting a laser beam and using a device called a spatial light
modulator to store full pages of information in layers on a crystal material.
a. Fuzzy logic c. Holographic storage
b. Pattern recognition d. Speech recognition ** Answ** Holographic storage

____ functions as erasable, rewritable ROM memory.
a. Flash memory c. Speech recognition
b. Natural language processing d. Machine learning ** Answ** Flash memory

Which of the following terms describes flash memory in a small, durable portable case
that can be plugged into a USB port of a computer and used in the same manner as a
disk drive?
a. USB cache c. USB disk
b. USB port d. USB drive ** Answ** USB drive

Which of the following terms describes memory that uses the polarization of
microscopic magnetic layers to store ones and zeros that remain after the power source
is removed?
a. DRAM c. ROM
b. MRAM d. SRAM ** Answ** MRAM

____ is the science and engineering of making intelligent machines.
a. Nanotechnology c. Quantum mechanics
b. Magnetic storage d. Artificial intelligence ** Answ** Artificial intelligence

,____ is a superset of conventional logic that has been extended to handle the concept
of partial truth.
a. Neural networks c. Fuzzy logic
b. Robotics d. Speech recognition ** Answ** Fuzzy logic

____ are well suited for applications such as visual speech recognition applications.
a. DVRs c. Turing tests
b. Quantum computers d. Neural networks ** Answ** Neural networks

A(n) ____ is a computer program that simulates the judgement and behavior of a
human or an organization that has expert knowledge and experience in a particular
field.
a. flash memory c. expert system
b. neural network d. USB drive ** Answ** expert system

Telephone support and hot lines, such as a poison control center, can make use of
____.
a. expert systems c. SDRAM
b. MRAM d. ROM ** Answ** expert systems

____ processing involves computer applications that can recognize and interact with
natural language text.
a. Assembly language c. High-level language
b. Machine language d. Natural language ** Answ** Natural language

The science of ____ is primarily concerned with the mechanics and electronics that are
used to carry out the results of the other areas of artificial intelligence.
a. fuzzy logic c. pattern recognition
b. robotics d. natural language processing ** Answ** robotics

It is thought that each neuron in the brain may have as many as connections to adjacent
neurons.
a. 10 c. 10,000
b. 100 d. 1,000,000 ** Answ** 10,000

In order for a computer to emulate human behavior and reasoning, it needs to have the
ability to ____.
a. walk c. learn
b. talk d. hear ** Answ** learn

The concept of each person interacting with many, sometimes invisible computers has
been named "____" by computer scientist Mark Weiser.
a. 1984 c. massive parallelism
b. ubiquitous computing d. nanotechnology ** Answ** ubiquitous computing

,Effort is ongoing to make ____ available on cell phones.
a. HDTV c. VCRs
b. streaming audio d. streaming video ** Answ** streaming video

At present, flash memories come in sizes up to ____.
a. 1 MB c. 2 GB
b. 100 MB d. 4 TB ** Answ** 2 GB

A(n) ____ is an unwelcome system intruder with malicious intent.
a. honey pot c. cracker
b. software engineer d. spammer ** Answ** cracker

The term ____ is used to describe the process of subverting the phone system in order
to get free service.
a. phreaking c. biometrics
b. honey pot d. callback ** Answ** phreaking

A(n) ____ is a cracker motivated by the challenge of breaking into a system.
a. script kiddie c. undirected hacker
b. Trojan horse d. directed hacker ** Answ** undirected hacker

A(n) ____ is generally a cracker motivated by greed and/or politics.
a. undirected hacker c. Trojan horse
b. script kiddies d. directed hacker ** Answ** directed hacker

A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
developed by others.
a. cracker c. script kiddie
b. reverse engineer d. Trojan horse ** Answ** script kiddie

Cracking into a system as a political act is known as ____.
a. hacktivism c. social engineering
b. repudiation d. phreaking ** Answ** hacktivism

An anonymous document that justifies cracking into a systems as an ethical exercise is
called ____.
a. spyware c. the cracker bible
b. the Hacker's Manifesto d. Phreaker's Way ** Answ** the Hacker's Manifesto

____ are shortcuts into programs created by system designers to facilitate system
maintenance but used and abused by crackers.
a. Checksums c. Backdoors
b. Heuristics d. Bots ** Answ** Backdoors

A(n) ____ occurs when a program tries to place more information into a memory
location than it can handle.

, a. access attack c. virus attack
b. buffer overflow d. modification attack ** Answ** buffer overflow

Code designed to breach your system security and threaten your digital information is
known as ____.
a. malicious code c. honey pots
b. digital certificates d. patents ** Answ** malicious code

A(n) ____ is an uninvited guest program on your computer with the potential to damage
files and the operating system.
a. proxy firewall c. virus
b. sniffer d. DMZ ** Answ** virus

A(n) ____ is a software program that can roam the Internet autonomously.
a. cookie c. honey pot
b. digital certificate d. bot ** Answ** bot

A(n) ____ is a software program that allows the user to listen in on network traffic.
a. Trojan horse c. worm
b. sniffer d. honey pot ** Answ** sniffer

Transforming original data into coded data so that only authorized parties can interpret it
is known as ____.
a. authentication c. piracy
b. packet filtering d. encryption ** Answ** encryption

The term ____ is used to describe biological identification, such as fingerprints, voice
dynamics, or retinal scans.
a. biometrics c. ergonomics
b. cookie d. hacktivism ** Answ** biometrics

A(n) ____ firewall establishes a new link between each packet of information and its
destination.
a. proxy c. biometric
b. digital d. packet-filtering ** Answ** proxy

____ are the moral principles for judging right or wrong behavior held by an individual or
group.
a. Digital certificates c. Ethics
b. Laws d. Ergonomics ** Answ** Ethics

____ is the illegal copying of software .
a. Software piracy c. Social engineering
b. Biometrics d. Dumpster diving ** Answ** Software piracy

Geschreven voor

Vak

Documentinformatie

Geüpload op
11 augustus 2024
Aantal pagina's
53
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$12.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
smartchoices Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
36
Lid sinds
5 jaar
Aantal volgers
5
Documenten
4499
Laatst verkocht
1 maand geleden

4.8

9 beoordelingen

5
7
4
2
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen