CIS 2200 FINAL EXAM |59 QUESTIONS AND ANSWERS|GUARANTEED SUCCESS
When using enigma process data, it collects, cleans, organizes, integrates and analyzes the data. As a result, what is it doing? Machine Learning If a person is searching on the web, all the links they used are being used for what type of data? Clickstream Data What is an example of an external source of data? Government Reports When trying to find a machine that is needed to access the data can be difficult. What is this an example of? Rot What is a logical grouping of related records called? Byte A relational database is not normally one big table. True Since entities typically can be identified in the user's work environment, what of the following describes this entity? Record When using an entity, if you include customers' names, employee numbers, and product orders, you use what type of entity? Attribute If you are using a category "staff," this is a what? Entity In a relational table, each row is specific and has a unique representation; this type of database is called a(n) what? instance When using the following tables, locate the primary key? Pizza Table: PID _________ is a method for analyzing and reducing a relational database to its most streamlined form. Normalization A standardized language used to manipulate data is _________. structured query language In a database, the primary key field is used to _________. uniquely identify a record Data redundancy refers to: Having copies of the same data in multiple locations Even with all the hackers today and warnings, many people still won't adjust how they behave online. True Which normative theory of business ethics would TJX have displayed if it had informed customers as soon as the breach was corrected and told other retailers how to prevent future security breaches? Social Contract The chapter contends that Internet companies are in business for the money and hence they really would prefer to keep their customers in the dark about how their personal data is being used to generate profits. Assuming this statement is true, with which ethical theory would you say these Internet companies are most aligned? Stockholder Theory Questions like "Who is responsible for the reliability of information?" and "Who will be accountable for errors in the information?" are part of which ethical issue? Accuracy Correct answer iconYour answer is correct. Which type of "cookies" enables a user to stay logged to a site and keeps your shopping cart intact as you click from page to page? Essential Which act of 1996 is designed to safeguard the electronic exchange of patient records in the health care industry? HIPAA An Internet web site that wishes to abide by fair privacy practices will do all of the following EXCEPT: All of the above Target found out a teenager was pregnant by (1) ________ and revealed that fact to her dad by (2) _______ (1) Her purchases of unscented soap, cotton balls, and vitamins; (2) mailing her some ads for diapers and maternity clothes In an exercise at a 2017 hacker conference, attendees were able to breach voting machines in under 2 hours. True Green computing is a passing phase and will likely be less strategic to companies in the very near future. False In 2017, Target was breached and the private information of 147.7 people in the United States was taken. False With all the advantages of digital technology, it has become easier to maintain the accuracy of information. False The US has introduced industry-specific regulations when needed instead of having a national legislature that will ensure internet privacy rights. True "Digital natives" are reluctant to use online dating sites. False If a company is using the stakeholder theory, this would require managers to take on projects that are compatible with the well-being of society. False Artificial Inteligence allows for permanent, low cost, consistent and fast capabilities. True The Turing Test is used to determine if a computer is Male or Female. False Expert systems can only support decision makers but never replace them. False Which of the following is needed to transfer expertise from an Expert to Expert System? Knowledge Transfer Which of the following statements about neural networks is incorrect? Neural networks attempt to mimic human experts by applying expertise in a specific domain. Neural networks are used to detect fraud in credit card transactions and insurance claims, to fight crime, and to gauge customer satisfaction. True If a machine learning system identifies a particular email as spam when it is not really spam, this error is called a false negative. False If human experts can just explain their entire reasoning process clearly and concisely, an expert programmer can automate that thought process with computer code. False Based on the Turing test, all commercial artificial intelligence systems are a long way from showing any significant intelligence. True
Written for
- Institution
- Baruch College
- Module
- CIS 2200
Document information
- Uploaded on
- October 25, 2023
- Number of pages
- 6
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cis 2200 final exam
Also available in package deal