CIS 105 Week 7 Exam - Questions and Answers
CIS 105 Week 7 Exam - Questions and Answers Building something with so many variables that the solution arrived at might only work on the subset of data you've used to create it. Over-engineer. For recruiting a data mining and business analytics team employees must possess what three skills? Information technology. Statistics. Business knowledge. ____________ are AI systems that leverage rules or examples to perform a task in a way that mimics applied human expertise. Expert systems. ________________________ are model building techniques where computers examine many potential solutions to a problem, iteratively modifying various mathematical models, and comparing the mutated models to search for a better alternative. Genetic algorithms. This represents the present value of the likely future income stream generated by an individual purchaser. Customer Lifetime Value (CLV) Common motivations for bad guys. Account theft and illegal funds transfer. Stealing personal or financial data. Compromising computing assets for use in other crimes. Extortion. Espionage. Cyberwarfare. Terrorism. Pranksters. Protest hacking. Revenge. Good guys who probe for weaknesses. White Hat Hackers. Bad guys who commit crimes through computers. Black Hat Hackers. Cons executed through technology. Phishing. This seeks to compromise a computing system without permission. Malware. What are some key things to watch out for while building a model? Black Swan Events (events so extreme and unusual that they never showed up in the data used to build the model) Over-engineering the model (building it with so many variables that the solution arrived at might only work on the subset of data used to create it) Looking at a random but meaningless statistical fluke (because you did not set aside a portion of data to verify the results) Basing a decision or action purely on the results of a model, without taking the business context into account A _____ is either a single table or a collection of related tables. Database What factors enable a new age of data-driven, fact-based decision making? Increasingly standardized corporate data Access to rich, third-party data sets Cheap, fast computing Easier-to-use software True or False: Firms suffering a security breach can experience direct financial loss, exposed proprietary information, fines, legal payouts, court costs, damaged reputations, plummeting stock prices, and more. True True or False: Simply by knowing gender, birth date, and postal zip code, 87 percent of people in the US could be pinpointed by name. True Terms that depend on context hacker and hack _____ refers simply to raw facts and figures. Alone it tells you nothing. The real goal is to turn it into ______ by presenting it in a context where it can answer a question or support decision making. Data; information
Written for
- Institution
- CIS 105
- Module
- CIS 105
Document information
- Uploaded on
- February 22, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cis 105 week 7 exam
-
cis 105 week 7
-
cis 105 week 7 quiz
Also available in package deal