Download Group Presentations

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Turing test wikipedia , lookup

Computer Go wikipedia , lookup

Human–computer interaction wikipedia , lookup

Wizard of Oz experiment wikipedia , lookup

Intelligence explosion wikipedia , lookup

Ethics of artificial intelligence wikipedia , lookup

Existential risk from artificial general intelligence wikipedia , lookup

History of artificial intelligence wikipedia , lookup

Philosophy of artificial intelligence wikipedia , lookup

Transcript
CSCE 101 – Quiz 5
(Sections 7,8,9)
Name ___________________________
Section __________________________
Directions: Answer the following questions.
File Systems and Directories
1. Name 3 basic operations on a file.
-create a file
-delete a file
-open a file
-close a file
-read data from a file
-write data to a file
-reposition the current file pointer in a file
-append data to the end of a file
-truncate a file (delete its contents)
-rename a file
-copy a file
2. What is the root directory?
The directory at the highest level of a hierarchy
3. What is the purpose of a file?
Contain a specific type of information
Networks
4. Name a local-area network.
-ring topology
-star topology
-bus topology
5. What are protocols used for?
-They are used to standardize the formatting of data types for networking
purposes.
-They protect the network devices by filtering incoming messages.
-They decompose, route, and reassemble messages so that the can be used at the
destination.
6. What are the four different types of cloud services?
-Social, Internal, External, and Wired
-Timed, Untimed, True, and False
-Public, Private, Community, and Private
Artificial Intelligence
7. What is a test that we use to see how well a machine acts like a human?
A Turing test
8. Name any 2 of the 5 aspects of artificial intelligence.
a.
Knowledge representation
b.
Neural networks
c.
Expert systems
d.
Natural language processing
e.
Robotics
9. Name one of the 3 AI technique for robot mobility.
a.
Sense-plan-act paradigm
b.
Subsumption architecture
c.
Physical components
Artificial Intelligence
10. Explain the basic components of the Turing Test and what type of equivalence is
determined?
The Turing test needs two people and the machine to be tested, which will
determine if the machine has weak equivalence.
11. What is an expert system?
A software system based on the knowledge of human experts to advise users.
12. Name one process that occurs during human/computer voice interaction and describe
what the process does.
1. Voice Recognition - Computer recognizing human words
2. Natural language comprehension - Computer interpreting human
communication
3. Voice synthesis - Computer recreating human speech
The World Wide Web
13. A.__________ an infrastructure of information and the network software used to access
it.
B.___________ a connection between one web page and another.
A. World wide Web
B. Link
14. Matching
A.<article> ___C__ to define sections of pages
B.<footer> ___G__ to define the header of the page
C.<section> ___B___ to define the footer of the page
D.<aside> ___E____ to define the navigation elements on a page
E.<nav> ___A___ to define an article or primary content of a page
F.<figure> ___D____ to define secondary content that might appear in a sidebar
G.<header> __F___ to define images that annotate an article
15. Both Java Applets and Java Server pages (JSP) are embedded in what type of document
that is executed in a browser?
HTML
Computer Security
16. Define “Integrity”
Ensuring that data can be modified only from appropriate mechanisms
17. Name 3 of the 7 types of Security Attacks
-Password Guessing
-Phishing
-Spoofing
-Back Door
-Buffer Overflow
-Denial of Service
-Man-In-The-Middle
18. How can malware affect your computer?
Malicious code may cause serious damage, such as the destruction of data, or it
may merely create a nuisance, such as popping up unwanted messages