* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Group Presentations
Turing test wikipedia , lookup
Computer Go wikipedia , lookup
Human–computer interaction wikipedia , lookup
Wizard of Oz experiment wikipedia , lookup
Intelligence explosion wikipedia , lookup
Ethics of artificial intelligence wikipedia , lookup
Existential risk from artificial general intelligence wikipedia , lookup
CSCE 101 – Quiz 5 (Sections 7,8,9) Name ___________________________ Section __________________________ Directions: Answer the following questions. File Systems and Directories 1. Name 3 basic operations on a file. -create a file -delete a file -open a file -close a file -read data from a file -write data to a file -reposition the current file pointer in a file -append data to the end of a file -truncate a file (delete its contents) -rename a file -copy a file 2. What is the root directory? The directory at the highest level of a hierarchy 3. What is the purpose of a file? Contain a specific type of information Networks 4. Name a local-area network. -ring topology -star topology -bus topology 5. What are protocols used for? -They are used to standardize the formatting of data types for networking purposes. -They protect the network devices by filtering incoming messages. -They decompose, route, and reassemble messages so that the can be used at the destination. 6. What are the four different types of cloud services? -Social, Internal, External, and Wired -Timed, Untimed, True, and False -Public, Private, Community, and Private Artificial Intelligence 7. What is a test that we use to see how well a machine acts like a human? A Turing test 8. Name any 2 of the 5 aspects of artificial intelligence. a. Knowledge representation b. Neural networks c. Expert systems d. Natural language processing e. Robotics 9. Name one of the 3 AI technique for robot mobility. a. Sense-plan-act paradigm b. Subsumption architecture c. Physical components Artificial Intelligence 10. Explain the basic components of the Turing Test and what type of equivalence is determined? The Turing test needs two people and the machine to be tested, which will determine if the machine has weak equivalence. 11. What is an expert system? A software system based on the knowledge of human experts to advise users. 12. Name one process that occurs during human/computer voice interaction and describe what the process does. 1. Voice Recognition - Computer recognizing human words 2. Natural language comprehension - Computer interpreting human communication 3. Voice synthesis - Computer recreating human speech The World Wide Web 13. A.__________ an infrastructure of information and the network software used to access it. B.___________ a connection between one web page and another. A. World wide Web B. Link 14. Matching A.<article> ___C__ to define sections of pages B.<footer> ___G__ to define the header of the page C.<section> ___B___ to define the footer of the page D.<aside> ___E____ to define the navigation elements on a page E.<nav> ___A___ to define an article or primary content of a page F.<figure> ___D____ to define secondary content that might appear in a sidebar G.<header> __F___ to define images that annotate an article 15. Both Java Applets and Java Server pages (JSP) are embedded in what type of document that is executed in a browser? HTML Computer Security 16. Define “Integrity” Ensuring that data can be modified only from appropriate mechanisms 17. Name 3 of the 7 types of Security Attacks -Password Guessing -Phishing -Spoofing -Back Door -Buffer Overflow -Denial of Service -Man-In-The-Middle 18. How can malware affect your computer? Malicious code may cause serious damage, such as the destruction of data, or it may merely create a nuisance, such as popping up unwanted messages