cmis test 4

The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
artificial intelligence
Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____.
spyware
Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws.
updates
An individual who illegally downloads copyright-protected software is referred to as a ____.
pirate
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
an intelligent agent
A common form of authentication is a ____.
pass word
____ artificial intelligence is very popular in the programming of robots.
behavior-based
When using a public Wi-Fi network, when is it safe to send private information over the network?
never
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
pattern
A ____ may be used to filter data that may be undesirable.
firewall
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
authentication
AI applications are ways in which AI methodologies are applied to ____ and provide services.
solve problems
An expert system relies on ____ to provide subject-specific knowledge.
human experts
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
disasters
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
machine learning
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
SSL connection
A strong advocate of the Singularity concept is ____.
ray Kurzweil
An Internet-based crime is referred to as a(n) ____ crime.
cyber
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
WPA2
____ proposed a test to determine whether a computer can be said to “think.”
Alan turing
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
high precision
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
encryption
The concept of the Singularity predicts that computers will be ____.
super intelligent
Communication and language are key elements in the ____.
turing test
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
phishing