The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
Criminals collect items such as credit card numbers without the user’s knowledge through the use of ____.
Software companies rely on ____ to “fix” problems in their programs related to bugs and flaws.
An individual who illegally downloads copyright-protected software is referred to as a ____.
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
an intelligent agent
A common form of authentication is a ____.
____ artificial intelligence is very popular in the programming of robots.
When using a public Wi-Fi network, when is it safe to send private information over the network?
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
A ____ may be used to filter data that may be undesirable.
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
AI applications are ways in which AI methodologies are applied to ____ and provide services.
An expert system relies on ____ to provide subject-specific knowledge.
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
A strong advocate of the Singularity concept is ____.
An Internet-based crime is referred to as a(n) ____ crime.
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
____ proposed a test to determine whether a computer can be said to “think.”
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
The concept of the Singularity predicts that computers will be ____.
Communication and language are key elements in the ____.
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.