Hardware, Software, Networks, Internet
Computer Security
Personal & Public Communications and Multimedia
Databases and Models/Simulations
Robotics, AI & Expert systems
100
What are the input and output devices for computer?
Input- keyboards, mouse, etc. Output- monitor, speakers
100
what are ways that can we heighten computer security?
Passcode locks, Anti-virus softwares, monitoring
100
What is the function of an application server?
It is a computer that stores application software for clients on a network.
100
What is the difference between computer simulation and reality?
visualization, see data in a way human will not be able to see reduce risks of reality accidents see through, move through walls speed up the process more trials with less money
100
What is Fuzzy Logic.
allows conclusions to be stated as probabilities rather than certainties.
200
What is the difference between ROM and RAM?
ROM memory available for the operating system, programs and processes to use when the computer is running, RAM memory that comes with your computer that is pre-written to hold the instructions for booting-up the computer
200
What is the role of biometrics in security checks?
helps identify an individual by measurement of individual body characteristics: voice print, fingerprints etc.
200
what is GPS
a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver on Earth.
200
what is a model and a simulation.
Computer modeling is the use of computers to create abstract models of objects, organisms, organizations, and processes. Simulation is the technique of representing the real world by a computer program.
200
What are the inherent problems faced by the simulation approach in building an AI system?
not capable of parallel processing like the human brain
300
What are the techniques of OCR (Optical Character Recognition)?
The techniques it does are Segmentation,Scaled Down System,Context "experts", Learning from actual examples and feedback from a human trainer
300
what are the types of social engineering?
Spoofing, phishing
300
what is CAD, CAM, and CIM?
CAD is computer aided design, or the use of computers to design products. With CAD, you can create designs on screen for products like computer chips and public buildings. CAM is computer-aided manufacturing. After the completion of product design, the numbers are fed to a program that controls the manufacturing or prototyping of products. CIM is computer-integrated manufacturing, or the combination of CAD and CAM.
300
What are the advantages of computer simulations?
safer, cheaper (more economic), projection of results in the future, visualisation, replication
300
Describe several techniques used in game playing software.
searching, brute-force techniques, pattern recognition, heuristics and machine learning.
400
What is the difference between ethernet and internet?
Internet is World Wide Web network of compuers , Ethernet is Standard cable for computers to connect to the network
400
What is the role of firewall?
A program that filters information between a private network and the rest of the Internet.
400
What is one way that a publisher can make the news available in the printed version also available online.
by making the printed version of the newspaper available online - articles available online containing the same news and photo as that of the news item in the newspaper
400
What is GIGO?
basic rule of simulation, valid output requires valid input. Accuracy of a simulation depends on how closely its mathematical model (input) corresponds to the system being simulated
400
what is the relationship between knowledge base and expert system?
An expert system uses its knowledge base to identify with the ideas of its ideas of its field of expertise, so that it can compete with its human counterpart in that particular field of expertise. A knowledge base of an expert system is constructed by a knowledge engineer.
500
What is an example of a cross-platform network?
a network that consists of IBM computers and Apple Macintosh computers
500
What will the war in cyberspace be like in the future?
Attacking interconnected computer networks crippling telecommunications systems, power grids, banking and financial systems hospitals and medical systems, water and gas supplies, oil pipelines, and emergency government services without firing a shot
500
what are the Advantages of telecommuting.
- flexible schedule - saves time - better for the environment (less gas consumption) - better ergonomics (better working conditions) - saves office space/ expenses
500
What is feedback loop and what role does it play in simulations?
Involves input and output. Based on the current output that allows for response and or self correction to achieve the desire output.
500
What are the disadvantages of the approach to AI that attempts to simulate human intelligence? What is the alternative?
- AI systems cannot undergo parallel processing - the best way to complete a task for a human mind may not be the best way for a computer to complete it - neural networks a good alternative
M
e
n
u