Ch. 6 Security and Safety, Ch. 12 Cloud, E-Commerce, and AI, and Mod. 9 Databases
Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?
It will make the AI system sound more human.
Explanation: A sufficiently advanced AI system could sound just as natural as a human. Surprisingly, this requires the AI system to be able to answer questions incorrectly. If the machine always answered questions correctly, that would indicate it’s a machine and not a human who makes occasional mistakes.
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina’s job role?
Receiving clerk
Explanation: Receiving clerks unpack a warehouse’s incoming shipments from suppliers and ensure that the correct number of items has been received and that the items are not damaged. These items might then be sent along conveyor belts to workers who will store them on shelves.
Mason is chatting with his friend on the phone about a computer problem at work. Suddenly, his Alexa device states that she couldn’t understand what Mason was asking for. What happened that caused Alexa to think Mason was talking to her?
Mason said one of Alexa’s wake words.
Explanation: Smartphone apps and the personal assistants on smart speakers (such as Alexa on an Echo device) listen for a wake word that alerts the app to record and interpret whatever you say next. The Alexa app can respond to the wake words “Alexa,” “Computer,” “Echo,” or “Amazon.”
Kevin runs a small auto body shop and has recently started accepting credit card payments. He’s concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements?
SaaS - Businesses that use a SaaS e-commerce platform typically benefit from built-in PCI compliance configurations and capabilities.
During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name?
You’ll access this service over the Internet.
Explanation: A function or resource provided through a cloud service over the Internet is sometimes referred to as “as a service.” For example, a cloud-hosted firewall application might be called a Firewall as a Service (FWaaS). Similarly, a Desktop as a Service (DaaS) is a desktop accessed over the Internet.
T/F: Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved.
True - While e-business can use cloud-hosted resources, it doesn’t have to. So long as the activity relies on a computer network of some kind (especially the Internet), the activity is classified as e-business.
Which learning model allows an AI system to create its own categories of data without labeling those categories?
Unsupervised learning - With unsupervised learning, the machine looks for patterns and relationships in the training data and then categorizes data according to those patterns. The machine cannot give the categories labels, but it can detect patterns that humans wouldn’t necessarily think to look for.
How can you get attention of a personal assistant app on your phone?
Say the woke word - Smartphone virtual assistant apps and the personal assistants on smart speakers listen for a wake word that alerts the app to record and interpret whatever you say next.
Dr. Davis wants to store backups of her patients’ medical records in the cloud to ensure that information is available if anything devastating were to happen to her office building. What laws will Dr. Davis need to check as she makes security decisions for her cloud storage configuration?
HIPPA - Medical data is protected by the Health Insurance Portability and Accountability Act
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian’s wait time?
Artificial Intelligence - (AI) uses logic and prior experience to make intelligent decisions. Ride services like Lyft and Uber rely on AI to minimize wait time by optimally matching riders to drivers and to provide accurate arrival times.
Which of these e-commerce job roles requires special training and a license to qualify for the position?
Forklift operator and Truck Driver
Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike?
C2C - a C2C transaction occurs when one consumer sells directly to another.
Which of the following is NOT an example of modern-day artificial intelligence (AI) application?
Asking droid for critical information during a hyper-space mission - Today’s AI-powered applications are not yet advanced enough to support droid devices that can walk and interact with complete independence like they do in the Star Wars movies. Also, hyper-space missions aren’t yet available. However, AI technologies can already perform tasks and processes such as powering voice-based interactions between a human and a computer, operating machinery without direct human oversight or intervention, and providing insights from data analysis.
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?
Customer service representative - Phone- and chat-based customer service representatives provide personalized interactions with customers, such as when there’s a problem with a shipment.
Nancy runs her students’ research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?
Machine Learning (ML) - allows a technology such as a plagiarism tool to learn from new data, identify patterns, and make decisions to progressively improve its performance.
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle’s car using?
Reinforcement learning - Reinforcement learning is best used when the “right” answer is not available but some answers are better than others. Like a player earning points in a video game, the machine attempts to optimize its performance given a certain set of standards. There are many routes that can effectively get a car from one point to another; however, very few of those routes will keep the car within an oval-shaped track. Reinforcement learning allows the AI computer to experiment with different possibilities and find the most efficient route that gets the best score for a particular track
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP) - AI assistants such as Siri use natural language processing (NLP) to help interpret commands you speak in ordinary language and give easy-to-understand verbal responses to provide the information you requested or to ask for additional input.
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she’s away from home?
Bluetooth connection - For smart devices to work properly, they typically must be connected to the Internet through a Wi-Fi or Bluetooth connection.
Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?
B2B - A B2B transaction consists of businesses providing goods and services to other businesses.
T/F: All cloud technologies must be accessed over the internet
False - Many organizations run cloud technologies on their own hardware in a private cloud that does not use the Internet. However, the most widespread use of cloud computing is in the public cloud context where multiple customers use the same, Internet-connected cloud.
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she’s at home?
Broad network access - Cloud services are available from anywhere on the Internet and can be configured using almost any kind of device, such as a laptop, tablet, or smartphone. This essential characteristic of cloud computing is called broad network access.
Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She’s put a lot of time into this research paper. How can she make sure she won’t lose access to it if something happens to her cloud storage space?
Save a copy of the file on her local hard drive - Claire needs to save a backup copy of her file somewhere in addition to OneDrive. She can save a copy to her local hard drive or to a different cloud storage location.
Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work?
Robotic Process Automation (RPA) - Robotic process automation (RPA) refers to automatic processes that input or transfer data, such as generating reports from incoming data on sick hours used. Automating repetitive tasks such as report generation can free up human workers for more challenging and valuable work.
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers’ sales transactions from his laptop as he travels.
CRM - Customer relationship management (CRM) services help companies customize their interactions with customers. A cloud-based CRM service can be accessed through the Internet as salespeople travel to meet with customers.
Frazer’s mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?
He can remotely collaborate with teammates on projects, deadlines, and events - Cloud-hosted resources allow teammates to collaborate remotely on projects, deadlines, and events, whether those teammates are at the office, traveling, or working from home.
Charlie’s company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?
Online storefront - A distributor that sells to another business in B2B transactions most likely offers an online storefront for e-commerce transactions rather than using an online marketplace or social media.
Which of these e-commerce job roles could most likely be performed remotely from home or even from another country?
Web Developer - Web developers can use cloud-hosted resources to design and build both customer-facing and internal solutions that support e-commerce business processes.
Who enforces PCI compliance for merchants who accept credit card payments from customers?
Credit card companies - The Payment Card Industry Data Security Standard (PCI DSS) is a set of standards enforced by the credit card companies themselves.
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea’s normal shopping habits and identify it as credit card fraud?
Data analytics - Data analytics is the process of managing data to identify patterns and detect exceptions to the patterns that might indicate problems, such as credit card fraud.
T/F: To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.
False - While it’s helpful to have a basic understanding of AI and its underlying technologies, many AI processes happen in the background and don’t require special knowledge on the part of the user.
Dana is creating a table that will show books for sale on a bookstore’s website. Which field in the table would best serve as its primary key?
ProductID
Explanation: A primary key uniquely identifies each record in a table. A ProductID is the best choice for a primary key because it ensures each product can be uniquely identified.
Which data type would be best suited to a field that lists a product’s clearance price?
Currency
What is a query in database terminology?
A question you ask a database. - A query is a request for data or information from a database, formatted to retrieve specific results based on criteria.
T/F: A database is a collection of related information, but a database management system is a type of software program.
True - A database management system (DBMS) is software that interacts with end users, applications, and the database itself to capture and analyze data.
In a database, each __________ contains a collection of related data.
Table
What are the different views to display a table?
Datasheet View, Design View, Pivot Table & Pivot Chart View
A relationship in a database connects how many tables?
Two
In a record, each separate piece of data, such as a last name, a first name, or an address, is called a _____________.
Field
One disadvantage of computerized databases is that they limit your ability to arrange information.
False
Malisa is designing a database for a doctor’s office where receptionists, office managers, and other office staff will need to manage patient data. Which database object should Malisa create to make it easy for these non-technical users to add patient records?
Forms
Is it true that a database is an organized collection of information?
True
Sawyer is looking at a table of students in his class, but it seems like the list is way too short. What is the most likely problem?
The table is filtered.
Which data type is best suited storing customer email addresses?
Hyperlink
What are the columns in a Microsoft Access table called?
Fields
T/F: A computerized database can store millions of telephone numbers.
True
Xavier is designing a Students table that will continue to track students even after they have completed their programs. Which of the following fields would work best with the Yes/No data type?
Graduated
Ibraheem works for a music store. Which of the following tables will give him the company contact information he needs to place a custom order for a guitar?
Vendors
Which of the following is NOT a part of a database?
Worksheets
T/F: A field's data type determines what kind of information can be stored there.
True
Which of the following is a way to sort data?
Chronologically, Numerically, and Alphabetically
Contact information for all people taking a class is stored in a ________ called Students.
Table
T/F: Databases typically store their data in one big table.
False
Which of the following is LEAST likely to be a field in a Customers table?
EmploymentDate
What does a filter in a database do?
Hide records from view
What sort order will show the oldest patients first based on birthdate?
Smallest to Largest
What does SQL stand for?
Structured query language
T/F: A query lets you speed up the browsing process by finding information that matches specifically to your criteria.
True
All the pet names in a veterinarian’s database are stored in a _______ called PetName.
Field
Queries in access can be used
as a sources of records for forms and reports and to view, change and analyze data in different ways
Which field could serve as the primary key for a list of students in your school?
Student ID number
Siobhan has recently opened a Facebook account and as a new user, is posting frequently and accepting many friend requests. You see a post about an upcoming trip and notice that her profile is open to the public. What can you tell Siobhan to help her use social networking safely?
Be cautious about what information she posts.
-Several general defenses can be used for any social-networking site. First and foremost, be cautious about what information you post. Second, be cautious about who can view your information. Consider carefully who you accept as friends. Finally, review the site’s security settings.
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?
Phishing - Phishing is when an attacker convinces his or her victim to enter personal information at an imposter website after receiving a fictitious email from a bank.
How does encryption work?
It scrambles the information until the key is used to unscramble it. - Encryption is the process of “scrambling” information in such a way that it cannot be read unless the user possesses the “key” to unlock it back to a readable format.
T/F : Social-networking sites have a history of providing tight security and giving users a clear understanding of how security features work.
False - Social-networking sites have a history of providing lax security, of not giving users a clear understanding of how security features work, and of changing security options with little or no warning.
Which of the following is a characteristic of a strong password?
Letters, numbers, and symbols
Technology can lead to all of the following behavioral risks EXCEPT ____.
Higher satisfaction with life. - In addition to technology addiction, there are other behavioral risks associated with using technology: a sedentary lifestyle; poor psychological development, including anxiety, depression, and lower life satisfaction; and poor social interactions, such as social withdrawal.
There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
Creating malware - There are several risks from attacks on Wi-Fi networks, such as reading wireless transmissions, viewing or stealing computer data, injecting malware, and downloading harmful content.
Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?
Ergonomics - Ergonomics is an applied science that specifies the design and arrangement of items that you use, such as posture techniques, so that you and items interact efficiently and safely
Which is a first step to deter thieves from accessing your financial information?
Do not provide personal information over the phone or through email.
Explanation: The first step to deter thieves by safeguarding information is to not provide personal information either over the phone or through an email message.
The news reports a security breach of credit card information at a large department store that has recently laid off many employees. Why should the store investigate the possibility of the breach being from an insider?
Because insiders sometimes create threats after incidents at their places of employment
Explanation: Insiders are employees, contractors, and business partners who pose a security threat, especially when they are upset about being passed over for a promotion or not getting a contract.
Isabel received a message on her computer that appeared to be from the FBI. It informed her that her computer has been locked and she would need to pay a fee to retrieve her data. How would you describe what is happening?
It is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.
Explanation: Ransomware prevents a user’s device from properly and fully functioning until a fee is paid. Most likely, if she called the number, they would try to connect to her computer and then place ransomware software on her computer.
You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Storing financial information in an unsent email message.
Explanation: There are laws to help U.S. users monitor and protect their financial information that is stored by a credit reporting agency. You can request one free credit report annually and you can also “freeze” your credit information.
How can an attacker execute malware through a script?
A script can run a series of instructions to download and run malware.
Explanation: An add-on might allow your computer to download a “script” or series of instructions that commands the browser to perform specific actions. An attacker could exploit a security weakness in the add-on to download and execute malware on the user’s computer.
How can you protect a computer from electrical spikes and surges?
Use a surge protector.
Explanation: A surge protector can defend computer equipment from spikes, surges, and noise. A surge protector lies between the computer and the electrical outlet and absorbs any electrical change so that it does not reach the computer equipment.
Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?
Pretexting
Explanation: Pretexting involves posing as a legitimate researcher to ask for personal information. Actions undertaken by identity thieves include filing for bankruptcy, going on spending sprees, and opening bank accounts under another person’s name.
Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?
Trojan
Explanation: A computer Trojan is malware that hides inside another program, often downloaded from the web. It “masquerades” as performing a safe activity but instead does something malicious
T/F: Your Facebook profile is private so there is no need to worry about your boss ever seeing your posts such as your Spring Break pictures.
False
Explanation: You can choose settings to limit who can see what is posted, but beware who you friend as that can then make private information public.
Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital’s database. Based on Cassidy’s actions what systems do you think the hospital has in place to protect the patient medical records?
Biometrics
Explanation: The hospital has invested in biometric security, which uses the unique characteristics of the employee’s face, hands, or eyes to identify them. The two-factor authentication system sends a code to a device on the person after they have entered their first password.
In which of the following situations is a digital certificate useful?
You are signing a rental lease.
Explanation: A digital certificate is a technology used to verify a user’s identity and key that has been “signed” by a trusted third party.
What is a digital certificate?
Technology used to verify a user’s identity
Explanation: A digital certificate is a technology used to verify a user’s identity and key that has been “signed” by a trusted third party.
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
He can use remote tracking to retrace the thief’s steps.
Explanation: If a mobile device is lost or stolen, several security features can be used to locate the device or recover it. For example, the device can generate an alarm even if it is on mute, and its current location can be pinpointed on a map through the device’s GPS.
_____ ensures that the person requesting access to a computer is not an imposter.
Authentication
Explanation: Authentication ensures that the person requesting access to a computer is not an imposter. Strong authentication security plans include biometrics, password managers, and two-factor authentication.
Which of the following types of websites typically provides the least security?
Social media sites
Explanation: Social media sites typically provide the least security compared to private business, online shopping, or banking sites.
T/F: You must keep your accumulated web history as long as you use the browser.
False - You can block or accept cookies, allow or block scripts on specific websites, and selectively choose which sites can run pop-ups. However, keeping web history is not mandatory.
After Penny broke up with her boyfriend, he texted some teammates from the track team about some private and intimate moments he and Penny had shared while they were dating. He even lied about their breakup, creating rumors about her behavior. Penny started getting inappropriate looks and advances from the team whenever she was at practice and felt completely humiliated. Penny is a victim of ________.
Cyberbullying
Explanation: Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.
T/F: To prevent a laptop from being stolen, you can use a surge protector.
False
Explanation: To prevent laptops from being stolen, you can use a cable lock, not a surge protector.
How will you decide which browser security settings to allow and which ones to block?
I will need to review each browser security setting and use my best judgment.
Explanation: Each setting needs to be evaluated carefully to decide whether it should be allowed or denied.
T/F: A Trojan is a malicious program that uses a computer network to replicate.
False
Explanation: A worm is a malicious program that uses a computer network to replicate, not a Trojan.
In terms of privacy, which of the following is a best practice?
Keeping your Social Security number hidden in a locked box