Fill in the blank by dragging the appropriate machine learning tool from the bottom onto its box. square is a graphical machine learning tool that offers access to hundreds of different algorithms that may be placed in a visually designed machine learning workflow. It also offers prebuilt analytic templates for common business scenarios.
Which of the following tools can be used to improve Windows performance? a. Indexing Options b. System Restore c. Power Options d. System Protection e. File History
Less storage space is needed for EHR systems. True False
Multiple Choice 2 points What was the name for a piece of malware created by mobman that became popular among hackers? Code Red Sub 7 Melissa Virus Red Tiger
Multiple Choice 2 points Which of the following is a negative consequence associated with malware infections? loss of data identity theft time spent removing the infection all of the above
A group of eight bits is called a __ kilobit byte pixel binary
What is a characteristic of deep learning that traditional machine learning does not have? it uses decision trees for classification It relies specifically on neural networks It only uses small datasets It is exclusively used for image recognition
What is a function of a proxy firewall? uses signatures to detect patterns in network traffic connects to remote servers on behalf of clients filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information
Multiple Choice Question A collection of computers that are connected in a small geographic area such as an office, college campus, or in your home is called a __ LAN MAN PAN CAN
Select the person whose job is performing the role of a software project manager. Valerie maintains documentation related to product testing and software training of personnel. Felipe is responsible for keeping software development projects on time and on budget. Ellen writes computer code using a programming language. Colin develops and evaluates the results of tests for different aspects of the software.
What cannot be done with most video editing software? Burn to a DVD Upload to the web Edit pictures created in the software Add captions
Which of the following types of digital evidence can be pulled from both a computer and a portable device? Images Text history GPS coordinates Phone call data
Which three of the following are characteristics of a router? Connects networks Provides hardware firewall protection Usually incorporates switches Designed to convert analog signals into digital signals
19 Frequently accessed information is held in __ the hard drive cache memory flash memory read only memory
What distinguishes a collision domain from a broadcast domain? Collision domains are established by routers, while broadcast domains are established by switches. Collision domains are about physically shared media, and their borders are established by bridges and switches. Collision domains can span multiple routers, while broadcast domains are limited to a single switch. Broadcast domains require a layer 2 broadcast address to be established.
Most web browsers use a(n) __ to expedite and streamline b rowsing a. Area network b. Cable modem c. Domain d. Caching system
What should be done to secure SNMP traffic? Configure SNMPv3 or use IPSec for encryption. Disable SNMP entirely. Use the original versions of SNMP. Limit SNMP traffic to internal networks.
The role of the programmer is to install computer work stations to enhance children's learning. True False Submit
Select the correct answer. Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio? A. WMV B. MP3 C. JPEG D. MP4
When users store data on remote servers and access and share data through the internet, which storage method are they most likely using? A. Flash storage B. Networking storage C. DRAM storage D. Cloud storage