EXAM 3 BCIS 3610 unt Question and answers rated A+
4 views 0 purchase
Course
BCIS 3610
Institution
BCIS 3610
EXAM 3 BCIS 3610 unt Question and answers rated A+
The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? - correct answers the curse of dimensional...
EXAM 3 BCIS 3610 unt Question and
answers rated A+
The more attributes there are in a sample data, the easier it is to build a model
that fits the sample data, but that is worthless as a predictor. Which of the
following best explains this phenomenon? - correct answers the curse of
dimensionality
In the ________ phase, a BigData collection is broken into pieces and
hundreds or thousands of independent processors search these pieces for
something of interest. - correct answers map
________ refers to the level of detail represented by data. - correct answers
Granularity
What is the query language used in Hadoop? - correct answers Pig
Which BI activity would a company be participating in if they were cataloging?
- correct answers data acquisition
A ________ is a facility for managing an organization's business intelligence
data. - correct answers data warehouse
Problematic data are termed ________. - correct answers dirty data
The results generated in the map phase are combined in the ________
phase. - correct answers reduce
, Which of the following refers to data in the form of rows and columns? -
correct answers structured data
A person calls the Stark residence and pretends to represent a credit card
company. He asks Mrs. Stark to confirm her credit card number. This is an
example of ________. - correct answers pretexting
________ is a broad category of software that includes viruses, worms, Trojan
horses, spyware, and adware. - correct answers Malware
The _________ can delete programs or data or even modify data in
undetected ways. - correct answers payload
Jack installed the incorrect security patch on the server. This is an example of
what type of security problem? - correct answers faulty service
________ take computers with wireless connections through an area and
search for unprotected wireless networks. - correct answers Wardrivers
The procedure of entrusting a party with a copy of an encryption key that can
be used in case the actual key is lost or destroyed is called ________. -
correct answers key escrow
A(n) ________ is a computer program that senses when another computer is
attempting to scan a disk or access a computer. - correct answers intrusion
detection system
The Grey-Sloan hospital was attached by a virus. The interns should check
the ________ for next steps. - correct answers incident-response plan
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller flyhigher329. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.