ログイン

elective
39問 • 1年前
  • Dasay Montes
  • 通報

    問題一覧

  • 1

    is the simulation of human intelligence processes by machines, particularly computer systems.

    Artificial intelligence (AI)

  • 2

    refers to the delivery of computing services—including servers, storage, databases, networking, software, analytics, and more—over the internet on a pay-as-you-go basis.

    Cloud computing

  • 3

    refers to massive, complex datasets that grow at an exponential rate.

    Big data

  • 4

    describes a network of interconnected devices, including everyday objects, appliances, vehicles, and sensors, that collect and exchange data over the internet or other communication networks.

    Internet of things (IoT)

  • 5

    is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent, detect, and respond to cyber threats.

    Cybersecurity

  • 6

    is a distributed ledger technology that records transactions and related data in a secure and transparent manner.

    Blockchain

  • 7

    is a subfield of AI that focuses on developing algorithms that can learn from data and make predictions or decisions without explicit programming

    Machine learning

  • 8

    enhances the real world by overlaying computer-generated information onto a user's view of the real world.

    Augmented reality (AR)

  • 9

    fifth generation of cellular technology, designed to significantly increase the speed, responsiveness, and capacity of wireless networks.

    5g technology

  • 10

    creates a secure and encrypted connection between a device and a network over a public network like the internet.

    Virtual private network (VPN)

  • 11

    refers to the buying and selling of goods and services over the internet.

    E-commerce

  • 12

    is a type of cybersecurity attack that exploits human psychology and trust to gain access to sensitive information or systems.

    Social engineering (in cyber security)

  • 13

    refers to the rights and principles that govern the collection, use, disclosure, and storage of personal information.

    Data privacy

  • 14

    is the process of integrating digital technologies into all aspects of a business to fundamentally change how it operates and delivers value.

    Digital transformation

  • 15

    refers to electronic devices that are worn on the body, such as smartwatches, fitness trackers, and smart glasses.

    Wearable technology

  • 16

    Technology required for information processing

    ICT

  • 17

    ICT stands for

    Information and Communication Technology

  • 18

    Refers to the knowledge obtain from reading, investigation study and research

    Information

  • 19

    Act of transmitting message

    Communication

  • 20

    Use of scientific knowledge, experience and resources to create processes products

    Technology

  • 21

    A system of moral standard or values used as guidelines for computer users

    Computer ethics

  • 22

    Products of human intellect that is unique and has value in the market

    Intellectual property

  • 23

    Data information privacy

    Privacy

  • 24

    Laws relating to protecting the internet

    Cyber law

  • 25

    Criminal act such as exploitation of women and children

    Pornography

  • 26

    electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data.

    Computer

  • 27

    The first use of the word "computer" was recorded in

    1613

  • 28

    an ancient memory aid device to record and document numbers, quantities, or even messages.

    Tally sticks

  • 29

    a mechanical device used to aid an individual in performing mathematical calculations.

    Abacus

  • 30

    The abacus was invented in ___in 2400 B.C.

    Babylonia

  • 31

    • The abacus in the form we are most familiar with was first used in____ in around 500 B.c

    China

  • 32

    It perform basic arithmetic operations.

    Abacus

  • 33

    • Invented by John Napier in 1614. • Allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around and placing them in specially constructed boards.

    Napier's bones

  • 34

    Invented by William Oughtred in 1622. • Is based on Napier's ideas about logarithms. • Used primarily for – multiplication – division – roots – logarithms – Trigonometry • Not normally used for addition or subtraction.

    Slide rule

  • 35

    Invented by Blaise Pascal in 1642. • It was its limitation to addition and subtraction. • It is too expensive.

    Pascaline

  • 36

    Invented by Gottfried Wilhelm Leibniz in 1672. • The machine that can add, subtract, multiply and divide automatically.

    Stepped reckoner

  • 37

    The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. • It is an automatic loom controlled by punched cards.

    Jacquard Loom

  • 38

    • A mechanical calculator invented by Thomas de Colmar in 1820, • The first reliable, useful and commercially successful calculating machine. • The machine could perform the four basic mathematic functions. • The first mass-produced calculating machine.

    Arithmometer

  • 39

    • It an automatic, mechanical calculator designed to tabulate polynomial functions. • Invented by Charles Babbage in 1822 and 1834 • It is the first mechanical computer.

    Different engine and analytical engine

  • agri 100

    agri 100

    Dasay Montes · 27問 · 2年前

    agri 100

    agri 100

    27問 • 2年前
    Dasay Montes

    agrii 100

    agrii 100

    Dasay Montes · 100問 · 2年前

    agrii 100

    agrii 100

    100問 • 2年前
    Dasay Montes

    PE

    PE

    Dasay Montes · 26問 · 2年前

    PE

    PE

    26問 • 2年前
    Dasay Montes

    UTS

    UTS

    Dasay Montes · 86問 · 2年前

    UTS

    UTS

    86問 • 2年前
    Dasay Montes

    Bio 100

    Bio 100

    Dasay Montes · 13問 · 2年前

    Bio 100

    Bio 100

    13問 • 2年前
    Dasay Montes

    chem

    chem

    Dasay Montes · 67問 · 2年前

    chem

    chem

    67問 • 2年前
    Dasay Montes

    Math

    Math

    Dasay Montes · 100問 · 2年前

    Math

    Math

    100問 • 2年前
    Dasay Montes

    math

    math

    Dasay Montes · 7問 · 2年前

    math

    math

    7問 • 2年前
    Dasay Montes

    Reading in phil

    Reading in phil

    Dasay Montes · 68問 · 2年前

    Reading in phil

    Reading in phil

    68問 • 2年前
    Dasay Montes

    bio2

    bio2

    Dasay Montes · 5問 · 2年前

    bio2

    bio2

    5問 • 2年前
    Dasay Montes

    chem finals

    chem finals

    Dasay Montes · 92問 · 2年前

    chem finals

    chem finals

    92問 • 2年前
    Dasay Montes

    AS 2nd year 1st sem

    AS 2nd year 1st sem

    Dasay Montes · 100問 · 1年前

    AS 2nd year 1st sem

    AS 2nd year 1st sem

    100問 • 1年前
    Dasay Montes

    CP 101 finals

    CP 101 finals

    Dasay Montes · 59問 · 1年前

    CP 101 finals

    CP 101 finals

    59問 • 1年前
    Dasay Montes

    AS medterm #2

    AS medterm #2

    Dasay Montes · 5問 · 1年前

    AS medterm #2

    AS medterm #2

    5問 • 1年前
    Dasay Montes

    Finals elective

    Finals elective

    Dasay Montes · 54問 · 1年前

    Finals elective

    Finals elective

    54問 • 1年前
    Dasay Montes

    問題一覧

  • 1

    is the simulation of human intelligence processes by machines, particularly computer systems.

    Artificial intelligence (AI)

  • 2

    refers to the delivery of computing services—including servers, storage, databases, networking, software, analytics, and more—over the internet on a pay-as-you-go basis.

    Cloud computing

  • 3

    refers to massive, complex datasets that grow at an exponential rate.

    Big data

  • 4

    describes a network of interconnected devices, including everyday objects, appliances, vehicles, and sensors, that collect and exchange data over the internet or other communication networks.

    Internet of things (IoT)

  • 5

    is the practice of protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. It involves implementing measures to prevent, detect, and respond to cyber threats.

    Cybersecurity

  • 6

    is a distributed ledger technology that records transactions and related data in a secure and transparent manner.

    Blockchain

  • 7

    is a subfield of AI that focuses on developing algorithms that can learn from data and make predictions or decisions without explicit programming

    Machine learning

  • 8

    enhances the real world by overlaying computer-generated information onto a user's view of the real world.

    Augmented reality (AR)

  • 9

    fifth generation of cellular technology, designed to significantly increase the speed, responsiveness, and capacity of wireless networks.

    5g technology

  • 10

    creates a secure and encrypted connection between a device and a network over a public network like the internet.

    Virtual private network (VPN)

  • 11

    refers to the buying and selling of goods and services over the internet.

    E-commerce

  • 12

    is a type of cybersecurity attack that exploits human psychology and trust to gain access to sensitive information or systems.

    Social engineering (in cyber security)

  • 13

    refers to the rights and principles that govern the collection, use, disclosure, and storage of personal information.

    Data privacy

  • 14

    is the process of integrating digital technologies into all aspects of a business to fundamentally change how it operates and delivers value.

    Digital transformation

  • 15

    refers to electronic devices that are worn on the body, such as smartwatches, fitness trackers, and smart glasses.

    Wearable technology

  • 16

    Technology required for information processing

    ICT

  • 17

    ICT stands for

    Information and Communication Technology

  • 18

    Refers to the knowledge obtain from reading, investigation study and research

    Information

  • 19

    Act of transmitting message

    Communication

  • 20

    Use of scientific knowledge, experience and resources to create processes products

    Technology

  • 21

    A system of moral standard or values used as guidelines for computer users

    Computer ethics

  • 22

    Products of human intellect that is unique and has value in the market

    Intellectual property

  • 23

    Data information privacy

    Privacy

  • 24

    Laws relating to protecting the internet

    Cyber law

  • 25

    Criminal act such as exploitation of women and children

    Pornography

  • 26

    electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data.

    Computer

  • 27

    The first use of the word "computer" was recorded in

    1613

  • 28

    an ancient memory aid device to record and document numbers, quantities, or even messages.

    Tally sticks

  • 29

    a mechanical device used to aid an individual in performing mathematical calculations.

    Abacus

  • 30

    The abacus was invented in ___in 2400 B.C.

    Babylonia

  • 31

    • The abacus in the form we are most familiar with was first used in____ in around 500 B.c

    China

  • 32

    It perform basic arithmetic operations.

    Abacus

  • 33

    • Invented by John Napier in 1614. • Allowed the operator to multiply, divide and calculate square and cube roots by moving the rods around and placing them in specially constructed boards.

    Napier's bones

  • 34

    Invented by William Oughtred in 1622. • Is based on Napier's ideas about logarithms. • Used primarily for – multiplication – division – roots – logarithms – Trigonometry • Not normally used for addition or subtraction.

    Slide rule

  • 35

    Invented by Blaise Pascal in 1642. • It was its limitation to addition and subtraction. • It is too expensive.

    Pascaline

  • 36

    Invented by Gottfried Wilhelm Leibniz in 1672. • The machine that can add, subtract, multiply and divide automatically.

    Stepped reckoner

  • 37

    The Jacquard loom is a mechanical loom, invented by Joseph-Marie Jacquard in 1881. • It is an automatic loom controlled by punched cards.

    Jacquard Loom

  • 38

    • A mechanical calculator invented by Thomas de Colmar in 1820, • The first reliable, useful and commercially successful calculating machine. • The machine could perform the four basic mathematic functions. • The first mass-produced calculating machine.

    Arithmometer

  • 39

    • It an automatic, mechanical calculator designed to tabulate polynomial functions. • Invented by Charles Babbage in 1822 and 1834 • It is the first mechanical computer.

    Different engine and analytical engine