The_____________data mining technique derives rules from real-world case examples?
A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
The_____________data mining technique derives rules from real-world case examples?
A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
Where does most data go first with in a computer memory hierarchy ?
A. RAM
B. ROM
C. BIOS
D. CACHE
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________?
A. robotics
B. simulation
C. computer forensics
D. animation
Computers manipulate data in many ways, and this manipulation is called___________?
A. upgrading
B. processing
C. batching
D. utilizing
Computers process data into information by working exclusively with____________?
A. multimedia
B. word
C. numbers
D. characters
When creating a computer program, the____________designs the structure of the program?
A. End user
B. System Analyst
C. Programmer
D. All of the above
Servers are computers that provide resources to other computers connected to a___________?
A. network
B. mainframe
C. supercomputer
D. client
______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al)
The CPU and memory are located on the__________?
A. expansion board
B. motherboard
C. storage device
D. output device
All of the following are examples of storage devices EXCEPT____________?
A. hard disk drives
B. printers
C. floppy disk drives
D. CD drives