Browse Definitions :
Quiz

Quiz: Artificial Intelligence

The empires of the future are the empires of the mind... Winston Churchill

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text somewhere in the definition.
OR
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

1) This is a system of programs and data structures that approximates the operation of the human brain.
a) intelligent network
b) decision support system
c) neural network
d) genetic programming

2) This is the tendency for people to think of inanimate objects as having human-like characteristics.
a) aliasing
b) personalization
c) self-replication
d) anthropomorphism

3) This is a programming language that was designed for easy manipulation of data strings. It was developed in 1959 by John McCarthy and is still commonly used today in artificial intelligence (AI) programming.
a) lisp
b) assembly language
c) machine code
d) Ruby

4) This is an approach to computing developed by Dr. Lotfi Zadeh based on "degrees of truth" rather than the usual "true or false" (1 or 0) Boolean logic. Dr. Lotfi Zadeh developed this approach while working on the problems computers had understanding natural language.
a) cyberwoozling
b) fuzzy logic
c) Smalltalk
d) arachnotaxis

5) This is a type of computer program that simulates the judgement and behavior of a human or organization that possesses expert knowledge and experience in a particular field.
a) expert system
b) cyborg
c) autonomous system
d) cybrarian

6) This is a program that allows the computer to recognize human movement such as waving, finger pointing, or change in eye direction and identify the motions as specific means of interaction.
a) MIME
b) show control
c) gesture recognition
d) motion plan

7) This is the ability of a computer to use binocular vision to differentiate between objects. The computer uses high-resolution cameras, a large amount of random access memory (RAM), and an artificial intelligence (AI) program to interpret data.
a) DiffServ
b) Model-View-Controller
c) machine vision
d) eye-in-hand system

8) This is a program that gathers information or performs some other service on a regular schedule without a human being's immediate presence.
a) aggregator
b) agile applet
c) page
d) intelligent agent

9) This is a program that allows the computer to simulate conversation with a human being. "Eliza" and "Parry" are early examples of programs that can at least temporarily fool a real human being into thinking they are talking to another person.
a) Speech Application Program Interface
b) chatterbot
c) speech recognition
d) Amiga

10) This is the potential ability of the human brain to accept an implanted mechanical device, such as a computer, as a natural part of its representation of the body.
a) virtual machine
b) self-assembly
c) serendipity
d) brain-machine interface

 

SCROLL DOWN FOR ANSWER KEY

















See the rest of our quiz topics
 

ANSWERS: 1c;2d;3a;4b;5a;6c;7c;8d;9b;10d

Have you ever talked to a robot? You might want to reward yourself after this week's quiz with a quick game of 20 questions with an artificial intelligence program called 20q.
>>Click here to play now!
 

Let us know how you did on this week's quiz and what you thought of 20q. Did the program guess what you were thinking of? [email protected]

This was last updated in April 2005
SearchCompliance
  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • risk profile

    A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.

SearchSecurity
  • script kiddie

    Script kiddie is a derogative term that computer hackers coined to refer to immature, but often just as dangerous, exploiters of ...

  • cipher

    In cryptography, a cipher is an algorithm for encrypting and decrypting data.

  • What is risk analysis?

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • gigabyte (GB)

    A gigabyte (GB) -- pronounced with two hard Gs -- is a unit of data storage capacity that is roughly equivalent to 1 billion ...

  • MRAM (magnetoresistive random access memory)

    MRAM (magnetoresistive random access memory) is a method of storing data bits using magnetic states instead of the electrical ...

  • storage volume

    A storage volume is an identifiable unit of data storage. It can be a removable hard disk, but it does not have to be a unit that...

Close