Final320 052 Practice

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

SIMON FRASER UNIVERSITY

School of Computing Science

CMPT 320 FINAL EXAMINATION


PRACTICE

NAME:____________________________________
FAMILY NAME GIVEN NAMES

SFU-ID #:_______ _________________________

INSTRUCTIONS
1. Calculators are not permitted.
2. This exam is closed book.
3. Clearly print your name and student ID number on this examination (above).
4. This exam contains multiple choice questions.

NOTES REGARDING MULTIPLE CHOICE QUESTIONS:


- There are five possible choices per question.
- There is one best choice for full credit (+1).
- The remaining four choices are worthless.

5. The values of all non-multiple choice questions are stated explicitly in bold.
6. There are 45 points in total.
7. There are 6 pages including this cover sheet.
8. You have 2 hours (giving you an average of 2.7 minutes per point).
9. Dictionaries are allowed.
Page 2 of 4

1. Privacy legislation
a. dates back to the origins of contract law,
b. is driven independently of information technology,
c. appears to have no written precedent earlier than Warren and Brandeis (1890),
d. is explicitly stated in both the US and Canadian constitutions,
e. none of these choices.
2. Parkinsons Law
a. relates directly to administrative burgeoning,
b. is founded on a lemma relating directly to the burgeoning of data,
c. is completely independent of Moores Law,
d. is identical to Murphys Law,
e. both the second and third choices.,
3. An accurate model
a. has a rigorous rule for numerically quantifying variables that represent human values,
b. can fail on its first run a situation commonly referred to as the Titanic Effect,
c. is dependent upon the degree of both spatial and temporal approximation,
d. should be independent of the computer it is running on,
e. all of these choices.
4. The least favored approach to current AI research is the
a. Cognitive Modeling Approach,
b. Turing Test Approach,
c. Laws of Thought Approach,
d. Rational Agent Approach,
e. none of the above.
5. Computer modeling of physical systems
a. has surpassed the need for the theory of partial differential equations,
b. relies heavily on linear algebra,
c. is strictly based upon discrete mathematics,
d. requires that the limit concept of calculus be incorporated into the ALU,
e. the first and third of these choices.
6. The Kyoto Protocol is an example of
a. how drastic changes in social policy can result from computer modeling alone,
b. a failed international treaty due to politically biased modeling,
c. an environmental movement based on a particularly well understood physical system,
d. the latest movement to eliminate actual nuclear testing through computer simulation,
e. none of these choices.
7. The first recognition of the social responsibilities of computer people appeared
a. in the writings of Charles Babbage,
b. with the birth of ENIAC,
c. around the commercialization of computers,
d. when PCs appeared,
e. in the 1990s.
8. Strong encryption
a. arose from the fact that weak encryption is too complex,
b. relies on the secrecy of the algorithm employed,
c. may have its key made public without loss of security,
d. can be cracked simply by brute force,
e. the first two choices.

2
Page 3 of 4

9. In Harpers first article (chapter 1), he indicates levels of change in economy, religion,
family, and education at the structural level of
a. the small group,
b. organizations,
c. institutions,
d. society,
e. global.
10. The Marxist Perspective (Harpers second article Chapter 4)
a. is the founding view on materialism,
b. underlies the idealistic paradigm,
c. is a hybrid viewpoint between materialism and solipsism,
d. is founded upon Webers Perspective,
e. none of these choices.
11. Dialectical models of social change (Harpers second article Chapter 4)
a. are purely linear,
b. are based upon recent developments in Chaos Theory,
c. encompass technological determinism,
d. the first and third choices,
e. none of these choices.
12. Which is not a characteristic of Jacques Elluls notion of technique?
a. rationality,
b. artificiality,
c. self-augmentation,
d. The Autonomy of Technique,
e. none of these choices.
13. The statement, Computers are dehumanizing, is something a _____ would say.
a. politician,
b. computing science student,
c. neo-Luddite,
d. Luddite,
e. none of these choices.
14. Westin indicates in his article on privacy that the changes and challenges we now face
a. began after World War I,
b. began with the advent of electronics and computers,
c. are rooted to times well before North America was colonized by Europeans,
d. are over exaggerated,
e. none of these choices.
15. Warren and Brandeis, in their seminal paper from 1890,
a. suggest that the press has been very respectful of the individuals right to privacy,
b. consider whether the existing law of their time affords sufficient safeguards to privacy,
c. consider privacy more from the perspective of protection of government secrets,
d. regard the high-speed digital computer as central to the threat of individual privacy,
e. none of these choices.

C4I (not to exceed 5 words, and they must all be present for the point):

16. Define both strong AI and weak AI:

3
Page 4 of 4

17. [2] Define Mazlishs Fourth Discontinuity and briefly discuss its significance to this course
(do not write down the other three discontinuities please):

18. [7] Consider the following diagram used in the building of the world-model calculation of
the Club of Rome in 1972, The Limits to Growth. Their study emphasize feedback loops.
You are to indicate below in the open brackets, ( ), whether the corresponding loop is
positive or negative, with a +, or -, respectively. Also, is this a linear or non-linear
analysis? Explain in detail.

19. [4] Briefly discuss the principal issues regarding emotion in Artificial Intelligence:

You might also like