logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Artificial Intelligence Comments

  • Question
  • The expert system developed at MIT to solve mathematical problems is known as:


  • Options
  • A. RAND
  • B. ISIS
  • C. MACSYMA
  • D. MOLGEN
  • E. CMU

  • Correct Answer
  • MACSYMA 


  • Artificial Intelligence problems


    Search Results


    • 1. Special programs that assist programmers are called:

    • Options
    • A. heuristic processors
    • B. symbolic programmers
    • C. intelligent programming tools
    • D. program recognizers
    • E. None of the above
    • Discuss
    • 2. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

    • Options
    • A. Install Active Directory on the server
    • B. Select Basic Authentication check box
    • C. Clear the Allow Anonymous Connection check box
    • D. Disable the IUSE_inta user account on Intra
    • E. Clear the Allow IIS to Control Password check box
    • Discuss
    • 3. The network uses TCP/IP as the only network protocol. You configure the remote access server on the network. Some users report that when they connect to the server they receive the following message |" IPX SPX compatible computer deported error 733" The EPP control network protocol for the network is not available. If the users allow the connection to continue they are able to connect to the services that use TCP/IP. You want to prevent this message from being displayed. What should you do?

    • Options
    • A. Configure a client computer to use only TCP/IP for the connections to the remote access server
    • B. Configure the client computer to use a defined IPX network address for the connection to the remote access servers
    • C. Configure the remote access server to allow IPX based remote access demand dial connections
    • D. Configure the remote access server to disable multi-link connection
    • E. None of above
    • Discuss
    • 4. You enable the Routing and Remote Access Service (RRAS) on a computer running Windows 2000 Server. You configure the computer as a RAS server. You want to provide mutual authentication between the RAS server and RAS clients. You also want to ensure that data passing between the RAS server and RAS clients is encrypted. Which authentication method should you use for your incoming connections to support mutual authentication and data encryption?

    • Options
    • A. CHAP
    • B. MS-CHAP v2
    • C. PAP
    • D. SPAP
    • E. None of above
    • Discuss
    • 5. Your network contains 10 domain controllers, 10 member servers, and approximately 1,000 client computers. All the servers run Windows 2000 Server, and all the client computers run Windows 2000 Professional. Two of the domain controllers act as DNS servers. Users of client computers use file sharing to grant access to files stored locally. The network has 10 subnets and uses TCP/IP as the only network protocol. You want to configure the network so that all computers can resolve the addresses of all other computers by using DNS. Client computers must be able to register and resolve addresses if a server fails. How should you configure the DNS servers?

    • Options
    • A. Configure one server with a standard primary zone for the domain, and configure at least one server with standard secondary zone
    • B. Configure one server with a standard primary zone for the domain, and configure at least one server with an Active Directory integrated primary zone
    • C. Configure one server with an Active directory integrated primary zone for the domain, and configure at least one server with a standard secondary zone
    • D. Configure at least two servers with Active Directory integrated primary zones for the domain
    • E. Configure at least two servers with standard primary zones for the domain
    • Discuss
    • 6. LISP machines also are known as:

    • Options
    • A. AI workstations
    • B. time-sharing terminals
    • C. super mini computers
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. In LISP, which of the following function assigns the value 10 to the symbol a?

    • Options
    • A. (setq a 10)
    • B. (a = b) where b = 10
    • C. (a = 10) (d) (setq 10 a)
    • D. None of the above
    • Discuss
    • 8. In LISP, the function (endp <list>)

    • Options
    • A. returns a new list that is equal to <list> by copying the top-level element of <list>
    • B. returns the length of <list>
    • C. returns t if <list> is empty.
    • D. All of the above
    • E. None of the above
    • Discuss
    • 9. Which of the following is an advantage of using an expert system development tool?

    • Options
    • A. imposed structure
    • B. knowledge engineering assistance
    • C. rapid prototyping
    • D. All of the above
    • E. None of the above
    • Discuss
    • 10. Which of the following function returns t if the object is a number in LISP?

    • Options
    • A. (number <object>)
    • B. (numberp <object>)
    • C. (numericp <object>)
    • D. (numeric <object>)
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment