logo

CuriousTab

CuriousTab

Discussion


Home Computer Science Artificial Intelligence Comments

  • Question
  • In LISP, the function (endp <list>)


  • Options
  • A. returns a new list that is equal to <list> by copying the top-level element of <list>
  • B. returns the length of <list>
  • C. returns t if <list> is empty.
  • D. All of the above
  • E. None of the above

  • Correct Answer
  • returns t if <list> is empty. 


  • Artificial Intelligence problems


    Search Results


    • 1. In LISP, which of the following function assigns the value 10 to the symbol a?

    • Options
    • A. (setq a 10)
    • B. (a = b) where b = 10
    • C. (a = 10) (d) (setq 10 a)
    • D. None of the above
    • Discuss
    • 2. LISP machines also are known as:

    • Options
    • A. AI workstations
    • B. time-sharing terminals
    • C. super mini computers
    • D. All of the above
    • E. None of the above
    • Discuss
    • 3. The expert system developed at MIT to solve mathematical problems is known as:

    • Options
    • A. RAND
    • B. ISIS
    • C. MACSYMA
    • D. MOLGEN
    • E. CMU
    • Discuss
    • 4. Special programs that assist programmers are called:

    • Options
    • A. heuristic processors
    • B. symbolic programmers
    • C. intelligent programming tools
    • D. program recognizers
    • E. None of the above
    • Discuss
    • 5. You are the administrator of a Windows 2000 Server computer named Intra. Intra is a member of an Active Directory domain and hosts an Intranet Web-Ske for your company. Company policy requires that only authenticated users have access to the intranet site. All company users have a user account in the Active Directory domain. You configure directory security for the Web Site to use integrated security. However, you discover that users can access the Web Site without authentication. You need to ensure that only authenticated users can access the web site. What should you do?

    • Options
    • A. Install Active Directory on the server
    • B. Select Basic Authentication check box
    • C. Clear the Allow Anonymous Connection check box
    • D. Disable the IUSE_inta user account on Intra
    • E. Clear the Allow IIS to Control Password check box
    • Discuss
    • 6. Which of the following is an advantage of using an expert system development tool?

    • Options
    • A. imposed structure
    • B. knowledge engineering assistance
    • C. rapid prototyping
    • D. All of the above
    • E. None of the above
    • Discuss
    • 7. Which of the following function returns t if the object is a number in LISP?

    • Options
    • A. (number <object>)
    • B. (numberp <object>)
    • C. (numericp <object>)
    • D. (numeric <object>)
    • E. None of the above
    • Discuss
    • 8. LISP was created by:

    • Options
    • A. John McCarthy
    • B. Marvin Minsky
    • C. Alan Turing
    • D. Allen Newell and Herbert Simon
    • E. None of the above
    • Discuss
    • 9. The area of AI that investigates methods of facilitating communication between people and computers is:

    • Options
    • A. natural language processing
    • B. symbolic processing
    • C. decision support
    • D. robotics
    • E. None of the above
    • Discuss
    • 10. The characteristics of the computer system capable of thinking, reasoning and learning is known is

    • Options
    • A. machine intelligence
    • B. human intelligence
    • C. artificial intelligence
    • D. virtual intelligence
    • E. None of the above
    • Discuss


    Comments

    There are no comments.

Enter a new Comment