問題一覧
1
data-based learning
AI
2
capture, storage, analysis of data
Big Data
3
data collection through IoT
IOT
4
Data collected by IOT sensors contributes to building large pools of data (big data) which in turn, can be processed and used for the development of machine learning and artificial intelligence. Some of the applications of AI include expert systems, speech recognition, machine vision, and many more.
True
5
offer the increased bandwidth, constant connectivity, and low latency services which can enhance and expand the use of mobile technologies for consumers and businesses.
5G Networks
6
is emerging as a new and compelling paradigm for the deployment of cloud applications, largely due to the recent shift of enterprise application architectures to containers and microservices (Baldini et al., 2017).
Serverless Computing
7
IAAS
Infrastructure-as-a-Service
8
is just another type of database for recording transactions – one that is copied to all of the computers in a participating network.
Blockchain
9
Data in a blockchain is stored in fixed structures called “____”.
Blocks
10
A blockchain is thus sometimes referred to as a “________”.
Distributed Ledger
11
The important parts of a block are:
Header and Content
12
usually a validated list of digital assets and instruction statements, such as transactions made, their amounts and the addresses of the parties to those transactions
Content
13
which includes metadata, such as a unique block reference number, the time the block was created, and a link back to the previous block
Header
14
We can illustrate how a blockchain works by using Bitcoin as an example. Bitcoin, like other blockchains, uses cryptography to validate transactions, which is why digital currencies are often referred to as “________”.
Cryptocurrencies
15
Transactions are validated by a network of users called “______”, who donate their computer power in exchange for the chance to gain additional bitcoins using a shared database and distributed processing.
Miners
16
The word Biometrics comes from the Greek words “bios” (____) and “metrikos” (________).
Life and Measure
17
it refers to a science involving the statistical analysis of biological characteristics.
Biometrics
18
attempt to generate computer models of the physical and behavioural characteristics of human beings with a view to reliable personal identification.
Biometric Technologies
19
As with many technological advances, however, the Internet has not been without negative aspects it has created new concerns about _____1 it has been hampered by ____2 and ______2 it 3 ____ to cut off people who lack access to it
1. Privacy 2. Spam &Viruses 3.Threatens
20
5 basic principles of Professional ethics
1. Integrity 2. Objectivity 3. Competence and Due Care 4. Confidentiality 5. Professional Behavior
21
is the protection of personally identifiable or business identifiable information that is collected from respondents through information collection activities or from other sources.
Digital Privacy
22
The notion that individuals should have the freedom, or right, to determine how their digital information, mainly that pertaining to personally identifiable information, is collected and used
Information Privacy
23
The notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure.
Communication Privacy
24
The notion that individuals have a right to exist freely on the internet, in that they can choose what types of information they are exposed to, and more importantly that unwanted information should not interrupt them.
Individual Privacy
25
collect the minimal amount of information from individuals and businesses consistent with legal requirements.
Data Minimization
26
Collection and use of identifiable information will be provided in a clear manner and mandated by law.
Transparency
27
Information collected will be maintained in a sufficiently accurate, timely, and complete manner.
Accuracy
28
Adequate physical and IT security measures will be implemented to ensure that the collection, use, and maintenance of identifiable information.
Security
29
Beated Turing Test
Eugene Goostman
30
every person should have this characteristic
Universal
31
how easily the system is fooled into granting access to impostors
Non-Circumventable
32
non-invasive and socially tolerable
Acceptable
33
can be measured quantitatively
Collectable
34
no two people should be exactly the same in terms of this characteristic
Unique
35
invariant with time
Permanent
36
must be safe and operate at a satisfactory performance level
Reliable