問題一覧
1
is just another type of database for recording transactions – one that is copied to all of the computers in a participating network.
Blockchain
2
We can illustrate how a blockchain works by using Bitcoin as an example. Bitcoin, like other blockchains, uses cryptography to validate transactions, which is why digital currencies are often referred to as “________”.
Cryptocurrencies
3
how easily the system is fooled into granting access to impostors
Non-Circumventable
4
non-invasive and socially tolerable
Acceptable
5
The notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure.
Communication Privacy
6
Data in a blockchain is stored in fixed structures called “____”.
Blocks
7
Transactions are validated by a network of users called “______”, who donate their computer power in exchange for the chance to gain additional bitcoins using a shared database and distributed processing.
Miners
8
every person should have this characteristic
Universal
9
As with many technological advances, however, the Internet has not been without negative aspects it has created new concerns about _____1 it has been hampered by ____2 and ______2 it 3 ____ to cut off people who lack access to it
1. Privacy 2. Spam &Viruses 3.Threatens
10
capture, storage, analysis of data
Big Data
11
is emerging as a new and compelling paradigm for the deployment of cloud applications, largely due to the recent shift of enterprise application architectures to containers and microservices (Baldini et al., 2017).
Serverless Computing
12
The notion that individuals have a right to exist freely on the internet, in that they can choose what types of information they are exposed to, and more importantly that unwanted information should not interrupt them.
Individual Privacy
13
Collection and use of identifiable information will be provided in a clear manner and mandated by law.
Transparency
14
must be safe and operate at a satisfactory performance level
Reliable
15
invariant with time
Permanent
16
which includes metadata, such as a unique block reference number, the time the block was created, and a link back to the previous block
Header
17
is the protection of personally identifiable or business identifiable information that is collected from respondents through information collection activities or from other sources.
Digital Privacy
18
can be measured quantitatively
Collectable
19
5 basic principles of Professional ethics
1. Integrity 2. Objectivity 3. Competence and Due Care 4. Confidentiality 5. Professional Behavior
20
it refers to a science involving the statistical analysis of biological characteristics.
Biometrics
21
usually a validated list of digital assets and instruction statements, such as transactions made, their amounts and the addresses of the parties to those transactions
Content
22
Information collected will be maintained in a sufficiently accurate, timely, and complete manner.
Accuracy
23
IAAS
Infrastructure-as-a-Service
24
The notion that individuals should have the freedom, or right, to determine how their digital information, mainly that pertaining to personally identifiable information, is collected and used
Information Privacy
25
attempt to generate computer models of the physical and behavioural characteristics of human beings with a view to reliable personal identification.
Biometric Technologies
26
Beated Turing Test
Eugene Goostman
27
no two people should be exactly the same in terms of this characteristic
Unique
28
A blockchain is thus sometimes referred to as a “________”.
Distributed Ledger
29
data-based learning
AI
30
data collection through IoT
IOT
31
Adequate physical and IT security measures will be implemented to ensure that the collection, use, and maintenance of identifiable information.
Security
32
The important parts of a block are:
Header and Content
33
Data collected by IOT sensors contributes to building large pools of data (big data) which in turn, can be processed and used for the development of machine learning and artificial intelligence. Some of the applications of AI include expert systems, speech recognition, machine vision, and many more.
True
34
The word Biometrics comes from the Greek words “bios” (____) and “metrikos” (________).
Life and Measure
35
collect the minimal amount of information from individuals and businesses consistent with legal requirements.
Data Minimization
36
offer the increased bandwidth, constant connectivity, and low latency services which can enhance and expand the use of mobile technologies for consumers and businesses.
5G Networks