暗記メーカー
ログイン
midtermApdev
  • Tristan A

  • 問題数 36 • 10/15/2023

    記憶度

    完璧

    5

    覚えた

    14

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    data-based learning

    AI

  • 2

    capture, storage, analysis of data

    Big Data

  • 3

    data collection through IoT

    IOT

  • 4

    Data collected by IOT sensors contributes to building large pools of data (big data) which in turn, can be processed and used for the development of machine learning and artificial intelligence. Some of the applications of AI include expert systems, speech recognition, machine vision, and many more.

    True

  • 5

    offer the increased bandwidth, constant connectivity, and low latency services which can enhance and expand the use of mobile technologies for consumers and businesses.

    5G Networks

  • 6

    is emerging as a new and compelling paradigm for the deployment of cloud applications, largely due to the recent shift of enterprise application architectures to containers and microservices (Baldini et al., 2017).

    Serverless Computing

  • 7

    IAAS

    Infrastructure-as-a-Service

  • 8

    is just another type of database for recording transactions – one that is copied to all of the computers in a participating network.

    Blockchain

  • 9

    Data in a blockchain is stored in fixed structures called “____”.

    Blocks

  • 10

    A blockchain is thus sometimes referred to as a “________”.

    Distributed Ledger

  • 11

    The important parts of a block are:

    Header and Content

  • 12

    usually a validated list of digital assets and instruction statements, such as transactions made, their amounts and the addresses of the parties to those transactions

    Content

  • 13

    which includes metadata, such as a unique block reference number, the time the block was created, and a link back to the previous block

    Header

  • 14

    We can illustrate how a blockchain works by using Bitcoin as an example. Bitcoin, like other blockchains, uses cryptography to validate transactions, which is why digital currencies are often referred to as “________”.

    Cryptocurrencies

  • 15

    Transactions are validated by a network of users called “______”, who donate their computer power in exchange for the chance to gain additional bitcoins using a shared database and distributed processing.

    Miners

  • 16

    The word Biometrics comes from the Greek words “bios” (____) and “metrikos” (________).

    Life and Measure

  • 17

    it refers to a science involving the statistical analysis of biological characteristics.

    Biometrics

  • 18

    attempt to generate computer models of the physical and behavioural characteristics of human beings with a view to reliable personal identification.

    Biometric Technologies

  • 19

    As with many technological advances, however, the Internet has not been without negative aspects it has created new concerns about _____1 it has been hampered by ____2 and ______2 it 3 ____ to cut off people who lack access to it

    1. Privacy 2. Spam &Viruses 3.Threatens

  • 20

    5 basic principles of Professional ethics

    1. Integrity 2. Objectivity 3. Competence and Due Care 4. Confidentiality 5. Professional Behavior

  • 21

    is the protection of personally identifiable or business identifiable information that is collected from respondents through information collection activities or from other sources.

    Digital Privacy

  • 22

    The notion that individuals should have the freedom, or right, to determine how their digital information, mainly that pertaining to personally identifiable information, is collected and used

    Information Privacy

  • 23

    The notion that individuals should have the freedom, or right, to communicate information digitally with the expectation that their communications are secure.

    Communication Privacy

  • 24

    The notion that individuals have a right to exist freely on the internet, in that they can choose what types of information they are exposed to, and more importantly that unwanted information should not interrupt them.

    Individual Privacy

  • 25

    collect the minimal amount of information from individuals and businesses consistent with legal requirements.

    Data Minimization

  • 26

    Collection and use of identifiable information will be provided in a clear manner and mandated by law.

    Transparency

  • 27

    Information collected will be maintained in a sufficiently accurate, timely, and complete manner.

    Accuracy

  • 28

    Adequate physical and IT security measures will be implemented to ensure that the collection, use, and maintenance of identifiable information.

    Security

  • 29

    Beated Turing Test

    Eugene Goostman

  • 30

    every person should have this characteristic

    Universal

  • 31

    how easily the system is fooled into granting access to impostors

    Non-Circumventable

  • 32

    non-invasive and socially tolerable

    Acceptable

  • 33

    can be measured quantitatively

    Collectable

  • 34

    no two people should be exactly the same in terms of this characteristic

    Unique

  • 35

    invariant with time

    Permanent

  • 36

    must be safe and operate at a satisfactory performance level

    Reliable