6.6-7.3
True or False: Semantic errors can be detected by the compiler.
False
our classmate discovers that their LightsOff app has a bug in it. What should he/she do to debug their app?
Form a hypothesis about what might be wrong, design an experiment to test their hypothesis, perform the experiment, debug, and then retest the app.
frequency analysis
Frequency analysis counts the occurrence of the letters in an encrypted message in an effort to discover patterns that might reveal the encryption key.
HTTPS
HTTPS is a protocol for secure (trusted, encrypted) communication over the Internet.
Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.
(A) I
cipher
A cipher is a system for creating secret messages.
intractable
A computational problem is intractable if the only known way to solve the problem depends on an exponential algorithm
public key cryptography
A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When Bob wants to send a secure message to Alice, he uses Alice's public key to encrypt the message. Alice then uses her private key to decrypt it.
digital certificate
A digital certificate is a data packet that certifies the holder of a public key.
run-time error
A mistake in the program that occurs during the execution of a program.
Unauthorized access to computing resources can be gained through which of the following? Select all that apply.
A rogue access point,Phishing, Keylogging
asymmetric cipher
An asymmetric cipher is one in which separate but related keys are used for encryption and decryption.
logic/semantic error
An error in which the program is not working as it is designed to work. Also referred to as a logic error.
syntax error
An error that results from a violation of the programming language grammatical rules.
computer bug
An informal term for error in computer hardware or software -- the term was coined by Grace Hopper.
encryption
Encryption is the process of using a secret key to convert plaintext into ciphertext.
Which of the following would NOT count as 2FA in addition to entering a password?
Entering your password twice.
ciphertext
Ciphertext is an unreadable, secret message.
cryptography
Cryptography means, literally, 'secret writing'. The art and science of writing secret messages.
What does "data science" refer to?
Data science refers to manipulating large data sets to gain information from them.
decryption
Decryption is the process of using a secret key to convert ciphertext into plaintext.
diffie-hellman
Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used to exchange a symmetric cryptographic key among two parties, Alice and Bob, who wish to communicate securely.
Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?
Do the movement patterns of the animal vary according to the weather
polyalphabetic substitution
In a polyalphabetic substitution system multiple alphabets are used to encrypt a single message.
substitution cipher
In a substitution cipher letters from a ciphertext alphabet are substituted for the letters in a plaintext message in a systematic way.
symmetric encryption
In a symmetric encryption system the same key is used for both encryption and decryption.
transposition cipher
In a transposition cipher letters in the plaintext are rearraged without substitution.
brute force attack
In cryptography, a brute force attack attempts to try every possible encryption key to break a secret message.
certificate authority
In cryptography, a certificate authority (CA) is an entity that issues digital certificates.
Order the following statements on the Data-Information-Knowledge-Wisdom pyramid
Information: The child said "water" most frequently in the kitchen and the bathroom Knowledge: The child is likely to learn words heard in multiple locations Data: The child said "Truck" for the first time at 11:45 on January 15, 2017
plaintext
Plaintext is the unencrypted, readable message.
rsa
Rivest-Shamir-Adleman (RSA) is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.
Which of the following can you do to prevent against malware? Select all that apply.
Run malware scanning software. Run regular software updates. Don't click or open anything from a source that you don't know or can't identify.
SSL
SSL (Secure Socket Layer) is a protocol for establishing an encrypted link between a web server and a browser
A ____________ error occurs when a programmer inadvertently puts code that is syntactically correct, but does not do what the programmer intended it to do.
Semantic
Caesar cipher, simple substitution cipher, and Vigener cipher are all examples of __________ ciphers.
Symmetric and Substitution
Which of the following are examples of semantic errors in App Inventor?
The PaintPot ButtonMinus.Click event adding 1 to dotsize. The PaintPot ButtonRed.Click setting the Canvas1.PaintColor to blue.
Based on the Joy Buolamwini's research, IBM retrained its system using a more diverse set of faces. How would you interpret the new results?
The bias in the system was nearly entirely removed by retraining.
encryption algorithm
The encryption algorithm uses a secret key to encrypt messages.
encryption key
The encryption key is a piece of secret data used in by encryption and decryption algorithms.
key exchange problem
The key exchange problem is the problem of sharing a secret cryptographic key between Alice and Bob without Eve being able to intercept it.
one time pad
The one time pad system is an example of perfect (unbreakable) encryption, which is achieved by using, only once, a random polyalphabetic key that is as long the message itself.
debugging
The process of removing errors from computer hardware or software.
trust model
The use of a trusted third party to verify the trustworthiness of a digital certificate.
True or False: In computer programming, a bug is an error or defect that prevents the app from working the way it is supposed to.
True
A polyalphabetic cipher is one that
Uses multiple alphabets
virus
a malicious program that can copy itself and gain access to a computer in an unauthorized way.
strong password
a password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.
keylogger
a program to record every keystroke made by a computer user.
phishing
a technique that is used to trick a user into providing personal information usually through email.
rogue access point
a wireless access point that gives unauthorized access to secure networks.
firewalls
barriers that protect a network from unauthorized access
The term Big Data refers to _________________.
data sets that are too large and complex to download and process on a single computer
True or False: A Terabyte is equivalent to 1000 bytes.
false
True or False: Big data only contains numeric data, it does not include text, images or videos.
false
One technique that can be used to break a Caesar cipher is called?
frequency analysis; Frequency analysis is the technique whereby you count the letters in the secret message. In English, the letter with the highest frequency is 'e'. By counting letter frequencies you can identify the shift that was used to encrypt the message. That is why the Caesar cipher is not a secure cipher.
One one-way function ________________
is a function that is easy to compute in one direction but hard to compute in the other.
The HTTPs protocol _______________.
is an example of an open standard. uses public key encryption to exchange a symmetric key between a user's browser and a server. uses a symmetric cipher to encrypt data between a user's browser and a server. uses a Certificate Authority to authenticate the identity of the server during the transaction.
An asymmetric cipher________________
is exemplified by RSA and Diffie-Hellman. Uses different keys for encryption and decryption. Can be used to solve the key exchange problem.
ransomware
malware that encrypts and locks computer systems until a ransom is paid.
In computer programming, syntax is the __________ that determines whether statements are correctly formulated.
set of rules
Suppose that the following word, EAIWSQI, was encrypted with a Caesar cipher and when you do a frequency analysis you learn that the most frequent letter was 'i'
shift to letter i then decipher
malware
software intended to damage a computing system or to take partial control over its operation.
A ____________ error occurs when a programming language's rules are broken. This type of error can be detected by the compiler which will provide an error message.
syntax
The key exchange problem is ____
the problem of securely sharing a symmetric key between Alice and Bob.
True or False: When Joy Buolamwini says that current face recognition systems are "pale and male" she means that since the data used to train these systems consisted largely of white, male faces, these systems perform poorly for other faces.
true
multi-factor authentication (MFA)
users are asked to present several separate pieces of evidence involving knowledge (something they know like a password), possession (something they have like a texted code), and/or inherence (something they are like biometrics).
biometrics
using unique physical characteristics such as finger prints, face recognition, etc. for identification