6.6-7.3

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

True or False: Semantic errors can be detected by the compiler.

False

our classmate discovers that their LightsOff app has a bug in it. What should he/she do to debug their app?

Form a hypothesis about what might be wrong, design an experiment to test their hypothesis, perform the experiment, debug, and then retest the app.

frequency analysis

Frequency analysis counts the occurrence of the letters in an encrypted message in an effort to discover patterns that might reveal the encryption key.

HTTPS

HTTPS is a protocol for secure (trusted, encrypted) communication over the Internet.

Which of the following are true statements about digital certificates in Web browsers? I. Digital certificates are used to verify the ownership of encrypted keys used in secured communication. II. Digital certificates are used to verify that the connection to a Web site is fault tolerant.

(A) I

cipher

A cipher is a system for creating secret messages.

intractable

A computational problem is intractable if the only known way to solve the problem depends on an exponential algorithm

public key cryptography

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When Bob wants to send a secure message to Alice, he uses Alice's public key to encrypt the message. Alice then uses her private key to decrypt it.

digital certificate

A digital certificate is a data packet that certifies the holder of a public key.

run-time error

A mistake in the program that occurs during the execution of a program.

Unauthorized access to computing resources can be gained through which of the following? Select all that apply.

A rogue access point,Phishing, Keylogging

asymmetric cipher

An asymmetric cipher is one in which separate but related keys are used for encryption and decryption.

logic/semantic error

An error in which the program is not working as it is designed to work. Also referred to as a logic error.

syntax error

An error that results from a violation of the programming language grammatical rules.

computer bug

An informal term for error in computer hardware or software -- the term was coined by Grace Hopper.

encryption

Encryption is the process of using a secret key to convert plaintext into ciphertext.

Which of the following would NOT count as 2FA in addition to entering a password?

Entering your password twice.

ciphertext

Ciphertext is an unreadable, secret message.

cryptography

Cryptography means, literally, 'secret writing'. The art and science of writing secret messages.

What does "data science" refer to?

Data science refers to manipulating large data sets to gain information from them.

decryption

Decryption is the process of using a secret key to convert ciphertext into plaintext.

diffie-hellman

Diffie Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used to exchange a symmetric cryptographic key among two parties, Alice and Bob, who wish to communicate securely.

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

Do the movement patterns of the animal vary according to the weather

polyalphabetic substitution

In a polyalphabetic substitution system multiple alphabets are used to encrypt a single message.

substitution cipher

In a substitution cipher letters from a ciphertext alphabet are substituted for the letters in a plaintext message in a systematic way.

symmetric encryption

In a symmetric encryption system the same key is used for both encryption and decryption.

transposition cipher

In a transposition cipher letters in the plaintext are rearraged without substitution.

brute force attack

In cryptography, a brute force attack attempts to try every possible encryption key to break a secret message.

certificate authority

In cryptography, a certificate authority (CA) is an entity that issues digital certificates.

Order the following statements on the Data-Information-Knowledge-Wisdom pyramid

Information: The child said "water" most frequently in the kitchen and the bathroom Knowledge: The child is likely to learn words heard in multiple locations Data: The child said "Truck" for the first time at 11:45 on January 15, 2017

plaintext

Plaintext is the unencrypted, readable message.

rsa

Rivest-Shamir-Adleman (RSA) is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.

Which of the following can you do to prevent against malware? Select all that apply.

Run malware scanning software. Run regular software updates. Don't click or open anything from a source that you don't know or can't identify.

SSL

SSL (Secure Socket Layer) is a protocol for establishing an encrypted link between a web server and a browser

A ____________ error occurs when a programmer inadvertently puts code that is syntactically correct, but does not do what the programmer intended it to do.

Semantic

Caesar cipher, simple substitution cipher, and Vigener cipher are all examples of __________ ciphers.

Symmetric and Substitution

Which of the following are examples of semantic errors in App Inventor?

The PaintPot ButtonMinus.Click event adding 1 to dotsize. The PaintPot ButtonRed.Click setting the Canvas1.PaintColor to blue.

Based on the Joy Buolamwini's research, IBM retrained its system using a more diverse set of faces. How would you interpret the new results?

The bias in the system was nearly entirely removed by retraining.

encryption algorithm

The encryption algorithm uses a secret key to encrypt messages.

encryption key

The encryption key is a piece of secret data used in by encryption and decryption algorithms.

key exchange problem

The key exchange problem is the problem of sharing a secret cryptographic key between Alice and Bob without Eve being able to intercept it.

one time pad

The one time pad system is an example of perfect (unbreakable) encryption, which is achieved by using, only once, a random polyalphabetic key that is as long the message itself.

debugging

The process of removing errors from computer hardware or software.

trust model

The use of a trusted third party to verify the trustworthiness of a digital certificate.

True or False: In computer programming, a bug is an error or defect that prevents the app from working the way it is supposed to.

True

A polyalphabetic cipher is one that

Uses multiple alphabets

virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way.

strong password

a password that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

keylogger

a program to record every keystroke made by a computer user.

phishing

a technique that is used to trick a user into providing personal information usually through email.

rogue access point

a wireless access point that gives unauthorized access to secure networks.

firewalls

barriers that protect a network from unauthorized access

The term Big Data refers to _________________.

data sets that are too large and complex to download and process on a single computer

True or False: A Terabyte is equivalent to 1000 bytes.

false

True or False: Big data only contains numeric data, it does not include text, images or videos.

false

One technique that can be used to break a Caesar cipher is called?

frequency analysis; Frequency analysis is the technique whereby you count the letters in the secret message. In English, the letter with the highest frequency is 'e'. By counting letter frequencies you can identify the shift that was used to encrypt the message. That is why the Caesar cipher is not a secure cipher.

One one-way function ________________

is a function that is easy to compute in one direction but hard to compute in the other.

The HTTPs protocol _______________.

is an example of an open standard. uses public key encryption to exchange a symmetric key between a user's browser and a server. uses a symmetric cipher to encrypt data between a user's browser and a server. uses a Certificate Authority to authenticate the identity of the server during the transaction.

An asymmetric cipher________________

is exemplified by RSA and Diffie-Hellman. Uses different keys for encryption and decryption. Can be used to solve the key exchange problem.

ransomware

malware that encrypts and locks computer systems until a ransom is paid.

In computer programming, syntax is the __________ that determines whether statements are correctly formulated.

set of rules

Suppose that the following word, EAIWSQI, was encrypted with a Caesar cipher and when you do a frequency analysis you learn that the most frequent letter was 'i'

shift to letter i then decipher

malware

software intended to damage a computing system or to take partial control over its operation.

A ____________ error occurs when a programming language's rules are broken. This type of error can be detected by the compiler which will provide an error message.

syntax

The key exchange problem is ____

the problem of securely sharing a symmetric key between Alice and Bob.

True or False: When Joy Buolamwini says that current face recognition systems are "pale and male" she means that since the data used to train these systems consisted largely of white, male faces, these systems perform poorly for other faces.

true

multi-factor authentication (MFA)

users are asked to present several separate pieces of evidence involving knowledge (something they know like a password), possession (something they have like a texted code), and/or inherence (something they are like biometrics).

biometrics

using unique physical characteristics such as finger prints, face recognition, etc. for identification


Ensembles d'études connexes

Chapter 51 Caring for Clients with Diabetes Mellitus

View Set

Chapter 32 - the toddler and family (evolve)

View Set

Dynamics of Healthcare, Chapter 3, Unit test

View Set

Postpartum Psychosocial Adaptations Ch. 18

View Set

HTH-4503 Human Disease & Epidemiology Exam 1 Study Guide

View Set