bte2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the benefits of expert system?

1. Increased output and productivity 2. Increased quality 3. Expertise from anywhere in the world can be obtained and used. 4. Operation in hazardous environments 5. Accessibility to knowledge and help desks 6. Reliability: ESs do not become tired or bored, call in sick, or go on strike. They consistently pay attention to details. 7. Ability to work with incomplete or uncertain information 8. The explanation facility of an ES can serve as a teaching device and a knowledge base for novices. 9. ESs allow the integration of expert judgment into analysis 10. ESs usually can make faster decisions than humans working alone. 11. ESs can quickly diagnose machine malfunctions and prescribe repairs.

What is a ledger?

A system of records for a business. It records transactions.

What are the two types of markets that transactions can happen in?

Open market (auction) Closed market (supply chain)

What are basic guidelines for passwords?

- Difficult to guess - Long rather than short - Should have uppercase letters, lowercase letters, numbers, and special characters - Not recognizable words; - Not the name of anything or anyone familiar, such as family names or names of pets - Not a recognizable string of numbers, such as a Social Security number or a birthday.

Name the types of software attacks.

- Remote Attacks Requiring User Action - Remote Attacks Needing No User Action - Attacks by a Programmer Developing a System

What are the five factors contributing to vulnerability?

- Today's interconnected, interdependent, wirelessly networked business environment. - Smaller, faster, cheaper computers & storage devices. - Decreasing skills necessary to be a computer hacker. - International organized crime taking over cybercrime. - Lack of management support

Describe the steps of how a blockchain works,

1) A wants to send money to B. 2) The transaction is represented online as a "block". 3) The block is broadcast to every party in the network. 4) Those in the network approve the transaction is valid. 5) The block then can be added to the chain, which provides a permanent and transparent record of transactions. 6) The money moves from A to B.

List the steps to solving a problem with programming.

1) Analyze the problem. - Outline the problem and its requirements. - Design steps (algorithm) to solve the problem. 2) Implement the algorithm. - Code the algorithm in the programming language of choice. - Verify that the algorithm works. 3) Maintain the program.

What is the Gartner Magic Quadrant?

A method widely used to get a quick view about a market's competing technology providers and how they are competitively positioned. Understand providers' ability to deliver on what the business require today and in the future. Compare a technology provider's strengths and challenges with your specific needs

What is programming?

A process of problem solving. An algorithm is a step-by-step problem-solving process

What is the build or rebuild command?

A simple command that links the object code with the resources used from the IDE.

Who is the pioneer of AI?

Alan Turing

What is a blockchain?

An unchangeable system of record-keeping that is seeing a growing use well beyond financial transactions. Data is copied on multiple servers or computers and encrypted into blocks, which are then linked by hashes to previous blocks. This allows the system to reject any non-valid transactions.

When do human errors occur?

Higher level employees + greater access privileges = greater threat Two areas pose significant threats: Human Resources Information Systems Other areas of threats: Contract Labor, consultants, janitors, & guards

What are hash functions?

They are different from SKC and PKC. They use no key and are also called one-way encryption. They are mainly used to ensure that a file has remained unchanged.

What are the difficulties of expert systems?

Transferring domain expertise from human experts to the expert system can be difficult because people cannot always explain what they know. Even if the domain experts can explain their entire reasoning process, automating that process may not be possible In some contexts, there is a potential liability from the use of expert systems.

What are the two types of cryptocurrency keys? Describe them.

Public Key Cryptography (PKC): Here two keys are used. This type of encryption is also called asymmetric encryption. One key is the public key that anyone can access. The other key is the private key, and only the owner can access it. The sender encrypts the information using the receiver's public key. The receiver decrypts the message using his/her private key. For nonrepudiation, the sender encrypts plain text using a private key, while the receiver uses the sender's public key to decrypt it. Thus, the receiver knows who sent it. The private key is called the secret key.

What is alien software? Name them.

Secret software that is installed on your computer through deceitful methods. - Adware: Software that causes pop-up advertisements to appear on your screen. - Spyware: Software that collects personal information about users without their consent.

What are the two types of assets?

Tangible - house, products, cash Intangible - mortgage, services, online music/video

What is a while loop (repetition) statement?

This expression provides an entry condition to the loop . The statement (body of the loop) continues to execute until the expression is no longer true. An infinite loop continues to execute endlessly (expression never false).

What is the Turing Test?

a blind test to determine if someone can tell the difference between talking to a human and talking to a machine if you are a programmer, the goal is to have the person taking the test to fail

Name software attacks that require user action.

- A virus is a segment of computer code that performs malicious actions by attaching to another computer program. - A worm is a segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program). - Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages. - Spear phishing attack find out as much information about an individual as possible to improve their chances that phishing techniques will obtain sensitive, personal information.

Name software attacks that require no user action.

- Denial of Service Attack: An attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes. - Distributed Denial of Service Attack: An attacker first takes over many computers, typically by using malicious soft ware. These computers are called zombies or bots. The attacker uses these bots—which form a botnet—to deliver a coordinated stream of information requests to a target computer, causing it to crash.

Name deliberate threats to information systems.

- Espionage or Trespass: An unauthorized individual attempts to gain illegal access to organizational information. - Information Extortion: An attacker either threatens to steal, or actually steals, information from a company. The perpetrator demands payment for not stealing the information, for returning stolen information, or for agreeing not to disclose the information. - Sabotage or Vandalism: Deliberate acts that involve defacing an organization's Web site, potentially damaging the organization's image and causing its customers to lose faith. - Theft of Equipment or Information: Devices are becoming smaller and as a result easier to be stolen. - Identity Theft: Deliberate assumption of another person's identity. - Compromises to intellectual property such trade secrets, patent, and copyright. - Supervisory Control and Data Acquisition (SCADA) Attacks: SCADA systems are used to monitor or to control chemical, physical, and transport processes such as those used in oil refineries, water and sewage treatment plants, electrical generators, and nuclear power plants. - Cyberterrorism and Cyberwarfare: Malicious acts in which attackers use a target's computer systems, particularly via the Internet, to cause physical, real-world harm or severe disruption, often to carry out a political agenda. - Software Attacks - Alien Software

Design an algorithm to find the perimeter and area of a rectangle. The perimeter and area of the rectangle are given by the following formulas: perimeter = 2(length + width) area = (length)(width)

- Get the length (L) of the rectangle - Get the width (W) of the rectangle - Validate what is entered - Calculate Perimeter Perimeter = 2(length + width) - Display calculated Perimeter - Calculate Area Area = length * width - Display calculated Area

Name common human errors.

- Losing or misplacing devices - Using devices carelessly so that malware is introduced into an organization's network - Opening e-mails from someone unknown, or clicking on links embedded in e-mails - Accessing questionable Web sites; can result in malware and/or alien software being introduced into the organization's network - Choosing and using weak passwords - Carelessness with one's office - Discarding computer hardware without completely wiping the memory - Careless monitoring of environmental hazards such as dirt, dust, humidity, and static electricity, are harmful to the operation of computing equipment.

What are artificial information systems that learn from data? Describe them.

- Optical character recognition: Printed, handwritten characters are recognized automatically based on previous examples. - Face recognition: Identify faces in images. - Topic identification: Categorize news articles as to whether they are about politics, sports, entertainment, and so on. - Fraud detection: Identify credit card transactions that may be fraudulent. - Customer segmentation: Identify which customers may respond positively to a particular promotion.

Name and describe information security controls.

- Physical controls prevent unauthorized individuals from gaining access to a company's facilities. EX: walls, doors, locks, badges, guards, and alarm systems - Access controls restrict unauthorized individuals from using information resources and involve two major functions: authentication and authorization. - Communication controls secure the movement of data across networks.

Name software attacks by a programmer developing a system.

- Trojan Horse: Software programs that hide in other computer programs and reveal their designed behavior only when they are activated. - Back Door: Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures (also called a trap door). - Logic Bomb: A segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.

How does expert systems transfer knowledge from the expert to the computer to the user?

1) Knowledge is acquired from domain experts or from documented sources. 2) Acquired knowledge is organized as rules or frames (object-oriented) and stored electronically in a knowledge base. 3) The computer is programmed so that it can make inferences based on the stored knowledge. 4) The inferenced expertise is transferred to the user in the form of a recommendation.

List the steps to flowchart the sum of 5 numbers.

1) Set variables (totalsum, counter) to zero 2) Get number (n) from user 3) Add n to totalsum 4) Increase counter by 1 5) If counter less than 5, repeat from step 2 else, print total sum

List the steps needed to process a C++ program.

1) Use a text editor to create the source code (source program) in C++ 2) Include preprocessor directives. Begin with the symbol # and are processed by the preprocessor. 3) Use the compiler to check that the program obeys the language rules and translate the program into machine language (object program). It guarantees that the program follows the rules, not that it will run correctly since it doesn't know what the human wants. 4) Use an Integrated Development Environment (IDE) to develop programs in a high-level language. Programs such as mathematical functions are available. The library contains prewritten code you can use. A linker combines object program with other programs in the library to create executable code. 5) The loader loads executable program into main memory. 6) The last step is to execute the program.

What is a programming language? Give examples.

A computer language engineered to create a standard form of commands. These commands can be interpreted into a code understood by a machine. It is a set of rules, symbols, and special words. EX: C, C++, Java, Python

What is an expert system (ES)?

A computer system that emulates the decision-making ability of a human expert.

Give examples of communication controls.

A firewall is a system that prevents a specific type of information from moving between untrusted networks, such as the Internet, and private networks, such as your company's network. Anti-malware Systems are software packages that attempt to identify and eliminate viruses and worms, and other malicious software. Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

What is the chasm and how do you cross it?

A gap between visionary early adopters and the pragmatic majority. Crossing the chasm requires securing a specific niche.

What is the Gartner Hype Cycle

A method that separates hype from the real drivers of a technology's commercial promise. Helps educate people on an emerging technology within the context of the industry and individual appetite for risk. Should you make an early move? Taking risk could reap the rewards for early adoption, but one small step from the Leading Edge to the Bleeding Edge.

What is artificial intelligence (AI)?

A subfield of computer science that studies the thought processes of humans and recreates the effects of those processes via machines, such as computers and robots. Also, behavior by a machine that, if performed by a human being, would be considered intelligent.

What is a neural network? Give examples.

A system of programs and data structures that simulates the underlying functions of the biological brain EX: Bruce Nuclear Facility, Research into Diseases, Banking System Fraud Detection

What are unintentional threats to information systems?

Acts performed without malicious intent that nevertheless represent a serious threat to information security, such as human errors.

- There are 6 students in a class. - Each student has taken five tests. - Each test is worth max 100 points. Design algorithms to: - Calculate the grade for each student. - Calculate the class average grade.

Algorithm to determine the student grade: if average is greater than or equal to 90 grade = A otherwise if average is greater than or equal to 80 grade = B otherwise if average is greater than or equal to 70 grade = C otherwise if av. is greater than or equal to 60 grade = D otherwise grade = F Algorithm to determine the class average test score: Get the five test scores. Add the five test scores. - the sum of the test scores is represented by sum - suppose average stands for the average test score: average = sum/5 Main algorithm: totalAverage = 0; Repeat (loop) the following for each student: - Get student's name - Find the average test score (use given algorithm) - Find student letter grade (use given algorithm) - Update totalAverage by adding current student's average test score. Determine the class average as follows: classAverage = totalAverage/6

What is information security?

All of the processes and policies designed to protect an organization's information and information systems (IS) from unauthorized access, use, disclosure, disruption, modification, or destruction

What are authentication and authorization?

Authentication confirms the identity of the person requiring access using: - Something the user is also known as biometrics, examines a person's innate physical characteristics - Something the user has such as ID cards, smart ID cards, and tokens. - Something the user does includes voice and signature recognition. - Something the user knows includes passwords and pass-phrases. Authorization determines which actions, rights, or privileges the person has, based on his or her verified identity.

What is the difference between blockchain and bitcoin?

BLOCKCHAIN: - A methodology - Identity of members is known - Permissioned network - Transactions are secret or permission-viewing - Virtual Signing - Handles many types of assets - Selective endorsement BITCOIN: - A blockchain application - Anonymity is important - Anyone can participate - Transactions are viewable by all members of the network - Based on Public-Private Keys - A cryptocurrency - Based on Proof of Work Unlike the bitcoin application which is open, public and anonymous making its security and trust questionable - blockchain for business is private, uses permission and running on smart contracts. Blockchain is more than bitcoin.

What is the advantage of Bitcoin?

Current payment systems require third-party intermediaries that often charge high-processing fees but bitcoin allows for direct payment between individual and supports micropayments.

What are the characteristics of a blockchain?

Distributed: It is a distributed digital ledger that keeps records of transaction, value, and ownership of assets Copies of the ledger are kept in different databases CONCENSUS: Everyone (or a Regulator) must validate and approve the new transaction/block. SECURED: Uses cryptography to process digital transactions or verifiable digital signature. IMMUTABLE: Once a transaction is recorded into a block, a block can't be changed nor deleted. PROVENANCE: Blocks must show connection to (fingerprint of) prior block, keeping a trail.

What is a 2-way selection statement?

IF expression is true, statement1 is executed; otherwise (else), statement2 is executed statement1 and statement2 are any C++ statements

What are the five key phrases of a technology's life cycle according to the Gartner Hype Cycle?

Innovation Trigger: A potential technology breakthrough kicks things off. Early proof-of-concept stories and media interest trigger significant publicity. Often no usable products exist and commercial viability is unproven. Peak of Inflated Expectations: Early publicity produces a number of success stories — often accompanied by scores of failures. Some companies take action; many do not. Trough of Disillusionment: Interest wanes as experiments and implementations fail to deliver. Producers of the technology shake out or fail. Investments continue only if the surviving providers improve their products to the satisfaction of early adopters. Slope of Enlightenment: More instances of how the technology can benefit the enterprise start to crystallize and become more widely understood. Second- and third-generation products appear from technology providers. More enterprises fund pilots; conservative companies remain cautious. Plateau of Productivity: Mainstream adoption starts to take off. Criteria for assessing provider viability are more clearly defined. The technology's broad market applicability and relevance are clearly paying off.

What is cryptography?

It converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format

What is cryptocurrency?

It is a digital currency that uses cryptography for security measures. Each user has both public and individual private keys. It operates independently of a central bank.

What is Bitcoin?

It is based on blockchain methodology. It's an unregulated shadow-currency and was created as a decentralized digital currency exchange system to exchange digital currency without the banks as intermediaries, while keeping (pseudo) anonymity. It is resource intensive (requires Proof of Work Consensus). It was created in 2008 after the Global Financial crisis

How does the Gartner Magic Quadrant work? Name the quadrants.

It provides a graphical competitive positioning of 4 types of technology providers, in markets where growth is high and provider differentiation is distinct: 1) Leaders execute well against their current vision and are well positioned for tomorrow. 2) Visionaries understand where the market is going or have a vision for changing market rules, but have yet to execute well. 3) Niche Players focus successfully on a small segment, or are unfocused and do not out-innovate or outperform others. 4) Challengers execute well today or may dominate a large segment, but do not demonstrate an understanding of market direction.

What are the components of expert systems? Describe them.

Knowledge Base Facts: such as the problem situation. Rules: direct the use of knowledge to solve specific problems in a particular domain. Inference Engine is a computer program that provides a methodology for reasoning and formulating conclusions. User Interface is the dialogue between the user and the computer triggers the inference engine to match the problem symptoms with the knowledge contained in the knowledge base and then generate advice.

Name inside and outside threats.

Outside: Internet, natural disasters, man-made disasters Inside: Employees, other insiders, system software, hardware threats

Describe the meaning of flowchart shapes.

Ovals represent a start or end point. Arrows/lines represent a connector that shows relationships between the shapes. Parallelograms represent input or output. Rectangles represent a process. Diamonds represent decisions.


Set pelajaran terkait

MISCELLANEOUS QUESTIONS BSO FINAL

View Set

Chapter 7 the nurse client relationship

View Set

Comp 1, Comp 8, Comp 7, Comp 6, Comp 5, Comp 4, Comp 3, Comp 2

View Set

Test, chapter 7. 2 practice test

View Set

Fundamentals Assessment Intro to AH HESI

View Set