ISQS unit 2 exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are the three categories that an IoT device can be put into?

- Sensors that collect information and then send it. -Computers that receive information and then act on it. -Things that do both.

What are some of the things that a business can do to develop a data-savvy workforce?

- start from the top with data-driven leadership - use data everywhere and embed it into your culture

What are the key challenges the article suggests need to be addressed to create a health AI ecosystem?

-BIAS bulit into data -AL-inducded bias -Teaching Al-human rules -Evaluating cases of suspected Al Bias

What is one of the biggest issues with IoT? Why?

-Lack of security -Can invade privacy

What should a robust security awareness training program cover?

-Phishing and social engineering -Access, passwords, and connection -Device security -Physical security

according to the prep material, which of the following are social engineering attacks that hackers use

-credential harvesting - phishing -phone phishing

Malware Symptoms

-slowdowns -pop-up windows -fake warnings

What are some of the things that will help to create a better relationship with your mobile device? Select all that apply.

-use the sight of other people on their phones as a reminder of your own intentions - pay attention to your body -ask yourself what you want to pay attention to -create speed bumps (or small obstacles that force you to slow down and make sure that when you do check your phone, it's the result of a conscious choice)

Malware Protection

1. Antivirus and anti spyware programs 2. Scan frequently 3. Update malware definitions 4. Open email attachments only from known sources 5. Install software updates 6. Browse only reputable Internet neighborhoods

Three categories of IoT

1. Things that collect information and then send it (sensors, data) 2. Things that receive information and act on it 3. Things that do both (1) and (2)

QR codes have gone mainstream, but they are also being used by "bad actors". According to the FBI, what are the 3 ways that cybercriminals are using QR codes for nefarious purposes?

1. email/coin-based 2. embedded malware (steal financial info) 3.directly download software

It is estimated by IDC that by 2025, ____________ IoT devices will be in use.

41.6 billion

What did research out of Oxford suggest about how many jobs may be automated by machines?

47% could be done by machines "over the next decade or two"

______ Of cyber attacks are successful

50 %

according to the prep material notes, _____ of all cyber attacks are successful

50%

Almost ______ of cyber-attacks are causes by human error or behavior

90%

What is a blockchain "at its heart"? In what ways are blockchains used for more than just the "movement of money"?

A blockchain is a record of transactions, like a traditional ledger. These transactions can be any movement of money, goods or secure data

fundamentally, how does blockchain technology work (make sure you include concepts such as blocks, hash, etc. in your explanation)?

A blockchain needs to do two things: gather and order data into blocks, and then chain them together securely using cryptography.

What is an intermediary (also called a "middleman")?

A middleman is a so called stopping point between two things

Blockchain provides a simple, secure way to establish trust for virtually any kind of transaction. true or false

true

T or F Blockchain provide a simple secure way to establish trust for virtually any kind of transaction

true

Tableau helps you to see the stories in your data. true or false

true

A ___________ bias is an issue with AL systems where biases can be created within AL system

AI induced

in-between strong & weak AI

AI informed or inspired human reasoning (human reasoning as a guide) IBM Watson: pushes the limits of strong & weak AI

What are the main aims of cyber attacks?

usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes

according to article, data are not really important unless you first understand what? Why might this be the case (and why is it the case for Google)?

what they were doing

what is data driven culture

when an organization's progress is measured using data rather than intuition (gut feel) or past examples (personal experience). In the scientific world, this is usually referred to as evidence-based decision making.

What are the security best-practices the article mentions

when it comes to passwords they're creating, especially for passwords used to access IT environments.

Some implications of IoT

Automation of mundane tasks Remote accessibility Better control over maintenance of devices LOTS of data Security concerns Privacy concerns

According to the article, how many hours per day does the average person spend interacting with his or her smartphone

Average person spends 4 hours a day interacting on there phone

Why are phishing and social engineer attacks so successful?

Because they appear to come from a credible source, deceiving the end user into thinking it's a piece of communication they can trust.

What does the article suggest are the main business benefits to IoT?

Benefits all depend on the particular implementation -Agility and effectiveness (usually top considerations) - Businesses should have more access to data about their own products -Relate data faster back to companies so they can evaluate performance

Biases in data

Biases in the data-either deliberate or unconscious-will leads to boarded output from the system

strategies to take control

GET IT FROM IQSQ SLIDES

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

What are the parts of a successful cyber security approach and what does it involve?

In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks

Key factories in IoT growth

Inexpnisive processors and seniors with low power requirements Wireless data and broadband internet ( connectivity) RFID tags IPv6 (an address for every device) Ipv4 (4.3 billion addresses) vs IPv6 (3.4 x 10^38 addresses)

What is IoT?

Internet of Things (IoT) is the collection of devices that can communicate over the Internet with each other or with a control console in order to affect and monitor the real world. IoT devices might be labeled as smart devices or smart home equipment.

According to prep material developing a deep understanding of the metrics that influence key performance indicators (KPI) and the capability to do analytical reporting

Investigate trends Predict outcomes Discover new insights

What is the overarching goal of AI? (See the AI: A textbook definition section in the article.)

Its goal is to enable the development of computers that are able to do things normally done by people -- in particular, things associated with people acting intelligently.

What is a smart contract?

Just program code that is baked into that transaction, making it conditional.

"Mounting evidence" suggests "that using a smartphone, or even hearing one ring or vibrate," does what regarding concentration, reasoning, and performance?

Makes a welter of distractions and makes it very hard for a person to concentrate

What does Carlos Sandrea, VP and head of mobile at MediaMath, suggest about new technologies and their impact on mobile?

Mobile will become the predominant media channel and will be defined beyond our smartphones to include wearables, connected cars, VR-power devices, and chatbots

What impact will blockchain have on intermediaries?

No record can be deleted or changed

Personal Safeguards

Passwords, user profiles, antivirus, and policies put in place to help ensure users/employees are taking responsible actions to improved systems security

general Al

Perform general (human) intelligent action Self-Learns and reasons whit its operating environment Learns from few examples and/or from unstructured data Full range of human cognitive abilities Leverages knowledge transfers to new domains and tasks

How might smart contracts impact various industries (as discussed in the article)

This makes the contract self-enforcing, by transferring funds only when the conditions are met

What are some of the ways the article suggests will help you to create a better relationship with your mobile device? Consider and state how these suggestions will help you specifically (if at all)?

Set up yourself for success Ask yourself what you want to pay attention to Create speed bumps

IoT is a "significant driver" of what? Why?

Significant driver of big data analytics projects This is because it allows companies to create vast data sets and analysis them

What does the article suggest businesses do to "build a data-savvy workforce"? How will each of these things help (e.g., not relying on the "HiPPO", etc.)?

Start from the top with data-driven leadership Hire data-driven team members Look within your existing ranks

human safeguards

Steps taken to protect against security threats by establishing appropriate procedures for users to follow during system use.

What is the 51% attack? How does it work?

Susceptibility to 51% attacks is inherent to most cryptocurrencies, based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining

What does the article suggest is IoT's "takeaway definition"? Also, what does the article suggest as to why IoT matters?

Takeaway: extending the power of internet connectivity beyond computers to a whole range of other things, processes, and environments. Those connected, smarter, things are used to gather information, send information, or both. Matter: IoT provides businesses and people better insight into and control over objects and environments that are currently beyond the reach of the internet. By doing so, IoT helps businesses and people to be more connected to the world around them and to do more meaningful, higher-level work.

Machine Learning ( a branch off the domains of a AI tree)

Technique for making a computer produce better results by learning from past experiences. looking for patterns

5G

The fifth-generation wireless broadband technology * handle massive data volume with high transaction rates

What is the brief history of IoT, and what technologies helped to bring about IoT as we know it today?

The overall idea of adding sensors and intelligence base object was discussed in the early 1980s and 90s (but may have been before by ancestors) The adoption of RFID tags and IPv6 was a big step in IoT

What does the article suggest is the "real power of the Internet of Things"?

The real power of IoT arises when things can both collect information act on it.

T or F Data are not really helpful unless you understand the question you need to answer

True

artifical intelligence

Type of software that can process information on its own without human intervention.

According to the article, which emerging technologies are redefining mobile technology? In what ways are each of these technologies redefining mobile?

Voice: mobile voice has an advantage over other voice-enabled home devices because the phone hardly ever leaves its owner's side. Facial regonlintion: very popular among many devices

Tableau is "designed to help you be _______, so you can make ________ _________, faster."

smarter, better decisions fast

The Tableau application allows you to "______, __________, _____________, or ________ your data in seconds."

sort, highlight, drill down or fliter

downsides of smartphones

spend a lot of time on your phone 4+ hrs depression, addictions

The Tableau application helps you to "see the ___________ in your data

story

Weak Artificial Intelligence

systems that can mimic human behavior in a narrow context ex: alexa, siri

narrow Al

technologies that can perform specific tasks as well as, or better than, humans

How does Google use data and analytics in their "People Analytics Department"?

that supports the organisation with making HR decisions with data

According to the article, what has become a major weak point for an organization's information security, and what number backs this up?

What this means is that human error is a major point of weakness. Reports have shown that as much as 90% of cyberattacks are caused by human behavior

Strong Artificial Intelligence

the computer is reasoning like a human is reasoning ex: solving puzzles, making decisions

Disintermediation

the cutting out of marketing channel intermediaries by product or service producers or the displacement of traditional resellers by radical new types of intermediaries

how many devices of IoT are to be expected by 2025

total of 41.6 billion connected lot devices by 2025

Is data privacy an issue for IoT? Why or why not?

Yes, it can invade personal privacy ( think of smart homes) -Rings -Cameras -echos/ alexas

What happens when our brains "grow dependent" on smartphones?

You develop intellectual weakness

Firewall

a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

What are KPIs, and how do they relate to data analytics and having a data-driven culture? What will having "a deep understanding of the metrics that influence those KPIs ..." do for organizations.

ability to develop strategic insights into what is influencing your key performance indicators (KPIs) A deep understanding of the metrics that influence those KPIs, and the capability to do analytical reporting, will help process all your data and create a data-driven team that investigates trends, predicts outcomes, and discovers new insights.

Blockchain provides a simple, secure way to establish trust for virtually any kind of transaction. true or false

ans : true

_______________ was the cryptocurrency blockchain was initially created to support?

bitcoin

According to the article, a blockchain "is a cryptographic database maintained by a

by a network of computers, each of which stores a copy of the most up-to-date version.

According to the definition provided in the article, "artificial intelligence is a sub-field of

computer science

What is a blockchain node?

computers on a network

A(n) _________ bias is an issue with artificial intelligence (AI) systems given that these systems use prior information to learn.

data

A(n) _________ bias is an issue with artificial intelligence (AI) systems given that these systems use prior information to learn. Select the best answer. data AI-induced context All of the above

data

Differentiate between data and AI-induced biases

data is previous records and AI induced bias may use data and create bad situations

What does "DeFi" stand for

decentralized finance

IBM's _____________ is a good example of a system that does not think like humans.

deep blue

IBM's _____________ is a good example of a system that does not think like humans. Watson Dartmouth Project Deep Blue All of the above

deep blue

How does IoT work?

describes the network of physical objects—"things"—that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet

T or F The only practical app of blockchain tech is to support crypto

false

Tableau "makes analyzing data ________, ________, and _______________ for everyone."

fast, easy and beautiful

The Tableau application allows you to "bring all your data together _____________________ ________."

in one simple view

What is a blockchain protocol?

is a set of rules that dictate how the computers in the network, called nodes, should verify new transactions and add them to the database

What is cyber security?

is the practice of protecting systems, networks, and programs from digital attacks.

mobile technology

is the technology used for cellular communication

What ways does the article suggest that you can protect yourself from malicious QR codes?

make sure its legit website never scan an email QR code if you created one, make sure its the one you created

Identify the objectives for those working on building AI-based systems? (See the Strong AI, weak AI and everything in between section in the article.)

or some, the goal is to build systems that think exactly the same way that people do. Others just want to get the job done and don't care if the computation has anything to do with human thought. And some are in-between, using human reasoning as a model that can inform and inspire but not as the final target for imitation

data safeguards

protect databases and other organizational data

In Tableau, you can "keep on asking ____________ in the data until you ________________ ______________________."

question, unitl you discover the root cause


Set pelajaran terkait

Deployed medicine "Module 5 Tactical Trauma Assessment"

View Set

Chapter 7 Three Approaches to Value

View Set

History Quiz 2 Unit 2 Semester 2

View Set

Slope Intercept Form (Algebra 1)

View Set