Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
Illegal act that invades a computer system |
Computer crimes |
|
3 categories of computer crimes |
Natural or inadvertent attack Human blunders, errors or omissions Intentional threats |
|
2 aspects of cyber crime |
Virus Hacking |
|
2 types of attacks |
Penetration Denial of service attacks |
|
Field of learning that emulates human intelligence |
Ai |
|
4 specific applications |
Expert systems Natural language processing Speech recognition Machine vision |
|
5 ai examples |
Slef driving cars Virtual travel booking Healthcare management Medicine Social media monitoring |
|
Advanced computing that enables a technology ( a machine) |
Machine intelligence |
|
5 types of ai |
Reactive ai Limited memory Theory of mind Self aware Intelligent agent |
|
Process through which one can create something that is virtual |
Virtualization |
|
Program that allows multiple operating system to share a single hardware |
Hypervisor |
|
Making an exact copy |
Emulation |
|
Use of server hardware by the virtualization software |
Platform virtualization |
|
Desktop virtualization |
Workstation virtualization |
|
Having a physical server |
Server virtualization |
|
Pools the network like files |
Network virtualization |
|
Looks like one big storage |
Storage virtualization |
|
Allows bytecode |
Application virtualization |