• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

Illegal act that invades a computer system

Computer crimes

3 categories of computer crimes

Natural or inadvertent attack


Human blunders, errors or omissions


Intentional threats

2 aspects of cyber crime

Virus


Hacking

2 types of attacks

Penetration


Denial of service attacks

Field of learning that emulates human intelligence

Ai

4 specific applications

Expert systems


Natural language processing


Speech recognition


Machine vision

5 ai examples

Slef driving cars


Virtual travel booking


Healthcare management


Medicine


Social media monitoring

Advanced computing that enables a technology ( a machine)

Machine intelligence

5 types of ai

Reactive ai


Limited memory


Theory of mind


Self aware


Intelligent agent

Process through which one can create something that is virtual

Virtualization

Program that allows multiple operating system to share a single hardware

Hypervisor

Making an exact copy

Emulation

Use of server hardware by the virtualization software

Platform virtualization

Desktop virtualization

Workstation virtualization

Having a physical server

Server virtualization

Pools the network like files

Network virtualization

Looks like one big storage

Storage virtualization

Allows bytecode

Application virtualization