Emerging Tech & Ethics Flashcards

1
Q

Big Data

A

Large, Diverse set of info that grow at ever increasing rates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How to wisely process more and more data?

A

using DATA ANALYTICS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

8Vs for Big Data Development

A
  1. Velocity
  2. Volume
  3. Volatility
  4. Validity
  5. Veracity
  6. Value
  7. Viability
  8. Variety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Velocity

A
  1. speed of data:
    - coming in
    - transformed data leaving computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Volume

A
  1. amount of data processed at a time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Volatility

A
  1. How old a data need to be:
    - before becoming IRRELEVANT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Validity

A
  1. How accurate & correct the data is for intended use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Veracity(uncertain)

A
  1. UNCERTAINTIES in data
  2. may ir may not be trusted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Value(worth)

A

worth kf data to customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viability

A

Models ability to REPRESENT reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Variety

A
  1. heterogenous data that needs to:
    - identified
    - normalized
    before computing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware(Malicious Software) types(6)

A
  1. Virus
  2. Worm
  3. Trojan Horse
  4. Rootkit
  5. Spyware
  6. Adware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virus

A
  1. potentially damaging program that:
    - affects
    - infects
    a device by
  2. ALTERING the way they work w/o users’ knowing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worm

A

A program that:
1. copies itself repeatedly(in memory or network)
2. using up resources
3. possibly shutting down the device or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan Horse

A

A program that:
1. Hides within or looks like a LEGITIMATE PROGRAM
2. Does not replicate itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rootkit

A

A program that:
1. Hides in a computer or mobile device
2. Allows someone from a remote location to take full control of the device

17
Q

Spyware

A

A program that:
1. is Placed on a device w/o knowledge
2. secretly collects information about the user
3. communicates info to some outside source

18
Q

Adware

A

online advertisements