EMERGING TRENDS AND THREATS IN ICT Flashcards

1
Q

these technologies are generally new

A

emerging technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

these are still under development but are otherwise in use

A

emerging technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

simulate human processes

A

artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the 4 branches of AI

A

robotics
computer vision
natural language processing
machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

autonomous systems that can perform tasks independently

A

robotics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

assist computers in seeing

A

computer vision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

understand, interpret, and generate natural human language

A

natural language processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

learns by itself without programming input

A

machine learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using processes that mimic the way biological neurons work

A

neural network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

it has similar parts of human in robotics

A

humanoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

it has a human-like appearance in robotics

A

android

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

it is a distributed database

A

blockchain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

each block contains a ___________ _____ of the previous block, a timestamp, and transaction data

A

cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

connected technologies to help monitor a space

A

smart spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how people interact with digital content

A

spatial computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 types of spatial computing

A

vr - virtual reality
ar - augmented reality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

digital model that is turned into a three-dimensional object

A

3d printing

18
Q

pushes computing physically closer to a user

A

edge computing

19
Q

controlling matter on a tiny scale

A

nano technology

20
Q

actions carried out primarily by hackers or persons with malicious intent

A

threats in ict

21
Q

the 7 emerging trends in ict

A
  1. artificial intelligence
  2. blockchain
  3. smart spaces
  4. spatial computing
  5. 3d printing
  6. edge computing
  7. nano technology
22
Q

malware is also short for what

A

malicious software

23
Q

harmful to / or disrupts the normal operation of a system

A

malware

24
Q

code or software that embeds itself in other executable software

A

virus

25
Q

transmits itself over a network to infect other computers

A

worm

26
Q

disguising itself as a standard program

A

trojan

27
Q

monitors your online activities

A

spyware

28
Q

a code or software that records keyboard inputs

A

keylogger

29
Q

pops-up during system operations, usually showing ads

A

adware

30
Q

blocks access to the victims personal data unless a “ransom” is paid

A

ransomware

31
Q

network of computers that hackers compromised

A

botnets

32
Q

intercept digital communications

A

man in the middle attack

33
Q

attempts to steal your identity

A

phishing

34
Q

using deceptive websites, emails or calls

A

spoofing

35
Q

listen to voice communications (or reads messages)

A

eavesdropping

36
Q

monitors online logins and steals their session cookies for authentication

A

hijacking

37
Q

bits of data stored in the user’s browser for a websites’ various use

A

cookies

38
Q

like a normal wifi hotspot but is monitoring connected device

A

wifi spoofing

39
Q

hardware or software is outdated

A

obsolescence

40
Q

can also cause physical harm

A

obsolescence

41
Q

the 4 threats in ICT

A
  1. malware
  2. botnets
  3. man in the middle attack
  4. obsolescence