Glossary Flashcards

1
Q

Affordance

A

What tech allows users to do in practice based on features and user context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Diffusion Models (AI Technique)

A

gradually transforms random noise into coherent images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fine-tuning

A

adapting pre-trained models to specific tasks w specialized datasets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

GANs (Generative Adversarial Networks)

A

AI system using 2 neural networks competing to generate realistic content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Generative AI

A

AI system that create new content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GPT

A

Generative pre-trained transformer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hallucination

A

When AI generates false but convincing inf not supported by training data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

LLM (Large Language Model)

A

Advanced AI system trained on vast text data to understand and generate human language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NLP (Natural Language Processing)

A

Field of AI focused on interaction b/n computers and human language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pre-training

A

initial training phase: AI learns general patterns from massive datasets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Transformer architecture

A

neural network design that revolutionized NLP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnet

A

network of compromised computers controlled remotely by attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Brute force attack

A

attempt every password combo possible until u find the correct one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dark Web

A

Internet content requiring special software to access (eg. Tor), irretraceable IP addresses => illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DDoS attack (Distributed Denial-of-Service)

A

using multiple computers to flood a target w traffic to make it crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deepfake

A

synthetic media made to show from a certain human (politician speech); works w text, image, audio, video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Encryption

A

process of encoding info to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Ethical Hacking

A

authorized attempt to gain unauthorized access to systems to test security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Firewall

A

network security system that controls incoming/outgoing traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Hashing

A

One-way conversion of data (passwords) into fixed-length character strings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Phishing

A

fraudulent attempt to obtain sensitive info by disguising as trustworthy entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ransomware

A

malware that encrypts data and demands payment for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Social engineering

A

manipulating ppl into revealing confidential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Spyware

A

software that gathers info w/o consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Trojan Horse
Malware disguised as legitimate software
26
Wardriving
searching for Wi-Fi networks while moving in a vehicle
27
0-day Vulnerability
software security flaw unknown to those interested in mitigating it
28
AI
making machine do things requiring intelligence if done by humans
29
Machine learning
AI approach using pattens in data to predict outcomes, can adapt to changing trends
30
Supervised learning
machine learning using labelled data to map inputs to outputs
31
Unsupervised learning
machine learning w/o labelled outputs, algorithm infers structure from data itself
32
Reinforcement learning
a machine learning (ML) technique that trains software to make decisions to achieve the most optimal results
33
Neural network
network of processing elements working in parallel to complete tasks, approximates human brain functioning
34
Deep learning
a type of machine learning that uses artificial neural networks to learn from data
35
Classification
predicting class/category of given data points using labelled data
36
Clustering
grouping data points with similar traits into clusters without predefined labels
37
Association
finding relationships b/n variables in a dataset
38
Decision tree
structure dividing data using sequential decision rules, used for classification
39
Turing test
evaluation method where human judge tries to determine which of 2 text-based convos is with AI vs. human
40
Overfitting
when model captures noise in training data, performing poorly on new data
41
General purpose AI
capable of performing any intellectual task a human can do
42
Big Data
extremely large datasets analysed to reveal patterns, trends, associations
43
4 V's of Big Data
Volume, Variety, Veracity, Velocity
44
Volume (big data)
amount of data being processed
45
Variety (big data)
types of data being processed
46
Velocity (big data)
Speed at which data is being processed
47
Veracity (big data)
the quality, accuracy, integrity and credibility of data
48
Data Warehouse
database storing current & historical data for decision makers
49
Data Mart
subset of data warehouse focused on specific subject area/user group
50
ETL (extract, transform, load)
processing of preparing data for analysis
51
Hadoop
open-source framework for distributed processing of large data sets
52
OLAP (Online Analytical Processing)
multidimensional analysis enabling rapid ad-hoc queries
53
Data Mining
Process of discovering patterns in large datasets using statistical methods
54
Funnel visualization
graphic showing customer journey steps and dropout rates
55
Mobile marketing
marketing techniques targeting mobile device users
56
Blockchain
Distributed ledger technology maintaining growing list of records/transactions
57
Smart contract
self-executing contract w terms directly written into code
58
Bitcoin Mining
Process of validating transactions and adding them to blockchain for rewards
59
Green computing
Practices for designing, manufacturing, using, and disposing of computing equipment to minimize environmental impact
60
PII (Personally Identifiable Info)
Any data that can identify, locate, or contact an individual
61
GDPR (General Data Protection Regulation)
EU Legislation giving users control over personal data collection and usage
62
Profiling
Creating data records characterizing online behaviour
63
FIP
Fair Information Practices
64
Opt-in
Agreement requiring users to take steps to allow personal info collection
65
Opt-out
business practice allowing consumers to refuse sharing information about themselves
66
Deep Web
The content on the deep web is accessible via the internet but is not readily found through typical searches. (MyESSEC)
67
Surface Web
part of the web that is readily available to the public and searchable on search engines.
68
IoT
Internet of Things - network of connected devices w sensors and software to exchange data
69
Proof-of-Work
Blockchain consensus algorithm requiring computational work to validate transactions
70
Trustworthy AI
AI systems are lawful and ethical
71
E-Business Infrastructure
Combo of hardware, networks, and software applications used to deliver services to workers, partners, and customers
72
Cloud Computing
Delivery of computing resources as service over the Internet w on-demand access and pay-per-use pricing
73
SaaS (Software As A Service)
Cloud mode providing access to preinstalled applications w/o local installation
74
PaaS (Platform as a Service)
Cloud model offering environment for running applications w/o managing underlying infrastructure
75
IaaS (Infrastructure as a Service)
Cloud model providing virtual machines where customers install operating systems
76
Web Server
Computer that runs server software & makes files available to other computers via a network
77
Client/Server Architecture
Computing model where processing is split b/n client machines & servers linked by a network
78
Platform Neutrality
Ability of a network to connect devices using different operating systems
79
Capacity planning
process of predicting when hardware systems become saturated to ensure sufficient computing power
80
Scalability
Ability of a system to expand to serve large numbers of users w/o breaking down
81
TCO (Total Cost of Ownership)
Analysis model that includes direct, indirect and hidden costs of technology
82
Public Cloud
Cloud infrastructure available to public, owned by org. selling cloud services (OneDrive)
83
Private Cloud
Cloud infrastructure operated solely for a single organization (EY)
84
Hybrid Cloud
Composition of 2 or more clouds (public, pvt), that remain distinct entities but are bound together