politics and government Flashcards

politics and government (58 cards)

1
Q

ANPR

A

Software which processes video camera data to read vehicle number plates and compare it to those stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

augmented reality

A

Overlapping layers of computer data with images of the real world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Automatic Number Plate Recognition

A

Software which processes video camera data to read vehicle number plates and compare it to those stored in a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

battlefield network

A

Large scale network gathering information from soldiers, vehicles, and maps to provide an overall view of the battlefield.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

biometrics

A

Use of fingerprints, retina scans, or other body features as an authentication mechanism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

black boxes

A

Closed system whose internal operation cannot be inspected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

black list

A

List of banned web sites in a filtering system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Children Internet Protection Act (CIPA)

A

US Law requiring schools to filter Internet content to protect children.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

content rating

A

System whereby web site content is categorised so that filters can block it if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cyber-terrorism

A

Using computer hacking techniques to commit acts of terrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cyber-warfare

A

Using computer hacking techniques to commit acts of war.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of Service attack

A

Flooding a computer system with data so that it cannot respond to genuine users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Millennium Copyright Act

A

Law designed to improve copyright protection for media companies, and make it illegal to bypass copy protection systems such as DRM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Direct Recording Electronic

A

Voting machines where users cast votes by touching a screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DMCA

A

Law designed to improve copyright protection for media companies, and make it illegal to bypass copy protection systems such as DRM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNA database

A

A database, often national, that contains DNA samples taken from people arrested by the police.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS

A

System for translating domain names into IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS Poisoning

A

Technique used by criminals to alter DNS records and drive users to fake sites, to committing phishing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

DRE voting machine

A

A type of electronic voting machine that allows the user to vote by selecting the candidates name using a touchscreen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

drone

A

An unmanned aerial vehicle often used by the military for surveillance operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

e-passport

A

Passport with a microchip containing biometric features, and RFID technology to transmit these to immigration control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

e-petition

A

An online petition that can be signed by people supporting a cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

electronic voting

A

Any use of IT to count or cast votes in an election.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

false negative

A

When a system incorrectly rejects an action instead of accepting it.

25
false positive
When a system incorrectly accepts an action instead of rejecting it.
26
filter
Software which blocks some Internet content, based on a series of rules or lists of content.
27
firewall
Software or hardware used to control data entering and leaving a network.
28
future warrior
Information technology designed to improve a soldier's understanding of the battlefield around him.
29
GPS
System of satellites that allows a user to determine their position on Earth using a special receiver.
30
Internet voting
Systems which allows users to vote over the Internet.
31
Internet Watch Foundation
Organisation that works with British ISPs to block access to illegal content on the Internet.
32
IP address
Unique address assigned to every computer on a network.
33
IWF
Organisation that works with British ISPs to block access to illegal content on the Internet.
34
keyword filter
Filter that blocks web pages containing specified key words.
35
micro-payments
Online donations collected in small amounts, but which add up when contributed by thousands of users.
36
mission creep
When the use of an IT system extends beyond its original purpose.
37
mixed reality
Combination of virtual reality and real life training.
38
online voting
Casting votes over the Internet.
39
open government
Use of IT to publish data about government operations, improving transparency.
40
optical scanning electronic voting system
Voting machines which count paper ballots cast by voters.
41
PNDRE
Voting machines where users cast votes over a network like the Internet.
42
precision guided weapons
Weapons that use IT to improve their accuracy or effectiveness.
43
Public Network Direct Recording Electronic
Voting machines where users cast votes over a network like the Internet.
44
RFID
System of tags which contain data that can be read from a distance using radio waves.
45
simulation
Based on computer models, gives users experience of events such as flying a plane.
46
smart weapons
Weapons that use IT to improve their accuracy or effectiveness.
47
software verification
The use of experts to examine the source code of a program to check that it works correctly.
48
tactile feedback
Output from a computer system in the form of force, movement, or resistance.
49
UAV
An unmanned aerial vehicle often used by the military for surveillance operations.
50
Unmanned Aerial Vehicle
An unmanned aerial vehicle often used by the military for surveillance operations.
51
URL
Describes the location of an item, such as a web page, on the Internet.
52
virtual reality
A virtual world which the user views using a special headset, and may participate in using specialist input devices.
53
virtual reality headset
Primary output device used by a virtual reality system.
54
Voter Verified Paper Audit Trails
An electronic voting system that produces a paper receipt of the vote cast, allowing a recount if necessary.
55
VVPAT
An electronic voting system that produces a paper receipt of the vote cast, allowing a recount if necessary.
56
weighted filter
A filter which considers the words in a page as well as the context in which they appear.
57
white list
List of allowed web sites in a filtering system.
58
wired soldiers
Information technology designed to improve a soldier's understanding of the battlefield around him.