1/191
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Blockchain
A system consisting of linked blocks of data where each block contains a hash.
Hash
A unique identifying code stored in each block of a blockchain.
Permissionless blockchain
A blockchain that anyone can join without authorization.
Decentralization
A system with no centralized controlling authority.
Standard protocol
The agreed upon rules that govern how a blockchain operates.
Consensus mechanism
A process ensuring all users agree a newly added block is legitimate without relying on outside authorities.
Proof of work
A consensus method requiring users to solve computational problems and uses large amounts of electricity.
Proof of stake
A consensus method requiring users to put coins up as collateral and favors wealthy users with stronger stakes.
Proof of authority
A consensus method requiring approval from an individual or panel.
Hybrid consensus authority
An emerging consensus model combining aspects of multiple mechanisms.
Proof of history
An emerging consensus mechanism using timestamps to verify events.
Proof of contribution
An emerging consensus mechanism based on user contributions.
Proof of burn
An emerging consensus mechanism where users destroy coins to gain validation rights.
Cryptocurrency
A digital asset using blockchain for value storage or transactions.
Bitcoin
A cryptocurrency used as a store of value and alternative currency.
Ethereum
A cryptocurrency used as a store of value and for creating smart contracts.
Solana
A cryptocurrency used as a store of value, smart contracts, and decentralized applications.
Crypto wallet
A method of storing the public and private keys needed to access cryptocurrency.
Paper wallet
A physical record of a user’s private and public keys.
Hardware wallet
A USB like device storing cryptocurrency keys offline.
Hot wallet
A cellphone or online app providing access to private keys.
Smart contract
An agreement whose terms are written and executed on a blockchain.
Stablecoin
A cryptocurrency pegged to a stable asset like gold or US dollars.
Collateralized stablecoin with non currency assets
A stablecoin backed by assets such as precious metals or commodities.
Collateralized stablecoin with corresponding currency
A stablecoin backed by fiat currency reserves.
Collateralized stablecoin with cryptocurrency
A stablecoin backed by other cryptocurrencies.
Crypto risks
Scams, fraud, hacking, losing private keys, and volatility.
MIS ethical challenges
Issues related to privacy, intellectual property, accountability, privacy standards, and quality of life.
Information privacy rights
Rights that relate to the protection and control of personal data.
Copyright and intellectual property rights
Legal rights that protect creative work.
Control and accountability
Determining responsibility in cases of privacy or IP violations.
Quality standards of privacy protection
Guidelines ensuring proper privacy safeguards.
Quality of life
Ensuring technology does not negatively impact well being.
Web monitoring software
Software used to track employee online activity.
Employee monitoring software
Software allowing managers to supervise employee computer activity from a central location.
Remote desktop software
Software that allows managers to control an employee’s computer remotely.
Ethical analysis
A process for resolving ethical dilemmas using structured steps.
Get all pertinent facts
The first step in ethical analysis involving gathering information.
Determine who is affected
Identifying all stakeholders impacted by a decision.
Search for precedents
Reviewing organizational policies, codes of ethics, or previous examples.
List and research options
Identifying and evaluating possible choices.
Make a decision and prepare for consequences
The final step in ethical analysis.
Principle of moral rights
States that some actions are morally right or wrong.
Principle of virtue
Asks what a highly moral person would do.
Principle of distributive justice
Seeks fair distribution of rewards based on effort or productivity.
Universalist principle
Assesses whether a decision is fair for all involved.
Utilitarian principle
Chooses the option creating the most good for the greatest number.
First Amendment
A law protecting freedoms such as speech.
Digital Millennium Copyright Act
A law protecting intellectual property in digital formats.
Children’s Internet Protection Act
A law protecting children online and requiring age verification in schools for explicit content.
Electronic Communications Privacy Act
A law protecting email and VoIP by prohibiting interception without a warrant.
USA PATRIOT Act
A law allowing warrantless collection of communication information related to terrorism.
USA Freedom Act
A revised law placing limits on surveillance practices.
Federal Information Security Management Act
Requires federal agencies to protect information and develop security plans.
Wiretap Act
Protects wire, oral, and electronic communications.
Cybersecurity Information Sharing Act
Allows private companies to share cyber threat information with the government.
Session cookies
Temporary cookies stored in RAM and deleted when the browser closes.
First party cookies
Cookies created by the visited website that track preferences.
Third party cookies
Cookies created by external sites that track browsing habits.
Persistent cookies
Cookies stored on a hard drive that remain after browser closure.
Cookie privacy risks
Risks involving tracking, profiling, and selling user information.
Spyware
Software that collects information on internet habits including keyloggers and packet analyzers.
Intellectual property
Human ideas and knowledge protected by law.
Patent
A government granted right to exclude others from using an invention.
Utility patent
A patent granted for new machines or processes.
Design patent
A patent protecting the unique appearance of an object.
Structured data
Data with a defined format such as numbers or dates.
Big data
Large, diverse datasets collected at high velocity.
Direct inquiry
Data collection through surveys, swipes, ratings, or loyalty programs.
Indirect tracking
Data collection through cookies or web beacons.
Third party data purchase
Buying data from external organizations.
Password protection
The practice of securing accounts and devices with passwords.
Antivirus protection
Software used to detect and remove malware.
Safe browsing and purchasing
Online behavior that reduces risk.
Credit monitoring
Tracking credit reports to identify fraud or issues.
Ethical concerns of AI
Issues involving bias, dependency, or copyright violations.
AI ethical benefit
Allows exploration of multiple alternatives without risk.
Ethics
A framework that uses morals to define acceptable behavior.
Morals
Behavior rules taught in homes or society.
Importance of ethics in the workforce
Ensures corporations define acceptable behavior and monitor conduct.
AI ladder
A model describing stages for integrating AI into a business.
Collect (AI ladder)
Making data simple, accessible, and diverse.
Organize (AI ladder)
Creating a business ready analytics foundation.
Analyze (AI ladder)
Scaling AI with trust and transparency.
Infuse (AI ladder)
Operationalizing AI across the business.
Cognitive computing
Systems designed to simulate human thought.
Observation (cognitive computing)
Gathering information.
Interpretation (cognitive computing)
Understanding meaning from observations.
Evaluation and decision (cognitive computing)
Assessing options and choosing actions.
Machine learning
AI technique using data and algorithms to mimic human learning.
Supervised learning
Machine learning using labeled data.
Unsupervised learning
Machine learning analyzing unlabeled data.
Clustering
Grouping unlabeled data based on similarities.
Reinforcement learning
Learning through trial and reward.
Neural networks
Models using interconnected neurons across input, hidden, and output layers.
Input layer
The neural network layer receiving data.
Hidden layer
The layer where processing occurs.
Output layer
The layer where conclusions or predictions are produced.
Generative adversarial network
A machine learning model with two competing neural networks.
Generative network
Network that creates synthetic data.