Digital systems

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/191

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

192 Terms

1
New cards

Blockchain

A system consisting of linked blocks of data where each block contains a hash.

2
New cards

Hash

A unique identifying code stored in each block of a blockchain.

3
New cards

Permissionless blockchain

A blockchain that anyone can join without authorization.

4
New cards

Decentralization

A system with no centralized controlling authority.

5
New cards

Standard protocol

The agreed upon rules that govern how a blockchain operates.

6
New cards

Consensus mechanism

A process ensuring all users agree a newly added block is legitimate without relying on outside authorities.

7
New cards

Proof of work

A consensus method requiring users to solve computational problems and uses large amounts of electricity.

8
New cards

Proof of stake

A consensus method requiring users to put coins up as collateral and favors wealthy users with stronger stakes.

9
New cards

Proof of authority

A consensus method requiring approval from an individual or panel.

10
New cards

Hybrid consensus authority

An emerging consensus model combining aspects of multiple mechanisms.

11
New cards

Proof of history

An emerging consensus mechanism using timestamps to verify events.

12
New cards

Proof of contribution

An emerging consensus mechanism based on user contributions.

13
New cards

Proof of burn

An emerging consensus mechanism where users destroy coins to gain validation rights.

14
New cards

Cryptocurrency

A digital asset using blockchain for value storage or transactions.

15
New cards

Bitcoin

A cryptocurrency used as a store of value and alternative currency.

16
New cards

Ethereum

A cryptocurrency used as a store of value and for creating smart contracts.

17
New cards

Solana

A cryptocurrency used as a store of value, smart contracts, and decentralized applications.

18
New cards

Crypto wallet

A method of storing the public and private keys needed to access cryptocurrency.

19
New cards

Paper wallet

A physical record of a user’s private and public keys.

20
New cards

Hardware wallet

A USB like device storing cryptocurrency keys offline.

21
New cards

Hot wallet

A cellphone or online app providing access to private keys.

22
New cards

Smart contract

An agreement whose terms are written and executed on a blockchain.

23
New cards

Stablecoin

A cryptocurrency pegged to a stable asset like gold or US dollars.

24
New cards

Collateralized stablecoin with non currency assets

A stablecoin backed by assets such as precious metals or commodities.

25
New cards

Collateralized stablecoin with corresponding currency

A stablecoin backed by fiat currency reserves.

26
New cards

Collateralized stablecoin with cryptocurrency

A stablecoin backed by other cryptocurrencies.

27
New cards

Crypto risks

Scams, fraud, hacking, losing private keys, and volatility.

28
New cards

MIS ethical challenges

Issues related to privacy, intellectual property, accountability, privacy standards, and quality of life.

29
New cards

Information privacy rights

Rights that relate to the protection and control of personal data.

30
New cards

Copyright and intellectual property rights

Legal rights that protect creative work.

31
New cards

Control and accountability

Determining responsibility in cases of privacy or IP violations.

32
New cards

Quality standards of privacy protection

Guidelines ensuring proper privacy safeguards.

33
New cards

Quality of life

Ensuring technology does not negatively impact well being.

34
New cards

Web monitoring software

Software used to track employee online activity.

35
New cards

Employee monitoring software

Software allowing managers to supervise employee computer activity from a central location.

36
New cards

Remote desktop software

Software that allows managers to control an employee’s computer remotely.

37
New cards

Ethical analysis

A process for resolving ethical dilemmas using structured steps.

38
New cards

Get all pertinent facts

The first step in ethical analysis involving gathering information.

39
New cards

Determine who is affected

Identifying all stakeholders impacted by a decision.

40
New cards

Search for precedents

Reviewing organizational policies, codes of ethics, or previous examples.

41
New cards

List and research options

Identifying and evaluating possible choices.

42
New cards

Make a decision and prepare for consequences

The final step in ethical analysis.

43
New cards

Principle of moral rights

States that some actions are morally right or wrong.

44
New cards

Principle of virtue

Asks what a highly moral person would do.

45
New cards

Principle of distributive justice

Seeks fair distribution of rewards based on effort or productivity.

46
New cards

Universalist principle

Assesses whether a decision is fair for all involved.

47
New cards

Utilitarian principle

Chooses the option creating the most good for the greatest number.

48
New cards

First Amendment

A law protecting freedoms such as speech.

49
New cards

Digital Millennium Copyright Act

A law protecting intellectual property in digital formats.

50
New cards

Children’s Internet Protection Act

A law protecting children online and requiring age verification in schools for explicit content.

51
New cards

Electronic Communications Privacy Act

A law protecting email and VoIP by prohibiting interception without a warrant.

52
New cards

USA PATRIOT Act

A law allowing warrantless collection of communication information related to terrorism.

53
New cards

USA Freedom Act

A revised law placing limits on surveillance practices.

54
New cards

Federal Information Security Management Act

Requires federal agencies to protect information and develop security plans.

55
New cards

Wiretap Act

Protects wire, oral, and electronic communications.

56
New cards

Cybersecurity Information Sharing Act

Allows private companies to share cyber threat information with the government.

57
New cards

Session cookies

Temporary cookies stored in RAM and deleted when the browser closes.

58
New cards

First party cookies

Cookies created by the visited website that track preferences.

59
New cards

Third party cookies

Cookies created by external sites that track browsing habits.

60
New cards

Persistent cookies

Cookies stored on a hard drive that remain after browser closure.

61
New cards

Cookie privacy risks

Risks involving tracking, profiling, and selling user information.

62
New cards

Spyware

Software that collects information on internet habits including keyloggers and packet analyzers.

63
New cards

Intellectual property

Human ideas and knowledge protected by law.

64
New cards

Patent

A government granted right to exclude others from using an invention.

65
New cards

Utility patent

A patent granted for new machines or processes.

66
New cards

Design patent

A patent protecting the unique appearance of an object.

67
New cards

Structured data

Data with a defined format such as numbers or dates.

68
New cards

Big data

Large, diverse datasets collected at high velocity.

69
New cards

Direct inquiry

Data collection through surveys, swipes, ratings, or loyalty programs.

70
New cards

Indirect tracking

Data collection through cookies or web beacons.

71
New cards

Third party data purchase

Buying data from external organizations.

72
New cards

Password protection

The practice of securing accounts and devices with passwords.

73
New cards

Antivirus protection

Software used to detect and remove malware.

74
New cards

Safe browsing and purchasing

Online behavior that reduces risk.

75
New cards

Credit monitoring

Tracking credit reports to identify fraud or issues.

76
New cards

Ethical concerns of AI

Issues involving bias, dependency, or copyright violations.

77
New cards

AI ethical benefit

Allows exploration of multiple alternatives without risk.

78
New cards

Ethics

A framework that uses morals to define acceptable behavior.

79
New cards

Morals

Behavior rules taught in homes or society.

80
New cards

Importance of ethics in the workforce

Ensures corporations define acceptable behavior and monitor conduct.

81
New cards

AI ladder

A model describing stages for integrating AI into a business.

82
New cards

Collect (AI ladder)

Making data simple, accessible, and diverse.

83
New cards

Organize (AI ladder)

Creating a business ready analytics foundation.

84
New cards

Analyze (AI ladder)

Scaling AI with trust and transparency.

85
New cards

Infuse (AI ladder)

Operationalizing AI across the business.

86
New cards

Cognitive computing

Systems designed to simulate human thought.

87
New cards

Observation (cognitive computing)

Gathering information.

88
New cards

Interpretation (cognitive computing)

Understanding meaning from observations.

89
New cards

Evaluation and decision (cognitive computing)

Assessing options and choosing actions.

90
New cards

Machine learning

AI technique using data and algorithms to mimic human learning.

91
New cards

Supervised learning

Machine learning using labeled data.

92
New cards

Unsupervised learning

Machine learning analyzing unlabeled data.

93
New cards

Clustering

Grouping unlabeled data based on similarities.

94
New cards

Reinforcement learning

Learning through trial and reward.

95
New cards

Neural networks

Models using interconnected neurons across input, hidden, and output layers.

96
New cards

Input layer

The neural network layer receiving data.

97
New cards

Hidden layer

The layer where processing occurs.

98
New cards

Output layer

The layer where conclusions or predictions are produced.

99
New cards

Generative adversarial network

A machine learning model with two competing neural networks.

100
New cards

Generative network

Network that creates synthetic data.