Save
Computer science
Topic 5 Issues and Impacts
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Myesha ali
Visit profile
Cards (54)
What is Artificial Intelligence (AI)?
Computer systems performing tasks requiring
human intelligence
View source
What is machine learning?
Subset of AI where algorithms learn from data and get progressively better as they learn
View source
How do machine learning algorithms improve?
By looking for
rules
and
patterns
in data
View source
What is narrow AI?
AI designed for a
single
or limited task
View source
What is algorithmic bias?
Prejudiced decisions due to
biased
training data
View source
What causes algorithmic bias?
Biased
datasets
and
design flaws
in algorithms
View source
Who is accountable when AI fails?
Creator, data supplier, and user of the
algorithm
View source
What does copyright protect?
Expression
of an idea, not the idea itself
View source
How long does copyright last?
70
years after the death of the holder
View source
What do patents protect?
New
inventions
and how they work
View source
How long does a patent last?
20
years from the application date
View source
What is a software license?
Contract specifying how software can be used
View source
What are trademarks?
Unique logos, straplines, and words
registered
View source
What does ® signify?
Trademark
is officially
registered
View source
What is open source software?
Software allowing use,
modification
, and sharing
View source
What is proprietary software?
Software
owned
by an individual or company
View source
What is malware?
Malicious
software used by
hackers
View source
What is a virus in computing?
Software
that inserts itself into other programs
View source
What is a Trojan?
Malicious
software masquerading as
legitimate
software
View source
What is a keylogger?
Records
keystrokes
to extract information
View source
What is a Denial of Service attack?
Floods a
network
with traffic to crash it
View source
What is a security hole?
Fault making it easier for
hackers
to attack
View source
What is unpatched software?
Software with known
security flaws
not fixed
View source
What is out-of-date anti-malware?
Anti-malware lacking recent
malware signatures
View source
What are default admin passwords?
Factory set passwords for
devices
View source
What is phishing?
Bulk emails from seemingly
reputable
sources
View source
What is pretexting?
Contacting victims with a fabricated
emergency
View source
What is baiting?
Offering free giveaways bundled with
malware
View source
What is quid pro quo?
Exchanging
login
details for services
View source
What is shoulder surfing?
Watching someone enter
sensitive
information
View source
What is a firewall?
Uses
rules
to control network traffic
View source
What does anti-malware do?
Scans for known malware
signatures
View source
What is encryption?
Scrambles
data
to protect confidentiality
View source
What is RAID?
Replicates
hard disk
contents for redundancy
View source
What is an acceptable use policy?
Rules
users
must follow for system use
View source
What are the environmental issues in manufacturing?
Use of
non-renewable
and toxic materials
View source
What is e-waste?
Electronic
waste produced and poorly
recycled
View source
What are the consequences of a short replacement cycle?
Increased
demand for new
devices
and waste
View source
What is planned obsolescence?
Producing goods that quickly become obsolete
View source
What are ways to reduce energy consumption?
Adjust settings and disconnect unused
devices
View source
See all 54 cards