Term
|
Definition
is a bottleneck sharing and reuse help problem |
|
|
Term
Knowledge Acquisition Techniques |
|
Definition
Linguistic: Machine-learning: Exploiting the web: Knowledge-acquisition templates |
|
|
Term
|
Definition
KA- ontogeny acquisition from texts |
|
|
Term
|
Definition
KA-ontogeny from structured texts |
|
|
Term
|
Definition
KA-generate onto's by crawling structured websites |
|
|
Term
Knowledge-acquisition templates |
|
Definition
KA-experts specify only parts of the knowledge required |
|
|
Term
|
Definition
Analytical,Efficiency,Knowledge |
|
|
Term
Natural Language Processing |
|
Definition
Requires us to focus the inference process (assertions) Requires common sense Syntactic ambiguity Pronoun disambiguation |
|
|
Term
|
Definition
Fred saw the plane flying over Zurich |
|
|
Term
|
Definition
the police arrested the demonstrations because they feared violence. |
|
|
Term
|
Definition
Uniform Resource Locator Uniform Resource Name |
|
|
Term
|
Definition
XML-Extensible Markup Language Shares marked up data Any Language |
|
|
Term
|
Definition
Vocabulary Description language |
|
|
Term
|
Definition
OWL-Web Ontology Language Allows machines to process content Analogous to a taxonomy |
|
|
Term
|
Definition
Annotate data, XML,RDF,OWL |
|
|
Term
|
Definition
Markup Language,labels data bread |
|
|
Term
|
Definition
Markup Language, describes data |
|
|
Term
|
Definition
Markup Language, Relates data |
|
|
Term
|
Definition
Spreadsheets, databases, Web pages |
|
|
Term
Spreadsheets, databases, Web pages |
|
Definition
contain annotated data,contain algorithms |
|
|
Term
Annotation, Supercomputers, Aggregation |
|
Definition
Minimize time and space Solve problems more efficiently |
|
|
Term
|
Definition
where the values of multiple rows are grouped together as input on certain criteria to form a single value |
|
|
Term
|
Definition
is an effective method expressed as a finite list[1] of well-defined instructions[2] for calculating a function |
|
|
Term
|
Definition
is a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge Argument that are actually crackers over time it changed started off as fun and inventive then turned bad and called crackers |
|
|
Term
|
Definition
is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. |
|
|
Term
|
Definition
is a computer program that can copy itself[1] and infect a computer |
|
|
Term
|
Definition
s a destructive program that hides as a being application |
|
|
Term
secure transmission (protocol) |
|
Definition
refers to the transfer of data such as confidential or proprietary information over a secure channel involves encryption |
|
|
Term
intellectual property rights |
|
Definition
|
|
Term
|
Definition
consists of methods for uniquely recognizing humans based upon one or more intrinsic(or only human) physical or behavioral traits |
|
|
Term
|
Definition
is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge |
|
|
Term
|
Definition
is any software package which automatically plays, displays, or downloads advertisements to a computer. (pop-ups) |
|
|
Term
|
Definition
is a large family of computer worms of varying characteristics |
|
|
Term
|
Definition
is a device or set of devices designed to permit or deny network transmissions based upon a set of rules |
|
|
Term
|
Definition
is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure |
|
|
Term
|
Definition
is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks |
|
|
Term
|
Definition
is a way of attempting to acquire sensitive information s by masquerading as a trustworthy entity in an electronic communication. |
|
|
Term
|
Definition
is a piece of software designed to fix problems |
|
|
Term
|
Definition
early days of Industrial Revolution |
|
|
Term
|
Definition
attach themselves to docs that conatin macros embedded in programs to automate tasks can be spread across softwares |
|
|
Term
|
Definition
type of Trojan horse is porogrammed to attack in response to an event or a set of events |
|
|
Term
|
Definition
just going to a certain site can cause sypware to be downloaded to your computer |
|
|
Term
|
Definition
hijack legitimate web pages |
|
|
Term
|
Definition
good but people pick easy ones |
|
|
Term
|
Definition
symbol for open source society |
|
|
Term
|
Definition
launches typical log-in screen in public place and says error and steals passwords |
|
|
Term
|
Definition
use of deception to get people to reveal important information |
|
|
Term
Denial of Service Attacks |
|
Definition
flood with messages until so overwhelmed that real customers can't be helped and shut down |
|
|
Term
Two things computers leave open |
|
Definition
computers do exactly what they are told to do and can be reprogrammed Can't protect itself from viruses it has no protection against |
|
|
Term
|
Definition
scramble transmissions send numerical code |
|
|
Term
|
Definition
used to monitor and record computer transactions |
|
|
Term
|
Definition
multiply hard disks to operate as one unit and automatically mirror data on other disks |
|
|
Term
Authentication Mechanisms |
|
Definition
asks potential users to identify themselves and make sure users have permission to use that program |
|
|
Term
|
Definition
identifying, finding, remembering |
|
|
Term
|
Definition
its impossible to eliminate all bugs the bigger the system the bigger the problem working programs can contain bugs |
|
|
Term
|
Definition
|
|
Term
|
Definition
DNS cache poisoning to redirect traffic to fake sites |
|
|
Term
|
Definition
87 are auctions average cost $500 |
|
|
Term
Most common stolen things |
|
Definition
money, goods, information |
|
|
Term
|
Definition
Spammers, Web Designers, Exploiters, Cashiers, Droppers |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
amateur hackers called "script kiddies" who gather computer victims "roots" and use them to host a phishing site or spam relay |
|
|
Term
|
Definition
withdraw cash from bank accounts |
|
|
Term
|
Definition
use stolen card numbers to buy things at an untraceable drop point |
|
|
Term
Piracy of Intellectual Property |
|
Definition
copying of copyrighted software difficult to enforce |
|
|
Term
|
Definition
continually monitors system activity need to be revised automatically update |
|
|
Term
|
Definition
something you have, you know, you do |
|
|
Term
|
Definition
Firewalls, Encryption, shields |
|
|
Term
|
Definition
process of encrypting messages |
|
|
Term
|
Definition
Inventions are patented trade secrets covered by contract law IP can be copyrighted |
|
|
Term
|
Definition
Universal Resource Identifiers |
|
|
Term
|
Definition
|
|
Term
|
Definition
Resource Description Framework |
|
|
Term
What are RDF's designed for |
|
Definition
|
|
Term
|
Definition
|
|