Term
|
Definition
|
|
Term
Classic AI Problems: Travel |
|
Definition
What's the best way to get to Pittsburgh? |
|
|
Term
Classic AI Problems: Meetings |
|
Definition
Which wine should I serve with seafood tonight? |
|
|
Term
Classic AI Problems: Supply Chain |
|
Definition
How can I get 100 PCs delivered by tomorrow? |
|
|
Term
Classic AI problems: Medicine |
|
Definition
What drugs might be effective against this new bug? |
|
|
Term
Classic AI problems: E-business |
|
Definition
Where can I get the best deal on a car and a loan? |
|
|
Term
Classic AI Problems: Control |
|
Definition
How do we stop the spread of H1N1? |
|
|
Term
|
Definition
When we combine codes to make meaning: data, information, and language.
Produces analytical benefits such as comparison shopping, paying your bills online, etc. |
|
|
Term
|
Definition
Herbert Simon reveals, "most humans are only partly rational, and they are in fact irrational (emotional) with respect to their remaining actions."
Suggests that economic agents do not mostly apply the optimization model to make decisions, but rather employ heuristics. This is because of their inability to process all the alternatives and the cost of deliberation is high. Computers can prove essential in expanding our ability to solve complex problems. |
|
|
Term
|
Definition
We can only process data as fast as the CPU can execute the instructions, and as fast as data can move through it.
Vast amounts of data can be pushed through, but only a word at a time, this word in analog is the diameter of the bottleneck. Instead of thinking of how to move things through the store, we think of the "where to find the data" aspect, like a lookup function in excel
|
|
|
Term
|
Definition
Measures performance within a computer - associated with speed. The CPU, monitor, refreshes rates, memory - and measures how fast your computer processes data into information per second. A Hz = one clock cycle per second. |
|
|
Term
Inherent Limitation of the Computer |
|
Definition
A system clock resides on a chip within the system and sends repeated electronic impulses that regulate the operations of the computer.
-The time that it takes to process an instruction.
-Time and Space: The consequence of increasing the speed of processing is that you sacrifice space. The consequence of increasing the utilization of space is that you sacrifice time |
|
|
Term
|
Definition
Concerns how much of something (such as memory or storage) there is.
If there is more data available in the stor, then larger problems can be solved. How much data is available in the store is also an inherent limitation of the computer. |
|
|
Term
|
Definition
Refers to the time a program or device takes to locate a single piece of information and make it available to the computer for processing.
|
|
|
Term
Access Time for Far Storage |
|
Definition
(Near permanent-secondary storage, such as a hard-drive)
Usually measured in milliseconds. |
|
|
Term
Access Time for Close Store |
|
Definition
(Sometimes built directly on the processor)
Measured in nanoseconds, and more expensive.
Primary storage was measured this way until 1996 when SDRAM was measured in MHz |
|
|
Term
|
Definition
The path data moves along as it travels from the store to the processor and back again.
Many bits of data can be travelling down the highway at the same time (traffic) as opposed to very few. |
|
|
Term
|
Definition
How many bits can fit on the System Bus at one Time. Architecturally, the bottleneck we have been referring to is the word length in bits of the processor. (32 bit processor, 64 bit processor) |
|
|
Term
|
Definition
Execution of an instruction which involves two phases:
Instruction Phase and Execution Phase |
|
|
Term
|
Definition
Phase 1 of the Machine Cycle
Made up of a fetch instruction and a decode instruction |
|
|
Term
|
Definition
Phase 2 of the Machine Cycle
Made up of an execute instruction and a store-results instruction |
|
|
Term
|
Definition
The time that it takes for the computer to carry out one instruction - consisting of the Instruction and Execution |
|
|
Term
|
Definition
Located on a main board in your computer system, called the motherboard. The motherboard holds the processor, memory, and other essential components.
Differentiated by their instruction set, bandwidth, clock speed, and recently how many cores are on the chip die |
|
|
Term
|
Definition
Processing speed doubles every 24 months. |
|
|
Term
Example of something NOT
adhering to Moore's Law |
|
Definition
The access time of RAM or secondary storage (hard drive) is increasing only modestly ( a few percent per year). The size of storage is growing, however, because the manufacturing processes are improving.
The quantity of storage is growing at a rate much faster than the access time of storage |
|
|
Term
|
Definition
Uses more than one processing unit.
A typical server might have two or four processors on the motherboard. |
|
|
Term
|
Definition
Links several microprocessors to operate in parallel.
This is the idea behind mainframe configurations where many processors each take a thread and go to work on the instructions. The operating system manages the input and output of these large systems and maintains order. On new commodity machines Intel and AMD have begun putting more than one core (or processor) on a single die. In effect, you have two processors (or four or more on a single chip. |
|
|
Term
|
Definition
Even larger numbers of powerful processors operating together in a massively parallel processing (MPP) configuration. They have huge data stores and a vast array of processors and the ability to distribute the work from otherwise time-consuming problems.
Commonly used to do things such as: avoid environmental disasters, track the expansion of a flu epidemic, etc. |
|
|
Term
|
Definition
The capacity of something to hold and retain data. |
|
|
Term
|
Definition
A Web that includes documents, or portions of documents, describing explicit relationships between things and containing semantic information intended for automated processing by our machines. |
|
|
Term
URIs: Uniform Resource Identifier |
|
Definition
URLS, URN (Uniform Resource Name, which is a name scheme, ex: ISBN #)
With these identifiers. you can begin to connect to these representations. In this scheme, Unicode also plays an important part in that it has the capacity to represent every symbol on earth. |
|
|
Term
|
Definition
After information can be located, what is required is some way to mark up or annotate the data in a way that enables cataloging, or a common way to talk about the information. The way this is done is to use labels. |
|
|
Term
|
Definition
Extensible Markup Language: Allows for the sharing of marked-up data in any language and was designed to allow for labeling data. |
|
|
Term
RDF: Resource Description Framework |
|
Definition
We need a general-purpose language for representing information on the web. Allows for the exchange for information.
Design is particular to databases, and specifically to relational databases. Makes a statement about data using a Triple in the following form: subject, property, value. |
|
|
Term
|
Definition
A standard which describes how to use RDf to describe RDf vocabularies on the Web.
The schema is metadata, or data about data, and is a model imposed upon complex reality to assist in explaining it and to describe relationships between groups of classes or resources. |
|
|
Term
|
Definition
Can describe Individuals, Classes, Attributes, Relations.
In our case, we can build on the RDF Schema to allow a machine to process the content of something |
|
|
Term
OWL- Web Ontology Language |
|
Definition
Intended to be used when the information contained in documents needs to be processed by applications, as opposed to only presented to humans.
Can be used to explicitly represent the meaning of terms in vocabularies and the relationships between those terms. This representation of terms and their interrelationships is called an ontology. |
|
|
Term
|
Definition
Parent can have many children. One query, many hits. |
|
|
Term
|
Definition
The linking of data allows for it. (Linking spreadsheets) |
|
|
Term
|
Definition
Processes to transform data; they accept annotated data as input and transtorm input into output.
This transformation is the bottleneck, limited by our fundamental, inherent constraints of time and space (the processor and the store, or memory). |
|
|
Term
Aggregation vs. Composition |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
1. Analytical Benefits
2. Efficiency Benefits
3. Knowledge Benefits |
|
|
Term
|
Definition
A bottleneck.
Sharing & Reuse alleviate the problem. We need automated knowledge aquisition techniques. |
|
|
Term
Automated Knowledge Aquisition Techniques |
|
Definition
1. Linguisitic Techniques
2. Machine Learning
3. Exploring the Web Structure
4. Knowledge-Acquisition Templates |
|
|
Term
(Automated Knowledge)
Linguistic Techniques |
|
Definition
Ontology aquisition from text.
(an ontology is a formal representation of knowledge as a set of concepts within a domain) |
|
|
Term
(Automated Knowledge Aquisition)
Machine Learning
|
|
Definition
Generate ontologies from structured documents (XML documents) |
|
|
Term
(Automated Knowledge Aquisition)
Exploring the Web Structure |
|
Definition
Generate ontologies by crawling structured websites. |
|
|
Term
(Automated Knowledge Aquisition)
Knowledge-Aquisition templates |
|
Definition
Experts specify only part of the knowledge required. |
|
|
Term
Natural Language Processing |
|
Definition
-Requires us to focus the inference process (assertions)
-Requires common sense (a pre-req for human level competence at making sense of the world)
-Symantic Ambiguity
-Pronoun Disambiguation |
|
|
Term
|
Definition
Fred saw the plane flying over Zurich
Fred saw the mountains flying over Zurich |
|
|
Term
|
Definition
The police arrested the demonstrators because they feared violence.
The police arrested the demonstrators because they advocated violence. |
|
|
Term
|
Definition
credited for his invention of the World Wide Web |
|
|
Term
|
Definition
-Unique number for every character
-Hindi, Roman, Greek, Arabic, etc. |
|
|
Term
|
Definition
A child inherits from the parent
A child depends upon the parent
A family is composed of a parent and child
An associated parent can direct the child
A family is an aggregation of members
|
|
|
Term
Difference between Aggregation and Composition |
|
Definition
Aggregation is used to represent ownership or a whole/part relationship, and composition is used to represent an even stronger form of ownership. With composition, we get coincident lifetime of part with the whole. The composite object has sole responsibility for the disposition of its parts in terms of creation and destruction. In implementation terms, the composite is responsible for memory allocation and deallocation. |
|
|
Term
|
Definition
XML - Labels Data
RDF - Describes Data
OWL - Relates Data |
|
|
Term
|
Definition
Use special software to scan criminal suspects' hard disks for digital "fingerprints" - traces of deleted files containing evidence of illegal activites. |
|
|
Term
|
Definition
Any crime accomplished through knowledge or use of computer technology. |
|
|
Term
|
Definition
|
|
Term
Computer Security Breaches |
|
Definition
System penetration by outsiders, theft of information, the changing of data, financial fraud, vandalism, theft of passwords, and the prevention of legitimate users from gaining access to systems. |
|
|
Term
|
Definition
Most common form of computer crime. Used to steal money, goods, information, and computer resources. |
|
|
Term
|
Definition
Common student scam used to steal passwords. Launches a program that mimics the mainframe computer's login screen on an unattended terminal in a public lab. The program responds with an error code and stores the secret codes. |
|
|
Term
|
Definition
Collecting personal information such as credit card numbers, driver's license numbers, SS cards, a theif can pose as someone else. |
|
|
Term
|
Definition
The use of deception to get individuals to reveal sensitive information. |
|
|
Term
|
Definition
Come from when rebellious workers put their footwear into gears. Now, use software to do destructive deeds. |
|
|
Term
|
Definition
The software used for sabotage - viruses, worms, and Trojan Horses - many of the programs mimic behavior of living organisms. |
|
|
Term
|
Definition
Piece of code usually hidden in the OS of a computer or in an application. A user executes a program containing a virus, and it copies itself to an uninfected program. It can jump from computer to computer, sometimes using a computer network or disk to infect. |
|
|
Term
|
Definition
Attach themselves to documents that contain macros - embedded programs that automate tasks. Can be spread across computer platforms if the documents are in cross-platform applications, such as MS Office. |
|
|
Term
|
Definition
Use computer hosts to reproduce themselves. Complete programs capable of travelling independently over computer networks, seeking out uninfected workstations in which to reproduce. Can reproduce until the computer freezes, and resides in the memory rather than on the disc. |
|
|
Term
|
Definition
A program that performs a useful task while at the same time carrying out some secretive destructive act. Often posted on shareware websites with names that make them sound like games or utilities. |
|
|
Term
|
Definition
Programmed to attack in response to a particular event or sequence of events. A programmer might plant it to destroy data files if the programmer is ever listed as terminated in the company's personnel file. |
|
|
Term
|
Definition
A time released logic bomb
ex: program to destroy PC files on Michaelangelos birthday |
|
|
Term
|
Definition
Refers to a technology that collects information from computer users without their consent or knowledge. Sometimes called tracking, spybot - Gathers information and communicates this info to an outsider via the internet.
ex: monitor keystrokes, take screen shots, etc. |
|
|
Term
|
Definition
Simply visiting a certain website will cause spyware to be downloaded to your computer |
|
|
Term
|
Definition
Designed to search for viruses, notify users if they are found, and remove them from infected disks. Continuously monitor system activity. May take companies several days to develop and distribute new patches for viruses. |
|
|
Term
|
Definition
Software programs that plus potential security breaches in the operating system. Provided as free downloads or automatic updates to all owners of the OS. |
|
|
Term
|
Definition
Commonly refers to unauthorized access to computer systems. |
|
|
Term
|
Definition
Criminal hacking - distinction between hacking that most people do not recognize. |
|
|
Term
|
Definition
Hijack legitimate web sites and redirect users to other sites |
|
|
Term
Denial of Service attacks |
|
Definition
Bombard servers and web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients. |
|
|
Term
|
Definition
Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction. |
|
|
Term
2 Characteristics of Computers
|
|
Definition
1. Computer does exactly what it is programmed to do. Can be reprogrammed by anyone with sufficient knowledge
2. Any computer can do only what it is programmed to do - cannot protect itself |
|
|
Term
|
Definition
Something about you, voice print, fingerprint, retinal scan, facial feature scan, to measure body characteristics and allow or deny access. |
|
|
Term
|
Definition
The most common tools used to restrict access to computer systems. Most users choose easy to guess options - love, god, sex. |
|
|
Term
|
Definition
Doesn't need to treat all users identically. Many systems use passwords to restrict users so they can open only files related to their work. Many times, users may be given read-only access. |
|
|
Term
|
Definition
A program, often run on a dedicated computer, that filters information between a private network and the rest of the internet. A set of security rules, created by a network administrator, determines which packets can enter and leave the local network. |
|
|
Term
|
Definition
Done by applying a secret numerical code, called a key, the message can be transmitted or stored as an indecipherable garble of characters. Can only be read after reconstructed with a matching key. |
|
|
Term
|
Definition
Used to monitor and record computer transactions as they happen so auditors can trace and identify suspicious computer activity after the fact. Force every user to leave a trail of electronic footprints. |
|
|
Term
|
Definition
Symmetric Secret Key sytem, the sender and the receiver of a message have the same key. Key management is an issue. A public key system is asymmetric, a different key is used to encrypt than decrypt. |
|
|
Term
Uninterruptable Power Supply |
|
Definition
Can protect computers from data loss during power failures. |
|
|
Term
Redundant array of independent disk (RAID) |
|
Definition
Storage technology that enables multiple hard disks to operate as a single logical unit. Can, among other things, automatically mirror data on multiple disks. |
|
|
Term
Authentication Mechanisms |
|
Definition
System administrators implement these. They ensure only legitimate users have access to the system by asking potential users to identify themselves. |
|
|
Term
System Admins Responsibilities |
|
Definition
Put policies in place to ensure that users to not choose passwords that are easy for a hacker to guess, Keep the OS up to date with the latest patches provided by the software vendor, perform backups on a regular basis. |
|
|
Term
|
Definition
Technology that can simultaneously improve security and threaten privacy.
Used for Identifying, Finding, and Remembering |
|
|
Term
|
Definition
Missiles that use computerized guidance systems to locate their targets. A command guidance system enables a human operator to control the missile's path while watching a missle's eye view on a TV. They are extremely accurate, and reduce the amt of time to make life or death decisions. |
|
|
Term
|
Definition
Complex System that can assume almost complete responsibility for a task without human input, verification, or decision making. |
|
|
Term
National Infrastructure Protection Center |
|
Definition
Includes representatives of various intelligence agencies (the departments of defense, transportation, energy, and treasury) and representatives of several major corporations. |
|
|
Term
|
Definition
Special purpose hardware that allows every message to be encrypted, even huge video streams. Will give organizations the confidence that all their messages, even those sent over wireless networks, are secure from eavesdroppers. |
|
|
Term
|
Definition
DNS cache poisoning to redirect traffic to bogus sites (same thing as webjacking) |
|
|
Term
|
Definition
Deception of individuals to reveal sensitive information. (Same as social engineering) |
|
|
Term
Online Outlaws: The perpetrators |
|
Definition
1. Spammers
2. Web designers
3. Exploiters
4. Cashiers
5. Droppers |
|
|
Term
|
Definition
Responsible for sending the phishing emails to as many email addresses as possible |
|
|
Term
|
Definition
Responsible for creating malicious web sites that appear as legitimate as possible |
|
|
Term
|
Definition
Typically amateur attackers known as script kiddies who gather victim computers (referred to as roots) that can be used to host a phishing site or spam relay. In some cases, exploiters will break into credit card databases directly |
|
|
Term
|
Definition
Responsible for withdrawing funds from a compromised credit card or bank account and turning it into cash for the phisher |
|
|
Term
|
Definition
These members are able to receive merchandise purchased with stolen credit card information at an untraceable drop point. Goods purchased with stolen credit or bank card information are considered carders. |
|
|
Term
Piracy of Intellectual Property (IP) |
|
Definition
-Illegal duplication of copyrighted software
-Laws difficult to enforce
-Includes arts, sciences, and industry |
|
|
Term
|
Definition
Using computer or internet systems to pass off someone else's work as your own |
|
|
Term
Signs of Hijacked Computer |
|
Definition
-Computer running slower
-Popup ads
-New toolbars in browser
-Homepage changes
-Unfamilar search page
-Strange software loads
-New entries in favorites |
|
|
Term
Physical Access Restrictions |
|
Definition
Based on :
-Something you have
-Something you know
-Something you do |
|
|
Term
|
Definition
Specially developed machine that prevents unwanted interception |
|
|
Term
|
Definition
Same key is used for encryption/decryption (must know which computers will be talking and install key on each one) |
|
|
Term
|
Definition
Encyphering key is different from, but closely related to the deciphering key. The key algorithm has a public/private key property and one of the keys can be made public without loss of confidentiality. |
|
|
Term
|
Definition
Protect computers from data loss during power failures. |
|
|
Term
|
Definition
-Inventions are patented
-Trade secrets are covered by contract law
-The expression of intellectual property can be copyrighted |
|
|
Term
Government Responses to growing Computer Crime |
|
Definition
-Telecommunications Act of 1996
-Digital Millenium Copyright Act of 1998
(Both of these laws introduced new problems by threatening rights of citizens- problems that have to be solved by courts and by future lawmakers.) |
|
|
Term
|
Definition
Do more damage than viruses and computer burgalurs combined.
-It is impossible to eliminate all bugs
-Even programs that appear to be working can contain bugs
-The bigger the system, the bigger the problem
-Computer breakdowns pose a risk that doubles every year
-Hardware problems are rare when compared with software |
|
|
Term
|
Definition
-Organizations will place sophisticated pattern-recognition software and special hardware on the perimeter of their networks. Special purpose hardware, called security processors, will allow every message to be encrypted. |
|
|