Digital representation of a user in virtual space
Avatar
Malicious software that encrypts data for extortion.
Ransomware
AI-personalized educational pathways
Adaptive learning
Correct APA in-text citation for one author:
Smith, J.
Year of publication - 2022
(Smith, 2022)
Ethical __________ must be approved before data collection.
considerations
Digital recording of personal data and daily activities
Lifelogging
Long-term targeted cyberattacks.
Advanced Persistent Threats (APT)
Correct the error: Trustless systems rely heavily on central authorities.
decentralized validation
How should the reference list be ordered?
Alphabetically
Results discovered through research.
Findings
Processing data near the device instead of centralized servers is called __________ computing.
Edge computing
_________ systems do not rely on a central authority for validation.
Trustless
Blockchain networks rely on __________ to validate transactions without central control.
consensus mechanisms
What is the title of the reference list page in APA?
References
Weak points of the study are called...
Limitations
VR, AR, and MR are all part of the same __________ concept.
umbrella
What is biometric spoofing?
falsifying biometric data to bypass authentication
What is simulation fidelity?
Level of realism in a simulated environment.
Which part is italicized: article title or journal title?
journal title
A __________ study followed participants for three years.
longitudinal
VR headsets and haptic gloves are examples of __________ technology.
immersive
Attack using multiple fake identities to manipulate a network.
Sybil attack
AI systems that require human oversight
Human-in-the-loop
What must be added for direct quotations?
page number
Structured synthesis of existing research
Literature review