The binary number 10000 in decimal
What is 16?
Of all the ways to improve a password, this one has the greatest effect on resisting brute-force attacks.
What is making a password longer?
This paradox states that some tasks that are simple for humans to do are difficult for AI to do.
What is Moravec's Paradox?
There are two roles that a computer can assume when sending/receiving information.
What is Client/Server?
This type of attack exploits unknown vulnerabilities.
What is a Zero-Day Attack?
The decimal number 26 in binary
What is 11010?
Its components consist of 4 items: Memory, Input, CPU and Output
What is the Von Neumann Architecture
The recommendation engine that suggests movies on Netflix excels at predicting what you might watch next but cannot handle tasks outside that domain.
What is Narrow AI?
An agreed upon set of rules for performing a task
What is a protocol?
After exploiting vulnerabilities and infiltrating a system, an attacker may escalate privileges or install backdoors in this phase, so they don’t lose their hard-won foothold.
What is Maintaining Access?
The minimum number of bits required to represent 50 unique values.
What is 6?
b = log2n
How we explain the balance of memory vs cost in computers
What is Memory Hierarchy?
This machine learning method takes unlabeled data and attempts to identify meaningful insights/groupings.
What is Unsupervised Learning?
When sending messages from one network to another network, it is the device that determines a path and forwards the packet onward.
What is a router?
This kind of attack takes advantage of people’s natural tendency to reveal sensitive information.
What is social engineering?
The number of unique values that can be represented with 7 bits.
What is 128?
n = 2b
A current GPU holds about 76 billion transistors. According to Moore’s law, a similar chip would need this many years to quadruple that count to 304 billion.”
What is 4 years?
This computational model, inspired by the human brain, forms the backbone of today’s large language models.
What is a Neural Network?
A protocol that could be used to move a 200 MB dataset from your desktop to a server for processing.
What is FTP?
This cyber security principle is violated by a malware that is capable of deleting data from a person's computer.
What is Availability?
The number of bits equivalent to 13 KB
What is 106,496
1 bit = 8 Bytes
1 Byte = 1024 KB
The component of the von Neumann Computer Architecture that processes data and executes programs (including the operating system, see below). It is responsible for all computation.
What is the CPU (Central Processing Unit)?
A machine learning model that has extremely low error on the training set but much higher error on the test set is exhibiting this problem.
What is overfitting?
A lookup service contacted to resolve names your computer can't understand such as www.google.com.
What is DNS?
This system uses asymmetric encryption, digital certificates, and trusted authorities to verify the identity of users and devices across a network.
What is PKI (Public Key Infrastructure)?