Blockchain & Crypto
Ethics & Privacy
Artificial Intelligence
Cybersecurity
Wild Card!
100

Explain what a blockchain hash is. 

Identifying code given to users of a blockchain to track activity and access levels.

100

What is the difference between Direct Inquiry and Indirect Tracking?

Direct inquiry: directly asking the user / individual 

Indirect Tracking: using cookies to track the users browsing habits

100

What is NLP? How does it work, and what business applications does it have? 

Natural Language Processing. It works by analyzing spoken words and text created and inputted by humans. It then uses computer algorithms to analyze human language. An example of this would be a business using an AI chatbot as the first customer service response. 

100

What type of program acts as a legitimate software, but downloads malicious content and scripts once it's opened? Why is it different than a traditional virus? 

Trojan Horse - differs from traditional viruses, as viruses replicate, Trojans do not. 

100

What is deep learning? How is it different than machine learning and artificial intelligence? 

Deep learning uses coded neural networks (similar to how the human brain works) and expands it's knowledge set without human intervention. This is a subset of machine learning and artificial learning, but is different in that it does not need constant human supervision.

200

Why do blockchains utilize packet switching?

It is efficient, reliable, can follow multiple paths (unlike traditional circuit switching), and is cost effective. 

200

Why might an ethical decision result in unintended consequences?

Principles or policies are not one size fits all solutions. Example: Syllabus does not list technology as an excuse - difference between completing an assignment at 11:00pm and your wifi is down v.s. AWS outage


200

What is machine learning? What is the difference between AI and machine learning? 

Machine learning is the process of teaching a computer system how to make accurate predictions when fed data. Machine learning is a subset of artificial intelligence.  

200

Why is Data Integrity better preserved if users are authenticated? Give an example of an authentication method.

Authenticating people as authorized users protects data. Examples of this would be TUPortal and Duo, or using an MFA code for your social media.

200

Why is prompting important when working with AI? Best practice is that you should you provide what two things in your prompt? 

Specific prompting = specific results. Unspecific prompting = broad and undefined results. Giving the task and context allows for the AI to read background information and provided the desired outcome of the prompt.

300

What is social engineering?

The act of psychologically influencing someone to do or disclose something by making them believe it is in their best interest or their benefit to do so.

300
Name one of the 5 dimensions of ethical behavior and describe it. 

Information Privacy rights, Intellectual Privacy Rights, Control and Accountability, Establishing Quality Standards, Quality of Life

300

How can AI's outputs become biased? What problems can this cause businesses?

Comes from prejudiced algorithms or data sets. Seen in two ways: Cognitive Bias (unconscious or conscious) or Incomplete or Biased data sets. This can be damaging to businesses, as this can cause incorrect assessments, decisions, or projections. (think healthcare ai making incorrect assessments due to incomplete data) 

300

What is a man-in-the-middle (MITM) attack? What are the primary targets for this kind of attack? 

When a hacker places themselves between the router or application and the user. This allows them to steal the information sent to the application. Typically used in financial service applications and online shopping. 

300

Why is computing power a disadvantage of POW mechanisms?

The energy, power, and operational costs needed to mine and upkeep the process are significant. Difficult to maintain on a large scale.

400
Explain the Proof-of-Work Consensus protocol.

Some blockchains use the POW mechanism, where an algorithm will generate a random, unpredictable math problem that can only be solved by mining for the answer, and this places new data, called the nonce, which verifies the legitimacy. 

400

Why is it important to be aware of the ethical risks associated with AI?

AI can improve decision making and efficiency, but without proper maintenance can cause bias and lack of transparency.

400

Why are companies such Microsoft, Google, and X investing in AI chatbots? 

Investing in AI infrastructure can allow these companies to access advanced AI features and capabilities. 

Also allows a comparative edge against other companies, competition to create the "best AI". 

Also allows for potential ROIs - AI can streamline processes as needed if powerful enough, which can cut costs in the long run. 

400

What are the three main components of threat mitigation, and how do they help organizations anticipate attacks?

Threat Prevention, Threat Identification, Threat Cure - by utilizing these components, organizations can accurately gauge the level of threat the issue poses, lessen the impact of the threat, or prevent and protect against it altogether. 

400

Name a cryptocurrency we discussed in class!

Bitcoin, Litecoin, Ethereum, DogeCoin etc.

500

What does it mean to have no central authority? Why is this valueable in cryptocurrency?

Having no central authority means that decision making is distributed to all participants, not a single entity like a bank. This is valuable to crypto, as its key appeal is that users determine the value of the currency.
500

What type of software allows users / managers to take control of an employee's computer remotely & record its actions?

Remote Desktop Software


500

What is unsupervised learning in ChatGPT's training? What are the Pros and Cons to this kind of learning? 

The system recognizes and identifies patterns in text data without having human input. (all the responses given in chatgpts are just likely predictions) Pros: less human intervention, cut costs on training. Cons: increases chances for bias and populating unpopular patterns. 

500

What is a rootkit? Why would someone want to use this?

A rootkit is a type of malware that hides in the operating system of a computer (a collection of software tools that can gain access to the admin of the computer). Someone would use this to access a computer to download key files or important data and sell it on the dark web. 

500
What is an LLM?

Large Language Model

M
e
n
u