This attack tricks users into giving up personal information.
phishing
Unintended or Intended: A recommendation system keeps suggesting similar content based on previous user choices, limiting exposure to new information.
Unintended
Why was IPv6 created?
IPv4 address was getting full
What is IPOS?
Input, Process, Output, Storage.
Binary is base what?
2
Data is encrypted but shared widely. This system lacks what?
Privacy
Unfair results caused by biased data
algorithmic bias?
This protocol translates a domain name into an IP address
DNS
A system continues working even when parts fail.
Fault Tolerance
Why do computers use binary instead of decimal?
electrical states
1 or 0
on or off
What happens if a symmetric encryption key is stolen?
Anyone can read the message
Why can combining multiple pieces of harmless data become risky?
It can form PII
Data sent across the internet is broken into what units?
Packets
Multiple computers working together to solve a problem.
Distributed computing
Convert 1010 (binary) to decimal.
10
Why is asymmetric encryption safer for internet communication?
Avoids sharing private Keys.
2 Keys
A system makes decisions based on patterns found in large datasets rather than explicit step-by-step instructions.
Machine Learning
What is the difference between MAC and IP addresses?
MAC = physical
IP = logical
One computer using multiple cores is what type of computing?
parallel computing
Convert 2F (hex) to Decimal
47
This security method requires users to provide two different forms of verification.
2FA
Why can simulations produce inaccurate results?
they depend on assumption
Why might a website use multiple IP addresses?
load balancing and reliability
Why doesn’t parallelization always lead to perfect speedup?
some parts cannot be parallelized
Convert 50 (decimal) to binary
110010