Explain what a blockchain hash is.
Identifying code given to users of a blockchain to track activity and access levels.
What is the difference between Direct Inquiry and Indirect Tracking?
Direct inquiry: directly asking the user / individual
Indirect Tracking: using cookies to track the users browsing habits
What is NLP? How does it work, and what business applications does it have?
Natural Language Processing. It works by analyzing spoken words and text created and inputted by humans. It then uses computer algorithms to analyze human language. An example of this would be a business using an AI chatbot as the first customer service response.
What type of program acts as a legitimate software, but downloads malicious content and scripts once it's opened? Why is it different than a traditional virus?
Trojan Horse - differs from traditional viruses, as viruses replicate, Trojans do not.
What is deep learning? How is it different than machine learning and artificial intelligence?
Deep learning uses coded neural networks (similar to how the human brain works) and expands it's knowledge set without human intervention. This is a subset of machine learning and artificial learning, but is different in that it does not need constant human supervision.
Why do blockchains utilize packet switching?
It is efficient, reliable, can follow multiple paths (unlike traditional circuit switching), and is cost effective.
Why might an ethical decision result in unintended consequences?
What is machine learning? What is the difference between AI and machine learning?
Machine learning is the process of teaching a computer system how to make accurate predictions when fed data. Machine learning is a subset of artificial intelligence.
Why is Data Integrity better preserved if users are authenticated? Give an example of an authentication method.
Authenticating people as authorized users protects data. Examples of this would be TUPortal and Duo, or using an MFA code for your social media.
Why is prompting important when working with AI? Best practice is that you should you provide what two things in your prompt?
Specific prompting = specific results. Unspecific prompting = broad and undefined results. Giving the task and context allows for the AI to read background information and provided the desired outcome of the prompt.
What is social engineering?
The act of psychologically influencing someone to do or disclose something by making them believe it is in their best interest or their benefit to do so.
Information Privacy rights, Intellectual Privacy Rights, Control and Accountability, Establishing Quality Standards, Quality of Life
How can AI's outputs become biased? What problems can this cause businesses?
Comes from prejudiced algorithms or data sets. Seen in two ways: Cognitive Bias (unconscious or conscious) or Incomplete or Biased data sets. This can be damaging to businesses, as this can cause incorrect assessments, decisions, or projections. (think healthcare ai making incorrect assessments due to incomplete data)
What is a man-in-the-middle (MITM) attack? What are the primary targets for this kind of attack?
When a hacker places themselves between the router or application and the user. This allows them to steal the information sent to the application. Typically used in financial service applications and online shopping.
Why is computing power a disadvantage of POW mechanisms?
The energy, power, and operational costs needed to mine and upkeep the process are significant. Difficult to maintain on a large scale.
Some blockchains use the POW mechanism, where an algorithm will generate a random, unpredictable math problem that can only be solved by mining for the answer, and this places new data, called the nonce, which verifies the legitimacy.
Why is it important to be aware of the ethical risks associated with AI?
AI can improve decision making and efficiency, but without proper maintenance can cause bias and lack of transparency.
Why are companies such Microsoft, Google, and X investing in AI chatbots?
Also allows a comparative edge against other companies, competition to create the "best AI".
Also allows for potential ROIs - AI can streamline processes as needed if powerful enough, which can cut costs in the long run.
What are the three main components of threat mitigation, and how do they help organizations anticipate attacks?
Threat Prevention, Threat Identification, Threat Cure - by utilizing these components, organizations can accurately gauge the level of threat the issue poses, lessen the impact of the threat, or prevent and protect against it altogether.
Name a cryptocurrency we discussed in class!
Bitcoin, Litecoin, Ethereum, DogeCoin etc.
What does it mean to have no central authority? Why is this valueable in cryptocurrency?
What type of software allows users / managers to take control of an employee's computer remotely & record its actions?
Remote Desktop Software
What is unsupervised learning in ChatGPT's training? What are the Pros and Cons to this kind of learning?
The system recognizes and identifies patterns in text data without having human input. (all the responses given in chatgpts are just likely predictions) Pros: less human intervention, cut costs on training. Cons: increases chances for bias and populating unpopular patterns.
What is a rootkit? Why would someone want to use this?
A rootkit is a type of malware that hides in the operating system of a computer (a collection of software tools that can gain access to the admin of the computer). Someone would use this to access a computer to download key files or important data and sell it on the dark web.
Large Language Model