



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A comprehensive set of quiz questions and answers covering key concepts in information systems security, blockchain technology, and software development. It explores topics such as cybersecurity threats, ethical considerations in information systems, software development life cycle (sdlc) models, and the impact of blockchain on various industries. Valuable for students studying information systems, cybersecurity, or related fields.
Typology: Exams
1 / 6
This page cannot be seen from the preview
Don't miss anything!
___________was the cryptocurrency blockchain was initially created to support? - โ โ Bitcoin
A(n) ____________ bias is an issue with artificial intelligence (AI) systems where biases can be created within AI systems and then become applied as the algorithms evolve. - โ โ AI induced
Acceptable Use Policy (AUP) - โ โ this policy outlines what is allowed and what is not allowed while someone is using the organization's services.
According to the article, a blockchain "is a cryptographic database maintained by a _______ - โ โ Network of computers
According to the article, what has become a major weak point for an organization's information security, and what number backs this up? - โ โ Human error is a major weak point for cyber security, 90% of all cyber attacks are caused by human error.
According to the video, what are some of the statistics for cyber attacks and data breaches? - โ โ Only 50% cyber attacks are successful
Agile model - โ โ separates the product into cycles and delivers a working product very quickly. Produces a succession of releases, testing at every release, heavy emphasis on costume interaction can lead to the project in the wrong direction.
Almost __________ cyber attacks are caused by human error or behavior - โ โ 90%
At its very core, what does machine learning do? As suggested in the talk, what are some example tasks where machine learning is used? - โ โ Machine learning- Allows machines to learn from data and mimic some of the things humans do.
Example- accessing credit risk, organizing mail, grade high school essay, diagnosis an eye disease.
Big Bang model - โ โ This high-risk SDLC model throws most of its resources at development and works best for small projects. It lacks the thorough requirements definition stage of the other methods.
Blockchain provides a simple, secure way to establish trust for virtually any kind of transaction. - โ โ True
Copyright - โ โ In the United States a copyright is obtained by the simple act of creating the original work. In other words, when an author writes down a song, makes a film, or develops a computer program, the author has the copyright.
Creative Commons - โ โ Creative Commons is a nonprofit organization that provides legal tools for artists and authors. The tools offered make it simple to license artistic or literary work for others to use or distribute in a manner consistent with the author's intentions. Creative Commons licenses are indicated with the symbol.
Do Not Track - โ โ Do Not Track is a technology and policy proposal that enables users to opt out of tracking by websites they do not visit, including analytics services, advertising networks, and social platforms
Fair use - โ โ Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. For example, if a teacher wanted to discuss a current event in class, copies of the copyrighted new story could be handed out in class without first getting permission.
Fundamentally, how does blockchain technology work (make sure you include concepts such as blocks, hash, etc. in your explanation)? - โ โ On the network, the record is combined with other transactions into a blockโlike a traditional computer database. Each transaction is time-stamped. When a block is complete, it also gets its own time stamp. So all information is sequential, which helps avoid duplicate entries.The completed block is sent out across the network, where it's appended to the chain. The key to a blockchain's security is something called a hash. It's a bit of cryptographic math that makes the links between blocks virtually unbreakable. A hash function takes the information in each block and uses it to create the hashโa unique string of characters.
How might smart contracts impact various industries (as discussed in the article)? - โ โ -Smart contracts could change entire fields of law. Blockchain wills could automatically take effect when a person dies, transferring inheritances without needing an executor. Replacing legal jargon with blockchain logic would require a different type of corporate lawyer with skills akin to a computer programmer.
-The blockchain could soon revolutionize music and the other arts. Currently, most musicians and authors make little money from their work as most of the sales price is consumed by the publisher and retail store. This could change through blockchain agreements.
Identify and define the SDLC stages/ best practices listed in this reading. - โ โ 1- Identify the current problems: getting input from all stakeholders, including customers, salespeople, industry experts, and programmers. Learn the strengths and weaknesses of the current system with improvement as the goal.
Proactivity establishing a set of professional ethics can help you navigate the complex interactions and relationships encountered in the workplace. - โ โ True
Spiral Model- - โ โ Most flexible, go through each stage over and over again with gradual improvements each pass.
The advice given in this article has applicability for more than just IT professionals. How might this advice be applicable to you in your future professional career? - โ โ To make sure I do not overstep or violate any rule.
The only practical application of Blockchain technology is to support crycrocurriences - โ โ False
Trademark - โ โ A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. For example, the Nike "Swoosh," the Facebook "f", and Apple's apple (with a bite taken out of it) are all trademarked. The concept behind trademarks is to protect the consumer.
V-shaped model- - โ โ extension of the waterfall, except this version test at every stage. Can run into roadblocks.
Waterfall model- - โ โ When one phase ends start the next. Oldest model. Small details incomplete can holdup the model.
What are some benefits of SDLC? Likewise, what are some pitfalls? - โ โ SDLC done right can allow the highest level of management control and documentation.
What are some of the other applications for blockchain technologies mentioned on the website besides cryptocurrencies (i.e., see the "Blockchain in Action" section)? - โ โ Because blockchain establishes trust, they provide a simple paperless way to establish ownership of money, products and objects- like concert tickets.
What are the duties and responsibilities of a software developer listed in this reading? - โ โ Develop and test software to meet consumers' and clients' needs.
Develop upgrades for existing applications.
Monitor quality and performance of applications through testing and maintenance.
Document all work for future reference.
What are the key challenges the article suggests need to be addressed to create a health AI ecosystem?
What are the main aims of cyber attacks? - โ โ accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
What are the parts of a successful cyber security approach and what does it involve? - โ โ In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks
What are the security best-practices the article mentions? - โ โ Make unique passwords, never click on suspicious websites
What did research out of Oxford suggest about how many jobs may be automated by machines? - โ โ 1 in every 2 jobs may be automated
What does ethics have to do with information systems and information technologies? - โ โ New technologies give us capabilities that we did not have before, which in turn create environments and situations that have not been specifically addressed in an ethical context. Those who master new technologies gain new power while those who cannot or do not master them may lose power.
What does the article suggest that "proactively establishing a set of professional ethics" might do for you? - โ โ Proactively establishing a set of professional ethics can help you navigate the complex interactions and relationships encountered in the workplace.
What does the term ethics mean? - โ โ The term ethics means "a set of moral principles" or "the principles of conduct governing an individual or a group."
What does this article suggest is the reason why we need professional ethics? - โ โ we need professional ethics because of the impact that our actions have on society as a whole.
What impact will blockchain have on intermediaries? - โ โ Blockchain replaces this central system with a decentralized ledger of chained records.
What is a blockchain "at its heart"? In what ways are blockchains used for more than just the "movement of money"? - โ โ A blockchain at its heart is just a record of transactions.
A way to add security to transaction.
What is a blockchain node? - โ โ set of rules that dictate how the computers in the network
What is a blockchain protocol? - โ โ should verify new transactions and add them to the database. The protocol employs cryptography, game theory, and economics to create incentives for the nodes to work toward securing the network instead of attacking it for personal gain.
What is a smart contract? - โ โ A computer program that runs on blockchain. It can be used to automate the movement of cyrocurrancy.