Term
|
Definition
is a bottleneck sharing and reuse help problem |
|
|
Term
| Knowledge Acquisition Techniques |
|
Definition
Linguistic: Machine-learning: Exploiting the web: Knowledge-acquisition templates |
|
|
Term
|
Definition
| KA- ontogeny acquisition from texts |
|
|
Term
|
Definition
| KA-ontogeny from structured texts |
|
|
Term
|
Definition
| KA-generate onto's by crawling structured websites |
|
|
Term
| Knowledge-acquisition templates |
|
Definition
| KA-experts specify only parts of the knowledge required |
|
|
Term
|
Definition
| Analytical,Efficiency,Knowledge |
|
|
Term
| Natural Language Processing |
|
Definition
Requires us to focus the inference process (assertions) Requires common sense Syntactic ambiguity Pronoun disambiguation |
|
|
Term
|
Definition
| Fred saw the plane flying over Zurich |
|
|
Term
|
Definition
| the police arrested the demonstrations because they feared violence. |
|
|
Term
|
Definition
Uniform Resource Locator Uniform Resource Name |
|
|
Term
|
Definition
XML-Extensible Markup Language Shares marked up data Any Language |
|
|
Term
|
Definition
| Vocabulary Description language |
|
|
Term
|
Definition
OWL-Web Ontology Language Allows machines to process content Analogous to a taxonomy |
|
|
Term
|
Definition
| Annotate data, XML,RDF,OWL |
|
|
Term
|
Definition
| Markup Language,labels data bread |
|
|
Term
|
Definition
| Markup Language, describes data |
|
|
Term
|
Definition
| Markup Language, Relates data |
|
|
Term
|
Definition
| Spreadsheets, databases, Web pages |
|
|
Term
| Spreadsheets, databases, Web pages |
|
Definition
| contain annotated data,contain algorithms |
|
|
Term
| Annotation, Supercomputers, Aggregation |
|
Definition
Minimize time and space Solve problems more efficiently |
|
|
Term
|
Definition
| where the values of multiple rows are grouped together as input on certain criteria to form a single value |
|
|
Term
|
Definition
| is an effective method expressed as a finite list[1] of well-defined instructions[2] for calculating a function |
|
|
Term
|
Definition
is a person who breaks into computers and computer networks for profit, as protest, or sometimes by the motivation of the challenge Argument that are actually crackers over time it changed started off as fun and inventive then turned bad and called crackers |
|
|
Term
|
Definition
| is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. |
|
|
Term
|
Definition
| is a computer program that can copy itself[1] and infect a computer |
|
|
Term
|
Definition
| s a destructive program that hides as a being application |
|
|
Term
| secure transmission (protocol) |
|
Definition
| refers to the transfer of data such as confidential or proprietary information over a secure channel involves encryption |
|
|
Term
| intellectual property rights |
|
Definition
|
|
Term
|
Definition
| consists of methods for uniquely recognizing humans based upon one or more intrinsic(or only human) physical or behavioral traits |
|
|
Term
|
Definition
| is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge |
|
|
Term
|
Definition
| is any software package which automatically plays, displays, or downloads advertisements to a computer. (pop-ups) |
|
|
Term
|
Definition
| is a large family of computer worms of varying characteristics |
|
|
Term
|
Definition
| is a device or set of devices designed to permit or deny network transmissions based upon a set of rules |
|
|
Term
|
Definition
| is a system which enables an authority to control access to areas and resources in a given physical facility or computer-based information system. An access control system, within the field of physical security, is generally seen as the second layer in the security of a physical structure |
|
|
Term
|
Definition
| is a computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks |
|
|
Term
|
Definition
| is a way of attempting to acquire sensitive information s by masquerading as a trustworthy entity in an electronic communication. |
|
|
Term
|
Definition
| is a piece of software designed to fix problems |
|
|
Term
|
Definition
| early days of Industrial Revolution |
|
|
Term
|
Definition
attach themselves to docs that conatin macros embedded in programs to automate tasks can be spread across softwares |
|
|
Term
|
Definition
| type of Trojan horse is porogrammed to attack in response to an event or a set of events |
|
|
Term
|
Definition
| just going to a certain site can cause sypware to be downloaded to your computer |
|
|
Term
|
Definition
| hijack legitimate web pages |
|
|
Term
|
Definition
| good but people pick easy ones |
|
|
Term
|
Definition
| symbol for open source society |
|
|
Term
|
Definition
| launches typical log-in screen in public place and says error and steals passwords |
|
|
Term
|
Definition
| use of deception to get people to reveal important information |
|
|
Term
| Denial of Service Attacks |
|
Definition
| flood with messages until so overwhelmed that real customers can't be helped and shut down |
|
|
Term
| Two things computers leave open |
|
Definition
computers do exactly what they are told to do and can be reprogrammed Can't protect itself from viruses it has no protection against |
|
|
Term
|
Definition
| scramble transmissions send numerical code |
|
|
Term
|
Definition
| used to monitor and record computer transactions |
|
|
Term
|
Definition
| multiply hard disks to operate as one unit and automatically mirror data on other disks |
|
|
Term
| Authentication Mechanisms |
|
Definition
| asks potential users to identify themselves and make sure users have permission to use that program |
|
|
Term
|
Definition
| identifying, finding, remembering |
|
|
Term
|
Definition
its impossible to eliminate all bugs the bigger the system the bigger the problem working programs can contain bugs |
|
|
Term
|
Definition
|
|
Term
|
Definition
| DNS cache poisoning to redirect traffic to fake sites |
|
|
Term
|
Definition
| 87 are auctions average cost $500 |
|
|
Term
| Most common stolen things |
|
Definition
| money, goods, information |
|
|
Term
|
Definition
| Spammers, Web Designers, Exploiters, Cashiers, Droppers |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| amateur hackers called "script kiddies" who gather computer victims "roots" and use them to host a phishing site or spam relay |
|
|
Term
|
Definition
| withdraw cash from bank accounts |
|
|
Term
|
Definition
| use stolen card numbers to buy things at an untraceable drop point |
|
|
Term
| Piracy of Intellectual Property |
|
Definition
copying of copyrighted software difficult to enforce |
|
|
Term
|
Definition
continually monitors system activity need to be revised automatically update |
|
|
Term
|
Definition
| something you have, you know, you do |
|
|
Term
|
Definition
| Firewalls, Encryption, shields |
|
|
Term
|
Definition
| process of encrypting messages |
|
|
Term
|
Definition
Inventions are patented trade secrets covered by contract law IP can be copyrighted |
|
|
Term
|
Definition
| Universal Resource Identifiers |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Resource Description Framework |
|
|
Term
| What are RDF's designed for |
|
Definition
|
|
Term
|
Definition
|
|