CS101 Exam 2 Vocab Review

123456789101112131415161718192021222324252627282930313233343536373839
Across
  1. 3. A user who has more privileges than others
  2. 5. The ability of a robot or machine to act without human control or intervention
  3. 8. The three v's of big data are __, velocity, and variety
  4. 9. The three d's of robotics are dull, ___, and dangerous
  5. 12. An unreliable transmission protocol
  6. 13. A type of supervised learning with discrete labels
  7. 14. A herd of computers controlled to perform a task without the user's permission
  8. 15. The devices that allow a robot to manipulate its surroundings
  9. 18. An individual computer on a network
  10. 20. Governs what an authenticated user is allowed to do
  11. 23. The type of encryption key that is known only to the user and is never shared
  12. 25. The decision-making component of a robot
  13. 27. The rate at which information can be sent and received across a network connection
  14. 30. The practice of hiding the existence of a message
  15. 31. The internet protocol layer whose goal it is to deliver packages from source port to destination port
  16. 32. A type of device that can translate signals between different types of networks
  17. 33. The name of a confirmation signal used in the ARQ algorithm
  18. 34. A type of machine learning that uses neural networks
  19. 35. The portion of data used to train a machine learning model before validating
  20. 36. When the real world is entirely replaced with a digital environment, its ____ reality
  21. 37. A term formed from the phrase malicious software
  22. 38. The subsystem that allows a robot to move and interact with objects in the environment
  23. 39. Training a model to correspond too closely or exactly to a particular set of data
Down
  1. 1. A type of machine learning based on rewards and punishments
  2. 2. A single element in a neural network. It has inputs, weights, an activation function, and an output
  3. 4. The factor that determines whether a machine learning model should use the information it already has
  4. 6. Applying a mathematical one-way function to create a "signature" of the input
  5. 7. Level 3 autonomy, decisions and movements are approved by a supervisor
  6. 10. The speed at which information changes in big data
  7. 11. A device that amplifies and forwards a signal
  8. 16. The type of node needed as the center of a star topography
  9. 17. The subsystem that allows a robot to sense and understand itself and its environment
  10. 19. Data science at the intersection between computer science, domain expertise and ___
  11. 21. Malware that pretends to only do a legitimate task while also breaching security
  12. 22. Occurs when two messages are sent at the same time on a shared communication line
  13. 24. A device smarter than a repeater that has knowledge about the nodes on each bus or LAN
  14. 26. The values that describe the data in ML
  15. 28. The process of verifying that you really are the person who has the right to access a given computer
  16. 29. Used to store data for transactional purposes
  17. 31. A reliable transmission protocol