CS101 Exam 2 Vocab Review
Across
- 3. A user who has more privileges than others
- 5. The ability of a robot or machine to act without human control or intervention
- 8. The three v's of big data are __, velocity, and variety
- 9. The three d's of robotics are dull, ___, and dangerous
- 12. An unreliable transmission protocol
- 13. A type of supervised learning with discrete labels
- 14. A herd of computers controlled to perform a task without the user's permission
- 15. The devices that allow a robot to manipulate its surroundings
- 18. An individual computer on a network
- 20. Governs what an authenticated user is allowed to do
- 23. The type of encryption key that is known only to the user and is never shared
- 25. The decision-making component of a robot
- 27. The rate at which information can be sent and received across a network connection
- 30. The practice of hiding the existence of a message
- 31. The internet protocol layer whose goal it is to deliver packages from source port to destination port
- 32. A type of device that can translate signals between different types of networks
- 33. The name of a confirmation signal used in the ARQ algorithm
- 34. A type of machine learning that uses neural networks
- 35. The portion of data used to train a machine learning model before validating
- 36. When the real world is entirely replaced with a digital environment, its ____ reality
- 37. A term formed from the phrase malicious software
- 38. The subsystem that allows a robot to move and interact with objects in the environment
- 39. Training a model to correspond too closely or exactly to a particular set of data
Down
- 1. A type of machine learning based on rewards and punishments
- 2. A single element in a neural network. It has inputs, weights, an activation function, and an output
- 4. The factor that determines whether a machine learning model should use the information it already has
- 6. Applying a mathematical one-way function to create a "signature" of the input
- 7. Level 3 autonomy, decisions and movements are approved by a supervisor
- 10. The speed at which information changes in big data
- 11. A device that amplifies and forwards a signal
- 16. The type of node needed as the center of a star topography
- 17. The subsystem that allows a robot to sense and understand itself and its environment
- 19. Data science at the intersection between computer science, domain expertise and ___
- 21. Malware that pretends to only do a legitimate task while also breaching security
- 22. Occurs when two messages are sent at the same time on a shared communication line
- 24. A device smarter than a repeater that has knowledge about the nodes on each bus or LAN
- 26. The values that describe the data in ML
- 28. The process of verifying that you really are the person who has the right to access a given computer
- 29. Used to store data for transactional purposes
- 31. A reliable transmission protocol