the practice of designing inputs for AI tools that will produce optimal outputs.
the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings
The ability to perceive and interpret information, and to retain it as knowledge to be applied in the correct context
A test that determines how realistic, or humanlike a computer system really is. If a human is unable to tell if it is talking to a computer or a human, then the computer is said to have passed the Turing test.
AI that is built for a specific purpose and excels in its limited domain
a more human-like AI; versatile across various cognitive functions and tasks, having broader capabilities
A form of artificial intelligence that uses what it has learned to predict an outcome
A form of artificial intelligence that generates new content such as text or art
are machine learning models that can comprehend and generate human language text.
a model that is capable of processing information from multiple types of data, including images, videos, and text
The moral principle that governs a person's behavior.
Occurs when a result is more favorable to a certain outcome.
Depends on whether or not the data is correct.
A question or command given to an AI to generate a response
Machine learning is a field of Artificial Intelligence that uses inputs and outputs to create computer models that teaches a computer to have intelligence.
A form of machine learning where algorithms are trained to make predictions using testing data, where the outcome of a specific event is already determined
A large percent of a dataset that is used to teach a machine learning model
A smaller subset of a dataset that is used test a trained machine learning model
A form of machine learning where algorithms are able to group data and find patterns in the data on their own
A form of machine learning where a computer agent learns to make decisions by interacting with its environment and receiving feedback.
A type of machine learning that uses a computational model that uses nodes inspired by the structure and functioning of the human brain and learns by trial and error.
Convolutional Neural Networks are a type of neural network that are commonly used to classify images by using a weighted kernel.
An individual characteristic or property in a data set
A collection of examples used to teach an AI model
The outcome or answer the model is being trained to predict
A correct data point showing what the model should learn
A skew in the data that can affect fairness in AI predictions
How information is converted into numerical form for AI
A data point that shows what the model should not learn
A predictive modeling problem where a label is predicted for a given input
A common unsupervised learning technique that takes a data set and divides it into subgroups, or clusters, based on similarities
Representation Bias is when the data used for training doesn't represent the population that the model will serve.
Prejudice in favor of or against one thing, person, or group compared with another, usually in a way considered to be unfair.
The right to control access to personal information
a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.
false or inaccurate information, especially that which is deliberately intended to deceive.
False information provided by an AI
An attack where hackers manipulate generative AI systems by feeding them malicious inputs disguised as legitimate user prompts.
The information about a particular person that exists on the Internet as a result of their online activity
A balance achieved between two desirable but incompatible features
The simulation of human intelligence by machines
A declared position or opinion on how rules or laws should be created or enforced
Openness in communication and disclosure of how AI is used
AI systems that could potentially harm people’s rights or safety if misused
The potential for loss when an attack happens.
Repeating a process to improve a solution through refinement.
The use of machines or technology to perform tasks without human input.
Legal document outlining how a company can collect and use your data
any data that can be used to identify an individual, such as their name, address, or social security number
Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
A computer system able to perform tasks that ordinarily require human intelligence
The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.
The protection of information from people who are not authorized to view it.
Aims at ensuring that information is protected from unauthorized or unintentional alteration.
The assurance that systems and data are accessible by authorized users when and where needed.
Ensures that one cannot deny having sent or received a message.
A flaw or weakness in a system or device.
A potential for a cybercriminal to exploit a vulnerability.
The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.
The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.
The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.
Any type of software that is designed to intentionally harm or damage a computer or network.
A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.
A software that prevents users from accessing their files or network until a ransom is paid.
Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.
A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.
A network security device that monitors and filters incoming and outgoing network traffic.
A type of authentication that is similar to a password but longer and is usually a sentence or a series of words
(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)
(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).
A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity
Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.
the use of electronic communication to bully a person
A law that grants the creator of an original work exclusive rights to its use, distribution, and sale
refers to an external mechanism of control
A specific group of hackers who are motivated by their ideological views.
Have political motivations with the intent to harm, typically resulting in violence.
Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.
A collection of numbers or data points.
Created when a collection of data is organized or structured.
Pulls meaning from information by analyzing the organized data and generating insights.
This is when data is being accessed by a person or program.
This is when data is actively moving from one location to another.
This is when data is stored in a specific place that isn’t actively moving to other devices or networks.
A combination of hardware and software designed for a specific function within a larger system.
A device that detects physical input from the environment and converts it into data.
A compact integrated circuit that processes input and controls output in an embedded system.
A device that performs actions based on processed data (e.g., turning on a pump).
Translates and executes program code line by line into machine code.
Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.
A programming language is any set of rules that converts strings, or graphical program elements in the case of visual programming languages, to various kinds of machine code output.
a computer programming language consisting of binary instructions
A language where variable types are determined at runtime, not in advance.
A language where variable types are explicitly declared and checked at compile time.
The process of verifying and enforcing the constraints of types in a programming language.
The period when a program is running, after it has been compiled or interpreted.