Chapter 14 - Developments in Technology Flashcards
What is cloud computing?
Cloud computing is the provision of some part of a computer system through the use of the internet, including services like software as a service (web browser), data storage, and infrastructure as a service.
What does SaaS stand for?
Software as a service (SaaS)allows users to connect to and use cloud-based apps over the Internet. Common examples are email, calendaring, and office tools (such as Microsoft Office 365). SaaS provides a complete software solution that you purchase on a pay-as-you-go basis from a cloud service provider.
What does IaaS stand for?
Infrastructure as a service (IaaS) is a cloud computing service model where a cloud services vendor provides computing resources such as storage, network, servers, and virtualization (which emulates computer hardware). This service frees users from maintaining their own data center, but they must install and maintain the operating system and application software.
s cloud computn public or private?
A cloud can be public or private. Public clouds sell services to anyone on the internet. A private cloud is only made available to those that have permission to access it.
What are the three distinct characteristics of cloud computing? 3
- It is sold on demand and billed by the minute or hour. 2. It is elastic, allowing users to access as much or as little as they want. 3. It is fully managed by the provider, requiring only a device and internet access.
What are the advantages of cloud computing over on-premise software?
A. Data is stored locally and accessible to one user.
B. Data is held centrally, making it accessible to many users and up-to-date.
C. Cloud providers handle backups.
D. Users are required to manage system updates themselves.
B and C.
What is the internet of things (IoT)?
IoT refers to the connection of computing devices to the internet, enabling them to share data with processors where it is turned into information.
Which of the following are examples of IoT devices?
A. Gas meters
B. Electricity meters
C. Heart monitoring equipment
D. Non-digital thermostats
A, B, and C.
What is a digital asset?
A digital asset is data or information created and stored digitally, forming a source of revenue for businesses. Examples include software, photos, videos, original music, and digital documents.
How can a digital asset be protected?
A digital asset may need encoding, encryption, or watermarking to trace its origin and protect it.
What is a centralised ledger?
A centralised ledger is managed by a single authority, such as a bank, which records transactions and maintains account statements.
What is a distributed ledger?
A distributed ledger is a decentralised system where all participants maintain their own records of transactions, making them public and safe from corruption or fraudulent manipulation.
What are the advantages of distributed ledgers?
A. Data is managed by a single entity.
B. Transactions are made public for inspection.
C. They are inherently safe from corruption and fraudulent manipulation.
D. They depend on blockchain technology for additional security.
B, C, and D.
What is blockchain technology?
Blockchain is a method of recording transactions using discrete blocks of data, linked together by hash values, making it nearly impossible to alter past records fraudulently.
What is a hash in blockchain?
A hash is a checksum generated by a one-way algorithm that uniquely represents data. It ensures data integrity, as any tampering alters the hash value.
What are the key steps in a blockchain process?
A. Each transaction is recorded in blocks of data.
B. Blocks are connected by their hash values.
C. The original data can be reconstituted from the hash.
D. Tampering with data breaks the chain of trust.
A, B, and D.
Why is blockchain ideal for digital wallets?
Blockchain ensures trust by allowing third parties to verify the integrity of transactions through the integrity of hash values.
What is an example of blockchain use beyond digital wallets?
Blockchain is used in voting records, where tampering can be detected through hash integrity checks.
Explain the steps in a blockchain 4
Blockchain is a method of recording transactions in such a way that it is nearly impossible to go back and change history to fraudulently make the records more favourable.
Here is a simplified example, at least enough to explain the concept:
* (1) Each transaction is recorded in discreet blocks of data. In the first block, we have the data ‘abcd’.
* (2) Added to the block is a type of checksum called a hash value. A hash is a one-way algorithm that produces a large number of seemingly random characters (e.g. 256) that can only be generated by the input data. It is not encryption, for the source data cannot be reconstituted. This is shown in purple.
* (3) The hash from the preceeding block is incorporated into the next block. Data is added to it (‘efgh’ in this case) and a new hash is calculated that includes both the original hash and the data. This is shown in orange.
* (4) Subsequent blocks are added, each incorporating the preceding block’s hash values. And so on.
What are cryptocurrencies?
Cryptocurrencies are digital tokens that allow users to trade with each other online. They are secured through cryptography and recorded on public ledgers using blockchain technology.
What is the primary use of cryptocurrencies?
Cryptocurrencies enable users to make online purchases and receive payments, acting as a form of secure digital money.
What are the risks associated with cryptocurrencies?
A. Cryptocurrencies are not volatile.
B. Online digital wallets can be hacked.
C. Cryptocurrencies are subject to market forces.
D. They provide opportunities for criminals to avoid money laundering regulations.
B, C, and D.
Cryptocurrencies ARE volatile.
Can a digital wallet be seized?
No
What is fintech?
Fintech refers to the use of technology by challenger banks and other entities to provide innovative financial services at a lower cost of operation.