Edited, memorised or added to reading list

on 24-Oct-2019 (Thu)

Do you want BuboFlash to help you learning these things? Click here to log in or create user.

Flashcard 4468332432652

Question

In AWS (and computing in general), which of block vs object storage is more scalable, and why?

Answer

Object Storage is more scalable

Block storage is always attached to a machine with an OS and therefore has limit of how much data you can store there, where as object storage scales infinitely as it is not attached to host OS (i.e. files have metadata which helps find them easier without need of OS). Think EBS vs S3.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4471163063564

Question
In AWS S3, Lifecycle Rules can be applied to [...] and/or [...] versions of files. <-- Looking for two different occultions
Answer
current and/or previous


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4472037838092

Question
In AWS S3, enabling Transfer Accelration will allow for faster file upload/downloads through the user of [...] [...] [...]
Answer

CloudFront Edge Locations

^^ The way this works, for example, when user tries to upload file, they are routed (via DNS) to closest edge location, then from the edge location to the S3 bucket, amazon's backbone network is used to find fastest route to bucket.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487343377676

Question
westerra credit union was founded in this year.
Answer
when is in 1934?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
, Westerra branches and Contact Center will open at 10 am. Who We Are Home Why Westerra About Us Who We Are Our Story Our credit union was formed by eight school teachers who pooled their funds <span>in 1934 to be able to make loans to other teachers. These visionary leaders created DPS Credit Union, a not-for-profit financial cooperative, owned and controlled by the members who use its ser







Flashcard 4487345736972

Question
this credit union was formed by eight school teachers who pooled their funds in 1934 to be able to make loans to other teachers.
Answer
what is westerra credit union?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
Login Help Federally Insured by NCUA [imagelink] On Thursday, October 24, Westerra branches and Contact Center will open at 10 am. Who We Are Home Why Westerra About Us Who We Are Our Story Our <span>credit union was formed by eight school teachers who pooled their funds in 1934 to be able to make loans to other teachers. These visionary leaders created DPS Credit Union, a not-for-profit financial cooperative, owned and controlled by the members who use its services. Its purpose was to put the members fi







Flashcard 4487347571980

Question
westerra credit union's original name was this.
Answer
what is DPS Credit Union?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
rra About Us Who We Are Our Story Our credit union was formed by eight school teachers who pooled their funds in 1934 to be able to make loans to other teachers. These visionary leaders created <span>DPS Credit Union, a not-for-profit financial cooperative, owned and controlled by the members who use its services. Its purpose was to put the members first when offering financial services and treat th







Flashcard 4487349931276

Question
this is the mission of westerra credit union.
Answer
wha is to put the members first when offering financial services and treat them as valued owners?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
make loans to other teachers. These visionary leaders created DPS Credit Union, a not-for-profit financial cooperative, owned and controlled by the members who use its services. Its purpose was <span>to put the members first when offering financial services and treat them as valued owners. Today, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse







Flashcard 4487352028428

Question
dps credit union’s name was changed to Westerra Credit Union in this year.
Answer
when is 2006?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
ervices. Its purpose was to put the members first when offering financial services and treat them as valued owners. Today, the credit union remains focused on that same mission and purpose. The <span>credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse membership. DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 200







Flashcard 4487355960588

Question
dps credit union changed its name to westerra credit union in 2006 for this reason.
Answer
what is to better reflect its growing and diverse membership?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
inancial services and treat them as valued owners. Today, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 <span>to better reflect its growing and diverse membership. DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers







Flashcard 4487358319884

Question
DPS Credit Union and Safeway Rocky Mountain Credit Union merged in this year.
Answer
when is 2005?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
ay, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse membership. <span>DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers #9 Credit Union in 2013. Each credit union brought a shared commitm







Flashcard 4487360679180

Question
DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in this year.
Answer
when is 2006?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
ay, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse membership. <span>DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers #9 Credit Union in 2013. Each credit union brought a shared commitment to meeting members’ needs—and a strong local heritag







Flashcard 4487363038476

Question
DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in this year.
Answer
when is 2009?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
ay, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse membership. <span>DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers #9 Credit Union in 2013. Each credit union brought a shared commitment to meeting members’ needs—and a strong local heritage. In 1951, the Safeway Rocky







Flashcard 4487365397772

Question
DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers #9 Credit Union in this year.
Answer
when is 2013?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill
A Colorado Credit Union: Our Story | Westerra Credit Union
ay, the credit union remains focused on that same mission and purpose. The credit union’s name was changed to Westerra Credit Union in 2006 to better reflect its growing and diverse membership. <span>DPS Credit Union and Safeway Rocky Mountain Credit Union merged in 2005, followed by the merger of Gateway Credit Union in 2006, Jeffco Credit Union in 2009 and the Sheet Metal Workers #9 Credit Union in 2013. Each credit union brought a shared commitment to meeting members’ needs—and a strong local heritage. In 1951, the Safeway Rocky Mountain Credit Union was chartered to serve employ







Flashcard 4487368019212

Question
similar to arithmetic expressions, they use various operators to combine smaller expressions.
Answer
what are regular expression?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487370378508

Question

Backreference, lookahead, and lookbehind operators can be used.

The above are differences in this.

Answer
what are how perl-like regular expressions use perl syntax?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487372737804

Question
with perl-like regular expressions, R can substitute non-these for these matches.
Answer
what are nongreedy for greedy?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487375097100

Question
Data scientists often need to identify patterns in strings. These can make the search process simpler and faster.
Answer
what are regular expressions?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487377456396

Question
for special circum- stances, such as denoting a pattern at the beginning or end of the string, regular expressions use these.
Answer
what are special characters?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487379815692

Question
for the program to recognize special characters as legiti- mate, this escape character is used in many languages.
Answer
what is " \ " ?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487382961420

Question
“\1” and “\2” are examples of this kind of character in regular expressions.
Answer
what are feedback reference characters?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487387417868

Question
functions that map data of any size to an output of fixed size are called this.
Answer
what are hash functions?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487389777164

Question
Hash functions map data of this size to an output of this size.
Answer
what is any size to fixed size?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487392136460

Question
hash functions can accept this type of data of this length.
Answer
what is any type of data of any length?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487394495756

Question
hash functions are also called these.
Answer
what are called digests or hash values?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487396855052

Question
hash values are typically this kind of number.
Answer
what are non- negative integers?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487399214348

Question
hash values are typically subject to this digit constraint.
Answer
what is a fixed number of digits?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487401311500

Question
By convention, hash values are shown in this format.
Answer
what is hexadecimal?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487403670796

Question
situations in which two different inputs (searches) produce the same output (result) are called this.
Answer
what are collisions?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487406030092

Question
This property allows for a user to compute the hash value of a file and com- pare it with the hash value of the file as published by a trusted party.
Answer
what is the collision-resistant property of hash functions?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487408389388

Question
The collision-resistant property of cryptographic hash func- tions makes them very useful for fast this of large or complex data structures.
Answer
what is equality testing?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487410748684

Question
The disadvantage of comparing objects by their hash values is this.
Answer
what is that it requires computing the hash value for each object, which is not instantaneous?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487413107980

Question
the fixed cost of computing hash values for every object could be worth- while, if the elements of a set of objects will be this.
Answer
what is compared with each other repeatedly?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487415467276

Question
a data structure that allows for fast storage and retrieval of informa- tion on the basis of key-value pairs is this.
Answer
what is a hash table?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487417826572

Question
in hash tables, keys are required to be this, but values may be this.
Answer
what is keys are required to be unique but values may be duplicated?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487420185868

Question
for hash tables, keys are generally this length, but values may potentially be very this.
Answer
what is short, but values may potentially be very large.?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487422545164

Question
With a good choice of hash functions, the split between train- ing and test datasets will be this, like a random split, but easily this, like a naive split.
Answer
what is will be unbiased, like a random split, but easily reproducible, like a naive split?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







A hash function is applied to every observation in a dataset (or perhaps some subset of the variables in the dataset, like the primary key). The data can then be split either by selecting cutoff values of the hash value or by ordering the data by the hash values and then dividing the data into contiguous groups.

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




The insurer’s data scientists could use these Structured Query Lan- guage (SQL) clauses to query auto insurance data: • SELECT • FROM • JOIN • GROUP BY • WHERE • ORDER BY They could then use these aggregate functions to summarize that data: • SUM • COUNT • AVERAGE

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487428050188

Question
A characteristic in a database that ensures the most effective proce- dure and option are used to respond to queries defines this.
Answer
Optimization


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487430409484

Question
A pattern that is used by a computer program to match combinations of characters in strings defines this.
Answer
a regular expression


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487432768780

Question
Practical Extraction and Report Language (Perl) A procedural programming language that is often used for text pro- cessing and analysis
Answer
[default - edit me]


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487434341644

Question
A Perl regular expression that looks for a match to a character or group of characters to the right in a string.
Answer
Lookahead


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487436700940

Question
A Perl regular expression that looks for a match to a character or group of characters to the left in a string
Answer
Lookbehind


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487439322380

Question
A Perl function that can manage strings of data that change slightly from one instance to another.
Answer
Backreference


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







In response to security breaches involving consumer health and financial data, the NAIC adopted these principles for effective cyber security: a. State regulators are responsible for ensuring that PII is protected and that insurers and producers have systems in place to notify affected parties promptly if a security breach occurs. b. Insurers and producers that collect, store, and transmit confidential information or PII should safeguard it appropri- ately

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




c. State regulators that collect, store, and transmit confi- dential information or PII about insurers or producers are responsible for safeguarding that information and notifying affected parties promptly in the event of a security breach. d. Cyber security regulations for insurers and producers should be flexible and consistent with the National Institute of Standards and Technology (NIST) security standards. e. All insurers and producers that are connected to the inter- net must meet a minimum cyber security standard. f. Regulators should conduct insurer examinations to evaluate cyber security vulnerability. g. An effective cyber security program includes a plan for insurers, producers, and regulators to respond to a cyber security breach. h. Insurers, producers, and regulators should ensure that third parties and service providers have safeguards in place to protect PII. i. Management of cyber security should be part of an insurer’s or producer’s enterprise risk management (ERM) program. j. Information technology audits that identify a cyber security risk should be reviewed with the organization’s board of directors. k. Insurers and producers must keep informed about current and emerging cyber security risks. l. Employee training about cyber security is essential for insur- ers and producers

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487447186700

Question
information security regulations that are among the most comprehensive and stringent in the U.S. have been issued by this state.
Answer
what is massachussetts?


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







regulations require every person and organization, both in Massachusetts and elsewhere, that accesses the private personal information of Massachusetts’ citizens to follow these standards: a. Develop and implement a comprehensive written policy of information security procedures b. Comply with Massachusetts standards for issues such as paper document storage, access controls to information, monitoring standards, and training for employees c. Encrypt personal information records communicated over wireless networks or stored on personal devices d. Require outsourced or third-party providers handling per- sonal information to maintain commensurate compliance with the regulations

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Regulation and Privacy Issues 5.5 e. Annually review the established security measures to con- firm that they are safeguarding against unauthorized access to personal information

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487453216012

Question
PCI DSS stands for this
Answer
Payment Card Industry Data Security Standard


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487455575308

Question
this standard covers processors of debit and credit card
Answer
payment card industry data security standard


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Many states have restricted the use of private information through laws and regulations with requirements such as these: a. Prohibiting any public display of SSNs b. Restricting the printing of SSNs on any form of identifica- tion shown to others c. Limiting the providing of SSNs over the internet unless encrypted d. Not requiring SSNs as identifiers for website access unless passwords are required e. Forbidding the sending of documents through the mail with SSNs

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Laws can also require certain procedures for government enti- ties, businesses, or sometimes both to appropriately dispose of PII. These laws can refer to physical or electronic personal information and may outline specific disposal means to ulti- mately make them unreadable, undecipherable, or unusable

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487462391052

Question
These laws can refer to physical or electronic personal information and may outline specific disposal means to ulti- mately make them unreadable, undecipherable, or unusable
Answer
Laws that require certain procedures to appropriately dispose of PII.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Additional privacy laws in various states include these provi- sions, which show the breadth of issues being legislated: a. Adding an internet user’s login and password to the growing list of personal information that can be protected b. Restricting an employer’s right to demand access to an employee’s social media accounts c. Requiring police to acquire a search warrant before tracking a person through cell phone records d. Limiting the use of drones e. Requiring a warrant for email searches

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




European Parliament and Council Directive 95/46/EC deals with the protection of personal data in both electronic and nonelectronic forms. The directive delineates these data- related regulatory elements: a. The conditions that must be met for data processing to be lawful b. The principles of data quality necessary for lawful data processing c. The rights of individuals whose personal data is being pro- cessed d. The exemptions or restrictions on individuals’ rights with respect to personal data e. The confidentiality and security of data processing f. The legal recourse available to individuals whose rights have been breached g. The transfer of personal data from an EU member to a non-EU member

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487471303948

Question
In Canada, requirements for the collection, use, and disclosure of personal information by private sector organizations engaged in commercial activi- ties are established by this.
Answer
Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA)


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487475498252

Question
In England, how organiza- tions, businesses, and the government are to use and protect individuals’ personal information is specified by this.
Answer
the Data Protection Act


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487479168268

Question
In Argentina, the protection of personal information in order to guarantee the right of individuals to their honor and privacy is provided by this.
Answer
the Personal Data Protection Act (Act 25.326)


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487482838284

Question
IAIS stands for this.
Answer
International Association of Insurance Supervisors


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







The International Association of Insurance Supervisors (IAIS) is a membership organization of insurance supervisors and regulators. The goal of the IAIS is to promote consistent supervision of the insurance industry globally in order to pro- tect policyholders, help ensure stable insurance markets, and contribute to global financial stability.

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487492799756

Question
to promote consistent supervision of the insurance industry globally in order to pro- tect policyholders, help ensure stable insurance markets, and contribute to global financial stability is the goal of this association.
Answer
the international association of insurance supervisors.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487498042636

Question
IAIS publishes Insurance Core Principles, Standards, Guidance and Assessment Methodol- ogy, which provides a framework for this.
Answer
the global supervision of the insurance industry.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487500664076

Question
how insurance supervisors are to exchange information with each other, or with other authorities, as well as confidentiality requirements for information exchange are outlined in one section of this document, produced by the IAIS
Answer
Insurance Core Principles, Standards, Guidance and Assessment Methodology


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487502236940

Question
In AWS, if you need more than [...]IOPS for your EBS volume, you must use Provisioned IPOPS SSD (API code: io1)
Answer

16000

^^ gp2 (general purpose SSD only supports up to 16000 IOPS), and the HDD/magnetic disk varients are even slower IOPS (Input/Ouputs Per Second)
^^^ Povisioned IOPS SSD is for read/write intensive workloads, like databases


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487503547660

Question
MMoS stands for this.
Answer
Multilateral Memorandum of Understanding.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487507479820

Question
In AWS, the maximum storage space on any given EBS Volume (regardless of Volume type) is [...]
Answer
16T


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487508004108

Question
An agreement called a Multilateral Memorandum of Understanding (MMoS) is entered into by supervisors who intend to do this.
Answer
share information


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487510363404

Question
Previously, exchange of data between the EU and the U.S. was covered by this.
Answer
Safe Harbor.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487512722700

Question
an agreement that protects the data of people in the EU if their data is exchanged with U.S. entities was called this.
Answer
Safe Harbor.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487516654860

Question
In AWS, [...] volumes can be though of as vitual hard disk in the cloud (either HDD/magnetic hard disks or SSD drives)
Answer

EBS

^Elastic Block Storage


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487517179148

Question
Companies can have their privacy and security standards validated for compliance with this 2006 EU-US agreement.
Answer
Privacy Shield


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487520324876

Question
In AWS, [...] are point in time copies of EBS volumes that are stored in S3.
Answer

Snapshots

^^ Snapshots are incremental, meaning only the blocks that have changed since your last snapshot are moved to S3.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Privacy Shield, which certifies that specific security standards have been followed. These standards include those related to notice, access, security, choice, transfers of data to third parties, and methods of redress that were part of the previous standards. They also include added regulatory and enforcement require- ments on the part of U.S. agencies and stronger mechanisms for resolving complaints of standards violations.

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487524781324

Question
In AWS, [...]s are created from Snapshots of EBS Volumes (or directly from an EBS Volume) or are created from an EC2 instance (stopping the instance is recommended to preserve good state), and are then used to create new EC2 instances.
Answer

AMIs

^^ Amazon Machine Images, and there are two types: AMIs from EBS Volumes, and AMIs from Instance Store (AMI templates stored on S3 but not visible in your AWS account)


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487526878476

Question
In AWS, EBS volumes are always in same [...] [...] as the corresponding EC2 instance the Volume is attached to.
Answer
Availability Zone


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487528975628

Question
Information, technology, and storage services contractually provided from remote locations, through the internet or another network, without a direct server connection is called this.
Answer
Cloud computing


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Flashcard 4487530024204

Question
In AWS, by default, terminiating an EC2 istance, will do what to its corresponding root device EBS Volume (i.e. where the OS and all programs are stored)
Answer

Delete it


^^ Note that other attached volumes will not be deleted by default (but you can configure both these options differently if you don't want these defaults)


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487532645644

Question
In AWS, If you have an unencyrpted root device volume for your EC2 (say you did not choose enctyprion when you created it), what are the steps to encrypt it (assuming your instance has no other volumes attached)? (FYI, there are 4 steps)
Answer
1) Take a snapshot of EBS root volume (with instance in stopped state to get good state).
2) Make a encrypted copy of volume snapshot
3) Make an AMI from the encrypted snapshot copy
4) Launch new encrypted EC2 from the encrypted AMI.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487535791372

Question
In AWS, there are two types of AMIs that you can create EC2 instances from: AMIs from EBS Volumes (most cases you use this), and AMIs from [...] [...]
Answer

Instance Store

^^ Instance Store AMIs are AMI templates stored on S3 but not visible in your AWS account
^^^ Instance Store AMIs are ephimeral, meaning if you stop the instance (say something is wrong with the underlying host hypervisor and you need a stop/start), the volume is gone!


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487537888524

Question
In AWS, what is the difference between rebooting and stopping/starting an EC2 instance? Explain it in terms of what happens in each case when dealing with a EBS Volume vs Instance Store volume (i.e. EC2 is created from Instacne Store AMI where you have no visibility to the volume from the AWS console)?
Answer

Rebooting, just reboots the underlying OS, whereas Stop/Start, is done when there is something wrong with the underlying Host hypervisor. Stopping and instance and starting it, could cause the instance to run on another host (i.e. could result in new IP, etc). So in case of EBS Volumes, nothing bad happens (as new instance running on possible new host just gets attached to same EBS volume), but if you have EC2 backed by Instace Store AMI, Stop/Start will kill/delete/wipe the root device volume.

^^ note that when you stop an instance, you don't get charged for compute anymore, but if you are using an EBS backed volume, you do get small storage charges for the EBS volume.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487539985676

Question
In AWS, there are two ways to create an EC2 instance, from an AMI made from a EBS Volume, or from AMI from Instance Store. What is the instance store AMI and where is it stored?
Answer
It is an AMI template stored on S3 but you have no visibility to it from your AWS Console (i.e. not like EBS Volumes, where you can see them and change their settings, e.g. size/type, from the EC2 console).


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Ecology is the study of the relationships between different organisms, and the ‘‘affairs’’ between these organisms and the total ‘‘house- hold’’ of the external environment.

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487548112140

Question
Ecology would not focus upon just an individual giraffe, for example. Rather, it would expand its focus beyond the single giraffe organism, to other nearby giraffes, other species, and even the entire external environment of the African plain.
Answer
[default - edit me]


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill

pdf

cannot see any pdfs







Graphs, Tables, and Chart

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Ecology is the study of the relationships between different organisms

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on


Parent (intermediate) annotation

Open it
Ecology is the study of the relationships between different organisms, and the ‘‘affairs’’ between these organisms and the total ‘‘house- hold’’ of the external environment.

Original toplevel document (pdf)

cannot see any pdfs




①全球股市历史显示,长期看股指年化涨幅与名义 GDP 接近, 年度涨跌幅会大幅偏离长期均值,就像钟摆经过中心点的时间很短。②美股、 港股、台股历史显示,股指年振幅不断收窄,这源于 GDP 增速放缓、机构 投资者占比提升。③A 股年振幅从 2010 年前的 82%降至近几年的 42%,但 仍高于成熟市场的 20%-32%,长期看有望进一步收窄

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Therefore, Biological Order in the external environment beyond the organism reflects a healthy or successful pattern of ecological relationships.

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




sent this Order symbolically by a spider in its web (Figure 1.4, A). Conversely, Biological Disorder beyond the organism reflects a breaking of the normal pattern

statusnot read reprioritisations
last reprioritisation on reading queue position [%]
started reading on finished reading on

pdf

cannot see any pdfs




Flashcard 4487644581132

Question
In AWS, [...] is the service that allows you to monitor the performance of your resouces (like CPU usage/memory of EC2, ELB metrics, etc) and applications (application logs from Lambda, for example).
Answer
CloudWatch


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487646678284

Question
In AWS, CloudWatch will monitor events of an EC2 instance (like CPU usage, memory, health check, etc) every [...] [...unit of time...] by default, but you can turn on detailed monitoring (at instance create time or after) and shrik the monitor time interval to every [...] [...unit of time...]
Answer
5 minutes by default, 1 minute for detailed monitoring


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487648775436

Question
In AWS, you can create CloudWatch [...] which then trigger notifications, for example, when your bill gets too high or an EC2 instance goes over some CPU threshold.
Answer
alarms


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487650872588

Question
In AWS, CloudWatch is all about performance monitoring (e.g. CPU usage of EC2) while [...] is about auditing (which user made which API call to use which resource and how).
Answer
CloudTrail


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill






Flashcard 4487652969740

Question
In AWS, if you have an EC2 instances that talks with other AWS resources, like S3 (say using scripts using the AWS SDK), and you have your Access Key and Secret configured in the ~/.aws/credentials file, you can add security by replace this key setup and use [...] instead
Answer

Roles

^^ so in any setup where the credentials are pulled from the ~/.aws/credentials file, you can use Roles instead, but in setups where the configuration is pulled from somewhere else, not controlled by AWS, for example in the case of configuring AWS SES with Postfix email, where the SES access key and id are in the /etc/postfix/sasl_passwd file on your EC2 instance, you cannot switch to using roles.


statusnot learnedmeasured difficulty37% [default]last interval [days]               
repetition number in this series0memorised on               scheduled repetition               
scheduled repetition interval               last repetition or drill