Faki Femi is the Vice President of Research at Southern Univ…

Faki Femi is the Vice President of Research at Southern University in Charleston, South Carolina. In February 2026, Faki travels to a conference in St. Louis, Missouri. During his travels, Faki uses a publicly available wi-fi at Coffee-on-the-Go, a local coffee shop. As a Coffee-on-the-Go customer, Faki is able to obtain the password to access Coffee-on-the-Go’s wi-fi. Due to a technical issue with his laptop, Faki is unable to utilize Southern University’s VPN. While checking his university email on his laptop, Faki learns of a credit card payment that he needs to make during his trip. Fearing that this credit card payment will be late if he does not act, Faki makes the credit card payment online while using his laptop at Coffee-on-the-Go. Which of the following is a concern raised by Faki’s online activity?

Locked & Protected is an international company, based in Sac…

Locked & Protected is an international company, based in Sacramento, California, that provides a self-described digital lock around its cloud storage. In its advertising material, Locked & Protected claims that its digital lock is unhackable so its customers’ data will always be secure. Because of the alleged unhackability of the digital lock, Locked & Protected does not encrypt any of the data maintained by its customers in the company’s cloud storage. One month after Locked & Protected begins its unhackable advertising campaign, the data in the company’s cloud storage is hacked. The data of Locked & Protected’s customers is sold by the hackers on the Dark Web. Locked & Protected is likely to face the following:

Consider the task of Named-Entity Recognition where for each…

Consider the task of Named-Entity Recognition where for each word in a sentence, we want to classify each word as either a person, organization, location, or none. The input is a sentence containing n words. State how an RNN would run at test time (not training time) to do this task by answering the following:   How many outputs (i.e. number of times the softmax y(t) is called) will the RNN have? If the number of outputs is not knowable, state it as arbitrary and explain why.    What would be the output dimension of each softmax?

Identify & React, a prominent threat analysis group, identif…

Identify & React, a prominent threat analysis group, identified an approach used for nation-state attacks. The hackers set up a cybersecurity blog in an attempt to build credibility with potential targets. In the blog, the hackers focused on vulnerabilities that were actually already public. The hackers then created a series of social media accounts linked to the blog. The hackers, posing as the authors of the blog, reached out to security researchers, asking them to collaborate on their work. When the security researchers responded, the hackers sent these researchers Visual Studio Projects software containing malware, which infect the researchers’ computers. This type of threat to online privacy is known as:

Modern NLP systems can generate highly fluent text without n…

Modern NLP systems can generate highly fluent text without necessarily demonstrating “true” understanding. Based on our discussions of language understanding, which of the following tasks provides the strongest evidence that a system has moved beyond surface-level pattern matching to deep semantic understanding?

Kai Kaiwi, a resident of San Diego, California, purchased a…

Kai Kaiwi, a resident of San Diego, California, purchased a plane ticket from Comfortable Airlines. The flight was scheduled to leave from San Diego and arrive in Honolulu, Hawaii, on December 31, 2025. Kai later decided to change the flight to the next day – January 1, 2026. When Kai contacted Comfortable Airlines to make the adjustment to his reservation, he learned for the first time that Comfortable Airlines used a company named SelectNow to do the real-time seat assignments for their customers, including Kai’s seat assignment on both the December 31 and January 1 flights. Believing that the California legal framework considers the sale of personal information to include “any disclosure” of personal information to another company, Kai contacted the California Attorney General’s Office with his complaint. What defense is Comfortable Airlines likely to assert?

PrivacyFirst, a company incorporated in Miami, Florida, is d…

PrivacyFirst, a company incorporated in Miami, Florida, is dedicated to creating privacy-enhancing technologies to address concerns raised by artificial intelligence. PrivacyFirst’s advertising team has requested approval from the Chief Operating Officer for an ad campaign that assures customers that PrivacyFirst can anonymize any data prior to it being used to train an algorithm. PrivacyFirst’s Chief Data Scientist raises concerns about this advertising campaign due to the existence of techniques for re-identification. In particular, the Chief Data Scientist urges that PrivacyFirst ensure its usage of which of the following techniques prior to adopting the proposed advertising campaign?