Podcast
Questions and Answers
What is the primary purpose of a firewall in computer security?
What is the primary purpose of a firewall in computer security?
Which of the following is NOT a common ethical issue associated with social media?
Which of the following is NOT a common ethical issue associated with social media?
What is the primary function of a 'cookie' in the context of computer security?
What is the primary function of a 'cookie' in the context of computer security?
Which of the following best describes the concept of 'confidentiality' in computer security?
Which of the following best describes the concept of 'confidentiality' in computer security?
Signup and view all the answers
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
Signup and view all the answers
Which of these options represents a type of computer storage?
Which of these options represents a type of computer storage?
Signup and view all the answers
Which of the following is NOT a benefit of Cloud Computing?
Which of the following is NOT a benefit of Cloud Computing?
Signup and view all the answers
What is the primary function of a compiler?
What is the primary function of a compiler?
Signup and view all the answers
Which of the following is NOT a common web browser?
Which of the following is NOT a common web browser?
Signup and view all the answers
What is the definition of a database?
What is the definition of a database?
Signup and view all the answers
Which of the following BEST describes the difference between Machine Learning and Deep Learning?
Which of the following BEST describes the difference between Machine Learning and Deep Learning?
Signup and view all the answers
Which of the following accurately represents a URL's three major parts?
Which of the following accurately represents a URL's three major parts?
Signup and view all the answers
Which of these is a type of mobile app that typically utilizes high data usage?
Which of these is a type of mobile app that typically utilizes high data usage?
Signup and view all the answers
Study Notes
Midterm Exam Guide
- The exam will be 50 multiple-choice or true/false questions.
- It covers material from the "ALA" assignments (Parts 1, 2, and 3) in the Connect system, based on the Investigating Technology eBook.
- The exam will be 1 hour long.
What to Study
- Review the terms and concepts in the Investigating Technology eBook.
- Navigate the chapters using the contents button.
- Use the search function to find specific topics or terms.
Computer Security
- Understand the difference between black hat and white hat hackers.
- Define confidentiality and explore tools to ensure it.
- Definitions of cookies, DDoS, firewall, integrity, malware, MFA, phishing, ransomware, Trojan, UPS/Surge Protectors, and viruses.
Social Media and Your Digital Identity
- Review the Acceptable Use Policy.
- Understand "leaving footprints" on social media.
- Look at concepts within the "Computers in Business" chapter.
- Define copyright.
Additional Topics
- Review topics like Creative Commons, E-commerce, Ergonomics, Ethical social media issues, Netiquette, Piracy, Business Email Etiquette, Cryptocurrency, Employee Monitoring Software, IoT, VPN, Augmented Reality, Virtual Reality, Linux, Operating Systems, Software Licenses, Spreadsheets, Algorithms, Compilers, Debugging, Programming Languages, File Management (Files vs. Folders, File Compression, Cloud Storage methods), Mobile Devices (Android, iOS)
- Understand computer hardware (e.g., Bluetooth, CPU, Desktop Computer, Hardware, RAM, Server, Supercomputer, USB), Input (e.g., Biometrics, Input, NFC), Output (e.g., 3D Printing, Resolution for Monitors).
- Study computer storage (e.g., Bit vs. Byte, Kilo, Mega, Giga, Terabyte, cloud storage, SSD).
- Understand Networking (e.g., Bandwidth, Broadband, Cloud Computing, Common Web Browsers, Domain Name, ISP, Network, Router). Learn about Streaming, URL's, and World Wide Web.
- Study Internet Research (e.g., Advanced Search Tools, Credible and Noncredible Sources).
- Explore Databases (e.g., Big Data, DBMS, Database, Database Elements - Query, Table, Primary Key), data analytics, data visualization, data anonymization, and Personally Identifiable Information.
- Learn about Artificial Intelligence (e.g., Al definition, Machine Learning, Deep Learning, Positive and Potential Drawbacks of Al).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Prepare for your midterm exam covering key concepts from the 'Investigating Technology' eBook. The exam will consist of 50 questions, including multiple-choice and true/false formats. Focus on computer security, social media, and your digital identity topics to ensure a thorough review.