Midterm Exam Guide: Investigating Technology

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a firewall in computer security?

  • To encrypt data transmitted over the internet
  • To protect against viruses and malware
  • To monitor and control user activity on a network
  • To prevent unauthorized access to a network (correct)

Which of the following is NOT a common ethical issue associated with social media?

  • Cyberbullying and online harassment
  • Using social media for professional networking (correct)
  • Sharing copyrighted content without permission
  • Privacy concerns regarding personal information

What is the primary function of a 'cookie' in the context of computer security?

  • To encrypt data transmitted over the internet
  • To protect against phishing attacks
  • To track user activity and preferences on a website (correct)
  • To prevent unauthorized access to a network

Which of the following best describes the concept of 'confidentiality' in computer security?

<p>Guaranteeing that only authorized individuals can access data (C)</p> Signup and view all the answers

Which of the following is NOT a type of malware?

<p>Firewall (C)</p> Signup and view all the answers

Which of these options represents a type of computer storage?

<p>RAM (C), USB (D)</p> Signup and view all the answers

Which of the following is NOT a benefit of Cloud Computing?

<p>Increased security and data protection (A)</p> Signup and view all the answers

What is the primary function of a compiler?

<p>To translate high-level programming language into machine code (B)</p> Signup and view all the answers

Which of the following is NOT a common web browser?

<p>Apache Tomcat (D)</p> Signup and view all the answers

What is the definition of a database?

<p>A collection of organized information that can be easily accessed, managed, and updated (D)</p> Signup and view all the answers

Which of the following BEST describes the difference between Machine Learning and Deep Learning?

<p>Deep Learning is a subset of Machine Learning (C)</p> Signup and view all the answers

Which of the following accurately represents a URL's three major parts?

<p>Protocol, Domain Name, Resource Path (C)</p> Signup and view all the answers

Which of these is a type of mobile app that typically utilizes high data usage?

<p>Social Media (B)</p> Signup and view all the answers

Flashcards

Black hat vs white hat hacker

Black hat hackers breach security for malicious reasons; white hat hackers do so to improve security.

Confidentiality

Protection of information to ensure it is not disclosed to unauthorized individuals.

Malware

Malicious software designed to harm, exploit, or otherwise compromise a device or network.

Phishing

A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

Signup and view all the flashcards

Multi-factor Authentication (MFA)

A security system that requires more than one method of verification to access accounts.

Signup and view all the flashcards

Netiquette

The code of polite and respectful behavior in online communication.

Signup and view all the flashcards

Open Source

Software with source code that anyone can inspect, modify, and enhance.

Signup and view all the flashcards

Algorithm

A step-by-step procedure for solving a problem or completing a task.

Signup and view all the flashcards

Cloud Storage

Storing data on remote servers accessed via the internet.

Signup and view all the flashcards

Bandwidth

The maximum rate of data transfer across a network path.

Signup and view all the flashcards

Big Data

Extremely large data sets that can be analyzed for patterns and trends.

Signup and view all the flashcards

Machine Learning

A subset of AI that enables systems to learn from data and improve performance over time.

Signup and view all the flashcards

Virtual Reality

A simulated experience that can simulate or enhance the real world.

Signup and view all the flashcards

Study Notes

Midterm Exam Guide

  • The exam will be 50 multiple-choice or true/false questions.
  • It covers material from the "ALA" assignments (Parts 1, 2, and 3) in the Connect system, based on the Investigating Technology eBook.
  • The exam will be 1 hour long.

What to Study

  • Review the terms and concepts in the Investigating Technology eBook.
  • Navigate the chapters using the contents button.
  • Use the search function to find specific topics or terms.

Computer Security

  • Understand the difference between black hat and white hat hackers.
  • Define confidentiality and explore tools to ensure it.
  • Definitions of cookies, DDoS, firewall, integrity, malware, MFA, phishing, ransomware, Trojan, UPS/Surge Protectors, and viruses.

Social Media and Your Digital Identity

  • Review the Acceptable Use Policy.
  • Understand "leaving footprints" on social media.
  • Look at concepts within the "Computers in Business" chapter.
  • Define copyright.

Additional Topics

  • Review topics like Creative Commons, E-commerce, Ergonomics, Ethical social media issues, Netiquette, Piracy, Business Email Etiquette, Cryptocurrency, Employee Monitoring Software, IoT, VPN, Augmented Reality, Virtual Reality, Linux, Operating Systems, Software Licenses, Spreadsheets, Algorithms, Compilers, Debugging, Programming Languages, File Management (Files vs. Folders, File Compression, Cloud Storage methods), Mobile Devices (Android, iOS)
  • Understand computer hardware (e.g., Bluetooth, CPU, Desktop Computer, Hardware, RAM, Server, Supercomputer, USB), Input (e.g., Biometrics, Input, NFC), Output (e.g., 3D Printing, Resolution for Monitors).
  • Study computer storage (e.g., Bit vs. Byte, Kilo, Mega, Giga, Terabyte, cloud storage, SSD).
  • Understand Networking (e.g., Bandwidth, Broadband, Cloud Computing, Common Web Browsers, Domain Name, ISP, Network, Router). Learn about Streaming, URL's, and World Wide Web.
  • Study Internet Research (e.g., Advanced Search Tools, Credible and Noncredible Sources).
  • Explore Databases (e.g., Big Data, DBMS, Database, Database Elements - Query, Table, Primary Key), data analytics, data visualization, data anonymization, and Personally Identifiable Information.
  • Learn about Artificial Intelligence (e.g., Al definition, Machine Learning, Deep Learning, Positive and Potential Drawbacks of Al).

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Midterm Exam Guide (2025) PDF

More Like This

Fire Technology and Investigation
13 questions
Science, Technology, and Society Quiz
13 questions
Understanding Computer Forensics
35 questions
Use Quizgecko on...
Browser
Browser