Podcast
Questions and Answers
What is the primary purpose of a firewall in computer security?
What is the primary purpose of a firewall in computer security?
- To encrypt data transmitted over the internet
- To protect against viruses and malware
- To monitor and control user activity on a network
- To prevent unauthorized access to a network (correct)
Which of the following is NOT a common ethical issue associated with social media?
Which of the following is NOT a common ethical issue associated with social media?
- Cyberbullying and online harassment
- Using social media for professional networking (correct)
- Sharing copyrighted content without permission
- Privacy concerns regarding personal information
What is the primary function of a 'cookie' in the context of computer security?
What is the primary function of a 'cookie' in the context of computer security?
- To encrypt data transmitted over the internet
- To protect against phishing attacks
- To track user activity and preferences on a website (correct)
- To prevent unauthorized access to a network
Which of the following best describes the concept of 'confidentiality' in computer security?
Which of the following best describes the concept of 'confidentiality' in computer security?
Which of the following is NOT a type of malware?
Which of the following is NOT a type of malware?
Which of these options represents a type of computer storage?
Which of these options represents a type of computer storage?
Which of the following is NOT a benefit of Cloud Computing?
Which of the following is NOT a benefit of Cloud Computing?
What is the primary function of a compiler?
What is the primary function of a compiler?
Which of the following is NOT a common web browser?
Which of the following is NOT a common web browser?
What is the definition of a database?
What is the definition of a database?
Which of the following BEST describes the difference between Machine Learning and Deep Learning?
Which of the following BEST describes the difference between Machine Learning and Deep Learning?
Which of the following accurately represents a URL's three major parts?
Which of the following accurately represents a URL's three major parts?
Which of these is a type of mobile app that typically utilizes high data usage?
Which of these is a type of mobile app that typically utilizes high data usage?
Flashcards
Black hat vs white hat hacker
Black hat vs white hat hacker
Black hat hackers breach security for malicious reasons; white hat hackers do so to improve security.
Confidentiality
Confidentiality
Protection of information to ensure it is not disclosed to unauthorized individuals.
Malware
Malware
Malicious software designed to harm, exploit, or otherwise compromise a device or network.
Phishing
Phishing
Signup and view all the flashcards
Multi-factor Authentication (MFA)
Multi-factor Authentication (MFA)
Signup and view all the flashcards
Netiquette
Netiquette
Signup and view all the flashcards
Open Source
Open Source
Signup and view all the flashcards
Algorithm
Algorithm
Signup and view all the flashcards
Cloud Storage
Cloud Storage
Signup and view all the flashcards
Bandwidth
Bandwidth
Signup and view all the flashcards
Big Data
Big Data
Signup and view all the flashcards
Machine Learning
Machine Learning
Signup and view all the flashcards
Virtual Reality
Virtual Reality
Signup and view all the flashcards
Study Notes
Midterm Exam Guide
- The exam will be 50 multiple-choice or true/false questions.
- It covers material from the "ALA" assignments (Parts 1, 2, and 3) in the Connect system, based on the Investigating Technology eBook.
- The exam will be 1 hour long.
What to Study
- Review the terms and concepts in the Investigating Technology eBook.
- Navigate the chapters using the contents button.
- Use the search function to find specific topics or terms.
Computer Security
- Understand the difference between black hat and white hat hackers.
- Define confidentiality and explore tools to ensure it.
- Definitions of cookies, DDoS, firewall, integrity, malware, MFA, phishing, ransomware, Trojan, UPS/Surge Protectors, and viruses.
Social Media and Your Digital Identity
- Review the Acceptable Use Policy.
- Understand "leaving footprints" on social media.
- Look at concepts within the "Computers in Business" chapter.
- Define copyright.
Additional Topics
- Review topics like Creative Commons, E-commerce, Ergonomics, Ethical social media issues, Netiquette, Piracy, Business Email Etiquette, Cryptocurrency, Employee Monitoring Software, IoT, VPN, Augmented Reality, Virtual Reality, Linux, Operating Systems, Software Licenses, Spreadsheets, Algorithms, Compilers, Debugging, Programming Languages, File Management (Files vs. Folders, File Compression, Cloud Storage methods), Mobile Devices (Android, iOS)
- Understand computer hardware (e.g., Bluetooth, CPU, Desktop Computer, Hardware, RAM, Server, Supercomputer, USB), Input (e.g., Biometrics, Input, NFC), Output (e.g., 3D Printing, Resolution for Monitors).
- Study computer storage (e.g., Bit vs. Byte, Kilo, Mega, Giga, Terabyte, cloud storage, SSD).
- Understand Networking (e.g., Bandwidth, Broadband, Cloud Computing, Common Web Browsers, Domain Name, ISP, Network, Router). Learn about Streaming, URL's, and World Wide Web.
- Study Internet Research (e.g., Advanced Search Tools, Credible and Noncredible Sources).
- Explore Databases (e.g., Big Data, DBMS, Database, Database Elements - Query, Table, Primary Key), data analytics, data visualization, data anonymization, and Personally Identifiable Information.
- Learn about Artificial Intelligence (e.g., Al definition, Machine Learning, Deep Learning, Positive and Potential Drawbacks of Al).
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.