Midterm Exam Guide: Investigating Technology
13 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of a firewall in computer security?

  • To encrypt data transmitted over the internet
  • To protect against viruses and malware
  • To monitor and control user activity on a network
  • To prevent unauthorized access to a network (correct)
  • Which of the following is NOT a common ethical issue associated with social media?

  • Cyberbullying and online harassment
  • Using social media for professional networking (correct)
  • Sharing copyrighted content without permission
  • Privacy concerns regarding personal information
  • What is the primary function of a 'cookie' in the context of computer security?

  • To encrypt data transmitted over the internet
  • To protect against phishing attacks
  • To track user activity and preferences on a website (correct)
  • To prevent unauthorized access to a network
  • Which of the following best describes the concept of 'confidentiality' in computer security?

    <p>Guaranteeing that only authorized individuals can access data (C)</p> Signup and view all the answers

    Which of the following is NOT a type of malware?

    <p>Firewall (C)</p> Signup and view all the answers

    Which of these options represents a type of computer storage?

    <p>RAM (C), USB (D)</p> Signup and view all the answers

    Which of the following is NOT a benefit of Cloud Computing?

    <p>Increased security and data protection (A)</p> Signup and view all the answers

    What is the primary function of a compiler?

    <p>To translate high-level programming language into machine code (B)</p> Signup and view all the answers

    Which of the following is NOT a common web browser?

    <p>Apache Tomcat (D)</p> Signup and view all the answers

    What is the definition of a database?

    <p>A collection of organized information that can be easily accessed, managed, and updated (D)</p> Signup and view all the answers

    Which of the following BEST describes the difference between Machine Learning and Deep Learning?

    <p>Deep Learning is a subset of Machine Learning (C)</p> Signup and view all the answers

    Which of the following accurately represents a URL's three major parts?

    <p>Protocol, Domain Name, Resource Path (C)</p> Signup and view all the answers

    Which of these is a type of mobile app that typically utilizes high data usage?

    <p>Social Media (B)</p> Signup and view all the answers

    Study Notes

    Midterm Exam Guide

    • The exam will be 50 multiple-choice or true/false questions.
    • It covers material from the "ALA" assignments (Parts 1, 2, and 3) in the Connect system, based on the Investigating Technology eBook.
    • The exam will be 1 hour long.

    What to Study

    • Review the terms and concepts in the Investigating Technology eBook.
    • Navigate the chapters using the contents button.
    • Use the search function to find specific topics or terms.

    Computer Security

    • Understand the difference between black hat and white hat hackers.
    • Define confidentiality and explore tools to ensure it.
    • Definitions of cookies, DDoS, firewall, integrity, malware, MFA, phishing, ransomware, Trojan, UPS/Surge Protectors, and viruses.

    Social Media and Your Digital Identity

    • Review the Acceptable Use Policy.
    • Understand "leaving footprints" on social media.
    • Look at concepts within the "Computers in Business" chapter.
    • Define copyright.

    Additional Topics

    • Review topics like Creative Commons, E-commerce, Ergonomics, Ethical social media issues, Netiquette, Piracy, Business Email Etiquette, Cryptocurrency, Employee Monitoring Software, IoT, VPN, Augmented Reality, Virtual Reality, Linux, Operating Systems, Software Licenses, Spreadsheets, Algorithms, Compilers, Debugging, Programming Languages, File Management (Files vs. Folders, File Compression, Cloud Storage methods), Mobile Devices (Android, iOS)
    • Understand computer hardware (e.g., Bluetooth, CPU, Desktop Computer, Hardware, RAM, Server, Supercomputer, USB), Input (e.g., Biometrics, Input, NFC), Output (e.g., 3D Printing, Resolution for Monitors).
    • Study computer storage (e.g., Bit vs. Byte, Kilo, Mega, Giga, Terabyte, cloud storage, SSD).
    • Understand Networking (e.g., Bandwidth, Broadband, Cloud Computing, Common Web Browsers, Domain Name, ISP, Network, Router). Learn about Streaming, URL's, and World Wide Web.
    • Study Internet Research (e.g., Advanced Search Tools, Credible and Noncredible Sources).
    • Explore Databases (e.g., Big Data, DBMS, Database, Database Elements - Query, Table, Primary Key), data analytics, data visualization, data anonymization, and Personally Identifiable Information.
    • Learn about Artificial Intelligence (e.g., Al definition, Machine Learning, Deep Learning, Positive and Potential Drawbacks of Al).

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Midterm Exam Guide (2025) PDF

    Description

    Prepare for your midterm exam covering key concepts from the 'Investigating Technology' eBook. The exam will consist of 50 questions, including multiple-choice and true/false formats. Focus on computer security, social media, and your digital identity topics to ensure a thorough review.

    More Like This

    Use Quizgecko on...
    Browser
    Browser