Summary

This is a midterm exam guide for 2025, covering various technology topics. It includes computer security, social media, emerging technologies, and related subjects.

Full Transcript

Midterm Exam Guide The Basics ​ Exam will be completed on Canvas using proctoring ​ It will have 50 questions, all multiple choice or true/false ​ It covers the material you learned in the "ALA" Assignments, located in Parts 1, 2, and 3 of the Connect system. That material is based on...

Midterm Exam Guide The Basics ​ Exam will be completed on Canvas using proctoring ​ It will have 50 questions, all multiple choice or true/false ​ It covers the material you learned in the "ALA" Assignments, located in Parts 1, 2, and 3 of the Connect system. That material is based on the Investigating Technology eBook, also located in Connect. ​ You will have 1 hour to complete the exam What to Study Now that you have completed all of the ALA Assignments, the easiest way to prepare for the midterm is to review each of the terms/concepts below in the eBook. In the main area of your Connect course, click the Connect Master: Investigating Technology link on the left side. Once the eBook opens, click the contents button at the top left to navigate through the chapters in the book. You can also use the Search button near the top right to jump directly to a topic or key term. Most questions will focus on definitions, but some may check for a more thorough understanding. Therefore, try to read the paragraph that contains these terms or concepts. Recommendation: Make your own copy of this guide in Google Drive (File…Make a Copy) and type some notes for each of the topics below. It will help you as you study. Computer Security ​ Black hat vs white hat hacker ​ Confidentiality - Definition and tools to ensure confidentiality ​ Cookie ​ DDoS ​ Firewall ​ Integrity ​ Malware ​ Multi-factor Authentication (MFA) ​ Phishing ​ Ransomware ​ Trojan ​ UPS and Surge Protectors ​ Virus Social Media and Your Digital Identity ​ Acceptable Use Policy (also check the Computers in Business chapter) ​ BitTorrent ​ Copyright ​ Creative Commons ​ E-Commerce ​ E-Commerce: Three categories ​ Ergonomics ​ Ethical issues with social media. Know what it means to leave footprints. ​ LinkedIn ​ Netiquette ​ Piracy - Software / Internet ​ Social Media Computers in Business ​ Business Email Etiquette ​ Cryptocurrency ​ Employee Monitoring Software ​ IoT ​ VPN Emerging Technologies 2022 ​ Augmented Reality ​ Virtual Reality Computer Software and Buying a Computer ​ Linux ​ What it means for Linux to be "Open Source" ​ Operating System / Platform ​ Software license ​ Spreadsheet Programming ​ Algorithm ​ Compiler ​ Debugging ​ Programming ​ Common programming languages File Management ​ File vs Folder ​ File Compression ​ Cloud Storage options (example services) Mobile Devices ​ Android ​ iOS ​ Mobile app data usage - What kind of apps use the most data? ​ SMS ​ Tethering Computer Hardware ​ Bluetooth ​ CPU ​ Desktop Computer ​ Hardware ​ RAM ​ Server ​ Supercomputer ​ USB Computer Input ​ Biometrics ​ Input ​ NFC Computer Output ​ 3D Printing / 3D Printer ​ Resolution for monitors - Definition Computer Storage ​ Bit vs Byte ​ Kilo, Mega, Giga, and Terabyte ​ Cloud storage ​ SSD Networking and Connecting to the Internet ​ Bandwidth ​ Broadband ​ Cloud Computing - Definition ​ Cloud Computing - Benefits ​ Common Web Browsers ​ Domain Name ​ ISP ​ Network ​ Router ​ Streaming ​ URL - Definition and its three major parts ​ World Wide Web Internet Research ​ Advanced Search Tools ​ Credible and Noncredible Sources Databases ​ Big Data ​ DBMS ​ Database ​ Database Elements - Query ​ Database Elements - Table ​ Database Elements - Primary Key Data Analytics ​ Data Analytics - Definition ​ Data Visualization ​ Data Anonymization and PII Artificial Intelligence ​ AI (simplified definition) ​ Machine Learning vs Deep Learning ​ Positive Outcomes of AI ​ Potential Drawbacks of AI

Use Quizgecko on...
Browser
Browser