Midterm Exam Guide (2025) PDF
Document Details
Uploaded by LegendaryMonkey362
Miami Dade College
2025
Tags
Summary
This is a midterm exam guide for 2025, covering various technology topics. It includes computer security, social media, emerging technologies, and related subjects.
Full Transcript
Midterm Exam Guide The Basics Exam will be completed on Canvas using proctoring It will have 50 questions, all multiple choice or true/false It covers the material you learned in the "ALA" Assignments, located in Parts 1, 2, and 3 of the Connect system. That material is based on...
Midterm Exam Guide The Basics Exam will be completed on Canvas using proctoring It will have 50 questions, all multiple choice or true/false It covers the material you learned in the "ALA" Assignments, located in Parts 1, 2, and 3 of the Connect system. That material is based on the Investigating Technology eBook, also located in Connect. You will have 1 hour to complete the exam What to Study Now that you have completed all of the ALA Assignments, the easiest way to prepare for the midterm is to review each of the terms/concepts below in the eBook. In the main area of your Connect course, click the Connect Master: Investigating Technology link on the left side. Once the eBook opens, click the contents button at the top left to navigate through the chapters in the book. You can also use the Search button near the top right to jump directly to a topic or key term. Most questions will focus on definitions, but some may check for a more thorough understanding. Therefore, try to read the paragraph that contains these terms or concepts. Recommendation: Make your own copy of this guide in Google Drive (File…Make a Copy) and type some notes for each of the topics below. It will help you as you study. Computer Security Black hat vs white hat hacker Confidentiality - Definition and tools to ensure confidentiality Cookie DDoS Firewall Integrity Malware Multi-factor Authentication (MFA) Phishing Ransomware Trojan UPS and Surge Protectors Virus Social Media and Your Digital Identity Acceptable Use Policy (also check the Computers in Business chapter) BitTorrent Copyright Creative Commons E-Commerce E-Commerce: Three categories Ergonomics Ethical issues with social media. Know what it means to leave footprints. LinkedIn Netiquette Piracy - Software / Internet Social Media Computers in Business Business Email Etiquette Cryptocurrency Employee Monitoring Software IoT VPN Emerging Technologies 2022 Augmented Reality Virtual Reality Computer Software and Buying a Computer Linux What it means for Linux to be "Open Source" Operating System / Platform Software license Spreadsheet Programming Algorithm Compiler Debugging Programming Common programming languages File Management File vs Folder File Compression Cloud Storage options (example services) Mobile Devices Android iOS Mobile app data usage - What kind of apps use the most data? SMS Tethering Computer Hardware Bluetooth CPU Desktop Computer Hardware RAM Server Supercomputer USB Computer Input Biometrics Input NFC Computer Output 3D Printing / 3D Printer Resolution for monitors - Definition Computer Storage Bit vs Byte Kilo, Mega, Giga, and Terabyte Cloud storage SSD Networking and Connecting to the Internet Bandwidth Broadband Cloud Computing - Definition Cloud Computing - Benefits Common Web Browsers Domain Name ISP Network Router Streaming URL - Definition and its three major parts World Wide Web Internet Research Advanced Search Tools Credible and Noncredible Sources Databases Big Data DBMS Database Database Elements - Query Database Elements - Table Database Elements - Primary Key Data Analytics Data Analytics - Definition Data Visualization Data Anonymization and PII Artificial Intelligence AI (simplified definition) Machine Learning vs Deep Learning Positive Outcomes of AI Potential Drawbacks of AI