Design Thinking Process
Physical computing
The internet
Ethical Computing
Data management
100

When using all the step in the DT process. What is the very first step?

Notice

100

There are _____ bits in one byte.

8

100

Who created the internet?

Vint Cerf and Bob Kahn

100

 Software that attaches itself to another file and when the file is opened, it runs and causes damage is?

Virus

100

_________is the process of discovering unknown patterns and relationships in large amounts of data.

Data mining

200

During which Design Thinking stage would you want users to try out your solutions for themselves?

Test

200

Convert Binary to Decimal:  11111111

255

200

When a hacker changes the domain name, and creates a fake web address it is called?

DNS spoofing

200

A malicious program that uses a trigger to awaken the malicious code.

logic bomb

200

 This occurs when three or more database elements occur together in a significant way

Data clusters

300

During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"

Ideate

300

How many inputs and outputs does a NOT logic circuit have?

1 input 1 output

300

The system that translates domain names to IP addresses is know as?

DNS

300

What type of malware is used to collect your browsing habits, keystrokes, usernames or passwords.

spyware

300

private company networks that allow employees to easily access, share, and publish information using Internet Software

Intranets

400

Design Thinking is sometimes visualized as a linear process, but it is actually:

Interactive

400

With 8 bits you can represent how many possible values?

256

400

A group of computers and servers that are connected to each other is called ?

Internet

400

The word malware stands for __________ software.

malicious

400

Two critical steps are required to make sure that data can be accessed by authorized users and no one else.

authentication and authorization

500

When using All stages of the DS process what is the last step?

Reflection

500

How does a floppy disk store and transmit information?

uses magnetic polarity (north, south) to convey binary information

500
  • a system of one or more computers and associated software with common storage. ADP system, ADPS, automatic data processing system is know as?

Computing System

500

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?

phishing

500

The process by which individuals attend to, organize, interpret, and retain information from        their environments is ­­­­­­­­­­­_____________________

perception

M
e
n
u