When using all the step in the DT process. What is the very first step?
Notice
There are _____ bits in one byte.
8
Who created the internet?
Vint Cerf and Bob Kahn
Software that attaches itself to another file and when the file is opened, it runs and causes damage is?
Virus
_________is the process of discovering unknown patterns and relationships in large amounts of data.
Data mining
During which Design Thinking stage would you want users to try out your solutions for themselves?
Test
Convert Binary to Decimal: 11111111
255
When a hacker changes the domain name, and creates a fake web address it is called?
DNS spoofing
A malicious program that uses a trigger to awaken the malicious code.
logic bomb
This occurs when three or more database elements occur together in a significant way
Data clusters
During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"
Ideate
How many inputs and outputs does a NOT logic circuit have?
1 input 1 output
The system that translates domain names to IP addresses is know as?
DNS
What type of malware is used to collect your browsing habits, keystrokes, usernames or passwords.
spyware
private company networks that allow employees to easily access, share, and publish information using Internet Software
Intranets
Design Thinking is sometimes visualized as a linear process, but it is actually:
Interactive
With 8 bits you can represent how many possible values?
256
A group of computers and servers that are connected to each other is called ?
Internet
The word malware stands for __________ software.
malicious
Two critical steps are required to make sure that data can be accessed by authorized users and no one else.
authentication and authorization
When using All stages of the DS process what is the last step?
Reflection
How does a floppy disk store and transmit information?
uses magnetic polarity (north, south) to convey binary information
Computing System
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
phishing
The process by which individuals attend to, organize, interpret, and retain information from their environments is _____________________
perception