Design Thinking is sometimes visualized as a linear process, but it is actually:
Interactive
There are _____ bits in one byte
8
Who created the internet?
Vint Cerf and Bob Kahn
Software that attaches itself to another file and when the file is opened, it runs and causes damage.
Virus
_________is the process of discovering unknown patterns and relationships in large amounts of data.
Data mining
During which Design Thinking stage would you want users to try out your solutions for themselves?
Test
Convert Binary to Decimal: 11111111
255
A group of computers and servers that are connected to each other is called ?
Internet
Collects information about you, without your knowledge or consent.
Spyware
_______ occurs when three or more database elements occur together in a significant way
Data clusters
During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"
ideate
How many inputs and outputs does a NOT logic circuit have?
1 input 1 output
A set of rules governing the exchange or transmission of data between devices is?
Protocol
Malware that carries out malicious operations under the guise of a desired operation such as playing an online game is known as
Trojan horse
What percentage of communication is listening?
45%
Design Thinking starts with...
empathy and an understanding of human needs
With 8 bits you can represent how many possible values?
256
The system that translates domain names to IP addresses is know as?
DNS
Unsolicited electronic messages, especially advertising is known as:
Spam
A system that requires employees to scan their thumbprints as they start work is called
biometrics
What are the effects called when you switch from one slide to the next?
transitions
How does a floppy disk store and transmit information?
uses magnetic polarity (north, south) to convey binary information
Computing System
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
phishing
private company networks that allow employees to easily access, share, and publish information using Internet Software
Intranet