What is the Internet?
a worldwide system of computer networks
What is digital information?
any data that is stored, transferred, read, and used by networks, computers, and other machines
What factors should be considered when designing an app's user interface (UI) and user experience (UX)? One sentence?
When designing the UI and UX of an app, factors such as ease of use, visual aesthetics, intuitive navigation, responsiveness, and accessibility should be considered.
What is cybersecurity?
The state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this.
What is a network?
a group of interconnected nodes or computing devices that exchange data and resources with each other.
What is an Internet Service Provider (ISP)?
a company that provides subscribers with access to the internet.
What is the term for a collection of related HTML documents located on a host computer on the Internet?
a.) Website
b.) Web link
c.) Webpage
d.) Web browser
a.) website
What are the key components and features of a typical app?
User Experience
User Interface
Functionality
Performance
Security
What are the common cyberattacks?
What is open source?
Open source software is code that is designed to be publicly accessible—anyone can see, modify, and distribute the code as they see fit
What is Internet Protocol (IP)?
A.) The protocol by which data is turned into blocks of data known as packets
B.) The protocol by which data is sent from one computer to another on the Internet
C.) The protocol by which analog data is turned into digital data
D.) The protocol by which digital data is turned into analog data
B.) The protocol by which data is sent from one computer to another on the Internet
What is the term for a collection of related HTML documents located on a host computer on the Internet?
A.)Transmission Control Protocol/Internet Protocol (TCP/IP)
B.)File Transfer Protocol (FTP)
C.)An Internet Service Provider (ISP)
D.)The World Wide Web
A.)Transmission Control Protocol/Internet Protocol (TCP/IP)
What are the main steps involved in the app development lifecycle?
Plan everything out, set it all up, make sure it works, get feedback
Are cybersecurity breaches caused by human error or computer error?
Human error
What is a byte?
A group of binary digits or bits (usually eight) operated on as a unit.
How many bits does the Internet Protocol version 6 (IPv6) address format use
a.) 64
b.) 256
c.) 128
d.) 32
c.) 128
What are examples of digital information?
software, digital images, digital video, video games, web pages and websites, social media, digital data and databases, digital audio such as MP3, electronic documents and electronic books.
What is the difference between sequential and event-driven programs?
In sequential programming, commands run in the order they are written. In event-driven programming, some commands run in response to user interactions or other events.
What is a firewall?
a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies.
What is ASCII?
Abbreviated from American Standard Code for Information Interchange, it is a character encoding standard for electronic communication.
In an IP address such as 192.241.187.8, the last number in the address (on the far right) identifies:
a.) The gateway to which a computer is connected.
b.) the router to which a computer is connected.
c.)the largest network to which a computer is connected.
d.)a specific computer.
d.)a specific computer.
How is digital information stored and transmitted?
Digital information is stored on electronic media in many different recording formats. With electronic media, the data and the recording media are sometimes called "software" despite the more common use of the word to describe computer software.
What are some best practices for maintaining and improving apps over time?
Ask others for opinions and see how their suggestions would help you with your app.
What is malware?
Hardware, firmware, or software that is intentionally included or inserted in a system for a harmful purpose.
What is a bit?
is the minimum unit of binary information stored in a computer system. A bit can have only two states, on or off.