create an ordered list with 3 items(milk, tea, nuts)?
<ol>
<li>milk</li>
<li>tea</li>
<li>nuts</li>
</ol>
What is the difference between Primary Keys vs Foreign Keys?
Primary Key - a field (or fields) that
uniquely describes each record
Foreign Key - a primary key of one
table that appears in another table
What is the difference between White hat hackers and Black hat hackers?
white: Uncovers computer weaknesses without exploiting them. (Ethical hacking)
black: Computer criminals who exploit a system's weakness for personal gain.
What does PAPA Stand For?
Privacy, Accuracy, Property, Accessibility
What are some key elements of Team synergy?
Trust, Mutual Respect, communication, passion, commitment
Create a 2x2 table in HTML?
<table>
<tr><th>h1</th><th>h2</th></tr>
<tr><td>data1</td><td>data2</td></tr>
</table>
Say we had a database of yachts containing info.
Find the style and name of model that has model_id as 920
SELECT style, name FROM MODEL WHERE model_id=920
what is a bad apple?
What does the CIA Framework stand for?
Rogue employees who steal secrets, install malware, or hold a firm hostage
confidentiality-integrity-availability
What does Privacy Mean? What e=are the three C's of Privacy?
Privacy denotes protection from intrusion and information gathering by others
Choice: right to select the desired level of access to personal information
Consent: the need to provide definitive assent to use of personal information
Control: the right to access one's personal information
What is sustainability
What are the three pillars of sustainability?
implies the creation and maintenance of conditions under which humans and nature exist in a productive harmony to support present and future generations.
Social, Environment, and Economy
If time is less than 10:00, create a "Good morning" greeting, if not, but time is less than 20:00, create a "Good day" greeting, otherwise a "Good evening": with correct JS Syntax
if (time < 10) {
greeting = "Good morning";
} else if (time < 20) {
greeting = "Good day";
} else {
greeting = "Good evening";
}
Recite all Crows Foot Notation when we show an image
What's the difference between public and private key encryption?
Public Key Encryption: A public key is used to encrypt messages and the private key is used to decrypt the messages which provides confidentiality.
Private Key Encryption: A private key is used to encrypt messages and anyone with the public key can decrypt the message. (Used for digital signatures)
What is Accuracy?
What are some examples of Property?
Data quality is important to prevent serious harm to individuals, society and disruptions to organizations
Intellectual Property, Copyright, and Net Neutrality
Define all Pillars
Social: The social aspect of sustainability focuses on balancing the needs of the individual with the needs of the organization
Environment: Occurs when processes, systems and activities reduce the environmental impact of an organizations
Economy: business need to make profit, but their operations should not create social or environmental issues that would harm the long-term success of the company
How do select an id? What is a rule regarding id selectors?
How do select a Class? What is a rule regarding Class selectors?
Name all types of selectors?
ID Selectors:
The id selector uses the id attribute of the HTML element, and is defined with a "#"
e.g:
<p id="para1">This is my paragraph</p>
IMPORTANT: An id value is unique, i.e., it must be associated with one and only ONE element in a webpage
Class Selectors:
The class selector uses the HTML class attribute, and is defined with a "."
<div class="mycenter">This is my text</div>
**Class values do not have to be unique
Types of Selectors:
Universal (*) -
id - #firstname
class - .intro
element - p
combination - div, p
A Professor teaches 1 to many courses. Courses are offered by 0 to many Professors? How can I fix this Many to Many relationship? DRAW IT
Ill show Pic
Ill show answer Pic
Who are the individuals doing security breaches? and define what they do.
Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale.
Cash-out fraudsters: Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods using stolen credit cards or create false accounts.
Describe Stakeholder Theorem and Social Contract Theorem?
1. managers should resolve ethical dilemmas by balancing stakeholder interests (not just stockholder) and without violating the rights of ANY stakeholder.
2. all businesses operate under an unwritten contract with society, in which society allows the company to do business under the condition that its actions benefit society
What is a team charter? How to handle conflict in teams? What is Complementarity?
A team charter is a document outlining team purpose, roles, conduct, and objectives.
Handle conflict by promoting open communication, active listening, clarifying goals, providing constructive feedback, and focusing on solutions.
When forming a team, the ideal is to balance the skills of one team member with the complementary abilities of others.
Start the loop at i = 0. run the loop when i is less than 5. increment i after each loop while updating a text variable describing what the number is and adding a break tag at the end. (JS)
for (let i = 0; i < 5; i++) {
text += "The number is " + i + "<br>";
}
Recently, housing development projects have been springing up all around western
Pennsylvania.
• Affordable Homes Development Co. has several housing projects and are currently
dominating the market:
• These projects started with collectively 100 houses, all of which has been sold – some
above and some below asking price.
• Each of the 100 houses comes in a variety of floor plans with variations on square
footage, number of bedrooms / bathrooms.
• Each house was sold by a local real estate agent who may sell one to many houses
• Each agent works for one partner agency – e.g., Howard Hanna, Caldwell Bnkr etc
Check Answer
Define the following terms:
Virus
Worm
Trojan Horses
Zombies
Malware
Ransomeware
Phishing
MITM(Man-in-the-Middle Attack)
DDOS Attack
SQL Injection Attacks
Virus - A malicious program that spreads from computer to computer and corrupts users' data. It replicates itself and gets attached with another application or file.
Worm - A malicious program that finds a weak spot in a computer on a network and spreads throughout the network
Trojan Horses - A program that purports (claims) to perform a useful function (may be the case) but certainly performs malicious functions. An example could be a Keylogger that records user keystrokes
Zombies - An established a large number of processors, scattered around the Internet, that are under central or time control. Used for DDOS (Distributed Denial of Service) attacks.
Malware - A program or file that is intentionally harmful to a computer, network or server
Ransomeware - Malware that encrypts user's files with demands that a user regain control of their data and/or device
Phishing - A social engineering attack which occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email or instant message.
MITM(Man-in-the-Middle Attack) - By making use of address spoofing and packet forwarding, the attacker can discreetly sniff network packets without disrupting the traffic flow between the two ends.
DDOS Attack - floods a Website with so many requests for service that it slows down or crashes. Objective is to prevent legitimate customers from using Website.
SQL Injection Attacks - Inject malicious SQL code into an application, allowing the
attacker to view or modify a database
What is Digital Divide?
A digital divide is any uneven distribution in the access to, use of, or impact of Information and Communication Technologies between any number of distinct groups such as social, demographic, geographic, and geopolitical groups
What is a Bitcoin?
What is a Blockchain?
How are bitcoin transactions recorded?
How are bitcoin transactions verified?
Bitcoin: a token that serves as decentralized digital currency
Blockchain: a decentralized and distributed digital ledger that is used to record transactions of different types of assets, across many computers, such that the record cannot be altered retrospectively without the alteration of all subsequent blocks and the collusion of the network
Recorded: Transactions are recorded in a distributed, decentralized public ledger, known as a blockchain
Verified: Transactions are verified by network nodes through cryptography