WEB Application
Database
Information Security
Ethical & Social Considerations of IS
Other Topics
100

create an ordered list with 3 items(milk, tea, nuts)?

<ol>

<li>milk</li>

<li>tea</li>

<li>nuts</li>

</ol>

100

What is the difference between Primary Keys vs Foreign Keys?

Primary Key - a field (or fields) that
uniquely describes each record

Foreign Key - a primary key of one
table that appears in another table

100

What is the difference between White hat hackers and Black hat hackers?

white: Uncovers computer weaknesses without exploiting them. (Ethical hacking)

black: Computer criminals who exploit a system's weakness for personal gain.

100

What does PAPA Stand For?

Privacy, Accuracy, Property, Accessibility



100

What are some key elements of Team synergy?

Trust, Mutual Respect, communication, passion, commitment

200

Create a 2x2 table in HTML?

<table>

<tr><th>h1</th><th>h2</th></tr>

<tr><td>data1</td><td>data2</td></tr>

</table>

200

Say we had a database of yachts containing info. 

Find the style and name of model that has model_id as 920

SELECT style, name FROM MODEL WHERE model_id=920



200

what is a bad apple? 

What does the CIA Framework stand for?


Rogue employees who steal secrets, install malware, or hold a firm hostage

confidentiality-integrity-availability

200

What does Privacy Mean? What e=are the three C's of Privacy?

Privacy denotes protection from intrusion and information gathering by others

Choice: right to select the desired level of access to personal information
Consent: the need to provide definitive assent to use of personal information
Control: the right to access one's personal information

200

What is sustainability

What are the three pillars of sustainability?


implies the creation and maintenance of conditions under which humans and nature exist in a productive harmony to support present and future generations.


Social, Environment, and Economy



300

If time is less than 10:00, create a "Good morning" greeting, if not, but time is less than 20:00, create a "Good day" greeting, otherwise a "Good evening": with correct JS Syntax

if (time < 10) {
 greeting = "Good morning";
} else if (time < 20) {
 greeting = "Good day";
} else {
 greeting = "Good evening";
}

300

Recite all Crows Foot Notation when we show an image


300

What's the difference between public and private key encryption?

Public Key Encryption: A public key is used to encrypt messages and the private key is used to decrypt the messages which provides confidentiality.

Private Key Encryption: A private key is used to encrypt messages and anyone with the public key can decrypt the message. (Used for digital signatures)

300

What is Accuracy? 

What are some examples of Property?


Data quality is important to prevent serious harm to individuals, society and disruptions to organizations

Intellectual Property, Copyright, and Net Neutrality





300

Define all Pillars

Social: The social aspect of sustainability focuses on balancing the needs of the individual with the needs of the organization

Environment: Occurs when processes, systems and activities reduce the environmental impact of an organizations

Economy: business need to make profit, but their operations should not create social or environmental issues that would harm the long-term success of the company


400

How do select an id? What is a rule regarding id selectors?

How do select a Class? What is a rule regarding Class selectors?

Name all types of selectors?

ID Selectors:

The id selector uses the id attribute of the HTML element, and is defined with a "#"
e.g:
<p id="para1">This is my paragraph</p>

IMPORTANT: An id value is unique, i.e., it must be associated with one and only ONE element in a webpage


Class Selectors:

The class selector uses the HTML class attribute, and is defined with a "."
<div class="mycenter">This is my text</div>

**Class values do not have to be unique


Types of Selectors:

Universal (*) -
id - #firstname
class - .intro
element - p
combination - div, p

400

A Professor teaches 1 to many courses. Courses are offered by 0 to many Professors? How can I fix this Many to Many relationship? DRAW IT

Ill show Pic

Ill show answer Pic

400

Who are the individuals doing security breaches? and define what they do.

Data harvesters: Cybercriminals who infiltrate systems and collect data for illegal resale.
Cash-out fraudsters: Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods using stolen credit cards or create false accounts.

400

Describe Stakeholder Theorem and Social Contract Theorem?



1. managers should resolve ethical dilemmas by balancing stakeholder interests (not just stockholder) and without violating the rights of ANY stakeholder.

2. all businesses operate under an unwritten contract with society, in which society allows the company to do business under the condition that its actions benefit society





400

What is a team charter? How to handle conflict in teams? What is Complementarity?


A team charter is a document outlining team purpose, roles, conduct, and objectives.


Handle conflict by promoting open communication, active listening, clarifying goals, providing constructive feedback, and focusing on solutions.


When forming a team, the ideal is to balance the skills of one team member with the complementary abilities of others.



500

Start the loop at i = 0. run the loop when i is less than 5. increment i after each loop while updating a text variable describing what the number is and adding a break tag at the end. (JS)

for (let i = 0; i < 5; i++) {
  text += "The number is " + i + "<br>";
}

500

Recently, housing development projects have been springing up all around western

Pennsylvania.

• Affordable Homes Development Co. has several housing projects and are currently

dominating the market:

• These projects started with collectively 100 houses, all of which has been sold – some

above and some below asking price.

• Each of the 100 houses comes in a variety of floor plans with variations on square

footage, number of bedrooms / bathrooms.

• Each house was sold by a local real estate agent who may sell one to many houses

• Each agent works for one partner agency – e.g., Howard Hanna, Caldwell Bnkr etc


Check Answer

500

Define the following terms:

Virus

Worm

Trojan Horses

Zombies

Malware

Ransomeware

Phishing

MITM(Man-in-the-Middle Attack)

DDOS Attack

SQL Injection Attacks

Virus - A malicious program that spreads from computer to computer and corrupts users' data. It replicates itself and gets attached with another application or file.

Worm - A malicious program that finds a weak spot in a computer on a network and spreads throughout the network

Trojan Horses - A program that purports (claims) to perform a useful function (may be the case) but certainly performs malicious functions. An example could be a Keylogger that records user keystrokes

Zombies - An established a large number of processors, scattered around the Internet, that are under central or time control. Used for DDOS (Distributed Denial of Service) attacks.

Malware - A program or file that is intentionally harmful to a computer, network or server

Ransomeware - Malware that encrypts user's files with demands that a user regain control of their data and/or device

Phishing - A social engineering attack which occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email or instant message.

MITM(Man-in-the-Middle Attack) - By making use of address spoofing and packet forwarding, the attacker can discreetly sniff network packets without disrupting the traffic flow between the two ends.

DDOS Attack - floods a Website with so many requests for service that it slows down or crashes. Objective is to prevent legitimate customers from using Website.

SQL Injection Attacks - Inject malicious SQL code into an application, allowing the
attacker to view or modify a database

500

What is Digital Divide?

A digital divide is any uneven distribution in the access to, use of, or impact of Information and Communication Technologies between any number of distinct groups such as social, demographic, geographic, and geopolitical groups



500

What is a Bitcoin?

What is a Blockchain?

How are bitcoin transactions recorded?

How are bitcoin transactions verified?


Bitcoin: a token that serves as decentralized digital currency

Blockchain: a decentralized and distributed digital ledger that is used to record transactions of different types of assets, across many computers, such that the record cannot be altered retrospectively without the alteration of all subsequent blocks and the collusion of the network

Recorded: Transactions are recorded in a distributed, decentralized public ledger, known as a blockchain

Verified: Transactions are verified by network nodes through cryptography






M
e
n
u