Design Thinking
Physical Computing
The internet
Ethical Computing
Data Management
100

Design Thinking is sometimes visualized as a linear process, but it is actually:

Interactive

100

There are _____ bits in one byte

8

100

Who created the internet?

Vint Cerf and Bob Kahn

100

Software that attaches itself to another file and when the file is opened, it runs and causes damage.

Virus

100

_________is the process of discovering unknown patterns and relationships in large amounts of data.

Data mining

200

During which Design Thinking stage would you want users to try out your solutions for themselves?

Test

200

Convert Binary to Decimal:  11111111

255

200

A group of computers and servers that are connected to each other is called ?

Internet

200

Collects information about you, without your knowledge or consent.

Spyware

200

_______ occurs when three or more database elements occur together in a significant way

Data clusters

300

During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"

ideate

300

How many inputs and outputs does a NOT logic circuit have?

1 input 1 output

300

A set of rules governing the exchange or transmission of data between devices is?

Protocol

300

Malware that carries out malicious operations under the guise of a desired operation such as playing an online game is known as

Trojan horse

300

What percentage of communication is listening?

45%

400

Design Thinking starts with...

empathy and an understanding of human needs

400

With 8 bits you can represent how many possible values?

256

400

The system that translates domain names to IP addresses is know as?

DNS

400

Unsolicited electronic messages, especially advertising is known as:

Spam

400

A system that requires employees to scan their thumbprints as they start work is called

biometrics

500

What are the effects called when you switch from one slide to the next?

transitions

500

How does a floppy disk store and transmit information?

uses magnetic polarity (north, south) to convey binary information

500
  • a system of one or more computers and associated software with common storage. ADP system, ADPS, automatic data processing system is know as?

Computing System

500

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?

phishing

500

private company networks that allow employees to easily access, share, and publish information using Internet Software

Intranet