Design thinking
Physical Computing
The Internet
Ethical Computing
Data Management
100

Design Thinking is sometimes visualized as a linear process, but it is actually

Interactive

100

There are _____ bits in one byte.

8

100

Who created the internet?

Vint Cerf and Bob Kahn

100

Software that attaches itself to another file and when the file is opened, it runs and causes damage.

Virus

100

_________is the process of discovering unknown patterns and relationships in large amounts of data.

Data mining

200

During which Design Thinking stage would you want users to try out your solutions for themselves?

Test

200

Convert Binary to Decimal:  11111111

255

200

A group of computers and servers that are connected to each other is called ?

Internet

200

Collects information about you, without your knowledge or consent.

Spyware

200

___occurs when three or more database elements occur together in a significant way

Data clusters

300

During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"

Ideate

300

A computer language that is written in binary codes only is

machine language

300

a system of one or more computers and associated software with common storage. ADP system, ADPS, automatic data processing system is know as?

 

Computing System

300

A malicious program that uses a trigger to awaken the malicious code.

logic bomb

300

A system that requires employees to scan their thumbprints as they start work is called

biometrics

400

When thinking about the 7 step in the DS process, what is the last step?

Reflect

400

How does a floppy disk store and transmit information?

uses magnetic polarity (north, south) to convey binary information

400

When a hacker changes the domain name, and creates a fake web address it is called?

DNS spoofing

400

The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?

phishing

400

private company networks that allow employees to easily access, share, and publish information using Internet Software

Intranets

500

Design Thinking starts with...

Notice

500

What type of circuit works with electrical signals that represent zeros and ones?

digital circuit

500

The system that translates domain names to IP addresses is know as?

DNS

500

The responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet is the definition of:

cyber safety

500

Because of __________, people exposed to the same information will often disagree about what they saw or heard.

defensive biases