Design Thinking is sometimes visualized as a linear process, but it is actually
Interactive
There are _____ bits in one byte.
8
Who created the internet?
Vint Cerf and Bob Kahn
Software that attaches itself to another file and when the file is opened, it runs and causes damage.
Virus
_________is the process of discovering unknown patterns and relationships in large amounts of data.
Data mining
During which Design Thinking stage would you want users to try out your solutions for themselves?
Test
Convert Binary to Decimal: 11111111
255
A group of computers and servers that are connected to each other is called ?
Internet
Collects information about you, without your knowledge or consent.
Spyware
___occurs when three or more database elements occur together in a significant way
Data clusters
During which stage of the Design Thinking process would you do the most drawing or "whiteboarding?"
Ideate
A computer language that is written in binary codes only is
machine language
a system of one or more computers and associated software with common storage. ADP system, ADPS, automatic data processing system is know as?
Computing System
A malicious program that uses a trigger to awaken the malicious code.
logic bomb
A system that requires employees to scan their thumbprints as they start work is called
biometrics
When thinking about the 7 step in the DS process, what is the last step?
Reflect
How does a floppy disk store and transmit information?
uses magnetic polarity (north, south) to convey binary information
When a hacker changes the domain name, and creates a fake web address it is called?
DNS spoofing
The attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication is known as?
phishing
private company networks that allow employees to easily access, share, and publish information using Internet Software
Intranets
Design Thinking starts with...
Notice
What type of circuit works with electrical signals that represent zeros and ones?
digital circuit
The system that translates domain names to IP addresses is know as?
DNS
The responsible rules and behaviors designed to keep individuals safe whenever connected to the Internet is the definition of:
cyber safety
Because of __________, people exposed to the same information will often disagree about what they saw or heard.
defensive biases