best describe the purpose of an IP address?
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
Is a Monitor a Output or input
What is algorithm
a precise sequence of instructions for processes that can be implemented by a programming language and executed by a computer.
Which of the following grocery stores is LEAST likely to receive payment from GroceryGrabbr?
A) A national chain of mid-sized grocery stores.
B) A small, local store.
C) A grocery store in a busy location with lots of customers.
D) A popular, large grocery store.
B) A small, local store.
a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.
Virus
What does URL stand for?
Uniform Resource Locator
What is a Bit?
Bit- A bit is a Binary Digit, the smallest increment of data on a computer. A bit can hold only one of two values 0,1
What is User Interface ?
the inputs and outputs that allow a user to interact with a piece of software. User interfaces can include a variety of forms such as buttons, menus, images, text, and graphics.
Which of the following data must be obtained from the user's smartphone in order for Grocery Grabbr to suggest the order for picking up groceries?
A) the grocery list the user input
B) the location of the grocery store
C) the user's photo album on their smartphone
D) the user's current location
A) the grocery list the user input
information about an individual that identifies, links, relates, or describes them.
Personally Identifiable Information (PII)
What Internet protocols is MOST important in reassembling packets and requesting missing packets to form complete messages?
Transmission Control Protocol (TCP)
What is Byte?
The byte is a unit of digital information that most commonly consists of eight bits
what is Comment?
form of program documentation written into the program to be read by people and which do not affect how a program runs.
Which of the following is the most likely data privacy concern for GroceryGrabbr users?
A) A user's grocery list is stored.
B) A user is able to look up grocery stores stored in a database.
C) A user needs to have their smartphone on while grocery shopping to use the app.
D) A user's location is always being tracked.
D) A user's location is always being tracked.
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
Phising
rules for addressing and sending data across the internet by assigning unique numbers to each connected device
Internet Protocol (IP)
What is Binary Code?
The two symbol of 0’s and 1’s used by computers to represents text, computer processor instructions, or any other idea
What is Sequential Programming?
program statements run in order, from top to bottom.
Which of the following data is necessary for Snappy to display "Happy Moments" for a particular city?
A)The user's current location.
B)Access to photos from the user's device
C)Photos tagged by location that are submitted by any user.
D)Ratings for each photo.
C)Photos tagged by location that are submitted by any user.
a wireless access point that gives unauthorized access to secure networks
Rogue Access Point
chunk of data and its metadata, used to route and reassemble information on the internet
Pakcet
What is ASCII?
Definition
American Standard Code For Information Interchange- The Most common character encoding format
what is Incremental Development Process?
a design approach that breaks the problem into smaller pieces and makes sure each piece works before adding it to the whole.
Which of the following is the most likely data privacy concern for Snappy users?
A) Photos uploaded to the app and tagged with location may contain identifiable information like people's faces or street names.
B) A user's ranking on the leaderboard.
C) Machine Learning used to moderate the comments on "Happiness Moments".
D) Use of emojis to rate "Happiness Moments".
Photos uploaded to the app and tagged with location may contain identifiable information like people's faces or street names.
Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.
Freeware