Term
|
Definition
precise systematic method used to produce a specified result
it is a general method like a currency
it must be written in computer language |
|
|
Term
5 properties of an algorithm |
|
Definition
input, output, definiteness, effectiveness, finiteness |
|
|
Term
Programming vs natural language |
|
Definition
formal, precise (expresses and algorithm)
human interactions ambiguous |
|
|
Term
|
Definition
an algorithm has been customized to solve specific tasks under specific sets of circumstances expressed in specific languages
EX= change in the us $ |
|
|
Term
color intensity vs color scheme |
|
Definition
represented as a numeric quantity in the range 0-255 (1 byte 8 bits) change intensity by increasing or decreasing the values
Black has no color
White is full color intensity
the smallest is all 0's 0000 0000 largest is 1111 1111
color scheme is mixing intensities |
|
|
Term
computation (use of image processing like photoshop) |
|
Definition
changing values of pixel to change the colors |
|
|
Term
|
Definition
goes from analog to digital
sampling rate and measurement precision determine how accurate the digital form is --> in bits--> numbers--> speakers |
|
|
Term
5 safeguards against hackers |
|
Definition
backing up is best because could have natural disasters
1. disable file and printer sharing with internet
2. dont leave computer on or connect to web
3. install firewall
4. access control/passwords
5. biometrics- fingerprints |
|
|
Term
|
Definition
attackers that send phishing to try and get personal information and cause identity theft |
|
|
Term
Computer security risks vs computer crime |
|
Definition
any event or action that could cause loss of or damage to computer hardware or information
an illegal act involving a computer (this is booming because of unemployed) |
|
|
Term
how to stop Zeus (trojan horse) |
|
Definition
microsoft seizes server in zeus cyberspace --> fight password stealer and damage botnet to help victims regain control of computers |
|
|
Term
|
Definition
program that infects another program by embedding a copy of itself virus copies itself when infected program runs and infects other programs |
|
|
Term
|
Definition
is a type of virus--- hides inside another program (backdoor access= zeus) |
|
|
Term
|
Definition
independent program that copies itself across network connections |
|
|
Term
|
Definition
1. email attachments
2. spoofed links
3. social engineering (new)
4. p2p file sharing
5. |
|
|
Term
symptoms of computer security risks |
|
Definition
unusual message on screen, random sound, less memory space, corrupted file, program disappears |
|
|
Term
guidelines for appropriate internet behavior |
|
Definition
act as if in person
explain self completely and use emoticons
sleep on emotional emails
include question with answer
use automated reply
answer in reverse
get sender permission before forwarding |
|
|
Term
|
Definition
using one for all is risky make slight changes
they are scrambled or encrypted and are stored so system administrator usually cant tell you your password if you forget
usually 8 characters
|
|
|
Term
|
Definition
laws have not ended it but filters have helped
use the co's opt out option
|
|
|
Term
|
Definition
special category of spam specifically created to defraud or commit id theft
EX= nigerian widow and spanish lottery (if too good to be true it is) |
|
|
Term
privacy
(where do threats come from) |
|
Definition
right of people to choose freely under what circumstances and to what extent they will reveal themselves, their attitude, their behavior to others
the government (spying) and business (surveillance) |
|
|
Term
voluntary disclosure of privacy |
|
Definition
choosing to reveal info in return for benefits (like doctors)
the US uses this |
|
|
Term
|
Definition
in 1980--- organization of economic cooperation and development
in europe |
|
|
Term
8 pt list of privacy principals for OECD |
|
Definition
1. quality (up to date)
2. purpose (clearly stated)
3. limited collection (limits with consent)
4. use limitation (no other purposes)
5. security (protect)
6. openness
7. participation
8. accountability (data controller accountable) |
|
|
Term
cookies
(whats 1st and 2nd field) |
|
Definition
small text file containing seven fields of info uniquely identifying customer (stored in hard drive)
website can only read data from own cookie
1st= server
2nd= id of web session
ex: keep tract of shopping cart |
|
|
Term
7 tips to find good information |
|
Definition
1. stick to specialist dont start with general search engine
2. get information prescription from doctor
3. consider the source (look at about)
4. check for timeliness (when was it updated)
5. seek out seal of approval
6. follow the money
7. guard your privacy disallow sharing |
|
|
Term
advantage of computers in education |
|
Definition
self paced instruction, unique instructional experience with simulations models and real life situations
digital divide(those who have access to technology with ability to use it versus those who dont) |
|
|
Term
computers look like they think because they are fast
but they have to be programmed to work
alan m turing |
|
Definition
turing test (makes computer look more intelligence but the computer doesnt know syntax
|
|
|
Term
|
Definition
to exhibit intelligence computer has to understand complex situation and reason well enough to act on its understanding
* extent that creativity is algorithmic a computer can be creative |
|
|
Term
|
Definition
all computer have same power--- there is a difference with new and old SOFTWARE because the speed and operating system are the difference
sometimes there is no algorithm |
|
|
Term
86% doubt reliability
what is good? |
|
Definition
webmd is .com but still good
.gov, .edu, .org |
|
|
Term
computers in health science |
|
Definition
patient records, monitor vital signs, perform surgery,
at mercy first hospital (in 08) who started robots with state of the art equipment for computer technology and surgery) |
|
|
Term
|
Definition
FAQ to support customer
get immediate feedback
compare shopping
24 hour access to millions of things |
|
|
Term
|
Definition
adds shipping costs
returns are difficult
shipping time is longer
cant interact with product first
|
|
|
Term
top reasons to shop online |
|
Definition
shop during off hours
find better places
saves time and trips
no sale pressures
|
|
|
Term
look for and read the privacy policy
(3) |
|
Definition
how is information collected
how will it be used
who will have access to it |
|
|