IT & Informatics Exam Keywords

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Human - Centered Design

The process that ensures that the designs match the needs and capabilities of the people for whom they are intended.

2
New cards

Ethics and Social Responsibility

Responsibility in promoting ethical and socially responsible technological solutions.

3
New cards

Technology as Applied Science

The misconception that all technology solely comes from the application of scientific principles. These technologies were made by accident or didn't have any prior theoretical descriptions (like physics/math) to help guide its development.

4
New cards

Technology as Hardware

They are extraneous imperfections which undermine the efficiency of the machine. Physical hardware alone is not sufficient for there to be technology.

5
New cards

Technology as Rules

A series of steps that accomplish some goal. As society develops, more and more aspects of social life become more systemized in terms of system of rules.

6
New cards

Technology as Systems

In the system approach to technology, the user is inside the technology as designers, owners, administrators, advertisers, and propagandists channel the technology in one direction rather than another, and workers, consumers, and citizens are themselves channeled in one direction or another.

  • The idea is that technology is not neutral or isolated, but is deeply embedded in a broader system of social, economic, and political relationships.

  • Approach - Recognizes that technology doesn't simply function in a vacuum but is shaped by the actions, decisions, and intentions

7
New cards

Lessig's Pathetic Dot

A simple but powerful visual representation of forces that regulate human behavior, often depicted as a dot (representing an individual) influenced by four forces, that are, market, law, norms, and architecture.

<p>A simple but powerful visual representation of forces that regulate human behavior, often depicted as a dot (representing an individual) influenced by four forces, that are, market, law, norms, and architecture.</p>
8
New cards

Market

Any arrangement that allows buyers and sellers to exchange things.

9
New cards

Law

Government regulations that impose penalties or restrictions, and bans certain products or actions with the consequence of penalty.

10
New cards

Norms

Rules and expectations by which a society guides the behavior of its members.

11
New cards

Architecture

The physical or digital structures that shape behavior and focus on the built environment.

12
New cards

Design

Changing some part of the world from its current state to preferred state.

13
New cards

DARPA (The Defense Advanced Research Projects Agency)

Research and development wing of the United States Department of Defense. Initially focused on military technology, aimed to create a communication network that could survive a nuclear attack.

  • They built the ARPANET

14
New cards

ARPANET

The precursor to the Internet, was created to allow multiple computers to communicate by sending small packets of data across a network (packet switching). DARPA created ARPANET.

15
New cards

TCP (Transmission Control) /IP (Internet) Protocols

A set of rules which allow multiple computers to communicate over a network.

16
New cards

Human Protocol

A set of rules/way that describes how humans shows interact.

17
New cards

Traceroute

A diagnostic tool used to trace the path that data travels between nodes. Typically used to identify network problems or inefficient routing practices.

18
New cards

Ping

This command checks if an IP address is reachable or not.

  • This is done by measuring the round-trip time it takes for a message to travel from the source (your computer) to the destination IP address and back

  • Sends a small data packet called an ICMP ECHO REQUEST, a type of Internet Control Message Protocol, if the target is reachable and operational —> then the target device responds with an ICHO Echo Reply

19
New cards

DNS (Domain Name Service)

This is a system that connects website names with their IP addresses.

20
New cards

CERN (The European Organization for Nuclear Research)

Known for its physics equipments and also provides data for online users; Tim Bernes-Lee came from this organization to later create the World Wide Web

21
New cards

PageRank

Algorithm developed by Google that ranks web pages based on the number of connections to that particular web page.

  • Link to your website counts as a vote to your website → (the more hyperlinks, the better —> because it means your website is probably more important or valuable than the others (links from high-ranking pages like official university websites and trusted news outlets get votes)

  • Simulates a random web surfer who clicks on links randomly. The likelihood of a user landing on a particular page determines its PageRank score.

22
New cards

Dunbar's Number

The idea that a person can only have a limited number of close relationships, probably around 150.

23
New cards

Degrees of Connection

This is the number of direct relationships that separates two individuals.

24
New cards

Explicit Knowledge

Type of knowledge that is easily communicated and available to everyone.

25
New cards

Implicit Knowledge

Type of knowledge that a person cannot consciously recall or explain but that nevertheless affects the person's thinking or behavior.

26
New cards

Concatenation

Joins together two or more strings end-to-end to make a new string.

<p>Joins together two or more strings end-to-end to make a new string.</p>
27
New cards

Casting

Converts one data type to another.

  • Often necessary when you need to perform operations on differently types of data that aren't automatically compatible or when you want to explicitly convert between types for certain operations

28
New cards

CIA triad: Protecting Confidentiality

Protecting authorized restrictions on information access and disclosure.

29
New cards

CIA triad: Protecting Integrity

Protecting against improper modification.

30
New cards

CIA triad: Protecting Availability

Protection that ensures timely access to all the information required.

31
New cards

DoS - Denial of Service

An attack on a computer resource that prevents it from performing its normal operations, usually by overwhelming it with large numbers of requests in an effort to monopolize its resources.

32
New cards

Non - repudiation (Proof)

It is an assurance that the sender of information is provided with proof of delivery and the receiver is provided with proof of the sender's identity.

33
New cards

Social Engineering

Techniques that trick a person into disclosing confidential information.

34
New cards

Phishing

Deceiving users to click on malicious links through emails, phone calls, or even messages.

35
New cards

Pretexting

A form of social engineering in which one individual lies to obtain confidential data about another individual

36
New cards

Baiting

Getting a target user to perform an action by offering something tempting.

37
New cards

Tailgating

When an unauthorized individual enters a restricted-access building by following an authorized user.

38
New cards

Dumpster Diving

The act of digging through trash receptacles to find information that can be useful in an attack (discarded materials —> printed documents, old hardware, sticky notes, and receipts and invoices)

39
New cards

Penetration Testing

Involves traversing vulnerabilities and traversing the network using special tools to see if there is a likelihood of attack or weakness to attack.

40
New cards

Multi - Factor Authentication (MFA)

A security process that requires multiple steps to log in to an account.

41
New cards

Trace Data

Footprints you leave behind that you cannot see.

42
New cards

Metadata

Data that provides information about other data.

43
New cards

Fingerprinting

A technique used to track individuals based on unique data points about their devices, browser settings, and online behaviors, much like how physical fingerprints identify individuals uniquely.

44
New cards

National Security Agency (NSA)

Responsible for surveillance, codebreaking, and national security.

45
New cards

Advanced Encryption Standard (AES)

A symmetric encryption standard used by the NSA to secure data.