1/96
Flashcards based on lecture notes from Weeks 2-16.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What type of content is typically NOT available from search engines?
Deep web content, including paywalled, private, or database content.
How do search engines index information?
Through web crawlers that scan and store pages.
What is the function of the AND boolean operator?
Narrows search results (e.g., dogs AND cats).
What is the function of the OR boolean operator?
Broadens search results (e.g., dogs OR cats).
What is the function of the NOT boolean operator?
Excludes specific terms from search results (e.g., dogs NOT cats).
What is the function of the () boolean operator?
Groups search terms (e.g., (cats OR dogs) AND training).
What is the function of the "" boolean operator?
Searches for an exact phrase (e.g., "climate change").
Give an example of a Google search limiter.
Currency, region, last update, site search (e.g., site:.gov)
Give an example of an EBSCOhost limiter.
TX (Text), AU (Author), TI (Title), SU (Subject Heading)
Name one issue affecting search reliability?
Outdated, biased, inaccurate, or non-credible sources.
Name the three learning styles.
Visual, auditory, kinesthetic.
Give an ARCS example for attention.
Interactive video.
Give an ARCS example for relevance.
Real-world use.
Give an ARCS example for confidence.
Low-stakes quizzes.
Give an ARCS example for satisfaction.
Points or badges.
Name the eight intelligences.
Linguistic, logical-mathematical, musical, bodily-kinesthetic, spatial, interpersonal, intrapersonal, naturalist.
What does gamification mean?
Game elements in learning (points, levels).
What is a packet?
Unit of data in networking.
What is TCP?
Transmission Control Protocol; checks for errors.
What is IP?
Internet Protocol; addresses data.
What is TTL?
Time To Live; limits lifespan of a packet.
What is a router?
Device that directs packets in a network.
What are the differences between dedicated line and packet communication?
Dedicated line is a continuous connection while packet communication is flexible and more efficient.
Can packets take different paths?
Yes, for efficiency and redundancy.
What should synchronous tools use?
Synchronous tools need fast, stable protocols; asynchronous tools can use slower ones.
How is Decimal converted to Binary?
Repeated division by 2.
How is Binary converted to Decimal?
Multiply each bit by 2^place, sum total.
What is the sum of 1+1 in binary addition?
10 (carry the 1).
How is Hexadecimal converted to Decimal?
Multiply each hex digit by 16^place.
How is Decimal converted to Hexadecimal?
Divide by 16, record remainders.
Why is binary used in computers?
Hardware (on/off).
Why is hex used in computers?
Shorthand for binary (more compact).
What is hardware?
Physical parts (CPU, RAM).
What is software?
Programs and data.
What is the motherboard?
Main circuit board connecting all components.
What is the CPU?
Brain of the computer.
What is RAM?
Temporary memory, volatile.
What is the function of a Hard Drive/SSD?
Permanent storage.
Give an example of an input device.
Keyboard, mouse, scanner.
Give an example of an output device.
Monitor, printer.
Give an example of ports and connectors.
USB, HDMI, Ethernet.
Give an example of system software.
Operating system (Windows, macOS).
Give an example of application software.
Word processors, games, etc.
Name on OS role.
Manage hardware, run apps, file management, user interface.
What is GUI?
Graphical User Interface: Visual interaction (e.g., Windows).
What is CLI?
Command Line Interface: Text commands (e.g., Terminal).
What is LAN?
Local Area Network: Small area (home, school).
What is WAN?
Wide Area Network: Large area (internet).
What is ISP?
Internet Service Provider: Gives internet access.
What is IP address?
Unique device identifier on a network.
What is DNS?
Domain Name System: Converts domain names to IPs.
What is Wi-Fi?
Wireless networking.
What is Ethernet?
Wired networking.
What is Cloud Computing?
Accessing data/programs over the internet.
Give a pro of cloud computing.
Access anywhere, automatic updates, backups.
Give a con of cloud computing.
Needs internet, potential privacy issues.
Give an example of cloud storage services.
Google Drive, Dropbox, iCloud.
Give an example of a word processor.
Google Docs, Microsoft Word.
Give an example of a spreadsheet.
Google Sheets, Excel.
Give an example of a presentation application.
Google Slides, PowerPoint.
Give an example of collaboration tools.
Comments, real-time editing, sharing.
Give an example of word processor features.
Formatting, formulas, charts, transitions.
What is a cell in spreadsheet?
Intersection of row and column (e.g., A1).
Give an example of a formula in a spreadsheet.
=A1+A2
Give an example of a function in a spreadsheet.
=SUM(A1:A5), =AVERAGE(B1:B5)
What are relative versus absolute references?
A1 vs $A$1
What are chart types used for?
Visualizing data.
What is a database?
Organized collection of data.
What is a table in a database?
Rows and columns in a database.
What is a record in a database?
A single row.
What is a field in a database?
A column (specific attribute).
What is a Primary Key used for?
Uniquely identifies a record.
What is a Query?
Request for specific data.
Give an example of database use.
School records, inventory, banking.
What is Data Analysis?
Interpreting data to find trends.
Name a tool used for Data Analysis?
Excel, Google Sheets, Tableau.
What is a Pie chart used for?
Parts of a whole.
What is a line chart used for?
Trends.
What is a bar chart used for?
Comparisons.
Name one of the best practices for charts.
Label clearly, choose correct type, avoid clutter.
Give an example of malware.
Viruses, spyware, ransomware.
What is Phishing?
Fraudulent emails/websites.
What is Two-Factor Authentication (2FA)?
Extra login security.
What are the properties of strong passwords?
Long, mix of characters.
What is Encryption?
Protects data during transmission.
What is the role of Firewalls & Antivirus software?
Prevent intrusions and scan for threats.
What is a Digital Footprint?
Everything you do online.
What is ethical use?
Follow copyright, don’t plagiarize, respect others.
What are privacy settings?
Control what is shared.
Give an example of data protection laws.
GDPR, HIPAA, etc.
What is AI?
Machines that simulate thinking.
What is IoT?
Smart devices (e.g., Alexa, smart fridge).
Give an example of emerging technologies.
Augmented and virtual reality.
What is Blockchain?
Secure digital record system (used in crypto).
What is 3D Printing?
Layered printing to create objects.
Which skills should be integrated?
Combine searching, spreadsheets, presentations.
Why critical thinking is important?
Evaluate tech impact on society.