COS 104 Final Tehran

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/151

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

152 Terms

1
New cards

Spreadsheets

good for storing anything that can be represented in columns and rows.

2
New cards

Cell

The intersection of a column and row (referenced by the column first, then the row (A1, B5))

3
New cards

Cell Range

a contiguous (touching) group of cells denoted as (E11:F15)

4
New cards

Formula/Function

allow for instant updating of data, which is the power of a spreadsheet. (They ALWAYS start with an equals sign in a cell)

5
New cards

Common Functions

○ =SUM()-adds the numerical values of a cell range

6
New cards

○ =MAX()-returns the largest number from a cell range

7
New cards

○ =MIN()- returns the smallest number from a cell range

8
New cards

○ =COUNT()-returns the number of cells containing a number from a cell range

9
New cards

○ =AVERAGE()-returns the mean (average) of a cell range

10
New cards

○ =ABS()-returns the absolute value of a cell range

11
New cards

○ =PRODUCT()-multiplies the numerical values of a cell range

12
New cards

○ =QUOTIENT()- returns the integer portion when two numbers are divided

13
New cards

○ =SQRT()-returns the square root of a positive number

14
New cards

Logical Functions

changes the content of a cell, often depending on a condition.

15
New cards

Condition

a statement that returns either TRUE or FALSE.

16
New cards

Common Conditions

○ =IF(condition, True, False)- assigns different content to a cell depending on

17
New cards

whether a condition is TRUE or FALSE

18
New cards

○ =AND(condition, condition)- returns TRUE only if BOTH conditions are TRUE

19
New cards

○ =OR(condition, condition)- returns TRUE if ANY condition is TRUE

20
New cards

○ =COUNTIF(cellrange, condition)- counts the number of cells in a range that

21
New cards

meet a condition

22
New cards

Sorting

arranging data in an ordered sequence

23
New cards

Crowdsourcing

using a community of web users to help get work done.

24
New cards

E-commerce

the conducting of business on the web.

25
New cards

Examples of E-Commerce

○ Business-to-consumer (B2C): ○ Consumer-to-consumer (C2C): ○ Business-to-business (B2B):

26
New cards

Ergonomics

the science of designing things for easy safe use by people.

27
New cards

Intellectual Property

creation/product of the human mind

28
New cards

Copyright

grants the creator/owner of an original work exclusive rights to use or authorize use of the work.

29
New cards

True

True/False: Copyrights are automatically granted

30
New cards

True

True/False: Copyrights last of life of creator +70 years

31
New cards

False

True/False: animals and robots can be granted copyrights

32
New cards

Fair Use

allows for the use of copyrighted material without receiving permission.

33
New cards

Piracy

the unauthorized copy, distribution, or sale of a copyrighted work, such as a computer program or music.

34
New cards

■ Purpose and Character

35
New cards

■ Nature of the Work

36
New cards

■ How Much is Used

37
New cards

■ Commercial Impact

Four Factors of Fair Use

38
New cards

Cybercrime

any crime involving a computer and a network.

39
New cards

Identity Theft

theft of information used to identify an individual, typically used for financial gain.

40
New cards

Fraud

a form of deception, used for financial or personal gain

41
New cards

Data Breach

when secure/classified information is accessed by someone who is unauthorized

42
New cards

Trafficking

conducting deals/trades in an illegal commodity

43
New cards

Extortion

the act of obtaining something by making threats

44
New cards

Malware

malicious software used to infect users devices

45
New cards

Harassment

offensive and repetitive behavior used to intimidate or upset someone

46
New cards

Cyberbullying

the use of technology to threaten, abuse, or dominate others

47
New cards

Digital Divide

refers to the inequality of access to digital technology like computers, smartphones, and the Internet.

48
New cards

Digital Footprint

made up of the data collected about you.

49
New cards

False

True/False: minimizing your digital footprint is not important

50
New cards

Metadata

data stored with a digital file that is not readily seen.

51
New cards

Dark Pattern

a deceptive design trick meant to get you to do something online that you didn't intend to.

52
New cards

Common Dark Patterns

○ Trick questions (don't not opt in?)

53
New cards

○ Sneakinto basket (put something extra in your basket you didn't order)

54
New cards

○ Roachmotel (easy to get in; hard to get out)

55
New cards

○ Confirmshaming (to guilt you into opting in to something)

56
New cards

○ Privacy zuckering (tricked into publicly sharing more than intended)

57
New cards

○ Bait and switch (promise one thing and give you something different)

58
New cards

○ Disguised ads (ads that look like content)uerading as regular content.

59
New cards

Release of Control

Loss of authority over shared online content.

60
New cards

Value of Information

Personal data is often monetized by companies.

61
New cards

True

True/False: You can get denied for a job because of something you posted online.

62
New cards

Security Holes

Daily vulnerabilities allowing unauthorized access.

63
New cards

Antivirus Software

Tools to detect and remove malware.

64
New cards

Virus Signature

Code segment identifying specific malware.

65
New cards

Heuristic Analysis

attempts to identify behavior-based detection of unknown malware signatures

66
New cards

Firewall

Network barrier preventing unauthorized access.

67
New cards

Multi-Factor Authentication

Security requiring multiple verification methods.

68
New cards

Do's and Don'ts of Account Security

○ DO keep copies of your passwords somewhere SAFE ○ DO use a password manager

69
New cards

○ DON'T use an easily guessable password (pet's name, boyfriend's name, your birthdate, etc...)

70
New cards

○ DON'T expect unencrypted communication to ever be private (e.g., email)

71
New cards

○ DON'T use the same password on multiple sites

72
New cards

Internet Scams

using technology to attempt to appeal to greed and fear in order to get what one wants

73
New cards

Phishing

Fraudulent messages (like email or text) seeking sensitive information.

74
New cards

Digital Certificate

Confirms website legitimacy and security.

75
New cards

Certificate Authorities

Entities issuing and managing digital certificates.

76
New cards

Artificial Intelligence (AI)

Computers mimicking human-like cognitive functions.

77
New cards

Machine Learning

Training algorithms to recognize patterns.

78
New cards

Neural Networks

Systems simulating brain neuron functions.

79
New cards

Natural Language Processing

Understanding and analyzing human language.

80
New cards

Artificial Narrow Intelligence (ANI)

AI excelling at specific tasks.

81
New cards

Artificial General Intelligence (AGI)

AI performing at human-like versatility.

82
New cards

Artificial Super Intelligence (ASI)

AI surpassing human intelligence in all areas.

83
New cards

Common AI Uses

○ Face ID

84
New cards

○ Social Media

85
New cards

○ Messaging

86
New cards

○ Google Search

87
New cards

○ Digital Voice Assistants

88
New cards

○ Smart Home Devices

89
New cards

○ Commuting

90
New cards

○ Banking

91
New cards

○ Amazon Recommendations

92
New cards

○ Netflix and other Streaming Platforms

93
New cards

True

True/False: 80% of what you watch on Netflix was recommended to you by their algorithm

94
New cards

ChatGPT

Language model generating responses based on data.

95
New cards

False

True/False: ChatGPT is never wrong

96
New cards

AI Pros

-Automation

97
New cards

-Smart decision making

98
New cards

-medical advancement

99
New cards

-research and data analysis

100
New cards

-performing repetitive tasks