Intro to Information Science and Cyber Final exam review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/14

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

15 Terms

1
New cards

The attribute used to configure a hyperlink reference

Href

2
New cards

Element used to specify a hyperlink

anchor <a>

3
New cards

Define operationally attuned

Applying what one knows about how a system or device works

4
New cards

Define generalize

Process to recognize the common idea in two or more situations

5
New cards

The first widely used Web browser was?

Mosaic

6
New cards

A block of code that can be executed multiple times when called

Function

7
New cards

Variables inside of functions are referred to as

Local variables

8
New cards

Referred ot as a type of shift cipher

Caesar Cipher

9
New cards

CIA refers to

Confidentiality, Integrity, and Availability

10
New cards

Symmetric Key

The encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication

11
New cards

Public key

The encryption key is published for anyone to use and encrypt messages. However only the receiving party had access to the decryption key that enables messages to be read.

12
New cards

Confidentiality

The security principle that co nitrous access to information

13
New cards

Integrity

Refers to protecting information from being modified by unauthorized parties.

14
New cards

Availability

Refers to ensuring that authorized parties are able to access the information when needed.

15
New cards

Binary

1,2,4,8,16,32,64,128