SecondTest Practice definitions (copy)

studied byStudied by 4 people
0.0(0)
Get a hint
Hint

 What is RGB, and how is it used to create colors? 

1 / 26

flashcard set

Earn XP

Description and Tags

heres a set of flashcards for the most possible that could appear on the test.

27 Terms

1

 What is RGB, and how is it used to create colors? 

RGB stands for Red, Green, and Blue.  In this color model, these 3 primary colors can be mixed to form  any one of 256 ^ 3 colors.  Typically, a color created by the RGB color model would look something like  this:  A23F49, where the first 2 "digits" represent the amount of Red, the next 2 "digits" indicate the  amount of Green, and the last 2 give the amount of Blue.  The numbers are in Hexadecimal, so that the  digits are chosen from 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. 

New cards
2

2.  What is a BITMAP, and what are its limitations (and, by extension, the limitations of any digital image)? 

A BITMAP is an image formed by a map of bits.  The image is made up of pixels, and each pixel is   assigned a color, so that the image is a rectangular collection of tiny colored squares (pixels).  there is a limit to the amount of detail that can be stored; if you zoom in  enough, you will see the squares, or pixelated basis for the image. 

New cards
3

What happens when lossy compression is used to store an image? 

Lossy compression means that a trade‐off is being made; the amount of memory used to store the image is reduced,  but some of the detail of the image is being lost.  Once you use lossy compression, you can't go back; the   information that you lose for the image cannot be generated again.  Typically, lossy image compression is so  sophisticated that you can't tell the difference with the naked eye. 

New cards
4

  What is a cookie (as it relates to web sites, not chocolate chips)? 

A cookie is a small file (or value) that a visited website saves in your browser application.  Cookies are  typically designed to indicate that a user has visited a site before, so that when that user revisits the  site, that user is recognized.  This means, in some cases, that the user won't need to log in again, or   that the "look and feel" of the page will be retained from the last visit.

New cards
5

Why is a 4‐digit passcode considered a poor 

level of security?

A four digit passcode only has 10,000 possible

 values (from 0000 to 9999), and is susceptible to a hack. 

New cards
6

When using "free" Wi‐Fi

 (such as that found in a hotel or airport), what is the 

security risk? 

Free Wi‐Fi is not encrypted by the network, 

and so someone else with enough knowledge and expertise can  potentially see other users' online activity 

(when visiting http sites). 

New cards
7

  What is an electronic firewall? 

An electronic firewall is special software that shields users from people attempting to access the network.  It checks that IP addresses (both incoming and outgoing),  along with TCP port numbers, are valid and reliable.  It attempts to filter and block potential security risks. 

New cards
8

What is a clustering algorithm (discussed in Chapter 2 of Blown To Bits) and how is it used? 

A clustering algorithm checks the frequency of connections between points. used to reveal clusters of Enron employees who were  in frequent communication with one another, perhaps forming conspiratorial groups. 

New cards
9

What is an EDR, and what is its purpose when used in a modern car?

An EDR is an event data recorder.  It captures information about speed, braking time, turn signal status,  seat belt status, and much more.  It records this information whenever the car is in use.  It is sometimes  used by insurance companies (or by trial lawyers) wishing to learn or display facts about an accident. 

New cards
10

How could information from electronic tolling be used in a family law case?

Transponders for electronic tolling record time and location for a car equipped with the transponder.  So, if a spouse accuses his or her partner of spending time with someone else, the transponder information  might be able to demonstrate that the spouse's car is often using an offramp/onramp near the third party's  home.  Also, a parent might claim that they are "always home for dinner", but the data collected from the  transponder could indicate that the car is typically on its way home late at night on weekdays. 

New cards
11

What (or who) are the "the two Big Brothers" discussed in Blown To Bits, Chapter 2? 

The two Big Brothers are government and commercial aggregation companies (those that gather and analyze  bulk electronic communication data).  Governments work with (or sometimes compel/obligate) the aggregators  to provide information gleaned from the troves of data they collect. 

New cards
12

 What is the "Internet of Things"? 

The Internet of Things refers to the networking of light switches, refrigerators, doorbells, and other  electronic devices, via the internet.  These modern appliances are equipped with internet connection so that  they may be contacted and controlled remotely through applications.  

New cards
13

How should you properly identify a segment of JavaScript in an html document? 

Typically, you should write your JavaScript code in a separate file, and link it to the appropriate html  file.  If you do write your JavaScript code in an html file, this code should be placed within the script  tags, like this:   

New cards
14

name 3 file formats for audio files

mp3, aac, wav

New cards
15

what is a graphic

its a bunch of pixels horizontally and vertically that form a grid. each dot is represented by a single bit

New cards
16

name 3 file formats for image files and how they are used

bmp- simple images; gif-low quality icons, memes(animated); jpeg-24 bit color, lossly compressed, better fidelity images, png-high quality, resizablr graphics with 24 bit color

New cards
17

name 3 formats for video files

avi-windows;mp4-universal;quicktime-macs

New cards
18

what is meta data

additional data that applications can see that tell them how to display the image to be more immersive like vr headset

New cards
19

what happens when a file is deleted

computer forgets the location of the data, physical data isnt deleted. with enough tools you can recover the data

New cards
20

what are some popular passwords

passwords, 123456

New cards
21

why is it bad to email your password directly

if someone knows your email anyone can find any password thats sent to the email

New cards
22

what is 2 factor authentication

having a password and another means of authentication thats fundamently different. usually something you have

New cards
23

what is a vpn

virtual private network that encrypts your connection. it encyrypts by scrambling you data

New cards
24

how many keys does public key crytography use

2 keys, one public and one private. public encrypts and private decrypts

New cards
25

what is phishing

sending emails or other messages pretendig to be from reputable companies in order to make people to reveal personal information

New cards
26

what is malware

malicious software that can do anything like erase hard drives etc

New cards
27

what is ransom ware

software that ransoms your data and gives back once it gets something

New cards

Explore top notes

note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 14 people
... ago
5.0(1)
note Note
studied byStudied by 79 people
... ago
5.0(4)
note Note
studied byStudied by 2 people
... ago
4.0(1)
note Note
studied byStudied by 73 people
... ago
5.0(1)
note Note
studied byStudied by 27 people
... ago
4.5(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 32 people
... ago
4.5(2)

Explore top flashcards

flashcards Flashcard (335)
studied byStudied by 33 people
... ago
5.0(1)
flashcards Flashcard (115)
studied byStudied by 14 people
... ago
5.0(1)
flashcards Flashcard (27)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (44)
studied byStudied by 8 people
... ago
5.0(1)
flashcards Flashcard (94)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (75)
studied byStudied by 307 people
... ago
4.5(2)
flashcards Flashcard (172)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (632)
studied byStudied by 70 people
... ago
5.0(1)
robot