SecondTest Practice definitions (copy)

0.0(0)
Studied by 4 people
0%Big Idea 2 Mastery
0%Exam Mastery
Build your Mastery score
multiple choiceMultiple Choice
call kaiCall Kai
Supplemental Materials
Card Sorting

1/26

flashcard set

Earn XP

Description and Tags

heres a set of flashcards for the most possible that could appear on the test.

Last updated 9:30 PM on 10/12/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

27 Terms

1
New cards

Ā WhatĀ isĀ RGB,Ā andĀ howĀ isĀ itĀ usedĀ toĀ createĀ colors?Ā 

RGBĀ standsĀ forĀ Red,Ā Green,Ā andĀ Blue.Ā Ā InĀ thisĀ colorĀ model,Ā theseĀ 3Ā primaryĀ colorsĀ canĀ beĀ mixedĀ toĀ formĀ  anyĀ oneĀ ofĀ 256Ā ^Ā 3Ā colors.Ā Ā Typically,Ā aĀ colorĀ createdĀ byĀ theĀ RGBĀ colorĀ modelĀ wouldĀ lookĀ somethingĀ likeĀ  this:Ā Ā A23F49,Ā whereĀ theĀ firstĀ 2Ā "digits"Ā representĀ theĀ amountĀ ofĀ Red,Ā theĀ nextĀ 2Ā "digits"Ā indicateĀ theĀ  amountĀ ofĀ Green,Ā andĀ theĀ lastĀ 2Ā giveĀ theĀ amountĀ ofĀ Blue.Ā Ā TheĀ numbersĀ areĀ inĀ Hexadecimal,Ā soĀ thatĀ theĀ  digitsĀ areĀ chosenĀ fromĀ 0,Ā 1,Ā 2,Ā 3,Ā 4,Ā 5,Ā 6,Ā 7,Ā 8,Ā 9,Ā A,Ā B,Ā C,Ā D,Ā E,Ā andĀ F.Ā 

2
New cards

2.Ā Ā WhatĀ isĀ aĀ BITMAP,Ā andĀ whatĀ areĀ itsĀ limitationsĀ (and,Ā byĀ extension,Ā theĀ limitationsĀ ofĀ anyĀ digitalĀ image)?Ā 

AĀ BITMAPĀ isĀ anĀ imageĀ formedĀ byĀ aĀ mapĀ ofĀ bits.Ā Ā TheĀ imageĀ isĀ madeĀ upĀ ofĀ pixels,Ā andĀ eachĀ pixelĀ isĀ Ā  assignedĀ aĀ color,Ā soĀ thatĀ theĀ imageĀ isĀ aĀ rectangularĀ collectionĀ ofĀ tinyĀ coloredĀ squaresĀ (pixels).Ā Ā thereĀ isĀ aĀ limitĀ toĀ theĀ amountĀ ofĀ detailĀ thatĀ canĀ beĀ stored;Ā ifĀ youĀ zoomĀ inĀ  enough,Ā youĀ willĀ seeĀ theĀ squares,Ā orĀ pixelatedĀ basisĀ forĀ theĀ image.Ā 

3
New cards

WhatĀ happensĀ whenĀ lossyĀ compressionĀ isĀ usedĀ toĀ storeĀ anĀ image?Ā 

LossyĀ compressionĀ meansĀ thatĀ aĀ trade‐offĀ isĀ beingĀ made;Ā theĀ amountĀ ofĀ memoryĀ usedĀ toĀ storeĀ theĀ imageĀ isĀ reduced,Ā  butĀ someĀ ofĀ theĀ detailĀ ofĀ theĀ imageĀ isĀ beingĀ lost.Ā Ā OnceĀ youĀ useĀ lossyĀ compression,Ā youĀ can'tĀ goĀ back;Ā theĀ Ā  informationĀ thatĀ youĀ loseĀ forĀ theĀ imageĀ cannotĀ beĀ generatedĀ again.Ā Ā Typically,Ā lossyĀ imageĀ compressionĀ isĀ soĀ  sophisticatedĀ thatĀ youĀ can'tĀ tellĀ theĀ differenceĀ withĀ theĀ nakedĀ eye.Ā 

4
New cards

Ā Ā WhatĀ isĀ aĀ cookieĀ (asĀ itĀ relatesĀ toĀ webĀ sites,Ā notĀ chocolateĀ chips)?Ā 

AĀ cookieĀ isĀ aĀ smallĀ fileĀ (orĀ value)Ā thatĀ aĀ visitedĀ websiteĀ savesĀ inĀ yourĀ browserĀ application.Ā Ā CookiesĀ areĀ  typicallyĀ designedĀ toĀ indicateĀ thatĀ aĀ userĀ hasĀ visitedĀ aĀ siteĀ before,Ā soĀ thatĀ whenĀ thatĀ userĀ revisitsĀ theĀ  site,Ā thatĀ userĀ isĀ recognized.Ā Ā ThisĀ means,Ā inĀ someĀ cases,Ā thatĀ theĀ userĀ won'tĀ needĀ toĀ logĀ inĀ again,Ā orĀ Ā  thatĀ theĀ "lookĀ andĀ feel"Ā ofĀ theĀ pageĀ willĀ beĀ retainedĀ fromĀ theĀ lastĀ visit.

5
New cards

WhyĀ isĀ aĀ 4‐digitĀ passcodeĀ consideredĀ aĀ poorĀ 

levelĀ ofĀ security?

AĀ four digitĀ passcodeĀ onlyĀ hasĀ 10,000Ā possible

Ā valuesĀ (fromĀ 0000Ā toĀ 9999),Ā andĀ isĀ susceptibleĀ toĀ aĀ hack.Ā 

6
New cards

WhenĀ usingĀ "free"Ā Wi‐Fi

Ā (suchĀ asĀ thatĀ foundĀ inĀ aĀ hotelĀ orĀ airport),Ā whatĀ isĀ theĀ 

securityĀ risk?Ā 

FreeĀ Wi‐FiĀ isĀ notĀ encryptedĀ byĀ theĀ network,Ā 

andĀ soĀ someoneĀ elseĀ withĀ enoughĀ knowledgeĀ andĀ expertiseĀ canĀ  potentiallyĀ seeĀ otherĀ users'Ā onlineĀ activityĀ 

(whenĀ visitingĀ httpĀ sites).Ā 

7
New cards

Ā Ā WhatĀ isĀ anĀ electronicĀ firewall?Ā 

AnĀ electronicĀ firewallĀ isĀ specialĀ softwareĀ thatĀ shieldsĀ users from peopleĀ attemptingĀ toĀ accessĀ theĀ network.Ā Ā ItĀ checksĀ thatĀ IPĀ addressesĀ (bothĀ incomingĀ andĀ outgoing),Ā  alongĀ withĀ TCPĀ portĀ numbers,Ā areĀ validĀ andĀ reliable.Ā Ā ItĀ attemptsĀ toĀ filterĀ andĀ blockĀ potentialĀ securityĀ risks.Ā 

8
New cards

WhatĀ isĀ aĀ clusteringĀ algorithmĀ (discussedĀ inĀ ChapterĀ 2Ā ofĀ BlownĀ ToĀ Bits)Ā andĀ howĀ isĀ itĀ used?Ā 

AĀ clusteringĀ algorithmĀ checksĀ theĀ frequencyĀ ofĀ connectionsĀ betweenĀ points.Ā usedĀ toĀ revealĀ clustersĀ ofĀ EnronĀ employeesĀ whoĀ wereĀ  inĀ frequentĀ communicationĀ withĀ oneĀ another,Ā perhapsĀ formingĀ conspiratorialĀ groups.Ā 

9
New cards

WhatĀ isĀ anĀ EDR,Ā andĀ whatĀ isĀ itsĀ purposeĀ whenĀ usedĀ inĀ aĀ modernĀ car?

AnĀ EDRĀ isĀ anĀ eventĀ dataĀ recorder.Ā Ā ItĀ capturesĀ informationĀ aboutĀ speed,Ā brakingĀ time,Ā turnĀ signalĀ status,Ā  seatĀ beltĀ status,Ā andĀ muchĀ more.Ā Ā ItĀ recordsĀ thisĀ informationĀ wheneverĀ theĀ carĀ isĀ inĀ use.Ā Ā ItĀ isĀ sometimesĀ  usedĀ byĀ insuranceĀ companiesĀ (orĀ byĀ trialĀ lawyers)Ā wishingĀ toĀ learnĀ orĀ displayĀ factsĀ aboutĀ anĀ accident.Ā 

10
New cards

HowĀ couldĀ informationĀ fromĀ electronicĀ tollingĀ beĀ usedĀ inĀ aĀ familyĀ lawĀ case?

TranspondersĀ forĀ electronicĀ tollingĀ recordĀ timeĀ andĀ locationĀ forĀ aĀ carĀ equippedĀ withĀ theĀ transponder.Ā  So,Ā ifĀ aĀ spouseĀ accusesĀ hisĀ orĀ herĀ partnerĀ ofĀ spendingĀ timeĀ withĀ someoneĀ else,Ā theĀ transponderĀ informationĀ  mightĀ beĀ ableĀ toĀ demonstrateĀ thatĀ theĀ spouse'sĀ carĀ isĀ oftenĀ usingĀ anĀ offramp/onrampĀ nearĀ theĀ thirdĀ party'sĀ  home.Ā Ā Also,Ā aĀ parentĀ mightĀ claimĀ thatĀ theyĀ areĀ "alwaysĀ homeĀ forĀ dinner",Ā butĀ theĀ dataĀ collectedĀ fromĀ theĀ  transponderĀ couldĀ indicateĀ thatĀ theĀ carĀ isĀ typicallyĀ onĀ itsĀ wayĀ homeĀ lateĀ atĀ nightĀ onĀ weekdays.Ā 

11
New cards

WhatĀ (orĀ who)Ā areĀ theĀ "theĀ twoĀ BigĀ Brothers"Ā discussedĀ inĀ BlownĀ ToĀ Bits,Ā ChapterĀ 2?Ā 

TheĀ twoĀ BigĀ BrothersĀ areĀ governmentĀ andĀ commercialĀ aggregationĀ companiesĀ (thoseĀ thatĀ gatherĀ andĀ analyzeĀ  bulkĀ electronicĀ communicationĀ data).Ā Ā GovernmentsĀ workĀ withĀ (orĀ sometimesĀ compel/obligate)Ā theĀ aggregatorsĀ  toĀ provideĀ informationĀ gleanedĀ fromĀ theĀ trovesĀ ofĀ dataĀ theyĀ collect.Ā 

12
New cards

Ā WhatĀ isĀ theĀ "InternetĀ ofĀ Things"?Ā 

TheĀ InternetĀ ofĀ ThingsĀ refersĀ toĀ theĀ networkingĀ ofĀ lightĀ switches,Ā refrigerators,Ā doorbells,Ā andĀ otherĀ  electronicĀ devices,Ā viaĀ theĀ internet.Ā Ā TheseĀ modernĀ appliancesĀ areĀ equippedĀ withĀ internetĀ connectionĀ soĀ thatĀ  theyĀ mayĀ beĀ contactedĀ andĀ controlledĀ remotelyĀ throughĀ applications.Ā Ā 

13
New cards

HowĀ shouldĀ youĀ properlyĀ identifyĀ aĀ segmentĀ ofĀ JavaScriptĀ inĀ anĀ htmlĀ document?Ā 

Typically,Ā youĀ shouldĀ writeĀ yourĀ JavaScriptĀ codeĀ inĀ aĀ separateĀ file,Ā andĀ linkĀ itĀ toĀ theĀ appropriateĀ htmlĀ  file.Ā Ā IfĀ youĀ doĀ writeĀ yourĀ JavaScriptĀ codeĀ inĀ anĀ htmlĀ file,Ā thisĀ codeĀ shouldĀ beĀ placedĀ withinĀ theĀ scriptĀ  tags,Ā likeĀ this:Ā Ā Ā 

14
New cards

name 3 file formats for audio files

mp3, aac, wav

15
New cards

what is a graphic

its a bunch of pixels horizontally and vertically that form a grid. each dot is represented by a single bit

16
New cards

name 3 file formats for image files and how they are used

bmp- simple images; gif-low quality icons, memes(animated); jpeg-24 bit color, lossly compressed, better fidelity images, png-high quality, resizablr graphics with 24 bit color

17
New cards

name 3 formats for video files

avi-windows;mp4-universal;quicktime-macs

18
New cards

what is meta data

additional data that applications can see that tell them how to display the image to be more immersive like vr headset

19
New cards

what happens when a file is deleted

computer forgets the location of the data, physical data isnt deleted. with enough tools you can recover the data

20
New cards

what are some popular passwords

passwords, 123456

21
New cards

why is it bad to email your password directly

if someone knows your email anyone can find any password thats sent to the email

22
New cards

what is 2 factor authentication

having a password and another means of authentication thats fundamently different. usually something you have

23
New cards

what is a vpn

virtual private network that encrypts your connection. it encyrypts by scrambling you data

24
New cards

how many keys does public key crytography use

2 keys, one public and one private. public encrypts and private decrypts

25
New cards

what is phishing

sending emails or other messages pretendig to be from reputable companies in order to make people to reveal personal information

26
New cards

what is malware

malicious software that can do anything like erase hard drives etc

27
New cards

what is ransom ware

software that ransoms your data and gives back once it gets something

Explore top notes

note
DNA
Updated 1013d ago
0.0(0)
note
In Catilinam 1.1-1.3
Updated 565d ago
0.0(0)
note
Nervous System Part 1
Updated 393d ago
0.0(0)
note
Middle Childhood: Physical Health
Updated 1142d ago
0.0(0)
note
Week 5: Ch 6: Network Components
Updated 986d ago
0.0(0)
note
DNA
Updated 1013d ago
0.0(0)
note
In Catilinam 1.1-1.3
Updated 565d ago
0.0(0)
note
Nervous System Part 1
Updated 393d ago
0.0(0)
note
Middle Childhood: Physical Health
Updated 1142d ago
0.0(0)
note
Week 5: Ch 6: Network Components
Updated 986d ago
0.0(0)

Explore top flashcards

flashcards
1
69
Updated 511d ago
0.0(0)
flashcards
lecture 7- Hoof
58
Updated 68d ago
0.0(0)
flashcards
Physics 3LC Final review
63
Updated 650d ago
0.0(0)
flashcards
GEOGRAPHY - Exam 2023
40
Updated 1010d ago
0.0(0)
flashcards
Industrial Revolution
20
Updated 1189d ago
0.0(0)
flashcards
E -> IE + E -> I (Verbs)
44
Updated 432d ago
0.0(0)
flashcards
Great Gatspy: Vocab Chapters 1-3
39
Updated 1105d ago
0.0(0)
flashcards
1
69
Updated 511d ago
0.0(0)
flashcards
lecture 7- Hoof
58
Updated 68d ago
0.0(0)
flashcards
Physics 3LC Final review
63
Updated 650d ago
0.0(0)
flashcards
GEOGRAPHY - Exam 2023
40
Updated 1010d ago
0.0(0)
flashcards
Industrial Revolution
20
Updated 1189d ago
0.0(0)
flashcards
E -> IE + E -> I (Verbs)
44
Updated 432d ago
0.0(0)
flashcards
Great Gatspy: Vocab Chapters 1-3
39
Updated 1105d ago
0.0(0)