heres a set of flashcards for the most possible that could appear on the test.
What is RGB, and how is it used to create colors?
RGB stands for Red, Green, and Blue. In this color model, these 3 primary colors can be mixed to form any one of 256 ^ 3 colors. Typically, a color created by the RGB color model would look something like this: A23F49, where the first 2 "digits" represent the amount of Red, the next 2 "digits" indicate the amount of Green, and the last 2 give the amount of Blue. The numbers are in Hexadecimal, so that the digits are chosen from 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.
2. What is a BITMAP, and what are its limitations (and, by extension, the limitations of any digital image)?
A BITMAP is an image formed by a map of bits. The image is made up of pixels, and each pixel is assigned a color, so that the image is a rectangular collection of tiny colored squares (pixels). there is a limit to the amount of detail that can be stored; if you zoom in enough, you will see the squares, or pixelated basis for the image.
What happens when lossy compression is used to store an image?
Lossy compression means that a trade‐off is being made; the amount of memory used to store the image is reduced, but some of the detail of the image is being lost. Once you use lossy compression, you can't go back; the information that you lose for the image cannot be generated again. Typically, lossy image compression is so sophisticated that you can't tell the difference with the naked eye.
What is a cookie (as it relates to web sites, not chocolate chips)?
A cookie is a small file (or value) that a visited website saves in your browser application. Cookies are typically designed to indicate that a user has visited a site before, so that when that user revisits the site, that user is recognized. This means, in some cases, that the user won't need to log in again, or that the "look and feel" of the page will be retained from the last visit.
Why is a 4‐digit passcode considered a poor
level of security?
A four digit passcode only has 10,000 possible
values (from 0000 to 9999), and is susceptible to a hack.
When using "free" Wi‐Fi
(such as that found in a hotel or airport), what is the
security risk?
Free Wi‐Fi is not encrypted by the network,
and so someone else with enough knowledge and expertise can potentially see other users' online activity
(when visiting http sites).
What is an electronic firewall?
An electronic firewall is special software that shields users from people attempting to access the network. It checks that IP addresses (both incoming and outgoing), along with TCP port numbers, are valid and reliable. It attempts to filter and block potential security risks.
What is a clustering algorithm (discussed in Chapter 2 of Blown To Bits) and how is it used?
A clustering algorithm checks the frequency of connections between points. used to reveal clusters of Enron employees who were in frequent communication with one another, perhaps forming conspiratorial groups.
What is an EDR, and what is its purpose when used in a modern car?
An EDR is an event data recorder. It captures information about speed, braking time, turn signal status, seat belt status, and much more. It records this information whenever the car is in use. It is sometimes used by insurance companies (or by trial lawyers) wishing to learn or display facts about an accident.
How could information from electronic tolling be used in a family law case?
Transponders for electronic tolling record time and location for a car equipped with the transponder. So, if a spouse accuses his or her partner of spending time with someone else, the transponder information might be able to demonstrate that the spouse's car is often using an offramp/onramp near the third party's home. Also, a parent might claim that they are "always home for dinner", but the data collected from the transponder could indicate that the car is typically on its way home late at night on weekdays.
What (or who) are the "the two Big Brothers" discussed in Blown To Bits, Chapter 2?
The two Big Brothers are government and commercial aggregation companies (those that gather and analyze bulk electronic communication data). Governments work with (or sometimes compel/obligate) the aggregators to provide information gleaned from the troves of data they collect.
What is the "Internet of Things"?
The Internet of Things refers to the networking of light switches, refrigerators, doorbells, and other electronic devices, via the internet. These modern appliances are equipped with internet connection so that they may be contacted and controlled remotely through applications.
How should you properly identify a segment of JavaScript in an html document?
Typically, you should write your JavaScript code in a separate file, and link it to the appropriate html file. If you do write your JavaScript code in an html file, this code should be placed within the script tags, like this:
name 3 file formats for audio files
mp3, aac, wav
what is a graphic
its a bunch of pixels horizontally and vertically that form a grid. each dot is represented by a single bit
name 3 file formats for image files and how they are used
bmp- simple images; gif-low quality icons, memes(animated); jpeg-24 bit color, lossly compressed, better fidelity images, png-high quality, resizablr graphics with 24 bit color
name 3 formats for video files
avi-windows;mp4-universal;quicktime-macs
what is meta data
additional data that applications can see that tell them how to display the image to be more immersive like vr headset
what happens when a file is deleted
computer forgets the location of the data, physical data isnt deleted. with enough tools you can recover the data
what are some popular passwords
passwords, 123456
why is it bad to email your password directly
if someone knows your email anyone can find any password thats sent to the email
what is 2 factor authentication
having a password and another means of authentication thats fundamently different. usually something you have
what is a vpn
virtual private network that encrypts your connection. it encyrypts by scrambling you data
how many keys does public key crytography use
2 keys, one public and one private. public encrypts and private decrypts
what is phishing
sending emails or other messages pretendig to be from reputable companies in order to make people to reveal personal information
what is malware
malicious software that can do anything like erase hard drives etc
what is ransom ware
software that ransoms your data and gives back once it gets something