comp literacy

CIS 105 Midterm Study Guide – Spring 2025

Module 1: Impact of Digital Technology

History of Computers

  • First Generation: Used vacuum tubes.

  • Next Generation: Replaced vacuum tubes with transistors.

  • 1960s: Introduction of integrated circuits.

  • 1971: Development of the microprocessor.

  • 1970s-1980s: Rise of the Personal Computer (PC).

Preparing for a Career in Technology

  • Professional Online Presence:

    • Keep social profiles professional.

    • Upload and proofread resumes.

    • Use professional networks (LinkedIn, GitHub, etc.).

  • Certifications:

    • Demonstrates expertise in software, hardware, operating systems.

    • Requires time and financial commitment.


Module 2: The Web

Keep Track of Web Pages Browsing Terms

  • URL (Uniform Resource Locator)

    • HTTP/HTTPS (Hypertext Transfer Protocol)

    • Server address 

    • Pathname 

    • File name 

  • Web server 

    • Domain Name & IP Address

  • Navigate the Web:

    • Address bar

    • Cache 

    • Breadcrumbs 

    • Navigation bar

Top-Level Domains (TLDs)

  • .com: most commercial sites that sell products and services 

  • .edu academic and research sites such as schools and universities 

  • .gov US government organizations 

  • .net network providers, isps, and other internet administrative organizations 

  • .org organizations such as political or not for profit 

Pros and Cons of Web Applications

  • Pros: Accessibility, automatic updates, cross-platform, collaboration with others, access anywhere, save storage 

  • Cons: Security risks, requires internet access, might not be able to access, can lose files, may move slower

Secure vs. Insecure Websites

  • Secure Websites:

    • Use encryption 

    • Hypertext Transfer Protocol Secure (HTTPS)

    • Require digital certificates (lock icon).

    • Login authentication for sensitive info.

  • Insecure Websites:

    • Lack of encryption.

    • Susceptible to data breaches.

E-Commerce

  • B2C (Business to Consumer) / E-Retail

    • Electronic storefront: 

    • Tracks selected items using cookies 

    • Secure payment methods: TLS, 3D Secure, Online Payment Services.

How Search Engines Work

  • Complies a database of information about webpages 

  • Uses spiders/crawlers to build an index of terms and their location.

  • When one enters a query, the search engine refers to its index lists & pages based on how closely they are the query.

  • Search results ranked by relevance, frequency, and links.

Effective Search Strategies

  • Identify the keywords or phrases that could answer the question 

  • Use a word stem to help broaden results 

Refine Web Searches 

  • List the most relevant results, or hits, on the first page 

  • Results labeled as an “Ad” or “Sponsored link” are from advertisers 

  • Use Boolean Operators (AND, OR, NOT).

  • Refine searches: Use filters, word stems, and specialized search engines.

Online Content & Copyright

  • Copyright photos might violate intellectual property rights 

  • A copyright gives authors & artists the legal right to sell, publish or distribute an original work

  • Some material is in the public domain and can be used without permission 

  • Intellectual Property: Copyright laws protect online content.

  • Fair Use: Allows limited use with proper citation.

  • Creative Commons (CC): Licensing system for sharing content.

  • A citation is a formal reference to a source 


Module 3: Computer Hardware

Key Components

  • CPU (Central Processing Unit):

    • Complex integrated circuit consisting of millions of electronic parts and is primarily responsible for converting data into meaningful information 

    • Data travels in and out though a bus

    • Processes data through the Machine Cycle.

  • Memory Types:

    • RAM (Random Access Memory) – Temporary storage, virtual memory, swap file/paging file.

    • ROM (Read-Only Memory) – Stores firmware.

  • Storage Options:

    • Cloud Storage storing electronic files on the internet instead of a local computer

    • Ex: Google Drive, OneDrive, Dropbox

Installing & Maintaining Hardware

  • Installation Steps:

    • Check for location, components,damage, power connections, turn on and  software installation.

  • Maintenance Tips:

    • Regularly clean the display, keyboard, and vents.

    • Use UPS( uninterruptible power supply)  & surge protectors for power safety.

    • Backup important files.


Module 6: Security & Safety

Types of Security Risks

  1. Information Risks (Data theft, malware).

  2. Environmental Risks (Electronic waste, heat damage).

  3. Health Risks (Eye strain, bad posture).

The Risks to Computer Security & Safety 

  • Attackers 

    • Script kittles/kiddies 

    • Hactivists 

    • Cyberterrorisits 

    • Nation state actors 

    • Insiders 

  • Online Risks 

    • Online banking 

    • E-commerce shopping 

    • Fake websites 

    • Data mining 

    • Social media 

  • Protecting Personal Information

    • Give only necessary information when completing an online form 

Common Cybersecurity Threats

  • Malware

    • Viruses, worms, Trojans, 

    • Ransomware (blocker & encrypting ransomware)

    • Address spoofing 

  • Social Engineering: Attackers manipulate victims by tricking them into giving valuable information. 

    • Phishing: Fake emails trick users into providing data.

    • Hoax

    • Spam 

Protecting Personal Information

  • Use Strong Passwords:

    • At least 15-20 characters.(combination of letters, numbers & symbols)

    • A longer password is always more secure than a shorter password, regardless of complexity 

    • Do not repeat characters or use sequences 

    • Avoid dictionary words and personal info.

    • Use a password manager.

  • Encryption:

    • The process of “scrambling” information so it can’t be read unless the user possess the “key” to unlock it

    • Digital certificate: a technology used to verify a users identity and key that has been “signed” by a trusted third party 

    • Protects data-at-rest(harddrive) and data-in-transit (internet).

    • Digital certificates verify identities.

Preventing Identity Theft

  • Safeguarding information

    • Shred sensitive documents.

    • Monitor financial statements.

    • Check credit reports.

Safe Online Browsing

  • Configure browser settings (disable pop-ups, clear cache).

  • Avoid logging in through social media credentials.

robot