comp 13

Final Exam Review Overview

  • Course: COMP.1047 – Computer Concepts

  • Instructor: Dr. Andreas S. Maniatis

  • Institution: University of Windsor

  • Date: Tuesday, November 25th, 2025

Part I: What to Read for Final Exam

  • Content Sources:

    • Brightspace content: Chapters 8 – 13

    • Slide decks: Chapters 8 – 13

    • Textbook: Chapters 8 – 13

  • How to Read:

    • Reference respective chapters in the textbook

    • Review content available in Brightspace

    • Analyze slide decks, focusing on open-ended questions

    • Some chapters contain links to third-party quizzes for additional practice; these are examples and may not reflect exam questions.

  • Final Announcement:

    • An important announcement regarding the final exam will be made early in the exam week.

Part II: Review of Open-Ended Questions

Chapter 8: Communication and Networks

  • Key Open-Ended Questions:

    1. Define communications:

    • Includes concepts such as connectivity, the wireless revolution, and communication systems.

    1. Discuss communication channels:

    • Differentiates between wireless connections and physical connections.

    1. Discuss connection devices:

    • Covers types of modems:

      • DSL modems

      • Cable modems

      • Wireless modems

    • Includes connection services:

      • Cellular

      • DSL

      • ADSL

      • Cable

      • Satellite

    1. Discuss data transmission:

    • Bandwidth types include:

      • Voice band

      • Medium band

      • Broadband

      • Baseband

    • Protocols involve:

      • IP addresses

      • Domain name servers

      • Packetization

    1. Discuss networks:

    • Identification and definitions of specialized terms related to computer networks.

    1. Discuss network types:

    • Local Area Network (LAN)

    • Home networks

    • Wireless networks

    • Personal Area Networks (PAN)

    • Metropolitan Area Networks (MAN)

    • Wide Area Networks (WAN)

    1. Define network architecture:

    • Topologies:

      • Bus

      • Ring

      • Star

      • Tree

      • Mesh

    • Strategies:

      • Client/server models

      • Peer-to-peer models

    1. Discuss organization networks:

    • Internet technologies:

      • Intranets

      • Extranets

    • Network security aspects:

      • Firewalls

      • Proxy servers

      • Intrusion detection systems

      • Virtual Private Networks (VPNs)

Chapter 9: Privacy, Security, and Ethics

  • Key Open-Ended Questions:

    1. Define privacy:

    • Discusses impacts of large databases, private networks, the internet, and the web.

    1. Define online identity:

    • Review major privacy laws impacting online identities.

    1. Define security:

    • Includes definitions for:

      • Cybercrime

      • Social engineering

      • Malicious software (malware) and hardware

        • Identity theft

        • Internet scams

        • Data manipulation

        • Ransomware

        • Denial of Service (DoS) attacks

        • Types of malware:

        • Viruses

        • Worms

        • Trojan horses

        • Zombies

        • Rogue Wi-Fi hotspots

        • Infected USB flash drives

    1. Discuss ways to protect computer security:

    • Strategies include restricting access, encrypting data, anticipating disasters, and preventing data loss.

    1. Define computer ethics:

    • Covers copyright laws, cyberbullying, and plagiarism.

Chapter 10: Information Systems

  • Key Open-Ended Questions:

    1. Name and discuss the five common functions of organizations:

    2. Discuss roles of management:

    • Focus on three kinds of management in corporations.

    1. Identify the four common computer-based information systems:

    2. Describe different reports:

    • Their roles in managerial decision-making.

    1. Difference between office automation systems and knowledge work systems:

Chapter 11: System Analysis and Design

  • Key Open-Ended Questions:

    1. What is a system?

    • Describe six phases of the systems life cycle and their significance for corporations.

    1. Tools in the analysis phase:

    • Explain top-down analysis and its applications.

    1. Types of system conversion:

    • Define and identify the most commonly used type.

    1. Systems maintenance:

    • Timing and significance of systems maintenance.

    1. Explain prototyping and Rapid Application Development (RAD):

    • Scenarios where they might be utilized by corporations.

Chapter 12: Databases

  • Key Open-Ended Questions:

    1. Describe the five logical data groups:

    2. Difference between batch processing and real-time processing:

    3. Identify the five parts of DBMS programs:

    4. Describe five common database models:

    5. Benefits and limitations of databases:

    • Discuss security concerns related to databases.

Chapter 13: Programming

  • Key Open-Ended Questions:

    1. Identify and discuss six steps of programming:

    2. Description of CASE tools and Object-Oriented Programming (OOP):

    • How CASE tools assist programmers.

    1. Definition of programming language generation:

    • Differences between low-level and high-level languages.

    1. Difference between compiler and interpreter:

    2. Logic structures in programming:

    • Differences among the three types of logic structures.

Review Quizzes

  • Resource: Available on Brightspace to test knowledge before the final exam.