Make your own free website on Tripod.com

ADMI 3007

FIRST PARTIAL TEST

CHAPTERS 1, 2 & 11

 

CHAPTER 1

COMPUTER LITERACY

DATA

INFORMATION

INFORMATION PROCESSING CYCLE

HARDWARE

SOFTWARE

COMPUTER

MOTHERBOARD

WHAT IS STORAGE?

LIST THE ADVANTAGES/DISADVANTAGES OF USING COMPUTERS

SUPERCOMPUTERS

EMBEDDED COMPUTERS

ELEMENTS THAT COMPRISE AN INFORMATION SYSTEM

5 TYPES OF COMPUTER USERS

 

CHAPTER 2

history of the Internet

Internet owner

Internet2

IP address vs domain name

identify the top level domain on a domain name example

what is an URL?

identify examples of web browsers

search engines

identify each of the 13 types of web sites

e-commerce: C2C, B2C, B2B

Internet telephony

Other Internet services

 

CHAPTER 11

CYBERCRIME

IDENTIFY THE TYPES OF COMPUTER CRIMINALS (7)

VIRUS, WORM, TROJAN, ZOMBIE BOT, ROOTKIT

VIRUS HOAX

HONEYPOT

BACKDOOR

FIREWALL

RULES FOR CHOOSING A PASSWORD

BIOMETRICS

POSSESSED OBJECTS

LICENSE AGREEMENT CONDITIONS (3)

DANGERS/RISKS OF SOFTWARE PIRACY (read the textbook for answers)

WIRELESS ACCESS POSES ADDITIONAL SECURITY RISKS

EMPLOYEE MONITORING (IS IT LEGAL?)

3 ETHICS TESTS (this topic does not appear on the textbook, only in the presentation)

ERGONOMICS

HEALTH ISSUES (read all about RSI)

COMPUTER ADDICTION

COOKIES

Web sites use cookies for a variety of reasons

Social engineering

PHISHING

GREEN COMPUTING