Fluency 4 in IT

Chapter 12 Social Implications of IT

These implications include context, automated replies, and ownership of processes and decisions.

  • Passwords – Make them hard to guess and use MFA to secure your accounts
  • Spam – Not all email is spam
  • Scams – The internet gets more complex each day with more scams for the potential user
  • Phishing – Social engineering to get peoples info
  • Viruses + Worms – Small programs that can make copies of themselves and harm your computer
  • Trojan Programs – perform operations that the user doesn’t know exist

Chapter 13 Privacy and Digital Secrecy

Privacy – The right of people to choose freely under what circumstances and to what extent they will reveal themselves

Cookies play a big part as they are used to track user and behavior information for a session.

Chapter 14 Speadsheets

Chapter 15 Adv Spreadsheets

Chapter 16 Database Concepts

Queries – A query is a specification to get the data from the tables written in SQL. A relationship is correspondence between rows of one table to another table.

Chapter 18 Programming Concepts

Names, variables, values

Names in a program are called variables. These have to be declared depending on the application.

Boolean values are either a True or False value.

Each programming language has there own syntax that must be valued.

Chapter 20 Writing Functions

Chapter 21 Iteration Principles

Iteration is the term for looping.

Indexing is the process of creating a sequence of names by associating a base name with a number

Pages: 1 2 3


Comments

Leave a comment