Chapter 12 Social Implications of IT
These implications include context, automated replies, and ownership of processes and decisions.
- Passwords – Make them hard to guess and use MFA to secure your accounts
- Spam – Not all email is spam
- Scams – The internet gets more complex each day with more scams for the potential user
- Phishing – Social engineering to get peoples info
- Viruses + Worms – Small programs that can make copies of themselves and harm your computer
- Trojan Programs – perform operations that the user doesn’t know exist
Chapter 13 Privacy and Digital Secrecy
Privacy – The right of people to choose freely under what circumstances and to what extent they will reveal themselves
Cookies play a big part as they are used to track user and behavior information for a session.
Chapter 14 Speadsheets
Chapter 15 Adv Spreadsheets
Chapter 16 Database Concepts
Queries – A query is a specification to get the data from the tables written in SQL. A relationship is correspondence between rows of one table to another table.
Chapter 18 Programming Concepts
Names, variables, values
Names in a program are called variables. These have to be declared depending on the application.
Boolean values are either a True or False value.
Each programming language has there own syntax that must be valued.
Chapter 20 Writing Functions
Chapter 21 Iteration Principles
Iteration is the term for looping.
Indexing is the process of creating a sequence of names by associating a base name with a number
Leave a comment