CP102 Lecture Notes - Lecture 22: Prolog, Mac Address, Advance-Fee Scam

344 views5 pages

For unlimited access to Class Notes, a Class+ subscription is required.

CP102Lecture#22FinalExamReview
Thisisthefinallecture
● ExamInformation:
○ MondayDecember14,2015
○ time:7pm9pm
○ where:AthleticComplex(AC)
○ 122MC/TFquestions
○ allowed2singlesidedcheatsheets
■ organizecheatsheetsbytopics
● QuestionBreakdown
○ approximately34questionseachfromchapters18
○ about90questions(7075%ofexam)nchapterssinceMidterm2:
■ 9,10,11,12
○ remember:9&12verysimilar(12ismoredetail)
○ chp10Programming
○ chp11DatabasesandInformationSystems
WhatShouldIstudy:
● abbreviations
● definitions
● classifications
● processes
● compare&contrast
● allquestionscomefrommaterialinthetext
● slidescondensematerialselectingthehighlights
● inclassweexpandthematerialanddefinemanyofthetermsifyoudon’tknow
atermlookitup!
Whatarethemajortopics:
● Networking
● Internet
● HardwareandSoftware
○ gettingitgoing
○ thebootprocess:
○ BIOSisactivatedwhenyoupoweron
○ APOSTchecksattachedhardware
■ checksifkeyboard,mouseattached,RAMokayetc.
○ theOSloadsintoRAMintokernelmemory
○ configurationandcustomizationsettingsarechecked
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in
Chp9SecuringYourSystem:
● cybercrime
● typesofcybercrime
○ scams,identitytheft,nonauction/nondeliveryofitems(ebayscams),
advancefeefraud(creditcardfraud)
● computerviruses
● typesofviruses
○ bootsector,logicbomb,timebomb,worm,macroandscriptvirus,email
virus,encryptionvirus
● classificationofviruses
○ polymorphic,multiparticle,stealth
● howcanyoutellyou’reinfected?pg.352
● antivirussoftware
○ virussignature,quarantine,inoculation
● typesofHackers
○ blackhat,whitehat,greyhat
○ whatisapacketanalyser>pg.356
● typesofattacks
○ trojanhorse,denialservice(DoS,DDoS),botnet,zombiecomputer
● logicalports
● firewalls
○ hardware/software
■ packetfiltering,packetblocking
● passwordprotection
● biometricdevices
● onlineannoyances:malware,adware,spyware,spam,cookies
● socialengineering
○ phishing,pharming,pretexting,howtoavoid
Chapter10SoftwareProgramming:
● systemlifecycle(waterfall)
● softwarelifecycle
● algorithms
● badinput,testingplan,flowcharts,pseudocode
● topdowndesign
○ breaklargeproblemsintosmallerones
○ getinputfromuser,processthedata,outputtheinformation
● objectorientedanalysis
○ classes,objects,methodsoractionsofthedata
● coding
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 5 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$10 USD/m
Billed $120 USD annually
Homework Help
Class Notes
Textbook Notes
40 Verified Answers
Study Guides
1 Booster Class
Class+
$8 USD/m
Billed $96 USD annually
Homework Help
Class Notes
Textbook Notes
30 Verified Answers
Study Guides
1 Booster Class