Class Notes (1,100,000)
CA (650,000)
WLU (20,000)
CP (300)
CP102 (100)
Lecture 22

CP102 Lecture Notes - Lecture 22: Prolog, Mac Address, Advance-Fee ScamPremium


Department
Computer Science
Course Code
CP102
Professor
Rick Henderson
Lecture
22

This preview shows page 1. to view the full 5 pages of the document.
CP102Lecture#22FinalExamReview
Thisisthefinallecture
● ExamInformation:
○ MondayDecember14,2015
○ time:7pm9pm
○ where:AthleticComplex(AC)
○ 122MC/TFquestions
○ allowed2singlesidedcheatsheets
■ organizecheatsheetsbytopics
● QuestionBreakdown
○ approximately34questionseachfromchapters18
○ about90questions(7075%ofexam)nchapterssinceMidterm2:
■ 9,10,11,12
○ remember:9&12verysimilar(12ismoredetail)
○ chp10Programming
○ chp11DatabasesandInformationSystems
WhatShouldIstudy:
● abbreviations
● definitions
● classifications
● processes
● compare&contrast
● allquestionscomefrommaterialinthetext
● slidescondensematerialselectingthehighlights
● inclassweexpandthematerialanddefinemanyofthetermsifyoudon’tknow
atermlookitup!
Whatarethemajortopics:
● Networking
● Internet
● HardwareandSoftware
○ gettingitgoing
○ thebootprocess:
○ BIOSisactivatedwhenyoupoweron
○ APOSTchecksattachedhardware
■ checksifkeyboard,mouseattached,RAMokayetc.
○ theOSloadsintoRAMintokernelmemory
○ configurationandcustomizationsettingsarechecked
You're Reading a Preview

Unlock to view full version

Subscribers Only

Only page 1 are available for preview. Some parts have been intentionally blurred.

Subscribers Only
Chp9SecuringYourSystem:
● cybercrime
● typesofcybercrime
○ scams,identitytheft,nonauction/nondeliveryofitems(ebayscams),
advancefeefraud(creditcardfraud)
● computerviruses
● typesofviruses
○ bootsector,logicbomb,timebomb,worm,macroandscriptvirus,email
virus,encryptionvirus
● classificationofviruses
○ polymorphic,multiparticle,stealth
● howcanyoutellyou’reinfected?pg.352
● antivirussoftware
○ virussignature,quarantine,inoculation
● typesofHackers
○ blackhat,whitehat,greyhat
○ whatisapacketanalyser>pg.356
● typesofattacks
○ trojanhorse,denialservice(DoS,DDoS),botnet,zombiecomputer
● logicalports
● firewalls
○ hardware/software
■ packetfiltering,packetblocking
● passwordprotection
● biometricdevices
● onlineannoyances:malware,adware,spyware,spam,cookies
● socialengineering
○ phishing,pharming,pretexting,howtoavoid
Chapter10SoftwareProgramming:
● systemlifecycle(waterfall)
● softwarelifecycle
● algorithms
● badinput,testingplan,flowcharts,pseudocode
● topdowndesign
○ breaklargeproblemsintosmallerones
○ getinputfromuser,processthedata,outputtheinformation
● objectorientedanalysis
○ classes,objects,methodsoractionsofthedata
● coding
You're Reading a Preview

Unlock to view full version

Subscribers Only