with complete solutions graded A+
PII - correct answer ✔✔Personally Identifiable Information
Information about an individual that identifies, links, relates, or describes them.
Examples:
- Social Security number
- Age
- Race
- Phone number(s)
- Medical information
- Financial information
- Biometric data
Phishing - correct answer ✔✔Phishing is a technique that attempts to trick a user
into providing personal information.
Example: Fraudulent emails.
Internet vs. the World Wide Web - correct answer ✔✔The Internet is a network of
interconnected networks, but the World Wide Web is an information system that
is accessed via the Internet and is a system of linked pages, programs and files.
,Multifactor Authentication - correct answer ✔✔Multifactor authentication is a
method of computer access control in which a user is only granted access after
successfully presenting several separate pieces of evidence to an authentication
mechanism.
Example: A user provides a password and shows evidence of having the phone
associated with the user account.
Redundancy and how it benefits the reliability of data transmission - correct
answer ✔✔A system design in which a component is duplicated so if it fails there
will be a backup. Redundancy has a negative connotation when the duplication is
unnecessary or is simply the result of poor planning.
Benefit of redundancy: It often allows messages to be sent on the network even if
some network devices or connections have failed. If a particular device or
connection on the Internet fails, subsequent data will be sent via a different route,
if possible.
How analog audio signals are represented by a computer - correct answer
✔✔Analog signals are sampled digitally at discrete intervals over time. These
samples, like all digital data, are represented at the lowest level as a sequence of
bits.
Creative Commons License - correct answer ✔✔A no-rights-reserved Creative
Commons license is used when the creator of a published work wants the work to
be made freely available to everyone.
, Data Mining - correct answer ✔✔A computer-assisted technique used in analytics
to process and explore large data sets. With data mining tools and methods,
organizations can discover hidden patterns and relationships in their data.
Data compression algorithms - correct answer ✔✔Data Compression algorithms
works by identifying and eliminating redundant or unnecessary information from
the data.
There are two main types of data compression algorithms: lossless compression
and lossy compression.
Lossless compression - correct answer ✔✔An algorithm that reduces the number
of bits stored or transmitted while guaranteeing complete reconstruction of the
original data.
In situations where quality or ability to reconstruct the original is maximally
important, lossless compression algorithms are typically chosen.
Lossy compression - correct answer ✔✔Lossy compression reduces a file by
permanently eliminating certain information, especially redundant information.
When the file is uncompressed, some of the original information is not there,
although the user may not notice it.
It significantly reduces the number of bits stored or transmitted but only allow
reconstruction of an approximation of the original data.
In situations where minimizing data size or transmission time is maximally
important, lossy compression algorithms are typically chosen.