Here is a general outline of the key concepts and commands (arranged by topic) that you should know for the final.
The exam will have the following format:
Definitions: Briefly define terms using one or two sentences. (10 Points)
Short Answers: Briefly answer questions about:
Hardware (5 Points)
Data Structures / Algorithms (5 Points)
Code Evaluation (5 Points)
Networking (5 Points)
Web Programming (10 Points)
Data & Information (5 Points)
Privacy & Security (5 Points)
Programming: Write a Python involving requests and write a HTML document. (10 Points)
Parts 1 and 2 is to be done first on paper. However, part 3 can be done with the aid of your laptop and the Internet (but not other people).
The final exam will be a comprehrensive assessment. This means that everything we have discussed this semester is considered fair game.
That said, the majority of the test will cover the last half of the class, as detailed below.
Image
Pixel
Intellectual Property
Copyright
Patent
Internet
Protocol
URL
Client
Server
IP Address
Port
DNS
HTTP
Bandwidth
Latency
HTML
CSS
Cloud Computing
Cryptography
Caesar Cipher
Public Key Cryptography
Brute-force Attack
What are the advantages and disadvantages of different types of networking technologies?
How do machines communicate on the Internet?
How do we measure bandwidth and latency? What is the difference?
Rank the following networking technologies in terms of maximum bandwidth: dial-up, cable, DSL, fiber optics.
Between ethernet and wireless, which one has the better latency? Explain.
What are the components of a URL and what do they represent?
What happens in a typical HTTP transaction (on both the client and server)?
How do we use HTML to do the following:
Create a form with different input types.
What is CSS and what does it allow us to do?
What is the difference between a static website and a dynamic or interactive website?
How do we use Tornado to do the following:
What is cloud computing?
What are the motivations for utilizing cloud computing?
What are the advantages and disadvantages?
What are the ethical concerns regarding cloud computing?
How does online advertising impact cloud computing?
What is the convenience-surveillance trade-off?
What sort of information do companies regularly collect?
How do companies use the information that they regularly collect?
What are the pros and cons of using Cloud Computing?
What is the convenience-surveillance trade-off and where do you stand?
What privacy rights do US citizens have?
What sort of surveillance does the US government perform?
What is public key cryptography used for?
What are the ethical, moral, and legal issues regarding cryptography?
Can there be such a thing as "responsible encryption"? Explain.
How would you brute-force attack an iPhone? What would you do to mitigate such an attack?