Computer Concepts And Applications CIS-107-TE. TECEP Test Description



Similar documents
Computer Science 1301 Computer Literacy. Student Learning Outcomes

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

IT Networking and Security

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Introduction to Cyber Security / Information Security

IT Networking and Security

Computers and Society: Security and Privacy

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Bellevue University Cybersecurity Programs & Courses

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

INFORMATION SECURITY FOR YOUR AGENCY

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

COB 302 Management Information System (Lesson 8)

Information Technology Career Cluster Advanced Cybersecurity Course Number:

E-Business, E-Commerce

Medical Networks and Operating Systems

BTEC First Diploma for IT. Scheme of Work for Computer Systems unit 3 (10 credit unit)

Certified Cyber Security Analyst VS-1160

The Next Generation of Security Leaders

TRAINING FOR AMERICAN MOMENTUM BANK CLIENTS. Corporate Account Takeover & Information Security Awareness

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

FKCC AUP/LOCAL AUTHORITY

Computer Security Literacy

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Information Security Basic Concepts

Security aspects of e-tailing. Chapter 7

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Students will know and be able to: 1.1. Basic Operations

EC-Council Ethical Hacking and Countermeasures

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

The Information Security Problem

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

Certified Cyber Security Analyst VS-1160

Massachusetts Technology Literacy Standards

Web Foundations Series Internet Business Associate

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Certified Secure Computer User

Knowledge Based Authentication (KBA) Metrics

Threat Modeling. 1. Some Common Definition (RFC 2828)

Exam 1 - CSIS 3755 Information Assurance

Corporate Account Takeover & Information Security Awareness. Customer Training

Internet tools and techniques at this level will be defined as advanced because:

Stable and Secure Network Infrastructure Benchmarks

DATA PROTECTION LAWS OF THE WORLD. India

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Overview of computer and communications security

Virtual Private Cloud. Service Level Agreement. Terms and Abbreviations

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Promoting Network Security (A Service Provider Perspective)

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Cybercrime Prevention and Awareness

Information Security Awareness

IBM Connections Cloud Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IDENTITY MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

COSC 472 Network Security

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

Cybersecurity Definitions and Academic Landscape

Windows 7. Qing Liu Michael Stevens

The information contained in this session may contain privileged and confidential information. This presentation is for information purposes only.

ISO COMPLIANCE WITH OBSERVEIT

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Eleventh Hour Security+

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Scene of the Cybercrime Second Edition. Michael Cross

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Section 12 MUST BE COMPLETED BY: 4/22

Cybersecurity for the C-Level

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)

CHIS, Inc. Privacy General Guidelines

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

SPEAR PHISHING UNDERSTANDING THE THREAT

Information Technology Grades Students will know and be able to: Basic Operations 1.1 (I)

Windows 7, Enterprise Desktop Support Technician

Where every interaction matters.

CompTIA Security+ (Exam SY0-410)


Linux Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

RARITAN VALLEY COMMUNITY COLLEGE ACADEMIC COURSE OUTLINE CISY 102 COMPUTER LITERACY

WHITE PAPER Usher Mobile Identity Platform

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Computer Hacking Forensic Investigator v8

Transcription:

Computer Concepts And Applications CIS-107-TE This TECEP tests content covered in a one-semester course in computer concepts and applications. It focuses on an overview of computers, including historical development; hardware; application software; communications; Internet use; how to purchase, install, and maintain a computer; information systems; system analysis and design; programming; careers in the computer field; security, ethics, and privacy issues, the use of Microsoft Office and Windows, and multimedia. (3 s.h.) Test format: 100 multiple choice questions (1 point each) Passing score: 70%. Your grade will be reported as CR (credit) or NC (no credit). Time limit: 2 hours Topics on the test and their approximate distribution 1. Essential Concepts 1.1 Importance of computer literacy; data vs. information; computer components 1.2 Evolution of Internet; broadband vs. dial-up; purpose of IP addresses and relationship to domain names 2. Application Software and Components of the System Unit 2.1 Categories of application software; how operating system and utility programs work with application software; widely used application software; learning aids 2.2 Styles of system units on desktop computers, notebook computers, mobile devices; processor components; steps in machine cycle; types of memory; how data is represented in computers 3. Input, Output, Storage, and Operating Systems and Utility Programs 3.1 Input and input devices; output and output devices; program vs. command vs. user response; storage devices vs. storage media; network attached storage devices; cloud storage 3.2 System software; functions of an operating system; stand-alone vs. embedded operating systems; purpose of utility programs 4. Communications and Networks; Data Management 4.1 Components required for successful communication; advantages of networks; types of networks; purpose of communication software; types of communications devices; physical vs. wireless transmission media 4.2 How a database interacts with data and information; character/field/record/file; file maintenance characteristics of a database; file processing approach vs. database approach; how to access Web databases 5. Computer Security, Safety, Ethics, and Privacy; Information System Development; Programming Languages and Program Development 5.1 Computer security risks and types of cybercrime perpetrators; techniques to prevent unauthorized computer access and use; ways software manufacturersprotect against software piracy; options for backing up computer resources; issues surrounding information privacy (electronic profiles, cookies, spyware, adware, spam, phishing, privacy laws, social engineering, employee monitoring, content filtering) 5.2 System development; project management, feasibility, assessment, documentation, and data and information gathering techniques 5.3 Types of programming languages; ways to develop Web pages; steps in the program development life cycle

6. Enterprise Computing; Computer Careers and Certification 6.1 Special information requirements for enterprise-sized organizations; integrated information systems; types of technologies used throughout an enterprise; virtualization, cloud computing, and grid computing 6.2 Career opportunities; ways to stay current with changing technology; use of Microsoft Office including Word, Excel, PowerPoint Outcomes assessed on the test Identify differences between application software and system software Explain basics of communication networks and databases Describe the uses of the Internet Differentiate between system development and program development Demonstrate basic knowledge of Microsoft Office 2010 applications and Windows 7 Demonstrate understanding of security, privacy and ethical issues related to information technology Identify differences between input and output devices Study materials Computer Literacy Basics. Connie Morrison and Dolores Wells. Boston: Cengage Learning Discovering Computers, Complete: Your Interactive Guide to the Digital World. Gary B. Shelly and Misty E. Vermaat. Boston: Cengage Learning Sample questions 1. Which of the following is the focus of computer literacy? a. The web b. The search c. The database d. The hardware 2. computing involves reducing the electricity consumed and environmental waste generated when using a computer. a. Green b. Universal c. Streamlined d. Comprehensive 3. The location of a computer that is attached to the Internet is determined by its a. network b. IP address c. URL d. processor 4. Which of the following programs would be used by a student to create a report? a. Access b. Oracle c. PageMaker d. Word

5. The basic input/output system that contains the computer s startup instructions is known as a. RAM b. CAM c. BIOS d. FIOS TECEP Test Description 6. Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a cycle. a. baseline b. machine c. registration d. pipeline 7. is any data and instructions entered into the memory of a computer. a. Processing b. Hovering c. Input d. Information 8. An example of a hardware component that produces video output is a a. monitor b. speaker c. microphone d. joystick 9. Storage is the physical material on which a computer keeps data, instructions, and information. a. media b. device c. command d. function 10. software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices. a. System b. Application c. Management d. Program 11. An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) a. risk b. attack c. asset d. vulnerability 12. Masquerade, falsification, and repudiation are threat actions that cause threat consequences. a. unauthorized disclosure b. disruption c. deception d. usurpation

13. A is an organization that produces data to be made available for controlled release, either within the organization or to external users. a. client b. data owner c. user d. server 14. A computer risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. a. security b. liability c. terrorism d. network 15. Recognition by fingerprint, retina, and face are examples of a. physical authentication b. token authentication c. dynamic biometrics d. static biometrics 16. A password is a password guessing program. a. hash b. biometric c. cracker d. key 17. Computers as is a form of crime that focuses on a computer system to acquire information stored on that computer system. a. targets b. storage devices c. media d. communication tools 18. The success of cybercriminals, and the relative lack of success of law enforcement, influence the behavior of a. cyber thieves b. cybercrime victims c. cybercrime attorneys d. cyber detectives 19. A disaster plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster. a. restoration b. prevention c. recovery d. baseline 20. IBM Certified Solutions Expert Informix is a certification that verifies advanced skills of administration of Informix. a. spreadsheet b. network c. server d. database

Answers to sample questions 1. d 2. a 3. b 4. d 5. c 6. b 7. c 8. a 9. a 10. a 11. b 12. c 13. b 14. a 15. d 16. c 17. a 18. b 19. c 20. d