Midterm review Exam is on March 8 th during class
Midterm format Part 1: multiple choice –25 – 50 questions Part 2: written –4 or 5 shorter answers (1 – 3 sentences) –1 or 2 longer question(s) (perhaps a page)
material Basically anything discussed in class or on the website is fair game. More specifically…
Code Parts 1 and 2 of the Lessig book REGULABILITY –Chapter 1: Code is Law –Chapter 2: Four Puzzles from Cyberspace –Chapter 3: Is-ism –Chapter 4: Architectures of Control –Chapter 5: Regulating Code CODE AND OTHER REGULATORS –Chapter 6: Cyber-spaces –Chapter 7: What Things Regulate
Topics in the News Net neutrality Aol, Yahoo, Goodmail Patriot Act Google in China Search engine data Broadcast flag / audio flag Data mining
History of computers What is a computer? Parts of a computer. Giga, mega Decimal vs binary People: –Pascal (first calculator: +, -) –Leibniz (binary numbering system, calculator: X, /) –Boole (Boolean algebra) –Babbage (diference engine, analytical engine) –Lovelace (first programmer) –Hollerith (punch cards – census, IBM) –Turing (code breaker, Turing machine) –Von Nueman (stored program) –Hooper (computer bug, programmer) –Moore (Moore’s law) Early computers: –Mark 1 –Eniac
Networking Telegraph Telephone Teletype Wireless: radio Remote computing Arpa: arpanet Internet Curcuit switching vs packet switching Broadband IP address DNS protocol
Privacy Anything from the notes What is it? Why is it good? Why is it bad? Third Amendment Public vs private information – how do you disclose your private information? Cookies Credentials Government records National Crime Information Center Code of Fair Information Practices Privacy Act of 1974
Privacy (cont) Covert surveillance Wiretaps and bugs Shamrock Fourth Amendment Patriot Act TIA Data mining Two parties of a transaction Encryption Computers are not necessary for an invasion of privacy but they make old threats more potent.
Organizations EFF DARPA ICANN Verisign ACM NSA