Presentation is loading. Please wait.

Presentation is loading. Please wait.

Midterm review Exam is on March 8 th during class.

Similar presentations


Presentation on theme: "Midterm review Exam is on March 8 th during class."— Presentation transcript:

1 Midterm review Exam is on March 8 th during class

2 Midterm format Part 1: multiple choice –25 – 50 questions Part 2: written –4 or 5 shorter answers (1 – 3 sentences) –1 or 2 longer question(s) (perhaps a page)

3 material Basically anything discussed in class or on the website is fair game. More specifically…

4 Code Parts 1 and 2 of the Lessig book REGULABILITY –Chapter 1: Code is Law –Chapter 2: Four Puzzles from Cyberspace –Chapter 3: Is-ism –Chapter 4: Architectures of Control –Chapter 5: Regulating Code CODE AND OTHER REGULATORS –Chapter 6: Cyber-spaces –Chapter 7: What Things Regulate

5 Topics in the News Net neutrality Aol, Yahoo, Goodmail Patriot Act Google in China Search engine data Broadcast flag / audio flag Data mining

6 History of computers What is a computer? Parts of a computer. Giga, mega Decimal vs binary People: –Pascal (first calculator: +, -) –Leibniz (binary numbering system, calculator: X, /) –Boole (Boolean algebra) –Babbage (diference engine, analytical engine) –Lovelace (first programmer) –Hollerith (punch cards – census, IBM) –Turing (code breaker, Turing machine) –Von Nueman (stored program) –Hooper (computer bug, programmer) –Moore (Moore’s law) Early computers: –Mark 1 –Eniac

7 Networking Telegraph Telephone Teletype Wireless: radio Remote computing Arpa: arpanet Internet Curcuit switching vs packet switching Broadband IP address DNS protocol

8 Privacy Anything from the notes What is it? Why is it good? Why is it bad? Third Amendment Public vs private information – how do you disclose your private information? Cookies Credentials Government records National Crime Information Center Code of Fair Information Practices Privacy Act of 1974

9 Privacy (cont) Covert surveillance Wiretaps and bugs Shamrock Fourth Amendment Patriot Act TIA Data mining Two parties of a transaction Encryption Computers are not necessary for an invasion of privacy but they make old threats more potent.

10 Organizations EFF DARPA ICANN Verisign ACM NSA


Download ppt "Midterm review Exam is on March 8 th during class."

Similar presentations


Ads by Google