Download presentation
Presentation is loading. Please wait.
Published byGary Golden Modified over 8 years ago
1
Midterm review Exam is on March 8 th during class
2
Midterm format Part 1: multiple choice –25 – 50 questions Part 2: written –4 or 5 shorter answers (1 – 3 sentences) –1 or 2 longer question(s) (perhaps a page)
3
material Basically anything discussed in class or on the website is fair game. More specifically…
4
Code Parts 1 and 2 of the Lessig book REGULABILITY –Chapter 1: Code is Law –Chapter 2: Four Puzzles from Cyberspace –Chapter 3: Is-ism –Chapter 4: Architectures of Control –Chapter 5: Regulating Code CODE AND OTHER REGULATORS –Chapter 6: Cyber-spaces –Chapter 7: What Things Regulate
5
Topics in the News Net neutrality Aol, Yahoo, Goodmail Patriot Act Google in China Search engine data Broadcast flag / audio flag Data mining
6
History of computers What is a computer? Parts of a computer. Giga, mega Decimal vs binary People: –Pascal (first calculator: +, -) –Leibniz (binary numbering system, calculator: X, /) –Boole (Boolean algebra) –Babbage (diference engine, analytical engine) –Lovelace (first programmer) –Hollerith (punch cards – census, IBM) –Turing (code breaker, Turing machine) –Von Nueman (stored program) –Hooper (computer bug, programmer) –Moore (Moore’s law) Early computers: –Mark 1 –Eniac
7
Networking Telegraph Telephone Teletype Wireless: radio Remote computing Arpa: arpanet Internet Curcuit switching vs packet switching Broadband IP address DNS protocol
8
Privacy Anything from the notes What is it? Why is it good? Why is it bad? Third Amendment Public vs private information – how do you disclose your private information? Cookies Credentials Government records National Crime Information Center Code of Fair Information Practices Privacy Act of 1974
9
Privacy (cont) Covert surveillance Wiretaps and bugs Shamrock Fourth Amendment Patriot Act TIA Data mining Two parties of a transaction Encryption Computers are not necessary for an invasion of privacy but they make old threats more potent.
10
Organizations EFF DARPA ICANN Verisign ACM NSA
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.