Computer History/Architecture Vocab Flashcards

1
Q

abacus

A

one of the earliest predecessors of modern-day computers; first calculating tool invented around
2500-3000 BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALU

A

arithmetic logic unit; carries out all the basic math for the computer; part of the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

amplifiers

A

device used to make sure all the light gets to the destination, by amplifying the light
when it gets weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARPANET

A

first network system; created during the Red Scare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

binary code

A

language of computers; stores things in 0 and 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bits

A

smallest unit of information; 1s and 0s that make up information for a computer to store; one character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

brutal force attacks

A

when a hacker directly compares the coding and encryption of passwords to a
code, they find the match and gain access to data, try every combination of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bus

A

wires that carry data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bytes

A

8 bits; 8 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COLLUSUS

A

set ofcomputersdeveloped by British codebreakers in the years 1943–1945 to help
in the cryptanalysis of the Lorenz cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer architecture

A

structure of a computer brain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

computer ethics

A

whether something you do on the internet is right or wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

control unit

A

part of the CPU that directs the computer traffic and decodes binary code; tells operating instructions what to do and when to do it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPU

A

central processing unit; carries out instruction of a computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross-site scripting

A

when a hacker attacks a comment section and plants malicious code in it; CPU does not know the code is just a comment and runs the code along with its normal functions; can cause the computer to shut down the system or delete everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cyberattack

A

attempt by hackers to damage or destroy a computer network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cybersecurity

A

being protected online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

cryptoware malware

A

encryptsfiles and demands money; only way to get the description key
is to make a payment and hope they release the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data flow

A

how your data travels to and from your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data packets

A

packets data is broken up into to be transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

denial of service

A

a hacker overwhelms a server with so much information and data that the server
can not do its intended function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

dictionary attack

A

hackers use a dictionary software to scan different common passwords to guess
and check to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

digital camera

A

input device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

digital printer

A

output device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

ENIAC

A

electronic numerical integrator and computer; machine invented by John Mauchly
and Presper Eckert to be used in World War II; first programmable
electronic digital computer until the secret of the Colossus was revealed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

gigabytes

A

1,000 megabytes; 1,000 books, photos, or 16 hrs of music

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

hardware

A

physical computer parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

input

A

how you communicate with the computer; what you put into the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

IP address

A

unique address used for identification on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

John van Neumann

A

Hungarian-American mathematician who made many great advancements in
computer science and developed the concept of von Neuman architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

joystick

A

input device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

keyboard

A

input device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

keyloggers

A

watches everything you key on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

kilobytes

A

1,000 bytes; 1/3 page of text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

LAN

A

local area network; all the computers in a building would make up a
local area network; connectedto a single router

36
Q

malware

A

malicious software

37
Q

Manchester baby

A

first computer to utilize a stored program

38
Q

MITB

A

man in the browser; malware infects your computer and steals your information by
sending it to a browser or app; the app then sends the information to the hacker instead of you doing it
directly

39
Q

MITM

A

man in the middle; compromised computer will hack a smaller one, get the smaller
computer to send information to the hacked one, and the hacked one send the compromised
information to the final target destination

40
Q

memory

A

storage for computer

41
Q

microphone

A

input device

42
Q

moore’s law

A

theory made by Gordon Moore that transistors double in a dense integrated circuit
about every 2 years

43
Q

mouse

A

input device

44
Q

optical fibers

A

make light travel

45
Q

output

A

how the computer communicates with you; what you get out of the computer

46
Q

phishing

A

process of stealing information by sending encrypted emails or typing your information into a corrupt website

47
Q

RAM

A

random accessing memory; main memory; short term memory where data is stored as the processor needs it; can be easily destroyed

48
Q

ransomware

A

locks the computer and demands money

49
Q

refractive index

A

measure show fast light travels through an object

50
Q

registers

A

holding place for info; memory locations with specific purposes; a quick easy place to access the information for
the CPU; part of the CPU

51
Q

repeaters

A

device used to make sure all the light gets to the destination, by renewing the power of
the light when it gets weak

52
Q

ROM

A

read only memory; once it is saved it cannot be changed; cannot be destroyed; operating system instructions are here; also called BIOS

53
Q

rootkits

A

run as part of the operating system by taking over the operating system; invisible to the rest of the system and would not show up in the Task Manager; deep in the computer

54
Q

router

A

receives and analyzes data and routes information to where it is supposed to go; way for data travel; finds the fastest route

55
Q

scanners

A

input device

56
Q

scareware

A

malware gets a userto pay moneyby scaring or threatening them

57
Q

secondary memory

A

outside of the computer used for storage of files or backup; memory that is easily reached, changed, or moved; lash-drives, CD, external hard-drive, the Cloud, memory cards, floppy disks, etc.

58
Q

software

A

instructions/codes that tell the computer what to do; non-physical things within a computer

59
Q

spyware

A

watches you for purposes of advertising, identity theft, fraud; watches your browser to see what you search and using a keylogger to get info

60
Q

SQL injection

A

hacker enters a command in a text in box; can delete an entire database

61
Q

terabytes

A

1,000 gigabytes; 1,000,000 books, photos, or 2 years of continuous music

62
Q

touchscreen

A

input device

63
Q

trojan horse

A

disguises the virus tricking you to run the software

64
Q

vishing

A

impersonate someone else in order to bait out
information from clueless or vulnerable individuals; Vishing=Voice

65
Q

voice input

A

input device

66
Q

Von Neumann architecture

A

memory of a
computer should store both the memory and data

67
Q

WAN

A

wide area network; connects computers far away from each other; multiple
routers and specialcables

68
Q

wannacry worm

A

installs ransomwarethat takes your system over and demands payment

69
Q

whaling

A

hacker targets a high level individual in a organization to get their login information
to do more damage in a large corporation

70
Q

worms

A

self-replicating virus; moves very quickly

71
Q

What are the four tasks a computer must be able to do?

A

input, process, store, output

72
Q

Who is known as the father of computers?

A

Charles Babbage

73
Q

Ethernet

A

wires that connect computers

74
Q

WiFi

A

wireless fidelity; connects computers using radio waves

75
Q

WiFi

A

wireless fidelity; connects computers using radio waves

76
Q

virus

A

runs with user intervention; user opens a file

77
Q

botnets

A

turn your computer into a robot which waits on a third party to tell it what to do

78
Q

megabyte

A

1,000 kilobytes; 1 book, photo, or min of music

79
Q

What initially happens to data when you send a file?

A

It is broken into packets of information (puzzle pieces).

80
Q

What happens when the packets reach the destination?

A

They are re-assembled.

81
Q

What 2 factors affect how fast your data travels on the Internet?

A

file size and internet speed

82
Q

What route will your data take on the Internet?

A

packets will be directed by the router; Input Devices (controlled by CPU) to
CPU to
Output (Controlled by CPU, but interactive with memory) to
Memory to
Secondary Storage (internal memory cannot store the files; they are too big for internal memory) to
“Bus” (Connects the components)

83
Q

What device directs traffic on a computer?

A

router

84
Q

What information is common to each packet?

A

Every packet carries the ISP of the computer that is sending the file.

85
Q

algorithm

A

finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation

86
Q

What are algorithms used for?

A

solve a problem or complete a task

87
Q

examples of an algorithm

A

the recipe for baking a cake, the method we use to solve a long division problem, the process of doing laundry, and the functionality of a search engine