Computer History/Architecture Vocab Flashcards

1
Q

abacus

A

one of the earliest predecessors of modern-day computers; first calculating tool invented around
2500-3000 BC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALU

A

arithmetic logic unit; carries out all the basic math for the computer; part of the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

amplifiers

A

device used to make sure all the light gets to the destination, by amplifying the light
when it gets weak

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARPANET

A

first network system; created during the Red Scare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

binary code

A

language of computers; stores things in 0 and 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

bits

A

smallest unit of information; 1s and 0s that make up information for a computer to store; one character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

brutal force attacks

A

when a hacker directly compares the coding and encryption of passwords to a
code, they find the match and gain access to data, try every combination of code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

bus

A

wires that carry data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

bytes

A

8 bits; 8 characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

COLLUSUS

A

set ofcomputersdeveloped by British codebreakers in the years 1943–1945 to help
in the cryptanalysis of the Lorenz cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer architecture

A

structure of a computer brain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

computer ethics

A

whether something you do on the internet is right or wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

control unit

A

part of the CPU that directs the computer traffic and decodes binary code; tells operating instructions what to do and when to do it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CPU

A

central processing unit; carries out instruction of a computer program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

cross-site scripting

A

when a hacker attacks a comment section and plants malicious code in it; CPU does not know the code is just a comment and runs the code along with its normal functions; can cause the computer to shut down the system or delete everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cyberattack

A

attempt by hackers to damage or destroy a computer network or system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

cybersecurity

A

being protected online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

cryptoware malware

A

encryptsfiles and demands money; only way to get the description key
is to make a payment and hope they release the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

data flow

A

how your data travels to and from your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

data packets

A

packets data is broken up into to be transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

denial of service

A

a hacker overwhelms a server with so much information and data that the server
can not do its intended function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

dictionary attack

A

hackers use a dictionary software to scan different common passwords to guess
and check to gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

digital camera

A

input device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

digital printer

A

output device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
ENIAC
electronic numerical integrator and computer; machine  invented by John Mauchly and Presper Eckert to be used in World War II; first programmable electronic digital computer until the secret of the Colossus was revealed
26
gigabytes
1,000 megabytes; 1,000 books, photos, or 16 hrs of music
27
hardware
physical computer parts
28
input
how you communicate with the computer; what you put into the computer
29
IP address
unique address used for identification on the internet
30
John van Neumann
Hungarian-American mathematician who made many great advancements in computer science and developed the concept of von Neuman architecture
31
joystick
input device
32
keyboard
input device
33
keyloggers
watches everything you key on the internet
34
kilobytes
1,000 bytes; 1/3 page of text
35
LAN
local area network; all the computers in a building would make up a local area network; connected to a single router
36
malware
malicious software
37
Manchester baby
first computer to utilize a stored program
38
MITB
man in the browser; malware infects your computer and steals your information by sending it to a browser or app; the app then sends the information to the hacker instead of you doing it directly
39
MITM
man in the middle; compromised computer will hack a smaller one, get the smaller computer to send information to the hacked one, and the hacked one send the compromised information to the final target destination
40
memory
storage for computer
41
microphone
input device
42
moore's law
theory made by Gordon Moore that transistors double in a dense integrated circuit about every 2 years
43
mouse
input device
44
optical fibers
make light travel
45
output
how the computer communicates with you; what you get out of the computer
46
phishing
process of stealing information by sending encrypted emails or typing your information into a corrupt website
47
RAM
random accessing memory; main memory; short term memory where data is stored as the processor needs it; can be easily destroyed
48
ransomware
locks the computer and demands money
49
refractive index
measure show fast light travels through an object
50
registers
holding place for info; memory locations with specific purposes; a quick easy place to access the information for the CPU; part of the CPU
51
repeaters
device used to make sure all the light gets to the destination, by renewing the power of the light when it gets weak
52
ROM
read only memory; once it is saved it cannot be changed; cannot be destroyed; operating system instructions are here; also called BIOS
53
rootkits
run as part of the operating system by taking over the operating system; invisible to the rest of the system and would not show up in the Task Manager; deep in the computer
54
router
receives and analyzes data and routes information to where it is supposed to go; way for data travel; finds the fastest route
55
scanners
input device
56
scareware
malware gets a user to pay money by scaring or threatening them
57
secondary memory
outside of the computer used for storage of files or backup; memory that is easily reached, changed, or moved; lash-drives, CD, external hard-drive, the Cloud, memory cards, floppy disks, etc.
58
software
instructions/codes that tell the computer what to do; non-physical things within a computer
59
spyware
watches you for purposes of advertising, identity theft, fraud; watches your browser to see what you search and using a keylogger to get info
60
SQL injection
hacker enters a command in a text in box; can delete an entire database
61
terabytes
1,000 gigabytes; 1,000,000 books, photos, or 2 years of continuous music
62
touchscreen
input device
63
trojan horse
disguises the virus tricking you to run the software
64
vishing
impersonate someone else in order to bait out information from clueless or vulnerable individuals; Vishing=Voice
65
voice input
input device
66
Von Neumann architecture
memory of a computer should store both the memory and data
67
WAN
wide area network; connects computers far away from each other; multiple routers and special cables
68
wannacry worm
installs ransomware that takes your system over and demands payment
69
whaling
hacker targets a high level individual in a organization to get their login information to do more damage in a large corporation
70
worms
self-replicating virus; moves very quickly
71
What are the four tasks a computer must be able to do?
input, process, store, output
72
Who is known as the father of computers?
Charles Babbage
73
Ethernet
wires that connect computers
74
WiFi
wireless fidelity; connects computers using radio waves
75
WiFi
wireless fidelity; connects computers using radio waves
76
virus
runs with user intervention; user opens a file
77
botnets
turn your computer into a robot which waits on a third party to tell it what to do
78
megabyte
1,000 kilobytes; 1 book, photo, or min of music
79
What initially happens to data when you send a file?
It is broken into packets of information (puzzle pieces).
80
What happens when the packets reach the destination?
They are re-assembled.
81
What 2 factors affect how fast your data travels on the Internet?
file size and internet speed
82
What route will your data take on the Internet?
packets will be directed by the router; Input Devices (controlled by CPU) to CPU to Output (Controlled by CPU, but interactive with memory) to Memory to Secondary Storage (internal memory cannot store the files; they are too big for internal memory) to “Bus” (Connects the components)
83
What device directs traffic on a computer?
router
84
What information is common to each packet?
Every packet carries the ISP of the computer that is sending the file.
85
algorithm
finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation
86
What are algorithms used for?
solve a problem or complete a task
87
examples of an algorithm
the recipe for baking a cake, the method we use to solve a long division problem, the process of doing laundry, and the functionality of a search engine