Module 1 (Part 2) Flashcards

(142 cards)

1
Q

five generations of computer

A

First Generation Computer (1946 – 1959)
Second Generation Computer (1959 – 1965)
Third Generation Computer (1965 – 1971)
Fourth Generation Computer (1971 – onwards)
Fifth Generation Computer: AI and Quantum Computer (Present and Future)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When was the first electronic computer was
developed?

A

1946

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

At present, scientists and researchers have identified five generations based on what?

A

design, suitability, and reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When was the First Generation Computer used?

A

(1946 – 1959)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The First Generation Computer was designed by who?

A

J. Presper Eckert and John W. Mauchly
from the University of Pennsylvania and financed by the United States of Army

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is considered to be the first generation computer.

A

Electronic Numeric Integrator and Calculator (ENIAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is a modular computer, composed of
several panels capable of performing different functions.

A

Electronic Numeric Integrator and Calculator (ENIAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

It could only store a limited or small amount of information and only do arithmetic operations such as addition and subtraction of up to 10 digits.

A

Electronic Numeric Integrator and Calculator (ENIAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The computer was roughly 167 square meters in size, and weighed 27 tons.

A

Electronic Numeric Integrator and Calculator (ENIAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the size and weight of ENIAC?

A

167 square meters in size and weighed 27 tons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When was the Second Generation Computer used?

A

1959 – 1965

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Second-generation computer used ________ as the interior sections of the computer.

A

transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

First generation computers used what?

A

Vacuum tube

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are much smaller, faster, and more dependable than the vacuum tubes of the first generation computer.

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

They generated less heat and consumed less electricity but still very costly.

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When was the Third Generation Computer used?

A

1965 – 1971

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Third-generation computer used __________
instead of transistors as the interior sections.

A

integrated circuit (IC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

It has many transistors, resistors, and capacitors that even the full circuit board of a transistor can be replaced entirely with one chip.

A

single integrated circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This chip made the computers smaller, unfailing, and effective. In this generation of computer, remote processing, time-sharing, and multiprogramming operating system were used.

A

Integrated circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When was the Fourth Generation Computer used?

A

1971 – onwards (1980)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

It was used to build computers in 1971 – 1980.
4th computer generation

A

very large scale integrated (VLSI) circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

These circuits have about 5,000 transistors and other circuit elements with their connected circuits on a single chip.

A

microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How many transistors are there in a microprocessor?

A

5,000 transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fourth generation computers that became more powerful, dense, reliable, and inexpensive.

A

personal computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Personal computer
Fourth generation computer
26
pocket calculators, television sets, automotive devices, and audio and video appliances
Fourth generation computer (microprocessor)
27
When was the Fifth Generation Computer used and made?
Present and Future
28
The fifth generation computer uses what?
AI and Quantum computer
29
This generation involves computer intelligence which is associated with artificial intelligence (AI), natural language, and expert systems that interpret the means and practices of producing computers that think like human beings.
Fifth Generation Computer
30
Quantum computation
Fifth Generation Computer
31
molecular and nanotechnology
Fifth Generation Computer
32
It harnesses the phenomena of quantum mechanics to deliver a huge leap forward in computation to solve certain problems.
Quantum computing
33
It harnesses some of the almost-mystical phenomena of quantum mechanics to deliver huge leaps forward in processing power.
quantum computer
34
It promise to outstrip even the most capable of today’s—and tomorrow’s—supercomputers.
Quantum machines
35
It promise to power exciting advances in various fields, from materials science to pharmaceutical research.
Quantum computers
36
Real quantum computing applications are:
1. electric vehicles 2. Reducing atmospheric carbon emissions 3. Searching for Higgs events and the origins of the universe.
37
It is an electronic device that manipulates information or data.
computer
38
It has the ability to store, retrieve, and process data. It contains both hardware and software applications.
Computer
39
Computer contains what?
Hardware and software application
40
It pertains to the computer’s physical devices. Any part of the computer that can be seen or touched.
Hardware application
41
It consists of interrelated electronic devices that are used to manipulate the computer’s operation, input devices, and output devices.
Hardware
42
It enters or sends data and instructions from the user from another computer system on the internet.
Input devices
43
It sends back the administered data to the user or to another computer system.
output devices
44
What are the two types of hardware applications?
Input and output devices
45
Any hardware component that allows you to enter data and instructions into a computer.
INPUT DEVICES
46
Some most common and important input devices of a computer
Keyboard Mouse Microphone Scanner PC Video Camera
47
It is the most common input device that accepts letters, numbers, and commands from the user.
Keyboard
48
What are the different types of computer keyboards
wired, wireless, ergonomics, and multimedia keyboards.
49
It lets one select options from on-screen menus.
Mouse
50
It is used by moving it on a flat surface, pressing its two buttons (left and right), and scrolling the wheel that is located between the buttons.
mouse
51
What are the alternatives in using a mouse? .
trackball touchpad / trackpad
52
It has a ball that can rotate using a finger or the palm of a hand to move the pointer.
trackball
53
It is a touch-sensitive pad that lets the user move the pointer by touching and dragging his or her finger on the pad. These are commonly built-in on laptop computers
touchpad / trackpad
54
It allows a user to speak into the computer to input data and instructions. While there are available stand-alone microphones for computers, most of the time, users buy a headset for the sake of practicality.
Microphone
55
It converts printed material into a form the computer can use.
Scanner
56
What are the different types of scanners
flatbed scanner hand-held or portable scanners
57
It is the most common scanner.
flatbed scanner
58
Another type of scanner that is becoming common nowadays.
hand-held or portable scanners
59
It can be small enough to fit inside one’s pocket.
Portable scanners
60
These are just a bit bigger than fountain pens and can scan the text of a document line by line. They do not give high-resolution scans and are more expensive than flatbed scanners.
Pen scanners
61
It is a digital video camera that enables users to create a movie or take still photographs electronically. Users can see each other as they communicate via the computer.
PC video camera
62
3 commonly used output devices
Printer Monitor Speaker
63
It produces text and graphics on a physical medium such as paper.
Printer
64
two types of printer
impact and non-impact printer
65
It makes contact with the paper by pressing an inked ribbon against the paper using a hammer or pins.
Impact printer
66
Example of an impact printer
dot-matrix printer
67
It does not use a striking device to produce characters on the paper, the printer produces less noise.
non-impact printer
68
Example of non-impact printer
inkjet and laser printers
69
It displays text, graphics, and videos on a screen.
Monitor
70
Three types of monitors available in the market
Cathode ray tube or CRT Liquid crystal display or LCD Light emitting diode or LED
71
A type of monitor, it is a vacuum tube containing an electron gun at one end and a fluorescent screen at another end.
Cathode ray tube or CRT
72
A type of monitor, it is a flat-panel display that consists of a layer of color or monochrome pixels arranged schematically between a couple of transparent electrodes and two polarizing filters.
Liquid crystal display or LCD
73
A type of monitor, it is a flat-panel display that uses light-emitting diodes for backlighting. The display is of LCD only but the backlighting is done by LEDs. LED monitors are said to use much lesser power than CRT and LCD.
Light emitting diode or LED
74
Bulky size, screen flicker
Cathode Ray Tube (CRT)
75
Slim profile, sharp image
Liquid Crystal Display (LCD)
76
Very slim profile, energy-efficient
Light Emitting Diode (LED)
77
It allows one to hear music, voice, and other sounds. The signal used to produce the sound that comes from a computer speaker is created by the computer’s sound card.
Speaker
78
It is the enclosure composed of the main elements of a computer that are used to administer data.
System Unit
79
This can be referred to as a computer case or tower.
System Unit
80
The circuitry of the system unit containing the primary components of a computer with connectors into which other circuit boards can be positioned is recognized as what?
motherboard
81
It holds data, instructions, and information for future use.
Storage Devices
82
Storage devices includes the ff:
flash drive CDs DVDs Floppy disk drive hard disk
83
Why are computers powerful?
They work with remarkable speed, reliability, consistency, and accuracy. Computers can store large amounts of data and information. Computers allow users to communicate with other users or computers.
84
They work with remarkable speed, reliability, consistency, and accuracy.
Computer
85
It can store large amounts of data and information.
Computers
86
It allows users to communicate with other users or computers.
Computers
87
It is anyone who communicates and interacts with a computer or makes use of the information it generates.
user
88
In the system unit, operations get done through electronic circuits. When data, instructions, and information drift along these circuits, they travel at incredibly fast speed.
Speed
89
How many operation can world’s fastest computer perform in one second?
trillions of operations
90
The electronic components in modern computers are dependable because they have a low failure rate. The high reliability of components enable the computer to produce consistent results.
Reliability and consistency
91
It is unbearable to go through a day without this. It happens between two or more people sending and receiving messages from one another.
Communication
92
The one sending the message is referred to as the ________.
sender
93
The one receiving the information is known as the _________.
receiver
94
general classification of computers
1. Personal computer 2. Workstation 3. Minicomputer 4. Mainframes 5. Supercomputers
95
It is a computer that can perform all of its input, processing, output, and storage activities by itself.
Personal computer
96
This is a single-user computer based on a microprocessor.
Personal computer
97
In addition to the microprocessor, this type of computer has a keyboard for entering data, a monitor for displaying information and a storage device for saving data.
Personal computer
98
A powerful, single-user computer. It is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor.
Workstation
99
It is referred to as mid-level computers. It is a multiprocessing system having terminals attached to it and is capable of supporting from four to hundreds of users simultaneously.
Minicomputer
100
It is a large, expensive, powerful computer that can handle hundreds of thousands of connected users simultaneously.
Mainframes
101
It store huge amounts of data, instructions, and information.
Mainframes
102
It is the fastest, most powerful computer and the most expensive. It can process more than 135 trillion instructions in a single second.
Supercomputers
103
Different types of computers are as follows:
1. Desktop computers 2. Laptop computer 3. Tablet computers 4. Smartphones 5. Wearables 6. Smart TVs
104
These are computers designed to be placed on desk, and are normally made up of a few different parts, including the computer case, central processing unit (CPU), monitor, keyboard, and mouse
Desktop computers
105
These are battery-powered computer devices whose portability makes them possible to use almost anytime, anywhere.
Laptop computers
106
These are hand-held computers with touch-sensitive screens for typing and navigation
Tablet computers
107
These are hand-held telephones which can do things that computers can do, including browsing and searching the internet and even playing console games.
Smartphones
108
It includes fitness trackers, and smartwatches that can be worn throughout the day.
Wearables
109
These are the latest television sets that include applications present in computers. For example, videos can be streamed from the internet directly onto this type of computer. It can also be used as a computer monitor and gaming monitor.
Smart TVs
110
It is used interchangeably, capture the ubiquitous nature of computing and the prolific use of technology in almost all aspects of human activity such that digital interaction is a defining characteristic of human activity.
Digital age, information age, and computer age
111
It normally refers to the means of communication that uses unique tools to interconnect among people.
Media
112
The forms of media include the following:
television, radio, cellular phones, and internet
113
In the digital age, however, ________ can be considered as the message, the medium, and the messenger.
Media
114
It is considered to be the message itself for those who create and own the rights of content.
Media
115
It is a form of content created and owned by the users of a system
User generated content (UGC)
116
It is a combination of two words – web and log. It works the same way as pen and paper would but privacy becomes irrelevant given that a blog post can be seen by anyone online.
blog
117
A person who writes blogs is called a _______.
blogger
118
Most recently, blogs have evolved into _______ and ________.
microblogs and video blogs
119
It have become popular due to the rise of Tumblr and Twitter in which users instantly share limited content or short messages.
Microblogs
120
Two examples of microblogs
Tumblr and Twitter
121
Example of video blogs
Youtube
122
It refers to the tool or tools used in sending a message from the source to the destination.
medium
123
Examples of a medium
Anchor in the news on TV and radio Twitter
124
It is the one who delivers the message.
messenger
125
Being the messenger of news is called ________.
media
126
When was the telegraph developed?
1800s
127
When the telegraph was developed, it was followed by the ________.
telephone
128
It made the two way communication possible.
telephone
129
When was the broadcasting and recorded media first introduced?
1900s
130
These were used to send sound and video to homes and offices through electromagnetic spectrum or radio waves.
Radio and television
131
It refers to something hip or popular at a certain point in time. It can be a particular style in fashion, devices, or entertainment. It may always come along to replace the old one.
trend
132
five major trends this 2021
1. eSports 2. Wearable Technology 3. Blockchain Technology and Cryptocurrencies 4. Artificial Intelligence for Creativity 5. Digital Health
133
It is an act of theft in which a person copies another person’s ideas, words, or writings, etc. and pass them off as his or her own. Those who committed such action may lead to serious legal and ethical defilements.
Plagiarism
134
It is an action in which one deals with a person dishonesty, unethically, and dishonorably, in order to take advantage of the latter’s works and/or resources. This leads to unlawful actions
Exploitation
135
It can either be an insult, slur, or slander. Either written or spoken or even through actions, it may lead to libel if the accusation is not true and without any piece of evidence.
Libel
136
Digital ownership is a layer of Internet of Things (IoT). IoT enables to gather gigabytes of data on a single thing. Digital ownership helps us to gain control on these huge data. One of the pre-requests of digital ownership is that the object must be identifiable uniquely, for example by an EPC code, and the stored data must be accessible.
Digital Ownership
137
Most people have their personal data spread throughout the digital world. Even things thought to be secure, such as email or private accounts, can be accessed by unintended sources. Most employers actively check their employees’ computer habits. Privacy has evolving legal implications, but there are also ethical considerations.
Privacy
138
Im the past, security issues were resolved by locking a door. Digital security is much more complicated. Security systems for digital networks are computerized in order to protect vital information and important assets. However, this increased security comes with increased surveillance. All security systems have inherent risks, which means it is a question of what risks are acceptable and what freedoms can be forfeited. Ultimately, IT professionals need to balance risk with freedom to create a security system that is effective and ethical at the same time.
Security Liability
139
It becomes a high priority issue with the great advancement in technology. E-commerce and Electronic payment systems evolution on the internet heightened this issue for various corporate organizations and government agencies. Network on the internet cannot be made secure from unauthorized access. Generally, the intrusion detection systems are used to determine whether the user is an intruder or an appropriate user.
Access Right
140
In the computer ethics this refers to the damage or negative consequences such as loss of important information, loss of property, loss of ownership, destruction of property and undesirable substantial impacts. This principle of ethical conduct restricts any outsiders from the use of technology in manner which leads to any loss to any of the users, employees, employers and the general public. Typically, these actions comprise of the intentional destruction or alteration of files and program which drives a serious loss of resources. To recover from this, extra time and efforts are required to remove the viruses from the computer systems.
Harmful Actions
141
The United States has even passed legislation allowing the government to actively monitor private citizens in the name of national security. These measures have revived a debate about what information can be gathered and why. This debate applies on a smaller scale as well because companies need to consider what information to collect from their employees. This issue invokes a question of consent.
Data gathering
142
It refers to an act of installing a copy of software into one’s computer without permission, and/or producing a copy disregarding the copyrights.
Software piracy