Computer History/Architecture Vocab Flashcards
abacus
one of the earliest predecessors of modern-day computers; first calculating tool invented around
2500-3000 BC
ALU
arithmetic logic unit; carries out all the basic math for the computer; part of the CPU
amplifiers
device used to make sure all the light gets to the destination, by amplifying the light
when it gets weak
ARPANET
first network system; created during the Red Scare
binary code
language of computers; stores things in 0 and 1
bits
smallest unit of information; 1s and 0s that make up information for a computer to store; one character
brutal force attacks
when a hacker directly compares the coding and encryption of passwords to a
code, they find the match and gain access to data, try every combination of code
bus
wires that carry data
bytes
8 bits; 8 characters
COLLUSUS
set ofcomputersdeveloped by British codebreakers in the years 1943–1945 to help
in the cryptanalysis of the Lorenz cipher
computer architecture
structure of a computer brain
computer ethics
whether something you do on the internet is right or wrong
control unit
part of the CPU that directs the computer traffic and decodes binary code; tells operating instructions what to do and when to do it
CPU
central processing unit; carries out instruction of a computer program
cross-site scripting
when a hacker attacks a comment section and plants malicious code in it; CPU does not know the code is just a comment and runs the code along with its normal functions; can cause the computer to shut down the system or delete everything
cyberattack
attempt by hackers to damage or destroy a computer network or system
cybersecurity
being protected online
cryptoware malware
encryptsfiles and demands money; only way to get the description key
is to make a payment and hope they release the computer
data flow
how your data travels to and from your computer
data packets
packets data is broken up into to be transferred
denial of service
a hacker overwhelms a server with so much information and data that the server
can not do its intended function
dictionary attack
hackers use a dictionary software to scan different common passwords to guess
and check to gain access
digital camera
input device
digital printer
output device
ENIAC
electronic numerical integrator and computer; machine invented by John Mauchly
and Presper Eckert to be used in World War II; first programmable
electronic digital computer until the secret of the Colossus was revealed
gigabytes
1,000 megabytes; 1,000 books, photos, or 16 hrs of music
hardware
physical computer parts
input
how you communicate with the computer; what you put into the computer
IP address
unique address used for identification on the internet
John van Neumann
Hungarian-American mathematician who made many great advancements in
computer science and developed the concept of von Neuman architecture
joystick
input device
keyboard
input device
keyloggers
watches everything you key on the internet
kilobytes
1,000 bytes; 1/3 page of text
LAN
local area network; all the computers in a building would make up a
local area network; connectedto a single router
malware
malicious software
Manchester baby
first computer to utilize a stored program
MITB
man in the browser; malware infects your computer and steals your information by
sending it to a browser or app; the app then sends the information to the hacker instead of you doing it
directly
MITM
man in the middle; compromised computer will hack a smaller one, get the smaller
computer to send information to the hacked one, and the hacked one send the compromised
information to the final target destination
memory
storage for computer
microphone
input device
moore’s law
theory made by Gordon Moore that transistors double in a dense integrated circuit
about every 2 years
mouse
input device
optical fibers
make light travel
output
how the computer communicates with you; what you get out of the computer
phishing
process of stealing information by sending encrypted emails or typing your information into a corrupt website
RAM
random accessing memory; main memory; short term memory where data is stored as the processor needs it; can be easily destroyed
ransomware
locks the computer and demands money
refractive index
measure show fast light travels through an object
registers
holding place for info; memory locations with specific purposes; a quick easy place to access the information for
the CPU; part of the CPU
repeaters
device used to make sure all the light gets to the destination, by renewing the power of
the light when it gets weak
ROM
read only memory; once it is saved it cannot be changed; cannot be destroyed; operating system instructions are here; also called BIOS
rootkits
run as part of the operating system by taking over the operating system; invisible to the rest of the system and would not show up in the Task Manager; deep in the computer
router
receives and analyzes data and routes information to where it is supposed to go; way for data travel; finds the fastest route
scanners
input device
scareware
malware gets a userto pay moneyby scaring or threatening them
secondary memory
outside of the computer used for storage of files or backup; memory that is easily reached, changed, or moved; lash-drives, CD, external hard-drive, the Cloud, memory cards, floppy disks, etc.
software
instructions/codes that tell the computer what to do; non-physical things within a computer
spyware
watches you for purposes of advertising, identity theft, fraud; watches your browser to see what you search and using a keylogger to get info
SQL injection
hacker enters a command in a text in box; can delete an entire database
terabytes
1,000 gigabytes; 1,000,000 books, photos, or 2 years of continuous music
touchscreen
input device
trojan horse
disguises the virus tricking you to run the software
vishing
impersonate someone else in order to bait out
information from clueless or vulnerable individuals; Vishing=Voice
voice input
input device
Von Neumann architecture
memory of a
computer should store both the memory and data
WAN
wide area network; connects computers far away from each other; multiple
routers and specialcables
wannacry worm
installs ransomwarethat takes your system over and demands payment
whaling
hacker targets a high level individual in a organization to get their login information
to do more damage in a large corporation
worms
self-replicating virus; moves very quickly
What are the four tasks a computer must be able to do?
input, process, store, output
Who is known as the father of computers?
Charles Babbage
Ethernet
wires that connect computers
WiFi
wireless fidelity; connects computers using radio waves
WiFi
wireless fidelity; connects computers using radio waves
virus
runs with user intervention; user opens a file
botnets
turn your computer into a robot which waits on a third party to tell it what to do
megabyte
1,000 kilobytes; 1 book, photo, or min of music
What initially happens to data when you send a file?
It is broken into packets of information (puzzle pieces).
What happens when the packets reach the destination?
They are re-assembled.
What 2 factors affect how fast your data travels on the Internet?
file size and internet speed
What route will your data take on the Internet?
packets will be directed by the router; Input Devices (controlled by CPU) to
CPU to
Output (Controlled by CPU, but interactive with memory) to
Memory to
Secondary Storage (internal memory cannot store the files; they are too big for internal memory) to
“Bus” (Connects the components)
What device directs traffic on a computer?
router
What information is common to each packet?
Every packet carries the ISP of the computer that is sending the file.
algorithm
finite sequence of well-defined, computer-implementable instructions, typically to solve a class of problems or to perform a computation
What are algorithms used for?
solve a problem or complete a task
examples of an algorithm
the recipe for baking a cake, the method we use to solve a long division problem, the process of doing laundry, and the functionality of a search engine