CSE3 FINAL Flashcards

1
Q

Who was known as an interpreter and promoter of Babbage’s visionary work, wrote a plan using the analytical machine to calculate Bernoulli sequences, AND was the first computer programmer.

A

Augusta Ada King, Countess of Lovelace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In 1943, who led a team to complete the Colossus? (considered to be the first electronic digital computer)

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who was the key to breaking Enigma - the German military’s chief cipher machine?

A

Alan Turing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define the Turing Test

A

A basic test for artificial intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who invented the compiler in 1952?

A

Admiral Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who created one of the first programming languages?

A

Admiral Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What was one of the first programming languages?

A

COBOL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who coined the term “debug”

A

Admiral Grace Hopper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What did the term “debug” refer to, what did it come from?

A

Referred to an actual moth stuck in the Harvard II computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of device was used in early computers?

A

Vacuum tubes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What device replaced vacuum tubes starting in 1956?

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By the mid-1960s transistors were replaced by what?

A

integrated circuits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are integrated circuits commonly known as?

A

silicon chips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A byte is how many bits?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A kilobyte is how many bytes?

A

1 thousand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A megabyte is how many bytes?

A

1 million

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A gigabyte is how many bytes?

A

1 billion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A terabyte is how many bytes?

A

1 trillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A petabyte is how many bytes?

A

1 quadrillion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is speed often expressed in?

A

megahertz (MHz) or gigahertz (GHz)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Typical Desktop PC processors have how many GHz per core?

A

1.5 - 3.0 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Modern desktops typically have what kind of processors (2)?

A

Dual-core or quad-core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

GHz is analogous to what?

A

clock ticks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

1 GHz is capable of handing how many machine cycles per second?

A

1 billion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What company that is the largest CPU manufacturer, uses GHz rating?
Intel
26
What does CPU stand for?
central processing unit
27
What company that is the primary non-intel CPU manufacturer, used a different rating system for years, but now uses GHz as well?
AMD
28
Define Gordon Moore's real version law
the number of transistors that can be inexpensively placed on an integrated circuit doubles every 2 years.
29
What are popular variants of Moore's law? (2)
-transistors will double every 18 months -processing speed and storage capacity will double every 18 months
30
What was the frequently ignored addendum by Gordon Moore with Moore's law?
the exponential growth can't continue forever. miniaturization will eventually approach atomic sizes.
31
What law is a description of a modern trend, not a true physical law?
Moore's law
32
What number does 00010011 represent?
first 1 = 1 then 2nd 1 = 2, the next 0 = 4 and the other 0 = 8 and the 1 = 16 (reading from right to left) and then ignore the other 0s in front and add the numbers that are only in the 1 position = 16 + 2 + 1 = 19, answer = 19
33
How many symbols can be used for all numbers to be represented or calculated in the binary number system?
2 symbols (1 and 0)
34
What device can translate the touch on a numeric keypad into a series of 0s and 1s?
A calculator
35
For the binary number system, the positional values for the numbers are each at a power of what?
Positional values are each at a power of 2
36
What was input device was developed in 1936 to improve efficiency for keyboard usage and didn't require as much hand movement?
The Dvorak Keyboard
37
Define resistive screens
the edges omit horizontal and vertical light beams
38
Define capacitive screens
creates a electromagnetic field, blocked by the electromagnetic field of your skin
39
What kind of touch screen allows for multi-touch input?
capacitive screens
40
This device allows for the input and output to be from the same device, is a good system where a keyboard would be cumbersome, and is now common on smartphones, tablets, and some laptops.
Touch screens
41
What does UPC stand for
universal product code
42
What kind of code is a pattern of vertical marks?
Universal product code (UPC)
43
Bar code readers read code in what direction?
horizontally
44
This kind of code can be stored horizontally and vertically, can store ~4000 alphanumeric characters, and is typically used for web addresses.
QR codes and readers
45
What does OMR stand for?
optical mark recognition
46
What does OCR stand for?
optical character recognition
47
What does MICR stand for?
Magnetic Ink Character Recognition
48
What kind of optical recognition machine senses marks on paper, fill-in sheets, and pink scantron marks?
OMR, optical mark recognition
49
What kind of optical recognition recognizes individual letters of text or otherwise just copying dots?
OCR, optical character recognition
50
What kind of font is readable by humans and machines and the typeface was developed by American National Standards Institute?
MICR, Magnetic Ink Character Recognition
51
What kind of printer is a laser beam reflected off a rotating drum to create patterns of electrical charges?
Laser printers
52
What do the electrical charges from laser printers attract?
toner, a fine colored powder, which is then heated to fuse to the paper
53
What are 3 ways that the laser printers differs from inkjet printers?
-they are faster -more expensive -have high resolution print output
54
what kind of printer sprays ink onto paper to produce printed text and graphic images?
inkjet printer
55
What is 1 way that the inkjet printers differ from laser printers?
-higher quality color for less $, liquid ink creates more vivid and accurate color than combinations of different colored toner
56
What kind of disk provides inexpensive, portable storage?
floopy disk
57
why are floppy disks not used for modern purposes?
holds too little data
58
what kind of disk is non-removable, rigid disks that spin continuously and rapidly?
hard disks
59
The US Constitution, Article I, Section 8, gives Congress the power to enact statues that...
Promote the progress of science and useful arts, by securing the limited rights to authors and inventors the exclusive right to their respective writings and discoveries
60
How many years does the author have for copyright?
70 years + life of author or up to 120 years for works of corporate authorship
61
How many years was copyright before the Bono Act of 1998?
50 years + life of author
62
Copyright covers what?
ideas and creative works
63
Patents cover what?
inventions
64
How many years do patents last?
typically 20 years from application date
65
Allows for free speech and free exchange of information over the internet, while still providing copyright holders a method to remove infringing content.
DMCA Safe Harbor provisions
66
What does DMCA stand for?
Digital Millennium Copyright Act
67
Under the Fair Use act exceptions are made for duplicating copyrighted content, what are the 2 exceptions?
-for criticism or commentary (includes parody, even for commercial gain) -for teaching, scholarship, or research
68
What is Linus Torvalds best known for?
As the creator of Linux
69
What is Linux?
The Linux kernel is an open source operating system core
70
Who created Git?
Linus Torvalds
71
Define what Git is.
-used to track changes in programming files modified by multiple authors
72
What is the large repository of open source software
Github
73
Name 3 specific Linux Distributions
-Ubuntu -CentOs -Fedora
74
Which Linux distribution is the easiest starting point?
Ubuntu
75
Define Natural Languages
resemble languages spoken by humans
76
Define Programming languages
falls between machine language and natural human languages
77
What device translates programming language into machine language?
Compilers
78
What are some examples of compilers?
-C++ -Javascript -Perl -PHP
79
Define machine language
numeric codes that represent data
80
What are trials by internal users that have very select groups?
alpha testing
81
what are trials by external users that are usually by volunteers?
beta testing
82
Newer releases of software usually have what?
-additional features (major updates often come with problems of their own) -fixes of previous bugs
83
What are minor fixes called for software that are usually available for free?
patches
84
What is the "software insiders' advice" in lecture?
never buy version 1.0 of anything
85
What kind of program can "pretend" to be another operating system or hardware device and can run programs written for that system?
Emulator program
86
What are 2 cons of emulator programs?
-not all applications work perfectly -can cause a drop in system performance, especially with resource/graphics intensive applications
87
What kind of systems are easier to emulate for emulator programs?
older systems
88
Commercial software is copyrighted so it can't be legally duplicated for distribution to others, so authors can do what?
Licensing
89
a document that provides legally binding guidelines for the use and distribution of software.
Software licensing
90
the practice of using one license to authorize software on a large number of computers and/or for a large number of users.
Volume licensing
91
Software is distributed via (3)
-direct sale -retail stores -web sites
92
What does EULA stand for
End-User License Agreement
93
Define EULA – End-User License Agreement
grants a person or organization the right to use a software application.
94
What are small programs that enable input/output (I/O) devices - keyboard, mouse, printer, and others - to communicate with the computer
device drivers
95
what kind of device is included with the operating system or bundled with peripherals, examples include mice and keyboard
device drivers
96
what are the most troublesome device drivers
video drivers, printer drivers
97
New PCs include hardware compatible with the newest windows, not what version of windows
older
98
Automated backup systems can do what?
-back up every night before you sleep -can remind you to back up every 2 weeks
99
1 backup is not enough for what kind of data
irreplaceable data
100
what is smart to do with crucial data
-back up crucial data in multiple locations
101
What services are very secure for data backups?
dropbox or google drive
102
Every year of its life, a hard drive has a rough (what percent) chance of sudden death
12%
103
what kind of data is replaceable?
movies, music, books
104
what kind of data is irreplaceable?
personal photos, videos, writings
105
What kind of hard drive is less mechanically reliable than internal hard drives?
external hard drives
106
Laptop hard drives are more subject to .....
-coffee spills -theft -gravity
107
define database program
a software tool for organizing the storage and retrieval of information
108
define database
a collection of information stored in an organized form in a computer
109
A database is typically composed of 1 or more ____ or _____ or _____
-tables -related information -records
110
What is the information relating to one person, product, or event
a record
111
Each discrete piece of information in a record is a _____
field
112
the type of information a field can hold is determined by its ____
-field type or sometimes called data type or field data type -data type = text or numeric, ex: data, GPA, account balance, name, major, etc
113
What are 2 ways to view data in database programs
-form views -list views
114
What kind of way to view data is only one record at a time
form views
115
what kind of way to view data is displayed with several records in lists similar to the way a spreadsheet displays data
list views
116
What does SQL stand for
structured query language
117
118
define what SQL is (structured query language)
-domain-specific language used to manage data, especially in a relational database management system -most modern database management programs support a standard language for programming complex queries called SQL
119
What are pros and cons of SQL
-available for many database management systems -programmers/sophisticated users don't need to learn new languages when they work in new systems -graphical user interfaces allow point-click queries CON -insulates users from the complexities of the query language
120
What is a special purpose database program that is pre-programmed for specific data storage and retrieval purposes?
specialized database software
121
what is a special-purpose database program that includes geographic and demographic data in map form?
geographical information systems (GIS)
122
what does GIS stand for
geographical information systems
123
What are 3 reasons why somebody would use data compression?
-faster transmission over a network -removes redundant information (repeated text, sounds, images) -removes unnecessary information (sounds beyond the human hearing range, images too detailed to see at a given resolution)
124
Define lossy compression
some information is lost permanently
125
define lossless compression
all information can be restored on decompression
126
what is the difference between vector vs bitmapped graphics?
while bitmap images are made up of pixels, vector files are made up of lines described by equations. This means that as you zoom in on a bitmap image it will become “grainy” while a vector file will stay smooth and sharp.
127
what kind of graphic file format has max 255 colors per frame, supports animation and lossless compression
GIF
128
what kind of graphic file format offers full range of colors and lossy compression
JPG OR JPEG
129
what kind of graphic file format has lossless compression, full color range, very crisp and clear, but file sizes are too large they're better for infographics and banners than high resolution photos
PNG
130
what kind of graphic file format is newer, google-created image format that compresses existing JPGs and PNGs to smaller file sizes. Doesn't work on every browser or viewing software
WebP
131
What kind of graphic file formats has lossy compression, very small file sizes with good image quality and is not yet compatible with web browsers
HEIF
132
What does HEIF stand for?
high efficiency file format
133
what kind of graph file format has vector file format, scales perfectly when magnified, full color, lossless compression and large file sizes
PDF
134
What are digital audio formats that are standard formats for uncompressed audio for Windows and the Mac OS, respectively. Both formats are supported on Windows, Mac OS, and Linux. Both create large files. Both are lossless – a CD track encoded with ___ or ____ sounds identical to the original.
WAV, AIFF
135
Describe the digital audio format MP3
A popular format for transmitting audio on the Internet. A CD track converted to MP3 format can be 1/10 the size of the original – or smaller – but still sound very similar
136
Describe the digital audio format WMA
An alternative to MP3 developed by Microsoft for Windows. WMA compression can result in smaller files of higher fidelity. WMA files may be protected by DRM.
137
What is a digital audio format that is Apple’s alternative to MP3 and WMA is used primarily by iTunes and iTunes Music Store. ____ compression is sonically superior to MP3 compression. ______ files may be protected by DRM
AAC
138
Similar to WMA and AAC in sound quality and compression, ____ is open source and freely available – not controlled by any company.
OGG
139
Open Source format, compresses audio files by about 40-50%, losing no information along the way. The broadcast format of choice for many audiophiles and the European Broadcasting Union.
FLAC (Free Lossless Audio Codec)
140
What is a computer network
system of two or more computers linked together
141
How is networking important
people can, 1) Share hardware, reducing costs 2) Share data and programs, increasing efficiency 3) Work together in ways that were previously impossible
142
Commonly happens between LANs and WANs
Communication
143
the quantity of information that can pass through a communications medium in a given amount of time
Bandwidth
144
hardware devices or software programs that route messages as they travel between networks
Routers
145
an alternative to traditional networks, creates individual nodes for communication
Mesh Networks, used for small, temporary communication systems
146
generally defined as a “fast” connection
Broadband connection
147
Common forms of broadband connections are
cable, DSL, satellite
148
Provides fast network connections through cable television networks
Cable Modems
149
Uses standard phone lines, provided by phone companies
DSL
150
can connect computers to networks using radio waves rather than wires
High speed wireless
151
can deliver fast computer network connections as well as television programs
Satellite dishes
152
In 2015, the FCC redefined “broadband” to describe only connections of ___ mbps down/___ mbps up.
25, 3
153
How was the 2015 FCC broadband redefinition received
strenuously objected to by congress and is below Zoom's recommendation for use
154
Replacing copper cables, has more bandwidth than DSL and cable modems
Fiber optic connections
155
Can rapidly and reliably transmit mass multimedia while handling voice messages
Fiber optic connections
156
available on most web browsers, disables your browser history to keep it private from others with access to that computer
Private browsing
157
does NOT delete any records kept by other networks you are connected to
Private browsing
158
much more private browsing, connects to an anonymizing network that doesn’t reveal your true IP address to any site you connect to
TOR browser
159
Can be slow, is not completely invulnerable to dedicated investigation
TOR browser
160
if a legal offense is tied to a particular ___ address, additional verification is necessary to prove what person committed that offense
IP
161
What are some benefits of the browser Duck Duck Go
1) Privatizing search engine 2) Does not track your activity 3) Does not personalize your results
162
What does VPN stand for
Virtual Private Network
163
What is a disadvantage of free VPN services
The company will log and sell your browsing data
164
What are recommended VPN providers
1) IPVanish 2) ExpressVPN 3) NordVPN
165
Predecessor to the internet
ARPANET
166
What does ARPANET stand for
Advanced Research Projects Agency NETwork
167
When was ARPANET launched
1969
168
Who created ARPANET
Department of Defense
169
When did other networks take copy ARPANETS peer-to-peer networking philosophy and protocols
1980's
170
When was ARPANET disbanded
1990
171
breaks messages into packets
TCP
172
has all the information needed to travel from network to network
packet
173
Host system that determines how to route transmissions
router(s)
174
Address for the packets
IP
175
Every computer has an unique ___
IP address
176
IP address is comprised of four sets of numbers between ___ and ___. Each set of numbers is separated by a ______
0, 255, period
177
We are gradually moving from IPV_ to IPV_
4,6
178
How many addresses can you have in IPV4
2^32
179
How many addresses can you have in IPV6
2^128
180
Common types of internet fraud
Spoofing, Identity Theft, Phishing
181
presenting a false identity to trick others into divulging passwords and other private information
Spoofing
182
the use of computers and other tools to steal whole identities
Identity Theft
183
users “fish” for sensitive information under false pretenses
Phishing
184
Is a form of social engineering
Phishing
185
How can you avoid fraud committed over ebay or craiglist
do not use unusual payment methods and check seller reviews
186
malicious software, or any type of intentionally invasive, unwanted software.
Malware
187
Types of Malware are ______, ________, and _______
Trojan horse, Virus, Worm
188
performs a useful task while also running undesired or actively harmful routines
Trojan Horse
189
What are examples of a Trojan Horse
1) A bittorrent client that uses your processor to mine cryptocurrency. 2) An “anti-virus” program that installs ransomware.
190
spreads by making copies of itself from program to program
Virus
191
What can viruses do?
corrupt data, damage systems, spread malware/spyware - or often do nothing at all, created only as an intellectual challenge.
192
program that travels independently over computer networks, seeking uninfected sites
Worm
193
What are the four ways you may be granted access to a computer
Identity token, Passcode ID, Signature ID, Biometric ID
194
A key, an ID card with a photo, or a smart card containing digitally encoded identification in a built-in memory chip
Identity token
195
A password, an ID number, a lock combination, or a piece of personal history, such as your mother’s maiden name
Passcode ID
196
Your signature or your typing speed and error patterns
Signature ID
197
voice print, fingerprint, retinal scan, facial feature scan, or other measurement of individual body characteristics;
Biometric ID
198
What is Multi-Factor Authentication
The use of two or more of the four ways you may be granted access to a computer
199
the most common tool for restricting access to a computer system
Passwords
200
Effective passwords are:
1) Not real words 2) Not names 3) Changed frequently 4) Kept secret 5) Combines letters and numbers 6) Not shared across accounts
201
Using a real word or name in a password leaves you susceptible to what kind of attack
Dictionary attack
202
What does a dictionary attack do
tries every word in the dictionary as your password
203
Can be both hardware or software, logging all strokes made on a keyboard
Key Loggers
204
Scrambles a sent message using a key, different key is needed to unscramble the received message
Encryption software
205
Why is encryption software used
to make messages secure from outsiders
206
can protect computers from data loss during power failures
Uninterruptible power supply (UPS)
207
A common type of UPS
A laptop’s battery
208
shields electronic equipment from power spikes
Surge protectors
209
Device backups should be done
Regularly
210
What is best practice for backing up your device
Setting up automated backups