Introduction to Computer Fundamentals Flashcards
analyze and transform data in a wide range of forms
computers
provide the foundation for comprehending and utilizing the potential of current computing technologies
Computer basics
capable of transforming data into valuable information
computers
Emerging Technologies
Artificial Intelligence, quantum computing, Internet of Things (IoT)
Types of Computer
Super Computer, Mainframe Computers, Minicomputers (Midrange Computers), Workstations, Personal Computers (PCs), Tablet Computers, Smartphone, Embedded Computer, Quantum Computers (Emerging Technology)
strongest and fastest computers in use; designed to analyze vast volumes of data quickly and efficiently while carrying out sophisticated computations
Super Computer
uses includes scientific research, weather forecasting, nuclear simulations, molecular and climate modeling
Super Computer
Enormous, potent computers with several processors and large amounts of storage; have a reputation for dependability, security, and capacity to manage huge amounts of data and transactions at once
Mainframe Computers
uses include management of databases, processing of financial transactions, operation of enterprise-level applications
Mainframe Computers
also known as Midrange Computers
Minicomputers
can process large amounts of data; multi-user settings frequently employ them
Minicomputers
uses include serving small to medium sized organizations, engineering, scientific research
Minicomputers
less costly than supercomputers but more powerful than PCs
Workstations
designed for specific activities such as 3D rendering, CAD, scientific simulations
Workstations
Uses include graphic design, architecture, engineering, jobs that demand a lot of computer power
Workstations
most popular sort of computer
Personal Computers (PCs)
may be found in both desktop and laptop configurations; general-purpose operating systems; meant for personal usage
Personal Computers (PCs)
uses include office work, internet surfing, gaming, multimedia entertainment
Personal Computers (PCs)
small, portable, touchscreen tablets without physical keyboard; made to be mobile and simple to use
Tablet Computers
uses include online browsing, email, reading e-books, running mobile apps, healthcare, education
Tablet Computers
compact, pocket-sized gadgets with strong processing capabilities; integrate functions for computer, multimedia, and communication
Smartphone
uses include making calls, sending messages, email, social networking, navigation, gaming, photography, other mobile apps
Smartphone
specialized systems incorporated into other machines or equipment; made to carry particular tasks
Embedded Computer
uses include home appliances, vehicle systems, medical equipment, industrial gear
Embedded Computer
building blocks for calculations of quantum computers
Quantum bits (qubits)
might be exponentially more efficient than traditional computers in solving complicated issues
Quantum Computers
uses include resolving challenging scientific, cryptography, and optimization issues
Quantum Computers
Components of a computer
Central Processing Unit (CPU), Memory (RAM), Storage Devices, Input Devices, Output Devices, Motherboard
known as the “brain” of the computer
CPU
responsible for carrying out computations and executing commands
CPU
short-term storage area where the computer keeps active data and instructions
Memory (RAM)
primary circuit board; links and enables communication between all parts
motherboard
made up of programs, applications, and operating system
Software
controls hardware resources
Operating System (OS)
three most popular operating system
Windows, macOS, Linux
Types of Mobile Operating System
iOS, Android, Blackberry OS, Windows Phone OS, Symbian, WebOS, Windows Mobile
open source OS created by Google
Android
proprietary, closed-source OS created by Microsoft
Windows Phone OS
Nokia devices on the original smartphone OS
Symbian
originally intended for cellphones, now utilized with smart TVs
WebOS
mobile and pocket PC version created by Microsoft
Windows Mobile
serves as the raw material from which information is derived and may require processing to become useful information
data
end result of processing data; purpose is to provide knowledge or facilitate decision-making
information
created by programmers to train computers to do specified tasks; teaches the computer what to do
algorithms
used to create code that implements these techniques
programming languages
programming languages (according sa module lang!!)
Python, Java, C++
enable computers to exchange information, resources, and services over long distance
Computer Networks
Types of Connectivity and Network
Wired Networking, Wireless Networking, Cellular Networking, Satellite Networking, Peer-to-Peer (P2P) Networking, Virtual Private Networks (VPNs), Cloud Networking, Software-Defined Networking (SDN), Industrial Networking, Intranet and Extranet
Types of Wired Networking
Ethernet, Fiber Optic, Coaxial Cable
provides dependable, fast connectivity; one of the most popular forms of wired networking, connecting devices to a local area network (LAN) or the internet using cables (often CAT5e or CAT6)
Ethernet
convey data via light; provide incredibly high capacity and long-distance communication
Fiber Optic
frequently used in data centers and for high-speed internet backbones
Fiber Optic
bandwidth and signal quality are good; frequently employed in cable television and high-speed internet connections
Coaxial Cable
Types of Wireless Networking
Wi-Fi, Bluetooth, NFC (Near Field Communication), Zigbee and Z-Wave
permits wireless short-range communication between devices; frequently used for data transmission and contactless payments
NFC (Near Field Communication)
intended for low-power, low-data-rate uses (such as IoT and smart homes)
Zigbee and Z-Wave
gives mobile devices wireless internet connection; include 3G, 4G, LTE, 5G
Cellular Networking
internet connection in remote or rural locations where wired or cellular networks would not be accessible is made possible; makes use of satellites circling the Earth
Satellite Networking
devices connect without the need of a central server; frequently utilized for decentralized apps and file sharing
Peer-to-Peer (P2P) Networking
establish private, secure connections across a public network, often the internet
Virtual Private Networks (VPNs)
frequently utilized to provide remote access to private networks and safeguard the privacy of data
Virtual Private Networks (VPNs)
enables remote access to data and apps for both organizations and people
Cloud Networking
sends data packets
data plane
controls network traffic
control plane
networking strategy that divides the data plane from the control plane; more flexibility and control over network resources
Software-Defined Networking (SDN)
connects machines, sensors, and control systems in manufacturing and automation environments
Industrial Networking
Examples of Industrial Networking
Profibus, Modbus, Ethernet/IP
serve as a platform for cooperation and internal communication
Intranet and Extranet
provide limited access to the public
Extranets
internal networks that are only accessible by members of the company
Intranets
integral aspect of the digital age
Security and Privacy
Types of Security
Cybersecurity, Physical Security, Information Security, Network Security
policies and procedures used to guard against unwanted access, assaults, and damage to computer networks, systems, and data
Cybersecurity
Cybersecurity includes:
Firewalls, Antivirus Software, Encryption, Access Controls, Incident Response
filter network traffic and prevent malicious access
Firewalls
detect and remove malware
Antivirus Software
make it unreadable to unauthorized users
Encryption
implementing strong user authentication and authorization systems
Access Controls
having plans in place to address and recover from security breaches
Incident Response
includes defending physical asserts, data centers, and equipment from damage or theft in addition to protecting against digital threats
Physical Security
protecting the confidentiality, integrity, and availability of information; includes trade secrets, customer data, and proprietary information
Information Security
ensures safety of data transmission across networks, preventing eavesdropping or data interception
Network Security
Types of Privacy
Data Privacy, Online Privacy, Surveillance and Government Privacy
individuals’ control over their personal information and how it is collected, used, shared, and stored by organizations and institutions
Data Privacy
key aspects of data privacy
consent, data minimization, transparency, access and correction, data protection
collecting only the necessary data and nothing more
data minimization
concerns related to online activities; tools like VPNs and browser privacy settings help protect this
Online Privacy
significance of surveillance and government privacy
individual rights, trust, legal and regulatory compliance, business competitiveness, national security, ethical considerations
computer’s actual hardware
hardware
hardware is comprised of:
CPU, memory, storage devices, input/output devices
comprises of OS, programs, applications
software
software is comprised of:
OS, programs, applications