lets go Flashcards

1
Q

Difference Engine

A

decimal-based mechanical calculator, created by Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analytical Engine

A

punch-card system to run arithmetic tasks, designed by Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Turing Machine

A

used binary pair of symbols to perform any mathematical computation if it were
representable by an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic Numerical Integrator and Computer (ENIAC)

A

built by University of Pennsylvania in
1946, first general-purpose electronic computer, covered 1000 sqft and was programmed with
dials, cables, and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Universal Automatic Computer (UNIVAC)

A

first all-electronic digital computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARPANET

A

connected computers between universitys and research centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

phone phreaks

A
  • hijacked the telephone system for the own purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Charles Babbage

A

Cambridge mathematician that created Difference Engine and Analytical
Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ada Lovelace

A

mathematician, often credited as first computer programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alan Turing

A

mathematician, laid the groundwork for modern digital computers,
contributed to cracking the Enigma code in WWII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rear Admiral Grace Hopper

A
  • credited for use of the word “bug” for computer glitch after finding
    moth in relay contact of Harvard Mark II; creator of COBOL programming language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

John Draper (Cap’n Crunch)

A

discovered that 2600 Hz tone from whistle from box of cereal
would provider Operator Mode to phone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steve Jobs and Steve Wozniak

A

early phone phreakers that would later found Apple Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ken Thompson & Dennis Ritchie

A

created UNIX operating system while working at Bell Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tim Berners-Lee

A

British scientist working at CERN, credited with creating the first website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Linus Torvalds

A

created Linux OS, released the source code for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Hacker Ethic

A

Access to computers is a right
Hackers should be judged by their abilities
A do-it-yourself mentality of exploration and manipulation
General disregard for traditional rules and norms
An assumption that information should be open and available; the burden of proof is on those who want to maintain confidentiality (e.g. governments, corporations)
The use of anonymity (e.g. nicknames, anonymizing protocols) to protect against unjustified coercion by authorities
Distrust of authority—promote decentralization
The sharing of innovations among other like-minded individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cyberspace Model (3 Layers)

A

Physical, Logical Network, and Cyber-Persona Layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Layer (Cyberspace model)

A

hardware and infastructure that provide storage, transport, and process info within cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logical Network Layer

A

elements related to one another in a way that is abstracted from physical network, based on the logic of the programming (the code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

cyber persona layer

A

digital representation of the actor/entity consistents of user accounts (humans/automated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tenants of Cybersecurity

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Confidentiality (Tenants of Cybersecurity)

A

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Integrity (Tenants of Cybersecurity)

A

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Availability (Tenants of Cybersecurity)

A

Ensuring timely and reliable access to and use of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Hardware Components (4)

A

CPU
Storage
Peripherals
Motheboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CPU (Hardware Components)

A

Central Processing Unit: the brain of the computer; executes instructions
and controls data flow to and from other parts of the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Storage (Hardware Components)

A

Volitile: Random Access Memory (RAM) - short-term memory; when you open a
program it gets loaded into RAM; if the computer is shutdown, the contents in
RAM are lost; faster, smaller, more expensive

nonVolitile: long-term memory; contents remain after the computer is
shutdown

29
Q

Peripherals (Hardware components)

A

components attached to the computer to increase capabilities; e.g.
keyboard, mouse, monitor, webcam, printer, scanner, etc.

30
Q

Motherboard (hardware components)

A

green backplane that interconnects all of the hardware components

31
Q

CPU 3 step

A

Fetch: the next instruction from as a block of bytes
Decode: the bytes to determine what action the instruction specifies
Execute: the action encoded in the instruction

CPU performs these steps hundreds of millions of times per second.

32
Q

Windows File Hierarchy

root drive and hime directory

A

Root Drive: C: Drive

Home Directory: C:\Users\m283366\

33
Q

Linux File Hierarchy

A

Root Directory: / Folder

Home Folder: /home/mids/m283366/ folder

34
Q

file

A

: a file on a computer is simply a sequence of bytes

35
Q

file format

A

the rules that define how the bytes of a particular file are supposed to
be interpreted (e.g. JPEG files, PDF files, PowerPoint presentations, etc)

36
Q

file extension

A

the last part of the filename (e.g. .pdf, .jpg, .pptx) that operating
systems (MS Windows) and programs use to tell them the file type; however, the
extension does not reliably tell you the file type

37
Q

file header

A

a short sequence of data the head, or beginning, of the actual file data;
viewing files in a HEX editor like frhed allows you to see the bytes of the file in HEX

38
Q

Bit

A

an individual 0 or 1 value

39
Q

nibble

A

a chunk of 4 bits (e.g. 0010)

40
Q

Byte

A

chunk of 8 bits (e.g. 00010011)

41
Q

File

A

a sequence of bytes

42
Q

Operating System (OS)

A

a program (or collection of programs) that manages the
physical computer and the programs that run on it (programs managing programs).

EX: iOS, Windows, UNIX

43
Q

File Operations (types of system services)

A

a program (or collection of programs) that manages the
physical computer and the programs that run on it (programs managing programs).

44
Q

Network Connections (types of system services)

A

the OS can actually send or receive data to/from a computer’s wired
or wireless connection

45
Q

User Accounts, Permissions, and Logins (types of system services)

A

the OS ensures that users log in properly and can
only access the things they’re supposed to

46
Q

Processes (types of system services)

A

the OS manages the Programs as they execute

47
Q

3 ways to access OS

A
  1. GUI (Graphical User Interface)
  2. The Shell
  3. Application Programming Interface
48
Q

GUI (How to access OS)

A

the stuff you click on or use your fingers on a touch
screen to interact with

49
Q

the shell (how to access OS)

A

shell allows commands for the OS to be entered as plain text strings. The shell is
an OS interface for both Programs and users.

50
Q

API (how to access OS)

A

The Application Programming Interface

direct way for a Program to ask the OS to do something. The API is an interface exclusively for Programs

51
Q

Shell Command Structure

A

Command - Command Option - Argument

52
Q

Command name (Shell Command Structure)

A

a shell command is a request to have a Program executed, and name is literally the name of the Program you want executed

53
Q

option (shell command structure

A

special arguments that start with a / or - character in Windows (with a - character in UNIX), they modify the operation of the given command

54
Q

command arguments (shell command structure)

A

provide the command with the information it needs to
operate

55
Q

server (World Wide Web)

A

a computer (and associated programs) that provides a service

56
Q

client (World Wide Web)

A

a computer (or program) that uses a service provided by a server (e.g. the
Browser is a “Web Client”)

57
Q

protocol (World Wide Web)

A

an agreement about communication between two communicating
parties – a complete specification of what things can be said, what responses can and must be made, and what these things mean

58
Q

website

A

a collection of one or more files that contain the content you see displayed when
you visit a website with your browser. These files include the main webpage, but also image
files, script files (that make the webpage do things), and other files.

59
Q

web server

A

Web servers are computers (and the software running on them) that exist to
supply website content, using the HTTP or HTTPS protocol, on demand

60
Q

web client

A

Browser: For a user, and for this course, a web client is just a browser, such as
Chrome, Firefox, IE, or Opera.

61
Q

web vs internet?

A

Web — web servers, web clients. HTTP and HTTPS protocols.
Internet — includes web, but also includes e-mail, streaming media, VOIP, chat, internet
gaming, etc., plus all the communications hardware and protocols to connect them.

62
Q

URL

A

Uniform Resource Locator
tells browser where to find item/name of item

63
Q

parts to a URL

A

scheme // authority // path // query // fragment

64
Q

scheme

A

most browsers support several protocols, including http and https for client-server web
traffic

65
Q

Authority

A

authority: the server is specified by a domain name — something like www.cnn.com or
en.wikipedia.org

66
Q

path

A

The “content” of a web server can be thought of as a hierarchical structure of files, similar to a
directory on a Windows or UNIX system. The path is a relative path from some point in the server’s
file system

67
Q

query

A

relevant to server-side scripting; name-value pairs submitted to the server from the form on a
web page

68
Q

fragment

A

markers that allow browsers to jump to specific point on a webpage