lets go Flashcards

(68 cards)

1
Q

Difference Engine

A

decimal-based mechanical calculator, created by Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analytical Engine

A

punch-card system to run arithmetic tasks, designed by Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Turing Machine

A

used binary pair of symbols to perform any mathematical computation if it were
representable by an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic Numerical Integrator and Computer (ENIAC)

A

built by University of Pennsylvania in
1946, first general-purpose electronic computer, covered 1000 sqft and was programmed with
dials, cables, and switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Universal Automatic Computer (UNIVAC)

A

first all-electronic digital computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARPANET

A

connected computers between universitys and research centers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

phone phreaks

A
  • hijacked the telephone system for the own purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Charles Babbage

A

Cambridge mathematician that created Difference Engine and Analytical
Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ada Lovelace

A

mathematician, often credited as first computer programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Alan Turing

A

mathematician, laid the groundwork for modern digital computers,
contributed to cracking the Enigma code in WWII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rear Admiral Grace Hopper

A
  • credited for use of the word “bug” for computer glitch after finding
    moth in relay contact of Harvard Mark II; creator of COBOL programming language
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

John Draper (Cap’n Crunch)

A

discovered that 2600 Hz tone from whistle from box of cereal
would provider Operator Mode to phone network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Steve Jobs and Steve Wozniak

A

early phone phreakers that would later found Apple Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ken Thompson & Dennis Ritchie

A

created UNIX operating system while working at Bell Labs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tim Berners-Lee

A

British scientist working at CERN, credited with creating the first website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Linus Torvalds

A

created Linux OS, released the source code for free

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The Hacker Ethic

A

Access to computers is a right
Hackers should be judged by their abilities
A do-it-yourself mentality of exploration and manipulation
General disregard for traditional rules and norms
An assumption that information should be open and available; the burden of proof is on those who want to maintain confidentiality (e.g. governments, corporations)
The use of anonymity (e.g. nicknames, anonymizing protocols) to protect against unjustified coercion by authorities
Distrust of authority—promote decentralization
The sharing of innovations among other like-minded individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Cyberspace Model (3 Layers)

A

Physical, Logical Network, and Cyber-Persona Layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Physical Layer (Cyberspace model)

A

hardware and infastructure that provide storage, transport, and process info within cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Logical Network Layer

A

elements related to one another in a way that is abstracted from physical network, based on the logic of the programming (the code)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

cyber persona layer

A

digital representation of the actor/entity consistents of user accounts (humans/automated)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tenants of Cybersecurity

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Confidentiality (Tenants of Cybersecurity)

A

Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary
information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Integrity (Tenants of Cybersecurity)

A

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Availability (Tenants of Cybersecurity)
Ensuring timely and reliable access to and use of information.
26
Hardware Components (4)
CPU Storage Peripherals Motheboard
27
CPU (Hardware Components)
Central Processing Unit: the brain of the computer; executes instructions and controls data flow to and from other parts of the computer
28
Storage (Hardware Components)
Volitile: Random Access Memory (RAM) - short-term memory; when you open a program it gets loaded into RAM; if the computer is shutdown, the contents in RAM are lost; faster, smaller, more expensive nonVolitile: long-term memory; contents remain after the computer is shutdown
29
Peripherals (Hardware components)
components attached to the computer to increase capabilities; e.g. keyboard, mouse, monitor, webcam, printer, scanner, etc.
30
Motherboard (hardware components)
green backplane that interconnects all of the hardware components
31
CPU 3 step
Fetch: the next instruction from as a block of bytes Decode: the bytes to determine what action the instruction specifies Execute: the action encoded in the instruction CPU performs these steps hundreds of millions of times per second.
32
Windows File Hierarchy | root drive and hime directory
Root Drive: C: Drive Home Directory: C:\Users\m283366\
33
Linux File Hierarchy
Root Directory: / Folder Home Folder: /home/mids/m283366/ folder
34
file
: a file on a computer is simply a sequence of bytes
35
file format
the rules that define how the bytes of a particular file are supposed to be interpreted (e.g. JPEG files, PDF files, PowerPoint presentations, etc)
36
file extension
the last part of the filename (e.g. .pdf, .jpg, .pptx) that operating systems (MS Windows) and programs use to tell them the file type; however, the extension does not reliably tell you the file type
37
file header
a short sequence of data the head, or beginning, of the actual file data; viewing files in a HEX editor like frhed allows you to see the bytes of the file in HEX
38
Bit
an individual 0 or 1 value
39
nibble
a chunk of 4 bits (e.g. 0010)
40
Byte
chunk of 8 bits (e.g. 00010011)
41
File
a sequence of bytes
42
Operating System (OS)
a program (or collection of programs) that manages the physical computer and the programs that run on it (programs managing programs). EX: iOS, Windows, UNIX
43
File Operations (types of system services)
a program (or collection of programs) that manages the physical computer and the programs that run on it (programs managing programs).
44
Network Connections (types of system services)
the OS can actually send or receive data to/from a computer's wired or wireless connection
45
User Accounts, Permissions, and Logins (types of system services)
the OS ensures that users log in properly and can only access the things they're supposed to
46
Processes (types of system services)
the OS manages the Programs as they execute
47
3 ways to access OS
1. GUI (Graphical User Interface) 2. The Shell 3. Application Programming Interface
48
GUI (How to access OS)
the stuff you click on or use your fingers on a touch screen to interact with
49
the shell (how to access OS)
shell allows commands for the OS to be entered as plain text strings. The shell is an OS interface for both Programs and users.
50
API (how to access OS)
The Application Programming Interface direct way for a Program to ask the OS to do something. The API is an interface exclusively for Programs
51
Shell Command Structure
Command - Command Option - Argument
52
Command name (Shell Command Structure)
a shell command is a request to have a Program executed, and name is literally the name of the Program you want executed
53
option (shell command structure
special arguments that start with a / or - character in Windows (with a - character in UNIX), they modify the operation of the given command
54
command arguments (shell command structure)
provide the command with the information it needs to operate
55
server (World Wide Web)
a computer (and associated programs) that provides a service
56
client (World Wide Web)
a computer (or program) that uses a service provided by a server (e.g. the Browser is a "Web Client")
57
protocol (World Wide Web)
an agreement about communication between two communicating parties -- a complete specification of what things can be said, what responses can and must be made, and what these things mean
58
website
a collection of one or more files that contain the content you see displayed when you visit a website with your browser. These files include the main webpage, but also image files, script files (that make the webpage do things), and other files.
59
web server
Web servers are computers (and the software running on them) that exist to supply website content, using the HTTP or HTTPS protocol, on demand
60
web client
Browser: For a user, and for this course, a web client is just a browser, such as Chrome, Firefox, IE, or Opera.
61
web vs internet?
Web — web servers, web clients. HTTP and HTTPS protocols. Internet — includes web, but also includes e-mail, streaming media, VOIP, chat, internet gaming, etc., plus all the communications hardware and protocols to connect them.
62
URL
Uniform Resource Locator tells browser where to find item/name of item
63
parts to a URL
scheme // authority // path // query // fragment
64
scheme
most browsers support several protocols, including http and https for client-server web traffic
65
Authority
authority: the server is specified by a domain name — something like www.cnn.com or en.wikipedia.org
66
path
The "content" of a web server can be thought of as a hierarchical structure of files, similar to a directory on a Windows or UNIX system. The path is a relative path from some point in the server's file system
67
query
relevant to server-side scripting; name-value pairs submitted to the server from the form on a web page
68
fragment
markers that allow browsers to jump to specific point on a webpage