Midterms Flashcards
what monoalphabetic cipher do computers use?
ASCII
American Standard Code for Info Interchange
in ASCII, how many bytes is in 1 character?
1 byte
how many bits in 1 byte?
8 bits of 1’s or 0’s
how many diff things can 1 byte represent?
max byte is 1111 1111 = 255 + “zero” = 256 possibilities (2^8)
is ASCII enough?
for English, yes but for Chinese (>10,000 characters), Syrillic, Japanese, Korean, etc. not enough
how to create more possibilities for each character?
add more bytes
how many possibilites does 2 bytes have?
2 bytes = 16 bits
2^16 = 65,536 possibilities (1111 1111 1111 1111 + “zero”)
what code do modern documents use?
Unicode
how many bytes for each character does Unicode have?
4 bytes = 32 bits
2^32 = around 4 billion possibilities (theory)
2^31 (reality)
bit map
black & white representation of something using bits as pixels
megabyte
1 million bytes
how can a large pic be more than 1 million bytes?
color, brightness, hue, etc.
how do u add color into a picture?
1 pixel = 3 bytes and each byte represents a primary color (red, green, blue)
in each byte, there are 256 possibilities of red, green, & blue which u can mix to create a wide array of colors
how come the primary colors in comp’s r diff than normal primary colors?
comp’s use light instead of paint
megapixel
1 million pixels
pixel
3 bytes
how many megabytes r in 1 megapixel?
3 million megabytes
what r the dimensions of a 1 MP square pic? a 2 MP pic? a 4 MP pic? 10 MP? 11 MP?
1,000 x 1,000, 1400x1400, 2000x2000, 3000x3000, 3300x3300
square root of how many pixels thr r in the pic
diminishing returns
the more MP’s we have, the less they “count” as
boolean logic
system for computers to make decisions
used in microchip design
gate
a single, physical design-making unit represented by diagrams/pic
OR gate
A + B
true when @ least one is true
AND gate
AB; true when both r true
NOT gate
reverses
’
order of operations
()
’
x
+
NAND
AB’
not and
NOR
(A + B)’
not or
XOR
X (plus sign w/ circle around) B
either A/B is on, but NOT both
A + 0
A
A + 1
1
A + A
A
A + A’
1
0A
0
1A
A
AA
A
AA’
0
A + AB
A
A + A’B
A + B
DeMorgan’s Law
(A + B)’ = A’B’
(AB)’ = A’ + B’
sum of products
for every row that = 1, add a term to the expression.
’ if 0. product.
product of sums
for each line in the truth table that = 0, multiply by another term
’ if 1
sum
only use if one or two 0’s
server
a computer tht knows how to send messages to other computers
packets
small pieces of info passed b/w comp’s
addresses
’s tht uniquely identify a comp on the network
protocol
rules governing the transfer of info b/w comp’s
what r servers connected by?
telephone poles & wires on land
cables under sea
TCP/IP
Transmission Control Protocol
Internet Protocol
rules & instructions on how 2 send info over the internet
IP address
each device has one
4 #’s, each b/w 0-255 (cuz 4 bytes)
Ex: 128.244.50.1
DNS
Domain Name System/Service/Server
an Internet serivce tht translates domain names into IP addresses
how many possible IP addresses? enough?
abt 4 billion. no
IPv6
6 bytes
abt 281 trillion possibilities
man-in-the-middle attack
network packets r easily intercepted & changed
rogue server could manipulate communications b/w 2 individuals or just gather info
solution to maninmiddle attack
trust - only phone companies & qualified individuals allowed to operate major internet servers
cryptography to encode info
Dictionary Attack/Brute-Force Attack
a comp can try 1000’s of word/letter combos per second to guess ur password
bad & good passwords
bad = only words
good = 12+ random letters & symbols
phishing
type of social engineering
when an email and/or website pretends to be someone else & tries to get u to type in ur password & send it to them
social engineering
security attacks that prey on human psychology
malware
programs tht do bad things 2 ur comp/device
Ex: erase files, steal info, take pics w/ ur webcam, etc
virus
most common type of malware
most comp’s come w/ anti-virus software now
because a virus is a program, user must download & run it somehow - might be disguised as game/vid
some take advantage of vulnerabilities in computer systems (Ex: memory stick that automatically runs when u plug it into a comp)
must be created for specific operating systems
other types of malware
trojans, worms, spyware, rootkits, crimeware, zombie comp, botnet, pharming, Van Eck phreaking
input device
anything tht lets u interact w/ the PC
Ex: heyboard, mouse, microphone
output device
anything tht the PC uses to show u what u did
Ex: monitor/display, printer, speakers
peripheral
anything connected to the comp, but not inside the case
Ex: keyboard, monitor, printer
storage devices
anything that stores info for the computer
a place to put all those 1s and 0s
capacity measured in megabytes
Ex: hard disk drive, optical disc drive, USB flash drive/memory stick