Notes From Practice Test 1A Flashcards
What is another name for a criminal hacker?
Black hat
_________ tools cloak a person’s identity and make it possible to exercise freedom of speech in situations where reprisals might repress it.
anonymizer
Voice over IP (VoIP) refers to voice conversations that are:
routes over the Internet
the illegal copying and distribution of copyrighted material
Pirating
______ is a term that refers to objects and entities that exist largely within computer networks.
Cyberspace
________ is a process by which several technologies with distinct functionalities evolve to form a single product.
Convergence
________ is the process of converting text, numbers, sound, animations, photos, and video into data that can be processed by digital devices.
Digitization
Computer ownership suddenly accelerated in the mid-1990s after the _______ opened for commercial use.
Internet
The ______ is a global computer network originally developed as a military project, and then handed over to the National Science Foundation for research and academic use.
Internet
The world’s first programmer- this person programmed punch cards in the 1850s to program a weaving loom
Augusta Ada Byron Lovelace
This person was in charge of the Us Census in 1890 and created machines to tabulate the data. He went on to found IBM.
Herman Hollerith
In 1977 this was the network that led to the creation of the Internet
ARPANET
Where the graphical user interface (GUI) and mouse were developed
XEROX Parc
The Russian satellite that led to the “space race” and the US commitment to develop more sophisticated computing devices
Sputnik
the founders of Apple Computer
Steve Jobs and Steve Wozniak