Social and Professional Issues Flashcards
(108 cards)
What is the difference between Mechanical and Electronic Devices?
Mechanical devices use mechanical parts to work, while electronic devices use electricity.
(Pre-history of Computing) What are the four key devices in the pre-history of computing?
Abacus (1000-500BC); Antikythera mechanism (~100BC), the oldest example of an analogue computer; First Mechanical Calculator (1623), made by Wilhelm Schickard, it could add and subtract 6 digit numbers; Leibniz’s calculating machine (1640), made by Gottfried von Leibniz. It could also multiply and divide.
What is the difference between an Analogue and a Digital computer?
A computer that uses a continuous signal to process is an analogue computer, while a computer that uses a discrete signal for its operation is called a digital computer.
What happened with Charles Babbage and the Difference Engine 1?
He wanted calculations to be done by steam. He developed the Difference Engine 1, but it was never made due to fallouts with Joseph Clement, and eventually the governments £1700 funding was cut.
What happened with Charles Babbage, the Analytical Engine and the Difference Engine 2?
After failing to build the Difference Engine 1, Babbage designed a general purpose programmable computing machine called the Analytical Engine. It had an input, output, store (memory), and mill (CPU). After that he developed the Difference Engine 2, an improved version of the original. Neither was ever built by him.
What did Ada Lovelace do?
She was the first computer programmer. She translated a french paper written by Luigi Menabrea and added notes to it. One of the notes was how to use the analytical engine to calculate Bernoulli numbers - called Note G.
What did Wilhelm Leibniz do?
In 1703 Leibniz described how binary numbers may be added, subtracted, multiplied and divided. He developed the concept of formal symbolic logic. He was too ahead of his time so nothing happened.
What did Charles Boole do?
He developed the concept of using symbols to represent objects. He developed the mathematics for logical operations. He made it so we have the maths for logical operations.
What did Claude Shannon do?
He combined boolean algebra and circuit design. He provided mathematical techniques for building a network of switches to realize a specific logical function.
What are the 1st generation of electronic machines?
From 1950-1959. Key technology was the vacuum tube. Issues were heat, weight, size and reliability.
What are the 2nd generation of electronic machines?
From 1960-1968. Key technology was the transistor which enabled use of logic gates without vacuum tubes. The IBM system 360 introduces the concept of a computer family.
What are the 3rd generation of electronic machines?
From 1969-1977. Key technology is the integrated circuit which allowed for devices to be smaller, cheaper and more reliable.
What are the 4th generation of electronic machines?
From 1978-2009. Key technology was the microprocessor. Computers started to become readily available for the public.
What is Moore’s Law?
The number of transistors on microchips doubles every two years.
What is cryptography?
The study of
mathematical techniques for securing
digital information, systems, and distributed
computations against adversarial attacks.
What are Encryption and Decryption?
Encryption is when plaintext is converted into ciphertext, and Decryption is when ciphertext is converted back into plaintext.
What is the Caesar cipher?
Letters are shifted by a key k either backwards or forwards to encrypt and decrypt.
What is the mono-alphabetic cipher?
It defines a map from each letter to some letter of the alphabet, where the map is arbitrary,
instead of a fixed shift like in caesar cipher.
What is symmetric encryption?
Symmetric encryption is when both parties have the same key to encrypt and decrypt the data. This leads to the key distribution problem.
What is the key distribution problem?
With symmetric encryption, both parties need to have the same key. This key needs to be distributed confidentially, and there are two options: meeting in person, which is hard if there is a long distance, and if the key is reset you have to share it again; and using cryptography to share the key, which then brings up the same issue for sharing the key.
What is asymmetric encryption?
With asymmetric encryption, there is a public key (used to encrypt data) and a private key (used to decrypt data). The keys are related, but it is computationally infeasible to derive the private key from the public key. Asymmetric encryption solves the key distribution problem.
What is a digital signature?
A digital signature is a way of verifying the authenticity of a digital document or message, created using a combination of the document or message and a private key. It can be verified using the corresponding public key and has the properties of integrity, non-repudiation, and authentication.
What is a digital certificate?
A digital certificate is an electronic document that is used to identify an individual, organization, or device, and to secure their online communications. Digital certificates are issued by a certification authority (CA), which verifies the identity of the applicant before issuing the certificate. Digital certificates contain the public key of the certificate owner, as well as other identifying information, and are signed by the CA’s private key.
Why is quantum computing a threat to cryptography?
Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure online communication, because they are able to solve certain mathematical problems much faster than classical computers. This is because some of the most widely used cryptographic algorithms rely on the fact that certain mathematical problems are hard to solve.