Social Impact and History Flashcards

1
Q

_______________ was the first to define concepts that were to be later used in modern computers.

A

Charles Babbage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______, a programmable processor, an output device, and user-defined input were all concepts Babbage conceived for a calculating device he called a Difference Engine in 1834.

A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Early computers stored data for calculations and programs on _____________.

A

punched cards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

First generation computers used __________ to store individual bits of data.

A

vacuum tubes

[Explanation]

Vacuum tubes represent data as 1s and 0s (on or off). They could calculate much faster than the mechanical relays found in earlier machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Second generation computers used ________ instead of vacuum tubes.

A

transistors

[Explanation]

Transistors were smaller, cheaper, and more reliable than vacuum tubes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating systems were first used in ______ generation computers.

A

second

[Explanation]

Applications no longer had to include code to control low level hardware operations but instead called on operating system routines through simple standardized commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ generation computers used integrated circuits.

A

Third

[Explanation]

Integrated circuits were able to do the work of thousands of transistors or vacuum tubes on a single miniature chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ was the first programmable electronic computer in the United States.

A

ENIAC

[Explanation]

Completed in 1945, ENIAC was designed to calculate trajectory tables for the US Army.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

UNIVAC was the first commercially successful _______ computer.

A

digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Built in _____, UNIVAC was considerably smaller and more powerful than ENIAC.

A

1951

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fourth generation computers were ______________ based.

A

microprocessor

[Explanation]

Fourth generation computers were smaller, faster and cheaper than the third generation machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The first microprocessor was developed in _____.

A

1971

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In 1976, Steve Job and Steve Wozniak founded _____ Computer Corporation.

A

Apple

[Explanation]

In the same year, they released the Apple I computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Using components or labor from outside suppliers is called ___________.

A

outsourcing

[Explanation]

Most computer manufacturers use components (hard drives, processors, memory, etc.) supplied by other companies; this is called outsourcing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Relocating business processes to lower cost locations in _______ countries is called offshoring.

A

foregin

[Explanation]

Companies do this to keep prices low. Manufacturing, development, and telephone support are some examples of activities a company might elect to offshore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Products which are announced but are never produced are called _________.

A

vaporware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Most Information Systems departments are managed by a ___.

A

CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

CIO stands for ___________ Officer.

A

Chief Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Systems ______ plan and implement new or improved computer services.

A

analysts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Database ______________ create, maintain, and supervise the day to day operation of databases.

A

administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A job ____________ is an automated program that searches one or more employment databases and notifies you when it finds leads that match your search criteria.

A

search agent

[Explanation]

Search agents and meta search tools allow you to automate your search process across many sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Many employers view IT certification with some degree of __________.

A

skepticism

[Explanation]

Critics of certification exams maintain that a multiple choice test can’t accurately measure a persons ability to deal with real world software and equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

___________ information about a company concerns information a competitor might find valuable.

A

Proprietary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is some information the Proprietary infromation includes?

A

Information related to company finances, research, products and procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Digital Rights Management is a collection of technologies used to limit access and use of ___________ products such as music, movies and computer games.

A

copyrighted

26
Q

____ is used by copyright holders to prevent piracy of their products but can be inconvenient to legitimate users.

A

DRM

27
Q

What does DRM stand for?

A

Digital Right Movement

28
Q

The easiest way to reduce exposure to cellphone ______ is to use a headset.

A

radiation

29
Q

Improper positioning of your ________ and mouse can cause RSI.

A

keyboard

[Explanation]

RSI (Repetitive Stress Injury) affects tendons, muscles and nerves in the hands, wrists, arms and shoulders.

30
Q

What does RSI stand for?

A

Repetitive Stress Injury

31
Q

__________ is the study of safe and efficient work environments.

A

Ergonomics

[Explanation]

Ergonomics also refers to making tools and equipment more comfortable and easy to use–i.e. an ergonomic mouse is designed to cause less wrist fatigue and fit more naturally to your hand.

32
Q

On the job choices that reflect a persons values are called ____________ ethics.

A

professional

33
Q

When an employee uses their employers computer time for non-work activities, this is called _____ of time and services.

A

theft

[Explanation]

Examples include playing computer games, online shopping, viewing pornography or operating a sideline business.

34
Q

The ________-Oxley act requires full disclosure in accounting systems and protects corporate whistleblowers.

A

Sarbanes

35
Q

The Sarbanes-Oxley act was established financial reporting regulations to prevent corporate _____.

A

fraud

36
Q

Biometric authentication devices verify a person’s identity using the persons ______ characteristics.

A

physical

[Explanation]

Examples include fingerprint identification and retina scanners.

37
Q

Screening job applicants and limiting employee access to only information needed to do a specific job are examples of ______ controls.

A

people

[Explanation]

Controlling people is one important way to protect software and data.

38
Q

A _________________ plan is used to restore information technology functions after operations have been interrupted by an event such as a hurricane.

A

disaster recovery

[Explanation]

Hurricane Katrina and the World Trade Center bombings are examples of events which required IT departments to implement disaster recovery plans.

39
Q

Disposal of e-waste is a major _____________ problem caused by information technology.

A

environmental

[Explanation]

E-waste includes discarded obsolete monitors, televisions, printers, cell phones, and other electronic devices.

40
Q

According to security experts, employees pose the greatest ______ to their companys technology infrastructure.

A

threat

[Explanation]

One survey indicated that 75 to 80% of computer crimes are committed by current or former employees.

41
Q

A browser ________ is spyware that changes browser settings without your knowledge.

A

hijacker

42
Q

Adware is spyware that tracks surfing and online _________.

A

purchases

43
Q

_________ use adware for pop ups and other ads.

A

Merchants

44
Q

________ are small text files left on your hard drive by websites you visit.

A

Cookies

[Explanation]

Cookies can save you time by not requiring you to retype in the same information on subsequent visits to the same website.

45
Q

What type of information do Cookies contain?

A

Information like preferences, settings, and login

46
Q

____ is an internet protocol used to make phone calls over the internet.

A

VoIP

47
Q

What does VoIP stand for?

A

Voice over Internet Protocol

48
Q

____ is a protocol used to communicate between electronic musical instruments and the devices that control and manage them.

A

MIDI

[Explanation]

A MIDI file describes the music in terms of the musical notes, pitch, length, etc.. A MIDI device can then use this information to reproduce the music.

49
Q

What does MIDI stand for?

A

Musicial Instrument Digital Interface

50
Q

A _________ logger is a type of spyware that records each character you type.

A

keystroke

[Explanation]

A keystroke logger can be used to steal passwords.

51
Q

ISPs are connected to the internet backbone via a ___.

A

NAP

[Explanation]

NAP stands for Network Access Point.

52
Q

Forging an email senders name is called ________.

A

spoofing

53
Q

What is spoofing?

A

Spoofing makes it appear that a message came from someone other than the sender. This is a tactic often used by spammers.

54
Q

Sending out legitimate looking emails which attempt to solicit passwords or financial information is known as _________.

A

phishing

[Explanation]

For example, an email may look like it’s from Paypal and tell you that you need to log into your account to update something. When you click the link, it takes you to a site that looks just like Paypal; you enter your login information on this fake site and now the phishers have your username and password.

55
Q

Overloading a computer system or network by making repeated requests to it and thereby denying access to legitimate users is called a _________________ attack.

A

denial of service

[Explanation]

A DOS attack can originate from one or many computers. The goal is to overload the target server or network by suddenly bombarding it with thousands or even millions of requests, making it unable to respond to requests from legitimate users.

56
Q

A program that copies itself repeatedly on to the computers hard disk or into the computers memory is called a ____.

A

worm

[Explanation]

Code Red, Nimda, and MyDoom are all examples of famous worms.

57
Q

What is the difference between a worm and a virus?

A

What distinguishes a worm from a virus is that a worm has the ability to spread itself to other computers without any human action (i.e. use your email software to send an infected email to all of your friends) whereas a virus is attached to an executable file which you must run for your computer to get infected.

58
Q

___________ are viruses that are set to go off at a certain time.

A

Logic bombs

59
Q

White hat hackers are computer professionals who break into computer systems with the owners __________ to identify security flaws.

A

permission

60
Q

_______________ are politically motivated hackers who attack computer systems intending to cause large scale physical or financial harm.

A

Cyberterrorists

[Explanation]

Cyberterrorists typically attack military targets, banks, power plants, water treatment plants and traffic control centers.