CS 1030 Final Review
bus
a collection of conductors, connectors, and protocols that facilitates communication between the CPU, memory, and I/O devices
Integrated circuit (IC)
a collection of transistors on a single piece of hardware that reduces the circuit's size and physical complexity
primary key PK
a column that uniquely identifies a row in a table
Ethernet
a common method of networking computers in a LAN, using copper cabling at speeds up to 100 Mbps
twisted pair
a pair, or pairs, of insulated wires twisted together and used as a transmission medium in networking
Cat 5
a popular ethernet twisted pair communication cable capable of carrying data at rates up to 100 Mpbs (it is an ethernet cable)
composite key
a primary key made up of more that one column
attenuation
a reduction in the strength of an electrical signal as it travels along a medium
protocol
a set of rules designed to facilitate communication
Hacker
a technically proficient person who breaks into a computer system; originally denoted good intent, but general usage today is similar to a "cracker"
gate
a transistor-based circuit in the computer that implements Boolean logic by creating a single output value for a given set of input values
honeypot
a trap laid by a system administrator to catch and track intruders
Script Kiddie
an amateur hacker who simply uses the hacking tools developed by others
repudiation attacks
attacks on a system that injure the information's reliability; for example, a repudiation attack might remove evidence that an event actually did occur
denial-of-service (DoS) attack
attacks that prevent legitimate users from using the system or accessing information
BIOS
basic input/output system; a ROM chip on the motherboard; provides startup program for the computer
How do modems convert binary digits into sounds?
by modulating tones
coaxial
communication cable with an outside insulation, copper mesh layer, then more insulation and a copper wire (like as used for old tv)
Command: cp [filefrom fileto]
copy files from/to
Command: rm [filename]
delete folders
third normal form 3NF
eliminate columns that are not dependent on only the primary key
first normal form 1NF
eliminate repeat fields and add new records for unlabled values
collision
in hashing, what happens when the hashing algorithm generates the same relative key for more than one original key value
Command: Is
list directory contents, list file
Inputs of 1 and 0 to an XOR gate produce what output?
1
7 ISO OSI reference model
1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application https://www.youtube.com/watch?v=HEEnLZV2wGI
What four elements of Charles Babbage's machine are still common with modern computers?
1. an input device (punch cards) 2. Memory (a place where numbers could be stored while they were worked on) 3. A central processing device (decides what calculations to do) 4. An output device (dials that showed the output values)
four main functions of operating system:
1. provide user interface 2. managing processes 3. managing resources 4. providing security
11 in decimal, binary, and HEX
11, 1011, B
Which of the following standards is used in wireless networking? 802.11, TCP, ISO OSI, or Cat 5?
802.11
basic HTML starter brackets
<HTML><HEAD></HEAD><TITLE></TITLE> <BODY></BODY> </HTML>
Hashing
A common method for accessing data in a file or database table with a unique value called the hash key
In a computer, what function does a decoder usually perform?
Addressing memory
What three parts does a transistor consist of?
An emitter, a collector, and a base
Name the four important elements of Babbage's Engine that are components of today's computer.
An input device, memory, a central processing unit, an output device
Cracker
An unwelcome system intruder with malicious intent
What is the likely motivation for a directed hacker?
Anger, greed, politics
What contains instructions and data that provide the startup program for a computer?
BIOS
A set of wires and protocols designed to facilitate data transfer is ____?
Bus
What does a modification attack do?
Changes software and information
Computer security affects what/who?
Everyone!
DSL is a combination of what two types of multiplexing?
FDM and TDM http://www.differencebetween.net/technology/difference-between-fdm-and-tdm/
In hardware, the next step up from the transistor was the transmitter. (T/F)
False
The term "hacker" originally had a negative connotation (T/F)?
False
Which of the following is not one of the bus signal groups? Data, Control, Address, Fetch
Fetch
Which type of guided medium is the least susceptible to attenuation and inductance?
Fiber-optic cable
Which circuit type is used to create SRAM?
Flip-flop
Fiber-optic cable is made of what?
Glass
What, and whose invention later became the International Business Machines (IBM) corp?
Herman Hollerish's counting machine for the census
Which is a better signal-to-noise ratio? Low, High, Unguided, or Guided?
High
cache memory
High-speed memory used to hold frequently accessed instructions and data in a computer to avoid having to retrieve them from slower system DRAM https://www.youtube.com/watch?v=sHqNMHf2UNI
HTTP
Hypertext Transfer Protocol
IP
Internet protocol, the protocol that provides for addressing and routing internet packets from one computer to another
Which type of I/O processing is most efficient?
Interrupt
Command: Isblk
List Block Devices, lists directory in tree-like fashion
Command: Is -l
List directory with long details
What additions did Leibniz make to Pascal's Wheel?
Multiplication and division
Which type of memory can't be written to easily?
ROM
Which memory type is the fastest of the following: ROM, XOR, SRAM, DRAM?
SRAM
What is the likely motivation of an undirected hacker?
Technical challenge
What is Joseph Jacquard known for inventing?
The Jacquard Loom: a decide that used punch cards that contained programs for different weaving patterns.
IBM has some of its origins in what 1890 event?
The U.S. Census
What important concept is attributed to John Von Neumann?
The stored program concept
What features of transistors made them superior for computers, compared with vacuum tubes?
They were cheaper, smaller, and cooler than tubes and lasted longer
TCP/IP
Transmission Control Protocol/Internet Protocol, the suite of communication protocols used to connect hosts on the internet
TCP
Transmission control protocol, an OSI transport layer, connection oriented protocol designed to exchange messages between network devices
3 Types of Malicious code:
Virus, Worm, Trojan
What structure are most computers today based on?
Von Neumaan architecture
flip-flop or latch
a digital circuit that can retain the binary value it was set to after the input is removed;
802.11
a family of specifications for WLANs developed by IEEE; currently includes a few variations on the name
What is Von Neumann's architecture?
a machine from 1940's that allowed for input, output, processing, and memory. It includes the stored program concept
Signal-to-noise ratio
a measure of the quality of a communication channel
Bandwidth
a measurement of how much info can be carried in a given time period over a wired or wireless communication medium, usually measured in bits per second
hub
a network device that functions as a multiport repeater; signals received on any port are immediately retransmitted to all other ports on the hub
node
any addressable device attached to a network that can recognize, process, or forward data transmissions
second normal form 2NF
make every column dependent on the primary key
guided media
physical transmission media such as wire or cable Open Wire. Twisted Pair. Coaxial Cable. Optical Fiber.
Social engineering
social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target, for example, to steal money, information, or other valuables--basically a con
firewall
software and/or hardware that sits between an external network and an internal computer system; monitors requests for entry to the internal system and allows entry only to designated or authorized entrants
SRAM
static RAM, a type of high-speed memory constructed with flip-flop circuits
Program loop
the capability of a program to loop back and repeat commands
Kernel
the core of an operating system; controls processor, disk, memory, and other central functions
The ENIAC
the first electronic computer. It used vacuum tubes and had thousands of switches and weighed tons
bit error rate
the percentage of bits that have errors in relation to the total number of bits received in a transmission; a measure of the quality of a communication line
5 Generations of computing:
there are key characteristics to each of these
unguided media
transmission media you can't see, such as air or space, that carry radio or light signals