CS 1030 Final Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

bus

a collection of conductors, connectors, and protocols that facilitates communication between the CPU, memory, and I/O devices

Integrated circuit (IC)

a collection of transistors on a single piece of hardware that reduces the circuit's size and physical complexity

primary key PK

a column that uniquely identifies a row in a table

Ethernet

a common method of networking computers in a LAN, using copper cabling at speeds up to 100 Mbps

twisted pair

a pair, or pairs, of insulated wires twisted together and used as a transmission medium in networking

Cat 5

a popular ethernet twisted pair communication cable capable of carrying data at rates up to 100 Mpbs (it is an ethernet cable)

composite key

a primary key made up of more that one column

attenuation

a reduction in the strength of an electrical signal as it travels along a medium

protocol

a set of rules designed to facilitate communication

Hacker

a technically proficient person who breaks into a computer system; originally denoted good intent, but general usage today is similar to a "cracker"

gate

a transistor-based circuit in the computer that implements Boolean logic by creating a single output value for a given set of input values

honeypot

a trap laid by a system administrator to catch and track intruders

Script Kiddie

an amateur hacker who simply uses the hacking tools developed by others

repudiation attacks

attacks on a system that injure the information's reliability; for example, a repudiation attack might remove evidence that an event actually did occur

denial-of-service (DoS) attack

attacks that prevent legitimate users from using the system or accessing information

BIOS

basic input/output system; a ROM chip on the motherboard; provides startup program for the computer

How do modems convert binary digits into sounds?

by modulating tones

coaxial

communication cable with an outside insulation, copper mesh layer, then more insulation and a copper wire (like as used for old tv)

Command: cp [filefrom fileto]

copy files from/to

Command: rm [filename]

delete folders

third normal form 3NF

eliminate columns that are not dependent on only the primary key

first normal form 1NF

eliminate repeat fields and add new records for unlabled values

collision

in hashing, what happens when the hashing algorithm generates the same relative key for more than one original key value

Command: Is

list directory contents, list file

Inputs of 1 and 0 to an XOR gate produce what output?

1

7 ISO OSI reference model

1. Physical 2. Data Link 3. Network 4. Transport 5. Session 6. Presentation 7. Application https://www.youtube.com/watch?v=HEEnLZV2wGI

What four elements of Charles Babbage's machine are still common with modern computers?

1. an input device (punch cards) 2. Memory (a place where numbers could be stored while they were worked on) 3. A central processing device (decides what calculations to do) 4. An output device (dials that showed the output values)

four main functions of operating system:

1. provide user interface 2. managing processes 3. managing resources 4. providing security

11 in decimal, binary, and HEX

11, 1011, B

Which of the following standards is used in wireless networking? 802.11, TCP, ISO OSI, or Cat 5?

802.11

basic HTML starter brackets

<HTML><HEAD></HEAD><TITLE></TITLE> <BODY></BODY> </HTML>

Hashing

A common method for accessing data in a file or database table with a unique value called the hash key

In a computer, what function does a decoder usually perform?

Addressing memory

What three parts does a transistor consist of?

An emitter, a collector, and a base

Name the four important elements of Babbage's Engine that are components of today's computer.

An input device, memory, a central processing unit, an output device

Cracker

An unwelcome system intruder with malicious intent

What is the likely motivation for a directed hacker?

Anger, greed, politics

What contains instructions and data that provide the startup program for a computer?

BIOS

A set of wires and protocols designed to facilitate data transfer is ____?

Bus

What does a modification attack do?

Changes software and information

Computer security affects what/who?

Everyone!

DSL is a combination of what two types of multiplexing?

FDM and TDM http://www.differencebetween.net/technology/difference-between-fdm-and-tdm/

In hardware, the next step up from the transistor was the transmitter. (T/F)

False

The term "hacker" originally had a negative connotation (T/F)?

False

Which of the following is not one of the bus signal groups? Data, Control, Address, Fetch

Fetch

Which type of guided medium is the least susceptible to attenuation and inductance?

Fiber-optic cable

Which circuit type is used to create SRAM?

Flip-flop

Fiber-optic cable is made of what?

Glass

What, and whose invention later became the International Business Machines (IBM) corp?

Herman Hollerish's counting machine for the census

Which is a better signal-to-noise ratio? Low, High, Unguided, or Guided?

High

cache memory

High-speed memory used to hold frequently accessed instructions and data in a computer to avoid having to retrieve them from slower system DRAM https://www.youtube.com/watch?v=sHqNMHf2UNI

HTTP

Hypertext Transfer Protocol

IP

Internet protocol, the protocol that provides for addressing and routing internet packets from one computer to another

Which type of I/O processing is most efficient?

Interrupt

Command: Isblk

List Block Devices, lists directory in tree-like fashion

Command: Is -l

List directory with long details

What additions did Leibniz make to Pascal's Wheel?

Multiplication and division

Which type of memory can't be written to easily?

ROM

Which memory type is the fastest of the following: ROM, XOR, SRAM, DRAM?

SRAM

What is the likely motivation of an undirected hacker?

Technical challenge

What is Joseph Jacquard known for inventing?

The Jacquard Loom: a decide that used punch cards that contained programs for different weaving patterns.

IBM has some of its origins in what 1890 event?

The U.S. Census

What important concept is attributed to John Von Neumann?

The stored program concept

What features of transistors made them superior for computers, compared with vacuum tubes?

They were cheaper, smaller, and cooler than tubes and lasted longer

TCP/IP

Transmission Control Protocol/Internet Protocol, the suite of communication protocols used to connect hosts on the internet

TCP

Transmission control protocol, an OSI transport layer, connection oriented protocol designed to exchange messages between network devices

3 Types of Malicious code:

Virus, Worm, Trojan

What structure are most computers today based on?

Von Neumaan architecture

flip-flop or latch

a digital circuit that can retain the binary value it was set to after the input is removed;

802.11

a family of specifications for WLANs developed by IEEE; currently includes a few variations on the name

What is Von Neumann's architecture?

a machine from 1940's that allowed for input, output, processing, and memory. It includes the stored program concept

Signal-to-noise ratio

a measure of the quality of a communication channel

Bandwidth

a measurement of how much info can be carried in a given time period over a wired or wireless communication medium, usually measured in bits per second

hub

a network device that functions as a multiport repeater; signals received on any port are immediately retransmitted to all other ports on the hub

node

any addressable device attached to a network that can recognize, process, or forward data transmissions

second normal form 2NF

make every column dependent on the primary key

guided media

physical transmission media such as wire or cable Open Wire. Twisted Pair. Coaxial Cable. Optical Fiber.

Social engineering

social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target, for example, to steal money, information, or other valuables--basically a con

firewall

software and/or hardware that sits between an external network and an internal computer system; monitors requests for entry to the internal system and allows entry only to designated or authorized entrants

SRAM

static RAM, a type of high-speed memory constructed with flip-flop circuits

Program loop

the capability of a program to loop back and repeat commands

Kernel

the core of an operating system; controls processor, disk, memory, and other central functions

The ENIAC

the first electronic computer. It used vacuum tubes and had thousands of switches and weighed tons

bit error rate

the percentage of bits that have errors in relation to the total number of bits received in a transmission; a measure of the quality of a communication line

5 Generations of computing:

there are key characteristics to each of these

unguided media

transmission media you can't see, such as air or space, that carry radio or light signals


Set pelajaran terkait

/History Social Studies /Pace 1121/ Pg. 34 Checkup/

View Set

CHAPTER 8 Patient Reception PROCEDURES

View Set

Aminoglycosides and Fluoroquinolones

View Set

2) The Flow of genetic information from RNA to Protein

View Set

8th Grade Science: Overview Earthquakes: Glencoe/McGraw-Hill

View Set

Chapter 22: Neurological and Mental Status

View Set

ACCTCY 2010 Bruce Runyan Exam 1 Review (Practice Exam 1)

View Set

Chapter 10 Developing High Performance Teams 4th edition

View Set

Chapter 9: Regional Economic Integration

View Set