CS2: Brown

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

file server

is a computer that returns files requested by users on other computers. (When you request a file from the Brown computer system, you are communicating with a file server.)

Nigerian Letters

Also known as "Advance Fee Fraud" Been successfully run since the 1980's over mail and over the Internet Convinces the target that they will get a huge commission for helping free up money held in an offshore bank account. Target is solicitied for small "fees" and their personal info to expedite the process Of course, no money is forthcoming

Vector Graphics

Alternative scheme for representing images. Treat the image as a collection of graphic objects such as lines, curves, and figures Best rendered on special vector graphics machines Resolution independent and highly scalable More easily edited and often more compact in storage Must often be converted to bitmapped images for display on bitmapped systems such as a PC

Input/Output (I/O) Drivers

An I/O driver is a special program that knows how to communicate with a peripheral device and the CPU To read or write a file to a disk the file manager determines the name and location of the file, and control is passed to the disk's I/O driver, which will send commands to the disk arm, read head, etc.

World Wide Web

An assortment of computers (web servers) connected by the Internet employs a common protocol (standard) HTTP (hyperText transfer protocol), basically "Text on Drugs" Sending and receiving hypermedia documents Hypermedia pioneered at Brown!

Weak vs Strong Authentication

An example of "weak" authentication is: - Username and 4 character pin Stronger authentication would be: - Username and 8 character alphanumeric password with no repeating characters Even Stronger authentication would be: - Username + - 16 character alphanumeric pw with no repeating characters + - Biometric signature and/or a Digital Certificate

Search engines

An internet search engine (like Yahoo or Google) is a program that tries to provide a user with a list of potentially relevant web sites based upon (typically) a few key words provided by the user. The actual "search" is being done by a server (in this case a computer belonging to the search engine company).

"server"

is simply a computer that acts as a utility for other computers. A web server is a server that serves up web pages.

Advantages of Bitmap Graphics

It is easier to create hardware to go from a bitmap representation to the actual display on the monitor (which is why monitors use bitmaps) It is easier to draw pictures of things with imprecise boundaries, (or that consist of so many parts it would not be feasible to draw them all) Your PC utilizes Bitmap Graphics to display everything that appears on your screen Ability to create multiple layers which can be overlayed to create composites

Input Peripherals

keyboards mouse(s) scanners digital cameras and imagers microphones and sound digitizers Video digitizers Sensors (temp, pressure, humidity, vibration, speed, chemical, etc, etc,) Switches Secondary Storage Devices Network Connections (Modems)

Radio Shack TRS-80

The first plug and play personal computer available at retail Programmed in BASIC Very successful Very affordable Limited commercial software Created a cottage industry

Central Processing Unit

manages the instruction-execution cycle FETCH - DECODE - EXECUTE coordinates the activities of other devices

Compiler

program than turns a high-level language program into a machine-language program. (Then when one wants, once can execute the machine-language version.)

Interpreter

program that executes the high-level program directly and translates it into machine language on the fly.

CrytoLocker

program that infected over half a million systems from September 2013 through May, earning its perpetrators an estimated $3 Million

Cyber Attacker Profile

Type of attackers: -Hacker, cracker, infowarrior, vandals -Insiders (majority of attacks) -Organized crime, terrorists -State Sponsored Cyber Terrorists Attacker's motivations: -Publicity / challenge -Financial gain and Fraud -Thrill -Revenge -Political Inst

RansomWare

Type of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator(s) of the malware in order for the restriction to be removed.

What is the internet?

a loose confederation of data communication networks "data communications": sending digital information from computer to computer "information highway" connecting far corners of the world an open, distributed system: no central control

Bitmap

a method of representing and storing digital images and graphics whereby the image is composed of a collection of individual pixels

Pixel

a spatial sample of a digital image. A pixel element is the basic component of a digitized image, which contains a set of numbers representing the features (color, intensity) of that spatial sample (a pixel may only have ONE color and intensity, therefore it is the lowest element of an image)

Stuxnet

a virus that is widely believed to have been developed by the U.S. and Israeil intelligence communities. It's purpose was to infiltrate programmable control systems used in the process control industries. In particular, this worm was targeted at the controllers that operate the centrifuges used in Iran to process uranium, a key component in the quest for nuclear weapons, or reactors.

Execution Monitor

responsible for ensuring that an error caused by a program does not cause the entire system to crash.

IMB System/360

family of computer systems with backward compatibility established the standard for mainframes for a decade

CryptoWall

infected over 600,000 computer systems in the past six months and held 5 billion files hostage, earning its creators more than $1 million, researchers found

Registers

-Are memory locations that are used to facilitate the movement of data inside a digital computer - Work in conjunction with the system clock which determines the speed with which a computer fetches and executes instructions

Alan Turing

-Broke the code for Enigma machine - Devised the "Turing hypothesis" for AI

Cryptography

-Encryption is the transformation of data into a form that is as close to impossible to read as possible without the appropriate knowledge (key) -Decryption is the reverse of encryption -Encryption and decryption generally require the use of some secret information, referred to as a key

Machly and Eckert

-Headed ENIAC team at Penn - ENIAC (Electronic Numerical Integrator and Computer) - First "general purpose" digital computer

Phishing

-criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic transaction -an example of social engineering techniques used to fool users and exploits the poor usability of current web security technologies

Operating System

-is a collection of resident programs that -manage the system's resources supervise the execution of processes -provide useful services ex Managing user requests (Supervisor) Interpreting user commands (User Interfaces) I/O control Memory management File management Execution-Monitoring Security Multitasking

1950 advances

1) Freedom from vacuum tubes 2) Allowed the placement of many transistors into a small area

Apple vs. Microsoft lawsuit over Windows

- Apple introduces the first commercial computer using a GUI, in 1983, based on pioneering work done by Xerox - Microsoft was set to introduce Windows 1.0 in 1985 and entered into an agreement with Apple to license and sub-license certain aspects of the GUI interface - In return, Apple was granted use of certain Microsoft products for its computers - 1988, Apple files a $5.5billion lawsuit claiming patent infringement and breach of contract - issue: Apple's contention that Microsoft exceeded the terms of the license and used part of the design that were not included in the license

Ada King

- Daughter of Lord Byron - Wrote "programs" for the Difference Engine, thus making her the first programmer ever

UNIVAC I

- First commercial general purpose computer system - Used to forecast the 1952 presidential election

Altair 8080

- First kit micro computer

Charles Babbage

- First true pioneer of modern computing machines - Designed two prototype calculating machines neither of which was practical to build - Difference Engine - Analytical Engine

Trojans

- Modeled after the ancient technique of hiding a threat inside of a seemingly benign package - are usually attached to emails and contain a program that performs nasty stuff on your computer - When the user opens the email, the system resets and when it boots up, the _____ program does its thing very secretly - can also allow someone to effectively hijack your computer and use it control everything that your machine does without you knowing it (Zombies!)

Worms

- Responsible for today's most widespread attacks and sometimes confused with Viruses - are designed to self replicate and automatically spread themselves from system to system using the network connections - usually use email as their carrier method since email is such a popular application - mail themselves to everyone listed in your address book as an efficient replication mechanism - Anna-Kournikova.jpg.vbs

Difference Engine

- Special purpose calculating machine - Automated both the computation of tables and their printing - Employed the method of differences to calculate polynomials

Magnetic Tape-Sequential

- Stores data represented by magnetized particles in linear tracks - Magnetized clusters or domains are aligned to represent binary codes

Low and High Level Languages

- The closer the language is to machine language, the lower the level - In general, high level languages make things easier to develop large complex programs

Pharming

- a hacker's attack aiming to redirect a website's traffic to another, bogus website - conducted either by changing the host's file on a victim's computer or by exploitation of a vulnerability in DNS server software - Antivirus software and spyware removal software cannot protect against pharming

Public Key Ciphers

- algorithm was published by Rivest, Shamir, and Adleman in 1976 and is know as RSA (for their last names) - RSA is still a widely used algorithm which is a testament to its strength and viability - employ an algorithm with two keys -- a public key and a private key - looks up the recipient's public key and uses it to encode a message

Encryption Keys

- are essential information -- usually a large numerical parameter(s) -- needed for encryption and/or decryption algorithms - are used to encode plaintext as encoded ciphertext - used to decode ciphertext and recover the original plaintext - sometimes discovered by brute force methods employing computers to search large potential key combinations

Spoofing

- the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization. Another meaning for spoof is fake websites. Normally, the website will adopt the design of the target website and sometimes has a similar URL

Computer Viruses

- "a program that can 'infect' other programs by modifying them to include a ... version of itself" is generally accepted as a standard. - Aka....a illicit program hidden inside of a legitimate program that propagates through various computer and network media - Common example: infect Word documents that may then be emailed to other systems

Word

A multiple of bytes

ROM (Read Only Memory)

Read Only Memory can only be read from its contents cannot be altered or written over easily This type of memory is used to hold instructions that need to always be there and always be the same

Higher Resolution

Renders an image with greater accuracy for any given size

Patents

Reserved for protecting unique innovations and inventions that represent a "new" approach to solving a problem or creating a product or process Takes a formal process of searches, filings and disclosures Approximately 18 month process minimum and $5-10K in cost Patents expire after 17 years in most cases

Imagine Resolution

Resolution (Accuracy), Color accuracy

Direct Access

SEEK — controller advances read/write head to proper track LATENCY — waits for proper sector to rotate under head READ/WRITE — disk head scans the sector for read or write

Optical Discs

Compact Disc-Read Only Memory (CD-ROM) archived and published information Relatively high capacity (650 Mbytes) Compact Disc-Recordable (CD-RW recordable readable using CD-ROM technology Digital Versatile Discs (DVD)/DVD-R) Very high capacity, storages (5-15 Gbytes) Multiple Layers, tighter spacing in the same size as CD And then... BLUE RAY (3-10 times the capacity of today's DVDs)

Typical Graphic Applications - Vector graphics

Computer Aided Design Illustration 3-D modeling and rendering Animation 3-D Games and Simulations

Fetch, Decode, Execute Cycle

Computer instructions are stored (as bits) in memory. To run a program, each instruction is: Fetched from memory. Decoded (the computer figures out what it should do based on the number). Then the instruction is executed. The speed at which this cycle occurs is determined by the system clock

Gordon Bell

Father of the Minicomputer, Digital Equipment Corporation Brought computing to small businesses

Jack Kilby

Invents the integrated circuit at TI 1957

Image Resolution

Is directly proportional to number of bits available for storage

IBM PC

(1982) IBM's first PC Signaled a significant shift for the giant manufacturer Established a new standard which is still being built on today Operating system written by Bill Gates & Co. at Microsoft

John Von Neumann

- "Stored program" concept - Designed the IAS (institute for advanced studies)

Apple's Thunderbolt

"The most advanced I/O EVER!" per Apple Supports high resolution video and high performance data transfers through a SINGLE compact port Up to 20 Gb/sec transfer speed! 40 times faster that USB 2 and 4 time faster than USB 3

The Apple II

(1978) The first commercially available Apple Initially sold to Wall St. bankers who wanted the Spread-sheet program called Visicalc which ran on the Apple II Put Apple on the Map

The Osborne 1

(1981) First "portable personal computer"

Claude Shannon

1916-2001 1937: Introduces the concept of binary logic for use in creating digital computing machines 1948: Publishes "A mathematical theory of communication" which sets forth the principals for encoding information so that it might be transmitted electronically "Father of modern information age"

Invention of hearing aid

1953

Invention of pocket radio

1954

Short History of the Internet

1961-69 Research in distributed communications progresses 1969 Arpanet (Advanced Research Projects Network) is commissioned by the DoD with nodes at UCLA, Stanford Research, UCSB and Univ. of Utah...designed as a "best effort" network 1971- 15 nodes operational w/ 23 Systems 1972- Email is introduced 1982- TCP/IP is chosen as the new communications protocol for Arpanet

Nibble

4 bits

Byte

8 bits

TradeMark

A form of copyright which protects your public brand image and associated design of things like Logos and advertising material

ASCII

Agreed upon code in which every character, number, etc. is given a unique bit code (1 byte)

Bits

All data in a digital device is memory stored in electronic devices that are either on or off (binary). Represented as 1 or 0

Analog vs Digital

Analog is continuous while digital is discrete

The Security Pillars

Authentication Authorization Privacy Information Integrity Non Repudiation Availability

New "Law"

Bandwidth (the amount of information one can pump through a connection) doubles every nine months or so

Hex Notation using 4 bit Nibbles

Binary Hex 0000 0 0001 1 0010 2 0011 3 0100 4 0101 5 0110 6 0111 7 1000 8 1001 9 1010 A 1011 B 1100 C 1101 D 1110 E 1111 F

US vs IBM

By the 1960's IBM dominated the computer industry with a >60% market share In January 1969, the government began a sweeping antitrust investigation into IBM's dominance and attempted to break it into smaller companies that would compete against one another During the six most critical years of the trial, from 1975 to 1980, the parties called 974 witnesses and read 104,400 pages of transcripts The 13-year investigation, which required IBM to retain 200 attorneys at one point, fizzled in the early '80s as the computing landscape shifted from mainframes to personal computers. The government abandoned the tainted effort entirely in 1982, as clones of the IBM PC eroded Big Blue's dominance With IBM, the Justice Department was trying to hit a moving target, but the target had moved so much there was no point in shooting anymore--so they dropped the case People who worked for IBM in the '80s and early '90s said the company routinely fell victim to "pricing death strategy"--a reluctance to lower prices below cost, even on products that weren't selling--to avoid what the government would call predatory pricing Viewed today, the Government's case against IBM appears ludicrous to many in retrospect

Caching Servers

Caching servers are located at locations where there is a high degree of activity They maintain copies of the most frequently accessed web pages so that they can be retrieved "locally" instead of having to go over the internet for each access This works for those web pages that don't change very often Most large businesses and institutions have local caching servers Increases performance and conserves bandwidth

Parallel Bus

Contains many signal paths for very fast data transfer Bulkier, expensive cable and connectors Limited distance capability Where used: All of the paths inside the CPU and between the CPU, main memory and video processor are implemented using parallel busses for the very fastest transfer rates. Any plug in cards use parallel busses as well as internal magnetic and optical disk drives. Most of these busses are either 16, 32 or 64 bits wide

How do you protect your IP?

Copyright registration Trademark registration Patents ( for unique invention) Copy protection On-line registration for every new installation Protect the source code! Audits

Resolution (Accuracy)

Determined by pixel size and number of pixels

Domain Name

Domain names are more intuitive names for IP addresses. The name cs.brown.edu is the domain name for the Brown computer science home page.

Integrated Circuit (IC)

Enabled many transistors to be grouped into a single package Lowered cost and decreased space compared to using individual transistors Today exceeding 10 billion transistors in a single package of 4 square inches. Still the building blocks for all modern electronics today

Clock Signal

Ensures that data is sent and received at certain times based on the clock speed

Machine Language

Every computer CPU has its machine language, the set of instructions it knows how to execute. This is the lowest level. A typical instruction might say, get the contents of a memory location and put it in the accumulator (perhaps in preparation for adding it to another number).

Types of Viruses

File Infector Viruses -Some of the oldest types -Looks like an executable file (.exe, .com, .bin, .sys) -Hides in system memory and embeds itself in applications that the user opens -Capable of infecting multiple application files -Some Infector viruses make a copy of the real application and hide themselves inside the copy. When the user clicks on the file name, the copy runs, not the original. Macro Viruses -Hide in the popular macro commands that are popular in windows applications -These viruses infect any documents that the application opens (Word, Excel, Access, etc.) Boot Sector Viruses -These viruses infect the boot track of the disk drive when the machine is booted up -By altering the boot drive, the virus can render the machine inoperable Michelangelo was a famous boot sector virus that launches on computers on March 6th and puts the infected machines out of service -On March 6, 1992 there was almost hysteria about the effect that this virus would have on all the PCs installed worldwide

File Management

Files are collections of data arranged in a specified format for use by programs Files can reside in memory as well as in peripheral devices such as disk drives, CD-ROMs or tape drives Every file has a name and attributes that specify its size, its location and its type Creating and maintaining references to a system's files is the responsibility of the file manager. The actual address of a file is a pathname, which is made up of the folders in which the file is located (sometimes called directories) and the file name.

Abacus

First developed in Babylonia over 5,000 years ago. Earliest computing devices designed to aid numeric computation

Grace Hopper

First real "computer scientist" Invested the first compiler

Levels of Intensity

For a black and white (Grayscale) picture we might use, say, 8 bits (one byte) to represent 256 levels of intensity, from 0 (black) to 255 (white) For a color picture we would have 3 bytes, one each for the intensity of red, green, and blue respectively (0,0,0) would still be black, while (255,0,0) would be red, (255,255,255) is white, etc. This is commonly called RGB (Red, Green, Blue) RGB typically uses 3 bytes (24 bits) for each pixel so that equates to 16,777,216 different possible colors

DRAM (Dynamic RAM)

RAM allows for both reading and writing in memory. Contrast this with ROM (read-only memory). Most RAM is volatile, or "dynamic". When you turn off the power, the contents of RAM is lost. Sometimes one talks about DRAM which is short for dynamic RAM).

Cycle Times

Generally the faster your computer can get through a fetch-decode-execute cycle, the faster it will perform. Cycle times are measured in "gigahertz", a billion cycles per second. PCs these days reach 3500 Megahertz or 3.5 Gigahertz (3 billion cycles/sec)

US vs Microsoft

In 1998 the Federal govt. filed a massive lawsuit against Microsoft which charged that it was in violation of anti-trust laws by having engaged in: -Predatory conduct (by giving away Internet Explorer for free is exercising unfair advantage over Netscape, which sells its browser) -Bundling (started closely linking Windows to Internet explorer, significant advantage over rivals as a result) -Exclusionary Contracts As relates to the deployment of Microsoft Internet Explorer at the expense of Netscape, a competing product

Apple vs. Samsung

In 2011 Apple alleged that Samsung used some of its IP in its Galaxy III cell phone Apple was simultaneously suing Motorola for similar patent infringement Known as the Mobile Patent Wars aimed at the incredible success of Android in the market, owned by Google Apple's actions against Samsung eventually spread to 50 different lawsuits across more than a dozen countries Samsung and Google countersued Apple in almost all cases In August 2012 a U.S. Court held for Apple and assessed $1B in damages against Samsung Although this judgment is being appealed by Samsung, Apple requested that Samsung be forced to stop selling its Galaxy Android based phones in the U.S. while the appeals are pending. Largest single damages award in recent history.

Transistor Functionality

In various circuits Transistors can be made to: Amplify or Attenuate electrical signals Invert electrical signals Store electrical voltage values Switch electrical signals off and on Transistors can be combined to create logic circuits commonly known as "GATES" Gates are packed into Integrated Circuits commonly known as "Chips"

Serial Bus

Limited paths Lower cost, lower size, lower weight Longer distance (generally) Where used: Serial busses are primarily used to connect external devices and peripherals. The data transfer rates of peripherals connected via serial are generally slower than those connected by parallel. Serial is convenient, relatively inexpensive and getting faster all of the time. The current serial standard for peripherals is called USB 2.0 and USB 3.0

Assembly language

Machine language slightly easier

XEROX

Many of the innovations that became part of the Personal Computer scene were actually invented at XEROX Parc (Palo Alto Research Center) Xerox was never able to successfully exploit those innovations that included the mouse, graphic user interface and the concept of WYSIWYG, (What you see is what you get)

TCP

Messages are broken up into units of a fixed size and sent out on the internet. These messages may be received in an order different from that in which they were sent. Each packet contains a destination address Individual packets may also be lost. TCP may request packets to be resent, and finally it puts the units back in order.

Desktop and Portable Computers (1975)

Microprocessors all-in-one designs, performance/price tradeoffs aimed at mass audiences personal computers workstations

Types of Access

RANDOM ACCESS (Main Memory, Flash) items are independently addressed access time is constant DIRECT ACCESS (Disc Drives) items are independently addressed in regions access time is variable—though not significantly SEQUENTIAL ACCESS (Tape Systems) items are organized in sequence (linearly) access time is significantly variable

Flash Memory

Non Volatile Memory Small, Convenient and Reliable Random Access Relatively expensive in terms of cost/Mb compared to Dynamic RAM Not as fast as Dynamic Ram Prices dropping every day, capacity increasing!

Typical Graphic Applications - bit-mapped graphics

Painting programs Image processing Text displays

Color accuracy

Proportional to memory as is brightness and contrast since their values must also be stored for each pixel

Copyrights

Protects the arrangement of your design including the text, the graphics, the industrial design

User Interface

Text-based Command Line Interpreters (CLIs) terse, powerful steeper learning curves, unforgiving Graphical User Interfaces (GUIs) intuitive, user-friendly slower, less efficient

IP

The Internet Protocol governs addressing and routing. An IP address is 4 numbers, each less than 256. For example, 156.222.111.255 The routers on the web know how to interpret IP addresses and send the packets to the correct destination. IP packets are also known as DATAGRAMS

Packet Errors

The Internet was designed to be a "best effort" network when it was conceived Performance, Security and Reliability enhancements have been band aids on top of the original, simple design Approximately 1-3 % of ALL packets sent over the Internet get lost and have to be re-transmitted

Software

The applications one uses or writes to get stuff done

Resolution

The capacity for detail contained in a message or signal. Representations with high resolution capture more detail than those with low resolution In the case of digital images, resolution is primarily determined by : Number of pixels Size of Pixels Density of Pixels

File Sharing

The legal debate centers on the issue of whether you have the right to share copyrighted material with other parties as opposed to making copies for your own personal use.

RAM (Random Access Memory)

The main computer memory is called RAM (Random Access Memory) It is "random" in that one may access any addressable memory unit independently of any other (and thus in "random" order). In almost all modern machines the smallest single addressable amount of memory is one byte. Memory is measured in megabytes or gigabytes or terabytes

Moore's "Law"

The number of transistors that can be manufactured into a square inch of integrated circuit doubles every 18 months or so. The amount of memory that can be supplied for a given cost doubles every 18 months or so and the speed of computation goes up by a factor of 2 about every 1.5 years

Hardware

The physical components of the computer - central processing unit, memory, input-output devices

Operating system

The program that serves as a buffer between the user and the hardware

How does Google (and similar) work?

The short, short summary is that Google (and other search engines) continuously crawl the web, using a program called a spider or crawler. It stores a local copy of the pages it finds, and builds a lexicon of common words. For each word, it creates a list of pages that contain that word. A query for a given word returns that list, sorted by pagerank. Pagerank is computed based on the pageranks of the pages linking to a document.

Intel 4004 Microprocessor

This technology made the personal computer possible

Origins of the "web"

Tim Berners-Lee and CERN project (1989) Initially a distributed, hypertext system for disseminating physics and scientific research Pages based on a markup language that can be shared by different computer systems

Bitmap Graphics

To display things on the computer monitor, a modern-day computer has built in hardware (memory) for storing a "bitmap" that represents the "picture" that should be displayed on the monitor. The Bitmap is stored in MEMORY.....the more bits stored, the more memory required....

Output Peripherals

Video output displays Color LCD predominately Printers character, line, and page(laser) Audio output Secondary Storage Devices Network Connections

Memory Manager

When we click on a Word document, the OS must bring first the Word program into RAM, and then the particular document we wish to work on. Allocating segments of RAM to each program is the responsibility of the memory manager.

Multitasking

While most modern computers can only execute one operation at a time, it is often useful to give users the illusion that several things are going on at the same time

Wireless

Wifi and Bluetooth


Set pelajaran terkait

F9 Exit Row Briefing Flash Cards

View Set

State Requirements Insurance Test

View Set

Taxation during the spanish time

View Set

Chapter 1 - Real Estate Practice

View Set

Chapter 45. Orientation to the Lab

View Set

Chapter 13: Labor and Birth Process

View Set

Function and Function Notation Vocabulary

View Set

The great gatsby study questions

View Set