Intro to Computing

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Data Interference

Unauthorized tampering with, destroying, deleting, or deteriorating computer data, electronic documents, or electronic data messages, as well as the introduction or transmission of viruses.

Misuse of devices

Unauthorized use, possession, production, sale, procurement, importation, distribution, or otherwise making available of gadgets, computer programmes, or other materials developed or adapted for committing any of the acts listed in Republic Act 10175. Unauthorized use of a computer password, access code, or similar data that allows the entire or a portion of a computer system to be accessed with the intent of using it

Child Pornography

Unlawful or banned activities conducted through a computer system, as defined and punished by Republic Act No. 9775 or the Anti-Child Pornography Act of 2009.

First Gen Computers (1946-1957)

Used vacuum tubes, too bulky, first device to hold memory

Corporate Liability

When any of the punishable acts herein defined are knowingly committed on behalf of or for the benefit of a juridical person

Octal Number System

a base-8 system, consisting of the symbols 0 through 7.

Libel

committed using a computer system or any other similar means that may be created in the future. Penal Code Revision According to Article 355 Libel is defined as defamation of character by writings or other means. Libel committed by writing, printing, lithography, engraving, radio, phonograph, painting, theatrical exhibition, cinematographic exhibition, or any other similar

Cybercrime

computer crime is the use of a computer as an instrument to further illegal ends such as committing fraud trafficking child pornography, intellectual property violations, stealing identities or violation of privacy.

ASCII CODE

each key on the keyboard is given a binary value, 8 bits sytem

Fifth Gen Computers (Now and Future)

employ AI (artificial Intelligence) More advanced

Binary to Octal

groups of 3

Binary Coded Decimal (BCD)

number system that uses 4 bits to represent each denary digit

Integrated Circuit (IC)

semiconductor material, that contains thousands of transistors miniaturized

Fourth Gen Computers (1971-present)

took advantage of the invention of the microprocessor, more commonly known as a CPU. Microprocessors, with integrated circuits, helped make it possible for computers to fit easily on a desk and for the introduction of the laptop.

Third Gen Computers (1964-1970)

using integrated circuits instead of transistors.

Cybersquatting

Acquisition of a domain name in bad faith on the internet to profit, deceive, harm reputation, and prevent others from registering it. This includes trademarks that were already registered at the time of registration, names of people other than the registrant, and trademarks that were purchased with intellectual property interests in them. Those who get domain names of prominent brands and individuals who in turn are used to damage their reputation can be sued under this provision

The first computer programmer

Ada Byron or Ada Lovelace

Who is known as father of modern computer?

Alan Turing

Bug

An error in a program.

Attempt in the commission of cybercrime

Any person who willfully attempts to commit any of the offences enumerated in this Act shall be held liable.

Aiding or Abetting in the commission of cybercrime

Anyone who knowingly assists or abets the conduct of any of the offences listed in this Act will be held accountable.

Based Two digits

Binary

French mathematician and philosopher who invented a calculating device that would come to be called adding machine (Pascaline)

Blaise pascal (1623-1662)

Invented the analytical engine on 1833, Father of Computer

Charles babbage (1791-1871)

Advantages of Cybercrime Prevention Act of 2012

Cybersex, Cyberbullying, Child pornography are now offences and such offenders can be punished. The children's rights are protected by this Act

Based ten digits

Decimal

First electronic computer

ENIAC 1946

Debugging

Finding and fixing problems in code

Cybersex

For favour or consideration, willful engagement, maintenance, control, or operation, directly or indirectly, of any lascivious presentation of sexual organs or sexual activity via a computer system.

Inventor of tabulating machine

Herman Hollerith

Inventor of Mark I

Howard Aiken (1900-1973)

Illegal Interception

Interception of any non-public communication of computer data to, from, or within a computer system by an unauthorized person.

IBM

International Business Machines

French weaver who used 10,000 punch cards to programmed a loom to weave a portrait of himself in black and white silk

Joseph jacquard

Binary (1,0)

Machine Language

Tabulating Machine

Made for the US Census using electricity and punch cards to store info.

First bug in computer

Moth

Who signed the Republic Act no. 10175 or Cyber Prevention Act of 2012

Mr. Benigno Aquino

When was Republic Act no. 10175 signed?

September 12th of 2012

Disadvantages of Cybercrime Prevention Act of 2012

The implementation and execution of this Act yearly cost a huge cost to the government.

Abacus

This device allows users to make computations using system of sliding beads arranged on a rack, Considered the first computer

Second Gen Computers (1958-1963)

Transistors replaced vacuum tubes, size reduced

Computer-related Fraud

Unauthorized access to, alteration of, or deletion of computer data or programmes, or interference with the operation of a computer system, with the purpose to cause damage.

Computer-related Identity Theft

Unauthorized acquisition, use, abuse, transfer, possession, change, or deletion of an individual's identifying information, whether natural or legal.

Computer related Forgery

Unauthorized input, alteration, or deletion of computer data that results in inauthentic data with the intent that it be considered or acted on for legal purposes as if it were authentic, regardless of whether the data is directly readable and intelligible; or the act of knowingly using computer data that is the product of computer-related forgery as defined here to perpetuate .

System Interference

Unauthorized interference with the operation of a computer or computer network, including the introduction or transmission of viruses, by inputting, transmitting, damaging, deleting, deteriorating, altering, or suppressing computer data or programmes, electronic data messages, or by deleting, deteriorating, altering, or suppressing them.

Illegal Access

Access to a computer or any application without permission.

binary number of 1

0001

8 bits is equal to

1 byte

binary number of 15

1111

Census

A complete enumeration of a population.

Hexadecimal Number System

A number system consisting of 16 distinct symbols — 0-9 and A-F — which can occur in each place value.


Set pelajaran terkait

Entrepreneurial Small Business Ch.1

View Set

Chapter 13 Quizzes (All MC options)

View Set

A&P Final Questions- Autonomic Nervous System

View Set

Colons, Semicolons, Comma rules, Writing Terminology, Subject-verb agreement rules, SOAPStone, To Kill A Mockingbird Test Review, Common Core Literature List Vocab

View Set