Computer concepts

Ace your homework & exams now with Quizwiz!

Hybrid computers

Machines that incorporate in a single computer both the analog and digital features. These computers are used in working out special types of problems in science and various areas of engineering, such as space vehicle simulations and training of astronauts.

Republic Act No. 8293 - Intellectual Property Code of the Philippines

Philippine copyright law for literary and artistic works also protects patents and trademarks

Hardware

Refers to the physical component of the computer system.

Peopleware

Represent the personnel involve in system analysis, programming, computer operation, system maintenance, the enduser, and the like.

Output

Results are collected

Data processing

The manipulation of raw data into a more useful form called information.

Data processing

The modern name of paperwork and involves collection, processing and distributing of facts and figures to achieve a desired result.

Secondary storage device

The physical devices are physically separated but connected directly to the CPU through a communication line so that programs or data can be accessed with almost no intervention from human operator

Manual data processing

The processing of data manually or through mechanical devices.

Electronic data processing

The processing of data through the use of computers.

Software privacy

The unauthorized copying of software or any intellectual property

Super computers

These are the biggest and fastest machines today where numerical computations are carried out at speeds of up to 50 million operations per second.

World Intellectual Property Organization (WIPO).

This organization was founded in 1967 as one of the specialized agencies of the United Nations organizations, and it has since remained responsible for the protection of intellectual property.

Hacking

To modify a program, often in an unauthorized manner, by changing the code itself.

Manual & Electronic Data processing

Types of data processing

On-Line processing

Uses device directly connected to the CPU either for data entry or inquiry purposes.

Gigabyte (GB)

a billion bytes or 1,073,744,824 bytes

megabyte (MB)

a million bytes or 1,048,576 bytes

John Brunner

a novel entitled the "Shockwave Rider" coined the term "worm" by using it to describe a particular program that circulates itself through a computer network.

RAM (random access memory)

a place where the programs and software we load gets stored.

Scavenging

a simple search to company trash cans and dumpsters for printouts containing no - for - distribution information.

Hertz(Hz)

a single clock cycle per second

salami technique

a technique that reflects the small "slices" of money that may be squirreled away undetected from a large financial system.

Terabyte (TB)

a trillion bytes or 1,009,511,627,776 bytes

Bit (binary)

either ON (1) or OFF (0)

Nibble

group of 4 bits.

Byte

group of 8 bits.

Frederick Cohen

he used the term virus in order to explain when a particular computer program is able to infect additional computer programs because it was capable of replicating itself.

John Walker

he wrote the ANIMAL for the UNIVAC 1108. This became known as on of the first non-malicious Trojans. It spread to other UNIVACs when computer users discovered the game due to overlapping permissions. It was also spread by sharing tapes.

Input

initial data is entered. it is how we input data

Store

input data and results are stored for future use. For us to reuse the data. Saving time and effort.

Processing

input data is changed and is usually combined with other information.

Software

instructions that tell the computer what to do.

ILOVEYOU worm

is a computer worm purportedly created by a Filipino computer science student. Written in VBScript, it infected millions of Windows computers worldwide within a few hours of its release. Using social engineering techniques, it is considered to be one of the most damaging worms ever.

Microcomputers

is a digital computer system that uses a microprocessor (the CPU on a chip), a programmable ROM and a RAM. Basically designed for hobbyist.

Computer

is an electronic device designed to accept data, process data based on stored instructions, store data so that useful information can be generated.

Computer

is an electronic device designed to manipulate data so that useful information can be generated.

BPS (Bytes per second)

is used to measure modem speeds.

control unit

it acts as a supervisor that controls and supervises the operation in the CPU

Copyright implementation

it is done with the coordination of the Intellectual Property Office or IPO and the Copyright Division of the National Library of the Philippines.

Clock speed

it is how fast a computer processes

Primary storage device

it is the computers main memory.

Memory unit

it is the storage device of the computer.

ROM ( read only memory)

it is where the CPU fetches or reads instructions.

Arithmetic logic unit (ALU)

it performs the mathematical and logical operations of the computer system.

Denial of service (DoS) attack

occurs when hackers bombard a site with more requests for service that it can possibly handle, preventing legitimate users from accessing the site.

Ordinary users

people who uses computer on day to day basis.

Information

process data, e.g. number of students, average age, number of male students, highest score in a quiz

System software

programs which control and assist in the computer operation. (e.g. operating system, compilers, utility programs, etc.) *classification of software*

Application software

programs which provide a solution to a specific operation or application. (e.g. business software, desktop publishing, Office productivity, etc.)

Data

raw fact, e.g. name, age, sex, score

data diddling

refers to changing data before or as it enters the system.

ethics

refers to the rules and standards governing the conduct of an individual with others.

Worm

similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action; takes advantage of file or information transport features on your system, which is what allows it to travel unaided.

false

t/f? A computer can come out with an original "decision."

true

t/f? A computer cannot correct wrong instructions.

true

t/f? A computer cannot derive meanings from objects

true

t/f? A computer has dependence on prepared instructions

true

t/f? A wireless mouse and keyboard run on batteries and communicate with the computer the same way a remote control communicates with a television.

false

t/f? The computer can generate information on its own.

false

t/f? analog, digital and hybrid computers are classified according to their capacity.

True

t/f? notebook computers are low-end functional, computers (cheap PCs), fully-powered PCs, workstations

Digital computers

they are computers that specialize in counting or discrete values such as business systems.

optical mouse

type of mouse that operates by using an infrared sensor. You can identify an optical mouse by the telltale red glow emanating from its underside.

Republic Act No. 10175

"Cybercrime Prevention Act of 2012" Approved by Pres. Benigno Aquino on Sept. 12, 2012

Republic Act No. 8792

"Electronic Commerce Act of 2000" approved by Pres. Joseph Estrada in June 14, 2000. -An Act Providing For The Recognition And Use Of Electronic Commercial And Non -Commercial Transactions And Documents, Penalties For Unlawful Use Thereof And For Other Purposes

Richard Skrenta

"Elk Cloner" for the Apple II Systems was created by ________ . It infected the Apple DOS 3.3 and spread to other computers by floppy disk transfer. The "Elk Virus" was responsible for being the first computer virus to cause a massive outbreak ever in history.

Republic Act No. 10844

-Department Of Information And Communications Technology Act Of 2015 -Approved by Pres. Benigno Aquino on May 23, 2016 -An Act Creating The Department Of Information And Communications Technology, Defining Its Powers And Functions Appropriating Funds Therefor, And For Other Purposes

Mini Computers

-These are increasingly powerful and do almost anything that large computers do, only more slowly and at much lower cost. -This makes it ideal for small companies where capacity and speed of operations is not highly critical.

Mainframes

-These computers are the ultimate in sophistication, flexibility and speed. -These are very expensive machines and their main concern is to prove their cost effectiveness. -These computers are valuable to the larger firms which can provide both skilled programmers and continuous applications, involving thousands of employees and hundreds of thousands of customer accounts on a daily basis.

Midrange computers

-These computers provide greater operating speed, larger memory capacity, and high-speed input-output devices than the mini-computers and microcomputers. -It have a unique feature called virtual memory by which the main memory capacity is made to appear larger than the actual size.

CPU (central processing unit)

-This is the brain of the computer. -All operations performed by the computer system are controlled by this physical device. -This is sometimes referred to as the processor or central processor. -This is the most important element of a computer system

End users

-specialized user -The user of Information System.

Megahertz (MHz)

1 million cycles per second.

kilohertz (kHz)

1000 cycles per second.

kilobyte (KB)

1024 or 210 bytes

according to: purpose, data handled, capacity

3 Classifications of computer

computer ethics

A code of ethics provides direction for computer professionals and users so that they act responsibly in their application of information technology.

Copyright

A form of protection provided by laws to the authors of original works, or owners of intellectual property.

Recording, Storing, retrieving, selecting/classifying, sorting, computing

Basic data processing activity.

etc.

Capabilities of a computer

etc.

Characteristics of computer.

Hardware, Software, Peopleware, Data / information, Procedures

Computer system components

Analog computers

Computers commonly used for scientific and engineering problems, particularly in chemical industries, electric power plants, and petroleum refineries.

Batch processing

Data are collected by groups to permit convenient, efficient and serial processing.

Input, Processing, Store, Output

Data processing cycle

Batch, On-Line, Real-Time Distributed processing

Data processing methods

Distributes processing

Generally consists of remote terinals linked to a large central computer systems to help the user conduct inquiries about accounts, process jobs or other data processing operations.

Specific purpose

Handles specific problem or to perform a specific task. (e.g. those used for collecting highway tolls, airline reservations, satellite tracking, air traffic control and industrial process control).

General Purpose

Handles variety of different problems and to meet different needs (e.g. varied business applications such as payroll, accounts receivable, inventory control, budgeting and sales analysis)

Real-Time processing

Has a capability of fast response to obtain data from an activity or a physical process, perform computations and return a response fast enough to affect the outcome of the activity or process.

John von Neumann

He wrote an article the entitled "Theory of Self-Reproducing Automata" This was based his lectures he had held 18 years earlier on this theory.

SINGLE-CHIP PROCESSOR or a SYSTEM-ON-A-CHIP

aka Microcomputers

Love bug worm

aka as ILOVEYOU worm

auxiliary devices

aka as secondary storage

Piggybacking

an illicit user "rides" into the system on the back of another user.

Trojan Horse

appears to be useful software but will actually do damage once installed or run on your computer. Once activates, results may vary; from annoying (changing the desktop or adding silly icons) to serious (deleting or destroying files); can also create backdoor to your computer, allowing malicious access to your confidential or personal information.

Virus

attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels; can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files; Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program.

Bomb

causes a program to trigger damage under certain conditions; it is usually set to go off at a later date.

Intellectual property

creations of the human intellect and their protection, usually by copyright which includes: literary, artistic, and scientific works performances of performing artists, phonograms, and broadcasts inventions in all fields of human endeavor scientific discoveries.


Related study sets

Chemistry Unit 6 TEST States of matter

View Set

APUSH Period 1 Critical Thinking Questions

View Set

RN Pharmacology Online Practice 2023B

View Set

Chapter 14: Oligopoly and Monopolistic competition

View Set