csc 105 chapter 1
a period in history when information is easy to access and affects many aspects of everyday life
ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet
small, standalone computers powered by local software
any software that is installed on a computer’s hard drive
group of computers linked together to share data and resources
global computer network originally developed as a military project, and was then handed over to the National Science Foundation for research and academic use
world wide web
a collection of linked documents, graphics, and sounds that can be accessed over the Internet
provides access to information, applications, communications, and storage over the Internet
several technologies with distinct functionalities evolve to form a single product
cloud-based applications designed for social interaction and consumer-generated content
Software and/or hardware that cloaks the origin of an e-mail or a Web page request
the ownership of certain types of information, ideas, or representations
illegal copying and distribution of copyrighted material
projects that promote copying, free distribution, peer review, and user modification
worldwide economic interdependence of countries that occurs as cross-border commerce increases and as money flows more freely among countries
the gap between people who have access to technology and those who do not
multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions
whatever is typed, submitted, or transmitted to a computer system. Input can be supplied by a person, by the environment, or by another computer
the result produced by a computer
the symbols that represent facts, objects, and ideas
the many ways in which computers manipulate data
ex: preforming calculations, modifying documents
ex: preforming calculations, modifying documents
central processing unit
where most processing takes place
electronic component that can be programmed to perform tasks based on data is receives, the central processing unit of most modern computers
an area of a computer that temporarily holds data waiting to be processed, stored, or output
the area where data can be left on a permanent basis when it is not immediately needed for processing
a named collection of data that exists on a storage medium, such as a hard disk, CD, DVD, or flash drive
The series of instructions that tells a computer how to carry out processing tasks
sets up a computer to do a specific task
a series of instructions for a computing task can be loaded into a computer’s memory
set of computer programs that helps a person carry out a task
help the computer system monitor itself in order to function efficiently
computer operating system
the master controller for all the activities that take place within a computer
microprocessor-based computing device designed to meet the computing needs of an individual
are handheld devices personal computers?
ONLY if they allow users to install software applications (apps)
powerful desktop computers used for high-performance tasks, such as medical imaging and computer-aided design, that require a lot of processing speed
serve computers on a network (such as the Internet or a home network) by supplying them with data
Any software or digital device, such as a computer, that requests data from a server
process of copying a file from a server to your own client computer
the process of copying files from your client computer to a server
large and expensive computer capable of simultaneously processing data for hundreds or thousands of users
if at the time of construction, it is one of the fastest computers in the world
computer intensive problem
requires massive amounts of data to be processed using complex mathematical calculations
special-purpose microprocessor that is built into the machine it controls
the form in which data is stored, processed, and transmitted
are microcontrollers computers?
they are processors, not computers
text, numbers, graphics, sound, and video that have been converted into discrete digits such as 0s and 1s
represented using an infinite scale of values.
a 0 or 1 used in the digital representation of data
consists of numbers that can be used in arithmetic operations
composed of letters, symbols, and numerals that are not used in arithmetic operations
requires only seven bits for each character
uses eight bits to represent each character
group of eight bits
a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires, transistors, capacitors, logic gates, and resistors
substances with properties between those of a conductor (like copper) and an insulator (like wood)
houses all essential chips and provides connecting circuitry between them
The human-readable version of a program created in a high-level language by a programmer
converts all the statements in a program in a single batch, and the resulting collection of instructions is placed in a new file (Figure 1-34)
resulting instructions after compiler converts statements into single batch
converts and executes one statement at a time while the program is running
collection of preprogrammed activities in microprocessor
list of codes for a microprocessor’s instruction set
set of machine language instructions for a program
command word for an operation such as add, compare, or jump
specifies the data, or the address of the data, for the operation
hold data that is being processed
performs arithmetic operations, such as addition and subtractionand logical operations, such as comparing two numbers to see if they are the same
fetches each instruction
any method that confirms a person’s identity using something the person knows, something the person possesses, or something the person is
fingerprint, facial features (photo), or a retinal pattern
series of characters—letters and possibly numbers or special symbols—that becomes a person’s unique identifier, similar to a Social Security number… it is PUBLIC
helps hackers guess your password by stepping through a dictionary containing thousands of the most commonly used passwords
brute force attack
exhausts all possible combinations of letters to decrypt a password
intercepts information sent out over computer networks
hacker poses as a legitimate representative of an official organization such as your ISP, your bank, or an online payment service in order to persuade you to disclose highly confidential information
software that secretly records a user’s keystrokes and sends the information to a hacker
stores user IDs with their corresponding passwords and automatically fills in login forms
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
____ media are cloud-based applications designed for social interaction and consumer-generated content.
____ software refers to any software that is installed on a computer’s hard disk.
____ tools cloak a person’s identity online.
1,024 bytes is a ____.
1,048,576 bytes is a ____.
A ____ is a series of characters that becomes a person’s unique identifier.
A group of computers linked together to share data and resources is a(n) ____.
A named collection of data that exists on a storage medium is known as (a) ____.
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.
A set of computer programs that helps a person carry out a task is ____.
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.
A(n) ____ converts and executes one statement at a time.
According to the text, a key aspect of ____ is that it adds content and substance to ____.
the internet, the web
Data becomes ____ when it is presented in a format that people can understand and use.
During the period from ____, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications.
In 1982, the percentage of households that had a computer was closest to ____ percent.
Initially sales were slow for the personal computer because of ____.
lack of software
Password management functions include all of the following EXCEPT ____.
Storage is typically expressed as ____.
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
The ____ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.
The binary number 10 represents ____ in the decimal number system.
The first digital computers were built during World War II for ____.
The type of code that uses eight bits for each character is ____.
When restrictions on commercial use of the ____ were lifted in 1995, companies such as AOL and CompuServe became popular services.
Get access to
MOney BackBecome a Member
Guarantee No Hidden
Guarantee No Hidden