21
Data (or input) Collection of unprocessed items (text, numbers, images, audio, video) Information (or output) Conveys meaning and is useful to people data/information Computers process ____ to create ___________. Input devices, output devices, storage devices, communications devices, and a system unit Components of a computer Input device Any hardware component that allows you to enter data and instructions into a computer (i.e. keyboard, mouse, microphone, scanner, webcam) Output device Any hardware component that conveys information to one or more people (i.e. printer, monitor, speakers) System unit A case that contains the electronic components of the computer that are used to process data. Mother board Where is the circuitry of the system unit located? Processor (CPU) and memory Two main components on the motherboard? Storage device Holds data, instructions, and information for future use. Storage media USB flash drives, hard disks, optical discs, DVD disc, and memory cards are examples of? Storage device

Computer Concepts Notes

Embed Size (px)

DESCRIPTION

Notes for intro to computer concepts course.

Citation preview

Page 1: Computer Concepts Notes

Data (or input)Collection of unprocessed items (text, numbers, images, audio, video)

Information (or output)Conveys meaning and is useful to people

data/informationComputers process ____ to create ___________.

Input devices, output devices, storage devices, communications devices, and a system unitComponents of a computer

Input deviceAny hardware component that allows you to enter data and instructions into a computer (i.e. keyboard, mouse, microphone, scanner, webcam)

Output deviceAny hardware component that conveys information to oneor more people (i.e. printer, monitor, speakers)

System unitA case that contains the electronic components of the computer that are used to process data.

Mother boardWhere is the circuitry of the system unit located?

Processor (CPU) and memoryTwo main components on the motherboard?

Storage deviceHolds data, instructions, and information for future use.

Storage mediaUSB flash drives, hard disks, opticaldiscs, DVD disc, and memory cards are examples of?

Storage devicerecords(writes) and/or retrieves (reads) items to and fromstorage media (i.e. DVD drive)

Optical Discs (Storage media)CDs, DVDs, and Blurays are?

Communications deviceA hardwarecomponent that enables a computer to send

Page 2: Computer Concepts Notes

(transmit) and receive data, instructions, andinformation to and from one or more computersor mobile devices (i.e. a modem).

Host (or a server)Any computer that provides services and connectionsto other computers on a network

The internetCombination of NSFnet and ARPANET gave birth to?

World wide web consortium - Oversees research and sets standards and guidelines for many areas of the internet.What is the W3C

Internet2 is a not-for-profit research anddevelopment project that connects more than 200 universities and 115 companies via a high-speed private network.What is internet2?

Broadband Internet (i.e. cable, dsl, satellite)Computer or mobile device is connected to the internet the entire time it is powered on. What service is this called?

Dial-up internetWhat service? Modem in the computer connects to the internet via a standard telephone line that transmits data and information using an analog signal.

Top-level domainLast section of a domain name (.com, .net, .org)

Application softwareprograms designed to make users more productive and/or assist them with personal tasks.

Business (word processing, spreadsheet), Graphics and multimedia (Computer-aided design (CAD), desktop publishing, prof. editing), Home/personal/educational (taxes, personal editing, entertainment), and Communications (Chat, Skype, email).Categories of application software and examples?

Multi-core processorA single chip with two or more separate processor cores.

Dual-core processorA chip that contains two separate processor cores.

Quad-core processor

Page 3: Computer Concepts Notes

A chip with four separate processor cores.

Control unit/ Arithmetic Logic UnitProcessors contain a _______ ____ and an __________ _____ ____ (ALU) which work together to perform processing operations.

Control unit, arithmetic logic unit, register, system clock.Components of a processor?

Control unitDirects and coordinates most of the operations in the computer. Interprets each instruction issued bya program and then initiates the appropriateaction to carry out the instruction.

Arithmetic/logic unit (ALU)Performs arithmetic, comparison, and other operations.

RegistersA processor contains small, high-speed storagelocations, called _________ that temporarily holddata and instructions.

1. Fetching2. Decoding3. Executing4. StoringSteps in the machine cycle?

Machine cycleFor every instruction, a processor repeats aset of four basic operations, which comprisea _______ _____

PipeliningThe processor begins fetching a second instruction before it completes the machine cycle for the first instruction. This is called?

system clockThe processor relies on a small quartz crystal circuit called the ______ _____ to control the timing of all computer operations.

Volatile/nonvolatileThe system unit contains two types of memory:________ and ___________.

temporary/permanentVolatile memory is _________and nonvolatile memory is _________.

Page 4: Computer Concepts Notes

volatileRAM is the most common type of ________ memory.

RAMAlso called main memory, it consists of memory chips that can be read from and written to by the processor and other devices.

dynamic, static, magnetoresistiveThree basic types of RAM chips exist: _______RAM, ______ RAM, and ________________ RAM.

Dynamic RAM (DRAM)Must be re-energized constantly or theylose their contents.

Static RAMFaster and more reliable than any variation of DRAM chips. These chips do not have to be re-energized as often as DRAM chips.

Magnetoresistive RAM (MRAM)Stores data using magnetic charges instead of electrical charges. Has greater storage capacity, consumesless power, and has faster access timesthan electronic RAM

RAM, cache, ROM, flash memory, CMOS?Types of memory

Memory cache and disk cacheTwo types of cache?

Memory cacheHelps speed the processes of the computer because it stores frequently used instructions and data.

cacheComputers improve their processing times with?

L1 (Quicker & smaller capactiy) --> L2 (slower and larger capacity) --> L3 (separate chip) --> RAMThe cache cycle

Read-only memory (ROM)Refers to memory chips storing permanent data and instructions.

ROM

Page 5: Computer Concepts Notes

___ is nonvolatile, which means its contents are not lost when power is removed from the computer.

FirmwareROM chips that contain permanently written data, instructions, or information.

(PROM) Programmable read-only memoryBlank ROM chip on which a programmer can write permanently.

(EEPROM) Electrically erasable programmable read-only memoryAllows a programmer to erase the microcode with an electric signal.

Flash memoryA type of nonvolatile memory that can be erased electronically and rewritten, similar to EEPROM.

FlashMost computers use _____ memory to hold their startupinstructions because it allows the computereasily to update its contents.

CMOS (complementary metal-oxide semiconductor)____ technology uses battery power to retain information even when the power to the computer is off.

off0 in data representation means ___

on1 in data representation means __

BitAnother name for a binary digit (0 and 1)

BitSmallest unit of data a computer can process.

ByteA name for when 8 bits for together.

256A byte can represent ___ individual characters.

Coding schemeThe combination of 0s and 1s that represent characters are defined by patterns called a ______ ______.

Page 6: Computer Concepts Notes

ASCIIWhat is the most widely used coding scheme to represent data?

ProgramA series of related instructions that tells a computer what tasks to perform and how to perform them.

CommandAn instruction that causes a program to perform a specific action.

User Responsean instruction a user issues byreplying to a question displayed by a program.

Storage media (or secondary storage)The physical material on which a computer keeps data, instructions, and information. (i.e. hard disks, solid state drives, memory cards, flash drives, expresscard modules, optical disks...etc)

nonvolatile -- meaning it's permanentA storage medium is ___________. What does that mean?

Storage deviceComputer hardware that records and/or retrieves items to and from storage media.

ReadingThe process of transferring items from a storagemedium into memory.

System softwareThe programs that control or maintain the operations of the computer and its devices.

operating systems/utility programsTwo types of system software are _________ _______ and _______ ________.

Functions of an operating systemStarting and shutting down a computer, providing a user interface, managing programs, managing memory, coordinating tasks, configuring devices, establishing an Internet connection, monitoring performance, providing file management and other utilities, and automatically updating itself and certain utility programs. These are all?

Warm bootThe process of using the operating system to restart a computer.

Boot driveThe drive from which your personal computer boots (starts).

Page 7: Computer Concepts Notes

Stand alone operating system (client operating system)A complete operating system that works on a desktop computer, notebook computer, or mobile computing device. (i.e. Windows 7, Mac OS X, UNIX, Linux)

Embedded operating systemThe operating system on mobile devices and many consumer electronics. (i.e. Windows embedded, iPhone OS, Blackberry, Google Android..)

Utility programsSystem software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.

Functions of utility programsManaging files, searching for files, viewing images, uninstalling programs, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen savers,securing a computer from unauthorized access, protecting against viruses, removing spyware and adware, filtering Internet content, compressing files, playing media files, burning optical discs, and maintaining a personal computer. These are all?

A sending device that initiates an instruction to transmit data, instructions, or information.

A communications device that connects thesending device to a communications channel.

A communications channel, or transmissionmedia on which the data, instructions, orinformation travel.

A communications device that connectsthe communications channel to a receivingdevice.

A receiving device that accepts thetransmission of data, instructions, orinformation.Components for successful communication?

NetworkA collection of computers and devices connectedtogether via communications devices and transmissionmedia.

Facilitating communications — Using a network, people communicate efficiently and easily via e-mail, instant messaging, chat rooms, blogs,

Page 8: Computer Concepts Notes

wikis, online social networks, video telephone calls, online meetings, video conferencing, VoIP, wireless messaging services, and groupware.

Sharing hardware — In a networkedenvironment, each computer on the networkcan have access to hardware on the network.

Sharing data and information — In anetworked environment, any authorized computer user can access data and infor mationstored on other computers on the network.

Sharing software — Users connected to a network have access to software on the network.

Transferring funds — Called electronic fundstransfer (EFT ), it allows users connected toa network to transfer money from one bankaccount to another via transmission media.Advantages of using a network?

Communications software(1) help users establish a connectionto another computer or network; (2)manage the transmission of data, instructions,and information; (3) provide an interfacefor users to communicate with one another.

Communications_____________ software works with the network standards and protocols just discussed to ensure data movesthrough the network or the Internet correctly.

Communications software_____________ ________ helps users establish an Internetconnection using wizards, dialog boxes, and other on-screen messages. Another allows home and small office users to configure wired and wireless networks and connect devices to an existing network.

Communications deviceany type of hardware capable of transmitting data, instructions, and information between a sending deviceand a receiving device.

dial-up modemCommunications device that can convert digital signals to analog signals and analog signals to digital signals, so that data can travel along an analog telephone line.

Page 9: Computer Concepts Notes

digital modemCommunications device that sends and receives data and information to and from a digital line. Three types of digital modems are ISDN modems, DSL modems, andcable modems.

wireless modemUses the cell phone network to connect to the Internet wirelessly from a notebook computer, a smart phone, or other mobile device.

Network cardA communications device that enables a computer or device that does not have built-in networking capability toaccess a network.

RouterCommunications device that connects multiple computers or other routers together and transmits data to its correct destination on a network.

PhysicalUses wires. Twisted-pair cable, coaxial cable, and fiber-optic cable are all part of ________ transmission media.

Wireless transmission mediaWireless due to convenience and/or inability to install wires. Infrared, broadcast radio, cellular radio, microwaves, and communications satellites are all part of ________ transmission media.

DatabaseCollection of data organized in a manner that allows access, retrieval, and use of that data.

databaseComputers process data in a ________ intoinformation.

Database management systems (DBMS)Users create a computerized database; add, modify, and delete data in the database; sort and retrieve data from the database; and create forms and reports from the data in the database.

Character/field/record/fileWhat does the hierarchy of of data consist of?

characterIn the ASCII coding scheme, each byte represents asingle _________, which can be a number (4), letter (R), space, punctuation mark (?), or other symbol (&).

Page 10: Computer Concepts Notes

fieldA _____ is a combination of one or morerelated characters or bytes and is the smallestunit of data a user accesses.

RecordA group of related fields.

Primary keyA field that uniquely identifies each record in afile.

data fileCollection of related records stored on a storage medium such as a hard disk or optical disc.

File maintenanceThe procedures that keep data current.

adding/modifying/deletingFile maintenance proceduresinclude ______ records to, _________ records in,and ________ records from a file.

processingIn a typical file __________ system each department or area within an organization has its own set of files.

Data redundancy and isolated dataTwo weaknesses of a file processing system?

databaseWhen an organization uses a ________ approach, many programs and users share the data in the database.

Reduced data redundancy, improved data integrity, shared data, easier access, reduced development time.Strengths of the database approach?

complexA database can be more _______ than a file processingsystem.

vulnerableData in a database can be more __________than data in file processing systems.

Page 11: Computer Concepts Notes

You fill in a form or enter search text on a Web page.How do you access data in a web database?

Computer security riskAny event or action that could cause a loss of or damage to computer hardware, software, data, information,or processing capability.

Computer crimeAny illegal act involving a computergenerally is referred to as a ________ _____.

CybercrimeOnline or Internet-based illegal acts.

CrimewareSoftware used by cybercriminals

HackerSomeone who accesses a computer or network illegally.

CrackerSomeone who accesses a computer or network illegally but has the intent of destroying data, stealinginformation, or other malicious action.

Script kiddieHas the same intent as a cracker but does not have the technical skills and knowledge. Often use prewritten hacking and cracking programs to break into computers.

CyberextortionistSomeone who uses e-mail as a vehicle for extortion.

CyberterroristSomeone who uses the Internet or network to destroy or damage computers for political reasons.

Acceptable Use Policy (AUB)At minimum, organizations should have a written __________ ____ ______ that outlines the computer activities for which the computer and network may and may not be used.

file/printerTo protect your personal computer from unauthorized intrusions, you should disable ____ and _______ sharing on your Internet connection.

Firewall, intrusion detection software, identifying and authenticating users.

Page 12: Computer Concepts Notes

Safeguards against unauthorized computer access examples?

IdentificationVerifies that an individual is a valid user.

AuthenticationVerifies that the individual is the person he or she claims to be.

PiracyUnauthorized and illegal duplication of copyrighted software.

license agreementsTo protect themselves from software piracy,software manufacturers issue users _______ __________.

License agreementThe right to use the software.

backupDuplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.

Optical discs, external hard-disk, RAID configuration, cloud storage,Options for backing up computer resources?

Information privacyThe right of individuals and companies to deny or restrictthe collection and use of information about them.

CookiesA small text file that a Web server stores on your computer.

Cookie______ files typically contain data about you,such as your user name or viewing preferences.

SpamAn unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.

PhishingA scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information.

PharmingA scamwhere a perpetrator attempts to obtain yourpersonal and financial information, except they do so via spoofing. That

Page 13: Computer Concepts Notes

is, when you type a Web address in the Web browser, you are redirected to a phony Web site that looks legitimate.

ClickjackingAn object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program.

SpywareA program placed on a computer without the user's knowledge that secretly collects information about the user.

AdwareA program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail messages, or other Internet services.

Fair credit reporting actThe act limits the rights of others viewing a credit report to only those with a legitimate business need.

Social engineeringGaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

Employee monitoringThe use of computers to observe, record, and review anemployee's use of a computer, including communicationssuch as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.

Content filteringThe process of restricting access to certain materialon the Web.

SystemA set of components that interactto achieve a common goal.

Information system (IS)a collection of hardware, software, data, people, and procedures that work together to produce qualityinformation.

System developmentA set of activities used to build an information system.

5 phases of the system development life cycle1. Planning2. Analysis

Page 14: Computer Concepts Notes

3. Design4. Implementation5. Operation, support, and security 

PADIO

These are called?

Systems analystResponsible for designing and developing an information system.

Project managementThe process of planning, scheduling, and then controlling the activities during system development.

systemThe goal of project management is to deliver an acceptable ______ to the user in an agreed-upon time frame, while maintaining costs.

Data and information gathering techniquesReview documentation, observe, survey, interview, joint-application design (focus groups), and research are all?

Low level and high levelTwo types of programming languages?

low level languageA programming language that is machine dependent.

high level languageWhen each language instruction typically equates to multiple machine instructions, this is called a?

Machine languageKnown as the first generation of programming languages, is the only language the computer directly recognizes.

Assembly language and machine languageTwo types of low level languages?

Assembly languageThe second generation of programming languages, a programmer writes instructions using symbolic instruction codes.

Source programThe program that contains the language instructions,or code, to be converted to machine language.

procedural (3rd gen. language)

Page 15: Computer Concepts Notes

In a __________ language, the programmer writes instructions that tell the computer what to accomplish and how to do it.

C program languageWhat programming language was designed for writing system software?

UNIX and LinuxC is most often used with ____ and _____ operating systems.

COBOL (Common business oriented language)A programming language designed for business applications.

JavaAn object-oriented programming language developed by Sun Microsystems.

.NET framework (Microsoft)A set of technologies that allows almost any type of program to run on the Internet or an internal business network, as well as stand-alone computers and mobiledevices.

C++An object oriented programming language that is anextension of the C programming language.

C# (pronounced SEE-Sharp)An object-oriented programming language based on C++ that was developed primarily by Anders Hejlsberg, Microsoft chief architect and distinguished engineer.

F# (pronounced F-Sharp)A programming language that combines the benefits of an object-oriented language with the benefits of a functional language.

Visual StudioMicrosoft's suite of program development tools that assists programmers in building programs for Windows,Windows Mobile, or operating systems that support .NET.

Visual basicA programming language that allows programmers easily to build complex task-oriented object-based pro grams.

Visual C++A programming language based on C++.

Visual C#

Page 16: Computer Concepts Notes

A programming language that combines programming elements of C++ with an easier, rapid development environment.

Visual programming languageA language that uses a visual or graphical interface for creating all source code.

DelphiA powerful program development tool that is ideal for building large-scale enterprise and Web applicationsin a RAD environment.

PowerBuilderPowerful program development RAD tool that is best suited for Web-based, .NET, and largescale enterprise object-oriented applications.

4GLA nonprocedural language that enables users and programmers to access data in a database.

programmingAda, ALGOL, APL, Basic...are all Classic ___________ languages.

HTMLA special formatting language that programmers use to format documents for display on the Web.

XHTML (extensible HTML)A markup language that enables Web sites to be displayedmore easily on microbrowsers in smart phones and other mobile devices, as well as on desktop and notebook computers.

XML (extensible markup language)An increasingly popular format for sharing data that allows Web developers to create customized tags, as well as use predefined tags, used for developing a single Web site whose content can be formatted to display appropriately on various devices.

WML (wireless markup language)Allows Web developers to design pages specificallyfor microbrowsers. Used on smartphones and mobile devices.

JavascriptAn interpreted language that allows a programmer to add dynamic content and interactive elements to a Web page.

Steps in program development life cycle1. Analyze requirements2. Design solution

Page 17: Computer Concepts Notes

3. Validate design4. Implement design5. Test solution6. Document solution

PortalA collection of links, content, and services presented on a Web page and designed to guide users to information they likely are to find interesting for their particular job function.

Data warehouseA huge database that stores and manages the data required to analyze historical and current transactions.

Electronic data interchange (EDI)A set of standards that controls the transfer of business data and information among computers both within and among enterprises.

ExtranetThe portion of a company's network that allows customers or suppliers of a company to access parts of an enterprise's intranet.

Enterprise technologiesPortals, data warehouses, communications, extranets, web services, service oriented architecture, document management systems, workflow, virtual private network are all?

VirtualizationThe practice of sharing or pooling computing resources, such as servers and storage devices.

Cloud computingAn Internet service that provides computing needsto computer users.

Grid computingCombines many servers and/or personal computers on a network, such as the Internet, to act as one large computer.