Term
|
Definition
invented and used to calculate addition and subtraction |
|
|
Term
Leibniz Calculating Machine |
|
Definition
based on Pascal's Machine; could be used to do multiplication and division in addition to addition and subtraction |
|
|
Term
|
Definition
the design of the first programmable computer; invented by Charles Babbage |
|
|
Term
|
Definition
computing device using the punch card IBM machine concept that sets off the electric circuits in the machine; invented by Herman Hollerith. |
|
|
Term
|
Definition
the first large-sclae computer with 5000 calculations/sec. It is a first generation computer and used vacuum tubes to operate. Size was incredibly large with 18,000 vacuum tubes per computer. |
|
|
Term
Atanasoff-Berry Computer (ABC) |
|
Definition
the real first electronic digital computer |
|
|
Term
|
Definition
second generation computers |
|
|
Term
|
Definition
third generation computers |
|
|
Term
|
Definition
first microcomputer (First PC). This computer looked just like a box with no monitor, keyboard, and mouse. Altair 8800 only used ASCII language. |
|
|
Term
Control Program for Monitors (CPM) |
|
Definition
invented by Bill Gates. Microsoft comes up with different software like MS-DOS, Spreadsheets, and Operating System, which boosted IBM to the top of the PC industry. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Megabytes = 1,000,000 bytes |
|
|
Term
|
Definition
Gigabytes = 1,000,000,000 bytes |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
Relative Reference (excel) |
|
Definition
when the "fill handle" is dragged and formulas change automatically adjusting for the new position. |
|
|
Term
Absolute Reference (excel) |
|
Definition
when the "fill handle" is dragged the smae cell reference is kept where a "$" is added. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Traditional Way of developing systems. --Large Testing Phase-- Progress is measured by deliverables and milestones -- Drives to a single solution-- minimal customer interaction-- large systems. |
|
|
Term
|
Definition
also known as Systems Development Life Cycle (SDLC) |
|
|
Term
|
Definition
Users can provide input on changes needed before a lot of time and money has been spent on developing a system's full functionality. --Minor Testing Phase--Progress is measured by working software--Changes are welcome--Significant customer interaction--Medium to small systems.--Known as Agile Systems Development (ASD) |
|
|
Term
|
Definition
Rapid Application Development --in favor of rapid prototyping. |
|
|
Term
|
Definition
Extreme Programming -- intended to improve software to changing customer requirements. |
|
|
Term
Entity-Relationship (ER) diagrams |
|
Definition
- commonly used in designing databases. It is the graphical descriptions of entities and the relationship between the entities. |
|
|
Term
|
Definition
known as licks, first person to come up with the idea of the internet. He called it the intergalactic network. |
|
|
Term
|
Definition
a system that was devised to proved access to computers for more people. Information goes from one computer to another very fast that is seems like i is serving all at the same time. |
|
|
Term
|
Definition
asked to network all the ocmputers in the US pentagon, where the internet first started. |
|
|
Term
|
Definition
the company who invented packet switching |
|
|
Term
|
Definition
foundation of the internet. Two computers connected by a digital network and little packets are sent through the digital network. When there's a traffic jam, can go through a different computer to get to the destination computer. |
|
|
Term
|
Definition
first operational packet-switching network. |
|
|
Term
|
Definition
first message on the internet |
|
|
Term
|
Definition
syntax for computers to communicate with each other. Laid the foundation for the internet. |
|
|
Term
|
Definition
This video is about how cyber warfare is starting to become a big issue |
|
|
Term
Obama's priority when he became president |
|
Definition
strengthen our national cyber warfare defense. |
|
|
Term
In 2007, Brazil plunged into darkness for 2 days. |
|
Definition
Government networks were hacked and electricity was shot down in Brazil. |
|
|
Term
|
Definition
similar to ATM card; used to decrypt ATM to steal passcodes from clients. In a hospital in Virginia, medical records were stolen through hacking and a ransom note was posted asking for money to giver their password back. |
|
|
Term
|
Definition
moral philosophy; a branch of philosophy that addresses questions about morality. It involves the concepts of right and wrong. |
|
|
Term
|
Definition
have the responsiblity to promote ethical issues. |
|
|
Term
|
Definition
the good achieved by the technology must outweigh the harm or risk. |
|
|
Term
|
Definition
those affected by the technology should understand and accept the risks. |
|
|
Term
|
Definition
the benefits and burdens of the technology should be distributed fairly. |
|
|
Term
|
Definition
even if judged acceptable by the other three guidelins, the technology must be implemented so as to avoid all unnecessary risk. |
|
|
Term
|
Definition
unauthorized use, access, modification, destruction, and release of hardware, software, data, or network resources. |
|
|
Term
Denial of Service (attack) |
|
Definition
hammering a website's equipment with too many requests for information. |
|
|
Term
|
Definition
widespread probes of the internet to determine types of computers, services, and connections. These can look for weaknesses in computers. |
|
|
Term
|
Definition
programs that search individual packets of data as they pass through the internet. These programs can put together the packets to form the username and password of a certain account. |
|
|
Term
|
Definition
faking an e-mail addrss ot trick users into passing along critical information like passwords or credit card numbers |
|
|
Term
|
Definition
a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software. This program can crsh an entire system. |
|
|
Term
|
Definition
hidden point of entry to be used in case the original entry point has been detected or blocked. |
|
|
Term
|
Definition
tiny Java programs that misuse your computer's resources, modify files on the hard disk, send fake e-mail, or steal passwords. |
|
|
Term
|
Definition
programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection. |
|
|
Term
|
Definition
an instruction in a computer program that triggers a malicious act. |
|
|
Term
|
Definition
a technique for crashing by sending too much data to the buffer in a computer's memory |
|
|
Term
|
Definition
software that can guess passwords |
|
|
Term
|
Definition
gaining access to computer systems by talking unsuspecting computer employees out of valuable information such as passwords. |
|
|
Term
|
Definition
sifting through a company's garbage to find information to help break into their computers. |
|
|
Term
|
Definition
right of people ot know about information that others may want to keep private. |
|
|
Term
|
Definition
indiscriminate sending on unsolicited e-mail to many users. |
|
|
Term
|
Definition
means you can spam if fules are followed |
|
|
Term
|
Definition
sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup postings to other users on the internet or online services. |
|
|
Term
|
Definition
unauthorized compy of computer programs. |
|
|
Term
|
Definition
purchase of software is really a payment for a license for fair use. Site Licenses allow a certain number of copies. |
|
|
Term
Theft of Intellectual Property |
|
Definition
copy righted material; peer-to-peer networking techniques have made it easy to trade pirated intellectual property. |
|
|
Term
|
Definition
a program code that cannot work without being inserted into another program |
|
|
Term
|
Definition
Distinct program that can run unaided. |
|
|
Term
|
Definition
software that purports to serve a useful purpose but also allows internet advertisers to display adertisements. |
|
|
Term
|
Definition
adware that employs the user's internet connection in the background without your permission or knowledge. |
|
|
Term
|
Definition
information about you can be captures legally each time you visit a website. |
|
|
Term
|
Definition
benefits consumer; explicit consent to allow data to be compiled about them. Law in Europe. |
|
|
Term
|
Definition
favors businesses; data can be compiled abut you unless you specifically request it not be. Law in US. |
|
|
Term
|
Definition
put a message in the box and sends it to the receiver. Then send the key to the receiver so they can open the box to read the message. |
|
|
Term
|
Definition
tries to solve the problem of me sending you the key. If I were to send somebody a message, I would use an openbox with a padlock and send the message to the receiver without sending the key because the receiver would also have the same key. |
|
|
Term
Three Pass Protocol Asymmetric Key |
|
Definition
put message in the box and lock with my padlock and sent it to the receiver where he/she puts another padlock and sends it back to me. I take my padlock off and send it back to him/her and he/she takes the padlock off to get the message. |
|
|
Term
|
Definition
- protects computer networds from intrusion by screening all network traffic and service as a safe transfer poitn for access to and from other networks. |
|
|