Term
|
Definition
| invented and used to calculate addition and subtraction |
|
|
Term
| Leibniz Calculating Machine |
|
Definition
| based on Pascal's Machine; could be used to do multiplication and division in addition to addition and subtraction |
|
|
Term
|
Definition
| the design of the first programmable computer; invented by Charles Babbage |
|
|
Term
|
Definition
| computing device using the punch card IBM machine concept that sets off the electric circuits in the machine; invented by Herman Hollerith. |
|
|
Term
|
Definition
| the first large-sclae computer with 5000 calculations/sec. It is a first generation computer and used vacuum tubes to operate. Size was incredibly large with 18,000 vacuum tubes per computer. |
|
|
Term
| Atanasoff-Berry Computer (ABC) |
|
Definition
| the real first electronic digital computer |
|
|
Term
|
Definition
| second generation computers |
|
|
Term
|
Definition
| third generation computers |
|
|
Term
|
Definition
| first microcomputer (First PC). This computer looked just like a box with no monitor, keyboard, and mouse. Altair 8800 only used ASCII language. |
|
|
Term
| Control Program for Monitors (CPM) |
|
Definition
| invented by Bill Gates. Microsoft comes up with different software like MS-DOS, Spreadsheets, and Operating System, which boosted IBM to the top of the PC industry. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| Megabytes = 1,000,000 bytes |
|
|
Term
|
Definition
| Gigabytes = 1,000,000,000 bytes |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| Relative Reference (excel) |
|
Definition
| when the "fill handle" is dragged and formulas change automatically adjusting for the new position. |
|
|
Term
| Absolute Reference (excel) |
|
Definition
| when the "fill handle" is dragged the smae cell reference is kept where a "$" is added. |
|
|
Term
|
Definition
|
|
Term
|
Definition
Traditional Way of developing systems. --Large Testing Phase-- Progress is measured by deliverables and milestones -- Drives to a single solution-- minimal customer interaction-- large systems. |
|
|
Term
|
Definition
| also known as Systems Development Life Cycle (SDLC) |
|
|
Term
|
Definition
| Users can provide input on changes needed before a lot of time and money has been spent on developing a system's full functionality. --Minor Testing Phase--Progress is measured by working software--Changes are welcome--Significant customer interaction--Medium to small systems.--Known as Agile Systems Development (ASD) |
|
|
Term
|
Definition
| Rapid Application Development --in favor of rapid prototyping. |
|
|
Term
|
Definition
| Extreme Programming -- intended to improve software to changing customer requirements. |
|
|
Term
| Entity-Relationship (ER) diagrams |
|
Definition
| - commonly used in designing databases. It is the graphical descriptions of entities and the relationship between the entities. |
|
|
Term
|
Definition
| known as licks, first person to come up with the idea of the internet. He called it the intergalactic network. |
|
|
Term
|
Definition
| a system that was devised to proved access to computers for more people. Information goes from one computer to another very fast that is seems like i is serving all at the same time. |
|
|
Term
|
Definition
| asked to network all the ocmputers in the US pentagon, where the internet first started. |
|
|
Term
|
Definition
| the company who invented packet switching |
|
|
Term
|
Definition
| foundation of the internet. Two computers connected by a digital network and little packets are sent through the digital network. When there's a traffic jam, can go through a different computer to get to the destination computer. |
|
|
Term
|
Definition
| first operational packet-switching network. |
|
|
Term
|
Definition
| first message on the internet |
|
|
Term
|
Definition
| syntax for computers to communicate with each other. Laid the foundation for the internet. |
|
|
Term
|
Definition
| This video is about how cyber warfare is starting to become a big issue |
|
|
Term
| Obama's priority when he became president |
|
Definition
| strengthen our national cyber warfare defense. |
|
|
Term
| In 2007, Brazil plunged into darkness for 2 days. |
|
Definition
| Government networks were hacked and electricity was shot down in Brazil. |
|
|
Term
|
Definition
| similar to ATM card; used to decrypt ATM to steal passcodes from clients. In a hospital in Virginia, medical records were stolen through hacking and a ransom note was posted asking for money to giver their password back. |
|
|
Term
|
Definition
| moral philosophy; a branch of philosophy that addresses questions about morality. It involves the concepts of right and wrong. |
|
|
Term
|
Definition
| have the responsiblity to promote ethical issues. |
|
|
Term
|
Definition
| the good achieved by the technology must outweigh the harm or risk. |
|
|
Term
|
Definition
| those affected by the technology should understand and accept the risks. |
|
|
Term
|
Definition
| the benefits and burdens of the technology should be distributed fairly. |
|
|
Term
|
Definition
| even if judged acceptable by the other three guidelins, the technology must be implemented so as to avoid all unnecessary risk. |
|
|
Term
|
Definition
| unauthorized use, access, modification, destruction, and release of hardware, software, data, or network resources. |
|
|
Term
| Denial of Service (attack) |
|
Definition
| hammering a website's equipment with too many requests for information. |
|
|
Term
|
Definition
| widespread probes of the internet to determine types of computers, services, and connections. These can look for weaknesses in computers. |
|
|
Term
|
Definition
| programs that search individual packets of data as they pass through the internet. These programs can put together the packets to form the username and password of a certain account. |
|
|
Term
|
Definition
| faking an e-mail addrss ot trick users into passing along critical information like passwords or credit card numbers |
|
|
Term
|
Definition
| a program that, unknown to the user, contains instructions that exploit a known vulnerability in some software. This program can crsh an entire system. |
|
|
Term
|
Definition
| hidden point of entry to be used in case the original entry point has been detected or blocked. |
|
|
Term
|
Definition
| tiny Java programs that misuse your computer's resources, modify files on the hard disk, send fake e-mail, or steal passwords. |
|
|
Term
|
Definition
| programs that automatically dial thousands of telephone numbers in search of a way in through a modem connection. |
|
|
Term
|
Definition
| an instruction in a computer program that triggers a malicious act. |
|
|
Term
|
Definition
| a technique for crashing by sending too much data to the buffer in a computer's memory |
|
|
Term
|
Definition
| software that can guess passwords |
|
|
Term
|
Definition
| gaining access to computer systems by talking unsuspecting computer employees out of valuable information such as passwords. |
|
|
Term
|
Definition
| sifting through a company's garbage to find information to help break into their computers. |
|
|
Term
|
Definition
| right of people ot know about information that others may want to keep private. |
|
|
Term
|
Definition
| indiscriminate sending on unsolicited e-mail to many users. |
|
|
Term
|
Definition
| means you can spam if fules are followed |
|
|
Term
|
Definition
| sending extremely critical, derogatory, and often vulgar e-mail messages or newsgroup postings to other users on the internet or online services. |
|
|
Term
|
Definition
| unauthorized compy of computer programs. |
|
|
Term
|
Definition
| purchase of software is really a payment for a license for fair use. Site Licenses allow a certain number of copies. |
|
|
Term
| Theft of Intellectual Property |
|
Definition
| copy righted material; peer-to-peer networking techniques have made it easy to trade pirated intellectual property. |
|
|
Term
|
Definition
| a program code that cannot work without being inserted into another program |
|
|
Term
|
Definition
| Distinct program that can run unaided. |
|
|
Term
|
Definition
| software that purports to serve a useful purpose but also allows internet advertisers to display adertisements. |
|
|
Term
|
Definition
| adware that employs the user's internet connection in the background without your permission or knowledge. |
|
|
Term
|
Definition
| information about you can be captures legally each time you visit a website. |
|
|
Term
|
Definition
| benefits consumer; explicit consent to allow data to be compiled about them. Law in Europe. |
|
|
Term
|
Definition
| favors businesses; data can be compiled abut you unless you specifically request it not be. Law in US. |
|
|
Term
|
Definition
| put a message in the box and sends it to the receiver. Then send the key to the receiver so they can open the box to read the message. |
|
|
Term
|
Definition
| tries to solve the problem of me sending you the key. If I were to send somebody a message, I would use an openbox with a padlock and send the message to the receiver without sending the key because the receiver would also have the same key. |
|
|
Term
| Three Pass Protocol Asymmetric Key |
|
Definition
| put message in the box and lock with my padlock and sent it to the receiver where he/she puts another padlock and sends it back to me. I take my padlock off and send it back to him/her and he/she takes the padlock off to get the message. |
|
|
Term
|
Definition
| - protects computer networds from intrusion by screening all network traffic and service as a safe transfer poitn for access to and from other networks. |
|
|