Cybersecurity Midterm Flashcards

(73 cards)

1
Q

A programmable, electronic device that accepts data, performs
operations on that data, and stores the data

A

Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Instructions determine the tasks the computer will perform

A

Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Operations of the IPOS Cycle in order.

A

Input: Entering data into a computer
Processing: Performing operations on the data
**Output: **Presenting results
**Storage: **Saving data, programs, or output for future use
Communications: Sending or receiving data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Raw unorganized facts

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Information?

A

Data that has been processed into a meaningful form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

First Gen Computers (1946-1957)

A
  • Large powered by vacuum tubes
  • Used lots of electricity and made lots of heat
  • ENIAC and UNIVAC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Second Gen Computers (1958-1963)

A
  • Used transistors
  • Smaller, more powerful, cheapr, more enerfy efficent, and more reliable than gen one
  • Punch cards and magnetic tape used for input
  • Punchcard and paper were used for output
  • Magnetic tape used for storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Third Gen Computers (1964-1970)

A
  • Used integrated circuits (ICs), which consist of transistors and electronic circuits on a single tiny silicon chip
  • Keyboards were used for input; monitors for output
  • Hard drives were used for storage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fourth Gen Computers (1971- Present)

A
  • Use microprocessors, which contain the core processing of an entire computer on a single chip
  • Keyboards and mice are used for input; monitors and printers for output; hard drives, flash memory media, and optical discs for storage
  • Networks and the Internet were developed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fifth Gen Computers (now and the future)

A
  • Most commonly defined as being based on artificial intelligence (AI)
  • Some aspects like voice and touch input are used today
  • Future computers may be different, such as: Optical Computers, Nanotechnology, general-purpose computers built into everyday devices
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Collection of hardware and other devices that are connected together

A

Computer Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some uses of a Computer Network

A
  • Users can share hardware, software, and data
  • Can communicate with eachother
  • Examples of a Computer Network: Schools, large businesses, homes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the internet?

A

The largest/most well-known computer network in the world
* Connect using a Internet Service Provider(ISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the World Wide Web (Web)

A

A vast collection of web pages available through the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How to view a web page?

A

Web browser (Edge, Chrome, Firefox,etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Web sites contain _____.

A

Web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where are web pages stored?

A

Web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Access resources on the internet

A

Internet addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Different types of internet addresses

A

IP Addresses and domain names, Uniform Resource Locator (URL), E-mail addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Used to identify computers

A

IP addresses and domain names

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Used to identify Web pages

A

Uniform Resource locator (URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Used to identify a person

A

E-mail addresses (Username)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Many networks require a _____ and ______.

A

username, password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 2 different types of internet connections?

A

Direct (always-on) connections, dial-up connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A computer ____ is the amount of data that a CPU can manipulate at one time
word
26
A special group of very fast circitry usually built into the CPU (internal memory)
Cache Memory
27
What does more cache memory mean?
Typically means faster processing
28
Levels of cache memory
level 1 (fastest), Level 2 (fast), Level 3 (slowest)
29
An electronic path over which data can travel
Bus
30
Where are buses found?
CPU and motherboard
31
Bus width
The number of wires in the bus over which data can travel (a wider bus allows more data to be transferred at one time)
32
Bus width and bus speed together determine the bus’s _______
bandwidth
33
What is banwidth?
The amount of data that can be transferred via the bus in a given time period
34
The amount of data actual transferred under real-life conditions
Throughput
35
Chip based storage, or locations that a computer uses to store data on a temporary basis
Memory
36
Memory where content is erased when the device is shut off
Volatile Memory
37
Memory where content is retained when the device is shut off
Non-volatile Memory
38
The computers main memory or system memory
Random access memory (RAM)
39
What does RAM store?
Stores essential parts of the operating system, programs, and data the computer is currently using
40
The machine Cycle in order
occurs whenever the CPU processes a single piece of microcode consists of four operations: Fetch, Decode, Execute, Store
41
The Machine Cycle: Fetch
First step in the Machine Cycle: Instruction is fetched from cache or RAM
42
The Machine Cycle: Decode
Second step in the Machine Cycle: Instructions are decoded into a form the ALU or FPU can understand
43
The Machine Cycle: Execute
The third step in the Machine Cycle: Instructions are carried out
44
The Machine Cycle: Store
The fourth step in the Machine Cycle: Data or results are stored in registers or RAM
45
Storage System
The hardware where data is stored (DVD disc, flash memory card, etc.)
46
Storage Device
The hardware into which the storage medium is inserted. Can be internal, external, or remote (DVD drive, flash memory card reader, etc.)
47
Allows data to be retrieved from any location on the storage medium (Virtually all storage devices use random access)
Random access (direct access)
48
retrieval of data can occur only in the order in which it was physically stored on the storage medium; for example, a magnetic tape drive
Sequentual Access
49
Magnetic Hard Drive/Hard Disk Drive (HDD)
contains particles on the metal disks inside the drive that are magnetized to represent the data’s 0s and 1s. One or more metal hard disks are permanently sealed inside the drive along with an access mechanism and read/write heads
50
solid-state drive (SSD)
Uses flash memory technology to store data
51
Perks of using SSDs
* Uses less power and has not moving parts * Faster than magnetic hard drives, but more expensive * Norm for portable devices
52
A storage device that is not connected directly to the user’s computer
Remote storage
53
Using a storage device via a local network
Network storage
54
Storage accessed via the Internet
Cloud storage (online storage)
55
A credit card-sized piece of plastic that contains some computer circuitry (processor, memory, and storage)
Smart Card
56
RAID (redundant arrays of independent discs)
A method of storing data on two or more hard drives that work together to record redundant copies
57
What is RAID used for?
* Used to protect critical data on large storage systems * Helps increase fault tolerance
58
Different Levels of RAID
* RAID 0- Disk striping (spreads files over two or more hard drives) * RAID 1- Disk mirroring (duplicate copy) * Other levels use a combination of striping and mirror
59
A collection of programs that manage and coordinate the activities taking place within a computer
Operating System
60
What is the intermediary role of the operating system?
THe middle man between the user and the operating system
61
Multitasking | Processing Techniques for Increased Efficiency
Refers to the ability of an operating system to have more than one program (task) open at one time (CPU rotates between tasks)
62
Multithreading | Processing Techniques for Increased Efficiency
enables the computer to rotate between multiple threads so that processing is completed faster and more efficiently (CPU rotates between threads)
63
Multiprocessing | Processing Techniques for Increased Efficiency
Each CPU or core typically works on a different job (used with computers and devices that have multi-core CPUs and/or multiple CPUs)
64
Parallel Processing | Processing Techniques for Increased Efficiency
The CPUs or cores typically work together to complete one job more quickly (used most often with supercomputers)
65
Virtual Memory
A memory-managment technique that uses hard drive space as additional RAM (virtual memory is slower than just using RAM)
66
Graphical User Interface (GUI)
has icons, buttons, and other objects that the user selects to issue commands (used by most operating systems)
67
Command Line Interface
Requires the user to input text-based commands using the keyboard
68
Operating Systems for Personal Computers and Servers
* DOS (Disk Operating System) * Windows * OS X * UNIX * Linux
69
Operating System: OS X
The proprietary operating system for computers made by Apple Corporation (Based on the UNIX operating system)
70
Operating System: UNIX
An operating system developed in the late 1960s for midrange servers * More expensive, requires high level of technical knowledge; harder to install, maintain,and upgrade * “UNIX” initially referred to the original UNIX operating system, now refers to a group of similar operating systems based on UNIX * Many UNIX flavors are not compatible with each other
71
System Development Life Cycle (SDLC)
The development of a system from the time it is first studied until the time it is updated or replaced 1. Preliminary Investigation 2. System analysis 3. System design 4. System Acquisition 5. System Implementation 6. System Mainteance
72
Program Development Life Cycle (PDLC)
1. Program Analysis 2. Program design 3. Program CodingProgram debugging and testing 4. Program Implementation and maintience
73