Explain Microchips
A photo-resist coating is applied to the wafer and ultraviolet light etches out the circuit pattern. Then another etching process lays down conducting metal paths.
Explain analog and digital computing
Fundamental to the technology is the idea of on/off, true/false.
What is computer algorithm
An algorithm designed to perform a certain task is tested and rated for its success, then allowed to “breed” with other algorithms by mixing up their attributes.
The most successful “offspring” algorithms then breed and the process repeats until the computer “evolves” the best algorithm for the job.
Explain neural networks in computer science
Another application of neural networks is in face-recognition software. Computers can be trained to recognize a face by analyzing images and comparing positions of features such as eye corners, but neural networks can learn which features are most useful for matching a face to images in a database.
What is quantum computing
These “quantum bits,” or qubits, would allow much faster calculations. While three conventional bits could represent any number from 0 to 7 at one time, three qubits could represent all these numbers simultaneously.
This means a quantum computer could tackle many calculations simultaneously and solve problems that would keep today’s supercomputers busy for millions of years.
What is Turing test
What is hard drive
Some desktop computers now have hard disks with more than 1.5 terabytes (1.5 million million bytes) of memory.
Explain flash memory
Some memory sticks have storage capacities of thirty-two gigabytes, enough to store around twenty hours of video.
Explain optical storage
Rewritable CDs use a more complicated chemical trick that allows data to be erased again by laser heating.
Blu-ray disks can store even more information than DVDs because they are read with a blue-violet laser that has a shorter wavelength than a red laser, making it possible to focus the laser spot with much greater precision.
What is holographic memory
Several companies hope to develop commercial holographic memory, which could one day store many terabytes (millions of millions of bytes) of data in a crystal the size of a sugar cube.
What is radar
Similar systems operating with visible laser light are called LIDAR and can measure details with higher precision.
What is SONAR
Active sonar creates a pulse of sound, often called a ping, and then listens for reflections of the pulse, the arrival time of the reflections indicating the distance of an obstacle.
Outgoing pings are single-frequency tones or changing-frequency chirps, which allow more information to be extracted from the echo.
Differences in frequency between pings and echoes can allow measurement of a target’s speed, thanks to the Doppler effect.
Fishing boats use sonar to pinpoint groupings of fish, while some animals, including bats and dolphins, use similar natural echo-location to navigate or locate mates, predators, and prey.
Explain Internet and World Wide Web
The main mark-up language for web pages is HTML (hypertext mark-up language), which uses tags at either end of text phrases to tell a web browser how to display them—for instance, as a clickable hyperlink.
Estimates suggest more than 2 billion people worldwide currently access the web.
Note on Internet security
Computer viruses are harmful programs that can transfer between computers via e-mail, aiming to delete files or disable operating systems like Microsoft Windows.
Other malware includes spyware, which might stealthily install itself on a computer and transmit the user’s secret passwords to identity thieves,
while a computer “worm” self-replicates and sends copies of itself to other computers on a network.
Networked computers need constantly updated antivirus software to detect and remove new malware, as well as firewalls that prevent unauthorized access from the outside.
Denial-of-service attacks attempt to make an organization’s website useless by bombarding it with so many communication requests that it can’t cope with legitimate traffic.
People install software agents called bots to launch attacks on specific sites, or make bots infect computers by stealth.
Many countries deem denial-of-service attacks a criminal offence.
Explain distributed computing
An example of this is the “SETI@Home” project launched in 1999. Around eight million people have signed up to download a screensaver-like program that sifts little packets of data from the Arecibo radio telescope in Puerto Rico to look for unusual signals—some of which might be communications from intelligent alien civilizations—and return the results to project organizers.
Folding@home is a similar computing project that invites the public to use their computers to analyze protein folding. This could provide vital information that leads to new treatments for diseases such as cancer and Alzheimer’s.
What is speech communication
What is fiber optics
What is GPS
while China and the European Union both have plans for new ones.
What is “cloud computing”?
[ # Cloud computing metaphor: For a user, the network elements representing the provider-rendered services are invisible, as if obscured by a cloud.]
> Cloud computing provides the tools and technologies to build data/compute intensive parallel applications with much more affordable prices compared to traditional parallel computing techniques.
[ Grid computing — “A form of distributed and parallel computing, whereby a ‘super and virtual computer’ is composed of a cluster of networked, loosely coupled computers acting in concert to perform very large tasks.”
Mainframe computer — Powerful computers used mainly by large organizations for critical applications, typically bulk data processing such as: census; industry and consumer statistics; police and secret intelligence services; enterprise resource planning; and financial transaction processing.
Utility computing — The “packaging of computing resources, such as computation and storage, as a metered service similar to a traditional public utility, such as electricity.”
Peer-to-peer — A distributed architecture without the need for central coordination. Participants are both suppliers and consumers of resources (in contrast to the traditional client–server model).]
i. On-demand self-service:
A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
ii. Broad network access:
Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).
iii. Resource pooling:
The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.
iv: Rapid elasticity:
Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time.
v. Measured service:
Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).
Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.
Users are provided access to application software and databases. Cloud providers manage the infrastructure and platforms that run the applications.
SaaS is sometimes referred to as “on-demand software” and is usually priced on a pay-per-use basis.
SaaS providers generally price applications using a subscription fee.
ii. PaaS: Platform as a Service / Cloud Platform (e.g. Executive Runtime, Database, Web Server, Developmental Tools etc)
Cloud providers deliver a computing platform, typically including operating system, programming language execution environment, database, and web server.
Application developers can develop and run their software solutions on a cloud platform without the cost and complexity of buying and managing the underlying hardware and software layers.
With some PaaS offers like Microsoft Azure and Google App Engine, the underlying computer and storage resources scale automatically to match application demand so that the cloud user does not have to allocate resources manually.
The latter has also been proposed by an architecture aiming to facilitate real-time in cloud environments.
iii. IaaS: Infrastructure as a Service / Cloud Infrastructure (e.g. Virtual Machines, Servers, Load Balancers, Network etc)
providers of IaaS offer computers – physical or (more often) virtual machines – and other resources.
(A hypervisor, such as Xen, Oracle VirtualBox, KVM, VMware ESX/ESXi, or Hyper-V runs the virtual machines as guests.
LTE
LTE, an abbreviation for Long-Term Evolution, commonly marketed as 4G LTE, is a standard for wireless communication of high-speed data for mobile phones and data terminals. It is based on the GSM/EDGE and UMTS/HSPA network technologies, increasing the capacity and speed using a different radio interface together with core network improvements.