A sensor is an input device that measures readings of the surrounding environment.
Applications of SSL and TLS include online shopping, online banking, emails, VOIP (protocol for sending voice over the internet), and online gaming.
A microprocessor is a type of integrated circuit, on a single chip.
Analogue Data is a smooth stream of data that our senses process, like sound wave.
Digital Data is data represented in the values 0 and 1 that a computer can process.
Examples of AI include Expert systems, which include a knowledge base that stores facts, a rule base that stores rules, an inference engine that searches in the knowledge base, and an interface to answer yes/no questions.
Machine learning: When a program has the ability to adapt its own data by storing data about problems and storing successful actions to change future actions.
3D Printer: Prints 3D objects and uses CAD (Computer Aided Design) to design the object.
ROM (Read Only Memory): Stores instructions for starting up the computer, such as BIOS (Basic Input Output System) or firmware/bootstrap, and is non-volatile and can only be read from.
Applications of 3D Printers include printing prototypes and artificial bones.
Materials used in 3D Printers include Plastic and Concrete.
RAM (Random Access Memory): Stores Any data, instructions, software currently in use and is volatile and can be written to and read from faster than ROM.
Advantages of 3D Printers include the ability to print any object and share CAD design.
Spindle in Hard Disk drive (secondary) rotates the platter/disks.
Magnetic storage: Hard Disk drive (secondary) uses PEAS Platters which are disks that have many tracks and data is stored on it in the form of magnetic dots.
Disadvantages of 3D Printers include slow printing speed and the ability to print dangerous items.
Secondary Storage: Storage that is not directly accessed by the processor.
Actuators: A mechanical output device that produces movement, it may rotate, open, close, push and pull an object.
Artificial intelligence: A branch of computer science dealing with the simulation of intelligent behaviors by computers.
Electromagnet head in Hard Disk drive (secondary) reads data by checking the magnetic fields of the magnetic dots and determines their binary value.
Primary storage: Storage that is directly accessed by the processor.
Characteristics of AI include collection of data, the rules for using that data, the ability to reason, and the ability to learn and adapt (machine learning only).
Speaker: A device that is used to output sound.
3D Printer works by building up the object layer by layer.
Data interception is when people gain access to data being sent, solution is encryption.
Solid state storage uses NAND/NOR Technology, stores data in transistors as control and floating gates, and stores data by flashcard>
Privacy settings are controls available on social networking (Facebook) which allow users to limit who can access their profile or what they are allowed to see.
The disadvantages of solid state storage are that it is expensive per unit of data than magnetic storage and optical storage, and has less longevity than magnetic storage.
Malware is any program that is installed on a computer system without the user’s knowledge, which could be gained by clicking on an untrusted link or connecting computer to infected storage device so malware will be downloaded.
Data is written in optical storage by a laser, the disc rotates, and the laser burns parts of the track forming pits and lands.
Brute-force attack is a trial and error to guess passwords, until correct password found, which can be done manually or by software.
Spyware (keylogger) is a program that detect key presses, then send them to the spyware’s owner, he analyzes the key presses to get the password.
Cloud storage is remote servers, for storing data, to be accessed using internet, such as Google Classroom/Drive.
Adware: software that generates unwanted advertisements on user’s computer, reduces device speed.
Advantages of cloud storage are that it can be accessed from any computer, without internet access, data can be easily shared, and security is stronger/low risk of hacking.
Virus/worm is software that replicates itself that deletes or corrupts files and fills computer memory.
After encryption it is called cypher text.
Data is read in optical storage using a laser, the disk rotates, and reflected light is captured.
Anti-malware: Software that scans files for malwares(say example) and can constantly run in background; it can delete malwares or notify the user of a possible malware.
Virtual memory is secondary storage used to extend the RAM capacity, to stop software from crashing when RAM is full.