CS 5-8

Cards (74)

  • A sensor is an input device that measures readings of the surrounding environment.
  • Applications of SSL and TLS include online shopping, online banking, emails, VOIP (protocol for sending voice over the internet), and online gaming.
  • A microprocessor is a type of integrated circuit, on a single chip.
  • Analogue Data is a smooth stream of data that our senses process, like sound wave.
  • Digital Data is data represented in the values 0 and 1 that a computer can process.
  • Examples of AI include Expert systems, which include a knowledge base that stores facts, a rule base that stores rules, an inference engine that searches in the knowledge base, and an interface to answer yes/no questions.
  • Machine learning: When a program has the ability to adapt its own data by storing data about problems and storing successful actions to change future actions.
  • 3D Printer: Prints 3D objects and uses CAD (Computer Aided Design) to design the object.
  • ROM (Read Only Memory): Stores instructions for starting up the computer, such as BIOS (Basic Input Output System) or firmware/bootstrap, and is non-volatile and can only be read from.
  • Applications of 3D Printers include printing prototypes and artificial bones.
  • Materials used in 3D Printers include Plastic and Concrete.
  • RAM (Random Access Memory): Stores Any data, instructions, software currently in use and is volatile and can be written to and read from faster than ROM.
  • Advantages of 3D Printers include the ability to print any object and share CAD design.
  • Spindle in Hard Disk drive (secondary) rotates the platter/disks.
  • Magnetic storage: Hard Disk drive (secondary) uses PEAS Platters which are disks that have many tracks and data is stored on it in the form of magnetic dots.
  • Disadvantages of 3D Printers include slow printing speed and the ability to print dangerous items.
  • Secondary Storage: Storage that is not directly accessed by the processor.
  • Actuators: A mechanical output device that produces movement, it may rotate, open, close, push and pull an object.
  • Artificial intelligence: A branch of computer science dealing with the simulation of intelligent behaviors by computers.
  • Electromagnet head in Hard Disk drive (secondary) reads data by checking the magnetic fields of the magnetic dots and determines their binary value.
  • Primary storage: Storage that is directly accessed by the processor.
  • Characteristics of AI include collection of data, the rules for using that data, the ability to reason, and the ability to learn and adapt (machine learning only).
  • Speaker: A device that is used to output sound.
  • 3D Printer works by building up the object layer by layer.
  • Data interception is when people gain access to data being sent, solution is encryption.
  • Solid state storage uses NAND/NOR Technology, stores data in transistors as control and floating gates, and stores data by flashcard>
  • Privacy settings are controls available on social networking (Facebook) which allow users to limit who can access their profile or what they are allowed to see.
  • The disadvantages of solid state storage are that it is expensive per unit of data than magnetic storage and optical storage, and has less longevity than magnetic storage.
  • Malware is any program that is installed on a computer system without the user’s knowledge, which could be gained by clicking on an untrusted link or connecting computer to infected storage device so malware will be downloaded.
  • Data is written in optical storage by a laser, the disc rotates, and the laser burns parts of the track forming pits and lands.
  • Brute-force attack is a trial and error to guess passwords, until correct password found, which can be done manually or by software.
  • Spyware (keylogger) is a program that detect key presses, then send them to the spyware’s owner, he analyzes the key presses to get the password.
  • Cloud storage is remote servers, for storing data, to be accessed using internet, such as Google Classroom/Drive.
  • Adware: software that generates unwanted advertisements on user’s computer, reduces device speed.
  • Advantages of cloud storage are that it can be accessed from any computer, without internet access, data can be easily shared, and security is stronger/low risk of hacking.
  • Virus/worm is software that replicates itself that deletes or corrupts files and fills computer memory.
  • After encryption it is called cypher text.
  • Data is read in optical storage using a laser, the disk rotates, and reflected light is captured.
  • Anti-malware: Software that scans files for malwares(say example) and can constantly run in background; it can delete malwares or notify the user of a possible malware.
  • Virtual memory is secondary storage used to extend the RAM capacity, to stop software from crashing when RAM is full.