Final Exam Reviewer: Intro to Computing PDF

Summary

This document is a reviewer/study guide for a first-semester introduction to computing course. It outlines key concepts and details about various aspects of computer science, including information systems, information technology, computer science, computer engineering, and software engineering, as well as emerging technologies like artificial intelligence and cloud computing.

Full Transcript

FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1.1 OVERVIEW OF Defines five key sub-disciplines: IS, IT, Computer Science, Engineering, and COMPUTING...

FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1.1 OVERVIEW OF Defines five key sub-disciplines: IS, IT, Computer Science, Engineering, and COMPUTING Software Engineering. What is Computing? Major Disciplines of Computing (Defined by ACM); Before 1935: A "computer" was a human performing calculations. 1. Information Systems (IS): Modern Era (Post-1945): Refers to ○ Business decision-making via machines based on Von Neumann's data systems. model: ○ MIS (Management Information ○ Functions: Accepts input, Systems): Managing data for processes data, stores data, informed decisions. and produces output. Definition: Computing is managing, processing, and communicating information through computers. 2. Information Technology (IT): Includes: ○ Solving specific business ○ Designing and building problems using technology. hardware/software. ○ Manage IT resources, create ○ Scientific studies using technology strategies, assist computers. executives with technology ○ Developing intelligent systems. planning. ○ Creating communication/entertainment platforms. ○ Gathering purpose-driven 3. Computer Science: information. ○ Theoretical and technical aspects of computing. ○ Responsibilities: Develop algorithms. Importance of Computing: Study software systems. Critical for Modern Technology: Innovate data transfer Essential in industries like healthcare, methods. education, communication, and finance. Daily Applications: Swiping cards, emails, smartphones. 4. Computer Engineering: ○ Hardware development and integration. ACM (Association for Computing ○ Responsibilities: Machinery): Research and design microchips, processors, Founded: 1947 in New York City. and hardware Largest educational and scientific components. computing society. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Integrate hardware with ○ Gaming and interactive software systems. marketing. 3. Cloud Computing 5. Software Engineering: Internet-based computing for services ○ Development, testing, and like storage, servers, and software. deployment of software Benefits: systems. ○ Cost savings (no on-site ○ Derived from computer science infrastructure). and IT. ○ Global scalability. ○ Enhanced performance and security. ○ Productivity gains and disaster Emerging Technologies in Computing: recovery options. Types: 1. Artificial Intelligence (AI) ○ Public Cloud: Shared, third-party resources (e.g., Machines that mimic human Microsoft Azure). intelligence. ○ Private Cloud: Exclusive to an Key Concepts: organization. ○ Machine Learning: Machines ○ Hybrid Cloud: Combines public learn tasks using statistical and private clouds. models. ○ Deep Learning: Neural networks 4. Internet of Things (IoT) with multiple layers for complex decision-making. Interconnected devices sharing data Applications: without human interaction. ○ Smart assistants (e.g., Siri, Applications: Alexa). ○ Smart homes (connected ○ Autonomous vehicles. appliances). ○ Predictive healthcare systems. ○ Smart cities (traffic optimization, ○ Conversational bots and spam waste management). filters. ○ Energy-efficient solutions. Key Figure: Alan Turing (Turing Test, 1950). 5. Big Data 2. Augmented Reality (AR) and Virtual Reality Enormous and complex datasets (VR) requiring advanced processing. Types: AR: Enhances real-world objects with ○ Structured: Organized, fixed digital overlays (e.g., Snapchat, formats (e.g., tables). Pokémon Go). ○ Unstructured: Undefined VR: Simulates immersive virtual formats (e.g., social media environments for gaming, education, or posts). training. ○ Semi-structured: Partially Applications: organized data (e.g., XML files). ○ Medical training. Characteristics: ○ Volume: Massive data size. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Variety: Diverse formats. 19th Century: Programmable Machines ○ Velocity: Rapid data generation. ○ Variability: Inconsistent data 1805 - Jacquard Loom: patterns. ○ First programmable loom using Applications: punch cards to control ○ Social media analytics. patterns, influencing later ○ Predictive modeling in computing designs. healthcare. Charles Babbage (1791–1871): ○ Difference Engine (1822): Designed to automate polynomial calculations, reducing human error. 3 Great Men in Communication: ○ Analytical Engine (1837): A design for a general-purpose Tim Berner’s Lee (creator of “www”) programmable machine with SteveJobs, 2007 advanced features (sequential Bill Gates, Microsoft control, loops, conditionals). Ada Lovelace (1815–1852): ○ Wrote the first program (to calculate Bernoulli numbers) for John Von Neumann the Analytical Engine, earning the title of the first A Hungarian-American mathematician; programmer. physicist; Computer scientist; Engineer and polymath. 20th Century: Theoretical Foundations Kurt Gödel (1906–1978): ○ Incompleteness Theorem: Proved not all mathematical problems are computable. 1.2 HISTORY OF COMPUTER Alonzo Church (1903–1995): ○ Developed lambda calculus, foundational for functional programming and equivalent to 18th Century: Early Mechanical Innovations Turing Machines. Alan Turing (1912–1954): Jacques de Vaucanson (1709–1782): ○ Invented the Turing Machine (a ○ Created life-like mechanical universal model for automations (e.g., Digesting computation). Duck with over 400 parts). ○ Proposed the Turing Test to ○ Invented the first automated evaluate artificial intelligence. loom (1745), a precursor to ○ The Halting Problem programmable machines. (undecidable) laid groundwork for computational theory. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Early Computers Networking and Memory 1936: Konrad Zuse's Z1 - First freely 1969 - ARPANET: programmable computer (mechanical). ○ Funded by ARPA (now DARPA), 1944: Harvard Mark I - First universal connecting UCLA, Stanford, calculator (Grace Hopper contributed). UCSB, and the University of 1943/1944: Colossus Mark I & II - First Utah, it laid the groundwork for programmable electronic computers, the Internet. used for codebreaking at Bletchley Park. 1970 - Intel 1103: 1946: ENIAC - First general-purpose ○ First commercially available electronic computer, featuring 17,000 dynamic memory chip (1 KB). vacuum tubes. Microprocessors and Networking Hardware Breakthroughs 1971 - Intel 4004: 1947 - The Transistor: ○ First microprocessor (2,300 ○ Invented at Bell Labs, replacing transistors), matching ENIAC’s vacuum tubes with smaller, power in a compact form. reliable, energy-efficient circuits. 1973–1976 - Ethernet: 1958 - Integrated Circuit: ○ Invented by Robert Metcalfe at ○ Jack Kilby and Robert Noyce Xerox, enabling local area developed the chip, enabling networking (LAN). miniaturization of electronic devices. Personal Computers Key Developments in Software 1974/1975: ○ Altair, Scelbi, and IBM 5100 1954 - FORTRAN: targeted individual users. ○ First successful high-level ○ Apple I (1976) and Apple II programming language, (1977) followed, marking the simplifying scientific personal computer boom. calculations. 1981 - IBM PC: 1962: ○ Ran on MS-DOS, established ○ Spacewar: First computer the standard for personal game, developed at MIT on a computers due to open DEC PDP-1. architecture. ○ Expensive Typewriter: Early 1984 - Apple Macintosh: word processor for PDP-1. ○ Introduced the first widely 1964 - The Mouse: adopted WIMP interface ○ Douglas Engelbart (Windows, Icons, Mouse, demonstrated the first computer Pointer). mouse and window concepts. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Software Revolution ○ Input/Output Stored-program computer design where 1978/1979: program and data share the same ○ VisiCalc (first spreadsheet memory. software) and WordStar (word processor) drove personal Note: Basis for modern computer computer adoption. architecture. 1981: ○ IBM PC introduced with 16-640 KB RAM and Intel 8088 CPU. Central Processing Unit (CPU) Executes computer program 1.3 COMPUTER SYSTEMS instructions. Parts: ORGANIZATIONS ○ ALU: Handles arithmetic and (HARDWARE) logic operations. ○ CU: Directs operations and provides timing signals. ○ Registers: High-speed storage within CPU: Computer Hardware: MAR: Holds memory address for access. Physical parts of a computer system; MDR: Stores data for includes external components (case, memory transfer. monitor, keyboard, mouse) and internal AC: Stores intermediate components (motherboard, CPU, RAM, arithmetic/logic results. hard drive, etc.). PC: Tracks the address of the next instruction. Software: CIR: Stores the current instruction being Set of instructions for a computer to executed. perform operations; cannot be physically touched. Note: Clock speed (GHz) indicates processing speed. Note: Both hardware and software are essential for a functional computer system. Motherboard Central hub connecting all components; Von Neumann Architecture houses the CPU. Key Considerations: First introduced: John von Neumann, ○ Ports (USB, HDMI, etc.) 1945. ○ Compatibility with RAM, Components: graphics cards. ○ Control Unit (CU) ○ Determines power and ○ Arithmetic and Logic Unit (ALU) communication flow between ○ Memory Unit components. ○ Registers FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Note: Foundation for all hardware integration. Power Supply Unit (PSU) Converts external power for system use, distributing it through the motherboard. Memory Unit Key Factors: ○ Wattage (500W–850W for RAM (Random Access Memory): typical modern PCs). ○ Temporary storage for ○ Ensures stable system immediate data access. performance. ○ Speeds up CPU operations. ○ Important for high-power tasks ○ Ideal for multitasking and (gaming, graphic design). rendering tasks. Note: Overestimating wattage ensures future compatibility with upgrades. Memory Characteristics: ○ Divided into partitions (address and contents). ○ Faster than permanent storage Buses (hard drives). Channels for data transmission between components (e.g., CPU, memory, I/O devices). Storage Devices Note: Essential for component Hard Disk Drive (HDD): Uses spinning communication. platters and magnetic data writing. Solid State Drive (SSD): Uses flash memory; faster and more durable than HDD. Key Hardware Summary Note: SSDs are preferred for CPU: Processes data; brain of the speed and reliability. system. RAM: Temporary fast-access memory for active tasks. Motherboard: Connects and integrates Graphics Processing Unit (GPU) all hardware. HDD/SSD: Permanent data storage. Purpose: Specialized in rendering GPU: Handles visual rendering and graphic data and handling parallel computation. computational tasks. PSU: Supplies power to all components. Dedicated GPU: Interfaces via expansion slot; can be upgraded. Note: Critical for gaming, 3D rendering, and high-performance tasks. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1.4 COMPUTER SYSTEM Definition: Designed to satisfy specific needs of users in particular ORGANIZATION (SOFTWARE) environments. Composition: Single program or software packages (e.g., Microsoft Office Suite). Language: Written in high-level Software languages. Set of instructions/programs instructing Examples: a computer to perform tasks. Generic term for computer programs Productivity Software: Microsoft Word, running on devices like PCs, phones, Excel, PowerPoint tablets. Utility Software: Compression tools, disk Examples: Operating systems, cleanup diagnostic tools, apps, video games. Specialized Applications: Payroll, student records, inventory management Features: Categories of Software Close to the user 1) System Software Easy to design More interactive Definition: Collection of programs Slow in speed designed to operate, control, and extend Easy to understand/use the computer's processing capabilities. Bigger in size, requires large storage Prepared by: Computer manufacturers. Language: Written in low-level languages. Purpose: Acts as an interface between TYPES OF SOFTWARE: hardware and end-users. Examples: Operating Systems Compilers Interpreters Assemblers Features: Close to the system Fast in speed Difficult to design/understand Less interactive Smaller in size Difficult to manipulate Written in low-level language 2) Application Software FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING NOTES 3. Grows rapidly alongside advancements in computer System Software: Focuses on the technology. internal workings of a computer. Fast but harder to manage. Application Software: User-centered tools for practical tasks. Slower but easy Contributors to Computer Ethics: to use. Key Tip: Low-level languages (System Norbert Wiener (1950) Software) directly communicate with hardware, while high-level languages Book: The Human Use (Application Software) are closer to of Human Beings human language. Laid a foundation for Computer Ethics research. Donn Parker (1960s) Studied unethical and 2.1 COMPUTER ETHICS illegal computer uses. ISSUES Joseph Weizenbaum (Late 1960s) Created ELIZA (automated Ethics psychotherapy program). Ethics is a structure of standards and Book: Computer Power practices that influence how people lead and Human Reason their lives. (1976). ○ Unlike laws, ethics do not legally mandate what is right or wrong. Walter Maner (1970s) ○ It is a standard for right and wrong behavior and a measure Coined the term of personal integrity. "Computer Ethics." Note: Ethics guides decisions based on values James Moor (1980s) rather than legal constraints. Article: What Is Computer Ethics? Computer Ethics Deborah Johnson A branch of ethics addressing the moral Wrote Computer Ethics. standards governing the use of computers. Sherry Turkle and Judith Perrolle 1. Privacy, intellectual property rights, and effects on society. Explored the 2. Morally acceptable use of psychological and computers. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING sociological impacts of 1. Copyright computing. ○ Protects the author's work for 28 years from copying or Organizations (1990s): unauthorized use. 2. Intellectual Property EFF, ACM, AICE ○ Creations protected by law (e.g., Heralded the second patents, copyrights). generation of Computer 3. Plagiarism Ethics. ○ Copying work without proper citation—akin to intellectual Primary Issues in Computer Ethics theft. 4. Software License 1. Privacy ○ Grants limited usage rights for ○ Protecting personal data and digital material per the license ensuring ethical use. agreement. 2. Accuracy 5. Key Terms: ○ Verifying and authenticating ○ Infringement: Unauthorized information. copying of copyrighted material. 3. Property ○ Piracy: Illegal duplication of ○ Determining ownership and software or content. usage rights of ○ Trade Secret: Business-owned information/software. non-public creations. 4. Cybercrime ○ Patent: Legal monopoly on ○ Crimes involving computers and inventions for 17 years. networks. 5. Access ○ Controlling and determining who can access data. Software License Types: 1. Public Domain: Free to use, not copyrighted. 2. Freeware: Free but copyrighted. I. Privacy-Related Terminologies 3. Shareware: Free trial with optional payment for full 1. Malware features. ○ Malicious software intended to 4. All Rights Reserved: Usage harm systems (e.g., viruses, limited by license terms. spyware, worms, trojans). ○ Spyware: Tracks online activity III. Cybercrime and collects data without consent. Definition: Crimes involving a computer 2. Data Protection as a tool or target. ○ Safeguarding personal Categories: information while allowing 1. Target Networks/Devices (e.g., ethical business use. malware, DDoS). 3. Anonymity 2. Using Devices for Crimes ○ Masking user identity through (e.g., phishing, identity theft). applications. II. Intellectual Property Rights FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Common Cybercrime Acts ○ Online harassment, particularly targeting vulnerable groups. 1. Fraud ○ Deceives individuals to steal data or resources. 2. Hacking 2.2 DATA COMMUNICATIONS ○ Accessing systems/networks without permission. 3. Identity Theft ○ Stealing sensitive information (e.g., passwords, bank details). What is Data Communication? 4. Scamming ○ False IT services or offers to refers to the exchange of data between exploit users financially. a source and a receiver using 5. Viruses transmission media, such as wires or ○ Programs that harm systems cables. and steal data. Communication: Sharing information 6. Ransomware can happen locally (face-to-face) or ○ Encrypts files, demanding remotely (over a distance). payment to restore access. Telecommunication: Means 7. DDoS Attacks communication at a distance, derived ○ Disrupts systems to exploit from the Greek word "Tele" meaning far vulnerabilities. (e.g., telephone, telegraph, television). 8. Botnets ○ Networks of compromised systems controlled remotely. Components of Data Communication: 9. Spamming ○ Unwanted bulk messages with 1. Message: The data to be malicious intent. communicated, which can include text, 10. Phishing numbers, images, audio, or video. ○ Fake emails or websites to steal 2. Sender: The device/computer that user credentials. generates and sends the message. 11. Cyberstalking 3. Receiver: The device/computer that ○ Anonymously following receives the message. someone online. 4. Medium: The physical path or channel 12. Software Piracy through which the message is ○ Illegal duplication of transmitted (e.g., wires, airwaves). software/content. 5. Protocol: A set of rules that govern the communication process between devices. Other Cybercrimes 1. Child Pornography ○ Exploiting children in the porn Data Communication Medium: industry. ○ A $3-billion/year illegal industry. Bounded Media (Wired): Physical 2. Cyberbullying cables that carry data. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Unbounded Media (Wireless): Unbounded Media Types (Wireless): Electromagnetic waves that transmit data without physical cables. 1. Radiowaves: Used in cellphones, TV, and radio. 2. Microwaves: Used in mobile phone communication and TV distribution. Bounded Communication Media Types: 3. Satellite: Used for communication through artificial satellites orbiting Earth. 1. Coaxial Cable: ○ Example: Over 4,987 satellites ○ Used for: TV and computer orbiting Earth in 2019. networking. 4. Infrared: Short-distance ○ Transmits: Electrical signals. communication, invisible to the human ○ Advantages: Can support eye but felt as heat (used in devices like 10mbps speed. TV remotes). ○ Disadvantages: Bulky, expensive, and network failure can affect the entire system. 2. Twisted Pair Wire: Types of Data Transmission Models: ○ Used for: Telephone and networking cables. 1. Simplex: One-way communication (e.g., ○ Transmits: Electrical signals. keyboards, monitors). ○ Advantages: Flexible, 2. Half-Duplex: Two-way communication inexpensive, and supports fast but not simultaneous (e.g., data transfer. walkie-talkies). ○ Disadvantage: Susceptible to 3. Full-Duplex: Two-way communication electromagnetic interference occurring simultaneously (e.g., (EMI), caused by nearby telephone networks). electrical devices like motors or fluorescent lights. 3. Fiber Optic Cable: ○ Transmits: Light signals. Key Notes: ○ Advantages: High data transmission over long Electromagnetic Interference (EMI): distances and immune to EMI. Disturbance in signal transmission due ○ Disadvantages: Expensive, to nearby electrical devices, notably fragile, and difficult to install. affecting twisted pair wires. ○ Types: Coaxial Cable: RG58 (for networking), Single Mode: RG59 (for TV), RG6 (for satellite). Long-reach Fiber Optic Cables: Support large data applications, typically volumes; single-mode is for long used in carrier distances, multimode for shorter networks. distances in local networks. Multimode: Shorter Unbounded Media: Wireless reach, commonly used transmission offers flexibility but may be in local networks. less secure than bounded (wired) media. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Note: Serial connections aren't feasible for large networks, so distributors are used to manage 2.3 COMPUTER connections. NETWORKING 3. Router ○ Purpose: A device that connects multiple networks and routes data between them. Computer Network: ○ Modern Routers: Often wireless, removing the need for refers to a set of computers connected physical cables between together to share resources and devices. information. Networks enable the 4. Network Cards (NICs) sharing of data, files, devices (like ○ Purpose: Essential for a printers and scanners), and services computer to connect to a across multiple computers. network. ○ Types: Internal (on the motherboard) and external Key Characteristics: (USB or wireless). 5. Internal Network Cards Shared resources: Data, files, and ○ Types: PCI (Peripheral devices like printers can be accessed Component Interconnect) and across connected systems. ISA (Industry Standard File sharing: Store files on one Architecture). computer and access them from others ○ Connection: Requires network on the network. cables for data transfer. Peripheral sharing: Share devices 6. External Network Cards (e.g., printers, scanners, fax machines) ○ Types: Wireless (no cables with other computers on the network. needed) and USB-based (easy installation via USB port). Note: Wireless cards do not require physical Essential Hardware Components in a cables for network connection. Network 1. Network Cables ○ Purpose: Used to physically Types of Computer Networks connect computers within the network. Networks are categorized based on their ○ Common Type: Category 5 geographic span: (RJ-45) cables. 1. LAN (Local Area Network) 2. Distributors ○ Scope: Small geographic area, ○ Purpose: A central device for like a building or office. connecting multiple computers ○ Cost: Inexpensive to set up with and devices within a network, low-cost hardware. helping manage network traffic. ○ Speed: High-speed data transfer. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Security: Generally high Network Topologies security. 2. PAN (Personal Area Network) 1. Bus Topology ○ Scope: Limited to a small area, ○ Structure: All devices are typically 10 meters. connected to a single central ○ Uses: Devices like laptops, cable. smartphones, and media ○ Advantages: Cost-effective, players. simple to expand. ○ Types: Wired (via USB) and ○ Disadvantages: Cable failure wireless (via WiFi or Bluetooth). can bring down the entire 3. MAN (Metropolitan Area Network) network, performance ○ Scope: Larger area than LAN, decreases with heavy traffic. connecting multiple LANs in a 2. Ring Topology city or large campus. ○ Structure: Devices are ○ Uses: Government agencies, connected in a circular loop. universities, banks. ○ Features: Data passes through ○ Protocols: RS-232, Frame each node sequentially. Relay, ATM, ISDN. ○ Advantages: Stable with fewer 4. WAN (Wide Area Network) devices. ○ Scope: Extensive coverage, ○ Disadvantages: Failure of a across states or countries (e.g., single node can disrupt the the Internet). entire network, troubleshooting ○ Uses: Business, education, and is harder. government. 3. Star Topology 5. Internetwork ○ Structure: Devices are ○ A network of networks (LANs connected to a central hub. and WANs) connected using ○ Advantages: Easy to devices. troubleshoot and expand, failure ○ Example: Intranet (private of one node doesn’t affect network for an organization). others. ○ Disadvantages: Expensive to install, hub failure causes network breakdown. Network Topology 4. Mesh Topology ○ Structure: Every node is Network topology refers to the physical or connected to every other node. logical arrangement of network devices and ○ Advantages: Robust, fault how they interact. This determines network tolerance, and secure. performance and efficiency. ○ Disadvantages: Complex setup, high installation cost due 1. Physical vs. Logical Topology to extensive cabling. ○ Physical Topology: Refers to the actual layout of the network, including cables and devices. ○ Logical Topology: Defines how Notes: data flows across the network and how devices communicate. Network Cables: These are the physical medium through which data is transferred between network devices. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Category 5 cables (RJ-45) are 1962 - ARPAnet: commonly used for Ethernet ○ J.C.R. Licklider's suggestion to connections. connect computers led to the Router: A device that not only connects development of the ARPAnet, devices within a network but also the first network designed to facilitates the transfer of data between survive potential nuclear networks, especially in wide-area attacks. networks like the internet. 1981 - CSNET: Network Card (NIC): An essential ○ The Computer Science component allowing a computer to Network (CSNET) expanded access a network. It enables the ARPAnet to connect computer computer to communicate with other science researchers across the devices and share resources. nation. LAN, MAN, WAN: These terms define 1985 - NSFNET: the range and scope of networks. LAN ○ The National Science is for local, small areas, MAN covers Foundation Network cities or larger areas, and WAN spans (NSFNET) was launched, across states or countries, often connecting U.S. universities and connecting LANs and MANs. becoming the backbone of the Topology: Understanding network modern internet. topology helps in designing efficient 1989 - HTTP/WWW - Tim Berners-Lee: networks. The physical topology ○ Tim Berners-Lee invented the defines how devices are connected, HyperText Transfer Protocol while the logical topology defines how (HTTP), enabling the the network communicates. development of the World Wide Web (WWW). 1993 - Mosaic Browser: ○ introduced in-line images with 3.1 INTRODUCTION TO text, played a key role in the growth of the web. INTERNET 1995-1999 - Windows 95, Java, Google: ○ Major developments like the launch of Windows 95, Internet What is the Internet? Explorer, Java (for web animation), and Google a global system of interconnected revolutionized internet access computer networks that allows the and functionality. exchange of data and communication. 2000-2005 - WiFi and Smartphones: ○ The rise of Wi-Fi and mobile History of the Internet internet devices like 1958 - ARPA/DARPA: smartphones expanded the ○ The creation of the Advanced reach and convenience of the Research Projects Agency internet. (ARPA) marked the beginning Key People Who Made the Internet Possible of the internet’s development under the U.S. Department of Leonard Kleinrock: Defense. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Developed the mathematical ○ Instant, electronic mail that can theory behind packet be sent to anyone worldwide. switching, the fundamental FTP (File Transfer Protocol): technology for the internet. ○ The method for uploading and Larry Roberts: downloading files from the ○ Designed ARPAnet, the first internet. inter-networking system Homepage: connecting computers across ○ The first page of a website, the U.S. usually offering introductory Vint Cerf and Robert Kahn: content and links. ○ Developed TCP/IP, the protocol HTTP: suite that underpins the internet. ○ The protocol used for Raymond Tomlinson: transferring web pages across ○ Introduced the @ symbol in the internet. email addresses and created IP Address: the first email in 1971. ○ A unique numerical identifier for Paul Mockapetris and John Postel: each device connected to the ○ Developed the Domain Name internet. System (DNS), making it easier URL (Uniform Resource Locator): to use human-readable domain ○ The address used to access names instead of numeric IP resources on the web (e.g., addresses. http://www.example.com). Barry Shein: Telnet: ○ Created the first commercial ○ A program that allows remote Internet Service Provider access to other computers via (ISP), making the internet the internet. accessible to the public in 1989. Web Page: Sir Tim Berners-Lee: ○ A single document on the web, ○ Created HTML and the World typically part of a larger website. Wide Web, transforming how Website: information is shared on the ○ A collection of web pages that internet. are related and accessible Marc Andersen and Eric Bina: under a common domain. ○ Developed the Mosaic browser, which became the Notes: foundation for later browsers like Netscape. Domain: ○ Represents the address of a Basic Internet Terminologies website or resource on the internet. Domains are easier to Domain: remember than numeric IP ○ The unique address for a addresses. website, often associated with E-mail: an IP address. ○ Different from traditional mail, it Browser: is an instantaneous form of ○ A software like Mozilla Firefox communication, which made or Internet Explorer used to sending messages globally access and display web pages. easier. E-mail: FTP: FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Useful for transferring files over the internet, such as documents, videos, or software. HTTP: ○ Ensures that web pages are correctly transferred and viewed across different computer platforms. Key Concepts: DNS (Domain Name System): ○ This system maps domain names to their corresponding IP addresses, allowing users to access websites using easy-to-remember names rather than numbers. Web Hosting: ○ The service that stores and provides access to websites, ensuring that they are always online and available to users. TO BE CONTINUED… PAGOD NA KO

Use Quizgecko on...
Browser
Browser