Final Exam Reviewer 1st Semester Introduction to Computing PDF

Summary

This document is a reviewer for a course on Introduction to Computing, covering major disciplines like information systems (IS) and computer science, and emerging technologies. It also details computer hardware, software, and network topologies.

Full Transcript

FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1.1 OVERVIEW OF Defines five key sub-disciplines: IS, IT, Computer Science, Engineering, and COMPUTING...

FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1.1 OVERVIEW OF Defines five key sub-disciplines: IS, IT, Computer Science, Engineering, and COMPUTING Software Engineering. What is Computing? Major Disciplines of Computing (Defined by ACM); Before 1935: A "computer" was a human performing calculations. 1. Information Systems (IS): Modern Era (Post-1945): Refers to ○ Business decision-making via machines based on Von Neumann's data systems. model: ○ MIS (Management Information ○ Functions: Accepts input, Systems): Managing data for processes data, stores data, informed decisions. and produces output. Definition: Computing is managing, processing, and communicating information through computers. 2. Information Technology (IT): Includes: ○ Solving specific business ○ Designing and building problems using technology. hardware/software. ○ Manage IT resources, create ○ Scientific studies using technology strategies, assist computers. executives with technology ○ Developing intelligent systems. planning. ○ Creating communication/entertainment platforms. ○ Gathering purpose-driven 3. Computer Science: information. ○ Theoretical and technical aspects of computing. ○ Responsibilities: Develop algorithms. Importance of Computing: Study software systems. Critical for Modern Technology: Innovate data transfer Essential in industries like healthcare, methods. education, communication, and finance. Daily Applications: Swiping cards, emails, smartphones. 4. Computer Engineering: ○ Hardware development and integration. ACM (Association for Computing ○ Responsibilities: Machinery): Research and design microchips, processors, Founded: 1947 in New York City. and hardware Largest educational and scientific components. computing society. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Integrate hardware with ○ Gaming and interactive software systems. marketing. 3. Cloud Computing 5. Software Engineering: Internet-based computing for services ○ Development, testing, and like storage, servers, and software. deployment of software Benefits: systems. ○ Cost savings (no on-site ○ Derived from computer science infrastructure). and IT. ○ Global scalability. ○ Enhanced performance and security. ○ Productivity gains and disaster Emerging Technologies in Computing: recovery options. Types: 1. Artificial Intelligence (AI) ○ Public Cloud: Shared, third-party resources (e.g., Machines that mimic human Microsoft Azure). intelligence. ○ Private Cloud: Exclusive to an Key Concepts: organization. ○ Machine Learning: Machines ○ Hybrid Cloud: Combines public learn tasks using statistical and private clouds. models. ○ Deep Learning: Neural networks 4. Internet of Things (IoT) with multiple layers for complex decision-making. Interconnected devices sharing data Applications: without human interaction. ○ Smart assistants (e.g., Siri, Applications: Alexa). ○ Smart homes (connected ○ Autonomous vehicles. appliances). ○ Predictive healthcare systems. ○ Smart cities (traffic optimization, ○ Conversational bots and spam waste management). filters. ○ Energy-efficient solutions. Key Figure: Alan Turing (Turing Test, 1950). 5. Big Data 2. Augmented Reality (AR) and Virtual Reality Enormous and complex datasets (VR) requiring advanced processing. Types: AR: Enhances real-world objects with ○ Structured: Organized, fixed digital overlays (e.g., Snapchat, formats (e.g., tables). Pokémon Go). ○ Unstructured: Undefined VR: Simulates immersive virtual formats (e.g., social media environments for gaming, education, or posts). training. ○ Semi-structured: Partially Applications: organized data (e.g., XML files). ○ Medical training. Characteristics: ○ Volume: Massive data size. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Variety: Diverse formats. c) Software Engineering ○ Velocity: Rapid data generation. d) Business Administration ○ Variability: Inconsistent data patterns. 3. What does the field of Computer Applications: Engineering focus on? ○ Social media analytics. ○ Predictive modeling in a) Developing algorithms and software systems healthcare. b) Managing business data systems c) Researching and designing hardware components d) Building cloud computing platforms 3 Great Men in Communication: 4. True or False: Artificial Intelligence (AI) only involves robots performing Tim Berner’s Lee (creator of “www”) physical tasks. SteveJobs, 2007 (Invented IPhone) Bill Gates, Microsoft ___ (True / False) 5. Which of the following is an example John Von Neumann of an application of Augmented Reality (AR)? A Hungarian-American mathematician; physicist; a) Virtual reality video games Computer scientist; b) Snapchat filters Engineer and c) Autonomous vehicles polymath. d) Predictive healthcare systems 6. What is the key feature of Cloud Computing? TEST YOURSELF: a) It requires physical on-site infrastructure. b) It is based on internet-based services like 1. What is the definition of computing? storage and software. c) It only works with large businesses. a) The act of performing calculations manually d) It does not offer disaster recovery options. b) Managing, processing, and communicating information through computers 7. Match the following terms to their c) The process of designing hardware components correct definitions: d) The process of manufacturing electronic devices 1. Big Data 2. IoT (Internet of Things) 2. Which of the following is NOT a major 3. Artificial Intelligence (AI) discipline of computing, as defined by 4. Cloud Computing the ACM? a) Interconnected devices sharing data a) Information Systems (IS) b) Enormous datasets requiring advanced b) Information Technology (IT) processing c) Machines mimicking human intelligence FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING d) Internet-based computing for services like patterns, influencing later storage and software computing designs. Charles Babbage (1791–1871): 8. Who is credited with creating the ○ Difference Engine (1822): World Wide Web (WWW)? Designed to automate polynomial calculations, a) Bill Gates reducing human error. b) Tim Berners-Lee ○ Analytical Engine (1837): A c) Steve Jobs design for a general-purpose d) Alan Turing programmable machine with advanced features (sequential 9. What is the main responsibility of a control, loops, conditionals). Software Engineer? Ada Lovelace (1815–1852): ○ Wrote the first program (to a) Designing microchips and processors calculate Bernoulli numbers) for b) Developing, testing, and deploying software the Analytical Engine, earning systems the title of the first c) Studying software algorithms programmer. d) Managing IT resources 10. Short Answer: What are the three types of cloud computing? 20th Century: Theoretical Foundations Kurt Gödel (1906–1978): ○ Incompleteness Theorem: Proved not all mathematical 1.2 HISTORY OF COMPUTER problems are computable. Alonzo Church (1903–1995): ○ Developed lambda calculus, foundational for functional 18th Century: Early Mechanical Innovations programming and equivalent to Turing Machines. Jacques de Vaucanson (1709–1782): Alan Turing (1912–1954): ○ Created life-like mechanical ○ Invented the Turing Machine (a automations (e.g., Digesting universal model for Duck with over 400 parts). computation). ○ Invented the first automated ○ Proposed the Turing Test to loom (1745), a precursor to evaluate artificial intelligence. programmable machines. ○ The Halting Problem (undecidable) laid groundwork for computational theory. 19th Century: Programmable Machines Early Computers 1805 - Jacquard Loom: 1936: Konrad Zuse's Z1 - First freely ○ First programmable loom using programmable computer (mechanical). punch cards to control FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1944: Harvard Mark I - First universal ○ Funded by ARPA (now DARPA), calculator (Grace Hopper contributed). connecting UCLA, Stanford, 1943/1944: Colossus Mark I & II - First UCSB, and the University of programmable electronic computers, Utah, it laid the groundwork for used for codebreaking at Bletchley Park. the Internet. 1946: ENIAC - First general-purpose 1970 - Intel 1103: electronic computer, featuring 17,000 ○ First commercially available vacuum tubes. dynamic memory chip (1 KB). Hardware Breakthroughs Microprocessors and Networking 1947 - The Transistor: 1971 - Intel 4004: ○ Invented at Bell Labs, replacing ○ First microprocessor (2,300 vacuum tubes with smaller, transistors), matching ENIAC’s reliable, energy-efficient circuits. power in a compact form. 1958 - Integrated Circuit: 1973–1976 - Ethernet: ○ Jack Kilby and Robert Noyce ○ Invented by Robert Metcalfe at developed the chip, enabling Xerox, enabling local area miniaturization of electronic networking (LAN). devices. Personal Computers Key Developments in Software 1974/1975: 1954 - FORTRAN: ○ Altair, Scelbi, and IBM 5100 ○ First successful high-level targeted individual users. programming language, ○ Apple I (1976) and Apple II simplifying scientific (1977) followed, marking the calculations. personal computer boom. 1962: 1981 - IBM PC: ○ Spacewar: First computer ○ Ran on MS-DOS, established game, developed at MIT on a the standard for personal DEC PDP-1. computers due to open ○ Expensive Typewriter: Early architecture. word processor for PDP-1. 1984 - Apple Macintosh: 1964 - The Mouse: ○ Introduced the first widely ○ Douglas Engelbart adopted WIMP interface demonstrated the first computer (Windows, Icons, Mouse, mouse and window concepts. Pointer). Networking and Memory 1969 - ARPANET: Software Revolution 1978/1979: FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ VisiCalc (first spreadsheet a) It replaced vacuum tubes, making computers software) and WordStar (word smaller, more reliable, and energy-efficient. processor) drove personal b) It introduced the concept of microprocessors. computer adoption. c) It was the first programmable component in 1981: computers. ○ IBM PC introduced with 16-640 d) It enabled the creation of the first computer KB RAM and Intel 8088 CPU. game. 6. Which of the following was the first personal computer introduced to the TEST YOURSELF: market? 1. Who is credited with creating the first a) IBM PC programmable loom using punch cards? b) Apple II c) Altair 8800 a) Charles Babbage d) Apple I b) Jacquard c) Ada Lovelace 7. True or False: The first computer d) Jacques de Vaucanson game, Spacewar, was developed at MIT on a DEC PDP-1 in 1962. 2. True or False: The Difference Engine, designed by Charles Babbage, was ___ (True / False) intended to automate polynomial calculations to reduce human error. 8. What was the main function of ARPANET, created in 1969? ___ (True / False) a) To connect the first personal computers 3. Which of the following is considered b) To facilitate global video streaming c) To connect academic institutions and lay the the first computer program? groundwork for the internet a) Jacquard Loom’s punch card program d) To develop early email systems b) Ada Lovelace’s program for the Analytical Engine 9. Who is credited with inventing c) FORTRAN program for scientific calculations Ethernet, which enabled local area d) Spacewar game developed at MIT networking (LAN)? 4. In what year was the ENIAC, the first a) Robert Metcalfe general-purpose electronic computer, b) Alan Turing c) Grace Hopper introduced? d) Tim Berners-Lee a) 1936 b) 1944 10. Match the following events with their c) 1946 correct year of occurrence: d) 1958 1. The Transistor invented 5. What was the main significance of the 2. First microprocessor (Intel 4004) invention of the transistor in 1947? 3. IBM PC introduced FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 4. The Mouse demonstration by ○ Memory Unit Douglas Engelbart ○ Registers ○ Input/Output a) 1971 Stored-program computer design where b) 1981 program and data share the same c) 1954 memory. d) 1964 Note: Basis for modern computer 11. Short Answer: What were the key architecture. contributions of Ada Lovelace to the history of computing? Central Processing Unit (CPU) Executes computer program 1.3 COMPUTER SYSTEMS instructions. ORGANIZATIONS Parts: ○ ALU: Handles arithmetic and (HARDWARE) logic operations. ○ CU: Directs operations and provides timing signals. ○ Registers: High-speed storage Computer Hardware: within CPU: MAR: Holds memory Physical parts of a computer system; address for access. includes external components (case, MDR: Stores data for monitor, keyboard, mouse) and internal memory transfer. components (motherboard, CPU, RAM, AC: Stores intermediate hard drive, etc.). arithmetic/logic results. PC: Tracks the address Software: of the next instruction. CIR: Stores the current Set of instructions for a computer to instruction being perform operations; cannot be physically executed. touched. Note: Clock speed (GHz) indicates Note: Both hardware and software processing speed. are essential for a functional computer system. Motherboard Von Neumann Architecture Central hub connecting all components; houses the CPU. First introduced: John von Neumann, Key Considerations: 1945. ○ Ports (USB, HDMI, etc.) Components: ○ Compatibility with RAM, ○ Control Unit (CU) graphics cards. ○ Arithmetic and Logic Unit (ALU) FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Determines power and Note: Critical for gaming, 3D communication flow between rendering, and high-performance components. tasks. Note: Foundation for all hardware integration. Power Supply Unit (PSU) Memory Unit Converts external power for system use, distributing it through the motherboard. RAM (Random Access Memory): Key Factors: ○ Temporary storage for ○ Wattage (500W–850W for immediate data access. typical modern PCs). ○ Speeds up CPU operations. ○ Ensures stable system ○ Ideal for multitasking and performance. rendering tasks. ○ Important for high-power tasks (gaming, graphic design). Note: Overestimating wattage Memory Characteristics: ensures future compatibility with ○ Divided into partitions (address upgrades. and contents). ○ Faster than permanent storage (hard drives). Buses Channels for data transmission between Storage Devices components (e.g., CPU, memory, I/O devices). Hard Disk Drive (HDD): Uses spinning platters and magnetic data writing. Note: Essential for component Solid State Drive (SSD): Uses flash communication. memory; faster and more durable than HDD. Note: SSDs are preferred for Key Hardware Summary speed and reliability. CPU: Processes data; brain of the system. RAM: Temporary fast-access memory Graphics Processing Unit (GPU) for active tasks. Motherboard: Connects and integrates Purpose: Specialized in rendering all hardware. graphic data and handling HDD/SSD: Permanent data storage. computational tasks. GPU: Handles visual rendering and Dedicated GPU: Interfaces via parallel computation. expansion slot; can be upgraded. PSU: Supplies power to all components. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING TEST YOURSELF: a) It handles data processing tasks. b) It converts and distributes external power to the system components. 1. Which of the following is NOT a c) It stores permanent data on the computer. physical component of a computer d) It handles the rendering of graphic data. system? 7. True or False: The Memory Unit (RAM) a) CPU stores data permanently for future use. b) RAM c) Software ___ (True / False) d) Monitor 8. What is the key difference between a 2. Who first introduced the Von Neumann Solid State Drive (SSD) and a Hard Disk architecture in 1945? Drive (HDD)? a) Alan Turing a) SSD uses spinning platters; HDD uses flash b) Charles Babbage memory. c) John von Neumann b) SSD is slower but more durable than HDD. d) Steve Jobs c) HDD uses spinning platters and magnetic data writing; SSD uses flash memory. 3. What is the primary function of the d) HDD is ideal for multitasking; SSD is not Arithmetic and Logic Unit (ALU) in the suitable for multitasking. CPU? 9. Which of the following is the correct a) Directing operations and providing timing function of the Graphics Processing Unit signals (GPU)? b) Handling arithmetic and logic operations c) Storing the current instruction being executed a) It processes data for the CPU. d) Holding the memory address for access b) It handles graphical data rendering and computational tasks. 4. True or False: The Control Unit (CU) is c) It manages data storage. responsible for tracking the address of d) It connects all hardware components. the next instruction in the CPU. 10. Match the following components to ___ (True / False) their descriptions: 5. Which of the following components is 1. CPU housed on the motherboard? 2. RAM a) GPU 3. Motherboard b) Hard Drive 4. Power Supply Unit (PSU) c) RAM d) Power Supply Unit a) Converts external power to system use and distributes it to components 6. What is the purpose of the Power b) Handles visual rendering and parallel computation Supply Unit (PSU) in a computer c) Stores temporary data for fast access by the system? CPU FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING d) The central hub that connects and integrates Features: all hardware components Close to the system 11. Short Answer: What are the key Fast in speed differences between RAM and permanent Difficult to design/understand storage (HDD/SSD)? Less interactive Smaller in size Difficult to manipulate Written in low-level language 2) Application Software 1.4 COMPUTER SYSTEM Definition: Designed to satisfy specific ORGANIZATION (SOFTWARE) needs of users in particular environments. Composition: Single program or software packages (e.g., Microsoft Office Suite). Software Language: Written in high-level languages. Set of instructions/programs instructing a computer to perform tasks. Examples: Generic term for computer programs running on devices like PCs, phones, Productivity Software: Microsoft Word, tablets. Excel, PowerPoint Examples: Operating systems, Utility Software: Compression tools, diagnostic tools, apps, video games. disk cleanup Specialized Applications: Payroll, student records, inventory management Categories of Software Features: 1) System Software Close to the user Easy to design Definition: Collection of programs More interactive designed to operate, control, and extend Slow in speed the computer's processing capabilities. Easy to understand/use Prepared by: Computer manufacturers. Bigger in size, requires large storage Language: Written in low-level languages. Purpose: Acts as an interface between hardware and end-users. TYPES OF SOFTWARE: Examples: Operating Systems Compilers Interpreters Assemblers FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING a) Microsoft Word b) Web browser c) Operating system d) Spreadsheet software 3. True or False: System software is typically written in high-level programming languages. ___ (True / False) 4. What is the primary purpose of system software? a) To help users complete tasks like writing documents or calculating data b) To manage and control the computer's internal functions and hardware c) To perform specialized tasks like inventory management NOTES d) To provide entertainment and multimedia functions System Software: Focuses on the internal workings of a computer. Fast 5. Which of the following is a but harder to manage. characteristic of system software? Application Software: User-centered tools for practical tasks. Slower but easy a) More interactive and user-friendly to use. b) Written in high-level languages Key Tip: Low-level languages (System c) Close to the system and faster in speed Software) directly communicate with d) Large in size and requires a lot of storage hardware, while high-level languages (Application Software) are closer to 6. Which of the following is an example human language. of application software? a) Compiler b) Operating system TEST YOURSELF: c) Microsoft Excel d) Assembler 1. What is software? 7. True or False: Application software is a) A physical component of a computer typically closer to the user and easier to b) A set of instructions that tells the computer understand and use than system how to perform tasks software. c) A type of computer hardware d) A type of computer memory ___ (True / False) 2. Which of the following is an example of system software? FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 8. What is one key difference between 2.1 COMPUTER ETHICS system software and application software? ISSUES a) System software is written in high-level languages, while application software is written in low-level languages. Ethics b) System software interacts directly with the hardware, while application software is designed Ethics is a structure of standards and to meet the needs of users. practices that influence how people lead c) Application software controls the internal their lives. operations of a computer, while system software ○ Unlike laws, ethics do not legally is used for specific tasks like word processing. mandate what is right or wrong. d) Application software is faster but harder to ○ It is a standard for right and manage than system software. wrong behavior and a measure of personal integrity. 9. Which of the following is NOT a type of system software? Note: Ethics guides decisions based on values rather than legal constraints. a) Operating system b) Compiler c) Spreadsheet program d) Assembler Computer Ethics 10. Match the following software A branch of ethics addressing the moral standards governing the use of categories to their descriptions: computers. 1. Privacy, intellectual property 1. System Software rights, and effects on society. 2. Application Software 2. Morally acceptable use of computers. a) Designed for user-specific tasks like 3. Grows rapidly alongside document editing and data analysis advancements in computer b) Controls and operates the computer’s technology. hardware, acting as an interface for the user 11. List three examples of system software. Contributors to Computer Ethics: Norbert Wiener (1950) 12. List three examples of application Book: The Human Use software. of Human Beings Laid a foundation for Computer Ethics research. Donn Parker (1960s) FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Studied unethical and ○ Determining ownership and illegal computer uses. usage rights of information/software. Joseph Weizenbaum (Late 1960s) 4. Cybercrime ○ Crimes involving computers and Created ELIZA networks. (automated 5. Access psychotherapy ○ Controlling and determining who program). can access data. Book: Computer Power and Human Reason (1976). I. Privacy-Related Terminologies Walter Maner (1970s) 1. Malware Coined the term ○ Malicious software intended to "Computer Ethics." harm systems (e.g., viruses, spyware, worms, trojans). James Moor (1980s) ○ Spyware: Tracks online activity and collects data without Article: What Is consent. Computer Ethics? 2. Data Protection ○ Safeguarding personal Deborah Johnson information while allowing ethical business use. Wrote Computer Ethics. 3. Anonymity Sherry Turkle and Judith Perrolle ○ Masking user identity through applications. Explored the psychological and II. Intellectual Property Rights sociological impacts of computing. 1. Copyright ○ Protects the author's work for 28 Organizations (1990s): years from copying or unauthorized use. EFF, ACM, AICE 2. Intellectual Property Heralded the second ○ Creations protected by law (e.g., generation of Computer patents, copyrights). Ethics. 3. Plagiarism ○ Copying work without proper Primary Issues in Computer Ethics citation—akin to intellectual theft. 1. Privacy 4. Software License ○ Protecting personal data and ○ Grants limited usage rights for ensuring ethical use. digital material per the license 2. Accuracy agreement. ○ Verifying and authenticating 5. Key Terms: information. ○ Infringement: Unauthorized 3. Property copying of copyrighted material. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ Piracy: Illegal duplication of ○ Encrypts files, demanding software or content. payment to restore access. ○ Trade Secret: Business-owned 7. DDoS Attacks non-public creations. ○ Disrupts systems to exploit ○ Patent: Legal monopoly on vulnerabilities. inventions for 17 years. 8. Botnets ○ Networks of compromised systems controlled remotely. 9. Spamming Software License Types: ○ Unwanted bulk messages with 1. Public Domain: Free to use, malicious intent. not copyrighted. 10. Phishing 2. Freeware: Free but copyrighted. ○ Fake emails or websites to steal 3. Shareware: Free trial with user credentials. optional payment for full 11. Cyberstalking features. ○ Anonymously following 4. All Rights Reserved: Usage someone online. limited by license terms. 12. Software Piracy ○ Illegal duplication of III. Cybercrime software/content. Definition: Crimes involving a computer as a tool or target. Categories: Other Cybercrimes 1. Target Networks/Devices (e.g., malware, DDoS). 1. Child Pornography 2. Using Devices for Crimes ○ Exploiting children in the porn (e.g., phishing, identity theft). industry. ○ A $3-billion/year illegal industry. 2. Cyberbullying ○ Online harassment, particularly Common Cybercrime Acts targeting vulnerable groups. 1. Fraud ○ Deceives individuals to steal TEST YOURSELF: data or resources. 2. Hacking 1. What is the primary difference ○ Accessing systems/networks between ethics and laws? without permission. 3. Identity Theft a) Ethics legally mandate behavior, while laws ○ Stealing sensitive information do not. (e.g., passwords, bank details). b) Ethics provide a framework for right and 4. Scamming wrong behavior, while laws enforce them. ○ False IT services or offers to c) Laws govern behavior based on personal exploit users financially. integrity, while ethics do not. 5. Viruses d) Laws are flexible, whereas ethics are rigid. ○ Programs that harm systems and steal data. 2. Which of the following is a main focus 6. Ransomware of computer ethics? FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING a) Morally acceptable use of computers 9. What is the purpose of a software b) Hardware development license? c) Programming language design d) Network security protocols a) To give full ownership of the software to the user 3. True or False: Computer ethics b) To grant limited usage rights per the license emerged as a field of study due to the agreement advancements in computer technology. c) To restrict access to software tools entirely d) To prevent the use of software on personal ___ (True / False) computers 4. Who is credited with coining the term 10. Which of the following is NOT a type “Computer Ethics”? of software license? a) James Moor a) Public Domain b) Norbert Wiener b) Freeware c) Donn Parker c) Shareware d) Walter Maner d) Malware 5. True or False: Intellectual property 11. Match the following terms to their rights include the protection of creations descriptions: like patents and copyrights. 1. Privacy ___ (True / False) 2. Copyright 3. Plagiarism 6. Which of the following is an example 4. Ransomware of malware? a) Copying work without proper citation a) A computer program that helps secure a b) Malicious software that encrypts files and network demands payment to restore access b) A virus or worm that harms systems c) Protecting personal information c) A type of software for business management d) Legal protection for an author’s work d) A legitimate tool used for personal productivity 12. Which of the following is a cybercrime involving the theft of 7. Which of the following acts is sensitive information? considered cybercrime? a) Ransomware a) Plagiarism b) Phishing b) Hacking c) Hacking c) Copyrighting software d) Fraud d) Watching online videos 8. True or False: Spamming refers to sending unwanted bulk messages with 2.2 DATA COMMUNICATIONS malicious intent. ___ (True / False) FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING What is Data Communication? ○ Transmits: Electrical signals. ○ Advantages: Can support refers to the exchange of data between 10mbps speed. a source and a receiver using ○ Disadvantages: Bulky, transmission media, such as wires or expensive, and network failure cables. can affect the entire system. Communication: Sharing information 2. Twisted Pair Wire: can happen locally (face-to-face) or ○ Used for: Telephone and remotely (over a distance). networking cables. Telecommunication: Means ○ Transmits: Electrical signals. communication at a distance, derived ○ Advantages: Flexible, from the Greek word "Tele" meaning far inexpensive, and supports fast (e.g., telephone, telegraph, television). data transfer. ○ Disadvantage: Susceptible to electromagnetic interference (EMI), caused by nearby Components of Data Communication: electrical devices like motors or fluorescent lights. 1. Message: The data to be 3. Fiber Optic Cable: communicated, which can include text, ○ Transmits: Light signals. numbers, images, audio, or video. ○ Advantages: High data 2. Sender: The device/computer that transmission over long generates and sends the message. distances and immune to EMI. 3. Receiver: The device/computer that ○ Disadvantages: Expensive, receives the message. fragile, and difficult to install. 4. Medium: The physical path or channel ○ Types: through which the message is Single Mode: transmitted (e.g., wires, airwaves). Long-reach 5. Protocol: A set of rules that govern the applications, typically communication process between used in carrier devices. networks. Multimode: Shorter reach, commonly used in local networks. Data Communication Medium: Bounded Media (Wired): Physical cables that carry data. Unbounded Media (Wireless): Electromagnetic waves that transmit Unbounded Media Types (Wireless): data without physical cables. 1. Radiowaves: Used in cellphones, TV, and radio. 2. Microwaves: Used in mobile phone Bounded Communication Media Types: communication and TV distribution. 3. Satellite: Used for communication 1. Coaxial Cable: through artificial satellites orbiting Earth. ○ Used for: TV and computer ○ Example: Over 4,987 satellites networking. orbiting Earth in 2019. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 4. Infrared: Short-distance device to another without using any transmission communication, invisible to the human media. eye but felt as heat (used in devices like d) The use of physical media like wires to send TV remotes). audio signals. 2. True or False: Telecommunication refers to communication that takes place Types of Data Transmission Models: over a long distance using electrical signals. 1. Simplex: One-way communication (e.g., keyboards, monitors). ___ (True / False) 2. Half-Duplex: Two-way communication but not simultaneous (e.g., 3. Which of the following is NOT a walkie-talkies). component of data communication? 3. Full-Duplex: Two-way communication occurring simultaneously (e.g., a) Message telephone networks). b) Protocol c) Receiver d) Monitor Key Notes: 4. True or False: A protocol in data communication is a set of rules Electromagnetic Interference (EMI): Disturbance in signal transmission due governing the communication process. to nearby electrical devices, notably ___ (True / False) affecting twisted pair wires. Coaxial Cable: RG58 (for networking), 5. Which of the following is an example RG59 (for TV), RG6 (for satellite). Fiber Optic Cables: Support large data of a bounded communication medium? volumes; single-mode is for long a) Radiowaves distances, multimode for shorter b) Coaxial Cable distances in local networks. c) Satellite Unbounded Media: Wireless d) Microwave transmission offers flexibility but may be less secure than bounded (wired) media. 6. What is the main disadvantage of using twisted pair wires for data transmission? a) It is susceptible to electromagnetic TEST YOURSELF: interference (EMI). b) It is expensive and difficult to install. 1. What is the definition of Data c) It does not support data transfer. Communication? d) It requires no installation. a) The exchange of data between a source and 7. Which type of cable transmits light receiver over a physical medium. signals and is immune to b) The sharing of information without using any electromagnetic interference (EMI)? devices. c) The process of sending a message from one FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING a) Coaxial Cable ___ (True / False) b) Twisted Pair Wire c) Fiber Optic Cable d) Satellite 8. True or False: Fiber optic cables are immune to electromagnetic interference 2.3 COMPUTER and are used for long-distance data NETWORKING transmission. ___ (True / False) Computer Network: 9. Which of the following is an example of unbounded (wireless) communication refers to a set of computers connected medium? together to share resources and information. Networks enable the a) Fiber Optic Cable sharing of data, files, devices (like b) Twisted Pair Wire printers and scanners), and services c) Microwave across multiple computers. d) Coaxial Cable 10. What type of data transmission model involves two-way communication, Key Characteristics: but not simultaneously? Shared resources: Data, files, and devices like printers can be accessed a) Simplex across connected systems. b) Full-Duplex File sharing: Store files on one c) Half-Duplex computer and access them from others d) Bidirectional on the network. Peripheral sharing: Share devices 11. Match the following data (e.g., printers, scanners, fax machines) transmission models to their with other computers on the network. descriptions: 1. Simplex 2. Half-Duplex Essential Hardware Components in a 3. Full-Duplex Network a) Two-way communication occurring 1. Network Cables simultaneously ○ Purpose: Used to physically b) One-way communication connect computers within the c) Two-way communication but not simultaneous network. ○ Common Type: Category 5 12. True or False: Electromagnetic (RJ-45) cables. interference (EMI) can affect data 2. Distributors transmission, especially in twisted pair ○ Purpose: A central device for wires. connecting multiple computers FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING and devices within a network, ○ Speed: High-speed data helping manage network traffic. transfer. ○ Security: Generally high Note: Serial connections aren't feasible for large security. networks, so distributors are used to manage 2. PAN (Personal Area Network) connections. ○ Scope: Limited to a small area, typically 10 meters. 3. Router ○ Uses: Devices like laptops, ○ Purpose: A device that smartphones, and media connects multiple networks and players. routes data between them. ○ Types: Wired (via USB) and ○ Modern Routers: Often wireless (via WiFi or Bluetooth). wireless, removing the need for 3. MAN (Metropolitan Area Network) physical cables between ○ Scope: Larger area than LAN, devices. connecting multiple LANs in a 4. Network Cards (NICs) city or large campus. ○ Purpose: Essential for a ○ Uses: Government agencies, computer to connect to a universities, banks. network. ○ Protocols: RS-232, Frame ○ Types: Internal (on the Relay, ATM, ISDN. motherboard) and external 4. WAN (Wide Area Network) (USB or wireless). ○ Scope: Extensive coverage, 5. Internal Network Cards across states or countries (e.g., ○ Types: PCI (Peripheral the Internet). Component Interconnect) and ○ Uses: Business, education, and ISA (Industry Standard government. Architecture). 5. Internetwork ○ Connection: Requires network ○ A network of networks (LANs cables for data transfer. and WANs) connected using 6. External Network Cards devices. ○ Types: Wireless (no cables ○ Example: Intranet (private needed) and USB-based (easy network for an organization). installation via USB port). Note: Wireless cards do not require physical cables for network connection. Network Topology Network topology refers to the physical or logical arrangement of network devices and Types of Computer Networks how they interact. This determines network performance and efficiency. Networks are categorized based on their geographic span: 1. Physical vs. Logical Topology ○ Physical Topology: Refers to 1. LAN (Local Area Network) the actual layout of the network, ○ Scope: Small geographic area, including cables and devices. like a building or office. ○ Logical Topology: Defines how ○ Cost: Inexpensive to set up with data flows across the network low-cost hardware. and how devices communicate. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Network Cables: These are the physical medium through which data is Network Topologies transferred between network devices. Category 5 cables (RJ-45) are 1. Bus Topology commonly used for Ethernet ○ Structure: All devices are connections. connected to a single central Router: A device that not only connects cable. devices within a network but also ○ Advantages: Cost-effective, facilitates the transfer of data between simple to expand. networks, especially in wide-area ○ Disadvantages: Cable failure networks like the internet. can bring down the entire Network Card (NIC): An essential network, performance component allowing a computer to decreases with heavy traffic. access a network. It enables the 2. Ring Topology computer to communicate with other ○ Structure: Devices are devices and share resources. connected in a circular loop. LAN, MAN, WAN: These terms define ○ Features: Data passes through the range and scope of networks. LAN each node sequentially. is for local, small areas, MAN covers ○ Advantages: Stable with fewer cities or larger areas, and WAN spans devices. across states or countries, often ○ Disadvantages: Failure of a connecting LANs and MANs. single node can disrupt the Topology: Understanding network entire network, troubleshooting topology helps in designing efficient is harder. networks. The physical topology 3. Star Topology defines how devices are connected, ○ Structure: Devices are while the logical topology defines how connected to a central hub. the network communicates. ○ Advantages: Easy to troubleshoot and expand, failure of one node doesn’t affect others. 3.1 INTRODUCTION TO ○ Disadvantages: Expensive to install, hub failure causes INTERNET network breakdown. 4. Mesh Topology ○ Structure: Every node is connected to every other node. What is the Internet? ○ Advantages: Robust, fault a global system of interconnected tolerance, and secure. computer networks that allows the ○ Disadvantages: Complex exchange of data and communication. setup, high installation cost due to extensive cabling. History of the Internet 1958 - ARPA/DARPA: ○ The creation of the Advanced Notes: Research Projects Agency (ARPA) marked the beginning FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING of the internet’s development Leonard Kleinrock: under the U.S. Department of ○ Developed the mathematical Defense. theory behind packet 1962 - ARPAnet: switching, the fundamental ○ J.C.R. Licklider's suggestion to technology for the internet. connect computers led to the Larry Roberts: development of the ARPAnet, ○ Designed ARPAnet, the first the first network designed to inter-networking system survive potential nuclear connecting computers across attacks. the U.S. 1981 - CSNET: Vint Cerf and Robert Kahn: ○ The Computer Science ○ Developed TCP/IP, the protocol Network (CSNET) expanded suite that underpins the internet. ARPAnet to connect computer Raymond Tomlinson: science researchers across the ○ Introduced the @ symbol in nation. email addresses and created 1985 - NSFNET: the first email in 1971. ○ The National Science Paul Mockapetris and John Postel: Foundation Network ○ Developed the Domain Name (NSFNET) was launched, System (DNS), making it easier connecting U.S. universities and to use human-readable domain becoming the backbone of the names instead of numeric IP modern internet. addresses. 1989 - HTTP/WWW - Tim Berners-Lee: Barry Shein: ○ Tim Berners-Lee invented the ○ Created the first commercial HyperText Transfer Protocol Internet Service Provider (HTTP), enabling the (ISP), making the internet development of the World Wide accessible to the public in 1989. Web (WWW). Sir Tim Berners-Lee: 1993 - Mosaic Browser: ○ Created HTML and the World ○ introduced in-line images with Wide Web, transforming how text, played a key role in the information is shared on the growth of the web. internet. 1995-1999 - Windows 95, Java, Marc Andersen and Eric Bina: Google: ○ Developed the Mosaic ○ Major developments like the browser, which became the launch of Windows 95, Internet foundation for later browsers Explorer, Java (for web like Netscape. animation), and Google revolutionized internet access Basic Internet Terminologies and functionality. 2000-2005 - WiFi and Smartphones: Domain: ○ The rise of Wi-Fi and mobile ○ The unique address for a internet devices like website, often associated with smartphones expanded the an IP address. reach and convenience of the Browser: internet. ○ A software like Mozilla Firefox or Internet Explorer used to Key People Who Made the Internet Possible access and display web pages. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING E-mail: FTP: ○ Instant, electronic mail that can ○ Useful for transferring files over be sent to anyone worldwide. the internet, such as FTP (File Transfer Protocol): documents, videos, or software. ○ The method for uploading and HTTP: downloading files from the ○ Ensures that web pages are internet. correctly transferred and viewed Homepage: across different computer ○ The first page of a website, platforms. usually offering introductory content and links. Key Concepts: HTTP: ○ The protocol used for DNS (Domain Name System): transferring web pages across ○ This system maps domain the internet. names to their corresponding IP IP Address: addresses, allowing users to ○ A unique numerical identifier for access websites using each device connected to the easy-to-remember names rather internet. than numbers. URL (Uniform Resource Locator): Web Hosting: ○ The address used to access ○ The service that stores and resources on the web (e.g., provides access to websites, http://www.example.com). ensuring that they are always Telnet: online and available to users. ○ A program that allows remote access to other computers via the internet. Web Page: ○ A single document on the web, 3.2 INTRODUCTION TO HTML typically part of a larger website. Website: ○ A collection of web pages that What is HTML? are related and accessible under a common domain. Definition: Stands for HyperText Markup Language. It is a format for creating web Notes: pages. Domain: File Type: Plain text files with special ○ Represents the address of a markup tags interpreted by browsers. website or resource on the File Extension:.html or.htm. internet. Domains are easier to remember than numeric IP addresses. E-mail: HTML Markup Tags ○ Different from traditional mail, it is an instantaneous form of Tags are enclosed in < > and guide the communication, which made browser on how to display content. sending messages globally Example of tags: easier. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ : Defines an HTML Page Title document. ○ : Defines the body content of the document. This is a Heading Basic HTML Tags This is a paragraph. 1. Headings: ○ to : Header tags for different text sizes. Heading 1 Heading 6 Logical Tags 2. Paragraphs: ○ Defined using tag. Tags like for abbreviations and for citations. Attributes: Example – align. Examples: ○ : Emphasized text. ○ : Strong/bold text. Centered ○ : Short quotations. Paragraph 3. Line Breaks: ○ : Creates a new line Physical Tags without starting a new paragraph. Tags for appearance: 4. Horizontal Rules: ○ : Bold text. ○ : Inserts a horizontal line ○ : Italics. for section separation. ○ : Underline (deprecated). 5. Comments: ○ : Superscript (e.g., ○ : exponents). Used to insert notes ignored by ○ : Subscript (e.g., H₂O). the browser. Common Character Entities Examples: Resu Descripti Entity Entity lt on Name Number FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ , (term), < Less than &lt; &#60; (description). Example: > Greater &gt; &#62; than HTML HyperText Markup Language & Ampersa &amp; &#38; nd HTML Images HTML Colors Tag:. It is self-closing. Colors are defined using HEX or RGB Attributes: values. ○ src: Image source. Examples: ○ alt: Alternative text for ○ Black: #000000, rgb(0,0,0) accessibility. ○ Red: #FF0000, rgb(255,0,0) ○ width and height: Define dimensions. Example: HTML Lists ○ with for bullet points. HTML Hyperlinks Example: Tag: with href attribute for linking. Target Attributes: Item 1 ○ _self: Open in the same window (default). Item 2 ○ _blank: Open in a new tab. Example: Visit Example 2. Ordered List: ○ with for numbered items. HTML Tables 3. Definition List: FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 1. Structure: What is CSS? ○ : Defines the table. ○ : Table row. CSS (Cascading Style Sheets): ○ Defines how HTML elements ○ : Table header. are displayed. ○ : Table cell. ○ Saves time by allowing ○ Attributes: border, centralized styling. cellpadding, cellspacing. ○ Syntax includes selectors and declaration blocks. Example: CSS Syntax Name CSS Rule-set: ○ Selector: Specifies the HTML Age element to style. ○ Declaration Block: Contains one or more declarations (property: value). Example: John p { color: red; text-align: center; 30 } CSS Comments: ○ Ignored by browsers. ○ Syntax: Single-line comment: Notes: Multi-line comment: Always use comments for clarity in source code. Use alt attributes for images to improve accessibility and SEO. CSS Selectors Selectors define the elements to style: 4.1 INTRODUCTION TO CSS FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Element Selector: body { background-color: linen; } Targets elements by tag name. Example: p { color: red; } 3. Inline Styles: ○ Applied directly to an element using the style attribute. ID Selector: This is a Targets an element by id using #. heading. Example: #para1 { text-align: center; } CSS Background Properties Properties: 1. background: Sets all Class Selector: background properties in one declaration. Targets elements by class using 2. background-color: Sets background color. Example: 3. background-image: Sets.center { text-align: center; color: background image. red; } 4. background-position: Sets the position of the image. 5. background-repeat: Controls Three Ways to Apply CSS how the image repeats. 6. background-attachment: 1. External Style Sheet: Fixes the image in place. ○ Stored in a separate file (.css). Linked using in the. CSS Text Properties ○ color: Sets text color. ○ text-align: Aligns text horizontally (e.g., left, 2. Internal Style Sheet: center). ○ Defined inside a tag in ○ line-height: Sets spacing the. between lines. ○ text-shadow: Adds shadow effects. FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING ○ font-size: Sets the size of text. Sample Table CSS Font Properties ○ font-family: Specifies font (e.g., Arial, Verdana). ○ font-size: Sets size in pixels or relative units (em). Example (pixels): Employee Records h1 { font-size: 40px; } Example (em): h1 { font-size: 2.5em; } No. Full Name Position CSS Links Salary CSS can style the four states of links: 1. a:link: Normal, unvisited links. 2. a:visited: Links the user has visited. 3. a:hover: Links when hovered 101 over. 4. a:active: Links being clicked. Eduardo S. Rodrigo Example: Professor a:link { color: red; } 50,000 a:hover { color: purple; } Sample Activity: Customized Table 102 HTML Structure Jon Lopez FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Priest } 60,000 #customers th { background-color: #4CAF50; color: white; padding: 12px; } CSS Design (style.css) h1 { td, th { background-color: green; border: 3px solid green; color: white; text-align: center; } padding: 5px; } a { text-decoration: none; Notes: color: red; 1. Use External Stylesheets for Reusability: They can apply consistent font-family: Verdana; styling across multiple pages. 2. Hierarchy of CSS Rules: Inline > } Internal > External. 3. CSS Debugging Tip: Use browser developer tools to inspect and modify CSS directly. #customers { 4. Follow Best Practices: ○ Avoid overusing !important. font-family: Arial, Helvetica, ○ Comment your code for clarity. sans-serif; ○ Use classes for repeated styles instead of IDs. border-collapse: collapse; width: 700px; FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING 4.2 INTRODUCTION TO JAVASCRIPT What is JavaScript? Definition: JavaScript is an interpreted Notes: programming language. Features: document.write(): Outputs content ○ Integrated with HTML, making it directly to the webpage. easy to implement. ○ Open-source and cross-platform. Displaying an Alert Message Code: Applications of JavaScript Programming 1. Client-side validation: Validates form inputs on the user's browser. 2. Manipulating HTML Pages: Dynamically updates web page content. 3. User Notifications: Displays alerts or prompts. alert("Hello Everybody!"); 4. Back-end Data Loading: Fetches and updates data without refreshing the page (e.g., AJAX). 5. Presentations: Builds interactive web-based slideshows. 6. Server Applications: Powers back-end services (e.g., Node.js). First JavaScript Example Code: Notes: alert(): Displays a simple popup message to the user. Displaying an Alert After Button Click document.write("Hello World!"); Code: FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING Declared using the var keyword. ○ Example: var x = 5; Performing Basic Arithmetic function clickBut() { Code: alert("Welcome to Javascript"); } var amt1 = 1500; var amt2 = 1000; result = amt1 + amt2; document.write(result); document.write(linebreak); Notes: onclick: An event listener that triggers a function when the button is clicked. result = amt1 - amt2; document.write(result); JavaScript Datatypes document.write(linebreak); 1. Numbers: Numerical values (e.g., 123, 4.56). 2. Strings: Text enclosed in quotes (e.g., result = amt1 / amt2; "Hello"). 3. Boolean: Logical values true or document.write(result); false. document.write(linebreak); JavaScript Variables FINAL EXAM REVIEWER I 1ST SEMESTER I INTRODUCTION TO COMPUTING result = amt1 * amt2; document.write(result); document.write(linebreak); Notes: if...else: Executes different code based on a condition. Condition: Written inside parentheses (). Notes: Operators: ○ + (Addition) Using String Comparison ○ - (Subtraction) Code: ○ / (Division) ○ * (Multiplication) JavaScript if...else Statement Code: var myname = "john"; if (myname == "jerome") { document.write("

Use Quizgecko on...
Browser
Browser