Deck 2: Computer Terminology and History

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?

A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
سؤال
Which of the following tells the computer in which order to access drives?

A) boot sequence
B) operating system
C) random access memory
D) application software
سؤال
What is Gopher?

A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
سؤال
Which of the following devices introduces commands and information to the computer?

A) scanner
B) modem
C) printer
D) keyboard
سؤال
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
سؤال
Who is hired by companies who want to test their security system by way of violations?

A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
سؤال
What is the purpose of random access memory in the computer system?

A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
سؤال
What is the most important component of a computer?

A) CPU
B) random access memory
C) motherboard
D) universal serial bus
سؤال
Which of the following interprets program instructions and processes data in the computer?

A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
سؤال
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

A) Trojan horse
B) malware
C) worm
D) logic bomb
سؤال
Which of the following refers to the unauthorized attempt to gain access to information about a system?

A) clickjacking
B) baud
C) banner grabbing
D) probe
سؤال
Which Windows operating system paved the way for the development of peer-to-peer networks?

A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
سؤال
Who was the first person to successfully introduce a device exclusively designed for data processing?

A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
سؤال
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?

A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
سؤال
For what purpose did British scientists build Colossus I?

A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
سؤال
What does the term wetware refer to?

A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
سؤال
Which of the following is the first modern digital computer?

A) ENIAC
B) Colossus I
C) ABC
D) GUI
سؤال
Which of the following computer components had its origin in the cathode ray tube?

A) printer
B) scanner
C) mouse
D) monitor
سؤال
What is the term used to describe the final destination of discarded, lost, or destroyed data?

A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
سؤال
For users, 24-hour accessibility equates to 24-hour vulnerability.
سؤال
Which of the following is known as the "baby" of computer operating systems and is freely distributed?

A) Windows
B) Macintosh
C) UNIX
D) Linux
سؤال
The first modern digital computer was built at Iowa State University.
سؤال
The Internet accompanied the introduction of the first computers.
سؤال
In which Mac OS did Apple introduce its first Unix-based operating system?

A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
سؤال
Unlike Microsoft, Macintosh introduced software advancement at a snail's pace.
سؤال
Worms refers to a code that causes damage to computer systems.
سؤال
Operating systems may be either single-user or multiple-user.
سؤال
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
سؤال
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
سؤال
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
سؤال
The smallest piece of data is called a bit.
سؤال
The Mosaic interface is an e-mail system.
سؤال
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S.census.
سؤال
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
سؤال
Software is composed of components that are physical or tangible in nature.
سؤال
Online predators often use chat rooms to lure their victims.
سؤال
Which of the following is structured to allow users to participate in real-time conversations?

A) chat rooms
B) news services
C) websites
D) video feeds
سؤال
Sony Ericsson introduced the first commercially available smart phone using the Symbian OS.
سؤال
How are websites identified?

A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
سؤال
________ was built by Professor Max Newman at a government lab in Buckinghamshire, England.
سؤال
Prior to the introduction of domain names, computers were accessed by their ________.
سؤال
Discuss how computers evolved.
سؤال
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
سؤال
The grouping of data that consists of eight bits is a ________.
سؤال
________ is a system in which a set of services, technologies, and often virtualized resources enable the delivery of computing as a service as opposed to a product.
سؤال
________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.
سؤال
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
سؤال
Discuss the original purpose behind the development of the Internet.
سؤال
Explain why UNIX is considered the backbone of the Internet.
سؤال
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
سؤال
________ is a term used to designate "good" hackers.
سؤال
________ are central switching devices for communications lines in a star topology.
سؤال
Originally, the Internet was funded in large part by ________ and was not available for commercial usage.
سؤال
A tangled code is also known as ________ code.
سؤال
A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.
سؤال
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
سؤال
The ________ is the heart of the UNIX operating system.
سؤال
Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.
سؤال
Explain how the Internet has become the backbone for global communications and transnational capitalism.
سؤال
Match between columns
John Atanasoff
was the first to successfully introduce a device exclusively designed for data processing
John Atanasoff
developed the first modern digital computer with partner Clifford Berry
John Atanasoff
designed an analytical engine that was ahead of the technology necessary to build it
John Atanasoff
built Colossus I
John Atanasoff
developed the Electronic Numerical Integrator and Computer
Max Newman
was the first to successfully introduce a device exclusively designed for data processing
Max Newman
developed the first modern digital computer with partner Clifford Berry
Max Newman
designed an analytical engine that was ahead of the technology necessary to build it
Max Newman
built Colossus I
Max Newman
developed the Electronic Numerical Integrator and Computer
Herman Hollerith
was the first to successfully introduce a device exclusively designed for data processing
Herman Hollerith
developed the first modern digital computer with partner Clifford Berry
Herman Hollerith
designed an analytical engine that was ahead of the technology necessary to build it
Herman Hollerith
built Colossus I
Herman Hollerith
developed the Electronic Numerical Integrator and Computer
Charles Babbage
was the first to successfully introduce a device exclusively designed for data processing
Charles Babbage
developed the first modern digital computer with partner Clifford Berry
Charles Babbage
designed an analytical engine that was ahead of the technology necessary to build it
Charles Babbage
built Colossus I
Charles Babbage
developed the Electronic Numerical Integrator and Computer
John Presper Eckert
was the first to successfully introduce a device exclusively designed for data processing
John Presper Eckert
developed the first modern digital computer with partner Clifford Berry
John Presper Eckert
designed an analytical engine that was ahead of the technology necessary to build it
John Presper Eckert
built Colossus I
John Presper Eckert
developed the Electronic Numerical Integrator and Computer
سؤال
Match between columns
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Time bomb
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Time bomb
the final destination of discarded, lost, or destroyed data
Time bomb
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Time bomb
an individual hired by a company to test its security systems by attempting to violate them
Bit bucket
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Bit bucket
the final destination of discarded, lost, or destroyed data
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Bit bucket
an individual hired by a company to test its security systems by attempting to violate them
Sneaker
a term used to refer to humans operating computers (as opposed to hardware and software)
Sneaker
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Sneaker
the final destination of discarded, lost, or destroyed data
Sneaker
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Wetware
a term used to refer to humans operating computers (as opposed to hardware and software)
Wetware
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Wetware
the final destination of discarded, lost, or destroyed data
Wetware
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Wetware
an individual hired by a company to test its security systems by attempting to violate them
Brute force
a term used to refer to humans operating computers (as opposed to hardware and software)
Brute force
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Brute force
the final destination of discarded, lost, or destroyed data
Brute force
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Brute force
an individual hired by a company to test its security systems by attempting to violate them
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Computer Terminology and History
1
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?

A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
B
2
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?

A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
C
3
Which of the following tells the computer in which order to access drives?

A) boot sequence
B) operating system
C) random access memory
D) application software
A
4
What is Gopher?

A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following devices introduces commands and information to the computer?

A) scanner
B) modem
C) printer
D) keyboard
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
6
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?

A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
7
Who is hired by companies who want to test their security system by way of violations?

A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
8
What is the purpose of random access memory in the computer system?

A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the most important component of a computer?

A) CPU
B) random access memory
C) motherboard
D) universal serial bus
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following interprets program instructions and processes data in the computer?

A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?

A) Trojan horse
B) malware
C) worm
D) logic bomb
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following refers to the unauthorized attempt to gain access to information about a system?

A) clickjacking
B) baud
C) banner grabbing
D) probe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which Windows operating system paved the way for the development of peer-to-peer networks?

A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
14
Who was the first person to successfully introduce a device exclusively designed for data processing?

A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?

A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
16
For what purpose did British scientists build Colossus I?

A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
17
What does the term wetware refer to?

A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is the first modern digital computer?

A) ENIAC
B) Colossus I
C) ABC
D) GUI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following computer components had its origin in the cathode ray tube?

A) printer
B) scanner
C) mouse
D) monitor
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
20
What is the term used to describe the final destination of discarded, lost, or destroyed data?

A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
21
For users, 24-hour accessibility equates to 24-hour vulnerability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
22
Which of the following is known as the "baby" of computer operating systems and is freely distributed?

A) Windows
B) Macintosh
C) UNIX
D) Linux
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
23
The first modern digital computer was built at Iowa State University.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
24
The Internet accompanied the introduction of the first computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
25
In which Mac OS did Apple introduce its first Unix-based operating system?

A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
26
Unlike Microsoft, Macintosh introduced software advancement at a snail's pace.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
27
Worms refers to a code that causes damage to computer systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
28
Operating systems may be either single-user or multiple-user.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
29
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
30
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
31
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?

A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
32
The smallest piece of data is called a bit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
33
The Mosaic interface is an e-mail system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
34
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S.census.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
35
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
36
Software is composed of components that are physical or tangible in nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
37
Online predators often use chat rooms to lure their victims.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is structured to allow users to participate in real-time conversations?

A) chat rooms
B) news services
C) websites
D) video feeds
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
39
Sony Ericsson introduced the first commercially available smart phone using the Symbian OS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
40
How are websites identified?

A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
41
________ was built by Professor Max Newman at a government lab in Buckinghamshire, England.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
42
Prior to the introduction of domain names, computers were accessed by their ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
43
Discuss how computers evolved.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
44
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
45
The grouping of data that consists of eight bits is a ________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
46
________ is a system in which a set of services, technologies, and often virtualized resources enable the delivery of computing as a service as opposed to a product.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
47
________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
48
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss the original purpose behind the development of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
50
Explain why UNIX is considered the backbone of the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
51
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
52
________ is a term used to designate "good" hackers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
53
________ are central switching devices for communications lines in a star topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
54
Originally, the Internet was funded in large part by ________ and was not available for commercial usage.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
55
A tangled code is also known as ________ code.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
56
A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
57
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
58
The ________ is the heart of the UNIX operating system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
59
Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
60
Explain how the Internet has become the backbone for global communications and transnational capitalism.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
61
Match between columns
John Atanasoff
was the first to successfully introduce a device exclusively designed for data processing
John Atanasoff
developed the first modern digital computer with partner Clifford Berry
John Atanasoff
designed an analytical engine that was ahead of the technology necessary to build it
John Atanasoff
built Colossus I
John Atanasoff
developed the Electronic Numerical Integrator and Computer
Max Newman
was the first to successfully introduce a device exclusively designed for data processing
Max Newman
developed the first modern digital computer with partner Clifford Berry
Max Newman
designed an analytical engine that was ahead of the technology necessary to build it
Max Newman
built Colossus I
Max Newman
developed the Electronic Numerical Integrator and Computer
Herman Hollerith
was the first to successfully introduce a device exclusively designed for data processing
Herman Hollerith
developed the first modern digital computer with partner Clifford Berry
Herman Hollerith
designed an analytical engine that was ahead of the technology necessary to build it
Herman Hollerith
built Colossus I
Herman Hollerith
developed the Electronic Numerical Integrator and Computer
Charles Babbage
was the first to successfully introduce a device exclusively designed for data processing
Charles Babbage
developed the first modern digital computer with partner Clifford Berry
Charles Babbage
designed an analytical engine that was ahead of the technology necessary to build it
Charles Babbage
built Colossus I
Charles Babbage
developed the Electronic Numerical Integrator and Computer
John Presper Eckert
was the first to successfully introduce a device exclusively designed for data processing
John Presper Eckert
developed the first modern digital computer with partner Clifford Berry
John Presper Eckert
designed an analytical engine that was ahead of the technology necessary to build it
John Presper Eckert
built Colossus I
John Presper Eckert
developed the Electronic Numerical Integrator and Computer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
62
Match between columns
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Time bomb
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Time bomb
the final destination of discarded, lost, or destroyed data
Time bomb
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Time bomb
an individual hired by a company to test its security systems by attempting to violate them
Bit bucket
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Bit bucket
the final destination of discarded, lost, or destroyed data
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Bit bucket
an individual hired by a company to test its security systems by attempting to violate them
Sneaker
a term used to refer to humans operating computers (as opposed to hardware and software)
Sneaker
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Sneaker
the final destination of discarded, lost, or destroyed data
Sneaker
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Wetware
a term used to refer to humans operating computers (as opposed to hardware and software)
Wetware
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Wetware
the final destination of discarded, lost, or destroyed data
Wetware
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Wetware
an individual hired by a company to test its security systems by attempting to violate them
Brute force
a term used to refer to humans operating computers (as opposed to hardware and software)
Brute force
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
Brute force
the final destination of discarded, lost, or destroyed data
Brute force
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Brute force
an individual hired by a company to test its security systems by attempting to violate them
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 62 في هذه المجموعة.