SlideShare a Scribd company logo
IST 264: Technology Foundations
“Laboratory Journal”
Harold Sowards
Spring, 2015
Chapter 1: Computers and Digital Basics
1. What are the four phases of the digital revolution?
Data processing,personalcomputing, computer networks, and cloud computing are the four phases ofthe
digital revolution.
2. What is convergence and how does it apply to the digital revolution?
Convergence is a process in which several technologies with distinct functions evolve to form a single
product.It basically created a sophisticated mobile device whose users demanded the access to the same
services available from full-sized computers.
3. How does digital technology affect society?
It makes it easier to cross cultural and geographical boundaries. It also expanded the freedom of speech as
well as gets rid of the expectation of privacy.
4. What’s the difference between an operating system and application system?
An operating systemis the master controller for all the activities that take place in the computer, while the
application systemis a series of programs that help someone carry out a task.
5. How do personal computers differ from servers, mainframes and supercomputers?
A personalcomputer is a micro-processor that is small and meets the needs of an individual. Servers serve
the needs of a network. A mainframe is very large and processes data for hundreds of users at a time. A
supercomputer is very fast and is used mainly for very detailed operations. So, basically pcs are different
from the others because it focuses on the needs of an individual instead of a group of people.
6. Are portable media players and mobile phones classified as computers?
Yes, they are classified as computers because they accept input, produce output,process data and include
storage capabilities. However, only those that allow you to install applications are considered a pc.
7. Why are microcontrollers the computers no one sees?
They are built into the device that they control.
8. Aren’t data and information the same thing?
No, data is symbols that represent people, events,things and ideas and they become information when it is
presented in a format that people can understand and use.Data is basically used by machines, while
information is used by humans.
9. What’s the difference between analog and digital?
Digital is simple discrete digits such as 0s and 1s, while analog is represented by an infinite scale of values.
10. Why is there so much jargon pertaining to bits and bytes?
Well, basically it is because bits are the digital representation of data and there is a lot of that. Bits can be
used to represent a lot of different sources of media and because of that there needs to be a way of
distinguishing them from bytes,which is basically 8 bits. All of the uppercase letters after that depends on
all the data being used and how much is being stored in such areas.
11.What hardware components manipulate the bits that represent data?
They travel by form of electrical pulses and all the circuits, chips and mechanical components in a digital
device are designed to work with bits.
12.Why do computers need programs?
Well, programs are what helps a computer control all digital devices, so without them, it won’t work so
well.
13. How do hackers steal passwords?
There is a variety of different ways in which a hacker can do this. For one, they can shouldersurfer or
dumpster dive, or use convenient methods of having it out in the open. Then there is software that allows
hackers to use a remote computer to guess passwords ortrick you into giving it up if connected to a
network. Then there are such things as dictionary attacks, brute force attacks,sniffing, phishing, and key
loggers such as the Trojan Horse software.
14.How can I create secure passwords?
Well, use at least 8 characters in length, and a combination of letters, numbers and special characters. Use
upper and lower case letters. Paraphrase. Never use public information or any part of your user id and avoid
words that can appear in a dictionary.

More Related Content

What's hot

Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Atifa Aqueel
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
Jason K
 
Internet of things (iot).overview
Internet of things (iot).overviewInternet of things (iot).overview
Internet of things (iot).overview
ramky1978
 
Mphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internshipMphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internship
Neha Yadav
 
IoT LAB
IoT LABIoT LAB
IoT LAB
DunavNET
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
arvind carpenter
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 pptMhae Lyn
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
internet of things
internet of thingsinternet of things
internet of things
Garlapati Krishna
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
Casaleggio Associati
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
ShubhamHatzade3
 
Big data the taste maker for Internet of Things
Big data the taste maker for Internet of ThingsBig data the taste maker for Internet of Things
Big data the taste maker for Internet of Things
Rahul Atri
 
Machine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of ThingsMachine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of Things
Sri Ambati
 
The Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of ThingsThe Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of Things
Robin
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Sayyed Rifaquat Hussain
 
Will Internet of Things change the world or it is yet another buzzword?
Will Internet of Things change the world or it is yet another buzzword?Will Internet of Things change the world or it is yet another buzzword?
Will Internet of Things change the world or it is yet another buzzword?
Philip Yankov
 
Plugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of ThingsPlugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of Things
Trevor Fox
 
Introduction to emerging technology
Introduction to emerging technologyIntroduction to emerging technology
Introduction to emerging technology
Biniam Behailu
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Zohaib Hassan
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
Seminar Links
 

What's hot (20)

Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
Internet of Things (IoT) Presentation
Internet of Things (IoT) PresentationInternet of Things (IoT) Presentation
Internet of Things (IoT) Presentation
 
Internet of things (iot).overview
Internet of things (iot).overviewInternet of things (iot).overview
Internet of things (iot).overview
 
Mphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internshipMphasis ppt on internet of things for internship
Mphasis ppt on internet of things for internship
 
IoT LAB
IoT LABIoT LAB
IoT LAB
 
6th sense technology
6th sense technology6th sense technology
6th sense technology
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
internet of things
internet of thingsinternet of things
internet of things
 
The Evolution of Internet of Things
The Evolution of Internet of ThingsThe Evolution of Internet of Things
The Evolution of Internet of Things
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Big data the taste maker for Internet of Things
Big data the taste maker for Internet of ThingsBig data the taste maker for Internet of Things
Big data the taste maker for Internet of Things
 
Machine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of ThingsMachine Learning for the Sensored Internet of Things
Machine Learning for the Sensored Internet of Things
 
The Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of ThingsThe Beginner's Guide to the Internet of Things
The Beginner's Guide to the Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Will Internet of Things change the world or it is yet another buzzword?
Will Internet of Things change the world or it is yet another buzzword?Will Internet of Things change the world or it is yet another buzzword?
Will Internet of Things change the world or it is yet another buzzword?
 
Plugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of ThingsPlugging into IoT - An Introduction to the Internet of Things
Plugging into IoT - An Introduction to the Internet of Things
 
Introduction to emerging technology
Introduction to emerging technologyIntroduction to emerging technology
Introduction to emerging technology
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies20 Latest Computer Science Seminar Topics on Emerging Technologies
20 Latest Computer Science Seminar Topics on Emerging Technologies
 

Similar to Ist264 sowards h_chapter1labjournal

Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
Priyanka Goswami
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
Abaram Network Solutions
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
vishal choudhary
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
ShubhamYadav73126
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
Bob Marcus
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
Muralidhar Somisetty
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
anror264
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
AjboyDiog
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
Jayanth Vinay
 
Technology
TechnologyTechnology
Technology
HridayShah8
 
internet of things
internet of thingsinternet of things
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
IRJET Journal
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
Vivek Kumar
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
Ahmed Banafa
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdf
Antenna Manufacturer Coco
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdf
Antenna Manufacturer Coco
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it applicationKumar
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdf
SudhanshiBakre1
 

Similar to Ist264 sowards h_chapter1labjournal (20)

Fog computing and data concurrency
Fog computing and data concurrencyFog computing and data concurrency
Fog computing and data concurrency
 
Topic 7
Topic 7Topic 7
Topic 7
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Questions in iot
Questions in iotQuestions in iot
Questions in iot
 
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdfUnit 3 - Internet of Things - www.rgpvnotes.in.pdf
Unit 3 - Internet of Things - www.rgpvnotes.in.pdf
 
AGI Part 4.pdf
AGI Part 4.pdfAGI Part 4.pdf
AGI Part 4.pdf
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
 
CHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptxCHAPTER 9-EMERGING TRENDS.pptx
CHAPTER 9-EMERGING TRENDS.pptx
 
Information Technology, The Internet, and You
Information Technology, The Internet, and YouInformation Technology, The Internet, and You
Information Technology, The Internet, and You
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
Technology
TechnologyTechnology
Technology
 
internet of things
internet of thingsinternet of things
internet of things
 
IRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of ThingsIRJET- Fourth Coming Internet: The Internet of Things
IRJET- Fourth Coming Internet: The Internet of Things
 
Latest advancement in computer
Latest advancement in computerLatest advancement in computer
Latest advancement in computer
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdf
 
What is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdfWhat is the 5 Commonly Used Internet of Things Technologies.pdf
What is the 5 Commonly Used Internet of Things Technologies.pdf
 
Introduction to it application
Introduction to it applicationIntroduction to it application
Introduction to it application
 
IoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdfIoT Introduction – From Concept to Reality.pdf
IoT Introduction – From Concept to Reality.pdf
 
Chirag sharma
Chirag sharmaChirag sharma
Chirag sharma
 

More from Harold Sowards

Dive heart project
Dive heart projectDive heart project
Dive heart project
Harold Sowards
 
Pseudo family violence
Pseudo family violencePseudo family violence
Pseudo family violence
Harold Sowards
 
Pseudofamilyviolence sowards
Pseudofamilyviolence sowardsPseudofamilyviolence sowards
Pseudofamilyviolence sowards
Harold Sowards
 
Sowards 440exam
Sowards 440examSowards 440exam
Sowards 440exam
Harold Sowards
 
Rape review
Rape reviewRape review
Rape review
Harold Sowards
 
Movie review
Movie reviewMovie review
Movie review
Harold Sowards
 
Line of duty review
Line of duty reviewLine of duty review
Line of duty review
Harold Sowards
 
Us v. maze
Us v. mazeUs v. maze
Us v. maze
Harold Sowards
 
Us v. garcia
Us v. garciaUs v. garcia
Us v. garcia
Harold Sowards
 
Us v. ancheta
Us v. anchetaUs v. ancheta
Us v. ancheta
Harold Sowards
 
State v. zeta chi fraternity
State v. zeta chi fraternityState v. zeta chi fraternity
State v. zeta chi fraternity
Harold Sowards
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
Harold Sowards
 
State v. tomaino
State v. tomainoState v. tomaino
State v. tomaino
Harold Sowards
 
State v. stark
State v. starkState v. stark
State v. stark
Harold Sowards
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
Harold Sowards
 
State v. sexton
State v. sextonState v. sexton
State v. sexton
Harold Sowards
 
State v. schleifer
State v. schleiferState v. schleifer
State v. schleifer
Harold Sowards
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
Harold Sowards
 
State v. metzger
State v. metzgerState v. metzger
State v. metzger
Harold Sowards
 
State v. mays
State v. maysState v. mays
State v. mays
Harold Sowards
 

More from Harold Sowards (20)

Dive heart project
Dive heart projectDive heart project
Dive heart project
 
Pseudo family violence
Pseudo family violencePseudo family violence
Pseudo family violence
 
Pseudofamilyviolence sowards
Pseudofamilyviolence sowardsPseudofamilyviolence sowards
Pseudofamilyviolence sowards
 
Sowards 440exam
Sowards 440examSowards 440exam
Sowards 440exam
 
Rape review
Rape reviewRape review
Rape review
 
Movie review
Movie reviewMovie review
Movie review
 
Line of duty review
Line of duty reviewLine of duty review
Line of duty review
 
Us v. maze
Us v. mazeUs v. maze
Us v. maze
 
Us v. garcia
Us v. garciaUs v. garcia
Us v. garcia
 
Us v. ancheta
Us v. anchetaUs v. ancheta
Us v. ancheta
 
State v. zeta chi fraternity
State v. zeta chi fraternityState v. zeta chi fraternity
State v. zeta chi fraternity
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
 
State v. tomaino
State v. tomainoState v. tomaino
State v. tomaino
 
State v. stark
State v. starkState v. stark
State v. stark
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
 
State v. sexton
State v. sextonState v. sexton
State v. sexton
 
State v. schleifer
State v. schleiferState v. schleifer
State v. schleifer
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
 
State v. metzger
State v. metzgerState v. metzger
State v. metzger
 
State v. mays
State v. maysState v. mays
State v. mays
 

Recently uploaded

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Ist264 sowards h_chapter1labjournal

  • 1. IST 264: Technology Foundations “Laboratory Journal” Harold Sowards Spring, 2015
  • 2. Chapter 1: Computers and Digital Basics 1. What are the four phases of the digital revolution? Data processing,personalcomputing, computer networks, and cloud computing are the four phases ofthe digital revolution. 2. What is convergence and how does it apply to the digital revolution? Convergence is a process in which several technologies with distinct functions evolve to form a single product.It basically created a sophisticated mobile device whose users demanded the access to the same services available from full-sized computers. 3. How does digital technology affect society? It makes it easier to cross cultural and geographical boundaries. It also expanded the freedom of speech as well as gets rid of the expectation of privacy. 4. What’s the difference between an operating system and application system? An operating systemis the master controller for all the activities that take place in the computer, while the application systemis a series of programs that help someone carry out a task. 5. How do personal computers differ from servers, mainframes and supercomputers? A personalcomputer is a micro-processor that is small and meets the needs of an individual. Servers serve the needs of a network. A mainframe is very large and processes data for hundreds of users at a time. A supercomputer is very fast and is used mainly for very detailed operations. So, basically pcs are different from the others because it focuses on the needs of an individual instead of a group of people. 6. Are portable media players and mobile phones classified as computers? Yes, they are classified as computers because they accept input, produce output,process data and include storage capabilities. However, only those that allow you to install applications are considered a pc. 7. Why are microcontrollers the computers no one sees? They are built into the device that they control. 8. Aren’t data and information the same thing? No, data is symbols that represent people, events,things and ideas and they become information when it is presented in a format that people can understand and use.Data is basically used by machines, while information is used by humans. 9. What’s the difference between analog and digital? Digital is simple discrete digits such as 0s and 1s, while analog is represented by an infinite scale of values. 10. Why is there so much jargon pertaining to bits and bytes? Well, basically it is because bits are the digital representation of data and there is a lot of that. Bits can be used to represent a lot of different sources of media and because of that there needs to be a way of distinguishing them from bytes,which is basically 8 bits. All of the uppercase letters after that depends on all the data being used and how much is being stored in such areas. 11.What hardware components manipulate the bits that represent data? They travel by form of electrical pulses and all the circuits, chips and mechanical components in a digital device are designed to work with bits. 12.Why do computers need programs?
  • 3. Well, programs are what helps a computer control all digital devices, so without them, it won’t work so well. 13. How do hackers steal passwords? There is a variety of different ways in which a hacker can do this. For one, they can shouldersurfer or dumpster dive, or use convenient methods of having it out in the open. Then there is software that allows hackers to use a remote computer to guess passwords ortrick you into giving it up if connected to a network. Then there are such things as dictionary attacks, brute force attacks,sniffing, phishing, and key loggers such as the Trojan Horse software. 14.How can I create secure passwords? Well, use at least 8 characters in length, and a combination of letters, numbers and special characters. Use upper and lower case letters. Paraphrase. Never use public information or any part of your user id and avoid words that can appear in a dictionary.