Midterm review Exam is on March 8 th during class.

Slides:



Advertisements
Similar presentations
Computer History.
Advertisements

CSE 1520 Computer use: Fundamentals Fall CSE 1520 – Computer use: Fundamentals Instructor (Section G): Simone Pisana Course Director: John Hofbauer.
1 Core Ingredients of Computing A “universal” machine Programmability Binary Code (everything stored as “0” or “1”) Program and Data are interchangeable.
Chapter Chapter Goals Describe the layers of a computer system Describe the concept of abstraction and its relationship to computing Describe.
Chapter 1 Catalysts for Change. Copyright © 2006 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Slide 4- 2 Milestones in Networking (1/2)
Computer Architecture CPSC 321 Andreas Klappenecker.
1 CSE1301 Computer Programming: Lecture 34 Introduction to the History of Computing.
History of IT.
1 Chapter 1 The Big Picture. 2 2 Computing systems are dynamic entities used to solve problems and interact with their environment. They consist of devices,
The Analytical Engine was so complex that Babbage didn’t have enough money to build it so he asked Parliament for a loan, but they never gave him one.
Evolution of the Computer Land marks of the Computer History.
Chapter 1 The Big Picture Chapter Goals Describe the layers of a computer system Describe the concept of abstraction and its relationship to computing.
ECE 265 Introduction to Microcontroller Based Systems (A first course in computer architecture) 9/28/ ECE265.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
Chapter 01 Nell Dale & John Lewis.
Intro to MIS MGMT 661 Management Information Systems Summer Dannelly 1 st Meeting.
Wilhelm Schickhard (1623) Astronomer and mathematician Automatically add, subtract, multiply, and divide Blaise Pascal (1642) Mathematician Mass produced.
The History of Computers. People have almost always looked for tools to aid in calculation. The human hand was probably the first tool used to help people.
Dash Cameron Computer History Created by: Dash Cameron.
CPS Today’s topics Computer Applications Computer Communications Upcoming Computer Security ( Great Ideas, Chapter 11) Reading Great Ideas, Chapter.

History of Computers By: Madelyn Skinner Just Another Name? There are more people, that we have knowledge on, who helped invent the computer. We will.
Chapter 1 The Big Picture.
Introduction To Internet
From the abacus to microprocessors Exploring the Digital Domain The History of Digital Computers.
CMSC 120: Visualizing Information 1/29/08 Introduction to Computing.
ES 101. Module 2 IP Addressing & Routing. Last Lecture Wide area networking Definition of “packets”
 Do you know about the history of that computer sitting at home? Do you know how many inventors it took to finally get a working computer that is, most.
Computer Science What is Computer Science? Algorithm Design and Analysis Organization and Architecture Artificial Intelligence Databases Operating Systems.
History of the computer and the internet. Marie(: Fifth.
By: Mark Heaney In this presentation I am to tell all about the great computers history and the inventors.
History of Computers By: Emily Pawoll Where It All Began Are you a big fan of technology? Do you find yourself wondering when, how, and by whom computers.
Computing Timeline Preview for First Project. Earliest history  Abacus – widely regarded as the first “calculating machine”. different forms through.
Exam Format  130 Total Points  10 Points Short Answer  15 Points Fill in the Blank  25 Points T/F  60 Points Multiple Choice  20 Points Matching.
The First Computer The Abacus At least 2500BC in Mesopotamia Used by merchants to calculate transactions.
History of Computers.
Computer Generations Evolution of the Computer. Modern Computers Modern computers – Binary, electrical, computational devices.
Software Basics. Some Pioneers Charles Babbage Analytical Engine Countess Ada Lovelace First Programmer ? John Von Neumann storing instructions in memory.
Chapter 1 Introduction.
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.

Final Exam Review. History of Computing Know trends No dates.
History of Computing. Where did it start? Abucus 500 B.C. The abacus was first used by the Babylonians as an aid to simple arithmetic at sometime around.
History of Computers! Claire Bromm March 28 th, 2012.
History of Computer Wyatt Feiling Did you know... The first idea for a computer was in the early 1800s Charles Babbage is the man who is credited with.
CHAPTER 7 THE INTERNET AND INTRANETS 1/11. What is the Internet? 2/11 Large computer network ARPANET (Dept of Defense) It is international and growing.
Computer History How did we get here?.
Ron Seabridge. Konrad Zuse He created the first freely programmable computer. It was made in 1936 it was called the Z1 computer.
Why build a computer? u Computers were developed to mechanize mathematical computations. u Two definitions:  A computer is “a programmable electronic.
Who invented the computer?
Introduction to Computing BBA-I/BSCS-I Instructor: M. Mateen Yaqoob.
Dannelly's Short History of Computing CSCI327 Social Implications of Computing.
Classful Internet Addresses Chapter 4. Universal Identifiers Designers of TCP/IP determined that each host on the internet would have a 32-bit identifier.
CSCI-235 Micro-Computers in Science The Internet and World Wide Web.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
History of Computers.
Introduction to Information Technology, D3 FMIPA UGM Chapter 1 Brief History of Computer Technology 1.
Christopher Simpson. Road Map Definition of wiretapping Laws concerning wiretapping Legal justifications of wiretapping What wiretapping means to you.
Chapter 1 The Big Picture
Wiretapping Christopher Simpson.
Unit 1 Evolution of Computing
Evolution of Computer Hardware
History & Culture of Computing
2018 Latest Eccouncil Exam Questions Answers - Eccouncil Dumps PDF
methods and simple tools e.g., abacus
Milestones in Computer Development
methods and simple tools e.g., abacus
Technology History - Goal: To make human tasks easier
ECE 265 Introduction to Microcontroller Based Systems (A first course in computer architecture) 9/28/ ECE265.
Computer History Timeline Computer History Timeline
Presentation transcript:

Midterm review Exam is on March 8 th during class

Midterm format Part 1: multiple choice –25 – 50 questions Part 2: written –4 or 5 shorter answers (1 – 3 sentences) –1 or 2 longer question(s) (perhaps a page)

material Basically anything discussed in class or on the website is fair game. More specifically…

Code Parts 1 and 2 of the Lessig book REGULABILITY –Chapter 1: Code is Law –Chapter 2: Four Puzzles from Cyberspace –Chapter 3: Is-ism –Chapter 4: Architectures of Control –Chapter 5: Regulating Code CODE AND OTHER REGULATORS –Chapter 6: Cyber-spaces –Chapter 7: What Things Regulate

Topics in the News Net neutrality Aol, Yahoo, Goodmail Patriot Act Google in China Search engine data Broadcast flag / audio flag Data mining

History of computers What is a computer? Parts of a computer. Giga, mega Decimal vs binary People: –Pascal (first calculator: +, -) –Leibniz (binary numbering system, calculator: X, /) –Boole (Boolean algebra) –Babbage (diference engine, analytical engine) –Lovelace (first programmer) –Hollerith (punch cards – census, IBM) –Turing (code breaker, Turing machine) –Von Nueman (stored program) –Hooper (computer bug, programmer) –Moore (Moore’s law) Early computers: –Mark 1 –Eniac

Networking Telegraph Telephone Teletype Wireless: radio Remote computing Arpa: arpanet Internet Curcuit switching vs packet switching Broadband IP address DNS protocol

Privacy Anything from the notes What is it? Why is it good? Why is it bad? Third Amendment Public vs private information – how do you disclose your private information? Cookies Credentials Government records National Crime Information Center Code of Fair Information Practices Privacy Act of 1974

Privacy (cont) Covert surveillance Wiretaps and bugs Shamrock Fourth Amendment Patriot Act TIA Data mining Two parties of a transaction Encryption Computers are not necessary for an invasion of privacy but they make old threats more potent.

Organizations EFF DARPA ICANN Verisign ACM NSA