














Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This comprehensive review guide covers key topics for a bsit midterm exam in introduction to computing. It delves into the history of computing, exploring significant milestones from the abacus to the rise of personal computers. The guide also examines careers in the computing industry, computer systems architecture, web development fundamentals, and more. It provides a structured overview of essential concepts and historical figures, making it a valuable resource for students preparing for their exam.
Typology: Cheat Sheet
1 / 22
This page cannot be seen from the preview
Don't miss anything!
MODULE 1: History of Computing MODULE 2: Careers in the Computing Industry MODULE 3: Computer Systems Architecture MODULE 4: Computer Assembly and Disassembly MODULE 5: Web Development Fundamentals MODULE 6: Introduction to Web Development
❏ Earliest known tools for performing calculations ❏ Ancient civilizations such as the Sumerians, Egyptians, Greeks, and Romans ❏ Reflects the fundamental human desire to find efficient ways to solve mathematical problems ❏ Series of rods or wires, each containing movable beads. ❏ Beads can be manipulated to represented numbers, enabling users to perform addition, subtraction, multiplication, and division ❏ Fostered cognitive development, honed their math skills, visualized numbers, and a deeper understanding of arithmetic concepts
❏ Chinese abacus
❏ Japanese abacus
❏ World’s first analog computer ❏ Ancient greek device for astronomical calculations and predictions ❏ Intricate gears and mechanisms were a marvel of mechanical engineering
❏ Early 17th Century, John Napier introduced logarithms ❏ Sets of numbered rods that facilitated multiplication and division
❏ Developed in the 17th Century ❏ Logarithmic scales and sliding mechanisms to perform calculations involving multiplication, division, and more complex mathematical operations
❏ Blaise Pascal, early 17th Century ❏ Perform addition and subtraction with remarkable accuracy ❏ Series of toothed wheels that represented digits ❏ Each wheel could rotate, and when the device was operated with input values, it mechanically carried out the arithmetic operations
❏ Gottfried Wilhelm Leibniz ❏ Perform addition, subtraction, multiplication, and division ❏ Utilized a stepped drum mechanism, with each step representing a digit ❏ Users could input input values via gears and perform calculations by rotating the drums
❏ Laborious and error-prone when done manually ❏ Reducing human error and speeding up the calculation process
❏ Higher precision in calculations ❏ Eliminated the risks of transcription errors, leading to more reliable results
❏ Traditional manual methods were time-consuming and limited in scope ❏ Breakthroughs in cryptography, coupled with the computational power of emerging digital computers
❏ Used by German military to encrypt communications
❏ Bletchley Park in the United Kingdom ❏ Developed by Alan Turing and other brilliant minds ❏ Electromechanical device designed to automate the decryption of Enigma-encrypted messages ❏ Remarkable achievement in automating codebreaking, significantly reducing the time required to decode messages
❏ Designed by British engineer, Tommy Flowers ❏ One of the world’s first programmable digital computers ❏ Built to decrypt Lorenz cipher messages used by the German high command ❏ Employing vacuum tubes to process data at unprecedented speeds
❏ Atlantic, United States ❏ Not directly used for wartime code breaking ❏ Completed after the war, world’s first general-purpose programmable digital computer, capable of performing a wide range of calculations ❏ Used for calculations for the development of the hydrogen bomb, scientific research, and even weather prediction
❏ Located in the San Francisco Bay Area ❏ Emerged as a hotbed of technological innovation due to several key factors
❏ Presence of prestigious universities like Stanford and UC Berkeley attracted brilliant minds in fields such as electronics, engineering, and computer science
❏ Integrated circuit, or microchip by Jack Kilby and Robert Noyce in the late 1950s revolutionized electronics ❏ Allowed for the miniaturization of components ❏ Paved the way for the development of powerful yet compact computers
❏ Encouraged entrepreneurship and risk-taking ❏ Own companies, driving innovation and competition
❏ Power of computing directly to individuals’ homes and workplaces, transforming how people worked, communicated, and accessed information
❏ Released in the mid-1970s ❏ Marked the beginning of personal computing ❏ Captured the imagination of hobbyists and entrepreneurs, including a young Bill Gates and Paul Allen
❏ Apple I and Apple II ❏ User-friendly interfaces to personal computing ❏ Graphical user interface (GUI) and the use of a mouse made computers more accessible to a wider audience
❏ Developed many pioneering technologies, including the graphical user interface and the mouse during the 1970s
❏ Created a computer called the Xerox Alto, which featured these innovations ❏ Steve Jobs and a small group of Apple engineers visited Xerox PARC in 1979 ❏ Jobs and his team were inspired by what they saw and used these ideas as inspiration for Apple’s Lisa and Macintosh computers ❏ Apple refined and popularized the GUI concepts = incorporating them into their products ❏ Introduced graphical interfaces to a wider audience and was instrumental in shaping the future of personal computing
❏ Released in 1981 ❏ Solidified personal computer’s place in businesses and homes ❏ Open architecture allowed compatibility = leading to the development of a vast software ecosystem
❏ Pivotal role in the personal computing revolution, providing a standardized platform for software development
❏ Late 1970s ❏ Created by Tim Paterson of Seattle Computer Products (SCP) ❏ BEFORE Microsoft purchased the rights to 86-DOS from SCP, they initially presented it to IBM as a potential operating system for the IBM PC
❏ Crucial component for IBM’s first personal computer, the IBM PC, released in 1981 ❏ In 1980 (IBM was developing their first personal computer), they needed an operating system ❏ Microsoft, led by Bill Gates, approached IBM and proposed using 86-DOS for the IBM PC
❏ Rise of the Internet = widespread adoption of personal computers ❏ World Wide Web (developed by Tim Berners-Lee) ❏ Transformed computers from standalone machines to gateways of global information sharing ❏ Computer revolution of the 20th Century = transformed the world’s technological landscape ❏ Empowering individuals, fostering collaboration, and redefining the ways we interact with information and with each other
❏ One of the most transformative events in human history ❏ Shaping the trajectory of society, communication, commerce, and knowledge dissemination
❏ Pervasive use of digital technologies ❏ Largely defined by the internet’s ability to connect the world electronically
❏ Origins of the Internet can be traced back to the 1960s when US Department of Defense’s Advanced Research Projects Agency (ARPA) initiated the development of a decentralized communication network ❏ Designed to withstand disruptions = evolved into the ARPANET, connecting research institutions and universities
❏ Key breakthrough ❏ Allowed data to be broken down into packets and transmitted across multiple routes
❏ Introduced by Tim Berners-Lee in the late 1980s ❏ Revolutionized was accessed and shared
❏ Enable the creation, deployment, and management of containers
❏ Comprehensive set of tools and features for software developers to write, test, debug, and manage code more efficiently write, test, debug, and manage code more efficiently ❏ Visual Studio, IntelliJ, or VS Code
❏ Coding best practices and coding standards ❏ Intellectual property rights and open-source licensing ❏ Handling of user data and privacy concerns
❏ Coding best practices and coding standards ❏ Intellectual property rights and open-source licensing ❏ Handling of user data and privacy concerns
❏ Building websites and web applications ❏ Using technologies like HTML, CSS, and JavaScript ❏ Formal education is often optional (learning through online courses and bootcamps
❏ Proficiency in web technologies (HTML, CSS, JavaScript) ❏ Client-side and server-side scripting
❏ Bachelor’s degree in Computer Science or related field (optional but beneficial) ❏ Continuous learning (online courses, tutorials, and coding bootcamps) ❏ Specialization in front-end or back-end development
❏ Emphasis on responsive and mobile-first design ❏ Web performance optimization and SEO best practices
❏ Pre-written collections of code and libraries that provide developers with a structures foundation for building web applications ❏ React, Angular, Vue.js
❏ Text editors (Visual Studio Code, Sublime Text) ❏ Front-end frameworks (Bootstrap, Materialize) ❏ Content management system (WordPress)
❏ Intellectual property rights for web content
❏ A set of international standards and guidelines developed by the Web Accessibility Initiative (WAI) of the World Wide Web Consortium (W3C)
❏ A comprehensive European Union (EU) regulation that governs the processing of personal data of EU residents
❏ Designing and developing websites and web applications ❏ Cross-browser compatibility and responsive design ❏ Collaborating with designers and back-end developers ❏ Maintaining and updating web content
❏ Work with large datasets to extract insights and make data-driven decisions
❏ Strong foundation in statistics and mathematics ❏ Programming languages (Python, R) ❏ Data manipulation and analysis libraries (PAndas, NumPy)
❏ Bachelor’s degree in Computer Science, Statistics, or related field (recommended) ❏ Advanced degrees (Master’s or PhD) for specialized roles ❏ Specialized training in machine learning and data analysis
❏ Increased adoption of machine learning for predictive analysis ❏ Use of big data technologies (Hadoop and Spark) ❏ Integration of data science into various industries (healthcare, finance)
❏ Data visualization tools (Tableau, Power BI) ❏ Machine learning frameworks (TensorFlow, scikit-learn) ❏ Cloud platforms for data storage and processing (AWS, Azure)
❏ Responsible data handling and protection ❏ Ethical use of data in decision-making ❏ Compliance with data protection regulations (GDPR)
❏ Collecting, cleaning, and analyzing data ❏ Developing machine learning models for predictions ❏ Communicating insights to stakeholders ❏ Ensuring data security and privacy
❏ Protect digital assets and infrastructure from threats
❏ Understanding of networking protocols and architectures ❏ Knowledge of encryption and secure communication ❏ Proficiency in network troubleshooting and analysis
❏ Bachelor’s degree in Computer Science, Cybersecurity, or a related field (recommended) ❏ Certifications like CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) ❏ Continuous learning
❏ Growth in demand for cloud security
❏ Cybersecurity approach that assumes no trust by default, even within an organization's internal network
❏ Knowledge and information that organizations gather and analyze to understand the types of threats they face, the tactics and techniques of threat actors, and the vulnerabilities in their systems that may be exploited
❏ Machine learning algorithms and neural networks
❏ Class of machine learning models inspired by the structure and function of the human brain ❏ Fundamental component of deep learning, a subset of machine learning that has gained tremendous popularity and success in various applications
❏ Advanced degrees (Master's or PhD.) in Computer Science, Data Science, or related fields ❏ Specialized training in machine learning frameworks (TensorFlow, PyTorch) ❏ Kaggle competitions and online courses
❏ Continued growth in deep learning and natural language processing (NLP) ❏ AI and ML in various industries (healthcare, finance, and autonomous vehicles) ❏ AI ethics and responsible AI practices
❏ Machine learning frameworks (TensorFlow, PyTorch) ❏ Data preprocessing and analysis tools (pandas, NumPy) ❏ Cloud-based AI services (AWS SAgeMaker, Google Cloud AI Platform)
❏ Bias mitigation and fairness in AI algorithms ❏ Responsible AI development and deployment ❏ Data privacy regulations (GDPR, HIPAA)
❏ Building and training machine learning models. ❏ Developing AI applications and chatbots. ❏ Responsible data handling and ethical AI design. ❏ Collaborating with cross-functional teams to implement AI solutions.
❏ Create interactive entertainment experiences across various platforms
❏ Proficiency in game development engines and frameworks (Unity, Unreal Engine) ❏ Strong knowledge of 3D graphics programming ❏ Understanding of game physics and AI
❏ Bachelor's degree in Computer Science, Game Design, or a related field (recommended). ❏ Specialized courses in game development and design ❏ Participation in game development communities and game jams
❏ Growth in virtual reality (VR) and augmented reality (AR) gaming ❏ Emergence of cloud gaming platforms. ❏ Focus on narrative-driven and immersive game experiences ❏ Cross-platform game development
❏ Creates a completely immersive digital environment where the player is fully immersed in a computer-generated world ❏ Players typically wear a VR headset that covers their eyes and ears, providing a 360-degree view and 3D audio. ❏ VR controllers or hand-tracking technology allow players to interact with the virtual environment
❏ Overlays digital content (such as game elements) onto the real-world environment that the player sees through a device like a smartphone or AR headset
❏ Players can still see and interact with their physical surroundings while digital objects or information is superimposed onto it ❏ AR gaming often encourages players to move around and interact with both the real and virtual aspects of the game simultaneously
❏ Game engines (Unity, Unreal Engine) ❏ 3D modeling and animation software (Blender, Maya) ❏ Multimedia tools ❏ Version control systems for collaborative development.
❏ Age-appropriate content and rating systems ❏ Responsible game design to avoid addictive behaviors ❏ Compliance with copyright and intellectual property laws
❏ Designing game mechanics and user interfaces. ❏ Programming game logic and AI behavior. ❏ Creating 3D models, textures, and animations. ❏ Quality assurance testing and bug fixing.
❏ Manage and optimize databases to ensure data integrity and availability ❏ Database management systems (Oracle or SQL Server)
❏ Proficiency in relational database management systems (MySQL, PostgreSQL, Oracle) ❏ Understanding of database design principles, normalization, and indexing ❏ Knowledge of SQL (Structured Query Language)
❏ Bachelor's degree in Computer Science, Database Administration, or related field (recommended) ❏ Certifications in specific database management systems (Oracle Database Administrator Certified Associate) ❏ Continuous learning to stay updated on database technologies and best practices
❏ Adoption of NoSQL databases for unstructured data ❏ Integration of cloud-based database services (AWS RDS, Azure SQL Database) ❏ Focus on data security and compliance with data protection regulations.
❏ Database management systems (MySQL, PostgreSQL, MongoDB) ❏ Database administration tools (phpMyAdmin, pgAdmin) ❏ Backup and recovery tools and processes
❏ Data security and encryption to protect sensitive information ❏ Compliance with data protection regulations (GDPR) ❏ Responsible database management to prevent data breaches
❏ Designing and implementing database structures ❏ Optimizing database performance and ensuring data integrity ❏ Backup and recovery planning ❏ User access control and data security management
Personal Computers Macintosh, Windows PC
❏ Brain of the computer ❏ Executing instructions and performing calculations ❏ Fetches data and instructions from memory and performs operations on them
❏ Stores data and instructions that the CPU needs for processing
❏ Volatile and used for temporary storage
❏ Stores essential firmware and software
❏ Enable communication between the computer and the external world ❏ Keyboards, mouse, displays, printers, and network interfaces
❏ Store data for long-term use ❏ Hard disk drives (HDDs), solid-state drives (SSDs), and optical drives
❏ Main circuit board ❏ Houses the CPU, memory, and other essential components
❏ Converts electrical energy from the outlet into the appropriate voltage and current required by the computer components
❏ Proposed by John von Neumann in the 1940s ❏ Foundational design for most modern computers
❏ Fetches instructions and data from memory ❏ Decodes the instructions and executes them ❏ Store the results back in memory
❏ Both program instructions and data are stored in the SAME memory ❏ Often referred to as RAM (Random Access Memory)
❏ Manages the execution of instructions ❏ Ensuring the instructions are executed in the correct sequence
❏ Performs arithmetic and logical operations ❏ Addition, Subtraction, Multiplication and Comparisons
❏ Allow data to be exchanged between the computer and the external world
❏ Organizes various types of memory in a computer system based on their speed, cost, and capacity ❏ Efficient data storage and access ❏ Ensuring frequently used data is readily available while balancing performance and cost considerations
❏ Volatile memory for temporarily storing data and program code ❏ Fast access, but is relatively limited in capacity
❏ Non-volatile memory ❏ Stores firmware and essential system instructions that are permanently written during manufacturing ❏ Cannot be modified by the user ❏ Retains data even when the power is off
❏ Small, high-speed memory layer ❏ Placed between the CPU and main memory (RAM) ❏ Stores frequently used data
❏ Hard disk drives (HDDs) and Solid-state drivers (SSDs) ❏ Higher capacity than RAM, but with slower access times ❏ Long-term data storage (including the operating system, applications, and user files)
❏ How quickly data can be retrieved from a particular memory type
❏ Faster memory (RAM) = limited capacity ❏ Slower memory (Secondary storage) = larger capacity ❏ Faster, smaller, and more expensive memory = close to the CPU (Cache) ❏ Slower, larger, and more affordable memory (RAM and Secondary Storage) = less frequently used data
❏ Stores frequently used data and instructions = reducing the need for the CPU to access slower main memory (RAM) ❏ Providing faster access to frequently accessed data = significantly improves the overall system performance
❏ Brain of a computer ❏ Responsible for executing instructions and performing calculations
❏ Manages instruction fetching, decoding, and execution
❏ Performs arithmetic and logic operations
❏ Small, high-speed memory for temporary data storage
❏ Stores frequently used data for faster retrieval
❏ Controls the timing of the operations
❏ Breaks down instruction execution into stages ❏ Allowing multiple instructions to overlap in their execution ❏ Improves throughput and efficiency
❏ Executes multiple instructions simultaneously by having multiple execution units (multiple ALUs) ❏ Enhances performance by exploiting instruction-level parallelism
❏ Corresponds to one basic operation
❏ Phillips-head and flat-head screwdrivers ❏ Securing and loosening screws on computer cases, motherboards, and other components
❏ Anti-static grounding wire to prevent electrostatic discharge (ESD) that can damage sensitive components
❏ Holding and manipulating small components, bending wires, or reaching into tight spaces
❏ Organizing and securing cables to improve airflow and aesthetics inside the computer case
❏ Helps to see components and connections in dimly lit areas inside the computer case
❏ Keeps screws and small components organized and prevents them from rolling away or getting lost
❏ Provides an ESD-safe work area to prevent damage to components from static electricity
❏ Cable combs, clips, and Velcro straps to neatly route and manage cables inside the case
❏ Installing or reseating CPU heatsinks to ensure proper heat transfer between the CPU and heatsink
❏ Compressed air cans or an electric air blower to remove dust and debris from components and the computer case
❏ Connect storage drives and power cables to the motherboard and power supply
❏ Extra screws and motherboard standoffs in case any are lost or damaged during the assembly process
❏ Mat with magnetic areas to hold screws securely in place while working on the computer
❏ Testing power supplies, voltage, and continuity in cables and connectors
❏ Alternative to wrist straps ❏ Prevent ESD while handling components
❏ Extra RAM, power supplies, or data cables can be helpful for troubleshooting
❏ POST (Power-On Self-Test) cards or testers to diagnose hardware issues
❏ Labeling cables and connectors to make future maintenance or upgrades easier
❏ Prepare Your Workplace ➤ 1.1: Take Inventory ➤ 1.2: Gather Tools and Supplies ❏ Prepare the Mainboard/Motherboard ❏ Mount the CPU ➤ 3.1: Apply a pea size thermal paste on the CPU to get better heat conduction with the CPU cooler ❏ Connect the CPU Cooler to the Motherboard ❏ Attach the RAM (memory) modules ❏ Open the case and mount the PSU
❏ Attach the Back Plate and Screw Brass Standoffs ❏ Position the Motherboard in the case ❏ Install the System Fans ❏ Connect the 20 or 24 pin ATX connector and the 4-pin or 8-pin power supply connectors to the motherboard ❏ Mount the Hard Disk Drive (HDD) and Optical Disk Drive (ODD), then connect the Power Supply (PSU) connector ❏ Connect the SATA connector to the drives and motherboard ❏ Attach each of the leads ❏ Do some cable managements ➤ FOR GAMING PC: Install the graphics card to the top most PCIe x16 slot ❏ Cover the case by completing the screws ❏ Clean your workplace
❏ System of interconnected documents and resources linked together through hyperlinks ❏ Often referred to as the “web” ❏ Global network of information accessible via the internet ❏ Billions of web pages, multimedia content, and other resources that are hosted on web servers and interconnected through a vast network of links
❏ Collection of related web pages ❏ Identified by their domain names
❏ Individual document containing text, images, videos, and other multimedia elements
❏ Uniform Resource Locators (URLs) ❏ Used by users to access specific web pages or resources on the web ❏ Unique address that specifies the location of a resource on the web
❏ Web browsers (clients) send requests to web servers = respond by sending the requested web pages and resources back to the browser ❏ Client-server interaction is fundamental to web development
❏ Ensuring the security of data transmitted over networks is crucial ❏ Concepts like encryption, firewalls, and secure socket layers ❏ SSL/TLS are used to protect data and privacy on the internet
❏ Networks of distributed servers strategically placed around the world ❏ Help deliver web content quickly by caching and serving it from servers located closer to the user = reducing latency
❏ Essential for web developers because it impacts the performance, security, and reliability of web applications ❏ Knowledge of network protocols, data transmission, and network infrastructure helps developers create web applications that function seamlessly and efficiently over the internet
❏ Fundamental concept in web development that involves finding and accessing specific information or resources on the internet, which is a vast network of interconnected devices and servers ❏ Critical skill for web developers, as it allows them to research, learn, and stay up-to-date with the latest trends and technologies
❏ Google, Bing, and Yahoo ❏ Powerful tools for locating information on the internet ❏ Indexing and organizing vast amounts of web content ❏ Enter keywords or phrases into the search bar, and the search engine returns a list of relevant web pages and resources
❏ using search operators and filter Quotation marks Exact phrases Minus signs Exclude specific terms Site-specific searches Limit results to a particular website
❏ Categorized lists of websites and resources organized by topic or theme ❏ Provide an alternative way to find information by browsing through curated lists ❏ EXAMPLE: Yahoo DIrectory
❏ Save web pages they frequently visit ❏ Convenient to return to specific resources without having to search again
❏ Reddit and Flipboard ❏ Allow users to discover and share web content, articles, videos, and news from various sources
❏ RSS = Really Simple Syndication ❏ Deliver new content directly to subscribers' email inboxes or feed readers ❏ Allow users to stay updated on specific topics
❏ Provide access to a wealth of structured information
❏ Research papers, articles, and reference materials
❏ Give credit to the original creators and maintain ethical standards
❏ Fundamental concept in web development that focuses on the relationship between the web pages that users view in their web browsers and the servers that host and deliver these pages
❏ Individual documents or files on the World Wide Web (WWW) ❏ Contain content designed for display in web browsers ❏ Consist of text, images, videos, hyperlinks, and interactive elements
❏ Hypertext Markup Language ❏ Markup language used to structure and format web content ❏ Saved with a “.html” file extension
❏ Specialized computers or software applications that store and serve web pages and associated resources to web users' browsers over the internet ❏ Respond to user requests for specific web pages
❏ Hypertext Transfer Protocol ❏ Communication between web browsers and web servers is typically facilitated ❏ Secure version: HTTPS ❏ Define how data is requested, transmitted, and received between clients (browsers) and servers ❏ Enter a URL → Press “Enter” → Browser sends an HTTP request to a web server hosting that URL → Server processes the request → Server sends back the requested web page → Browser renders for user to view
❏ Usually the web browser (Chrome, Firefox, Safari) ❏ Requests for web pages and resources by sending HTTP requests to web servers
❏ Handling incoming requests from clients ❏ Processing those requests ❏ Retrieving the requested web pages and assets ❏ Sending them back to the client as HTTP responses
❏ Content is generated on the server-side based on user interactions or data from databases
❏ Used to create dynamic web pages ❏ PHP, Python, and Ruby
❏ Efficiently delivering web content to users ❏ Optimizing server configurations ❏ Implementing caching mechanisms
❏ Reduce load times and improve the user experience
❏ Fundamental for web developers as they create, maintain, and optimize websites and web applications ❏ Ensures that web content is delivered effectively and efficiently to users, enabling a seamless browsing experience on the World Wide Web
❏ Explores the foundation of web pages and their historical development