Computers
Security
Malware
Virus
Worm
ILOVEYOU
Trojan
Biometric technologies
OS patchs
Anti Virus
Database
Electronics
Electronic switches
Binary
binary/boolean logic
binary number
binary digit
bit
analogue representation
discrete quantities
digital representation of analogue
First Gen computers
Valves
Colossus
Heat production
valves
General purpose
Unreliable
Complicated/time consuming
ENIAC
Very expensive, half dozen in the world
Secound gen computers
Transistors
Minicomputers
Mainframes
IBM 608
Third gen computers
Intergrated Circuit
Terminals
Floppy disks
Fourth generation computers
Microprocessors
Personal computer
Hardware components
random-access memory (RAM)
motherboard
peripheral devices
moniter
printer
keyboard
Storage
Hard drive
cd/dvd drive
CPU
Applications
Word processor
Spreadsheet
Killer app
GUI
Workstations
Multi user
Supercomputer
Military
Research
Modelling weather
Business
Payroll
Embedded computers
micro controllers/computers
washing machine
car
web servers
ubiquitous computing
First wave
Secound wave
Third wave
calm technology
Cloud computing
Benefits
Less infrastructure
No routers, modems, servers etc.
Support by someone else
Dynamic storage space
Pay for what you use, upgrade instantly if required
Minimal hardware requirement
Quick to setup, no service packs etc.
Easily accessable anywhere there is an Internet connection.
Easy to share work or projects between employees and possibly 3rd party companies
Drawbacks
Lose of access due to network outage
Loss of control
Loss of control to hosts.
Storage affected by national laws of storage operator
Content could be stored anywhere at anytime according to providers desires
Dependant on providers security protocols and infrastructure
May not be legal
Often requires repeat payment (subscription service)
utility computing
turing test
power
amps
volts
watts
Moores law
logarithmic scale
logarithmic
Exponential growth
exponential notation
power
Networks
Network society
Internet
World Wide Web
Community
Instant messaging
Online discussion groups
Forums
Netiquette
Emoticons
Moderator
Caps = SHOUTING
Social Networking
Portals
Alta Vista
Google
Web crawler
Entertainment
Media online
Copyright
DRM
Sopa/Acta
Public domain
napster
internet tv
iplayer
netflix
torrent
youtube
the guild
mmorpg
world of warcraft
first person shooter
BF3
America's army
Email
Spam
Phishing
Nigerian Hoax
finance
online retail
amazon
ebooks
self publishing
ebay
paypal
encryption of financial transactions
cyber squatting
language
googled
noob
viral
Finance
ATM
ISP
Router
Dynamic host configuration protocol (DHCP)
base station
mobile switching center
cell
Mobile phone network
handset
base station
mobile switching center
cell
handset
Dynamic host configuration protocol (DHCP)
packet-switched network
Data packets
architecture
header
IP address
payload
Data packets
architecture
header
IP address
payload
Circuit switched network
public switched telephone network (PSTN)
public switched telephone network (PSTN)
Firewalls
Domain name system (DNS)
Domain name server
DDOS
Take down requests
p2p DNS
Broadband
network interface card (NIC)
IP6
TCP/IP
Transmission Control Protocol
Establishing a connection
three-way handshake.
Two-way data
Lost packets
Closing down
Internet Protocol (IP)
IP4
Internet
encapsulation
Standards
Internet Engineering Task Force (IETF)
Requests for Comments (RFCs)
narrowband
IP4
TCP/IP
Transmission Control Protocol
Establishing a connection
three-way handshake.
Two-way data
Lost packets
Closing down
Internet Protocol (IP)
IP6
Broadband
network interface card (NIC)
Domain name system (DNS)
Domain name server
DDOS
Take down requests
p2p DNS
Firewalls
Protocol
LAN
Network address translation (NAT)
Gateway
Telephony
SMS
skype