Final Journal‐SF‐Final week - Wudong-champlain/Spring2024 GitHub Wiki

Data Representation and Conversion The transformation and encoding of data into a form suitable for storage or transmission. Three important terms: Binary, which is the base-2 number system used in computing ASCII, a character encoding standard for electronic communication Hexadecimal, a base-16 number system often used to represent binary data in a more human-readable form. Converting a decimal number into binary or hexadecimal.

Processors Processors are the execution of instructions given by the CPU to perform tasks and manipulate data. Three important terms: Clock Speed, which is the frequency at which a processor executes instructions Cache Memory, a small, fast type of volatile computer memory used to temporarily store frequently accessed data or instructions Multicore, a processor with multiple independent cores, allowing it to execute multiple tasks simultaneously. A processor running at 3.0 GHz executing instructions to perform arithmetic calculations or process data.

Processes Processes are the running programs on a computer system. Three important terms: Process ID, a unique identifier assigned to each process in an operating system Context Switching, the process of saving and restoring the state of a CPU for one process and loading the state for another Process Priority, the level of importance assigned to a process, determining its access to system resources. Running multiple applications concurrently on a computer, each represented by a separate process.

Secondary Storage Reading and writing of data to non-volatile storage devices for long-term retention. Three important terms: Hard Disk Drive (HDD), a data storage device that uses magnetic storage to store and retrieve digital information Solid-State Drive (SSD), a storage device that uses integrated circuit assemblies to store data persistently Optical Disc, a storage medium typically used for distribution of software or archival storage. Storing files such as documents, images, or videos on a hard drive for future access.

System Integration The combining and interoperability of different hardware and software components into a unified system. Three important terms: Middleware, software that acts as an intermediary between different applications, enabling communication and data management APIs, a set of rules and protocols that allow different software applications to communicate with each other Legacy Systems, older hardware or software systems that are still in use and may need to be integrated with newer technologies. Integrating a customer relationship management software with an e-commerce platform to synchronize customer data and orders.

System Administration Tools The management and maintenance tasks performed by system administrators to ensure the smooth operation of computer systems. Three important terms: Monitoring, the continuous observation of system resources, performance, and activity to identify issues or anomalies Backup and Recovery, the process of creating copies of data for restoration in case of data loss or system failure Virtualization, the creation of virtual instances of computer hardware, operating systems, storage devices, or network resources. Using monitoring tools to track CPU usage, disk space, and network activity on a server to detect performance bottlenecks or security threats.

Input / Output The interaction between a computer system and its users or external devices for data input and output. Three important terms: Peripheral Devices, hardware devices connected to a computer system for input, output, or storage purposes, such as keyboards, mice, monitors, printers, and scanners Drivers, software programs that enable communication between the operating system and hardware devices Ports, physical or virtual interfaces on a computer system used to connect peripheral devices. Typing on a keyboard to input text into a word processing application or printing a document from a computer to a printer.

Networking Communication and exchange of data between multiple computer systems over a network. Three important terms: Protocol, a set of rules and conventions for transmitting data between devices on a network IP Address, a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication Router, a networking device that forwards data packets between computer networks. Sending an email from one computer to another over the internet using the Simple Mail Transfer Protocol (SMTP).

Scripting The automation of tasks by writing scripts, which are sequences of instructions executed by a scripting language interpreter. Three important terms: Scripting Language, a programming language designed for scripting, typically interpreted rather than compiled, and often used for automating tasks Variables, symbols that represent values or data storage locations in a program, allowing for dynamic manipulation of data Control Structures, constructs in a scripting language that control the flow of execution, such as loops and conditional statements. Writing a Python script to automate file backups by copying specified directories to a backup location at scheduled intervals.

Linux Execution of commands and management of resources within the Linux operating system environment. Three important terms: Shell, a command-line interface that interprets user commands and executes programs in Linux Package Manager, a tool used to install, update, and manage software packages on a Linux system Filesystem Hierarchy Standard, a standard defining the directory structure and organization of files in Linux distributions. Using the ls command to list the contents of a directory

Security The protection of computer systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Three important terms: Encryption, the process of encoding data in such a way that only authorized parties can access it Firewall, a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules Vulnerability Assessment, the process of identifying, quantifying, and prioritizing vulnerabilities in a system or network infrastructure. Implementing access controls to restrict user privileges and using antivirus software to scan for and remove malware from a computer system.

Digital forensics Investigation and analysis of digital devices and data to gather evidence for legal purposes. Three important terms: Forensic science involves applying scientific techniques or knowledge to investigate crimes or analyze evidence that could be used in a legal setting. Chain of Custody, the chronological documentation of the seizure, custody, control, transfer, analysis, and disposition of evidence Metadata, data that provides information about other data, such as file creation date, author, and editing history. Extracting and analyzing metadata from digital photographs to determine the time, date, and location they were taken for use as evidence in a legal case.