Protocols Registers Network hardware Logic gates Programming Constructs • TCP/IP • PC • NIC • HTTP • Acc • Hub • Sequence • HTTPS • Switch • Selection • FTP • CIR • Router • ¬ > MDR > • POP • Cables • iteration • IMAP • WAP • MAR • SMTP MOD – finds the Binary addition Parts of the CPU Network threats rules remainder • Can you • Cache • Malware 0 + 0 = 0 DIV – divides 1 + 0 = 1 calculate • Registers • Social engineering and returns a hex? 1 + 1 = 0(1) • ALU • Phishing whole number • Can you 1 + 1 + (1) = 1(1) • Control • Brute force convert *brackets mean carry unit • Denial of service binary? the 1 Storage • Data interception • Magnetic Algorithms • SQL injection • Solid state Searching: • Poor network The operating TCP Layers policy • Optical • Linear system • Application Features: • Binary • User interface • Transport • Capacity Sorting: • Memory • Internet Utility software • Durability • Merge management • Network • Encryption • Portability • Insertion • Peripheral interface • Defragmentation • Reliability • Bubble management • Speed • Compression • User management • Cost • Backup • File management Data types: • System information • String • System diagnosis Computational thinking • Integer Translators • Decomposition • Real/float • Compiler • Pattern recognition • Character Procedure = prints • Interpreter • Algorithmic thinking • Abstraction • Boolean Function = returns • Assembler More info: www.protopage.com/mrcorbcompsci
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-