COIS 1620H Lecture Notes - Lecture 10: Keypunch, Kinect, Volatile Memory
Document Summary
Big attack on target: personal credit cards, etc. 100 millions of informations taken: developed by a 17 year old in russia, posted it online/sold it, organized crime, big money. It is the technological side, information technology : hardware, software, networks, understand the limits, how it can be a competitive adv, equal to marketing, finances, etc, enabler as a word to encompass it. Hardware: physical components of an info system, lower in price. Networks: allow hardware, software, and info to be shared software: instructions that direct the hardware, higher in price. Hard to come up with problems for quantum machines: how to represent the problems, etc . easier to build them. Chips on a credit card embedded computer , runs behind the scenes: small, limited memory. Volatile memory: when you turn your machine off, it clears itself off (ram, random access memory: runs slower compared to processor, getting this from memory into the pc.