0% found this document useful (0 votes)
6 views

Chapter 13_StudyGuide

Chapter 13 covers various aspects of modern computing, including the differences between native and web apps, the role of app stores, virtualization, emulation, and cloud computing. It also discusses the distinctions between the surface web, deep web, and dark web, along with the principles of Bitcoin and blockchain technology. Additionally, the chapter highlights the implications of virtual reality, augmented reality, and the Internet of Things, along with their benefits and risks.

Uploaded by

Keoh Leong Bee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Chapter 13_StudyGuide

Chapter 13 covers various aspects of modern computing, including the differences between native and web apps, the role of app stores, virtualization, emulation, and cloud computing. It also discusses the distinctions between the surface web, deep web, and dark web, along with the principles of Bitcoin and blockchain technology. Additionally, the chapter highlights the implications of virtual reality, augmented reality, and the Internet of Things, along with their benefits and risks.

Uploaded by

Keoh Leong Bee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Chapter 13 - Modern Computing: A Study Guide

Quiz

1. Explain the key differences between a native app and a web app. Provide one
advantage for each type of app.

2. Describe the role of an app store in the distribution and management of native
apps. What benefits does this system offer to both developers and users?

3. What is virtualization? Explain the difference between a Type 1 and a Type 2


hypervisor, providing an example of each.

4. Define emulation and contrast it with virtualization. In what situations is


emulation particularly useful?

5. Explain the fundamental concept of cloud computing. What are the primary
benefits for organizations that choose to utilize cloud services instead of
maintaining their own servers?

6. Differentiate between the surface web, the deep web, and the dark web. What
specialized tool is commonly associated with accessing the dark web?

7. Describe the core principles behind Bitcoin and blockchain technology. What
makes Bitcoin a decentralized cryptocurrency?

8. Explain the process of Bitcoin mining. What is the purpose of the


computationally difficult problem that miners must solve?

9. Contrast virtual reality (VR) and augmented reality (AR). Give a brief example of a
technology or application for each.

10. What is the Internet of Things (IoT)? Discuss one potential benefit and one
potential risk associated with the increasing number of connected devices.

Quiz Answer Key

1. Native apps are built for a specific operating system and are typically installed
from an app store, offering direct access to device hardware and APIs. An
advantage of native apps is their potential for optimal performance and full
access to device features. Web apps, on the other hand, are built using web
technologies and run in a browser, making them platform-independent. A key
advantage of web apps is their ability to run on any device with a modern browser
without requiring installation.

2. An app store serves as a centralized digital marketplace for distributing and


managing native apps for a particular platform. For developers, it provides a
platform for reaching a large user base and a system for monetization. For users,
it offers a curated selection of apps with ratings and reviews, a level of trust
regarding app quality, and a centralized payment and update system.

3. Virtualization is the process of using software to create a virtual representation


of a computer, known as a virtual machine (VM), which can run its own operating
system and applications. A Type 1 hypervisor runs directly on the hardware,
below the operating system kernel (e.g., VMware ESX). A Type 2 hypervisor runs
as an application on a host operating system (e.g., VirtualBox).

4. Emulation is the use of software to make one type of device behave like another,
presenting virtual hardware that is unlike the physical hardware in use. Unlike
virtualization, which typically runs software compiled for the same processor
architecture, emulation allows software designed for a different architecture to
run. Emulation is particularly useful for preserving software designed for
obsolete platforms when original hardware is difficult to find.

5. Cloud computing is the delivery of computing services—including servers,


storage, databases, networking, software, analytics, and intelligence—over the
internet ("the cloud"). Primary benefits for organizations include on-demand
access to scalable resources, reduced costs associated with purchasing and
maintaining physical infrastructure, and the ability to focus on their core
business rather than IT management.

6. The surface web is publicly accessible content indexed by search engines. The
deep web is content that cannot be accessed without logging in or requiring
specific credentials. The dark web is a subset of the deep web that requires
specialized software, like Tor, for access, providing anonymity for users and
website operators.

7. Bitcoin is a decentralized cryptocurrency that relies on blockchain technology, a


public, decentralized, immutable ledger of transactions. Decentralization means
that no single organization controls Bitcoin's use; instead, transactions are
verified and recorded by a network of computers.

8. Bitcoin mining is the process of maintaining the Bitcoin blockchain by verifying


new transactions and adding them to blocks. To add a block, miners must solve
a computationally difficult problem known as "proof of work." This requirement
deters tampering with the blockchain, as altering a block would necessitate re-
solving the problem for that block and all subsequent blocks.

9. Virtual reality (VR) immerses a user in a completely simulated, three-


dimensional virtual environment, often using a headset (e.g., playing a video
game with an Oculus Quest). Augmented reality (AR) overlays virtual elements
onto the real world, often viewed through a smartphone or a specialized headset
(e.g., using a smartphone app to see virtual furniture in your actual living room).

10. The Internet of Things (IoT) is the concept of connecting a wide range of everyday
devices to the internet, allowing them to collect and exchange data. A potential
benefit is increased convenience and automation in homes and industries (e.g.,
smart thermostats adjusting temperature automatically). A potential risk is the
increased vulnerability to security breaches and privacy violations due to poorly
secured devices collecting personal data.

Essay Format Questions

1. Discuss the evolution of application development from traditional desktop


software to native mobile apps and web apps. Analyze the advantages and
disadvantages of each approach for both developers and end users in today's
computing landscape.

2. Compare and contrast the different categories of cloud computing:


Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Function as a
Service (FaaS), and Software as a Service (SaaS). Explain the division of
responsibility between the cloud provider and the cloud consumer in each
model, and provide examples of use cases for each.

3. Analyze the societal implications of the dark web and cryptocurrencies like
Bitcoin. Discuss the balance between the potential for illicit activities and the
legitimate uses for privacy and decentralized finance that these technologies
offer.

4. Evaluate the current state and future potential of virtual reality (VR) and
augmented reality (AR) technologies. Consider their impact on various sectors
such as entertainment, education, healthcare, and industry, and discuss the
challenges that need to be addressed for wider adoption.

5. Examine the growth and implications of the Internet of Things (IoT). Discuss the
benefits and risks associated with a world where an increasing number of
devices are connected to the internet, focusing on aspects such as security,
privacy, interoperability, and the potential for transformative applications.

Glossary of Key Terms

• App (Application): Software programs designed for end users, often targeting
mobile devices and distributed through internet-based digital storefronts (app
stores).

• Native App: An application built for a specific operating system (e.g., iOS or
Android) and typically installed directly onto the device.
• Web App: An application designed using web technologies (HTML, CSS,
JavaScript) and accessed through a web browser, making it platform-
independent.

• Progressive Web App (PWA): A website that incorporates features of native


apps, such as offline loading and home screen icons, aiming to bridge the gap
between web and native experiences.

• Virtualization: The process of using software to create a virtual representation of


a computer system, including hardware, operating system, and applications.

• Virtual Machine (VM): A software-based emulation of a physical computer that


can run its own operating system and applications.

• Hypervisor: Software that creates and runs virtual machines, managing the
underlying hardware resources.

• Type 1 Hypervisor: A hypervisor that runs directly on the host's hardware, below
the operating system.

• Type 2 Hypervisor: A hypervisor that runs as an application on a host operating


system.

• Container: An isolated user-space environment for running applications that


shares the host OS kernel with other containers.

• Emulation: The use of software to make one type of device (including its
hardware) behave like a completely different type of device.

• Cloud Computing: The delivery of computing services—including servers,


storage, databases, networking, software, analytics, and intelligence—over the
internet ("the cloud").

• Infrastructure as a Service (IaaS): A cloud computing model where the provider


manages hardware and virtualization, and the consumer manages the operating
system, runtime, applications, and data.

• Platform as a Service (PaaS): A cloud computing model where the provider


manages hardware, virtualization, operating system, and runtime, and the
consumer manages the application and data.

• Function as a Service (FaaS): A serverless cloud computing model where the


provider manages all infrastructure, and the consumer only deploys and runs
code in response to events.

• Software as a Service (SaaS): A cloud computing model where the provider


manages the entire application, making it available to consumers over the
internet.
• Deep Web: Web content that is not indexed by standard search engines and
often requires login credentials or other forms of authentication to access.

• Dark Web: A subset of the deep web that requires specialized software (like Tor)
to access, providing anonymity for users and website operators.

• Bitcoin: The first decentralized cryptocurrency, based on blockchain technology.

• Cryptocurrency: A digital or virtual currency that uses cryptography for security


and operates independently of a central bank.

• Blockchain: A distributed, decentralized, public ledger consisting of


chronologically linked blocks of transaction records that are secured using
cryptography.

• Bitcoin Wallet: Software or hardware that allows users to manage their Bitcoin
addresses and private keys, enabling them to send and receive bitcoins.

• Bitcoin Mining: The process of verifying and adding new transaction records to
the Bitcoin blockchain, which also involves solving a computationally difficult
"proof of work" problem. Miners are rewarded with new bitcoins and transaction
fees.

• Virtual Reality (VR): A form of computing that immerses a user in a three-


dimensional simulated environment, typically experienced through a headset.

• Augmented Reality (AR): A technology that overlays computer-generated virtual


elements onto the real-world environment, often viewed through a smartphone,
tablet, or specialized headset.

• Internet of Things (IoT): The network of physical objects ("things") embedded


with sensors, software, and other technologies that enable them to collect and
exchange data over the internet.

• GPIO (General-Purpose Input/Output): Pins on a microcontroller or single-


board computer (like Raspberry Pi) that can be configured as either inputs or
outputs to interact with external electronic components.

You might also like