In: Computer Science
define each term
Algorithm
Arpanet
Computational agency
Claude Shannon
Common carrier
Cultural jamming
Cybernetics
DDoS
Digital divide
Digital enclosure
ENIAC Electronic Numerical Integrator and Computer) was the first electronic, programmable digital computer
Floodnet
Gendered technology
Immediacy / Hypermediacy
IMP
Information bubble
Machine learning
Memex
Net Neutrality
Obama on A.I.
Packet switching
Principles of Electronic Civil Disobedience
Principles of new media
Simulations of femininity
Synopticon – Panopticon
Tactical media (vs. mainstream media)
TCP/IP
The Internet Bill of Rights
The Yes Men
Theseus
Title II (1934 Telecommunications Act)
Vannevar Bush
Viewer Society
Virtual Sit-in
answer the following questions
How did the Internet originate? What role did the government play in the early stages of its development? (Blum, Abbate)
What is the role of net neutrality in the future of the Internet?
How does WWW work?
What is/are materiality of the digital? Discuss how materiality of the digital informs current debates on the Internet. (Brown, Starosielski, Holt & Vonderau)
How do digital media contribute to contemporary forms of surveillance? What are the events that have shaped digital surveillance? (Lyon, Andrejevic)
What are the examples of ‘gendered technologies?’ How do digital technologies fortify conventional gender norms? (Refer to O’Riordan’s article)
ANSWERS : ( DESCRIBE EACH term)
1. ALGORITHM
The algorithm is defined as a step-by-step procedure, of executing the instructions in some order to get the desired output ( finally ). also known as a finite set of well-defined instructions which further executed in a computer system to get output or to solve a problem.
Algorithms are implemented using any of the programmings languages where the machine gets understands
A SMALL EXAMPLE FOR ALGORITHM :
Problem − FIND an algorithm to add two numbers and display the ADDED RESULTS
algorithm :
Steps − 1. START 2 − Declare/ initialize the variables in integers format p, q, s 3 − SET values for p and q 4 − add values of p and q 5 − store the output of STEP 4 to a variable named s 6 − print or display the value in s to screen 7 − STOP ---------- end of the instructions / algorithm
2. ARPANET
know as: Advanced Research Projects Agency Network, ARPANET discovered in 1966 by the United States ARPA.
It was a Wide Area Network ( WAN ) which links many Universities or colleges, also the first network to use the packet switching methods ( packet switch, later seen in telephone networks ) and this was the beginning of all, as like the big internet that we are using at present( World wide web ).
ARPANET focused on easier for the peoples to access computers, across the network. and also used in military communications and defensive equipment also
3. Computational agency
The computational agent is an agent whose decisions taken can be explained in terms of computation. which means the decision can be broken down into individual operations which are carried out in physical devices( computer systems ) and appropriate results/action is made by the agent.
--------The agency or agent (“software robot”), is a computer program ( that embedded on the machine) which performs various actions continuously or automatically by taking commands or in front of the individual ( a human ).
example: an agent which retrieves some files from different computers automatically
-------All these are related to the ARTIFICIAL INTELLIGENCE area
4. Claude Shannon
Claude Elwood Shannon - great American mathematician, electrical engineer, and cryptographer also known by his name "father of information theory".
Shannon is famous around the world for his discovery of "information theory, by publishing the paper named "A Mathematical Theory of Communication", in 1948.
He is well known by founding the digital circuit design theory in 1937, at that time he was a 21-year old masters degree student at the Massachusetts Institute of Technology ( MIT ) in the USA.
Shannon also contributed his works to the field of cryptanalysis for national defence during World War-2, which contains Codebreaking and secure telecommunications.