Encyclopedia > Computing analogies

  Article Content

Computing analogies

Concepts in computing are sometimes poorly understood. The following fanciful (and unavoidably imperfect) analogies may help:

Computer - a building.

Internet - the world outside the building.

Internet (or network) connection - a door into the building.

World Wide Web - all the roads and sidewalks in the world.

web browser - a magic car with a chauffer, instant transportation to most places in the world.

website - a store, a library, etc. that can be visited by car.

cookie - a stamp printed on you when you visit a store, etc., used to identify you as a repeat customer, and possibly profile you.

email - a package. Packages can be sent almost instantaneously to anyone in the world for free.

spam - an unsolicited package from a direct-marketing company.

program - a person.

firewall - security guard at a door into a building who can alert the owner when unauthorized persons attempt to enter or leave, and prevent them from doing so.

port scan - when a person turns doorknobs on a building to see if they will open.

virus - a stranger (often a vandal or burglar) who tries to sneak into a building through use of a disguise, hiding in a package, etc.

anti-virus program[?] - a security guard trained to recognize disguises, etc., and arrest and/or kill(!) sneaky strangers.

user - a god(?).

display, speaker - the senses of a god (vision, hearing).

keyboard, mouse - the body of a god, through which actions are performed.

key logger - a spy who can secretly record all actions that occur inside a building.

file - an object, such as a music recording, a movie, a car, a person, etc. Perfect copies of objects can (magically) be made for free.

file-sharing network - a place where gods meet to allow others to (magically) perfectly duplicate any objects they bring along, and keep the duplicates.

encryption cipher - a trunk with a lock. It is believed that a strong trunk cannot be broken into, nor opened without the key.

symmetric encryption - use of a trunk with a lock that requires the same key to lock and unlock it.

secret key - key used to lock and unlock the trunk.

asymmetric encryption - use of a trunk with a special lock that requires a pair of keys: when it is locked with one, it can only be unlocked using a different, related key.

public key - one of a pair of keys (call it "A") to a special lock on a trunk. Copies of this key are made widely available.

private key - the other of a pair of keys (call it "B") to the special lock on a trunk. Copies of this key are kept private.

message digest - fingerprint of a person. Fingerprints can also (magically) be made of any type of object.

digital signature - an object's fingerprint locked in a small trunk with special lock using key "B". It is sent along with the object. The object's authenticity can be verified by anyone with a copy of key "A" by unlocking the trunk and confirming that the object's fingerprint agrees with the one that was locked in the trunk. (Only someone with a copy of key "B" could have locked it in the trunk.)

Editorial Note: Analogies added to this article should be consistent with those already here. Otherwise, other self-consistent sets of analogies should be appended to the article.



All Wikipedia text is available under the terms of the GNU Free Documentation License

 
  Search Encyclopedia

Search over one million articles, find something about almost anything!
 
 
  
  Featured Article
East Islip, New York

... United States Census Bureau, the town has a total area of 11.3 km² (4.4 mi²). 10.6 km² (4.1 mi²) of it is land and 0.6 km² (0.2 mi²) of it is ...

 
 
 
This page was created in 28.2 ms