CIS Exam Quizlet

¡Supera tus tareas y exámenes ahora con Quizwiz!

Common OS Tasks

-Manages resources, including the processor, RAM, storage space, and connected devices - Provides a user interface - Starts up and shuts down the computer - Coordinates input and output

The Browser

A browser is an application that helps you communicate, access, and share information on the web.

Using Software to Maintain Your Computer

A disk cleanup utility, available on many operating systems, removes unused files from your hard drive so the computer doesn't search through unneeded files. A disk defragmentation utility or disk optimization utility, available on many operating systems, reorganizes the data on a magnetic hard drive so that you can access files more quickly. Protect your computer from viruses by installing and running virus protection software as part of your maintenance routine.

File Basics

A file provides a compact way to store data, whether it's a document, photo, video, email message, computer program, or music. Executable files: Programs containing instructions that tell your computer how to perform, or execute, specific tasks. Data files, which contain data such as words, numbers, and pictures that you can manipulate. Extension: A short identifier separated from the main part of the filename by a dot Native format: The format of files created in that application Clipboard: A temporary holding area for files and information that you copy or move from one place (the source folder) and plan to use somewhere else (the destination folder). Compress: one or more files that use less space when stored on a disk.

Type of Networks

A network can be defined by its topology—or how computers and devices are physically arranged within it. Star Network: Each device is attached to the central device such as a server or switch. If the central device fails, none of the attached devices can work. Bus network: All devices attach in a line to the central cable or bus, which carries the data. If the cable fails, all devices on the cable fail. Ring network: Data travels from one device to another around the ring. If one device fails, the entire network could stop working. Ring networks are no longer common. Mesh network: All devices interconnect with each other. Used most often with wireless networks. No single device keeps the network working. If one device fails, the network will keep working if the data can use an alternate path. Client/server networks have a domain controller that acts as a gateway to the network and its resources. A domain controller is a server, a computer on the network that controls access to hardware, software, and other resources. The other computers on the network request services from the server. Peer-to-peer (P2P) networks are networks of equals (peers), and typically have up to 10 computers. Wireless LANs use the Wi-Fi standard to connect to the Internet, which is why they are called Wi-Fi networks. A virtual private network (VPN) is a private, secure path across a public network (usually the Internet) that allows authorized users secure access to the company network.

Introduction to Networks

A network is a system of two or more computers and communications devices linked by wires, cables, or a telecommunications system. How do networks make connections? They use both hardware and software. A peer-to-peer (P2P) network is best suited for networks of 10 or fewer computers, like those found in homes or small offices. In a client/server network, one central computer, called the server, controls access to network resources. A local area network (LAN) connects computers and devices in a limited area, such as a home, a school, or an office complex. A personal area network (PAN) or a wireless personal area network (WPAN) connects personal digital devices within a range of about 30 feet (9 meters). A wide area network (WAN) is a network that connects devices in two or more LANs located in a large geographic region.

Website Structure

A uniform resource locator (URL) is a series of letters and numbers that identifies a webpage. Hypertext Transfer Protocol (HTTP) is a communications protocol that transports data over the web. A banner ad is an advertisement that appears in a webpage, typically near the top or at the side or bottom margins. A pop-up ad is an advertisement that appears in a separate window when you access a webpage.

Web Page Development

A webpage is a document that contains HTML (Hypertext Markup Language) tags - Hypertext MarkupLanguage (HTML)provides a structurefor creating andformatting Webpages. Cascading Style Sheets (CSS) is a way to use simple code to describe how webpage elements are to be displayed and presented on a screen in a browser. Responsive Design or Responsive Web design (RWD) so that anyone coming to a webpage has an optimal viewing experience, regardless of the device they are using. XML (eXtensible Markup Language)provides a way to classify the contents of the webpage, making it easier to organize. - XML lets a webpage developer customize HTML tags to organize components of the page into different files. XML files give the pages a uniform look by defining how each element looks.

Manage Your Computer's Windows

A window is a rectangular area of the screen that displays the contents of a program, file, or folder.

Email and Internet Risks

Address spoofing, a serious risk to email users, lures unsuspecting recipients to click a link to a harmful website. Clickbait describes a type of hyperlink on a webpage, social media post, or in an email that entices a visitor or recipient to click to continue reading an article or go to another page The term malware refers to viruses, worms, Trojan horses (or Trojans), and other software designed to disrupt a system or exploit data. Viruses can lurk undetected in your system, infect it, and spread when you distribute infected files—especially as email attachments. Worms are not the same as viruses; they spread by automat-ically sending themselves to everyone in your address book. Trojan horses and rootkits disguise themselves as useful programs or apps, but do damage when you run them; they often allow others to access your system or track and monitor your keystrokes. Spyware collects bits of data, such as your surfing habits; and can also scan your hard drive and change your default home page because it takes partial control of your system. Some cyberterrorists weapon of choice is ransomware which is malicious software that blocks access to a computer system until a sum of money, or ransom, is paid. A hoax can be a fake coupon for a brand name store or item or an email that warns about a nonexistent virus in order to get you to click a link that installs malware. Digital certificates are used as identification cards to authenticate the website owner Wi-Fi piggybacking occurs when someone taps into your unprotected Wi-Fi network. War driving, a practice in which someone searches for and maps unsecured Wi-Fi networks from a vehicle.

Personal Information Security

An identity thief obtains personal information from various online and real-world sources. Avoid storing cookies Pharming is an illicit activity in which you are directed to a fake site to enter personal information.

Compare Mobile Operating Systems

Android - A mobile OS based on Linux designed to run on many types of smartphones and tablets. - Open-source software with a permissive license. - - Can modify the operating system to fit the needs of their hardware, and that independent developers can create apps to run on these devices. - Strengths include its personalization features, ability to run on a range of devices, and its apps. - Weaknesses include a slower performance on some devices than that of other mobile operating systems, and frequent updates that device manufacturers control. IOS - Runs only on Apple mobile devices, including the iPhone, iPad, and iPod Touch, and is derived from macOS. - Strengths of iOS include its streamlined, fluid user experience, which comes from the ease and consistency of its interface. The quality and number of apps provided with iOS or available for installation are high. - Weaknesses include device selection—iOS is available only on Apple mobile devices, which are usually more expensive. Another weakness is that personalization features are limited. Windows Phone - The mobile OS from Microsoft intended to run on certain brands of smartphones, including Nokia Lumina and HTC. - Integration among apps is a strength of Windows Phone, - Drawbacks to Windows Phone are that it is available on only a handful of devices and currently offers far fewer apps than Android or iOS.

Email

Any computer or mobile device that can access the Internet can connect with an email system, which consists of the computers and software that provide email services. The main computer in an email system is an email server, which routes email messagesthrough the Internet or a private network. Post Office Protocol (POP), a protocol that downloads messages from an email server for permanent storage on your computer. Internet Message Access Protocol (IMAP), a protocol that leaves messages on the server, allowing you to access and read email from any device. Simple Mail Transfer Protocol (SMTP) is the protocol for sending all types of email messages. Archiving moves email messages, usually those older than a specified date, to a file or folder separate from your active email.

Introduction to Application Software

Application software programs (also called software applications or just apps) help you perform a task when you are using a computer or smartphone. Productivity software is application software that makes people more productive by automating repetitive tasks. Local applications are installed on your computer's hard drive. They tend to be programs with lots of features and functionality. Portable applications are stored on and run from portable removable storage devices such as flash drives or from the web. Web-based applications are programs that you access over the Internet in a browser on your computer or as an app on your mobile device. Mobile applications, commonly called mobile apps, work on your smartphone or tablet.

Personal Health Risks

As we use computers, one personal health risk that we may face is a repetitive strain injury, or RSIs, which is caused by performing the same movement over and over again. Carpal tunnel syndrome is an RSI that affects the wrist, hand, and arm, and is aggravated by prolonged keyboarding or gesturing on tablets. Some people develop computer vision syndrome, which can result in eyestrain, headaches, dry eyes, blurry vision, or even double vision. Internet addiction is the excessive use of the Internet for gaming, video, web surfing, texting, blogging, social networking, or shopping. Ergonomics is the study of safe and efficient working environments.

Digital Data Representation

Binary Number System: Consists of only two digits: 0 and 1. Bit: Short for "binary digit," the smallest unit of information handled by a computer and the basis of today's computer processing. Byte: A group of 8 bits

Blogs and Wikis

Blog: An informal website of time-stamped articles written in a journal format. Blog aggregators such as Flipboard and News 360 locate information from many online sources, including blogs. A microblog allows users to publish short messages, usually between 100 and 200 characters, for others to read, making it a combination of text messaging and blogging. Live blogs, which are blogs that comment on an event while it is taking place, usually in the form of frequent short updates. Wikis: A collaborative website where group members can communicate with each other. Wikipedia is open to the public, but some wikis restrict access to members only. For example, students and teachers often use private educational wikis to collaborate on projects. Researchers use wikis to share findings, offer and receive suggestions, and test their work. Businesses also use wikis, especially when employees are not all in the same physical location.

Network Security Basics

CAPTCHA: A system requiring you to type characters that match a series of distorted characters on the screen; used to verify that your entry is not computer-generated You use a wireless network key (also called a network security key) to scramble and unscramble the data being transmitted between wireless devices.

Evaluate Online Information

CARS - Credible - Accurate - Reasonable - Support

Types of Software

Computer software manages the functions of computers and many other devices. System Software: System software performs computer-related operations and maintenance. Operating System: Manages computer hardware and software. Utility Software - Utility Software: System software that performs maintenance-related tasks on computers, such as searching, antivirus, file management, and diagnostic utilities. Application software (also called apps) lets you perform specific tasks, such as writing documents, analyzing a set of numbers, or preparing presentations. Productivity software is application software that makes people more productive by automating common or repetitive tasks.

Databases

Create and manage large or small databases with items such as customer or inventory data, employee information, or personal or professional collections. A database is a collection of data, organized and stored electronically. Data, organized into records (rows of data), is stored in tables in a database. After opening an object, you choose a view, depending on what you need to do. Each view is designed to perform specific tasks. Each piece of data in a database is entered and stored in an area called a field, which is assigned a field name. Fields are defined by their data type, such as text, date, or number. Fields haveproperties,which are characteristicsthat define the field. A record is theset of field values for a single entitylike a customeror an order. A query extracts data from a database based on criteria that the query creator specifies. A report is a user-designed layout of database content.

Presentation Software

Create electronic slides for presentations. Presentation files can include text, images, charts, audio, video, and animation. A slide masterautomatically applies any new format-ting to all slides in your presentation that use that master.

Graphics Software

Create, view, manipulate, and print digital images such as photographs, flowcharts, logos, drawings, clip art, and diagrams. Bitmap images are based on pixels—short for "picture elements." A bitmap assigns a color value to each pixel in a graphic. Vector graphics tend to be simple images such as shapes, lines, and diagrams. Vector graphics use mathematical formulas instead of pixels to define their appearance. Clip art refers to small graphic image files available on the web that can be used in documents, presenta-tions, or worksheets.

Purchasing Software

Custom software is designed to meet the unique needs of an organization or business. Open source software is copyrighted software whose source code is "open," meaning that it is available to the public.

Types of Computers

Desktop Computer: Consists of a system unit, a monitor (the display screen), a keyboard, and a mouse. System Unit: Contains most of the electronic circuitry in the computer. All-In-One Desktop: Type of desktop computer combines the system unit with the monitor Laptops: Lightweight, small, and portable because they can run on a rechargeable battery. Tablet: A small, flat computer with a touch-sensitive screen that accepts input from a digital pen, a stylus, or your fingertips. Smartphone: Portable computers that weigh up to about 2 pounds includes these features in addition to tools that let you make phone calls through cellular networks.

Output Devices

Desktop display, laptop screen, smartphone and tablet display screen color output from a printer, speakers, headphones, text-to-speech technology, projectors,

E-Commerce

E-commerce refers to the purchase of products such as clothing and electronics, intan-gible products such as music, and services such as education, airline and concert tick-ets, hotel reservations, and gift certificates, over the Internet. Business-to-consumer (B2C) e-commerce model, businesses provide goods and services to consumers. The most widespread example of this is online shopping. A cookie is a small file generated by a web server that acts like a storage bin for the items you place in your shopping cart. C2C sites have multiple sellers, with different sellers for different items, rather than a single merchant hosting a B2C site. Business-to-business (B2B) e-commerce model involves the transfer of goods, services, or information between businesses. Electronic wallet, also called a digital wallet, such as Google Wallet and Apple Passbook, which stores the payment information you enter when you finalize an online purchase. Aggregator sites because they specialize in collecting and organizing data from other consumer websites.

Electronics and the Environment

Electronic trash, also called e-trash or e-waste,consists of discarded computers, cell phones, televisions, stereos, and the electronics from automobiles and appliances. Green computing is designing, manufacturing, using, and disposing of electronic products in ways that are friendly to both people and the environment.

Ethical Use of Information

Ethics is the set of moral principles that govern people's behavior. Plagiarism, which isusing the work or ideas ofothers and claiming themas your own. Intellectual property rights, which are legal rights protecting those who create works such as photos, art, writing, inventions, and music. A copyright gives authors and artists the legal right to sell, publish, or distribute an original work; and it goes into effect as soon as the work exists in physical form. Digital rights management, which are techniques such as authentica-tion, copy protection, or encryption that limit access to proprietary materials. Public domain, which means you can use it freely because it is not subject to copyright.

Internet Etiquette

Etiqutette: Rules for acceptable behavior don't engage in flaming, which is posting hostile or insulting comments about another online participant.

Computers in History

First Gen: Vacuum Tubes Second Gen: Transistors Third Gen: Integrated Circuits Fourth Gen: Microprocessor IBM made the first personal computer

Work with Folders & Libraries

Folder: A list of files stored in one place You access all the folders on a Windows computer using File Explorer, the Windows file manager. When you start File Explorer, it opens to show the contents of the Quick access list, which are the folders you use frequently. Cloud: A storage location on a server.

Storage

Hard Drive: The main storage medium on a PC is the hard disk, which is contained in a storage device called the hard disk drive (HDD) or hard drive. - A magnetic hard drive is made up of one or more disks called platters that spin on a spindle, and read/write heads that move over the surface of the disks to save and retrieve data. - Solid state drives (SSDs) are more durable than magnetic drives, so they are particularly useful for portable devices such as tablets. External Hard Drive: Extra storage drive via a USB cable or a Firewire cable Optical media include CDs, DVDs, and Blu-ray discs (BDs), though their use as storage media is declining. Solid state storage uses nonmagnetic technology and can be removable, such as flash drives and memory cards, or contained in a device, such as a solid state hard drive. Cloud storage lets you store your data remotely and access it with any device connected to the Internet, reducing the amount of space you need on your hard disk for files.

Troubleshooting Common Hardware Problems

If the head touches the platter, or if dirt gets on the disk, you can have a hard drive crash or head crash. You won't be able to access files or run programs. A head crash most likely means you need to replace the drive. When a program needs more random access memory (RAM), the temporary storage used while the computer is running, than is currently available on the computer, it calls on the hard drive to create virtual memory, which is temporary space on the disk. If your hard drive is too full, the program won't run. If the second monitor is blank, you may have a damaged video card. This is a circuit board that processes image signals. In either case, you'll need to take the monitor or computer to a technician for repair.

Network Risks

Infrared technology communicate with direct light beams between infrared (IrDA)ports on the devices. With groupware, several colleagues can work together on a single document at the same time. Some storage devices, called network attached storage (NAS), connect directly to a network. NAS servers provide a centralized location for storing programs and data on large and small networks. Online security risks, which are actions that can damage or misuse your computer and data when you are connected to a network. A hacker uses computers toaccess data withoutauthorization, often illegally. Crackers use computers todestroy data, steal information,and commit other maliciouscrimes. Malware (malicioussoftware) and spywarecan hijack parts of yourcomputer and use it forillegal activities. After hackers access your personal information, they can transfer funds or purchase goods and services using your bank accounts, which is called theft bycomputer. An evil twin is a normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. war drivers, people who drive around and connect to wireless networks to gain free Internet access. Spyware is a form of malware secretly installed on networked computers. Spyware tracks and transmits personal data, such as financial information or browsing habits, without your knowledge or permission. Rootkit: Makes normally hidden files accessible and therefore vulnerable to attack Zombies, which are computers controlled by outsiders without the owners' knowledge Denial of service (DoS) attack, a bombardment of network traffic or messages designed to overload a server. Social engineering, where attackers attempt to exploit human weaknesses by building relationships with victims for the purpose of stealing confidential information.

Licensing Software

Intellectual property is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software. A copyright is the legal right to copy, distribute, modify, and sell an original work, including computer software. A software licensegrants a user rightsto use of the softwarein specified ways. A single-user license, also called an end-user license agreement (EULA), grants one user the right to use the software. A multiple-user license, used by organizations and schools, lets many people use the software A site license allows an organization to install software on all computers at a site, either locally or through a network. A software license is a contract between the software publisher and the user. Piracy: The illegal copying and distribution of copyrighted digital content

Input Devices

Keyboard: An input device you use by pressing keys for letters, numbers, and symbols to enter data into the computer. Touchpad: A flat surface usually built into laptop keyboards, though mobile devices such as portable music players also provide smaller touchpads on their case. Mouse, Trackball, Stylus, Touch Screen, Cameras, Scanners, Microphones, Headset, Game Controllers, Biometrics,

Search for Information

Keywords: Words that best describe what you want to find. Use a word stem (the base of a word, without -ed or -ing endings) to broaden a search. Use search operators, which are characters that help you focus your search. Creative Commons is an organization that provides free, standardized copyright licenses to encourage legal sharing of creative material. Sponsored links, which are hyperlinks to paid advertising content related to your search text. Search engine optimization (SEO) techniques to increase the likelihood that their pages will appear closer to the top of search results, where more users will see them.

Keeping Your Computer in Working Condition

Magnetic Hard Drive - Back up your data on a regular basis so you will be protected in the event your hard drive does crash. - To help prevent the hard drive from crashing, you should keep the computer in a dust- and dirt-free environment. - Never bump into a computer while it is accessing the drive. - Don't place the computer in extreme temperatures, and don't drive with it on the seat of your car, where a sudden stop can send it flying. Solid State Drives - Have no moving parts, are less susceptible to dirt and impact but should still be treated with care. A flash drive, for example, is a small portable solid state storage device that plugs into a USB port. Solid state storage is a computer storage technology that stores data electronically. It is widely used because of its durability and portability. Therefore, a flash drive can be thrown into a purse or pocket, or attached to a key ring as an accessory. It is better to keep all media away from dust, dirt, and other hazards. Store the memory cards from your digital camera in their cases when not in the camera

Software Problems

Malware, malicious software written by hackers, poses a significant threat to your com-puter and its contents. When a computer program stops functioning properly—for example, if it freezes or won't start—it is said to crash.

Mobile Applications

Mobile appsare software programs that run on mobile devices such as smartphones and tablets Pros: - Popular and useful - can transfer files between your desktop and mobile devices. - The ability to access the Internet Cons: - Cannot support full-scale software programs such as Microsoft Word or Excel or Adobe Acrobat. -Tend to be limited in functionality and scope; each app usually focuses on a single task - Keyboard and touch screen space is another limiting factor; mobile apps can't require heavy data or text input from users. A native application (native app) is a program that has been designed to run on a specific operating system such as Android, iOS, or Windows. Tablets, A web application (web app) is not installed on a user's device; instead, it resides on a server on the Internet, and it is run by a user through a web browser. Web apps are not device specific.

How Networks Work

Network hardware includes clients, servers, modems, network interface cards, hubs, switches, cables, and routers. Wired networks have cables that connect network devices through ports (outlets), using connectors that match each type of port opening. A modem is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer. - Cable modems send and receive digital data over a cable TV connection. In some cases, the cable modem can be part of a set-top cable box.• - DSL modems are external devices that use existing standard copper telephone wiring to send and receive digital data.• - Wireless modems are often built into laptop and tablet computers, or they attach via a USB port. A cell phone can work as a modem, too. A common term used to describe information-carrying capacity is bandwidth; the higher the bandwidth, the more information the channel can transmit. Broadband refers to high-capacity channels, while narrowband refers to slower channels with less capacity.

Connecting to a Network

Network standards specify the way computers access a network, the type(s) of hard-ware used, data transmission speeds, and the types of cable and wireless technology used. Ethernet: Establishing wired networks Power over Ethernet (PoE): Transferring both power and data via an Ethernet network Phoneline/HomePNA and Powerline: Connecting computers through ordinary telephone wires and coaxial cables WIFI: Creating wireless home and small business networks Bluetooth: Allowing a wide assortment of devices to communicate wirelessly over short distances 3g 4G: Establishing cellular networks

Social Networks

Online Social Network: A website where members share information.

Operating Systems

Operating system (OS), the set of programs that manages and coordinates all the activities on your computer. - Memory Management - - RAM Types - PC Operating Systems - Server OS - Mobile OS - Embedded OSs PC Operating Systems - Windows: Supports the Cortana virtual assistant, touch screen input, HoloLens headsets, and built-in apps such as the Microsoft Edge browser - macOS: Includes the Siri virtual assistant, coordination with Apple mobile devices, and cloud file storage - Linux: Distributed under the terms of a General Public License (GPL), which allows you to copy the OS for your own use, to give to others, or to sell - Based on Linux, it uses the Google Chrome browser as its user interface and primarily runs web apps (applications you run in a browser)

Spreadsheets

Perform numerical analysis and enhance the appearance of data for lists, forms, budgets, schedules. Spreadsheet files can include numbers, charts, graphics, text blocks, and data tables. Each cell has aunique celladdress, or cellreference, suchas K1, based onits column androw location A formula contains a calculation, which specifies the operation to be performed, and arguments, which are the values involved in the calculation An absolute reference refers to a fixed cell location that never changes. A relative reference identifies a cell by its location relative to other cells and changes when a formula is moved or copied. Filter worksheet data to display only the values you want to see, such as filtering students who got a B or better on a test. Use What-If analysis tools to test multiple scenarios by temporarily changing one or more variables to see the effect on related calculations. Use pivot tables to create meaningful data summaries to analyze worksheets containing large volumes of data. Macros, small programs you can create to perform a predefined action that you have to repeat frequently by just clicking a button.

Memory

RAM: A set of chips called a memory chip or a memory module, which is a small circuit board that slides into a slot on the motherboard. - Store temporary data. - Volatile - DRAM: Chips need to be recharged constantly or they lose their data. - Static RAM (SRAM) chips are faster, more reliable, and don't need to be recharged as frequently, but they are more expensive than DRAM chips. - Magnetoresistive RAM (MRAM) chips use magnetic charges instead of electrical charges to store data. Read-only memory (ROM) is the memory permanently installed on your system when your computer is manufactured. - Attached to the motherboard and contains the BIOS, or basic input/output system. - Programmable read-only memory (PROM), electrically erasable programmable memory (EEPROM), and flash memory are types of programmable ROM. - Nonvolatile

Messaging

Real-time messaging is called instant messaging (IM) Real-time messaging systems are primarily synchronous communications, which means that everyone who is communicating must be online at the same time. M uses presence technology, which lets one computing device identify the status of another. asynchronous communications involve one person posting a message that someone reads later, as with a text message or forum. Text Messaging or SMS (Short Message Service), is an asynchro-nous service because it delivers and stores messages until participants decide to view them. A message board, also called an Internet forum, is an online discussion site where people with a common interest participate in a conversation by posting messages.

What is Software?

Software program: A set of instructions that tells a computer what to do, how to do it, and where to send the results, or output. Utility Software: Run and maintain the computer.

Introduction of System Software

System software is the software that makes it possible for you to use a computer. - Keeps track of files, prints documents, connects to networks, manages hardware and other software. Operating System: A set of programs that manages and coordinates all the activities in a computer. Utility Software performs a specific, limited task, usually related to managing or maintaining a computer system. - File management utilities - Search utilities - Disk cleanup software - File compression

The Internet

The Internet is the largest network in the world, consisting of millions of computers connected through millions of networks spanning the globe. An Internet service provider (ISP) is a company that offers Internet access to individuals, businesses, and smaller ISPs. The web consists of a huge collection of interconnected webpages, documents connected through links that include text, graphics, sound, and video. Webpages are organized into websites according to their function, business, organization, or interest. Net neutrality—one website has the same value or priority as other websites.

Central Processing Unit

The brain of a computer. Often called a microprocessor or a processor. Built into the motherboard, which is the main circuit board that houses much of a computer's electronics. Processor performance is determined in part by the number of cores, or processor units, on a CPU. The more cores, the more processing power. Functions: Control Unit: The control unit is like a traffic cop, directing the flow of instructions throughout the processor. Arithmetic Logic Unit (ALU). The ALU performs arithmetic operations, such as addition and subtraction, and comparison operations such as comparing two numbers to see if they are the same. - Temporarily holds data, such as two numbers to add, in registers, or small storage locations within the CPU. Machine Cycle: Fetch, decode, execute, and store

Online Information

The websites listed in the results are on the surface web, which includes sites that are freely available to the public and can be searched by standard search engines. The surface web is also called the public web or the visible web. These sites are part of the deep web, also called the hidden web or the invisible web. Databases: Collections of information) The dark web is also not reached by search engines, and includes hacking groups, traffic in hoaxes, scams, terrorism, and illegal drugs, pornography, and animal trade.

Buying a Computer

Things to Consider when Buying a Computer: Purpose, Price, Operating system, Storage, Size and shape, processing power and speed, memory, and peripheral devices A peripheral device is hardware you add to your computer system for additional functionality. form factor, or size and shape of the computer, that will work best for you. Service plans and extended warranties are useful if you are not familiar with computers, or if you feel your computer might need replacement parts due to wear and tear after the manufacturer's warranty expires.

Word Processing

Used to Create, edit, format, view, print, and publish documents. Document management tools protect and organize files and let you collaborate with others. Font Type: Defines what characters look like. Some fonts have rounded letters; others are more angular. Some are formal; others are more casual Font Style: Adds visual effects features to text; bolding text makes it stand out on the page, shadow gives it depth, underlining, italicizing, and highlighting text provide emphasis.boldshadowunderline

Safeguarding your Computer

Using global positioning system (GPS) technology and real-time location systems such as radio-frequency identification (RFID) tags, you can install computer-tracking software and equipment on your laptop or smartphone. You can also back up your files to remote servers over the Internet using cloud backup or cloud storage. Passwords are short words or phrases kept secret by a person and used to gain access to a website or data. Personal identification numbers, often called PINs A firewall inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges. Full disk encryption (FDE) automatically protects all of the data on your computer. You can also choose to encrypt specific files and folders using the Encrypting File System (EFS) in Windows or FileVault for macOS.

Types of Websites

Web Portal: A website that combines pages from many sources and provides access to those pages. Content Aggregator: Distributes web content Distributed content, content created by a news organization and published directly to platforms they don't control. A wiki is a collaborative website where you and your colleagues can modify content on a webpage, and then publish it just by clicking a button. A blog, short for "web log," is a webpage listing journal entries in chronological order. Social networking sites such as Facebook, Twitter, and Instagram let participants share personal information, upload photos and other media, and make new friends. File-sharing sites such as YouTube and Flickr let you post and share photos, music, and other media.

Web Apps

Web apps are applications that reside on a server on the Internet, rather than a user's device, and are run by a user through a web browser. Webmail Online storage sites Productivity Application

Describe Common OS Features

Windows 10 - Recycle Bin Icon - Dialog box - Use Cortana to find files, apps, and settings - Disk Cleanup is a utility for removing unnecessary files - Finder is a macOS utility for managing files - Buttons on the taskbar macOS - App Icons - Menu bar - Use Siri to find files and information

Comparing PC Operating Systems

Windows is a PC operating system developed by Microsoft Corporation. Part of its graphical user interface features windows, which are rectangular areas of the screen devoted to a single program and its tools. macOS is the PC operating system designed for Apple Macintosh computers. It has a graphical user interface with windows and a desktop. It accepts touch and voice input and includes a menu bar at the top of the screen and the Dock at the bottom. The Dockcontains icons for accessing files and apps. Linux is a PC operating system related to UNIX, an OS first developed in the 1960s for large, special-purpose computers used by scientists, researchers, and system administrators. - The main advantage of using Linux is its General Public License (GPL), which makes the OS free to install and use. Chrome OS is a PC operating system developed by Google to work with Google web apps.

Search Tool

You'd probably start a general search engine such as Google, Bing, or Yahoo! and enter a search term or phrase such as website navigation patterns. It uses programs called spiders or crawlers, software that combs the web to find webpages and add new data about them to the database. These programs build an index of terms and their locations.When you enter a search term, or query, a general search engine refers to its database index and then lists pages that match your search term, ranked by how closely they answer your query. a subject directory, which is a catalog of webpages organized by subject. a specialty search engine, which lets you search databases, news providers, podcasts, and other online information sources that general search engines do not always access. A social search tool such as Social Searcher and Google Social Search to search blogs, microblogs, comments, and conversations on social media sites.

Digital Communication

digital communications, which involve transmitting information from one computer or mobile device to another. Communications software helps your computer connect to a network and then work with communications standards to manage transmitting and receiving data. A cellular network is a communications network linking many base stations that each cover a limited geographical area. A base station is a set of equipment that sends and receives radio signals, and is usually attached to a cell tower. The geographical area a base station covers is called a cell. A subscriber identity module (SIM) card is card containing an integrated circuit that uniquely identifies the phone, or choose settings for a specific carrier.

Data Risks

hackers—people who break into computers and computer networks, often by exploiting weaknesses and preventable flaws. The crime of hacking into and attacking networks is known as cybercrime. Many hackers call themselves hacktivists and have a social goal or impact. The hacker community includes white hat (nondestructive) and black hat (extremely destructive) hackers. It is important that you create strongpasswords that cannot be easily figured out by someone trying to break into your account. Cloud storage systems have backups at vari-ous online locations that provide additional protection. By storing data in the cloud, you provide additional protection for your data. Cyberterrorism is the premeditated disruption of computers and networks. Wireless sniffing can intercept and analyze data transmitted over any network, and is a risk that can breach what otherwise might have been considered secured data. Install an uninterruptible power supply (UPS) to provide battery backup for a short period.

Protecting Computer Hardware

n uninterruptible power supply (UPS),a short-termbattery backup that comes on automatically in case of power loss.More damaging than power outages are power fluctuations. Power spikes, or power surges, can occur before and after outages. To prevent power fluctuations from damaging electronic components, you should always use a surge suppressor with your computer.

The World Wide Web

the World Wide Web: A part of the Internet, the physical network that transmits data and helps us access the wealth of information on the web.


Conjuntos de estudio relacionados

Exercise 7 classification and structure of bones and cartilages

View Set

Informatics questions 1--use starred

View Set

Quiz 5: Conceptualization, Operationalization, and Measurement

View Set

Because God Is Real - Chapter 16

View Set

A&P Chapter 2: four major organic molecules

View Set

Quiz 6 - Entry and Exit Decision

View Set