Computer Concepts Chapters 6-9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Examples of cloud storage services...

-Dropbox -Google -Microsoft -Amazon -Apple

What is a toggle key and an example of it?

-turn a feature on and off -EX/Caps Lock

Several factors affect how data is transmitted. These factors include ______________ and _________________.

1) Bandwidth 2) Protocols

Ways to Protect from Cyber attacks

1) Be careful what you write on the internet 2)Only do business on the internet if you know its legit. 3)Completely remove all personal info from the hard drive when selling a computer. 4)Moniter your credit.

what are the 2 common network strategies?

1) Client/server 2) peer-to-peer

What are the 3 commonly used types of modems?

1) DSL 2) cable 3) wireless

What are the 3 commonly used types of modems?

1) DSL (digital subscriber line) 2) cable modem 3) wireless modem

What are the most widely used optical disks?

1) DVD 2) CD 3) Blu-ray disks

________________ can always be replaced. A company's __________, however, may be irreplaceable.

1) Equipment 2)Data

Some of the mass storage devices that support this strategy of the enterprise storage system are:

1) File servers 2) Network attached storage )NAS) 3) RAID systems 4) Organizational cloud storage

Privacy Modes: Google Chrome provides ___________________accessible from the Chrome menu, and Safari provides___________________- accessible from the Safari option on the main menu.

1) Incognito Mode 2)Private Browsing

What portable computers present ergonomic challenges?

1) Laptops 2) Tablets 3) Cell phones EX/ tablet hunch EX/ Blackberry hunch

Benefits of Cloud-Based Backups

1) Security 2) Automation 3) Cloud-Based

There are many VoIP services available for free that do not require any dedicated hardware. Examples of these services are ___________ from Microsoft, ___________ from Google, and ___________ from Apple.

1) Skype 2) Hangouts 3) Facetime

Safety Precautions when Using Hotspots

1) Use a firewall 2) Avoid fake hotspots 3) Turn off file sharing 4) Check if connection is encrypted

Ways to add capacity to an Optical Disk...

1) double-sided 2) multiple recording layers

Two benefits of an LAN are ________________.

1) economy 2) flexibility

what are the two basic types of hard disks?

1) internal 2) external

Many devices combine input and output capabilities. Sometimes this is done to ____________. Other times it is done for very _________________. Common combination devices include headsets, multifunctional devices, telephones, drones, robots, and virtual reality headgear and gloves

1) save space 2) specialized applications

What are the 4 basic elements of a communication system?

1) sending and receiving devices 2) connecting devices 3) data transmission specifications 4) communication channel

Computer users can alleviate these health problems by __________________ and by _______________________

1) taking frequent rest breaks 2) using well-designed computer furniture

What are the four basic categories of keyboards?

1) traditional 2)laptop 3)virtual 4)thumb

Some issues of privacy include...

1)Collecting public, but personally identifying, information 2)Spreading information without personal consent 3) Spreading inaccurate information

Three ways to improve the performance of hard disks are:

1)disk caching 2)redundant arrays of inexpensive disks 3)file compression/ decompression

What are the 4 basic types of optical scanners?

1)flatbed 2)document 3)portable 4)3D

What are the four most popular and specialized game controllers?

1)joysticks 2)gaming mice 3)gamepads 4)motion-sensing devices

use lasers, cameras, or robotic arms to record the shape of an object. Like 2D scanners, most _________ scanners cannot recognize light, dark, and colored areas.

3D scanners

What is one of the most widely used types of DSL?

ADSL (asymmetric digital subscriber line)

relates to the responsibility of those who have data to control who is able to use that data

Access

elates to the responsibility of those who collect data to ensure that the data is correct.

Accuracy

-are the newest form of optical storage designed to store hi def (high definition) video -comes from a special blue-colored laser used to read the discs that gives them a typical capacity of 50 GB—ten times the capacity of DVDs. Optical discs that store hi def video and the newest video games are often ______________..

Blu-ray disks (BDs)

Wireless connections typically use ______________ technology.

Bluetooth

a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet; iis widely used for wireless headsets, printer connections, and handheld devices.

Bluetooth

What is the most popular PAN technology and what is its max range?

Bluetooth, 33 ft

were the first widely available optical format for PC users. Typically, __________ drives store 700 MB (megabytes) of storage. Optical discs that store music are often ________________

CD (compact disks)

scanners that are able to recognize special characters and marks. They are specialty devices that are essential tools for certain applications

Character and mark recognition devices

The most important characteristic of a monitor is its _________________

Clarity

Protects e-mail messages as they move across the Internet. One of the most widely used personal e-mail encryption programs is Pretty Good Privacy

E-mail encryption

Asks..how do the actions of individual users and companies affect society?

Ethics

restricts disclosure of educational records

Family Educational Rights and Privacy Act (FERPA)

has begun to replace 3G networks in some areas with providers using LTE (Long Term Evolution) connections to provide faster transmission speeds. While a user's experience with this will depend on several factors, including carrier, geography, and proximity to cell towers, these technologies can provide speeds up to 10 times faster than 3G.

Fourth-generation mobile telecommunications (4G)

The goal for next-generation storage is focused on _________________.

Hard drives-increasing their capacity, decreasing their size

federal law that protects medical records

Health Insurance Portability and Accountability Act (HIPAA)

simply a scam using the Internet

Internet scam

widely used for older monitors and is typically less expensive

LCD (Liquid crystal display)

Networks with nodes that are in close physical proximity—within the same building, for instance—are called __________________. -span distances less than a mile and are owned and operated by individual organizations -widely used by colleges, universities, and other types of organizations to link personal computers and to share printers and other resources

Local Area Networks (LAN)

monitors replace the LED monitor's backlighting technology with a thin layer of organic compound that produces light. By eliminating the backlight, ____________________ monitors can be even thinner with better power efficiency and contrast ratios.

OLED (Organic light-emitting diode)

relates to who owns data.

Property

Most keyboards use an arrangement of keys given the name _________________.

QWERTY

__________ does NOT lose information when a computer is turned off

ROM

discs that cannot be written on or erased by the user. Optical discs that you buy in a store, such as music CDs, DVD movies, and Blu-ray video games, are often this .

Read-only (ROM for read-only memory) discs

measured by the diagonal length of a monitor's viewing area. Common sizes are 15, 17, 19, 21, and 24 inches.

Size, or active display area

the VoIP application that uses Internet rather than traditional telephone lines to support voice communication

Telephony, also known as Internet Telephony

so compact that they can be transported on a key ring. These drives conveniently connect directly to a computer's USB port to transfer files and can have capacities ranging from 1 GB to 256 GB, with a broad price range to match. Due to their convenient size and large capacities, __________ have become a very popular option for transporting data and information between computers, specialty devices, and the Internet

USB drives or flash drives

what else is 3D printing known as?

additive manufacturing

telephones typically send and receive ________________, which are continuous electronic waves.

analog signals

In the future, with wearable ______________________, information will appear instantly, right before your eyes.

augmented reality displays EX/ look at the sky and tell weather information EX/ problem: how to power it

devices are either handheld wand readers or platform scanners. They contain photoelectric cells that scan or read bar codes, or the vertical zebra-striped marks printed on product containers.

bar code readers or scanners

the vertical zebra-striped marks printed on product containers

bar codes

measures how much a particular storage medium can hold.

capacity

found among heavy computer users, consists of damage to nerves and tendons in the hands. Some victims report the pain is so intense that they cannot open doors or shake hands and that they require corrective surgery

carpal tunnel syndrome

communication uses multiple antennae (cell towers) to send and receive data within relatively small geographic regions (cells). Most cell phones and mobile devices use these networks

cellular

a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core. In terms of the number of telephone connections, this has over 80 times the transmission capacity of twisted pair. _____________cable is used to deliver television signals as well as to connect computers in a network.

coaxial cable

the process of sharing data, programs, and information between two or more computers.

computer communications

-Another way your web activity can be monitored -small data files that are deposited on your hard disk from websites you have visited

cookies

a legal concept that gives content creators the right to control use and distribution of their work

copyright

a computer criminal who creates and distributes malicious programs

cracker

the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person

cyberbullying

any criminal offense that involves a computer and a network. -It was recently estimated that it affects over 400 million people and costs over $400 billion each year.

cybercrime or computer crime

For years, individuals relied on ______________ using existing telephones and telephone modems to connect to the Internet. This type of service has been replaced by higher-speed connection services including DSL, cable, satellite, and cellular services.

dial-up services

uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account

dictionary attack

-To prevent copyright violations, corporations often use ________________. -encompasses various technologies that control access to electronic media and files -Typically, used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file.

digital rights management (DRM)

Computers, in contrast, send and receive ______________. These represent the presence or absence of an electronic pulse—the on/off binary signals we mentioned in Chapter 5.

digital signals

are responsible for recovering systems and data after a disaster strikes an organization. In addition, they often create plans to prevent and prepare for such disasters

disaster recovery specialists

receiving data from a satellite

downlink

the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key, or, simply, a key

encryption

To make the computer easier on the eyes, take a 15-minute break every hour or two. Keep everything you're focusing on at about the same distance. For example, the computer screen, keyboard, and a document holder containing your work might be positioned about 20 inches away. Clean the screen of dust from time to time

eyestrain and headache

dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.

file servers

consists of hardware and software that control access to a company's intranet and other internal networks. Most use software or a special computer called a proxy server.

firewall

have sensors that collect data about your hand movements. Coupled with software, this interactive sensory equipment lets you immerse yourself in a computer-generated world

gloves

The most common black ink selection is ______________, in which images are displayed using many shades of gray

grayscale

A vast industry of data gatherers known as ______________________ now exists that collects, analyzes, and sells such personal data.

information resellers or information brokers

Unlike radio waves, this uses ___________ light waves to communicate over short distances. Like microwave transmissions, __________is a line-of-sight communication. Because light waves can only travel in a straight line, sending and receiving devices must be in clear view of one another without any obstructions blocking that view. One of the most common ______________ devices is the TV remote control.

infrared

located inside the system unit. These hard disks are able to store and retrieve large quantities of information quickly. They are used to store programs and data files. For example, nearly every personal computer uses its i___________ hard disk to store its operating system and major applications such as Word and Excel. To ensure adequate performance of your __________ hard disk and the safety of your data, you should perform routine maintenance and periodically make backup copies of all important files; provide fast access, they have a fixed amount of storage and cannot be easily removed from the system unit

internal hard disk

control game actions by users varying the pressure, speed, and direction of a control stick

joysticks

one of the most common ways to input data

keyboard

records every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages

keystroke logger

these keyboards are smaller than traditional keyboards and are widely used on laptop computers. While the precise location and number of keys may differ among manufactures, ___________ keyboards typically have fewer keys, do not include a numeric keypad, and do not have a standard location for the function and navigation keys

laptop keyboards

uses a technology similar to that used in a photocopying machine. ______________ use a laser light beam to produce images with excellent letter and graphics quality. More expensive than inkjet printers, _____________ are faster and are used in applications requiring high-quality output

laser printers

short for malicious software. They are specifically designed to damage or disrupt a computer system. The three most common types are viruses, worms, and Trojan horses.

malware

To convert the digital signals to analog signals and vice versa, you need a _______________.

modem

control games by user movements. For example, Microsoft's Kinect _____________________ accepts user movements and spoken commands to control games on the Xbox 360.

motion-sensing devices

There are a wide variety of pointing devices, including the ___________________________________________.

mouse, touch screen, game controller, and stylus

-can hold over 128 gigabytes of data. That is the equivalent of millions of typewritten pages or a medium-sized library all on a single disc. -are very common, with most software and many movies available on ______________ -a laser beam alters the surface of a plastic or metallic disc to represent data. Unlike hard disks, which use magnetic charges to represent 1s and 0s, ___________- use reflected light -The 1s and 0s are represented by flat areas called lands and bumpy areas called pits on the disc surface -The disc is read by an optical disc drive using a laser that projects a tiny beam of light on these areas. The amount of reflected light determines whether the area represents a 1 or a 0. -use tracks and sectors to organize and store files. Unlike the concentric tracks and wedge-shaped sectors used for hard disks, however, optical discs typically use a single track that spirals outward from the center of the disc. This single track is divided into equal-sized sectors.

optical disks

What mouse is the most widely used? It emits and senses light to detect mouse movement. Traditionally, the detected movements are communicated to the system unit through a cord

optical mouse

high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage.

organizational cloud storage

processed data or information. _____________ typically takes the form of text, graphics, photos, audio, and/or video. For example, when you create a presentation using a presentation graphics program, you typically input text and graphics. You also could include photographs, voice narration, and even video. The ____________ would be the completed presentation

output

help you create strong passwords. Additionally, they will store all your passwords in one location and automatically provide the appropriate password when requested from one of your favorite sites

password managers

secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access

passwords

A network may consist only of ______________ computers, or it may integrate personal computers or other devices with larger computers. Networks can be controlled by all nodes working together equally or by specialized nodes coordinating and supplying all resources. Networks may be simple or complex, self-contained or dispersed over a large geographic area.

personal

concerned with protecting hardware from possible human and natural disasters

physical security

representing some other person's work and ideas as your own without giving credit to the original source

plagiarism

typically a handheld device that slides across the image, making direct contact

portable scanner

RAM is also referred to as __________________.

primary storage

translate information that has been processed by the system unit and present the information on paper

printers

Most wireless connections use __________________ to communicate.

radio waves EXs/ Bluetooth, WiFi, microwave, cell, and satellite connections

basic distinguishing features of all printers

resolution, color capability, speed, memory, and duplex printing

a node that forwards or routes data packets from one network to their destination in another network.

router

use satellites to provide wireless connections. While slower than DSL and cable modem, these connections are available almost anywhere using a satellite-receiving disk.

satellite-connection services

Credit cards are also known as ______________?

smart cards

the output is often referred to as a _________________

soft copy

the unauthorized copying and/or distribution of software

software piracy

devices have no moving parts. Data and information are stored and retrieved electronically directly from these devices much as they would be from conventional computer memory.

solid-state storage

The most widely used audio-output devices are __________ and _____________.

speakers and headphones

used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet

spyware

a penlike device typically used with tablets and mobile devices; uses pressure to draw images on a screen. Often interacts with the computer through handwriting recognition software

stylus

prepare instruction manuals, technical reports, and other scientific or technical documents. Most _____________ work for computer software firms, government agencies, or research institutions. They translate technical information into easily understandable instructions or summaries

technical writers

At one time nearly all computer communication used _______________lines.

telephone

input and output devices for receiving and sending voice communication

telephones

the ability to fully experience the reality of a different place without actually being there

telepresence

use heat elements to produce images on heat-sensitive paper. These printers are widely used with ATMs and gasoline pumps to print receipts

thermal printers

type of cookie usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next.

third-party cookie or tracking cookie

these keyboards are used on smartphones and other small mobile devices. Designed primarily for communicating via texting and connecting to the web, these keyboards are very small.

thumb keyboards

A network can be arranged or configured in several different ways. This arrangement is called the network's ______________.

topology

Another important monitor feature is the ability to accept _________________________

touch input

allows users to select actions or commands by touching the screen with a finger or penlike device

touch screen

What are some commonly used input devices?

touch screens, game controllers, scanners, digital cameras, voice recognition, and audio-input devices

rings of concentric circles on the platter (on hard disks)

tracks

Benefits of E-books

transporting, searching, bookmarking, adding highlights and notes, purchasing

each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes, and so forth, forming a treelike structure.

tree network

programs that appear to be harmless; however, they contain malicious programs. -not viruses. Like worms, however, they can be carriers of viruses. -The most common types appear as free computer games and free screensaver programs that can be downloaded from the Internet.

trojan horses

consists of pairs of copper wire that are twisted together. Both standard telephone lines and Ethernet cables use this kind of physical connection. Ethernet cables are often used in networks and to connect a variety of components to the system unit

twisted-pair cable

provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.

videoconferencing

an artificial, or simulated, reality created in 3D by computers. It strives to create a virtual or immersive experience by using specialized hardware that includes headgear and gloves (able to sit in a car they have designed but not yet built)

virtual reality (VR)

programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. While some are relatively harmless, many can be quite destructive.

viruses

Creating ____________ is not anywhere near as difficult as recognizing and interpreting voice input. In fact, ___________ is quite common. It is used with many smart phones, cars, and soft drink machines. It is used as a reinforcement tool for learning, such as to help students study a foreign language. It also is used in many supermarkets at the checkout counter to confirm purchases. One of its most powerful capabilities is to assist the physically challenged

voice output (like Google translate ish)

also known as low bandwidth, is used for standard telephone communication. Personal computers with telephone modems and dial-up service use this bandwidth. While effective for transmitting text documents, it is too slow for many types of transmission, including high-quality audio and video.

voiceband

invisible images or HTML code hidden within a web page or e-mail message

web bugs

What is a combination key and an example of it?

-perform an action when held down in combination with another key -EX/ Ctrl

What are the 5 types of scanning devices?

1)optical scanners 2)card readers 3)bar code readers 4)RFID readers 5)character and mark recognition devices

widely used by the United Parcel Service (UPS) and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages.

Maxicode

What button does the Windows keyboard include to directly access the start menu?

Windows key

Almost all flat-panel displays are _________________-, meaning that a common source of light is dispersed over all the pixels on the screen. There are three basic types of flat-panel monitors: LCD, LED, and OLED

backlit

refers to the quality and sharpness of the displayed images. It is a function of several monitor features, including resolution, dot pitch, contrast ratio, size, and aspect ratio

clarity

any data or instructions used by a computer

input

converts what we understand into what the system unit can process

input devices

any hardware used to provide or to create output. They translate information that has been processed by the system unit into a form that humans can understand. There are a wide range of ____________________. The most widely used are monitors, printers, and audio-output devices

output devices

specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet. ____________ are built into most smartphones and tablets. Desktop and laptop _________ are either built in or attached to the computer's monitor.

webcams

Some mice have a ______________ that can be rotated to scroll through information that is displayed on the monitor

wheel button

There are two categories of laser printers. ________________________ are less expensive and are used by a single user. They typically can print 15 to 17 pages a minute. ___________________ typically support color, are more expensive, and are used (shared) by a group of user, typically print over 50 pages a minute

1) personal laser printers 2)shared laser printers

It is estimated that over _________________ smartphones are in use worldwide.

1.5 billion

convert sounds into a form that can be processed by the system unit. By far the most widely used ____________ device is the microphone. _____________ can take many forms, including the human voice and music.

Audio input

makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM technologies

Digital Millennium Copyright Act (ILLEGAL to copy movies and music from the internet)

produces images that reflect light like ordinary paper, making the display easy to read

E-ink

started in the 1980s using analog radio signals to provide analog voice transmission service.

First-generation mobile telecommunications (1G)

include the locations, or addresses, of sites that you have recently visited

History files

Every computer on the internet is identified by a unique number called an ____________________.

IP address

Identification: Every computer on the Internet has a unique numeric address called an ______________________. Similar to the way a postal service uses addresses to deliver mail, the Internet uses these to deliver e-mail and to locate websites. Because these numeric addresses are difficult for people to remember and use, a system was developed to automatically convert text-based addresses to numeric ____________________. This system uses a domain name server (DNS) that converts text-based addresses to ________________. For example, whenever you enter a URL, say www.mhhe.com, a DNS converts this to an _________________ before a connection can be made.

IP address (Internet protocol address)

work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic

Intrusion Detection Systems (IDS)

span distances up to 100 miles. These networks are frequently used as links between office buildings that are located throughout a city. Unlike a LAN, is typically not owned by a single organization. Rather, it is owned either by a group of organizations or by a single network service provider that provides network services for a fee.

Metropolitan Area Networks (MANs)

What are some examples of combination input and output devices?

Multifunctional devices and telephones

a type of file server designed for homes and small businesses; is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.

Network attached storage (NAS)

senses the presence or absence of a mark, such as a pencil mark. _____________ is often used to score standardized multiple-choice tests.

Optical-mark recognition (OMR)

Asks..What are the threats to personal privacy, and how can we protect ourselves? -concerns the collection and use of data about individuals. There are three primary issues: Accuracy, Property, Access

Privacy

memory

RAM

For years, large corporations have been leasing special high-speed lines from telephone companies. Originally, these were copper lines, known as ______________, that could be combined to form higher-capacity options known as T3 or DS3 lines. These lines have largely been replaced by faster optical carrier (OC) lines.

T1 lines

started in the 2000s and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones.

Third-generation mobile telecommunications (3G)

these full-size keyboards are widely used on desktops and larger computers. The standard U.S. ___________ keyboard has 101 keys. Some ______________ keyboards include a few additional special keys. For example, the Windows keyboard includes a Windows key to directly access the Start menu. ______________ keyboards provide function keys, navigation keys, and a numeric keypad. Some keys, such as the Caps Lock key, are toggle keys. These keys turn a feature on or off. Others, such as the Ctrl key, are combination keys, which perform an action when held down in combination with another key.

Traditional

What is a UAV or drone?

Unmanned Aerial Vehicle- aircraft without a human pilot

encrypt connections between company networks and remote users such as workers connecting from home

Virtual private networks (VPNs)

input and output devices for receiving and sending voice communication

Voice over IP (VoIP)

uses high-frequency radio signals to transmit data. A number of standards for this exist, and each can send and receive data at a different speed. Most home and business wireless networks use this

WiFi (wireless fidelity)

what device is used to issue commands?

a mouse

measures the amount of time required by the storage device to retrieve data and programs.

access speed

This ever-growing volume of data is often referred to as ________________.

big data

A collection of zombie computers is known as a ____________________.

botnet or robot network

widely used for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use a single _____________ connection for high speed data transfer.

broadband

each device is connected to a common cable called a bus or backbone, and all communications travel along this bus.

bus network

uses the same coaxial cable as your television. Like a DSL modem, a this creates high-speed connections using the system unit's USB or Ethernet port.

cable modem

is provided by cable television companies using their existing television cables. These connections are usually faster than DSL.

cable service

a node that requests and uses resources available from other nodes. Typically, is a user's personal computer.

client

where the Internet acts as a "cloud" of servers that supply applications to clients as a service rather than a product.

cloud computing

capability is provided by most printers today. Users typically have the option to print either with just black ink or with __________. Because it is more expensive to print in ________________-, most users select black ink for letters, drafts, and homework

color

electronic systems that transmit data from one location to another. Whether wired or wireless, every _______________________ has four basic elements: sending and receiving devices, connection devices, data transmission specifications, communication channel

communication system

guidelines for the morally acceptable use of computers in our society

computer ethics

indicate a monitor's ability to display images. It compares the light intensity of the brightest white to the darkest black. The higher the ratio, the better the monitor. Good monitors typically have __________________ between 500:1 and 2000:1

contrast ratios

Optical scanners, like traditional copy machines, can make a _________ from an original. For example, an optical scanner can make a digital _______ of a photograph. Image capturing devices, on the other hand, create or capture original images. These devices include digital cameras and webcams.

copy

the ___________ or __________ mouse uses radio waves or infrared light waves to communicate with the system unit. These devices eliminate the mouse cord and free up desk space.

cordless or wireless

concerned with protecting software and data from unauthorized tampering or damage

data security

a specialized server that manages resources, such as user accounts, for an entire network.

directory server

improves hard-disk performance by anticipating data needs, improves processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU; requires a combination of hardware and software; The transfer rate from memory is much faster than from the hard disk. As a result, overall system performance is often increased by as much as 30 percent

disk caching

a private network that connects more than one organization. Many organizations use Internet technologies to allow suppliers and others limited access to their networks

extranet

transmits data as pulses of light through tiny tubes of glass. The data transmission speeds of these cables are incredible; recently speeds of 1 petabit per second were measured (a petabit is 1 million gigabits). Compared to coaxial cable, it is lighter, faster, and more reliable at transmitting data; is rapidly replacing twisted-pair cable telephone lines.

fiber-optic cable

designed to be held by two hands and provide a wide array of inputs including motion, turning, stopping, and firing

gamepads

someone gains unauthorized access to our computer or other computers that contain information about us.. These people are commonly known as computer ____________. -It should be noted that not all hackers are intent on malicious actions and that not all are criminals.

hackers

Printer output is often called _____________________.

hard copy

combine the functionality of microphones and headphones. The microphone accepts audible input and headphones provide audio output. _____________ are an integral part of serious video game systems

headsets

any computer system connected to a network that provides access to its resources.

host

create or capture original images. These devices include digital cameras and webcams

image capturing devices

the information that people voluntarily post about themselves online

internet identity

a private network within an organization that resembles the Internet. Like the public Internet, intranets use browsers, websites, and web pages

intranet

What do output devices convert machine language into?

letters, numbers, sounds, and images that people can understand

refers to the tremendous amount of secondary storage required by large organizations

mass storage

this topology is the newest type and does not use a specific physical layout (such as a star or a tree). -Rather, this network requires that each node have more than one connection to the other nodes.

mesh network

short for modulator-demodulator enables digital personal computers to communicate across different media, including telephone wires, cable lines, and radio waves.

modems

What are commonly used output devices?

monitors, printers, audio and video output devices

any device that is connected to a network. It could be a computer, printer, or data storage device.

node

Cloud storage is also known as....

online storage

An __________________, also known simply as a scanner, accepts documents consisting of text and/or images and converts them to machine-readable form. These devices do not recognize individual letters or images. Rather, they recognize light, dark, and colored areas that make up individual letters or images. Typically, scanned documents are saved in files that can be further processed, displayed, printed, or stored for later use. There are four basic types of _________________: flatbed, document, portable, and 3D. They are powerful tools for a wide variety of end users, including graphics and advertising professionals who scan images and combine them with text

optical scanner

converts information processed by the system units into a form we can use

output devices

It is also wise to store files on an _______________ source.

outside

If you exceed the monthly data limit, wireless providers will start charging ________________. For example, one provider charges $10 for every extra gigabyte used. To minimize overage charges, consider the following: -WiFi access points -streaming music/video -downloading -moniter your data usage

overage charges

attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate

phishing

special-purpose printers for producing a wide range of specialized output. Using output from graphics tablets and other graphical input devices, _____________ create maps, images, and architectural and engineering drawings. __________ are typically used by graphic artists, engineers, and architects to print out designs, sketches, and drawings

plotters

ensures that your browsing activity is not recorded on your hard disk

privacy mode

rules for exchanging data between computers are known as

protocols

the process of accessing information from secondary storage

reading

each device is connected to two other devices, forming a ring. When a message is sent, it is passed around the ring until it reaches the intended destination.

ring network

use cameras, microphones, and other sensors as inputs. Based on these inputs, robotic outputs can be as complex as exploring damaged nuclear reactors to as simple as taking a photo. _____________ can be found almost everywhere including in a home vacuuming floors, in a factory assembling cars, on a farm sorting produce, and in hospitals assisting in surgery

robots

a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return

scam

provide a collection of utility programs designed to protect your privacy and security while you are on the web

security suites

a node that shares resources with other nodes. Dedicated servers specialize in performing specific tasks. Depending on the specific task, they may be called an application server, communication server, database server, file server, printer server, or web server.

server

measured in the number of pages printed per minute. Typically, printers for personal use average 15 to 19 pages per minute for single-color (black) output and 13 to 15 pages per minute for color output

speed

way of coordinating the sharing of information and resources

strategy

contain web page content and instructions for displaying this content

temporary internet files or browser cache

provides very efficient direct text communication between individuals using short electronic messages.

texting

sending data to a satellite

uplink

elepresence seeks to create the illusion that you are actually at a remote location, seeing, hearing, and, someday maybe, even feeling as though you _________________. (robots)

were really there

programs that simply replicate themselves over and over again

worms

The benefits of cloud computing are...

1) Maintenance- the cloud takes care of encryption and security 2) Hardware upgrades- the cloud will never run out of space, can replace failed hard disks without interupption to the user 3) File sharing and collaboration- users can share info as long as they have an internet connection

If you accidentally delete a file, ______________...

1) Recovery/ undelete software 2) Testing USB ports 3) professional recovery services

Disadvantages of cloud storage include...

1) access speed- dependent on internet 2) File security- dependent on cloud's security

Secondary storage devices have always been an indispensable element in any computer system. They have similarities to output and input devices. Like _____________ devices, secondary storage devices receive information from the system unit in the form of the machine language of 0s and 1s. Rather than translating the information, however, secondary storage devices save the information in machine language for later use. Like _______________ devices, secondary storage devices send information to the system unit for processing. However, the information, since it is already in machine form, does not need to be translated. It is sent directly to memory (RAM), where it can be accessed and processed by the CPU.

1) output 2) input

For example, if you wanted to send an e-mail to a friend, you could create and send the message using your computer, the 1)_________________. Your modem, a 2)______________________, would modify and format the message so that it could travel efficiently across 3)_________________________, such as telephone lines. The specifics describing how the message is modified, reformatted, and sent would be described in the 4)_________________________________. After your message traveled across the channel, the receiver's modem, a connection device, would reformat it so that it could be displayed on your friend's computer, the 5)__________________.

1) sending device 2) connection device 3) communication channels 4) data transmission specifications 5) receiving device

Creating and knowingly spreading a virus is a very serious crime and a federal offense punishable under the ________________.

Computer Fraud and Abuse Act

makes it a crime for unauthorized persons even to view—let alone copy or damage—data using any computer across state lines. It also prohibits unauthorized use of any government computer or a computer used by any federally insured financial institution

Computer Fraud and Abuse Act

modem uses standard phone lines to create a high-speed connection directly to your phone company's offices. These devices are usually external and connect to the system unit using either a USB or an Ethernet port.

DSL (digital subscriber line)

are the standard optical discs in PCs. ________ are very similar to CDs except that typical DVD discs can store 4.7 GB (gigabytes)—seven times the capacity of CDs. Optical discs that store movies or software are often _________. _______ drives and CD drives look very similar.

DVDs (digital versatile disks)

These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel.

Data transmission specifications

is provided by telephone companies using existing telephone lines to provide high-speed connections. ADSL (asymmetric digital subscriber line) is one of the most widely used types of this; is much faster than dial-up.

Digital subscriber line (DSL) service

were once too expensive for anything but military budgets. However, today's ___________ are inexpensive, faster, and smarter, making them a valuable tool and fun high-tech toy. Most ____________ take input from a controller from either a radio joystick or a Wi-Fi connected tablet or laptop. The ___________ act as an output device, sending back video and sound to the user. The resulting combination of video and aerial maneuverability has made ___________ a popular choice for a wide variety of activities ranging from amateur cinematographers to civil engineers

Drones, or unmanned aerial vehicles (UAV)

dedicated mobile devices for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Two well-known __________________ are Amazon's Kindle and Barnes & Noble's Nook Simple Touch

E-book readers (e-readers)

traditional printed books in electronic format. These books are available from numerous sources including many public and private libraries, bookstore websites, and the cloud

E-books (electronic books)

There are a variety of different standards or ways in which nodes can be connected to one another and ways in which their communications are controlled in a LAN. The most common standard is known as ___________________.

Ethernet (Ethernet LANs)

is showing up in some areas, but it is a new technology and not widely available. Current providers include Google and Verizon with speeds faster than cable or DSL connections.

Fiber-optic service (FiOS)

Protects sensitive files by encrypting them before they are stored on a hard drive. Files can be encrypted individually, or specialized software can be used to encrypt all files automatically each time they are saved to a certain hard drive location

File encryption

act as a security buffer between a corporation's private network and all external networks, including the Internet

Firewalls

a service that supports cloud printing. Once a user activates a printer using the Google Chrome OS, the user can access that printer anywhere with a smartphone or any other type of computer that is connected to the Internet. For example, you could use a smartphone from almost anywhere to send documents to be printed on a printer located at your home or school

Google Cloud print

federal law that protects personal financial information

Gramm-Leach-Bliley Act

responsible for maintaining the security of a company's networks, systems, and data. Their goal is to ensure the confidentiality, integrity, and availability of information

IT security analysts

the illegal assumption of someone's identity for the purposes of economic gain

Identity Theft Identity theft

What are the 3 basic types of flat-panel monitors?

LCD (liquid crystal display) is widely used for older monitors and is typically less expensive. LED (light-emitting diode) monitors use similar technology with a more advanced backlighting technology. They produce better-quality images, are slimmer, and are more environmentally friendly as they require less power and use fewer toxic chemicals to manufacture. Most new monitors are LED. OLED (organic light-emitting diode) monitors replace the LED monitor's backlighting technology with a thin layer of organic compound that produces light. By eliminating the backlight, OLED monitors can be even thinner with better power efficiency and contrast ratios

monitors use similar technology with a more advanced backlighting technology. They produce better-quality images, are slimmer, and are more environmentally friendly as they require less power and use fewer toxic chemicals to manufacture. Most new monitors are _______________.

LED (light-emitting diode)

What does LTE stand for?

Long Term Evolution

used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips. A special-purpose machine known as a reader/sorter reads these numbers and provides input that allows banks to efficiently maintain customer account balances.

Magnetic-ink character recognition (MICR)

What are the 3 types of character and mark recognition devices?

Magnetic-ink character recognition (MICR)—used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips. A special-purpose machine known as a reader/sorter reads these numbers and provides input that allows banks to efficiently maintain customer account balances. Optical-character recognition (OCR)—uses special preprinted characters that can be read by a light source and changed into machine-readable code. A common OCR device is the handheld wand reader. (See Figure 6-12.) These are used in department stores to read retail price tags by reflecting light on the printed characters. Optical-mark recognition (OMR)—senses the presence or absence of a mark, such as a pencil mark. OMR is often used to score standardized multiple-choice tests.

The most frequently used output device is the ___________. Also known as display screens, ___________ present visual images of text and graphics. The output is often referred to as soft copy. ______________ vary in size, shape, and cost. Almost all, however, have some basic distinguishing features.

Moniters

a computer specialist responsible for efficient network operations and implementation of new networks

Network Administrator

manage a company's LAN and WAN networks -They may be responsible for design, implementation, and maintenance of networks. Duties usually include maintenance of both hardware and software related to a company's intranet and Internet networks. -are typically responsible for diagnosing and repairing problems with these networks. -Some duties include planning and implementation of network security as well.

Network Administrators

as discussed in Chapter 5, these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter.

Network Interface Cards (NIC)

control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources.

Network Operating Systems (NOS)

uses special preprinted characters that can be read by a light source and changed into machine-readable code. A common _____________ device is the handheld wand reader. These are used in department stores to read retail price tags by reflecting light on the printed characters.

Optical-character recognition (OCR)

type of wireless network that works within a very small area—your immediate surroundings. -connect cell phones to headsets, keyboards to cell phones, and so on. These networks make it possible for wireless devices to interact with each other.

Personal Area Network (PAN)

larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.

RAID systems

holds or stores data and programs that the CPU is presently processing. Before data can be processed or a program can be run, it must be in __________. For this reason, ____________ is sometimes referred to as primary storage.

RAM (random access memory)

tiny chips that can be embedded in most everything. They can be found in consumer products, driver's licenses, passports, and any number of other items. (See Figure 6-11.) These chips contain electronically stored information that can be read using an RFID reader located several yards away. They are widely used to track and locate lost pets; to monitor production and update inventory; and to record prices, product descriptions, and locations of retail items

RFID (radio-frequency identification) tags

improve performance by expanding external storage, improving access speed, and providing reliable storage; The connected hard-disk drives are related or grouped together, and the computer system interacts with the ___________ system as though it were a single large-capacity hard-disk drive. The result is expanded storage capability, fast access speed, and high reliability. For these reasons, _________ is often used by Internet servers and large organizations

Redundant arrays of inexpensive disks (RAID)

any injury that is caused by fast, repetitive work that can generate neck, wrist, hand, and arm pain. RSI is by far the greatest cause of workplace illnesses, resulting in compensation claims totaling billions of dollars and lost productivity every year

Repetitive strain injury: Repetitive strain injury (RSI)

are similar to write-once discs except that the disc surface is not permanently altered when data is recorded. These changeable, portable storage options are popular for storing and sharing audio, video, and large multimedia presentations.

Rewritable (RW for rewritable or RAM for random-access memory) discs

Free Wi-Fi networks are available almost everywhere from libraries to fast-food restaurants and coffee shops. These imitate these free networks. These rogue networks operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any and all information sent by the users to legitimate sites including user names and passwords.

Rogue Wi-Fi hotspots

designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data; are faster and more durable than hard disks, also require less power, which can lead to increased battery life for laptops and mobile devices; are more expensive and generally have a lower capacity than hard disks, but this is changing as their popularity continues to increase

SSDs (solid state drives)

started in the 1990s using digital radio signals.

Second-generation mobile telecommunications (2G)

Asks..How can access to sensitive information be controlled, and how can we secure hardware and software?

Security

Another widely used Internet protocol is ______________________-. The essential features of this protocol involve (1) identifying sending and receiving devices and (2) breaking information into small parts, or packets, for transmission across the Internet.

TCP/IP (transmission control protocol/Internet protocol)

2 different types of codes

UPC and MaxiCode codes. UPCs (Universal Product Codes) are widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records. MaxiCode is widely used by the United Parcel Service (UPS) and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages.

widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records.

UPCs (Universal Product Codes)

delivers a much clearer and more detailed wide-screen picture than regular HDTV. Because the output is digital, users can readily freeze video sequences to create high-quality still images. The video and still images can then be edited and stored for later use. This technology is very useful to graphic artists, designers, and publishers. One of the most recent and dramatic advances is 3D ________________ Using special viewing glasses, 3D ______________ provides theater-quality three-dimensional viewing

Ultra-high-definition television (UHDTV)

What happens to RAM in an instance like a power outage?

Unfortunately, most RAM provides only temporary or volatile storage. That is, it loses all of its contents as soon as the computer is turned off. Its contents also are lost if there is a power failure that disrupts the electric current going into the system unit. This volatility results in a need for more permanent or nonvolatile storage for data and programs. We also need external storage because users need much more storage capacity than is typically available in a computer's primary or RAM memory.

What is another name for drones?

Unmanned Aerial Vehicles (UAV)

create a secure private connection between a remote user and an organization's internal network. -Special VPN protocols create the equivalent of a dedicated line between a user's home or laptop computer and a company server. The connection is heavily encrypted, and, from the perspective of the user, it appears that the workstation is actually located on the corporate network.

VPN (Virtual Private Networks)

-the most widely used wireless network encryption for home wireless networks -typically established for a wireless network through the network's wireless router -While the specifics vary between routers, is usually set through the router's settings options

WPA2 (Wi-Fi Protected Access)

Secures web transactions, especially financial transactions

Website encryption

a new standard that extends the range of Wi-Fi networks using microwave connections; is commonly used by universities and others to extend the capability of existing Wi-Fi networks.

WiMax (Worldwide Interoperability for Microwave Access)

countrywide and worldwide networks. These networks provide access to regional service (MAN) providers and typically span distances greater than 100 miles. They use microwave relays and satellites to reach users over long distances

Wide Area Networks (WANs)

can be written on once. After that, the disc can be read many times but cannot be written on or erased. These discs are ideal for creating permanent archives, such as CD-R, often used for storing family photos, and DVD-R, often used to store home movies.

Write-once (R for recordable) discs

also known as additive manufacturing, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed. There are a variety of different processes and materials that can be used to create each layer. One of the most common sprays a liquid plastic or plasticlike substance through a nozzle similar to an inkjet printer (price dropped to as low as $200)

additive manufacturing

indicates the proportional relationship between a display's width and height. Typically, this relationship is expressed by two numbers separated by a colon (:). Many older, more square-shaped monitors have a 4:3 __________________. Almost all newer monitors have a 16:9 __________________ designed to display wide-screen content

aspect ratio

translate audio information from the computer into sounds that people can understand. These devices connect to a sound card within the system unit. This connection can be by cable to an audio jack on the system unit, or the connection can be wireless

audio-output devices

To help avoid back and neck problems, make sure your equipment is adjustable. You should be able to adjust your chair for height and angle, and the chair should have good back support. The monitor should be at eye level or slightly below eye level. Use a footrest, if necessary, to reduce leg fatigue

back and neck pain

a measurement of the width or capacity of the communication channel. Effectively, it means how much information can move across the communication channel in a given amount of time. For example, to transmit text documents, a slow ____________ would be acceptable. However, to effectively transmit video and audio, a wider __________ is required. There are four categories...voiceband, medium band, broadband, and baseband.

bandwidth

widely used to connect individual computers that are located close to one another. Like broadband, it is able to support high-speed transmission. Unlike broadband, however, this can only carry a single signal at a time.

baseband

devices such as fingerprint and iris (eye) scanners

biometric scanning

Nearly everyone uses a credit card, debit card, access (parking or building) card, and/or some type of identification card. These cards typically have the user's name, some type of identification number, and signature on the card. Additionally, encoded information is often stored on the card. ________________ interpret this encoded information

card readers

including Verizon, AT&T, Sprint, and T-Mobile, support voice and data transmission to wireless devices using cellular networks. These networks have gone through different generations. First-generation mobile telecommunications (1G) started in the 1980s using analog radio signals to provide analog voice transmission service. Second-generation mobile telecommunications (2G) started in the 1990s using digital radio signals. Third-generation mobile telecommunications (3G) started in the 2000s and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones.

cellular service providers

use central servers to coordinate and supply services to other nodes on the network. The server provides access to resources such as web pages, databases, application software, and hardware -widely used on internet -advantage ability to handle very large networks efficiently

client/ server

printers connected to the Internet that provide printing services to others on the Internet

cloud printers

This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.

communication channel

an essential element of every communication system. These actually carry the data from one computer to another. There are two categories: One category connects sending and receiving devices by providing a physical connection, such as a wire or cable. The other category is wireless

communication channels

perhaps the most invasive and dangerous type of spyware. One type known as a keystroke logger

computer monitering software

a communication system that connects two or more computers so that they can exchange information and share resources; can be set up in different arrangements to suit users' needs.

computer network

These devices act as an interface between the sending and receiving devices and the communication channel. They convert outgoing messages into packets that can travel across the communication channel. They also reverse the process for incoming messages.

connection devices

a concept related to using computer networks to link people and resources. For example, ________________ means that you can connect your personal computer to other computers and information sources almost anywhere.

connectivity

uses similar technology as flat-panel monitors except it has a concave screen that provides better viewing angles near the edges of the screen. _________________are widely use for high-end televisions and for gamers searching for a highly immersive viewing experience. ________________ are just beginning to appear in smartphones and wearable computers. For smartphones, ______________ allow the screen to wrap around the edge of the phone for alternative display and button options. For smartwatches, a curved screen allows for large displays that contour to the shape of your wrist

curved monitor

runs through each track of a stack of platters. ____________ are necessary to differentiate files stored on the same track and sector of different platters. When a hard disk is formatted, tracks, sectors, and _____________ are assigned.

cylinders

defines how much data you can download using your 3G or 4G connection. These plans can be very confusing, but for most individuals, the plan that gives you a few gigabytes per month is best. Although a few providers have unlimited _________________, they may slow down, or throttle, your connection speed significantly if they deem that your usage is excessive.

data plans

These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel.

data transmission specifications

the process of converting from analog to digital

demodulation

attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data

denial of service (DoS) attack

refers to how tightly these charges can be packed next to one another on the disk.

density

capture images digitally and store the images on a memory card or in the camera's memory. Most _______________ are also able to record video as well. Almost all tablets and smartphones have built-in ________________ capable of taking images and video. You can take a picture, view it immediately, and even place it on your own web page, within minutes.

digital cameras

specialized devices with a large display connected to a computer or projector. The computer's desktop is displayed on the digital whiteboard and controlled using a special pen, a finger, or some other device. ___________________ are widely used in classrooms and corporate boardrooms

digital or interactive whiteboards

project the images from a traditional monitor onto a screen or wall. This is ideal for presentations or meetings when several people need to see the screen at the same time

digital projectors

large organizations; describing ways to continue operating until normal computer operations can be restored

disaster recovery plans

similar to a flatbed scanner except that it can quickly scan multipage documents. It automatically feeds one page of a document at a time through a scanning surface.

document scanner

the distance between each pixel. Most newer monitors have a _____________ of 0.30 mm (30/100th of a millimeter) or less. The lower the ________________ (the shorter the distance between pixels), the clearer the images produced

dot (pixel) pitch

allows automatic printing on both sides of a sheet of paper. Although not currently a standard feature for all printers, it will likely become standard in the future as a way to reduce paper waste and to protect the environment

duplex printing

Viruses and worms typically find their way into personal computers through ____________________.

e-mail attachments and programs downloaded from the Internet

buying and selling goods electronically

electronic commerce

highly detailed and personalized descriptions of individuals.

electronic profiles

provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents

email

many businesses search employees' electronic mail and computer files using ___________________. These programs record virtually everything you do on your computer.

employee-monitoring software

Most large organizations have established a strategy called an ______________________________ to promote efficient and safe use of data across the networks within their organizations

enterprise storage system

the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. For computer users and manufacturers this means designing input and output devices to increase ease of use and to avoid health risks

ergonomics

-essential element that controls how computers are used today -standards of moral conduct

ethics

provide slower access and are typically connected to a USB or Thunderbolt port on the system unit and are easily removed. Like an internal hard disk, ___________ hard disks have a fixed amount of storage. However, since each removable hard disk can be easily replaced by another removable hard disk, a single port on the system unit can provide access to an unlimited amount of storage; use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk. Because they are easily removed, they are particularly useful to protect or secure sensitive information. Other uses for _________________.include backing up the contents of the internal hard disk and providing additional hard-disk capacity

external hard drives

increase storage capacity by reducing the amount of space required to store data and programs. File compression is not limited to hard-disk systems; File compression programs scan files for ways to reduce the amount of required storage. One way is to search for repeating patterns. The repeating patterns are replaced with a token, leaving enough tokens so that the original can be rebuilt or decompressed. These programs often shrink files to a quarter of their original size. EX/ Winzip

file compression and decompression

a type of cookie that is generated (and then read) only by the website you are currently visiting

first-party cookie

small solid-state storage devices widely used in portable devices. Some of the cards are used within devices such as laptops, smartphones, and GPS navigation systems. Other cards provide removable storage. For example, ___________ is used to store images captured from digital cameras and then to transfer the images to desktop and other computers. ____________ is used in digital media players like the iPod to store and play music and video files

flash memory cards

Solid-state storage devices provide access to _________________; offers a combination of features of RAM and ROM. Like RAM it can be updated and like ROM it does not lose information when a computer is turned off. Flash memory is a little slower than traditional memory but much faster than traditional hard disks.

flash memory, also known as solid-state storage

the most widely used type of monitor today. Compared to other types, they are thinner, are more portable, and require less power to operate

flat-panel monitors

much like a copy machine. The image to be scanned is placed on a glass surface, and the scanner records the image.

flatbed scanner

devices that provide input to computer games. While keyboards and traditional mice can be used as __________________, the four most popular and specialized __________________ are joysticks, gaming mice, gamepads, and motion-sensing devices

game controllers

similar to traditional mice with higher precision, faster responsiveness, programmable buttons, and better ergonomics

gaming mice

translates handwritten notes into a form that the system unit can process.

handwriting recognition software

save files by altering the magnetic charges of the disk's surface to represent 1s and 0s. _______________ retrieve data and programs by reading these charges from the magnetic disk. Characters are represented by positive (+) and negative (−) charges using the ASCII, EBCDIC, or Unicode binary codes.

hard disks

use rigid metallic platters that are stacked one on top of another; store and organize files using tracks, sectors, and cylinders

hard disks

occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface. A ____________ is a disaster for a hard disk. The disk surface is scratched, and some or all of the data is destroyed. At one time, ____________ were commonplace. Now, fortunately, they are rare; so thin that a smoke particle, fingerprint, dust, or human hair could cause it

head crash

has earphones and three-dimensional stereoscopic screens

headgear

what are some common combination devices?

headsets, multifunctional devices, telephones, drones, robots, and virtual reality headgear and gloves

Tree network is used to share corporatewide data and is also known as _________________________.

hierarchal network

There are a variety of different standards or ways in which nodes can be connected to one another and ways in which their communications are controlled in a LAN. The most common standard is known as -used by individual sin homes and apartments

home network

Wireless access points that provide Internet access are widely available in public places such as coffee shops, libraries, bookstores, colleges, and universities. These access points are known as _____________ and typically use Wi-Fi technology.

hotspots

-the most widely used Internet protocol -This protocol requires that the browser and the connecting site encrypt all messages, providing a safer and more secure transmission.

https (hypertext transfer protocol secure)

is widely used to protect the transfer of sensitive information

https, or hypertext transfer protocol secure

They think that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy. Experts call this the _____________________.

illusion of anonymity

spray ink at high speed onto the surface of paper. This process produces high-quality images in a variety of colors, making it ideal for printing photos. ______________ are relatively inexpensive and are the most widely used printers. In addition, they are reliable and quiet. The most costly aspect of _____________ is replacing the ink cartridges. For this reason, most users specify black ink for the majority of print jobs and use the more expensive color printing for select applications. Typical ____________ produce 15 to 19 pages per minute of black-only output and 13 to 15 pages of color output

inkjet printers

Large organizations constantly compile information about us and store it in ______________________.

large databases

the most common card reader. The encoded information is stored on a thin magnetic strip located on the back of the card. When the card is swiped through the ________________card reader, the information is read

magnetic card reader

specialized high-capacity secondary storage devices designed to meet organizational demands for data storage. These mass storage solutions allow large corporations and institutions to centralize their maintenance and security of data, thereby reducing costs and personnel.

mass storage devices

the physical material that holds the data and programs

media

used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances. This bandwidth is capable of very-high-speed data transfer.

medium band

within a printer is used to store printing instructions and documents waiting to be printed. The more ______________, the faster it will be able to print large documents

memory

communication uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication because can only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances. Thus, this is a good medium for sending data between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of stations with dishes or antennas.

microwave

the electronic profile of one person is switched with another

mistaken identity

a stand-alone device that connects to a 3G or 4G network. It will then allow multiple devices near it to access the Internet via a Wi-Fi connection.

mobile hotspot device

the name of the process of converting from digital to analog

modulation

What is 'modem' short for?

modulator-demodulator

controls a pointer that is displayed on the monitor

mouse

usually appears in the shape of an arrow. It frequently changes shape, however, depending on the application

mouse pointer

typically combine the capabilities of a scanner, printer, fax, and copy machine. These ____________ offer a cost and space advantage. They cost about the same as a good printer or copy machine but require much less space than the single-function devices they replace. Their disadvantages are lower quality and unreliability. The output quality for any one function is often not quite as good as that of the separate single-purpose devices. The reliability of ___________ suffers because problems with one of the functional parts can make the entire device inoperable. Even so, ________________ are widely used in home and small business offices

multifunctional devices (MFD)

can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. ___________________ are commonly used with tablets and smartphones, as well as some laptop computers and desktop monitors

multitouch screens

describes how a network is arranged and how resources are coordinated and shared

network architecture

\a device that allows one LAN to be linked to other LANs or to larger networks

network gateway

Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the message is sent, it is reformatted or broken down into small parts called packets. Each packet is then sent separately over the Internet, possibly traveling different routes to one common destination. At the receiving end, the packets are reassembled into the correct order.

packetization

nodes have equal authority and can act as both clients and servers. The most common way to share games, movies, and music over the Internet -growing in popularity because people are wanting to share worldwide

peer-to-peer (P2P) network

laser printers that are less expensive and are used by a single user. They typically can print 15 to 17 pages a minute

personal laser printers

provide an intuitive interface with the system unit by accepting physical movements or gestures such as a finger pointing or moving across a screen and converting these movements into machine-readable input

pointing devices

one of the most important features. Images are formed on a monitor by a series of dots or pixels (picture elements). (See Figure 6-15.) __________ is expressed as a matrix of these dots or pixels. For example, many monitors today have a _____________ 1,920 pixel columns by 1,080 pixel rows for a total of 2,073,600 pixels. The higher a monitor's ____________ (the more pixels), the clearer the image produced

resolution

or a printer is similar to monitor _______________-. It is a measure of the clarity of images produced. Printer __________________, however, is measured in dpi (dots per inch). Most printers designed for personal use average 1,200 by 4,800 dpi. The higher the dpi, the better the quality of images produced

resolution

putting guards on company computer rooms and checking the identification of everyone admitted

restricted access

communication uses this orbiting about 22,000 miles above the earth as microwave relay stations. orbit at a precise point and speed above the earth. They can amplify and relay microwave signals from one transmitter on the ground to another; can be used to send and receive large volumes of data. Uplink is a term relating to sending data to a ________________. Downlink refers to receiving data from a _____________. The major drawback to this communication is that bad weather can sometimes interrupt the flow of data One of the most interesting applications of these communications is for global positioning. A network owned and managed by the Department of Defense continuously sends location information to earth. Global positioning system (GPS) devices use that information to uniquely determine the geographic location of the device. Available in many automobiles to provide navigational support, these systems are often mounted into the dash with a monitor to display maps and speakers to provide spoken directions. Most of today's smartphones and tablets use GPS technology for handheld navigation.

satellite

convert scanned text and images into a form that the system unit can process. There are five types of ____________________: optical scanners, card readers, bar code readers, RFID readers, and character and mark recognition devices.

scanning devices

If you don't have the right ___________________, your computer will slow to a crawl, your digital camera won't take pictures, and your phone won't be able to run apps.

secondary storage

provides permanent or nonvolatile storage

secondary storage

such as a hard-disk drive, data and programs can be retained after the computer has been shut off. This is accomplished by writing files to and reading files from ______________________

secondary storage devices

used to save, back up, and even transport files consisting of data or programs from one location or computer to another

secondary storage devices

Each track is divided into invisible wedge-shaped sections called _________________. (on hard disks)

sectors

Matters of ________________ prompt most of the questions concerning today's computer usage.

security

involves protecting individuals and organizations from theft and danger. -specifically focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.

security

often a computer or specialized communication device. They originate (send) as well as accept (receive) messages in the form of data, information, and/or instructions.

sending and receiving devices

typically support color, are more expensive, and are used (shared) by a group of users, typically print over 50 pages a minute

shared laser printers

each device is connected directly to a central network switch. -Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. -is the most widely used network topology today. It is applied to a broad range of applications from small networks in the home to very large networks in major corporations.

star network

-recent mass storage development is ______________. _________ is an architecture to link remote computer storage devices, such as enterprise storage systems, to computers such that the devices are as available as locally attached drives. In a __________ system, the user's computer provides the file system for storing data, but the ____________ provides the disk space for data. The key to a __________ is a high-speed network, connecting individual computers to mass storage devices. Special file systems prevent simultaneous users from interfering with each other. __________ provide the ability to house data in remote locations and still allow efficient and secure access.

storage area networks (SAN systems)

hardware that reads data and programs from storage media. Most also write to storage media

storage devices

central node that coordinates the flow of data by sending messages directly between sender and receiver nodes. A hub previously filled this purpose by sending a received message to all connected nodes, rather than just the intended node.

switch

____________ can also display e-books. They are larger, heavier, and more expensive than e-book readers. They are also much more flexible, with displaying e-books being only one of their any number of applications. Unlike dedicated e-book readers, these _____________ use LCD displays that provide crisp, colorful images; however, they are difficult to read in bright light due to their reflective nature. Two well-known traditional ____________ are Apple's iPad and Samsung's Galaxy Tab

tablets

What is the primary difference between a PAN, LAN, MAN, and WAN?

the geographic range

What are the signals put in by the keyboard sent to and processed by?

the system unit

Like a mouse, a ______________ is used to control the mouse pointer and to make selections. Unlike a mouse, however, a ____________ operates by moving or tapping your finger on the surface of a pad. These devices are widely used instead of a mouse with laptops and some types of mobile devices

touch pad

The speed with which modems transmit data varies. This speed, called ________________, is typically measured in millions of bits (megabits) per second (Mbps). The higher the speed, the faster you can send and receive information. For example, to download a complete full-length motion picture (700 MB) on a 1.5-Mbps modem would take about 1 hour. Using a 10.0-Mbps modem would take about 9 minutes.

transfer rate

these keyboards are used primarily with mobile devices and tablets. Unlike other keyboards, ___________ keyboards do not have a physical keyboard. Rather, the keys are typically displayed on a screen and selected by touching their image on the screen.

visual keyboards

use a microphone, a sound card, and special software. These systems allow users to operate computers and other devices as well as to create documents using voice commands. As discussed in Chapter 4, most smartphones include a digital assistant that uses voice recognition to accept voice commands to control operations. Apple phones come with Siri, Windows phones come with Cortana, and Google phones come with Google Now

voice recognition systems

A wireless local area network is typically referred to as a __________________.

wireless LAN (WLAN)

All communications pass through the network's centrally located _____________________. This interprets incoming radio frequencies and routes communications to the appropriate devices

wireless access point or base station.

The single most dramatic change in connectivity and communications in the past decade has been the widespread use of mobile devices like smartphones and tablets with ____________________________.

wireless internet connectivity

also known as a WWAN (wireless wide area network) modem. Almost all computers today have these built-in. For those that do not, wireless adapter cards are available that plug into USB or special card ports.

wireless modem

the process of saving information to the secondary storage device

writing

computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes

zombies


Conjuntos de estudio relacionados

chapter 30: Unemployment and Labor Force Participation

View Set

Chapter 11: Completing The Audit

View Set

Honors Biology Chapter 14 section 6

View Set

History and Systems of Psychology exam 2, Chapter 8- Physiology and Psychophysics, Chapter 8: Physiology and Psychophysics, Chapter 8: Physiology and Psychophysics, Chapter 8: Physiology and Psychophysics, Chapter 7 - Romanticism and Existentialism,...

View Set