CSCI 1000 chapter 1-5 exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

shareware

Small developers often use the _____ model as a low-cost distribution method

VOIP

sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection

mobile

technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.

embedded

term used to describe an object, software, or hardware that is independent and does not need an external program or device to run it

interpreter

translates source code into machine code one line at a time

RAM

type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes.

device driver

A _____ is software that helps peripheral devices communicate with a computer

disk cleanup

A _____ utility removes unused files like temporary Internet files from your hard drive so the computer doesn't search through unneeded files

power supply

A device that provides power to a computer

boolean operator

A word or symbol that identifies the relationship between keywords, such as AND, OR, and NOT

link

A(n) _____ is a connection to a different area on the Web page, another Web page on the same site, or even a Web page on a different site

embedded computer

A(n) ______________ is a tiny special-purpose computer included as a component in a larger product

W3C

Agency that sets standards and guidelines for the Web

peripheral

An add-on device that extends a computer's functionality; for example, by adding printing, scanning, or video capturing capabilities

web apps

An advantage to _____ is that you always have access to the most up-to-date version of the software without paying for an upgrade

telecommuting

An arrangement that employees who need flexible work schedules use to work from home is called ______

web crawler

An automated program that uses hyperlinks to jump between Web pages and collect data

EULA

Another term for a single-user license

wireless network

Any type of computer network that is not connected by cables of any kind

asynchronous

Because a blogger doesn't need to be online at the same time that readers are, a blog is considered _____ communication.

computer aided

Companies streamline production and perform tasks too dangerous or monotonous for humans using _____ manufacturing

open source

Copyrighted software whose source code is available to the public is known as _____ software

C2C

Craigslist is a popular _____ Web site

tim berners lee

Created the World Wide Web in 1989

search engine

Creates a query based on your search criteria and stores the data it collects in a database

motion

Creating the appearance of _____ by displaying a sequence of still images is called animation.

tablet

Device often used for online applications such as Web browsing or e-mail, but not great for creating complex spreadsheets

scanner

Device that converts a printed document into a bitmap file and assigns colors to each cell

SaaS

Google Drive is an example of _____ , which runs software directly from the Internet

binary code

Groupings of 1's and 0's that makes information that a computer can understand

synchronous

In ______________ online education, the instructor holds a class that students attend virtually and at the same time.

timeline

Method used in editing video, using separate tracks for video and sound

B2B

Most e-commerce actually occurs between businesses and is called the ____ model

cookies

Online shopping sites track items that you select using _____

douglas englebart

Patented the first mouse in 1970

hardware

Physical elements of a computing systems (printer, circuit boards, wires, keyboard, etc)

vertical market

Productivity software that is customized for specific industries

spyware

Programs that can track and steal your personal information and change the settings on your browser without your permission are called _____

machine language

Programs written in binary code

ROM

Read Only Memory-Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware

digital certificate

Secure Web sites often use a _____, which verifies the identity of a person or an organization

software

Set of instructions that tells the hardware what to do. It is what guides the hardware and tells it how to accomplish each task.

CAD

Software used by architects, scientists, designers, and engineers to create technical drawings

OS

Software used to control the computer and its peripheral equipment

hard drive

Storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces. The device is either permanently installed within the computer case or can be portable

DRM

Technologies that include encryption to make digital content unreadable without a valid encryption key

streaming video

Technology that transfers only a segment of a video file at a time from the Web to your computer

DNS server

The Internet's system for converting alphabetic names into numeric IP addresses

enterprise computing

The computer network a business uses to let employees communicate with customers, vendors, and other employees is referred as _____

ARPANET

The first computer network, consisting of four computers, created by the U.S. Department of Defense

digital divide

The gap between people who can access digital information and those who cannot is called the _____

copyright

The legal right to copy, distribute, modify, and sell an original work

encryption

The process of temporarily scrambling data so it is not readable is called ____________

ergonomics

The study of safe and efficient working environments

keyword stuffing

The unethical practice of manipulating meta keywords to push a Web site to the top of a search result list

productivity

Type of application software that automates common or repetitive tasks

lossy

Type of compression used in JPEG files where some of the original file data is discarded

vector

Type of graphic image based on simple objects that can be grouped and layered

bitmap

Type of graphic image where colors are assigned to individual screen pixels

shrink wrap liscence

Type of license agreement for packaged software, which is activated when you open the package

utility

Type of program that includes device drivers

system

Type of software that is categorized as operating system (OS) software and utility programs

aggregate

Web sites such as NexTag and PriceGrabber are called _____ sites because they collect and organize data from other Web sites and transmit it to consumers

e-commerce

When you make purchases over the Internet, you are engaging in _____

streaming video

When you play _____, the server transmits a small segment of a file that starts to play on your computer while the server is sending the next segment

m-commerce

When you use wireless mobile devices to make retail purchases, you are engaging in ____________.

virus protection

You should set your _____ software to scan any incoming messages and programs to protect your computer

ASPs

_____ provide software-based services over the Internet

ip address

a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication

digital literacy

ability to access, process, understand and create information or media content in the digital environment

service pack

collection of major system updates

asynchronous

communication in which messages are sent and received at different times

video card

connects to the motherboard of a computer system and generates output images to display

printer

device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper

output device

device that projects images, gives sound, and basically gives out the info from the computer so the user can obtain it (ex: monitor, printer, projector, speakers)

input device

device used to insert data into a computer or other device (ex: keyboard, mouse, microphone, scanner, voice recognition)

amazon

e-commerce

high level language

easier for humans to understand

monitor

electronic visual computer display that includes a screen, circuitry and the case in which that circuitry is enclosed

VPN

extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network

cable modem

hardware device that allows your computer to communicate with an Internet service provider over a landline connection

social media

interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks

malware

malicious software

speaker

output hardware device that connects to a computer to generate sound

firmware

permanent software programmed into a read-only memory

desktop

personal computer that fits on or under a desk. It has a monitor or another display, keyboard, mouse, and either a horizontal or vertical (tower) form factor

memory

physical device capable of storing information temporarily

CPU

piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system

hard drive

primary computer storage device, which spins, reads and writes one or more fixed disk platters

motherboard

printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted

digital forensics

process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events

storage

process through which digital data is saved within a data storage device by means of computing technology

utility software

provides additional functionality to the operating system

network

set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet

keyboard

set of typewriter-like keys that enables you to enter data into a computer or other devices

mouse

small handheld input device that controls a computer screen's cursor or pointer in conjunction with the way it is moved on a flat surface


Conjuntos de estudio relacionados

End-Diastolic Volume, End-systolic volume, and Stroke Volume Output

View Set

Philippine History - American Times

View Set

Clinical Chemistry: Quality Control/Assurance (Exam 2)

View Set

Chapter11, Chapter10, Chapter6, Chapter9

View Set

Essentials for continued success for social media

View Set

Sadlier-Oxford Vocab Level H - Unit 1 - 9

View Set

3.2 Independent and Mutually Exclusive Events & 3.3 Two Basic Rules of Probability

View Set