IT and Computer Hardware

¡Supera tus tareas y exámenes ahora con Quizwiz!

Ethical behaviors IT follow

-Be fair and honest with customers. -Respect confidentiality of data. -Do not use access to computer systems in unprofessional or inappropriate ways. -Protect passwords and system access of users. -Protect sensitive information. -Do no harm to a company when leaving voluntarily or involuntarily.

Identify the peripherals that require a sound card to work:

-CD-ROM -Microphone -Speaker

Advantage

-Computing "comes to us" -Wireless is globally available for communication -Businesses can reduce costs for office space, since work can be done from most anywhere

Which of the following activities may be legal but are unethical?

-Cookies deposited by websites collect information about your browsing habits -A law enforcement officer asks you to eavesdrop on a friend's phone conversations -A computer browser records your browsing history

Check the devices that are internal peripheral devices

-DVD drive -e-Card readers

Identify what a computer needs to communicate sound:

-Driver -Digital sound

paperless society ideal

-Electronic documents give more people access to knowledge and information -Information loss is reduced when electronic copies are made -Paper waste is reduced

How does technology improve productivity at home?

-Enables online download of music -Enables reading while exercising -Reduces the need for printing

How does technology improve productivity at work?

-Enables sending documents to multiple recipients -Provides savings on travel expenses by supporting virtual meetings -Provides flexible work schedules and environments

In what ways can technology help you be more productive?

-Enables you to create electronic documents that present your ideas clearly and effectively -Enables you to communicate with people anywhere in the world -Enables you to store documents on a thumb drive

Storage devices include:

-Hard drive -Flash drive -CD -DVD

Disadvantage

-Managers expect employees to always be available -Employees are available for work while on vacation -Wireless technology creates a more complex work/life balance -Salary does not cover 24/7 worker availability

Identify industries and career-based activities in which computer technology makes people's work easier or more efficient (Industries)

-Medicine -Banking -Finance

digital age actually increased paper usage:

-People print e-mails for archiving, to make them easier to read, and to create a paper trail -The Internet caused more printing of research -Networked all-in-one printers, copiers, and scanners encouraged people to make multiple copies of documents

Identify industries and career-based activities in which computer technology makes people's work easier or more efficient (Career-Based Activities)

-Pharmacist filling a prescription -Doctor diagnosing a patient -Teacher keeping track of student grades -Stock broker keeping track of stock prices

Computer life cycle

-Planning for and purchasing equipment -Deploying computers -Supporting and upgrading -Retiring computers

The call center employee clearly explains the doctor referral process in simple terms and asks if the caller has any questions about it

-Protect passwords and system access of users -Protect sensitive information

Which of the following tasks would be very difficult using only a keyboard and text?

-Renaming a file -Drawing a picture -Writing a document -Playing games -Sending an e-mail

Which of the following are peripheral devices?

-Speakers -Graphic cards

Which of the following are current and emerging advancements in technology?

-Tablet computer -Cloud storage

The mental health hotline receives a wide range of calls from people who are considering getting help from a doctor to people who are experiencing life-threatening situations. The call center employee is a caller's first point of contact; this employee directs all calls to the appropriate medical professional

-The call center employee makes sure to speak in a calm voice and ensures that the caller is directed to a medical professional who can provide help -The call center employee clearly explains the doctor referral process in simple terms and asks if the caller has any questions about it

Which of the following explains the growing need for a standard IT professional licensing program?

-There are few certification programs that are robust enough to be Microsoft ANSI-accredited -An IT professional can be termed a certified professional by attending some program certifications.

Which of the following are peripheral devices that could be connected to the computer you are using?

-Web camera -Mouse -Keyboard -Graphics card

Network

-an interconnection of computers sharing data and peripherals -transformed computing by they providing fast, easy access to messages or data and to other users

Which of the following describes a hot spot?

-an unsecured wireless network -inherently vulnerable to hackers -susceptible to third-party viewing

How can computers contribute toward creating a "paperless society"?

-by using LMS online programs in primary and secondary education -by increasing the scope and type of input devices -by making information available online to a larger number of people

Which of the following describe advantages of miniaturization?

-cheaper -faster -portable -use power more efficiently

Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way?

-checking social media networks during working hours -surfing the Internet during working hours for what to do on the weekend -downloading a favorite band's latest album from a file-sharing service

All of the following activities are legal when requested by a law enforcement officer, but they may be unethical. Which are unethical?

-collecting browsing history from a cell phone's browser -obtaining a record of phone calls -recording a phone conversation -disclosing e-mail activity

IT professionals have a responsibility to find and use wireless devices that have which of the following features?

-compatibility -ability to work well with other wireless devices -ability to communicate wirelessly with other devices, such as a printer and laptop

Douglas Engelbart

-computer inventor -demonstrated many new computing technologies, including the computer mouse

buy a new computer:

-computer is more than five years old -New software may be needed that will not run properly on older hardware -not enough memory or hard drive space on the old computer -current computer system is slow

What are the most important considerations when comparing computer systems?

-computer speed -amount of storage

Which of the following is an advantage of word processing productivity programs?

-create versions of documents -save and modify documents indefinitely -create a variety of layouts using text and graphics -check a document for spelling and grammar accuracy

Which of the following storage devices are portable?

-external hard drive -flash drive

Which of the following are input devices commonly used on a computer?

-keyboard -mouse

Which of the following are input devices?

-keyboard -mouse -scanner

Which of the following describes a possible consequence of IT professionals acting in an unethical way in the workplace?

-loss of job -negative impact on reputation

How have productivity programs improved the professional lives of people?

-made it easier and faster to communicate with others -made it easier to manipulate numbers in a spreadsheet -made it easier and less expensive to present information

Check the devices that are external peripheral devices:

-mouse -keyboard

Which of the following statements is true of wireless cellular networks?

-operate on a grid pattern -search for signals to confirm that service is available -provide voice communications and Internet connectivity

Spreadsheets are used for:

-personal finance -tax preparation -invoices and accounting -data manipulation

Choose all stages of the information processing cycle.

-processing -storage -input -output

Which of the following are ethical guidelines an IT professional might use in his or her daily work?

-protect the best interests of an employer -be fair and honest with customers -protect customers' best interests -protect his or her own best interests

Word processing programs

-provide many advantages for document creation -Instead of writing everything down on paper, word processing programs allow people to type documents that can be easily modified and manipulated

The main benefits of computers are their ability to:

-save files -retrieve files -modify files

Which output device would a teacher use to show a movie to the class?

-speakers -projector

machine cycle

-the process of getting instructions from RAM -decoding them for the computer to understand -executing the instructions -storing the result back to memory

IT professionals have a responsibility to educate employees about the risks of hot spots. Which of the following are risks associated with hot spots?

-third-party viewing -unsecured public network -potential for computer hackers -unauthorized use

Electronic Numerical Integrator and Computer (ENIAC)

-took up 1800 square feet and weighed 30 tons

laser printers

-use a laser beam and static electricity to transfer words and images to paper -are primarily business printers because they produce high-quality printed material and are expensive to purchase

Which of the following actions is a good example of protecting sensitive information?

-using a paper shredder to discard documents that contain personal medical information -keeping patient files in a secure electronic file system with limited access -maintaining a confidential patient consultation area in a doctor's office

Mainframe computers

-very large and had heavy power consumption -those limitations meant they were not practical for any but the most important calculations

Which of the following activities is not permissible for IT professionals while on the job?

-working on a side job while at work for one's primary job -viewing sexual content on a company computer -sending coworkers an e-mail joke containing suggestive humor -downloading music from a file-sharing service

gigabytes

1 billion bytes

megabytes

1 million bytes

terabytes

1 trillion bytes

kilobytes

1,000 bytes

safest way to install external hardware:

1.Plug it in, usually through a USB port 2.Wait for your computer to detect the hardware 3.Follow the instructions on the pop-up dialog box 4.Install the drivers, if necessary, using the computer's automatic process for finding drivers or the installation disk that came with the hardware

Based on the trend in the graph, the best prediction for the number of transistors on a circuit in 2020 is ______

10 trillion

In 1971, integrated circuits had about ______ transistors

2 thousand

By 2011, some circuits had more than ______ transistors

2.5 billion

How many bits are in one computer byte?

8

Which IEEE standards define Wi-Fi technology?

802.11 standards

External hard drive

A portable device to store all types files, including photos, movies, and music

Thumb drive

A small-scale version of an external hard drive

For which of the following careers is technology's speed factor most important?

Air traffic controller

Cloud storage

An online repository that allows you to save files on servers instead of on your personal devices

___________ enables information to be viewed in an easily understandable format

An output device

a low-power radio wave used for short distances

Bluetooth

Wireless cellular networks divide regions into smaller blocks or

Cells

Which of the following is an information storage method that allows you to save files on Internet servers instead of on your computer devices?

Cloud storage

information processing cycle

Computer software performs four basic operations -Input -Processing -Output -Storage

Portability:

Consider where you will be using the system the most - in different locations, or in a fixed location like your home, school, or office

An IT worker discloses his employer's business and financial plans to a competing company

Corporate Espionage

The CPU converts _________ into information.

Data

Price and maintenance

Desktops are used primarily for business offices because they are easier to upgrade, less expensive to buy, and a lower security risk than laptops

A computer programmer turns over all access to files before leaving a company for retirement

Do no harm to a company when leaving

Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?

Do not use computer access or the Internet for unprofessional or inappropriate purposes

Smatphones

Enable you to call, text, video chat, and send e-mail

Virtual meeting

Enable you to video-conference with people around the world

Social media

Enables you to keep in touch with friends, family, and coworkers

All of the following are information storage methods that make people's personal and professional lives more productive, except:

Ethernet

All of the following are methods of communication except:

External hard drive

Which of the following ports offers a fast connection that could be used to download and watch your favorite TV shows?

FireWire

Many people use __________ instead of maps

GPS

Which port carries high-definition video and audio in one connection?

HDMI port

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

HIPAA

Which of the following is true of laws governing the actions of IT professionals?

HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow

Examples of ______ include the central processing unit and random access memory

Hardware

A computer system is made of two main parts: ______ and ______

Hardware, Software

Which of the following statements is true of licensing procedures for IT professionals?

IT professionals are primarily governed by the information they use

digital signal is a series of on and off messages — 1s and 0s. There's no message between on and off.

Numerical Example: 0 1 0 1 1 0 0 1

analog signal is a series of messages that can have a range of different values between 0 and 1, such as 0.5 or 0.75

Numerical Example: 0.3, 0.54, 0.27, 0.8

Which device stemmed from the original cell phone and allowed for synchronized contact information?

PDA

toner

Powdered ink used in a laser printer

How did punch cards improve the weaving process?

Punch cards allowed a weaver to give instructions to the loom

wireless technology that lets you identify and track objects

RFID

Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person's hands?

Respect confidentiality of data.

An angry executive who is terminated from Company A reveals Company A's key ingredient for its most popular soda to Company B. In return, the executive is paid $10 million

Sale of trade secrets

Sale of Trade Secrets

Selling trade secrets involves the release of information about a highly confidential product or service to the public

A college student needs a laptop that can be used while commuting on the train and sitting in lecture

Size

Which device followed the PDA?

Smartphone

Productivity programs are an example of ______

Software

A parent needs a computer that can hold family photos

Storage

Turing's Machine

The device would read, change, add, or remove symbols on the tape -Turing imagined a device moving along a strip of tape

Which of the following statements is true of the digital age and its intention to create a paperless society?

The digital age intended to create a paperless society, but it actually increased paper usage

Sampling rate

The number of measurements per second -measured in Kilohertz (kHz)

Moore's Law

The number of transistors that can be inexpensively placed on a circuit doubles approximately every two years

Identity Theft

Theft of personal identification such as Social Security numbers, bank account numbers, and credit card and medical information can result in financial ruin for the victim

Software Piracy

This involves making unauthorized copies of computer software and distributing application or source codes

Corporate Espionage

This type of espionage involves the release of confidential corporate financial or product information to competitors -It can cause great damage to a company.

For which of the following careers is technology's connectivity factor most important?

Traveling salesperson

Turing's Legacy

Turing is often called the father of modern computing

Turing's Key Insight

Turing supposed that he could perform any calculation with his device

Which of the following ports is the most common on computers?

USB

Sneaker-Net

Users had to copy data to a floppy disk and then physically hand it to someone else, who then had to load it onto another computer

What is the basic port used to connect a computer to a screen?

VGA port

The most secure form of encryption is referred to as

WPA

Which of the following scenarios describes an IT professional using good methods to protect passwords and system access of users?

When setting up the e-mail program for each employee's computer, the IT professional has the employee enter his or her e-mail password to protect privacy.

Power sources

While laptops are portable, they depend upon batteries. The more applications and processing power needed, the shorter the battery life. Batteries tend to wear out over time and may need to be replaced every six to twelve months

smartphone

a cell phone that enables you to call, text, video chat, and send e-mail

Smartphone

a cell phone that has added functionality

device driver (software driver)

a computer program that allows higher-level computer programs to interact with a hardware device

minicomputers (PCs)

a computer that is small and affordable enough for personal use

desktop computer

a computer with separate hardware components for the monitor, keyboard, and mouse

tablet computer

a computing device that uses a touch screen interface

Analog signals

a continuous wave that fluctuates infinitely within its frequency range

Mouse

a device external to a computer usually operated by hand and used to move the mouse button to interact with graphical elements on the screen -The internal version of this is a touchpad -an electronic device external to a computer and operated by hand

Scanner

a device that captures a copy of an image or document and then transmits it to a computer -Scanners, then, convert a paper document into an image storable on a computer -an electronic device that captures a copy of an image or document and then transmits it to a computer

graphic cards

a device that is installed in a computer to assist with processing and displaying images

Microphone

a device used to pick up sound to record with a computer -This may be internal or external -an electronic device that records sound

Camera

a device used to record still and moving images that can be stored on a computer

surge protector

a device with an electrical cord that plugs into the wall

digital signal

a distinct and separate signal that operates in "on and off" states

Double data rate (DDR)

a fast type of RAM

microprocessor

a general purpose computer that fits onto a single computer chip -can receive input for calculations and then output results

Computer forensics

a growing discipline in the IT industry -purpose is to search and analyze computer activity to find evidence for a trial

motherboard

a large circuit board that contains all electronic components for data processing

Bluetooth

a low-power radio wave, and is used only for short distances (30 feet max) to connect wireless devices -Wireless headsets -Wireless computer mice -Hands-free, in-car microphones and speakers -Wireless printers and scanners

server

a main hub of storage for many different computers connected through a network

Analytical Engine

a mechanical computer -could be instructed with punch cards to calculate many different mathematical problems

widget

a mini program that performs a function with one click or keystroke -stock tickers -weather update programs

Local Area Network (LAN)

a network that is confined to a small area -usually limited to a single geographic area, such as a home, school, or work site

Institute of Electrical and Electronics Engineers (IEEE)

a nonprofit professional organization that develops computer technology standards

Computer

a noun that means someone or something that computes

cache

a part of the computer's memory where information that needs to be found quickly is located

Virtual memory (VM)

a part of the hard drive that can function as RAM, if needed

bad sector

a part of the hard drive that is physically damaged

I/O port

a physical plug-in point on a computer that can be used for inputting data and outputting information

peripheral

a piece of computer hardware that may be added or connected to a computer to expand its capabilities

Random access memory (RAM)

a piece of computer hardware that temporarily stores information when software is being used

video card

a piece of hardware that controls the appearance and display of images on your computer's screen

tablet computer

a portable computer, smaller than a laptop, that is operated by a touch screen

External hard drive

a portable device to store all types of files, such as photos, movies, and music

e-textbook

a portable electronic textbook viewable on a computer

Sleep

a power-saving mode that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again

Encryption

a security measure that changes the format of data so that others cannot view it without password access

electronic circuit

a series of electronic components that channel the flow of electric current

Keyboard

a set of keys or buttons used to enter letters, numbers, and symbols into a computer -a system of keys used to send text and other input to a computer.

Short Message Service (SMS)

a short text message that contains only text - no pictures, audio, or video

Personal digital assistants (PDAs)

a small hand-held device that resembles a touch-screen computer -do business calendaring, e-mail, phone service, and spreadsheet applications all in one mobile device

Flash drive (USB drive)

a small-scale portable version of an external hard drive

PDAs were replaced by

a smartphone

computer driver

a software program that controls the installation of hardware devices

bus

a subsystem that either transfers data between peripherals and the central processing unit (CPU) or between computers

Ethernet

a system of cables or wireless connections to link computers over a network

Radio frequency identification (RFID )

a type of wireless technology that lets you identify objects that have been fitted with special tags

interactive whiteboard

a wall-mounted board that responds to touch; information is projected onto the board through a digital projector connected to a computer

File systems

a way to organize files so you can easily locate them based on specific criteria, such as date, type, or category

Each card has its own uniquely identifiable

address

Printers

allow a user to create a paper copy of what is on the screen

Speakers or earphones

allow a user to hear sound

Multimedia Messaging Service (MMS)

allows you to send regular text-only messages as well as audio, video, and pictures

system bus

an electrical route on a computer that transfers information between core components, such as the CPU, motherboard, and RAM

integrated circuit (microchips)

an electronic circuit that combines all the electronic components onto a single surface, or circuit board

touch-screen

an electronic display surface on which user inputs are made through touch

transistor

an electronic switch that turns electrical current on and off -replaced the need for vacuum tubes, allowing computing devices to shrink and consume far less electricity

port

an interface between computer devices

Hibernation

another power-saving mode, but it is designed primarily for laptops

nodes

any computer or digital device (wired or wireless) using the network to exchange data between other computers

The term software refers to ______ that direct hardware what to do

applications

Presentation

applications are used to display slide show-style presentations

Wireless technology changed the workday to

around-the-clock availability

Computer A: -2.6 GHz processor -512 GB hard drive -8 GB RAM

better processor and RAM

The computer processor speed is 4.5 GHz, which means the processor performs at 4.5 ______ machine cycles per second

billion

What is the basic unit of measurement for RAM specs?

byte

a high-end gaming computer

can also be required for editing high-definition videos and manipulating music and image files

laptops

can weigh less than 3 pounds and are comparable in computing speed to many desktop computers

punch cards

cards with patterns of holes punched into them

In a classroom, an interactive whiteboard replaced the

chalkboard

The debit card replaced the need to use

checks

______ is an area of IT work that focuses on the investigation and analysis of computer activity for use in a trial

computer forensics

random access memory (RAM)

computer hardware that temporarily stores information when software is being used

The CPU is responsible for

controlling all computer functions

Documents

convey the written word electronically and in print by allowing users to input and modify text and images

3D printers

create a 3D object from a digital file

Smartphone technological advancements added ________ services

data

hertz (Hz)

defined as machine cycles per second

Network interface cards (NICs)

developed to allow computers to communicate using networking standards -today are built into new computers and are integrated into the motherboard during manufacture

External peripherals

devices that attach outside the computer -keyboard -mouse -monitor -printer -scanner -webcam -microphone.

Moonlighting business

doing work for a secondary job -moonlighting while at your primary job could get you fired

vacuum tubes

electrical switches that switched on or off to store digital signals

Roaming

enables cellular customers to continue making voice calls and connect to the Internet when away from home

Sound cards

expansion cards that allow the computer to output, input, or manipulate sound

top-of-the-line computers

expensive, as they include powerful graphics cards, very fast hard drives, fast processors, and higher-quality monitors, sound cards, and speakers than budget or entertainment computers

Identity theft is a breach of

good ethical practices

computing device used with Bluetooth

hands-free microphone in a car

Input devices

hardware that send data to a computer -text -sound (audio) -video (visual) -example: keyboard or mouse

Computer B: -2.4 GHz processor -650 GB hard drive -6 GB RAM

has more internal memory

Budget computers

have only basic capabilities and are cheaper than other computers -may be cheaper than other computers, but it is not as capable of handling movies, games, or software programs that manipulate large media files

Computer speed is measured in

hertz

Processing

how computers sort and handle inputs. Processing turns inputs into outputs.

Storage

how files are saved on computer hardware -a file is saved on a hard drive when a software program tells the computer where to store a file

Communication

how people interact with others

A help desk employee uses a customer's credit card number to make a small purchase

identity theft

Pixels

illuminate to create the images or text

graphics card

increases the computer's capacity to generate images to display -example of internal peripheral

Classified information

information withheld from the general public to protect national security

A student types text into a word processing program

input

The keyboard and mouse are examples of ______ devices

input

The part of the information processing cycle in which raw data is received is known as

input

Expansion cards

inserted into slots to add memory or graphics capabilities or to support special devices

Internal peripherals

integrated into the computer -CD drives -DVD drives -internal modems, slots -expansion cards -e-card readers

Which key hardware component was typically not included in first-generation personal computers?

internal hard drive

core

is a microprocessor

The Wi-Fi alliance

is a trade group that promotes wireless technology and owns the trademark for the term "Wi-Fi."

E-mail

is considered by some to be the most important program because of its popularity and wide use

thumb drive

is essentially a smaller version of an external hard drive.

Slowing down a process

is not a reason why new technologies are introduced to a profession.

byte

is often, but not always, a series of eight bits -Example: 0 1 0 1 1 0 0 1 (0: off, 1: On)

Bluetooth

is wireless technology used for short distances in devices like remote controls, hands-free headsets, and printing

looms

machines that weave fibers into complex patterns -to change the shape of the weave, an entirely new loom needed to be built

analog signal

made of physical waves that travel through matter

read-only memory (ROM)

makes up a small portion of the computer's memory

The CPU is the mastermind of the computer, controlling everything that goes on through a series of

mathematical sequence

Miniaturization

means that computers became smaller over time

Another name for the CPU is

microprocessor

Wireless technology is best described as a/an

mobile computing system

A computer screen that is contained in its own case and is not part of the computer system is called a

monitor

A high-resolution screen has

more pixels

The first cell phones in widespread use were

mounted in cars and not very portable

Classified government information should not be disclosed to the public because it is a risk to

national security

An IT worker at a government agency tells his friends about the work he is doing for computers aboard spy planes

national security breach

Wireless cellular networks

networks that operate on a grid pattern that divides regions like cities into smaller blocks or cells

Which of the following behaviors does not harm a company if your employment is terminated?

notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave

Raw data

numbers and characters on a computer hard drive or file that have not been processed

hard drive failure

occurs when the hard disk malfunctions and all data stored on the hard disk becomes inaccessible

bit

one individual digital signal

Slots

openings in a computer where printed circuit boards can be inserted to expand the computer's capabilities

The computer shows possible misspellings on the screen

output

The series of mathematical steps taken by the CPU during processing results in

output

medical uses of RFID

patient identification

Advancements in technology occur because

people need to solve new problems

Hardware refers to the _________________ of a computer

physical components

Peripherals

pieces of computer hardware that may be added to your computer (internally or externally) to expand its capabilities -Sound cards (handle sound) -graphic cards (handle images) -network cards (handles network connections)

word processing software

prepare written work, such as a book report, calendar, or party invitations

Storage is different from RAM because for storage, information is _________, even if power is turned off

preserved

Which output device allows a user to create a copy of what is on the screen?

printer

inkjet

printer works by spraying ink onto paper

Sensitive information

privileged information owned by an organization -If such information is lost, misused, or disclosed, the organization could be harmed

The computer checks and compares all words entered to find misspellings

processing

The part of the information processing cycle where raw data is converted into meaningful information is

processing

Software refers to the ______________that direct hardware to perform a task

programming instructions

Spreadsheet

programs have revolutionized the accounting industry

HIPAA Privacy Rule

provides federal protections for personal health information held by some businesses

hot spots

public Wi-Fi networks, such as those found in restaurants, airport terminals, coffee shops, and cafes -NOT secure

The memory used by the CPU to temporarily hold data while processing is called _______

random access memory

The type of memory used during the processing cycle is

random access memory

Information storage

refers to how and where you save digital information

Disclosure of ______ could seriously damage a company

sensitive information

program

series of simple commands

Monitor or display

shows text, graphics, and video on the screen

Advancements in technology often make computer hardware and software more convenient to use as well as able to fit a variety of budgets. As technology advances, it usually gets

smaller and less expensive

Why did cell phones gain in popularity?

smaller and lighter components

A technological device used by IT professionals to check e-mail, make phone calls, and surf the Internet while away from the office is a/an

smartphone

Examples of ______ include multimedia and presentation applications

software

Productivity programs

software applications used to create documents, organize data, and present information -Microsoft Word -Excel -PowerPoint -Outlook/Gmail

A software developer makes a copy of the software she is using at one job so she can use it in her other job

software privacy

Drivers

software programs that communicate with the operating system and other software regarding how to communicate with a specific piece of hardware

learning management system (LMS)

software used to administer and deliver online courses and track users' progress

Learning Management Systems (LMS)

software used to administer and deliver online courses, and to track users' progress

CDs and DVDs are examples of

storage

You save the revised document to the hard disk

storage

What is the primary function of RAM?

stores information temporarily

A computer with sufficient RAM will be able to ______ with greater ease

switch between applications

A portable technological device is a

tablet computer

Output devices

take computer data and translate it into visual and auditory signals that humans can interpret

Wi-Fi

technology that enables an electronic device to communicate wirelessly over a computer network using the IEEE 802.11 standards

CPU or microprocessor

the "brain" of the computer

VGA port

the commercial standard port to connect a screen to a computer

Optical drive

the disk drive in or attached to a computer that reads CDs or DVDs - uses electromagnetic waves to read or write data from inserted CDs or DVDs

A computer is an electronic device that performs four basic operations called________

the information processing cycle

Internal hard drive

the main storage device inside a computer where programs and files are saved

hard drive

the main storage device inside a computer where programs and files are saved

computer specifications

the measurement of how well a computer will perform

all-in-ones

the monitor and CPU are contained in one case

The CPU is located on what part of the computer?

the motherboard

Wired equivalent privacy (WEP)

the original standard and is good for home use, but it is not the most secure

Central Processing Unit (CPU)

the processing and control center of the computer -controls all tasks that go on in a computer -it takes inputs and turns them into outputs

Output

the result of a processed input

Sectors

the small units that make up the sections of a hard disk

monitor

the visual output hardware

High resolution

there are more pixels per square inch

Technology makes people's lives more productive because

they can do things more efficienlty

Sampling

to measure the wave at frequent intervals and turn it into 0's and 1's

Laser printers use a special powdered ink called

toner

Braille embossers

translate text into braille

What can you do if a computer is running slowly and you suspect it is because you have insufficientRAM?

upgrade the RAM

digital

use electrical impulses represented as 0's and 1's

Projectors

use projected light to throw a computer screen image onto a wall

Roaming

used to describe connecting to a foreign cellular network when outside the geographic area of one's home network

Presentation applications

used to display slide show-type presentations on a computer -Microsoft PowerPoint

Media Access Control (MAC)

used to identify the computer where data on a network originates

Wi-Fi protected access (WPA)

uses a stronger method of encryption and is used by businesses. WPA is the most secure

binary number system

uses the digits 0 and 1 to represent all numbers

decimal number system

uses the ten digits from 0 to 9 to represent all numbers -Also known as base ten or denary

Which of the following activities is permissible for IT professionals in the conduct of computer access and authorizations?

using the company's e-mail software to send work-related e-mails

Input

what goes into the computer, such as data from another device or user

microprocessor (CPU)

where computer processing occurs. It is located on the motherboard

paperless society

where things that traditionally require paper could be replaced by electronic versions

hard disks

which are magnetic disks used to save data in storage


Conjuntos de estudio relacionados

Essentials of Psychiatric Mental Health Nursing Chapters 1-24

View Set

Set12_news, congrats,what about,correct

View Set

PrepU Atraumatic care of children and families

View Set