Intro to Computers Final Review
Lion
A Mac OS release name.
Linux
A UNIX like computer open source operating system.
USB
A common connectivity specification.
VPN
A computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by dedicated physical wires.
File Manager
A computer program that provides a user interface to work with file systems.
Instant Messenging (IM)
A form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared clients.
Utility Software
A kind of system software designed to help analyze, configure, optimize and maintain the computer.
Latency
A measure of time delay experienced in a system.
Multitasking
A method where multiple tasks, called processes, share CPU resources.
Mesh
A network that has a web like structure with potentially each node has a point to point link with every other node.
Peer-to-Peer
A network where every computer can communicate with all the other machines on the network, but in general each one stores its own files and runs its own applications.
Internet Addiction
A possible medical condition involving overuse of technologies that provide Internet access.
Virus
A program that has infected some executable software and, when run, causes the virus to spread to other executable files.
Attenuation
A signal gets weaker the further it travels, because some of its energy is absorbed by the transmission medium.
SAN
A storage network set up to exclusively back up data from different computers on a central backup server.
Intranet
A typically private network that is meant to allow local communication only.
Cache Memory
A very fast type of memory that is found within the processor.
ECPA
Act that makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions.
Keylogging
Action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
Full Backup
All system data is copied to a backup media, most often once a day.
Computer
An electronic device that is able to follow instructions, written in programs, to manipulate data.
Research
Any gathering of data or information.
Adware
Any software package which automatically plays, displays, or downloads advertisements to a computer.
Time Management Matrix
Categorizes activities into quadrants based upon importance and urgency.
Workstation
Characterized by high-performance processors and graphics displays, with large local disk storage, networking capability, and running under a multitasking operating system.
Digital Divide
Chasm, or barrier, between those that do not have access to information and communication technologies and those that do.
Network
Composed of two or more computers that communicate over a wired or wireless medium to share data and other resources, exchange files, or to provide for communications.
Application Software
Computer software designed to help the user to perform specific tasks, such as create a presentation.
Embedded Systems
Computer systems with specific control functionality within a larger system, often with real-time constraints.
Tethering
Connecting a computer to a cell phone signal for the purpose of accessing the Internet.
Internetwork
Connection of multiple computer networks via a common routing technology using routers.
Cookie
Data stored on a user's computer that assists in automated access to web sites or web features, or other state information required in complex websites.
Communication Protocols
Defines the formats and rules for exchanging information via a network.
Internet Privacy
Desire or mandate of personal privacy concerning transactions or transmission of data via the Internet.
Firewall
Device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
Peripherals
Devices connected to a computer that are dependent upon the computer for operation.
E-Waste
Discarded electronics that contains hazardous materials.
Last Mile
Distance between communities and residences and the internet service provider's communications network.
Virtualization
Emulating another platform on a running system.
Assistive Technology
Enables persons with disabilities to perform tasks that they previously were unable to perform.
Metasearch
Enables users to enter a search query once and have it run against multiple search engines simultaneously, creating a list of aggregated search results.
Evernote
Example of Internet Research Software.
Symbian
Example of a mobile operating system.
Sound Card
Facilitates the input and output of audio signals to and from a computer under the control of computer programs.
Jaquard Loom
First machine to use punched cards to control a sequence of operations.
GUI
Graphical user interface.
GPU
Handles all of the mathematical and geometric calculations for image rendering.
HTML
Hypertext Markup Language.
HTTP
Hypertext transfer protocol.
Repetitive Stress Injury
Injury to the soft tissues (tendons) in the hand and/or wrist.
Spyware
Is a type of malicious software that can be installed on computers, and which collects small pieces of information about users without their knowledge.
Open Source
Is licensed, free software that comes with the source code that users may modify and redistribute.
Folder
Known as directory.
Nettop
Low-cost, lean-function, desktop computers.
System Software
Manages and integrates a computer's capabilities, but typically does not directly apply them to the direct benefit of the user.
Application Suite
Multiple applications bundled together. They usually have related functions, features and user interfaces, and may be able to interact with each other.
Client-server Network
One or more servers will perform critical functions on behalf of the other machines (the clients) on the network.
Web Dictionary
Organizes subjects in a hierarchical fashion that lets users investigate the breadth of a specific topic and drill down to find relevant links and content.
ARPENET
Original research network that lay the foundation for today's Internet.
Upward Compatible
Programs written for the older machines can be executed on the new machine.
TCP
Provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.
Software Piracy
Refers to several practices which involve the unauthorized copying of computer software.
Protocol
Rules for communicating.
HTTPS
Secure HTTP.
Boolean Operator
Serves to define relationships between words or groups of words. Include AND, OR, & NOT.
Web Browser
Software application for retrieving, presenting, and traversing information resources on the World Wide Web.
Operating System
Software that manages computer hardware resources, runs other programs, and provides common services for the user and application software.
Ergonomics
Study of how people physically interact with their work and involves fitting the job, the equipment and the work environment to the worker.
Parallel Processing
The ability to carry out multiple tasks simultaneously.
Platform
The combination of hardware and operating system.
Electromechanics
The combination of the sciences of electromagnetism, of electrical engineering and mechanics.
Display Resolution
The number of distinct pixels in each dimension that can be displayed.
Clock Rate
The number of pulses per second.
Moore's Law
The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years.
Computer Ethics
The practice of making a principled choice between right and wrong as applied to computer technology and its use.
Motherboard
The primary circuit board within a personal computer.
Cloud Computing
The use of and access to multiple server-based computational resources via a network.
Plagiarism
To steal and pass off the ideas or words of another as one's own or tow use another's production without crediting the source.
Digital Footprint
Trail left due to interactions in the digital environment.
VPN (7)
Type of network access that requires remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.
End User License Agreement
Typically state the software manufacturer is not responsible should the installation of the software cause issues with the user's computer or data.
URL
Uniform resource locator.
Mobile Computing
Use of computing technology while on the go.
Transistor
Used to amplify a signal or as an on/off switch. Is found is most modern electronic devices.
Hierarchical File System
Uses directories to organize files into a tree structure.
Conditional Branching
Where a sequence of programming code is executed at a branching point only when certain conditions are either true or false.
CSMA/CD
Where a transmitting data station detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.