Lecture 1: Computers and Networking (+ chapters 2-4)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

ResearchGAte

a professional networking site for researchers and scientists that allows members to share research post published papers, and collaborate with others

LInkedIN

a professional social networking site that proves a way to connect with other business professionals, share information, or look for new career opportunities

Google Chrome (aka Chrome), Safari (primarily for Macintosh), and Firefox. Internet Explorer (unreliable)

common web browsers and their reliability

hardwired

computers wired together or wired to something that physically exists

router

connect multiple devices to the same network; has one or two antennas to transmit the wifi signal

network

connection of two or more computers, which allows the computer to communicate

operating systems

controls how software and files are managed, stored, and displayed.

when the license comes in a package and you distribute it as a stand alone software when it should come all together; selling stand alone software with an accompanying product

describe OEM unbundling

-U.S. law, Title 17 that provides exclusive rights to the originator of a document, film, record, music, art, software, etc. -The symbol, © does not have to be present to be considered copyrighted material.

describe copyright law

License explains where and how it can be installed. Examples: -Only one computer -Multiple computers, but only one copy used at a time -Multiple computers for one user

describe the copyright license

shareware

developers of this software encourage users to give copies to friends and colleagues to try out; continuing to use this without paying the registration fee is software piracy

No control over content as not on your server, security, sometimes targeted by online thieves.

disadvantages of cloud computing

email

electronic mail

urban legends

false stories repeated so many times that people believe them to be true

broadband

high speed or wide data transmission via computers

pharming

hijacks the user when they have entered a correct URL but are taken to an alternate website

nearly all web pages (your bank, Eaglesnest, etc.) are now secure -see a lock at one corner of the screen, often near the URL, when the website is secure and encrypted (128- to 256-bit), which mean you can safely enter data there without it being captured by a thief.

how do you know if a website is secure?

Voice over Internet Protocol (VoIP)

terminology for telephony product, which allow one to make a telephone call anywhere in the world with voice and video by using the Internet, thereby bypassing the phone company

dynamic IP address

the IP address that changes each time a user connects to the internet

speech recognition

the ability to translate the spoken work into text

backup and sharing

the advantages of cloud computing

freeware

the application the programmer has decided to make freely available to anyone who wishes to use it; it is closed source with some restricted usage rights; the author maintains the copyright

Linux

the computer system used by developers and non mainstream users

operating system (OS)

the most important program on your computer; coordinates input from the keyboard with output on the screen, responds to mouse and touch pad clicks, heeds commands to save a file and retrieves files etc - provides access to applications such as office software and email

to access online software and/or file storage on remote servers - it gives better access to files - it is more secure

the purpose of cloud computing

bandwidth

the rate of digital communication for data transmission

open source

the software that has copyright protection , but the software source code is available to anyone who wants it - purpose: to allow other people to make improvements of the code and make a bug-free product

intranet, extranet, and VPN

there are three main types of networks for internet use:

Social Engineering

using deception to obtain unauthorized access to information resources

social networking

websites that serve to connect millions of users worldwide

WPA2

what is a better security than WPA because it uses an advanced encryption standard

since 1992, felony with fines and jail time.

when has software piracy been an issue? and what is the consequence?

Graphical User Interface (GUI)

which means that instead of typing in commands in a computer language to get our software to run, we can use an input device: mouse, trackpad, etc. to point and click for commands.

two-factor authentication

which requires personal info for account changes to prevent unauthorized users from hacking your account

nodes

wireless devices that pick up signals sent by a user and transmit them to the central server or rebroadcast them to another node

folksonomy

word descriptor tags used for content and often achieved by group consensus

applications (apps)

work with a specific operating system

data encryption

you can use _________________________ software to encrypt an entire hard drive or encrypt selected files; to access encrypted files you must decrypt them

hashtag

#; identifies the keyword or topic of the Tweet

Wireless (Wi-Fi)

A network connection where a device does not need to be hard wired to the internet but connects to it using a modem and router, which emits a signal through an antenna.

Real Simple Syndication (RSS) Feeds

A nurse frequently reads/follows a blog where a group of nurses write about caring for terminally ill patients. What term describes the feature that automatically sends an alert to the nurse when a new post is added?

Webcast

A nurse needs to renew her license and decides to use the Internet to obtain continuing education credits. The nurse views a one-way presentation about new treatment options for coronary artery disease. Which one of the following is the nurse using?

public domain software

A program distributed for free without a copyright.; there are no copyright restrictions

Professional Networking

A subset of social media where interactions focus on business themes.

iCloud

Apple's version of cloud storage; includes free cloud office apps, pages, numbers, and keynote; it also includes an address book, Contacts.

internet telephone

Computer software and hardware that can perform functions usually associated with a telephone.

intranet

a private network within an organization, which allows users of an organization to share information

corporate piracy

Illegal duplication of copyrighted material for use within an organization; Healthcare and Educational Institutions have been fined for this; have heavy fines

OneDrive

Microsoft office also provides free cloud file storage capabilities using _________________________

javascript

Scripting language often used to create interactive web pages.

data encryption

What feature allows an individual to password protect their files so that thieves will not be able to steal their data.

virtual private network

What term describes a private network that uses the Internet to share its information and is encrypted to prevent others from seeing it? (Doctors and nurse practitioners must use this network when accessing/documenting medical records from their home computers.)

Should consider if software is proprietary, shareware, or freeware. Consider if the friend will also still be using the software. Should not be using the same software if it is proprietary. If it is shareware, the student should be willing to pay if continues to use. Also if viruses/scanned, if compatible with the computer, etc.

Your friend offers to give you a software file to install on your computer. Identify the software information you should consider before installing a computer application given to you by a friend. Use correct terminology about each possible type of software license and explain the rationale for your decision.

Transmission Control Protocol (TCP)/ Internet protocol (IP)

a computer communication technology created by the US Defense Advanced Research Projects Agency

Web 2.0

a descriptor for what online companies and services that survived the dot.com bubble burst in 2000 had in common; includes the shift from only reading to reading, interacting, and writing on the Internet

out-of-office reply

a feature that will automatically send an out of office email to each person who sent an email

plug ins and add ons

a helper program for a web browser that increases the functionality of the browser

Digital Subscriber Line (DSL)

a home network that connects a router to the internet; uses a regular phone line

Webinar

a live seminar over the Internet where users must log in to a website address; audience members can ask questions during the presentation and the speaker can ask for feedback

computer virus

a malware program from the Internet designed to execute and replicate itself without the user's knowledge

twitter

a mini blogging platform where an individual can send messages of 140 characters or less, known as tweets, to family, friends, or the general web community photos and short videos can also be shared

Campus Area Network (CAN)

a network that encompasses a defined geographic area, such as a college campus

text speak

a new language system that uses letter, numbers, and symbols instead of spelling out words

wiki

a piece of server software that allows users to freely create and edit content on a web page using any web browser

Wikipedia

a popular free publicly edited online encyclopedia which began in 2001

java

a programming language that some websites use to display data

hoax

a sensational message claiming to contain a virus though it dose not contain one; damaging hoaxes can direct a use to delete a file that is necessary for a computer to function properly

internet radio

a social media form for streaming audio using the Internet

Facebook

a social media website that provides the ability for users to create personal pages, groups, and includes email messaging and chat features

Network Authentication

a standard for work and home computer networks that requires a user to enter an authentication code to use a secure Wi-Fi network

firwall

acts to block destructive forces; work with a router program to filter the traffic both coming in and out

URLs (Uniform Resource Locators)

addresses used to navigate

web cookies

allows a website to safe a message to the users computer from a web server

active server page

allows access to databased to present real-time data based upon the user's request

streaming

allows delivery of audio and video to the user before downloading the entire file

bookmarks/favorites

allows the user to save links to favorite websites from a menu

social media

allows us to share our stories, pictures, videos, career goals, research, and thoughts with others online using the Internet

static IP address

an IP address that remains the same each time the computer connects to the internet

Uniform Resource Locator (URL)

an address assigned to all web documents: usually begins with https://www

FaceTime

an app created by Apple that allows iPhone and iPad users to have video calls over Wi-Fi with others who have a Mac computer, iPhone , or iPad

listserv

an email discussion list of a group of people with a common interest such as pediatric nursing

extranet

an extension of an intranet with added security features; provides accessibility to the intranet to a specific group of outsiders

IP address

an identifier of four sets of numbers separated by periods or dots, making it possible for each computer on the internet to be electronically located

blog

an online weblog or discussion about thoughts or topics of interest

internet service provider

an organization that provides access to the internet

groupware

application suites or programs with multiple users to collaborate on same file.

proprietary

commercial software is _______________________-

collective intelligence

intelligence that emerges from group collaboration

chat

is a real-time typed conversation that takes place on a computer

Purchaser is only licensed to use, does not own the software.

is the purchaser owning the software?

phishing

legitimate looking email with instructions to confirm account information as an alternate hyperlink

hard disk loading

loading unauthorized copies of software to a computer; not original packaging is a red flag

Windows, Macintosh

main computer systems

ransomware

malicious software that blocks the victims access to their computers without paying a ransom; ransomware has attacked healthcare information systems worldwide

spyware

maliciously tracks web surfing and reads cookies to tailor advertisements and monitor key strokes

trojan horse

masquerades itself as a useful program then collects information like keystrokes to send to the remote attacker

Local Area Network (LAN)

network confined to a small area such as a building or a group of buildings

botnet

network of computers that have been hijacked by a virus then infects other computers that access that server

Metropolitan Area Network (MAN)

network that encompasses a city or town

Wide Area Network (WAN)

network that encompasses a large geographical area (might be two or more LANs)

illegal instillation

on more computers/users than allowed (soft-lifting)

YouTube and Vimeo

online video sharing sites

web browser

software used to access files from the world wide web, such as google chrome or firefox

Protocols

system of rules for data transfer

android and iOS

operating systems for the tablet and phone

domain name

originally showed the type of website the computer server belonged to, such as government or institution

Instagram

popular social media platform for photosharing

counterfeit software

producing fake copies of software

-office type applications -scheduling -financial management/inventory -EHRs are essentially groupware Office365, Google Drive, iCloud

purpose and types of groupware

malware

refers to all forms of computer software designed by criminals specifically to damage or disrupt a computer system often for profit

hacked

refers to unauthorized use of a social media account

microblogging

refers to very brief web journaling; could be simply a sentence fragment

-OneDrive, iCloud, Google Drive, iCloud, Dropbox store your files remotely, share files with others.

remote file storage

search engines

search the web with natural language terms

podcast

sharing audio and video content on the web; some developers publish podcasts as a theme series on a specific subject and make the podcasts available as RSS feeds

Ctrl + C

shortcut: copy selected text

Ctrl + X

shortcut: cut selected items

Ctrl + V

shortcut: paste selected items

Ctrl + S

shortcut: save

Crtl + A

shortcut: select all items

Ctrl + Z

shortcut: undo

web conferencing

similar to an open telephone call, but with the added element of video; provides participants with the ability to mark up documents or images, as well as "chat" by using a keyboard

worm

small malware that replicates itself by going through security holes, causing damage

active X controls

small programs to allow animation or help with tasks

networking sites, blogging, microblogging, and content sharine

social media has four main classifications:

podcatching

software that allows users to aggregate podcast feeds and play podcasts on their computers, smartphones, and tablet devices


Kaugnay na mga set ng pag-aaral

Merchant of Venice Character List

View Set

UNIT: INPUT-OUTPUT RELATIONSHIPS

View Set

AP Human Geography Chapter 4 Multiple Choice

View Set

Intro to Public Administration Quiz 2

View Set

chapter 1: Analyzing Data to Make Accurate Clinical Judgements

View Set