CIS 101 - ALL
Graphics and Media Software
- Computer - Aided Design (CAD) Software - Desktop Publishing Software - Paint/ Image editing Software - Photo editing software - Clip Art / Image Gallery - Video and audio editing software
NFC tag
-contains a chip and an antenna that contains information to be transmitted - are self-adhesive -NFC-enabled phone communicates with the NFC reader to send a mobile payment.
users often used process with productivity applications
-create a project -edit a project -format a project -save a project -distribute a project
Portable Flash Memory Storage
-digital camera -smartphone -printer -tablet -laptop -card reader/writer
NFC (Near Field Communication)
-enabled device contains an NFC chip
variety of storage opitions
-internal solid-state-drive -internal hard disk -NFC tags -RFID tag -smard card -magnetic stripe card -network attached storage device -optical device -cloud storage -USB flash drive -memory cards -external hard drive
terms used to define storage
-kilobyte -megabyte -gigabyte -terabyte -petabyte -exabyte -zettabyte -yottabyte
The technologies that developers use to create apps often depends whether they will be installed on a user's device or accessed via a network
-native app -cloud app -web app -mobile web app
Head crash
-occurs when a read/write head touches the surface of a platter -Always keep a backup of your hard disk
Special purpose terminals
-perform specific tasks and contain features uniquely designed for use in a particular industry EX) point of sale, ATMs, and self service kiosks
botnet (zombie army)
A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.
joystick
A handheld vertical lever, mounted on a base, that you move in different directions to control the actions of the simulated vehicle or player. has buttons (triggers) that you use to initiate events
USB Flash Drive
A portable flash memory storage device that you plug in a USB port.
Mobile Computer
A portable personal computer designed so that a user can carry it from place to place.
Mobile-Computer
A portable personal computer designed so that a user easily can carry it from place to place.
Function
A predefined formula that performs a calculation. EX) =SUM(B9:B16) Spreadsheet applications contain many built-in functions to perform financial, mathematical, logical, date and time, and other calculations. Many spreadsheet applications allow users to write their own customized functions to perform special purpose calculations.
Software
A program or instructions that give directions to the computer.
Spyware
A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online
Ransomware
A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money
Rootkit
A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device
___ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device
A rootkit
Access Controls
A security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.
Proxy Server
A server outside the organization's network that controls which communications pass into the organization's network.
Operating System
A set of programs that coordinates all the activities among computer or mobile device hardware.
Tag
A short descriptive label that you assign to webpages, photos, videos, blog posts, email messages, and other digital content so that it is easier locate at a later time
Text Message
A short note, typically fewer than 300 characters, sent to or from a smartphone or other mobile device.
System Unit
The case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage.
Coding scheme
The combinations of 0s and 1s that represent uppercase and lowercase letters, numbers, and special symbols are defined by patterns
The Steps in a Machine Cycle Step 2
The control unit decodes the calculation's instructions and sends the instructions and data to the ALU
The Steps in a Machine Cycle Step 1
The control unit fetches the calculation's instructions and data from memory.
Power Supply
The power suitable to a computer or mobile device ranges from 5 to more than 15 volts. Laptop AC Adapter converts the wall outlet power into DC power Different motherboards require different wattages on the power supply If it is not providing the necessary power, then the computer will not function properly
Ripping
The process of copying audio and/or video data from a purchased disc and saving it on your own media
Audio Input
The process of entering any sound into the computer To enter high-quality sound into computer, the computer uses a sound card or integrated sound capability Some users also record live music and other sound effects into a computer by connecting external music devices, such as an electronic keyboard, guitar, drums, harmonica, and microphones, to a computer. Music production software allows users to record, compose, mix, and edit music and sounds.
Pairing
The process of initiating contact between two Bluetooth devices and allowing them to communicate with each other.
Downloading
The process of transferring content from the Internet to a computer or mobile device.
The Steps in a Machine Cycle Step 4
The results of the calculation are stored in memory
Output
The results of the operation of any system.
Screen Protector
Thin plastic film that adheres to the screen of your device it will protect the screen from minor scratches obtained through normal use.
Google is an example of a search engine.
True
Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.
True
Advanced Transfer Cache
Type of L2 cache built directly on the processor chip Processors that use this perform at much faster rates than those that do not use it
Flash Memory
Type of nonvolatile memory that can be erased electronically and rewritten. Most computers use flash memory to hold their start-up instructions because it allows the computer to update its contents easily. Also store data and programs on many mobile devices and peripheral devices, such as smartphones, portable media players, printers, digital cameras, automotive devices and digital voice recorders
netbook
Type of notebook computer that is smaller, lighter, and often not as powerful as a traditional notebook computer.
Optical Disc
Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
utility program
Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs.
graphical user interface (GUI)
Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons.
Address
Unique number that identifies the location of a byte in memory. To access data or instructions in memory,
UPC
Universal Product Code, used by retailers and grocery stores
Cellular Seizure Investigation Stick (CSI)
A thief can plug this into a phone and then download sensitive data in seconds.
Tablet
A thin, lighter-weight mobile computer that has a touch screen. Like laptops, tablets run on batteries or a power supply or both; however, batteries in a tablet typically last longer than those in laptops.
Laptop
A thin, lightweight mobile computer with a screen in its lid and a keyboard in its base. Designed to fit on your lap and for easy transport, most laptops weigh up to 7 pounds
ccTLD
A two-letter country code in a web address.
SAS (serial-attached SCSI)
A type of SCSI that uses serial signals to transfer data, instructions, and information. Advantages of SAS over parallel SCSI include thinner, longer cables; reduced interference; lower cost; support for many more connected devices at once; and faster speeds.
computer-aided design (CAD)
A type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models. For example, home design/landscaping software is an application that assists users with the design, remodeling, or improvement of a home, deck, or landscape.
Online Security Service
A web app that evaluates our computer or mobile device to check for Internet and email vulnerabilities.
Social Networking Network
A website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.
Internet
A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.
IP address
AKA Internet Protocol address -a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network -Internet uses two IP addressing schemes: IPv4 and IPv6 ^The original IPv4 address began dwindling in availability ^IPv6 increased the available number of IP addresses
touch-sensitive pad
An input device that contains buttons and/or wheels you operate with a thumb or finger. allows you to scroll through and play music
Graphics Formats Used on the Web
BMP - Bitmap: Desktop backgrounds Scanned images GIF - Graphics Interchange Format: Images with few colors Simple diagrams Shapes JPEG - Joint Photographic Experts Group: Digital camera photos Game screenshots Movie still shots PNG - Portable Network Graphics: Comic-style drawings Line art Web graphics TIFF - Tagged Image File Format: Photos used in printing industry
network
Collection of computers and devices connected together, often wirelessly, via communications devices and transmission media, allowing computers to share resources.
Web site
Collection of related Web pages and associated items stored on a Web server.
data
Collection of unprocessed items, which can include text, numbers, images, audio, and video.
USB Flash Drive
Common USB adapter that provides computers and mobile devices with additional storage capability as long as it is plugged in
Comparison Operations
Comparing one data with another to determine whether the first item is greater than, equal to, or less than the other item
Things Search Engines let you Search for
Audio: music, songs, recordings, and sounds' Blogs: specific opinions and ideas of others Businesses: addresses and phone numbers Images: photos, diagrams, and drawings Maps: maps of a business or address, or driving directions to a destination Publications: news articles, journals, and books Shipments: track locations of packages in transit to specific destinations Transportation: Directions, routes, and arrival and departure times Videos: home videos, music videos, television programs, and movie clips Weather: local and worldwide conditions and forecasts
Creating Strong passwords
Avoid personal information Use at least 8 characters, upper/lower case, numbers, punctuation marks and symbols Change it at least every 3 months Don't use the same password Use a passphrase Avoid common sequences Memorize passwords Use online tools to evaluate password strength
Control Unit
Component of the processor that directs and coordinates most of the operations in the computer Interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction. Types of internal components that the control unit directs include the arithmetic logic unit, registers, and buses,
Cloud Computing Reason 2
Cost Savings: The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, shifts away from the user
Trojan Horse
Destructive program disguised as a real program, such as a screen saver trojan horse hiding inside can capture information, such as user names and passwords, from your computer or enable someone to control your computer remotely
Selecting the Right Processor
Determine your needs Determine your current processor Research processor models
Bus width
Determines the number of bits that the computer can transmit at one time The larger the number of bits handled by the bus, the faster the computer transfers data
digital camera
Device that allows users to take pictures and store the photographed images digitally, instead of on traditional film.
digital media player/streaming media player
Device, typically used in a home, that streams digital media from a computer or network to a television, projector, or some other entertainment device
DVI
Digital Video Interface port enables signals to transmit directly to a monitor
Nonvolatile memory
Does not lose its contents when power is removed from the computer permanent Examples are ROM, flash memory, and CMOS Permanent
CMOS (complementary metal-oxide semiconductor)
Provides high speeds and consumes little power. CMOS technology uses battery power to retain information even when the power to the computer is off. Battery-backed CMOS memory chips, for example, can keep the calendar, date, and time current even when the computer is off. The flash memory chips that store a computer's start-up information often use CMOS technology.
Sound card
Enhances the sound-generating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones
Gigabyte
Equals 1 billion bytes
Using Personal Finance Apps Safely
Evaluate the apps Use strong passwords Guard smartphone Verify transaction
Green Computing
Reducing the electricity consumed and environmental waste generated when using a computer.
Read only memory
Refers to memory chips storing permanent data and instructions. date on most ROM chips can't be modified It is nonvolatile, which means its contents are not lost when power is removed from the computer Many peripheral devices contain this
Flash memory has many moving parts, making it less durable and shock resistant than other types of media.
False
Storage consists of electronic components that store instructions and data waiting to be executed.
False
A computer accepts data, called output.
False, it's input
Static RAM
Faster and more reliable than any variation of DRAM chips. Do not need to be re energized as often as DRAM chips More expensive than DRAM chips
supercomputer
Fastest, most powerful, and most expensive computer, capable of processing more than one quadrillion instructions in a single second.
Speech to Text
Feature that recognizes a user's spoken words and enters them into email messages, text messages, or other applications that support typed text entry.
FTP
File Transfer Protocol - Permits users to transfer files to and from servers on the internet
FTP
File Transfer Protocol - allows users to transfer items to and from other computers on the Internet.
Cloud Backup
Files are backed up to the cloud as they change. Cloud backup provider maintains backup hardware. Files may be retrieved or restored from anywhere with an Internet connection and app on any device. Requires an Internet connection and app, otherwise files are marked for backup when the computer goes back online.
sequential access
Refers to reading or writing data consecutively In much the same way you would find a specific song on a cassette tape or videotape, you must forward or rewind to a specific position to access a specific piece of data.
System Unit
Refers to the case on a desktop that contains and protects the motherboard, hard drive, memory, and other electronic components
Machine Cycle: Decoding
Refers to the process of translating the instruction into signals the computer can execute
Actions a virus performs
First, a virus replicates by attaching itself to program files. Viruses conceal themselves to avoid detection. Finally, viruses watch for a certain condition or event and activate when that condition or event occurs.
Dance Pad
Flat electronic device divided into panels that users press with their feet in response to instructions from a music video game.
Firmware
For example, ROM chips in printers contain data for fonts Manufactures of ROM chips often record data, instructions, or information on the chips when they manufacture the chips Contain permanently written data, instructions, or information, such as a computer or mobile device's start-up instructions.
Fibre Channel (FC)
Interface often used in enterprise storage because it has much faster transmissions rates than SCSI and other interfaces.
smart phone
Internet-enabled telephone that usually also provides personal information management functions.
Nanosecond (ns)
One billionth of a second Extremely fast electricity travels about one foot in a nanosecond.
zombie
One whose owner is unaware the computer is being controlled remotely by an outsider
Newsgroups
Online areas in which users have written discussions about a particular subject
social networking Web site
Online community that encourages its members to share their interests, ideas, stories, photos, music, and videos with other registered users. See also online social network.
online social network
Online community that encourages its members to share their interests, ideas, stories, photos, music, and videos with other registered users. See also social networking Web site.
online banking
Online connection to a bank's computer to access account balances, pay bills, and copy monthly transactions to a user's computer.
Online Discussion
Online forums where users have written discussions May require a reader program to manage and follow discussion posts Integrated in some operating systems, email programs, online social networks, and browsers
cybercrime
Online or Internet-based illegal acts such as distributing malicious software or committing identity theft
mini disc
Optical disc used in some game consoles and mobile devices that has a diameter of 3 inches of less.
OLED
Organic LED, consume less power and is brighter but can have a shorter life span
Privacy and Security Risks with Online Social Networks
Register with caution Manage your profile Choose friends carefully Limit friends Divulge only relevant information Be leery of urgent requests for help Read the privacy policy
Memory card
Removable flash memory, usually no bigger than 1.5 inches in height or width, that you insert and remove from a slot in a computer, mobile device, or card/reader writer.
Cooling Pad
Rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat
Acceptable Use Policy (AUP)
Outlines the activities for which the computer and network may and may not be used. It should specify the acceptable use of technology by employees for personal reasons and specify the personal activities, if any, that are allowed on company time
programmer
Person who writes and modifies computer programs. See also developer.
developer
Person who writes and modifies computer programs. See also programmer.
Microprocessor
Personal computer processor chip
mobile computer
Personal computer that a user can carry from place to place.
video phone
Phone that can send video messages.
picture message
Photo or other image, sometimes along with sound and text, sent to or from a smart phone or other mobile device.
DIMM (dual inline memory module)
Pins on opposite sides of the circuit board do not connect and, thus, form two sets of contacts
Application
Programs designed to make users more productive and/or assist them with personal tasks.
system software
Programs that control or maintain the operations of a computer and its devices.
Health Concerns
Prolonged use of devices can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back.
Academic
Schools often subscribe to educational apps that provide students with games, quizzes, and lessons about course topics. Using these apps, teachers can keep track of students' progress and pinpoint areas where they may need extra help.
What do people use the Web for?
Search for information Conduct research Communicate with and meet other people Share information, photos, and videos with others Access news, weather, and sports Participate in online training Shop for goods and services Play games with others Download or listen to music Watch videos Download or read books Make reservations
SDHC
Secure Digital High Capacity
Using DV technology
Select a DV camera Record a video Transfer and manage videos Edit a video Distribute a video
Wireless Messaging Services
Send and receive wireless messages to and from smartphones, mobile phones, handheld game devices, and other mobile devices using text messaging and picture/video messaging.
Symmetric Key Encryption
Sender and receiver use single, shared key
Quarentine
Separate area of a hard disk that holds the infected file until a virus can be removed. Ensures that other files won't be infected
information processing cycle
Series of input, process, output, and storage activities performed by a computer.
software
Series of instructions that tells a computer what tasks to perform and how to perform them. See also program.
program
Series of instructions that tells a computer what tasks to perform and how to perform them. See also software.
What to Consider when Securing Photo Sharing
Services: many services allow users to print the images. They also offer photo-customizing products. Tools: owners can create web pages and keep photos organized by using albums, titles, and tags. They also can join forums to share experiences. Features: it is efficient if you can upload many files simultaneously in one batch. Many websites allow visitors to write comments on uploaded photos. Storage Space: some services offer unlimited storage, while others may limit members to a maximum number of stored photos or limit the total storage space.
operating system
Set of programs that coordinates all the activities among computer hardware devices.
Voice Mail Message
Short audio recording sent to or from a smartphone or other mobile device.
E-commerce
Short for electronic commerce, a business transaction that occurs over an electronic network such as the Internet.
text message
Short note, typically fewer than 300 characters, sent to or from a smart phone or other mobile device.
Mobile (Text) Messaging
Short text, picture, or video messages sent and received, mainly on mobile devices over a mobile carrier's network May require messaging plan from mobile service provider Requires messaging software Integrated in most mobile devices
video message
Short video clip, usually about 30 seconds, sent to or from a smart phone or other mobile device.
Blogger
Similar to an editorial section in a newspaper, blogs reflect the interests, opinions, and personalities of the author
Multi-core processor
Single chip with two or more separate processor cores These are used in all sizes of computers
L2 cache
Slightly slower than L1 cache but has a much larger capacity
Heat sink
Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as a processor Has fans to help distribute air dissipated by the heat sink
telesurgery
Surgery in which a surgeon performs an operation on a patient who is not located in the same physical room as the surgeon. See also remote surgery.
Services Offered by Cloud Storage Providers
Synchronize files Write documents Back up files Stream music Post photos Play games Evaluate providers
Two Categories of Software
System Software: consists of the programs that control or maintain the operations of the computer and its devices. Application Software
A computer has a
System bus, possibly a backside bus, and an expansion bus
Safeguarding against Theft & Vandalism and Failure
T&V: physical access controls, alarm system, physical security device, device-tracking app F: surge protector, uninterruptible power supply, duplicate components or duplicate computers, fault-tolerant computer
Hardware Theft & Vandalism and Failure
T: act of stealing digital equipment V: defacing or destroying digital equipment F: can fail because of aging, natural or man-made disasters, or random events, or even errors in programs or apps.
Common Gestures
Tap, double tap, press and hold, drag or slide, swipe, stretch, pinch
Subwoofer
boosts low bass sounds, found in surround sound speaker systems In some configurations, a cable connects the speakers or the subwoofer to a port on the computer or device. With wireless speakers, however, a transmitter connects to a port on the computer, which wirelessly communicates with the speakers
a program that performs a repetitive task on a network
bot
private key encryption (symmetric key encryption)
both the originator and the recipient use the same secret key to encrypt and decrypt the data
CD-ROM
can be read from but not written to -Single-session disc (manufacturers write all items on disc at one time)
3-D printer
can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and more
OCR (optical character recognition) Software
can read and convert text documents into electronic files, included in many scanners
Signature capture pad
captures a handwritten signature through a stylus then transmits signal to a central computer where signature is stored
Face Recognition System
captures a live face image and compares it with a stored image to determine if the person is a legitimate user
fingerprint reader
captures curves and indentations of a fingerprint
Videoconference
a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data To participate in a videoconference using a computer, you need videoconferencing software or access to a videoconferencing web app, along with a microphone, speakers, and a video camera attached to or built into a computer.
Push Notification
a message that initiates from the sending location without a request from the receiver
game console
a mobile computing device designed for single-player or multiplayer video games. gamers often connect console to television or monitor so they can review gameplay on screen game consoles that are Internet capable enable gamers to download games, stream games or movies, and play with others online. Some gamers connect keyboards or webcams so that they more easily can send text messages or conduct video chats with other gamers.
Portable Media Player
a mobile device on which you can store, organize, and play or view digital media enable you to listen to music, view photos, and watch videos, movies, and television shows. With most, you transfer the digital media from a computer or the web, if the device is Internet capable, to the portable media player. S
portable media player
a mobile device on which you can store, organize, and play or view digital media AKA smart phones allow you to listen to music, view photos, watch videos, movies, and television shows, and even record audio
digital camera
a mobile device that allows users to take photos and store the photographed images digitally
Track
a narrow recording band that forms a full circle on the surface of the disk
GPS
a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location
server farm
a network of several servers together in a single location it makes it possible to combine the power of multiple servers
PNG
a patent free compressed graphics format that restores all images details when the file is viewed -the PNG does not lose image quality during compression
Mouse
a pointing device that fits under the palm of your hand comfortably
mobile computer
a portable personal computer, such as a laptop or tablet, designed so that a user easily can carry it from place to place, whereas a desktop to be in a stationary location can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time
Pointing stick
a pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard
Passphrase
a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources More secure than passwords but can be easy to remember because they contain words
back door
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network A rootkit can be a back door. Some worms leave back doors, which have been used to spread other worms or to distribute spam from the unsuspecting victim computers.
media player
a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device
Media Player
a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device Media players available for download include iTunes, RealPlayer, and VLC Player. You can download media players free from the web.
Adware
a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services
PC maintenance tool
a program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance
Bot
a program that performs a repetitive task on a network
Phishing Filter
a program that warns or blocks you from potentially fraudulent or suspicious websites
Query
a request for information from a database
Phishing
a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information
Lock Screen
a screen that restricts access to a computer or mobile device until a user performs a certain action
personal firewall
a security tool that detects and protects a personal computer and its data from unauthorized intrusions Personal firewalls constantly monitor all transmissions to and from a computer or mobile device and may inform a user of attempted intrusions.
DVD kiosk
a self service DVD rental machine that connects to a host computer through network -are associated with a particular vendor -to rent movies
external hard drive
a separate freestanding storage device that connects with a cable to a USB port or other port on a computer or mobile device Both hard disks and SSDs are available as external hard drives.
Format a Project
change its appearance Formatting is important because the overall look of a project significantly can affect its capability to communicate information clearly. Examples of formatting tasks are changing the font (name assigned to specific design of character), font size (indicates the size of the characters in a particular font), and font style (adds emphasis to a font)
Subject Directory
classifies web pages in an organized set of categories, such as sports or shopping, and related subcategories Using a subject directory, you locate a particular topic by clicking links through different levels, moving from the general to the specific.
Ink-Jet printers
a type of nonimpact printer that forms characters and graphics by spraying tiny drops on liquid ink onto a piece of paper. These have become a popular type of color printer for home use Ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types and sizes
spyware remover
a type of program that detects and deletes spyware and similar programs
slate tablet
a type of tablet that does not contain a physical keyboard
Username (User ID)
a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user
user name
a unique combo of characters, such as letters of the alphabet and/or numbers, that identifies a specific user Your user name must be different from the other user names in the same domain. In an Internet email address, an @ (pronounced at) symbol separates the user name from the domain name. Your service provider supplies the domain name. A possible email address for Rick Claremont would be [email protected],
Nit
a unit of visible light intensity equal to one candela per sq meter. Used to measure brightness of a display
Troll
a user who posts negative, inflammatory comments on a blog post or article with the intent of inciting other users.
graphics
a visual representation of non-text information such as a drawing chart or photo
smartwatch
a wearable device that in addition to keeping time can communicate wirelessly with a smartphone to make and answer phone calls, read and send messages, access the web, play music, and work with apps such as trackers and GPS
activity tracker
a wearable device that monitors fitness-related activitties such as distance walked, heart rate, pulse, calories consumed, and sleep patterns typically wireless with web or mobile app on computer or mobile device to extend capability
Mobile Web App
a web app that runs on a mobile device Mobile web apps often have a responsive web design, which means the app is optimized for display in a browser on a mobile device, regardless of screen size or orientation. Examples of web apps include websites for shopping, banking, and online social networks accessed in a browser.
Media Sharing Site
a website that enables members to manage and share media such as photos, videos, and music These websites are sometimes called photo sharing sites, video sharing sites, and music sharing sites, respectively. Media sharing sites, which may be free or charge a fee, provide a quick and efficient way to upload, organize, store, and download media. EX) youtube
Bookmarking Site
a website that enables members to organize, tag, and share links to media and other online content
Portal
a website that offers a variety of internet services from a single, convenient location a wireless portal is a portal designed for Internet-capable mobile devices. Most portals offer these free services: search engine; news, sports, and weather; web publishing; yellow pages; stock quotes; maps; shopping; and email and other communications services.
secure site
a website that uses encryption techniques to secure its data Secure sites typically use digital certificates along with security protocols.
Hot spot
a wireless network that provides Internet connections to mobile computers and devices
Hot spot
a wireless network that provides internet connections to mobile computers and devices -although most hot spots enable unrestricted or open access, some require that users agree to terms of services, obtain a password, or perform some other action in order to connect to the internet -can make wifi, or mobile hotspots
Hashtag
a word(s) preceded by a # symbol that describes or categorizes a post. Users can search for posts on a topic by searching for a hashtag.
Input
accepting data
security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
access control
AMOLED
active-matrix OLED, what many mobile computers and devices use. Combines the benefits of high-quality viewing from all angles with lower power consumption
Responsive Web Design
adapts the layout of the website to fit the screen on which it is being displayed
resolution
affects the quality of the digital camer the number of horizontal and vertile pixels in a display
Bar code reader
aka a bar code scanner, an optical reader that uses laser beams to read bar codes
Graphics tablet
aka a digitizer, an electronic plastic board that detects and converts movements of a stylus or digital pen into digital signals that are sent to the computer Each location on the graphics tablet corresponds to a specific location on the screen.
Voice Recognition
aka speech recognition, is the computer or mobile devices capability of distinguishing spoken words
Longitudinal Recording
aligns the magnetic particles horizontally around the surface of the disk
Continuous Data Protection (CDP)
all data is backed up whenever a change is made The only real-time backup. Very fast recovery of data. Very expensive and requires a great amount of storage.
Video Call
all parties see one another as they communicate over the internet
Online Backups
allow files to be saved to remote servers via the Internet
email marketing services
allow organizations to create campaigns, and then senf them by email to everyone whose name is on the list of distribution
Platform as a service
allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software
Enterprise hardware
allows large organizations to manage and store data and information using devices intended for heavy use, maximum efficiency, and maximum availability -RAID duplicates data, instructions, and information to improve data reliability
Revolutions per minute
allows nearly instant access to all tracks and sectors on the platters
Shopping Cart
allows the user to collect purchases
multimedia authoring software
allows users to combine text, graphics, audio, video, and animation in an interactive application With this software, users control the placement of text and images and the duration of sounds, video, and animation
Backup Tool
allows users to copy, or back up, selected files or the contents of an entire storage medium to another storage location such as another hard drive, optical disc, USB flash drive, or the cloud Most require less storage than original
database software
allows users to create, access, and manage a database Using database software, you can add, change, and delete data in a database; sort and retrieve data from the database; and create forms and reports using the data in the database. Each row, called a record, contains data about a given item in the database, such as a person, product, object, or event. Each column, called a field, contains a specific category of data within a record.
Voice recognition application
allows users to dictate text and enter instructions by speaking into a microphone
Voice Mail
allows users to leave a voice message for one or more people
spreadsheet software (AKA workbook)
allows users to organize data in rows and columns and perform calculations allow users e columns and rows collectively it can contain thousands of related individual worksheets (this is why it is referred to as a workbook) Each worksheet usually can have thousands of columns and rows. A cell is the intersection of a column and row. The spreadsheet software identifies cells by the column and row in which they are located.
Microblog
allows users to publish short messages usually less than 10,000 characters, for others to read
Personal Cloud
allows you to access its files over the internet you maintain storage device which files are located versus a cloud storage provider where your files are stored on servers on the internet that a cloud storage provider configures, maintains, and backs up
Favorites
also called bookmarks, are links to preferred websites. When you add a website to the list of favorites, you can visit that website simply by clicking its name in a list instead of typing its web address. Favorites can be organized into folders, alphabetized, and sorted by date or how frequently you view the websites.
paint software
also called illustration software, allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, eyedropper, and paint bucket.
Direct Access
also called random access, means that the device can locate a particular data item or file immediately, without having to move consecutively through items stored in front of the desired data item or file.
SCSI (small computer system interface)
also uses parallel signals, but can support up to 8 or 15 peripheral devices. Supported devices include hard disks, SSDs, RAID, optical disc drives, tape drives, printers, scanners, network cards, and more
hacker
although, originally a complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally
Smartphone
an Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, and several other apps Smartphones typically communicate wirelessly with other devices or computers. With most smartphone models, you also can listen to music, take photos, and record videos. Most smartphones have a touch screen
Smart TV
an Internet-enabled HDTV from which you can browse the web, stream videos from online, listen to Pandora, communicate on social media and play online games
point and shoot camera
an affordable and lightweight digital camera with lenses built onto it and a screen that displays an approximation of the image to be photographed -range in size and features provide acceptable quality photographic images for the home or small office user
Unmanned Aerial Vehicle
an aircraft piloted by remote control or onboard computers
project management software
an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project helps users manage project variables, such as the tasks required to complete a project and the allotted time and resources for each, allowing them to complete a project on time and within budget.
Video Editing Software
an application that allows professionals to modify a segment of a video, called a clip For example, users can reduce the length of a video clip, reorder a series of clips, or add special effects, such as words that move across the screen.
tax preparation software
an application that can guide individuals, families, or small businesses through the process of filing federal taxes These programs forecast tax liability and offer money-saving tax tips, designed to lower your tax bill. After you answer a series of questions and complete basic forms, the software creates and analyzes your tax forms to search for missed potential errors and deduction opportunities.
Desktop Publishing Software (DTP)
an application that enables designers to create sophisticated publications that contain text, graphics, and many colors
Audio Editing Software
an application that enables users to modify audio clips, produce studio-quality soundtracks, and add audio to video clips Most television shows and movies and many online videos are created or enhanced using video and audio editing software.
accounting software
an application that helps businesses of all sizes record and report their financial transactions business users perform accounting activities related to the general ledger, accounts receivable, accounts payable, purchasing, invoicing and payroll functions enables business users to write and print checks, track checking account activity, and update and reconcile balances on demand. cost of accounting software for small businesses ranges from less than one hundred to several thousand dollars. Accounting software for large businesses can cost several hundred thousand dollars.
Image Editing Software
an application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images
Ergonomics
an applied science devoted to incorporating comfort, efficiency, and safety into the design items in the workplace -type of configuration of chair, keyboard, display, and work surface
Computer
an electronic device, operating under the control of instructions stored in its own memory that can accept data (input) process the data according to specific rules, produce info (output) and store the information for future use
Cloud computing
an environment that provides resources and services accessed via the internet -resources include email messages, schedules, music, photos, videos, games, websites, programs, web apps, servers, storage, and more -services include accessing software, storing files online, and configuring an environment of servers for optimal performances Businesses use this to more effectively manage resources, such as servers, and programs by shifting usage to the internet It also allows companies to diversify their network and server infrastructure.
Port Replicator
an external device that provides connections to peripheral devices through ports built into the device The mobile user accesses peripheral devices by connecting the port replicator to a USB port or a special port on the mobile computer. Port replicators sometimes disable ports on the mobile computer to prevent conflicts among the devices on the computer and port replicator.
Blog
an informal website consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order
Repetitive strain injury (RSI)
an injury or disorder of the muscles, nerves, tendons, ligaments, and joints -Tendonitis: tendons is inflammation of a tendon due to repeated motion or stress on that tendon. Symptoms: Symptoms of tendonitis of the wrist include extreme pain that extends from the forearm to the hand, along with tingling in the fingers. -Carpal Tunnel Syndrome (CTS) is inflammation of the nerve that connects the forearm to the palm of the hand. Symptoms: include burning pain when the nerve is compressed, along with numbness and tingling in the thumb and first two fingers.
Keyboard
an input device that contains keys you press to enter data and instructions into a computer or mobile device
bar code reader
an input device that uses laser beams to read bar codes on products When it scans the computer uses the manufacturer name and item number to look up price and product name
User response
an instruction a user issues by responding to a message displayed by a program or app A response to the message instructs the program or app to perform certain actions. For example, when a program or app asks the question, 'Do you want to save the changes made to this file?', and you respond with the instruction of 'Yes', the program or app will save the file with the changes you made. If you respond with the instruction of 'No', the program or app will not save your changes before exiting.
Command
an instruction that causes a program or app to perform a specific action Programs and apps respond to commands that a user issues. Users issue commands in a variety of ways, which include touching an area on a screen, pressing keys on the keyboard, clicking a mouse button to control a pointer on the screen, or speaking into a microphone.
EIDE ( enhanced integrated drive electronics)
an interface that uses parallel signals to transfer data, instructions, and information
pop-under ad
an internet advertisement that is hidden behind the browser window so that it will be viewed when users close their browser windows
Broadband
an internet service that transfers data at a faster speed and its always-on connection -users can download webpages quickly, play online games, communicate in real-time with others and more
FTP (File Transfer Protocol)
an internet standard that permits file uploading and downloading to and from other computers on the internet
smartphone
an internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, browser, and numerous other apps in addition to sending/receiving messages, accessing web, communicate wirelessly, function as a portable media player, one or more built-in digital cameras, talk directly into smartphone's microphone or into a bluetooth, connect to video calls, GPS, synchronize data, support voice control, connect to external devices, serve as a wireless access point
clickjacking
an object that can be tapped or clicked such as a button, image, or link on a website contains a malicious program
Scanner
an optical scanner, a light-sensing input device that reads printed text and graphics and then translates the results to a form the computer can process
Certificate Authority
an organization that issues public and private keys and records the public key in a digital certificate
Registrar
an organization that sells and manages domain names.
Source document
an original save of the data, some input devices users save time by capturing data directly from this Examples of source documents include time cards, order forms, invoices, paychecks, advertisements, brochures, photos, inventory tags, or any other document that contains data to be processed.
Printer
an output device that produces text and graphics on a physical medium such as paper
Input
any data and instructions entered into the memory of a computer
digital security risk
any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability Common digital risk: network attacks, unauthorized access and use, hardware theft, software theft, information theft, system failure
Input Device
any hardware component that allows you to enter data and instructions into a computer or mobile device
Output Device
any hardware component that conveys information from a computer or mobile device to one or more people
computer crime
any illegal act involving the use of a computer or related devices
Anonymous FTP
anyone can transfer some, if not all, available files
Marketplace
app store native apps can be downloaded from these
Native App
app written for a specific platform and installed on a computer or mobile device Native apps can take advantage of specific features of the devices on which they are installed, such as a smartphone's camera or contacts list.
Mashups
applications that incorporate data from multiple providers into a new application
optical discs
commonly store items in a single track that spirals from the center of the disc to the edge of the disc
smart digital camera
communicate wirelessly with other devices and can include apps similar to those on a smartphone
Traffic
communications activity on the internet -includes main transmission media to carry internet traffic AKA Internet Backbone ^exchanges data at several different major cities across the country (transfers data from one network to another until reaching the final destination
miniSD, microSDHC, micro SDXC
compactflash
Voice Verification System
compares a person's live speech with their stored voice pattern Larger organizations sometimes use voice verification systems as time and attendance devices. Many companies also use this technology for access to sensitive files and networks. Some financial services use voice verification systems to secure phone banking transactions.
Zipped Files
compressed files
Product Activation
conducted either online or by phone, users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed
optical disk
consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser
program or software
consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them
RFID tag
consists of an antenna and a memory chip that contains the information to be transmitted via radio waves An active RFID tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader. A passive RFID tag does not contain a battery and, thus, cannot send a signal until the reader activates the tag's antenna by sending out electromagnetic waves.
thread
consists of the original article and all subsequent related files ex./ companies set this up for their customers to ask questions or share info about their products
Friends
contacts created on social networking sites Some sites, such as Facebook and LinkedIn, require friends to confirm a friendship, while others, such as Twitter and Google+, allow users to follow one another without confirmation.
RFID Tags
contain a memory chip and an antenna, available in many shapes and sizes
magnetic strip
contains information that identifies you and the card
Keyboard
contains keys you press to enter data and instructions into a computer or mobile device
Web Feed
contains links to or information about updated or changed content on a website
Web Feed
contains links to or information about updated or changed content on a website Mass media, blogs, and online social networks often provide web feeds, saving users the time spent checking the websites for updated content. Most browsers contain the capability to read web feeds.
Contact List or Address Book
contains names, addresses, phone numbers, email addresses, and other details about people with whom you communicate.
Dynamic Webpage
content of the webpage is regenerated each time a user displays it
A(n) __ backup method is the only real-time back up, providing very fast recovery of data
continuous data protection
Analog
continuous wave pattern
User interface
controls how you enter data and instructions and how information is displayed on the screen
Digital device ______ is the trend of computers and devices with technologies that overlap.
convergence
Information
conveys meaning and is useful to people
Full backup
copies all of the files on media in the computer Fastest recovery method. All files are saved.Longest backup time.
Differential Backup
copies only the files that have changed since the last full backup
Incremental Backup
copies only the files that have changed since the last full or incremental backup
keygen
creates software registration numbers and sometimes activation codes
eSATA
faster than USB
Automatic Update
feature that regularly provides new features or corrections to the program
Technology overload
feeling distress when deprived of technology, even for a short length of time, or feel overwhelmed with the amount of technology they are required to manage
Controller
formerly called a disk controller, consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer.
Impact printer
forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper Impact printers are ideal for printing multi part forms because they print through many layers of paper easily.
Non-impact Printer
forms characters and graphics on a piece of paper without actually contacting the paper. Some spray ink while others use heat or pressure to create images
Video
images displayed in motion accompanied by audio -you can upload, share, or view video clips at a video sharing site Simple video applications on the web consist of individual video files, such as movie or television clips, that you must download completely before you can play them on a computer or mobile device.
Mirroring
in RAID level 1, a backup disk exists for each drive. It writes data on two drives at the same time to duplicate the data
Off site
in a location separate from where you typically store or use your computer or mobile device
plaintext
in the encryption process, the encrypted, readable
distributed DoS attack
in which a zombie army is used to attack computers or computer networks Have been able to stop powerhouses such as Yahoo!, eBay, Amazon.com, and CNN.com. The damage caused by a DoS or DDoS attack usually is extensive.
OCR devices
include a small optical scanner for reading characters and sophisticated software to analyze what is read
Audio
includes music, speech, or any other sound -are compressed to reduce their file sizes Simple applications consist of individual audio files available for download to a computer or device. Once downloaded, you can play (listen to) the content of these files. ex./ the MP3 reduces an audio file to about one-tenth its original size while preserving much of the original quality of the sound ^need a media player to play
Wireless transmission
includes radio waves and satellite signals -Computers without a communications device can use a wireless modem or other communications device that enables wireless connectivity --Wi-Fi (wireless fidelity) -Mobile broadband -Fixed wireless -Satellite Internet Service
Test Plan
includes simulating various levels of disasters and recording their ability to recover
Soft copy
information on a display exists electronically and appears for a temporary period
An employee using an organization's computer to send personal email messages might be an example of ___
intellectual property rights violation
Air Gestures
involve moving your body or a handheld input device through the air A device containing a camera detects your gestures and converts it to a digital signal that is sent to a computer mobile
employee monitoring
involves the use of computers, mobile devices, or cameras to observe, record, and review an employee's use of technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited
software suite
is a collection of individual related applications available together as a unit Productivity software suites typically include, at a minimum, word processing, presentation, spreadsheet, and email applications.
pop-up blocker or pop under blocker
is a filtering program that stops pop-up or pop-under ads from displaying on webpages. Many browsers include these blockers. You also can download pop-up and pop-under blockers from the web at no cost.
DVD-ROM
is a high-capacity optical disc on which users can read but not write on or erase
Gaming Keyboard
is a keyboard designed specifically for gaming Gaming keyboards typically include programmable keys so that gamers can customize the keyboard to the game being played. The keys on gaming keyboards light up so that the keys are visible in all lighting condition
tape
is a magnetically coated ribbon of plastic capable of storing large amounts of data and information
E-book reader (e-reader/electronic book reader)
is a mobile device that is used primarily for reading e-books.
digital certificate
is a notice that guarantees a user or a website is legitimate
Hot plugging
Unlike adapter cards that require you to open the system unit and install the card on the motherboard, you can change a removable flash memory device without having to open the system unit or restart the computer Allows you to insert and remove a device while the computer is running ( be sure, though, to stop or eject the device before removing it)
Securing a Webcam
Unplug webcam when not in use Cover lens and plug the microphone Register the hardware Use a strong password
Tips to keep Credit Card Safe
Use a card with added security features, such as a photo. Draw a line through blank areas on restaurant charge slips. If you have left a cash tip on the table, write the words, On Table, in the slip's tip amount section. Cover the keypad when entering a PIN. Save charge receipts and check them against monthly statements or online postings. Keep a record in a safe place of all your credit card numbers, expiration dates, and toll-free numbers to call if you need to report a lost or stolen card. Purchase an RFID-proof wallet to shield smart cards from remote readers. Shred new credit account mail solicitations. Look for skimmers, which can capture a credit card number.
How to protect your phone when making purchases
Use a password on your phone. Select an approved payment app from your device's app store that requires you to enter a password to start the transaction. Use a secure Internet connection when making a purchase online. When using a mobile web app, be sure that the browser shows https:// in the website's web address and a padlock symbol appears. Be vigilant about checking receipts and mobile transactions against monthly statements from the credit card company.
online investing
Use of a computer to buy and sell stocks and bonds online, without using a broker.
Protection from Viruses and other Malware
Use virus protection software Use a firewall Be suspicious of all unsolicited email and text messages Disconnect your computer from the internet Download software with caution Close spyware windows Before using removable media, scan for malware Keep it current Back up regularly
Protection from virus and other malware
Use virus protection software Use a firewall Be suspicious of all unsolicited email and text messages Disconnect computers from internet Download software with caution Close spyware windows Before using any removable media, scan it for malware. Keep current Back up regularly
Data Bus
Used to transfer actual data
Address BUS
Used to transfer information about where the data should reside in memory
power user
User who requires the capabilities of a workstation or other powerful computer, typically working with multimedia applications and using industry-specific software.
home user
User who spends time on a computer at home.
Selective Backup
Users choose which folders and files to include in a backup. Fast backup method. Provides great flexibility. Difficult to manage individual file backups. Least manageable of all the backup methods.
mobile users
Users who work on a computer while away from a main office, home office, or school.
Liquid cooling technology
Uses a continuous flow of fluids such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor.
Analog
Uses continuous signals that vary in strength and quality
Mapping
Using your mobile device's GPS capability, you can use mapping mobile apps to obtain directions, maps, and recommendations for restaurants or other points of interest based on your current location.
Connecting a laptop to an External Display
Verify that your laptop is compatible with the external display. Make sure that you have a cable that can connect from a port on your laptop to a port or cable connected to the external display. If not, you may need to purchase an adapter. Verify that your laptop supports a screen resolution that the external display also supports. Use the cable to connect your laptop's video port to the video input port for the external display. External displays often have multiple video input ports; make sure the external display is configured to display the content from the port to which your laptop is connected. If necessary, configure the laptop to display content on the external display. This often can be done by pressing a key on the keyboard or accessing the operating system's display settings. If necessary, change the screen resolution on the laptop so that the contents display properly on the external display.
Web application
Web site that allows users to access and interact with software through a Web browser on any computer or device that is connected to the Internet. See also Web app.
Byte
When 8 bits are grouped together as a unit Provides enough different combinations of 0s and 1s to represent 256 different characters These characters include numbers, uppercase and lowercase letters of the alphabet, punctuation marks, and other keyboard symbols, such as an asterisk (*), ampersand (&), and dollar sign ($).
DVD-R or DVD+R
are competing DVD-recordable WORM formats, on which users can write once but not erase
DVD-RW, DVD+RW, and DVD+RAM
are competing DVD-rewritable formats that users can write on multiple times
chip cards
are contact and contactless When you insert a contact smart card in a specialized card reader, the information on the smart card is read and, if necessary, updated. Contactless smart cards communicate with a reader using a radio frequency, which means the user simply places the card near the reader.
all-in-one
a desktop that does not have a tower and instead houses the display, system unit, and possibly an optical drive in the same case
Digital Camera
a device that allows you to take photos and store the photographed images digitally A smart digital camera also can communicate wirelessly with other devices and include apps similar to those on a smartphone. Many mobile computers and devices, such as tablets and smartphones, include at least one integrated digital camera.
Headset
a device that contains a microphone and speakers and is worn on one's head many communicate wirelessly with the computer or mobile device
uninterruptible power supply (UPS)
a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power -a UPS connects your connects your computer and a power source
Hardware firewall
a device that controls computers from one point.
card reade/writer
a device that reads from and writes on memory cards
Data projector
a device that takes the text and images displaying on a computer or mobile device screen and projects images onto a larger screen
steaming media player (digital media player)
a device typically used in a home that streams digital media from a computer or network to a television, projector, or some entertainment force
Display
a display device, an output device that visually conveys text, graphics and video information
Anti-spam program
a filtering program that attempts to remove spam before it reaches your inbox or forum
SSD (solid state drive)
a flash memory storage device that contains its own processor to manage its storage
self-service kiosk
a freestanding terminal that usually has a touch screen for user interaction Types of services financial: pay bills, add money to prepaid cards and phone plans, and perform other financial activities photo: print photos from digital images, allow editing of digital photos, users may print directly or send an order ticket: print tickets vending: dispense item after payment is received visitor: manage and track visitors upon check in
portable keyboard
a full sized keyboard that communicates with a smartphone via a dock, cables, or wirelessly
email list
a group of email addresses used for mass distribution of a message -you subscribe to an email list by adding your email address to a mailing list, which is stored in a list server To remove your name, you unsubscribe from the mailing list.
RAID (redundant array of independent disks)
a group of two or more integrated hard disks RAID is an ideal storage solution in situations where uninterrupted access to the data is critical
GPS receiver
a handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor
Function keys
are labeled with the letter F followed by a number, these are special keys programmed to issues commands to a computer. Functions MAY VARY depending on the program which you are interacting
Earbuds
are placed in the ear canal
Headphones
are placed outside the ear Both headphones and earbuds usually include noise-cancelling technology to reduce the interference of sounds from the surrounding environment.
Satellite speakers
are positioned so that sound emits from all directions
technology ethics
are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies Frequently discussed areas of computer ethics are unauthorized use of computers, mobile devices, and networks; software theft (piracy); information accuracy; intellectual property rights; codes of conduct; green computing; and information privacy.
Intellectual property rights
are the rights to which creators are entitled for their work
Biometric Device
authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic grant access to programs, computers, or rooms using computer analysis of some biometric identifier
biometric device
authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioural characteristic
ATM
automated teller machine -a self service banking terminal that connects to a host computer through a network -banks place ATMs in public locations, including grocery stores, convenience stores, retail outlets, shopping malls, sports and concert venues and gas stations -can withdraw and make deposits, transfer funds, or inquire about an account balance
Backup servers
back up and restores files, folders, and media
A(n) ______ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
backup
Byte
basic storage unit on a computer or mobile device and represents a single character.
Laser Printer
a high-speed, high-quality non impact printer. Print text and graphics in high quality resolution Depending on the quality, speed, and type of laser printer, the cost ranges from a few hundred to a few thousand dollars When printing a document, laser printers process and store the entire page before they actually print i
Toggle Key
a key that switches between two states each time a user presses the key. Ex: CAPS lock
mainframe
a large expensive, powerful server that can handle hundreds or thousands of connected users simultaneously
face recognition system
a live face and compares it with a stored image to determine if the person is a legitimate user
Bandwidth
a measure of the capability of a network to send and receive data -a high bandwidth connection transmits more data than a low bandwidth connection during the same time period -usually megabytes or gigabytes
Creative Commons
nonprofit organization that allows content owners to specify how their online content can be reused, if at all, on other websites.
Density
number of bits in an area on a storage medium. A higher density means more storage capacity.
Data Collection Device
obtains data directly at the location. ex: scans items for inventory at stores Data collection devices and many mobile computers and devices have the capability of wirelessly transmitting data over a network or the Internet. Increasingly more users today send data wirelessly to central office computers using these devices.
Peripheral Devices
occupy space outside the system unit and communicate with the system unit using wired or wireless technology.
IP spoofing
occurs when an intruder uses fools a network into believing its IP address is associated with a trusted source
information theft
occurs when someone steals personal or confidential information To further protect information on the Internet and networks, organizations and individuals use a variety of encryption techniques.
software theft
occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a programs Physically stealing software Intentionally erasing software Illegal registration/activation Illegal copying
Technology additction
occurs when technology use consumes someone's entire life -is a growing health problem, but can be treated through therapy and support groups
Undervoltage
occurs when the electrical supply or voltage drops, often defined as more than five percent brownout is a prolonged (more than a minute) undervoltage A blackout is a complete power failure. Under Voltages can cause data loss but generally do not cause equipment damage
Overvoltage or power surge
occurs when the incoming electrical supply or voltage increases, often defined as more than five percent, above the normal volts. A momentary overvoltage (spike) occurs when the increase in power lasts for less than one millisecond
document conversion software
saves documents created in any application into a common format that has the same appearance as the original document
Safely Scanning QR codes
scan trustworthy sources verify the web address choose a reputable QR scanner do not supply personal information check for tampering
A(n) ______ is a light-sensing input device that converts printed text and images into a form the computer can process.
scanner
A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic.
search engine
Email spoofing
occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender
Gaming
offer a social component, enabling you to chat within the game environment, find friends who play the same game apps, and post your scores on social media.
A Massive Open Online Course (MOOC)
offers access to quality education anywhere the Internet is available through a combination of video instruction and interaction with an instructor and students in an online classroom most involve videos of lectures, assigned readings, assignments, and interactive discussions. Khan Academy is one of the more popular MOOCs,
Outsourcing
offload all (or at least the backup) storage management to an outside organization or a cloud storage provider
Internet messaging
often occurs in real-time, are communication services that notify you when one or more of your established contacts are online and then allows you to exchange messages or files or join a private chat room with them -real time meaning that you and the people with whom you are conversing are online at the same time
state of computer illustration of volatility
on and off
Travel and Tourism
on these websites you typically can read travel reviews, search for and compare flights and prices, order airline tickets, book a room, or reserve a rental car.
Handwriting recognition software
once uploaded, translates the handwritten letters and symbols created on the screen into typed or text or objects that a computer or device can process. Most are used for notetaking
Hertz
one cycle per second
Keyboard shortcut
one or more keyboard keys that you press to perform an operating system or application based task
Speakers
or speaker systems that generate higher-quality sounds for doing stuff Typically have tone and volume controls, allowing users to adjust settings
Public Technical Identifiers (PTI)
organization that approves and controls TLD
augmented reality app
overlays information and digital content on top of physical objects or locations EX) used in medical field
Several words separated by spaces used in place of a password are called what?
passphrases
dedicated servers
perform a specific service and can be placed with other dedicated servers to perform multiple services -each type uses software designed specifically to manage its service -typically require a faster processor, more memory, and additional storage
PIN
personal identification number numeric password either assigned by company or selected by a user. Provide an extra level of security
PIN
personal identification number verifies that you are the holder of the bank card
Wired Transmission media
phone lines, coaxial cable, and fiber-optic cable -•With wired connections, a computer or device physically attaches via a cable or wire to a communications device --Cable Internet service -DSL (digital subscriber line) -Fiber to the Premises (FTTP)
Dot pitch
pixel pitch, is the distance in millimeters between pixels on a display. Average dot pitch should be .30 mm or lower
striping
portions of each drive are placed on multiple drives. strips data, instructions, and information across multiple drives in the array it improves drive access times but doesn't offer data duplication
on-screen keyboard
press keys on the screen using their fingertip or a stylus
Opera
second-oldest browser is free, fast, and small. Used on both computers and mobile devices, Opera must be downloaded and installed.
SDXC
secure digital extended capacity
Hard copy/printout
printed content
Hard copy
printed material
Rootkit
program that hides in a computer and allows someone from a remote location to take full control of the computer Rootkits can be very dangerous and often require special software to detect and remove.
virtual keyboard
projects an image of a keyboard on a flat surface
antivirus program
protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files scan for programs that attempt to modify a computer's start-up files, the operating system, and other programs that normally are read from but not modified
Game Server
provides a central location for online gaming
Sarbanes-Oxley Act
provides a myriad of financial reporting requirements and guidelines for publicly traded companies.
virtual reality app
provides an immersive user experience Some require a specialized viewer, which may have a built-in display, or make use of a smartphone to display 360-degree images or video content.
Home Server
provides storage, internet connections, or other services to computers and devices in a household
virtual private network (VPN)
provides the mobile user with a secure connection to the company network server, as if the user has a private line
Tactile output
provides the user with a physical response from the device
OMR devices
read hand drawn marks, such as small circles or rectangles. Ex: a person places marks on a form, survey or answer sheet
tape drive
reads and writes data and information on a magnetic tape
RFID Reader
reads the information on the tag via radio waves, can be mounted on door or in a handheld device
RFID reader
reads the radio signal and transfers the information to a computer or computing device
Pull Notification
receiver requests info from sending location
signature verification system
recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion used to write the signature
Podcast
recorded media that users can download or stream to a computer or portable media player
Storage Device
records (writes) and/or retrieves (reads) items to and from storage media
audit trail
records in a file both successful and unsuccessful access attempts An unsuccessful access attempt could result from a user mistyping his or her password, or it could result from a perpetrator trying thousands of passwords.
Digital Video Camera (DV)
records video as digital signals, which you can transfer directly to a computer or mobile device with an appropriate connection
Hard Drive
refers collectively to hard disks and SSDs. Hard drives can be internal or external. That is, they can reside inside a computer or mobile device, or they can be an external device that connects to a computer or some mobile devices
multimedia
refers to any application that combines text with media -media includes graphics, animation, audio, video, and virtual reality
Surfing the Web
refers to the activity of using links to explore the web
system unit
refers to the case that contain and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage
information privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Intellectual Property
refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, logos
Defragmenting
reorganizes the files so that they are located in contiguous sectors, which speeds access time.
Worm
resides in active memory and replicates itself over a network to infect computers and devices using system resources and possibly shutting down the system
Keywords
results that include all the important words in the phrase that search engines display
tape robot
retrieves tape cartridges
Restore Tool
reverses the process and returns backed up files to their original form
A common way to display a shortcut menu using a mouse is to ______.
right-click
mobile app
runs on a mobile device
Safari
s, Safari has been the default browser for macOS since 2003 and is relatively new to Windows. The browser has built-in sharing with online social networks, fast performance, parental controls, and ease of use.
A web ______ is a computer that delivers requested webpages to your computer or mobile device.
server
Online shopping websites generally use a ___ to keep track of items in a user's shopping cart.
session cookie
Balance Board
shaped like a weight scale and contains sensors that measure a game player's balance and weight
Infographic
short for information graphic, which is a visual representation of data or information designed to communicate quickly, simplify complex concepts, or present patterns or trends ex./ maps, signs, charts, and diagram -JPEG and PNG format is most common
Magstripe reader
short for magnetic stripe card reader, reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, identification cards The stripe contains information identifying you and the card issuer. Some information stored in the stripe may include your name, account number, the card's expiration date, and a country code.
pixel
short for picture element the smallest element in an electronic image -im megapixels (MP) or millions of pixels (digital cameras are usually stated with this) the greater number of pixels the camera uses the better quality
SMS
short message services -users can send and receive short text messages, typically fewer than 300 characters on a phone or other mobile device or computer -text message services typically provide users with several options for sending and receiving messages such as mobile to mobile, mobile to email, mobile to provider, web to mobile
file compression tool
shrinks the size of a file(s) You may need to compress a file so that it will fit on a smaller storage medium, such as a USB flash drive
SLR camera
single lens reflex camera - a high end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed -are much heavier and larger than point and shoot cameras
crimeware
software used by cybercriminals
Hardware gets instructions from...
software.
cyberextortionist
someone who demands payment to stop an attack on an organization's technology infrastructure They may threaten to destroy or damage computers for political reasons
cyberterrorist
someone who uses the Internet or network to destry or damage computers for political reasone
Selective Backup
sometimes called a (PARTIAL BACKUP) allows the user to choose specific files to back up, regardless of whether or not the files have changed since the last incremental backup.
Dye-sublimation printer
sometimes called a digital photo printer, uses heat to transfer color dye to specially coated paper. Used by photography studios, medical labs and security identification systems
USB flash drives
sometimes called a thumb drive plug into a USB port on a computer or mobile device convenient for mobile users because they are small and lightweight enough to be transported on a keychain or in a pocket. With a USB flash drive, users easily transfer documents, photos, music, and videos from one computer to another.
Full Backup
sometimes called an (ARCHIVAL BACKUP) provides the best protection against data loss because it copies all program and data files
Software Developer
sometimes called an application developer or computer programmer, is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information
Internet service provider (ISP)
sometimes called an internet access provider -is a business that provides individuals and organizations access to the Internet free or for a fee -often charge a fixed amount for internet connections, offering customers a variety of plans based on desired speeds, bandwidth, and services -may also include additional services like email and online storage
application (or app)
sometimes called application software, consists of programs designed to make users more productive and/or assist them with personal tasks
Motion input
sometimes called gesture recognition, users can guide on-screen elements using air gestures
Two popular adapter cards are
sound cards and video cards
Recovery Plan
specifies the actions to be taken to restore full info processing operations
Emergency Plan
specifies the steps to be taken immediately after a disaster strikes Includes: names and phone numbers of people and organizations to notify; Computer equipment procedures, such as equipment or power shut off, and file removal; Employee evacuation procedures; Return procedure
QR code
square-shaped coded graphic that corresponds to a web address or other information
nonvolatile
storage - its contents remain when power off
Index
stores a variety of information about a file including its name, date, modified, author name, and so on Each entry in the index contains a link to the actual file on the storage media for easy retrieval.
Mail Server
stores and delivers email messages
Web Server
stores and delivers requested webpages to a computer via a browser
List Server
stores and manages email lists
File server (storage server)
stores and manages files
Database server
stores and provides access to a database
Application Server
stores and runs apps
smart card
stores data on an integrated circuit embedded in the card
Domain Name Server
stores domain names and their corresponding IP addresses
FTP Server
stores files for user upload or download via FTP
Resolution
the number of horizontal and vertical pixels in a display A higher resolution uses a greater number of pixels and, thus, provides a smoother, sharper, and clearer image. As the resolution increases, however, some items on the screen appear smaller.
storage medium
the physical material on which a computer keeps data, information, programs, and applications
Port
the point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data to or receive information from the computer or mobile device
Cloud Storage
the practice of computer and mobile device users keeping their files on the cloud
Crowdsourcing
the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.
Virtualization
the practice of sharing or pooling computing resources, such as servers and storage devices
Video input
the process of capturing full motion images and storing them on a computer or mobile devices storage medium, such as a hard drive and an optical disk
Voice Input
the process of entering input by speaking into a microphone
e-filing
the process of filing your tax forms electronically
Burning
the process of writing on an optical disc
output
the production of information
Loads
the program's instructions are copied from storage to memory
Native resolution
the resolution for which displays are optimized for
script kiddie
the same intent as a cracker but does not have the technical skills and knowledge. Script kiddes often use prewritten hacking and cracking programs to break into computers and networks.
Transfer Rate
the speed with which data, instructions, and information transfer to and from a device
Candela
the standard unit of luminous intensity Displays today typically range from 250 to 700 nits. The higher the nits, the brighter the images.
Response time
the time (milliseconds) that it takes to turn a pixel on or off. These range between 2-16 ms
Access Time
the time it takes a storage device to locate its stored data The access time of storage devices is slow compared with the access time of memory. Memory (chips) accesses items in billionths of a second (nanoseconds). Storage devices, by contrast, access items in thousandths of a second (milliseconds) or millionths of a second (microseconds).
the transmission of messages and files via a computer network -one of the original services on the internet, enabling scientists and researchers working on government-sponsored projects to communicate with collegues at other locations
unauthorized use
the use of a computer or its data for unapproved or possibly illegal activities
unauthorized access
the use of a computer or network without permission
Computer Aided Design (CAD)
the use of computers in the design of products
Computer-aided manufacturing
the use of computers to assist with manufacturing processes, such as fabrication and assembly Industries use CAM to reduce product development costs, shorten a product's time to market, and stay ahead of the competition
Virtual Reality
the use of computers to simulate a reali imagined environment that appears as a 3-D space -VR involves the display of 3-D images that users explore and manipulate interactively In addition to games and simulations, many practical applications of VR also exist. Science educators create VR models of molecules, organisms, and other structures for students to examine. Companies use VR to showcase products or create advertisements. Architects create VR models of buildings and rooms so that clients can see how a completed construction project will look before it is built.
Blogsphere
the worldwide collection of blogs
Backward Compatible
they support older USB devices as well as newer ones
Active-matrix or TFT
thin-film transistor, uses a separate transistor to apply charges to each liquid crystal cell and thus, displays high quality color from all angles. Available in several types
Disk Cleanup
tool that searches for and removes unnecessary files Unnecessary files may include downloaded program files, temporary Internet files, deleted files, and unused program files
Multi-touch
touch screens that recognize multiple points of contact at the same time
Tethering
transforms a smartphone or internet capable tablet into a portable communications device that shares its Internet access with other computers and devices wirelessly Users may pay additional fees for mobile hot spot and tethering services. -mobile devices can be used for tethering also
Morphing
transforms one video image into another image over the course of several frames of video
Digital Device Convergence
trend of computers and devices with technologies that overlap it means that consumers may need fewer devices for the functionality that they require.
Wiki
type of software that creates an interface that enables users to add or edit the content of some types of websites
software registration
typically is optional and usually involves submitting your name and other personal information to the software manufacturer or developer
Spam
unsolicited email messages or posting sent to many recipients or forums at once considered Internet junk mail
Smart Cities
use the IoT, as well as advanced communications technologies, to help manage the city. For example, some cities might use connected devices to monitor and manage energy use or control traffic.
email program
used to create, send, receive, forward, store, print, and delete email messages Email programs are available as desktop apps, web apps, and mobile apps.
CSS (Cascading Style Sheets)
used to specify the contents appearance
Text Editor
used to type information when it does not need to be formatted with fonts, page numbers, or other styles
L4 cache
used with some newer processor and doesn't reside on the processor
Online Auction
users bid on an item being sold by someone else
Online Banking
users can access accounts, pay bills, transfer funds, calculate mortgage payments, and manage other financial activities from their computer or mobile device users can access accounts, pay bills, transfer funds, calculate mortgage payments, and manage other financial activities from their computer or mobile device
visual voice mail
users can view message details, such as the length of calls -can read message content instead of listening to them
swipe keyboards
users enter words by tracing a path on an on-screen keyboard with their fingertip or stylus from one letter to the next in a continuous motion
3-D Printer
uses a process called additive manufacturing to create an object by adding material to a three-dimensional object, one horizontal layer at a time. 3-D printers can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and more
wireless modem
uses a wireless communications technology (suh as cellular radio, satellite, or WiFi) to connect to the internet
NFC
uses close-range radio signals to transmit data between two NFC-enabled devices
Plasma Display
uses gas plasma technology, which sandwiches a layer of gas between two glass plates
Laser mouse
uses laser sensors that emit and sense light to detect the mouse's movement
Large-format printer
uses laser-ink printer technology, just on a much larger scale, it creates photo-realistic quality color prints. Used by graphic designers, v expensive v high performance
LCD projecter
uses liquid crystal to display technology, attaches directly to a computer or mobile device and uses its own light source to display the information shown on the computer screen.
Optical mouse
uses optical sensors that emit and sense light to detect the mouses movement
Wi-Fi
uses radio signals to provide high-speed Internet and network connections to computers and devices capable of communicating via Wi-Fi.
SATA (Serial Advanced Technology Attachment)
uses serial signals to transfer data, instructions, and information The primary advantage of SATA interfaces is that their cables are thinner, longer, more flexible, and less susceptible to interference than cables that use parallel signals.
Bluetooth
uses short-range radio signals to enable Bluetooth-enabled computers and devices to communicate with each other
IaaS (Infrastructure as a Service)
uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed
Real Time
you and the people with whom you are conversing are online at the same time For real-time Internet messaging to work, both parties must be online at the same time. Also, the receiver of a message must be willing to accept messages.
DV Technology
you can input, edit, manage, publish, and share your videos
Photo Management Software
you can view, organize, sort, catalog, print, and share digital photos
Pen-input
you touch a stylus or digital pen on a flat surface to write, draw or make selections
Media Sharing
you use the digital camera on your mobile device to take quality photos and/or videos and then instantly can share the photos or videos on online social networks.
web app
•an application stored on a web server that you access through a browser -Web apps usually store users' data and information on their hosts' servers -ie cloud storage
A connector
•joins a cable to a port •A connector at one end of a cable attaches to a port on the computer or mobile device, and a connector at the other end of the cable attaches to a port on the peripheral device
Gigahertz
One billion ticks of the system clock per second
E-retail
You can purchase just about any product or service on the web
Restore
Copying the backed up files to their original location on the computer or mobile device
portable media player
Mobile device on which you can store, organize, and play digital media.
Picture Message
A photo or other image, sometimes along with sound and text, sent to or from a smartphone or other mobile device.
GPS
(Global Positioning System) Navigation system that assists users with determining their location, ascertaining directions, and more
security suite
(Internet security programs) Collection of individual security tools available together as a unit
Point of Sale Terminals
(POS) records purchases, process credit or debit cards and update inventory Output from POS serves as input to other computers to maintain sales records, update inventory, verify credit, and perform other activities associated with sales transactions
Fingerprint Reader
(fingerprint scanner) captures curves and indentations of a fingerprint
M-Commerce
(mobile commerce) used to identify e-commerce that takes place using mobile devices.
QR Code
(quick response code) is known as a 2-D bar code bc it stores information in both vertical and horizontal directionin a square-shaped graphic that represents a web address or other content, such as contacts or phone numbers
Resources
networks share these such as hardware, software, data, and information. Sharing resources saves time and money
personal interest applications
- Lifestyle applications(Access the latest news or sports scores, check the weather forecast, compose music, research genealogy, find recipes, meet or chat with friends online near you, or locate nearby restaurants, gas stations, or points of interest.) - Medical applications (Research symptoms, establish a fitness or health program, track exercise activity, refill prescriptions, count calories, or monitor sleep patterns.) - Entertainment applications (Listen to music or the radio, view photos, watch videos or shows, read a book or other publication, organize and track fantasy sports teams, and play games individually or with others.) - Convenience applications (Obtain driving directions or your current location, convert speech to text instead of typing, set an alarm or timer, check the time, calculate a tip, use your phone as a flashlight, or use a personal assistant that acts on your voice commands) - Education applications (Access how-to guides, learn or fine-tune a particular skill, follow a tutorial, run a simulation, assist children with reading and other elementary skills, or support academics.)
security tools
-Anti-spam programs -Web filtering software -Phishing filters -Pop-up and pop-under blockers
communication applications
-Blog -Browser -Chat -Online Discussion -Email -File Transfer -Internet Phone -Internet Messaging -Mobile (Text) Messaging -Videoconference
TYPES OF OPTICAL DISC
-CD- ROM -CD-R -CD-RW -DVD-ROM -DVD-R/DVD+R -DVDRW/DVD+RW/ DVD+RAM
An SSD (solid state drive) has several advantages over traditional (magnetic) hard disks:
-Faster access times -Faster transfer rates -Quieter operation -More durable -Lighter weight -Less power consumption -Less heat generation -Longer life (more than 10 times longer) -Defragmentation not required
ENTERPRISE COMPUTING A large organization, commonly referred to as an enterprise, requires special computing solutions because of its size and geographic distribution
-Human resources software (manages employee information, such as pay rate, benefits, personal information, performance evaluations, training, and vacation time.) -Accounting and finance software (A manages everyday transactions, such as sales and payments to suppliers. F helps managers budget, forecast, and analyze.) -Engineering or product development software (allows engineers to develop plans for new products and test their product designs) -Manufacturing software (assists in the assembly process, as well as in scheduling and managing the inventory of parts and products.) -Marketing software (allows marketing personnel to create marketing campaigns, target demographics, and track their effectiveness.) -Sales software (enables the salesforce to manage contacts, schedule meetings, log customer interactions, manage product information, and take customer orders.) -Distribution software (analyzes and tracks inventory and manages product shipping status) -Customer service software (manages the day-to-day interactions with customers, such as phone calls, email messages, web interactions, and messaging sessions.) -Information technology software (use a variety of programs and apps to maintain and secure the hardware and software in an enterprise.)
Programs and apps are distributed in a variety of forms
-Retail software (mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company) -Custom software (performs functions specific to a business or industry.) -Shareware (copyrighted software that is distributed at no cost for a trial period) -Freeware (copyrighted software provided at no cost by an individual or a company that retains all rights to the software) -Open source software (software provided for use, modification, and redistribution. May have restrictions form copyright holder) -Public domain software (has been donated for public use and has no copyright restrictions.)
types of volatile
-SCREEN DISPLAY -contents disappear when power is removed -RAM-its contents are erased when power is removed from a computer or mobile device
Types of websites
-Search engine -Online social network -Informational and research -Media sharing -Bookmarking -News, weather, sports, and other mass media •Educational •Business, governmental, and organizational •Blogs •Wiki and collaboration •Health and fitness •Science •Entertainment •Banking and finance •Travel and tourism •Mapping •Retail and auctions •Careers and employment •E-commerce •Portals •Content aggregation •Website creation and management
The storage capacity of hard disks varies and is determined by:
-The number of platters the hard disk contains -The composition of the magnetic coating on the platters -Whether the disk uses longitudinal or perpendicular recording -Density
Characteristics of a hard disk include:
-Tracks -Sectors -Platters -Form factor -Read/write head -Revolutions per minute
Productivity applications can assist you in becoming more effective and efficient while performing daily activities at work, school, and home
-Word processing -Presentation -Spreadsheet -Database -Note taking -Calendar and contact term-57 -management -Project management -Accounting -Personal finance -Legal -Tax preparation -Document management -Support services -Enterprise computing
word processing software
-allows users to create and manipulate documents containing text and graphics -to develop documents such as letters, memos, reports, mailing labels, and newsletters Word processing software has many features to create professional and visually appealing documents. Word processing software allows users to incorporate graphics, such as digital photos and clip art, in document The page setup feature of word processing software allows you to define the size of the paper on which to print and to specify the margin Word processing software typically includes tools to assist you with the writing process
presentation software
-allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group -provides tools for creating slides with content arranged in a variety of formats. typically provides a variety of predefined presentation formats that suggest complementary colors for backgrounds, text, and graphical accents on the slides. Can set up slide timing, apply special effects, include images, photos, videos, clips, and audio clips, can be viewed in a variety of formats (including hard copy)
hard disk (hard disk drive, HDD)
-storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information -desktops and laptops often contain at least one hard disk. In a personal computer is enclosed inside an airtight, sealed case. (The laptop hard disk is much smaller than the desktop hard disk.)
"Software gives instructions to..."
...hardware." -Barb
Popular TLDs
.biz: Businesses .com: Commercial organizations, businesses, and companies .edu: Educational institutions .gov: Government agencies .mil: Military organizations .museum: Museums and individual museum professionals .name: Individuals .net: Network providers or commercial companies .org: Nonprofit organizations .pro: Licensed professionals .technology: Technology information .travel: Entities whose primary area of activity is in the travel industry
Gigabyte (GB)
1 billion bytes (2^30) 1 073 741 824
Megabyte (MB)
1 million (1,048,576) bytes
Yottabyte (YB)
1 septillion bytes
Zettabyte (ZB)
1 sextillion bytes
Kilobyte (KB)
1 thousand bytes 2^10 bytes 1,024 bytes
Terabyte (TB)
1 trillion bytes
Opporaters
1. space or + ex./ Art + Music 2. or Dog or puppy 3. () -combines search results 4. - excludes a word from research results ex./ automobile-convertible 5. "" search for an excat phrase in a certain order 6. * substitute characters in place of the asterisk
Evolution of the internet
1. started with a networking project started by the Pentagon's Advanced Research Project Agency (ARPA) and U.S. Department of Defense 1a) their goals were a network that allowed scientists at different physical locations to share information and work together on military and scientific projects and could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack. 2. created a network known as ARPANET (1969) linking scientific and academic scientists across the world 3. Today: Millions of hosts connect to the internet
Access time measures:
1. the amount of time it takes a storage device to locate an item on a storage medium 2. the time required to deliver an item from memory to the processor
Exabyte (EB)
1000 PB a quintillion bytes (10^18)
Petabyte (PB)
1000 TB or a quadrillion bytes
Widescreen monitors aspect ratio
16:9 or 16:10
A(n) ______ printer can print solid objects from materials including plastic, nylon, or wood.
3D
Docking Station
An external device that attaches to a mobile computer or device and contains a power connection and provides connections to peripheral devices.
Backup Plans
A backup plan specifies a regular schedule for copying and storing important data, information, apps, and programs. Organizations should state their backup plans clearly, document them in writing, and follow them consistently. Home and small business users can use a calendar app or other reminder to keep a backup schedule for their computers or mobile devices, or use a program or app that performs automatic backups.
Wireless Keyboard
A battery-powered device that transmits data to the computer or mobile device using wireless technology.
Wireless Mouse
A battery-powered device that transmits data using wireless technology.
Wiki
A collaborative website that can be edited by anyone that can access it.
Network
A collection of computers and devices connected together, often wirelessly, via communications devices and transmission media.
Database
A collection of data organized in a manner that allows access, retrieval, and use of that data Computer stores the data on a storage medium, such as a hard drive or flash drive, or the cloud.
Website
A collection of related webpages, which are stored on a web server.
Data
A collection of unprocessed items, which can include text, numbers, images, audio, and video.
Data (Input)
A collection of unprocessed items, which can include text, numbers, images, audio, and video.
Server
A computer dedicated to providing one or more services to other computers or devices on a network. A server can support from two to several thousand connected computers and devices at the same time. Smaller applications, such as at home, sometimes use a high-end desktop as a server. Larger corporate, government, and web applications use powerful, expensive servers to support their daily operations.
Buses
A computer processes and stores data as a series of electronic bits. These bits transfer internally within the circuitry of the computer along electrical channels, Allows the various devices both inside and attached to the system unit to communicate with one another Just as vehicles travel on a highway to move from one destination to another, bits travel on a bus Used to transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to output or storage devices
Personal Computer
A computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time
Web Server
A computer that delivers requested webpages to your computer or mobile device.
worksheet
A computerized spreadsheet in Excel. columns and rows collectively
The Internet of Things
A computing environment where everyday objects, or things, are connected to the Internet Sensors connected to these objects may gather, share, transmit, and receive data about the objects with other devices or servers online
storage area network (SAN)
A dedicated network storage facility that provides access to data storage over a high-speed network. -provides centralized storage for servers and networks. Includes only storage devices. High-speed fiber-optic cable usually connects other networks and servers to the storage area network, so that the networks and servers have fast access to large storage capacities.
All -in-One Computer
A desktop that does not contain a tower but instead uses the same case to house the display and the processing circuitry.
Phablet
A device that combines the features of a smartphone with a tablet. Larger than smartphones but smaller than tablets
Convergence
A device that has multiple focuses.
Stand Alone Device
A device with one main focus. May have more features and functionality than combined devices Might also be bought because person wants to use this and a combined device at the same time
Monitor
A display that is packaged as a separate peripheral device. Today's monitors have a small footprint, meaning they do not take up much desk space. Sizes of these displays vary based on the mobile device or computer
Backup
A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
Backup
A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
Anticybersquatting Consumer Protection Act (ACPA)
A federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.
Single Sign On
A gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications. EX) google, microsoft, twitter, facebook
Network License
A legal agreement that allows multiple users to access software on the server simultaneously.
Site License
A legal agreement that permits users to install software on multiple computers-usually at a volume discount.
Gesture
A motion you make on a touch screen with the tip of one or more fingers or your hand.
Personal Computer (PC)
A personal computer (PC) is a mobile computer or desktop that can perform all of its input, processing, output, and storage activities by itself and its intended to be used by one person at a time
Desktop Computer
A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. The screen is separate from the tower with the exception of the all-in-one.
Video Message
A short video clip, usually about 30 seconds, sent to or from a smartphone or other mobile device.
dongle
A small device that connects to a computer and enables additional functions when attached
tape cartridge
A small, rectangular, plastic housing for tape.
Personal Firewall
A software firewall that detects and protects a personal computer and its data from unauthorized intrusions Personal firewalls constantly monitor all transmissions to and from the computer and may inform a user of any attempted intrusions.
Wheel
A steering-wheel-type input device that users turn to simulate driving a car, truck, or other vehicle
Slate Tablet
A tablet that does not contain a physical keyboard.
Blog
An informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order.
stick computer
AKA PC stick - a small computer which usually is the same size as or a little larger than a USB flash drive -typically plug into an HDMI port on a computer monitor or a TV and can run operating systems and apps similar to those that run on a desktop or laptop -most rely on stick computer to browse the web, stream media, run apps, and play games they are small and easy to transport. They have limited storage and not as powerful as laptops but are typically cheaper
Laptop
AKA a notebook computer is a thin, lightweight mobile computer with a screen in its lid and a keyoboard in its base -have input devices such as keyboards, touchpad, webcam -have output devices such as screens and speakers -have storage such as hard drive and maybe optic disk drive
Plug ins
AKA add-on -a program that extends capability of a browser ex./ your browser may require Adobe Reader to view and print PDF files ^can download plug-ins at no cost from various websites \\ >some plug-ins run on all types of computers and mobile devices; others have special versions for mobile devices
desktop
AKA desktop computer -a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or tablet Components: peripheral devices such as keyboard, mouse, and webcam (input devices), speakers and printer (output devices), external hard drive *storage device), router/modem (communication devices)
online discussion
AKA discussion forum -an online area in which users have writte discussions about a particular subject -to participate, a user posts a message called an article and other users reply with a message
Printout
AKA hard copy is either in portrait or landscape mode
Malware
AKA malicious software Consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices
rack server
AKA rack-mounted server -a server that is housed in a slot on a metal frame (rack) -a rack can contain multiple servers, each with a different bay. The rack is fastened to a flat service
smartglasses
AKA smart eyewear -augmented reality glasses are reality glasses,are wearable head-mounted eyeglass-type device that enables the user to view info or take photos and videos that are projected to a miniature screen in the users field of vision.
digital media player
AKA streaming media player - a device typically used in a home that streams digital media from a computer or network to a TV, projector or some other entertainment device
Motherboard
AKA systems board Is the main circuit board of the personal computer. Many electrical components attach to the motherboard. They can also integrate sound, video, and networking capabilities Components: processor and memory
Virus Signature
AKA virus definition a known specific pattern of virus code helps to identify the virus should be updated frequently
Mobile service provider
AKA wireless data provider EX) Verizon Wireless -an ISP that offers wireless Internet access to computers and mobile devices with the necessary built in wireless capability such as wifi, wireless modems, or other communication devices to enable wireless connectivity
ARPANET
ARPANET consisted of 4 main computers at California at LA, the University of California, Stanford Research Institute, and the University of Utah 1984 ARPANET has more than 1000 individual computers linked as hosts function even if part of the network were disabled or destroyed by a disaster
Advantages of Cloud Storage
Access files from any computer. Store large files instantaneously, Allow others to access their files. View time-critical data and images immediately. Store offsite backups. Provide data center functions
Why SSds have Faster Access Time than Hard Disc
Access time on a hard disk depends on the location of the data. That is, the data on the platter near the read/write head is accessed faster. The data on an SSD, by contrast, can be accessed almost instantly wherever it is located because the drive contains no moving parts.
Cloud Computing Reason 1
Accessibility: Data and/or applications are available worldwide from any computer or device with an Internet Connection
Tasks Personal Assistants do
Activate your device's personal assistant Change phone settings Dial a number Obtain information Obtain driving instructions Run an app Schedule a meeting Send a text message Set a reminder Set a timer Set an alarm
Expansion bus
Allows the processor to communicate with peripheral devices
Browser
Allows users to access and view webpages on the Internet Requires browser software Integrated in most operating systems Many alternative browsers are available
Internet Phone
Allows users to speak to other users via an Internet connection Requires a microphone, a speaker, a high-speed Internet connection, and VoIP software Some subscription services also require a separate phone and VoIP router With a webcam, some services also support video chat or videoconferences
Video Card
Also called a graphics card, converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen.
All in One Printer
Also called a multi function printer (MFP) a single device that looks like a printer or a copy machine, but provides the functionality of a printer, scanner, copy machine and perhaps a fax machine
System Bus
Also called the front side bus (FSB) Part of the motherboard and connects the processor to main memory
Dots per Inch (dpi)
Also known as printer resolution. The number of dots of colour a printer is capable of producing in a certain amount of space.
When Should You Use a Database Instead of a Spreadsheet Program?
Although databases and spreadsheets both store data, these programs have different purposes and capabilities. Spreadsheet programs are ideal for calculating results or creating charts from value in the worksheet. You should use a database program, however, if want to collect, reorganize and filter data, and/or create reports from the data.
ASCII
American Standard Code for Information Interchange, is the most widely used coding scheme to represent a set of characters
Touch-Sensitive Pad
An input device that contains buttons and/or wheels you operate with a thumb or finger. Using the touch-sensitive pad, you can scroll through and play music; view photos; watch videos or movies; navigate through song, photo, or movie lists; display a menu; adjust volume; customize settings; and perform other actions.
ADA
Americans With Disabilities Act requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers Besides voice recognition, which is ideal for blind or visually impaired users, several other input options are available. Users with limited hand mobility who want to use a keyboard can use an on-screen keyboard or a keyboard with larger keys. Users with limited hand movement can use a head-mounted pointer to control the pointer or insertion point Hearing-impaired users, for example, can instruct programs to display words instead of sounds. Visually impaired users can change screen settings, such as increasing the size or changing the color of the text to make the words easier to read. Instead of using a monitor, blind users can work with voice output.
Access Time
Amount of time it takes the processor to read data, instructions, and information from memory. Directly affects how fast the computer processes data accessing data in memory can be more than 200,000 times faster than accessing data on a hard disk because of the mechanical motion of the hard disk.
Pop-up ad
An Internet advertisement that suddenly appears in a new window on top of a webpage displayed in a browser.
Cloud Storage
An Internet service that provides remote storage to computer users. Types of services offered by cloud storage providers vary. Some provide storage for specific types of media, such as photos, whereas others store any content and provide backup services
Trackpad
An alternative to a mouse often found on laptops. It is a small rectangle of touch-sensitive material, so you can move your pointer and/or click by touching it with and moving your.
Desktop App
An application stored on a computer.
Web App
An application stored on a web server that you can access through a browser.
legal software
An application that assists in the preparation of legal documents and provides legal information to individuals, families, and small businesses Legal software provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.
note taking software
An application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook. Users also can include audio recordings as part of their notes. Some enable users to sync their notes to the cloud so that they can access the notes on any computer or mobile device. Many note taking applications also include a calendar feature.
Trial Version
An application you can use at no charge for a limited time, to see if it meets your needs. Limited functionality
Mobile App
An application you download from a mobile device's application store or other location on the Internet to a smartphone or other mobile device.
denial of service attack (DoS attack)
An assault whose purpose is to disrupt computer access to an Internet service such as the web or email. The victim computer network slows down considerably and eventually becomes unresponsive or unavailable, blocking legitimate visitors from accessing the network.
Computer
An electronic device that operates under the control of a set of instructions that is stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use.
Webpage
An electronic document on the web which can contain text, graphics, audio, and video.
Signs of Virus and Malware infections
An unusual message or image is displayed on the computer screen. An unusual sound or music plays randomly. The available memory is less than what should be available. A program or file suddenly is missing, or an unknown program or file mysteriously appears. The computer's security tools, such as antivirus software or firewall, become disabled. The size of a file changes without explanation. A file becomes corrupted. A program will not run. The computer operates much slower than usual. Your browser displays pop-ups that you cannot close or webpages you did not request when you are online.
Arithmetic Logic Unit
Another component of the processor, performs arithmetic, comparison, and other operations
Notebook Computer
Another term for a laptop computer.
Host
Any computer or device that provides services and connections to other computers or devices on a network -a web server is an example of a host -hosts often use high-speed communications to transfer data and messages over a network
Enterprise
Any employee or customer who uses computers, mobile devices, and other technology within the big business enterprise
Small/Home Office User (SOHO)
Any employees of a company with fewer than 50 employees, as well as the self-employed who work from home
input device
Any hardware component that allows users to enter data and instructions into a computer.
output device
Any hardware component that conveys information to one or more people.
Power User
Any person who requires the capabilities of a powerful computer such as engineers, scientists, architects, desktop publishers, and graphic artists
Home User
Any person who spends time using technology at home
Mobile User
Any person who works with computers or mobile devices while away from a main office, home, or school
user
Anyone who communicates with a computer or utilizes the information it generates.
User
Anyone who interacts with a computer or mobile device, or utilizes the information it generates.
desktop app
Applications stored on a laptop computer or desktop
Second way of how memory stores
Applications that carry out a specific task, such as word processing
Steps to replace broken mobile device
Back up the data on your mobile device before starting a screen replacement. While a successful screen replacement should not threaten the data, it is a good idea to keep a backup in case a problem arises unexpectedly. Turn off the mobile device and disconnect it from all power sources. If the device uses a removable battery, remove it. Protect your hands and eyes before beginning glass replacement. If possible, carefully remove all pieces of broken glass. Consider using compressed air to remove any dust. Remove the display assembly. Refer to your device's documentation for information about removing the display. You may need a small, nonmagnetic screwdriver and/or metal or plastic tool to remove the assembly. If the display assembly is connected to the mobile device with a cable, carefully disconnect the cable. Unpack the new screen and connect it to the mobile device, connecting any necessary cables. Reassemble the mobile device, reconnect the power source and/or the battery, and turn on the device.
UPC (Universal Product Code)
Bar code used by retail and grocery stores.
Arithmetic Operations
Basic calculations, such as addition, subtraction, multiplication, and division
Practices gamers should practice to increase security
Before downloading any software or apps, including patches to games, or disclosing any private details, check the developer to be certain the website or the person making the request is legitimate. Read the permissions notices to learn what information is being requested or being collected. Avoid games requiring passwords to be saved to an online account on a smartphone. Exercise extreme caution if the game requires ActiveX or JavaScript to be enabled or if it must be played in administrator mode. Use a firewall and make exceptions to allow only trusted individuals to access your computer or mobile device when playing multiplayer online games. Do not share personal information with other gamers whom you meet online.
Parvati wants to find out more information about purchasing a computer, so she performs a web search. Parvati should use a search engine, such as ______.
Bing
microblog
Blog that allows users to publish short messages, usually between 1. Introduction to Computers00 and 200 characters, for others to read.
Types & Purposes of some Adapter Cards
Bluetooth: enables Bluetooth connectivity MIDI: connects to musical instruments Modem: connects to transmission media, such as cable television lines or phone lines Network: provides network connections, such as to an Ethernet port Sound: connects to speakers or a microphone TV tuner: allows viewing of digital television broadcasts on a monitor USB: connects to high-speed USB ports Video: provides enhanced graphics capabilities, such as accelerated processing or the ability to connect a second monitor Video capture: connects to a digital video camera
Antistatic Wristband
Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user.
L1 cache
Built directly on the processor chip. Usually has a very small capacity
Types of E-Commerce Websites
Business-to-consumer (B2C) e-commerce consists of the sale of goods and services to the general public, such as at a shopping website. Consumer-to-consumer (C2C) e-commerce occurs when one consumer sells directly to another, such as in an online auction. Business-to-business (B2B) e-commerce occurs when businesses provide goods and services to other businesses, such as online advertising, recruiting, credit, sales, market research, technical support, and training.
CD-R
CD-recordable is an optical disc on which users can write once, but not erase format called WORM (b/c you can write once and read many) some are MULTISESSION (you can write on part of disc at one time and another part at another time)
Photo CD
CDs that contain only photos.
common short code
CSC a four or five digit number assigned to a specific content or mobile service provider sometimes forllowed by the message ex./ a vote for a TV program contestant or donation to a charity
L3 Cache
Cache on the motherboard that is separate from the processor chip
Transistor
Can act as an electronic switch that opens or closes the circuit for electrical charges Today's computer chips contain millions or billions of transistors.
system unit
Case that contains the electronic components of a computer that are used to process data.
How to download apps safely?
Choose apps from Google Play for Android devices or the App Store for Apple devices. Choose software from reputable shareware, freeware, and public-domain download websites that offer products for your computer or device. Be wary of apps that do not have many reviews or apps that were added recently, unless you can verify the developer or publisher. Search for reviews from reputable websites. Obtain the latest versions of shareware, freeware, and public-domain software and apps.
Chrome
Chrome has independent tabbed browsing; if one tab experiences a problem, the other tabs continue to function.
Useful Products in Securing and Tracking Hardware
Clamps, cables, and locks Intrusion detection Tracking software Asset tags Personal safes
desktop computer
Computer designed so the system unit, input devices, output devices, and any other devices fit entirely on or under a desk or table.
handheld computer
Computer small enough to fit in one hand. See also handhelds or Ultra-Mobile PC (UMPC).
personal computer
Computer that can perform all of its input, processing, output, and storage activities by itself and contains a processor, memory, and one or more input and output devices, and storage devices.
server
Computer that controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information.
enterprise user
Computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with offices across a region, the country, or the world.
mobile device
Computing device small enough for a user to hold in his or her hand.
Backside Bus
Connects the processor to a cache
Solid State Media
Consist entirely of electronic components and contain no moving parts. The lack of moving parts makes flash memory storage more durable and shock resistant than other types of media, such as magnetic hard disks or optical discs.
Web
Consists of a worldwide collection of electronic documents.
Social Media
Consists of content that users create and share online, such as photos, videos, music, links, blog posts, Tweets, wiki entries, podcasts, and status updates. Social media websites facilitate the creation or publishing of social media online and include media sharing sites, bookmarking sites, blogs and microblogs, wikis, podcasts, online social networks, and online gaming sites.
Memory
Consists of electronic components that store instructions waiting to be executed and the data needed by those instructions.
Memory
Consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data(information) Usually consists of one or more chips on the motherboard or some other circuit board in the computer
Main memory
Consists of memory chips that can be read from and written to by the processor and other devices
The back end of Cloud Computing
Consists of the servers and storage devices that manage and store the resources accessed by users
Integrated circuit
Contains many microscopic pathways capable of carrying electrical current. Each integrated circuit can contain millions of elements such as resistors, capacitors, and transistors
System Clock
Control the timing of all computer operations System clock generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit.
VoIP
Conversation that takes place over internet using telephone connected to computer, mobile device, or other device
Differential backup
Copies only the files that have changed since the last full backup. Fast backup method. Requires minimal storage space to back up. Recovery is time-consuming because the last full backup plus the differential backup are needed.
Incremental Backup
Copies only the files that have changed since the last full or incremental backup. Fastest backup method. Requires minimal storage space to back up. Only most recent changes saved. Recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed.
Photo Editing Features
Crop: removes unwanted areas of a photo Remove red-eye: removes the appearance of red eyes caused by the camera flash Resize: changes the physical dimensions of the photo Compress: decreases the photo's file size Adjust Sharpness: increases or decreases crispness of objects in the photo Adjust brightness: adjusts lightness or darkness in the photo
Tabbed browsing
Current browsers typically support - the top of the browser shows a tab (similar to a file folder tab) for each webpage you display To move from one displayed web page to another, you click the tab in the browser. Tabbed browsing allows users to have multiple home pages that automatically are displayed when the browser runs You also can organize tabs in a group, called a tab group, and save the group as a favorite, so that at any time you can display all tabs at once.
Digital light processing
DLP projector, uses tiny mirrors to reflect light, which produces crisp, bright colorful images, the remain in focus and can be seen clearly even in well-lit room
What to Avoid to Keep Credit Card Safe
DO NOT Reveal your account number during a phone call unless you have initiated the call. Write your PIN on the card or on the protective envelope. Sign a blank charge slip. Carry extra cards, especially when traveling to unfamiliar locations. Let your card out of sight. While you may not be able to follow this advice at a restaurant when you hand the card to a server, you can be observant of employees' behaviors.
Data as a Service
DaaS (data as a service) allows users and applications to access a company's data
small office/home office (SOHO)
Describes any company with fewer than 50 employees, as well as the self-employed who work from home.
online
Describes the state of a computer when it is connected to a network.
Workstation
Designed to handle intense calculations and sophisticated graphics. Used by power users
Gaming Desktop
Desktop that offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games
Two common types of RAM
Dynamic RAM and Static RAM
Parts of a web address
EX) https://www.nps.gov/history/preserve-places.htm Protocol: https:// Host Name: www. Domain Name: nps.gov/ Path: history/ Webpage Name: preserve-places.htm
Multi Core vs Single Core Processor
Each processor core on a multi-core processor generally runs at a slower speed than a single-core processor, but multi-core processors typically increase overall performance. Multi-core processors also are more energy efficient than separate multiple processors, requiring lower levels of power consumption and emitting less heat inside the case.
Edge
Edge is a Microsoft browser included in the Windows operating system. It is the default browser for Windows on most devices and is not compatible with prior versions of Windows. Features include integration with Cortana and OneDrive, along with annotation and reading tools.
hardware
Electric, electronic, and mechanical components contained in a computer.
5 types of hardware
Electric, electronic, mechanical components, motherboard, CPU
processor (aka CPU central processing unit)
Electrical component that interprets and carries out the basic instructions that operate a computer.
processor
Electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. See also CPU (central processing unit).
memory
Electronic components in a computer that store instructions waiting to be executed and data needed by those instructions.
computer
Electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use.
Web page
Electronic document on the Web, which can contain text, graphics, animation, audio, and video and often has built-in connections to other documents, graphics, Web pages, or Web sites.
Wireless Internet Access Points
Enables users with computers and mobile devices to connect to the Internet wirelessly
Licence Agreement
End User License Agreement (EULA) the right to use a program or app provides specific conditions for use of the software, which a user typically must accept before using the software
telemedicine
Form of long-distance health care where health-care professionals in separate locations conduct live conferences on the computer.
Graphics Processing Unit
GPU, the chip which controls the manipulation and display of graphics on display devices
Motion-Sensing Game Controller
Game controllers that allow the user to guide on-screen elements with air gestures, that is, by moving their body or handheld input device through the air. some are sold with specific game or with general purposes
Obtaining Games
Gamers have several options available for obtaining games. For tablets and smartphones, they can download games from an app store to a mobile computer or device. For game consoles, they can purchase or rent discs or other media that contain games, download or transfer them from online stores, or sign up for cloud services that stream or transfer games on demand.
GBps
Gigabytes per second.
The front end of Cloud Computing
Hardware and software with which a user interacts to access the cloud
communications device
Hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers.
storage device
Hardware used to record (write and/or read) items to and from storage media.
resources
Hardware, software, data, and information shared using a network.
Storage Appliance
Has its own IP address, usually does not have a keyboard or display, and contains at least one hard disk, often configured in a RAID.
SIMM (single inline memory module)
Has pins on opposite sides of the circuit board that connect together to form a single set of contacts
digital literacy
Having a current knowledge and understanding of computers and their uses. See also computer literacy.
Digital Literacy
Having a current knowledge and understanding of computers, mobile devices, the web, and other related technologies.
Memory Cache
Helps speed the processes of the computer because it stores frequently used instructions and data
HDTV
High def TV, is the MOST advance form of digital television, working with digital broadcast systems, transmitting digital sound, supporting widescreens and providing high resolutions
iris recognition system
High security areas use iris recognition systems. The camera in an iris recognition system uses iris recognition technology to read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data. Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina.
HDMI
High-Def Media Interface port combines DVI with high def TV and video
Digital Media
Includes music, photos, and videos
Hard Copy
Information that exists on a physical medium such as paper Many users opt for electronic distribution because it contributes to green computing.
Internet and Network Attacks
Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.
The Chip (Microchip)
Inserted under skin at neck or shoulder has a unique number that is registered to the owner's name and address. It contains an antenna and transponder encased in a glass tube. The antenna receives low-frequency radio waves when a scanning device passes over the chip, and the transponder sends a signal with the chip's number back to the scanner.
Leading manufacturers of personal computers processor chips
Intel and AMD
Processor (Central Processing Unit; CPU)
Inteprets and carries out the basic instructions that operate a computer It significantly impacts overall computing power and manages most of a computer's operations
KBps
Kilobits per second
mainframe
Large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information.
Alphanumeric Characters
Letters and numbers and special symbols to a sequence of numeric values that a computer can process
Most personal computers today have two types of memory cache:
Level 1(L1) cache and Level 2 (L2) cache Some also have Level 3 (L3)
Home Automation
Lighting: controlling lighting is one of the more common uses of technology in the home. Thermostats: programmable thermostats adjust to seasonal needs and can be set to control temperatures in individual rooms. Appliances: smart appliances, such as dishwashers, can be programmed to run at non peak electrical times. Security: security systems can detect break-ins at doors and heat from fires, and they can send text and email messages to alert a homeowner when someone has entered or left the home. Remotes: many people are turning to using their smartphones and tablets to control all the devices in the room.
PDA
Lightweight mobile device that provides personal information management functions such as a calendar, appointment book, address book, calculator, and notepad. See also personal digital assistant.
FAQ
List that helps a user find answers to commonly asked questions.
Health and Fitness
Losing weight, training for a race, or following a low-calorie diet are some uses of health and fitness apps.
Malware
Malicious Software - Software that acts without a user's knowledge and deliberately alters the computer's or mobile device's operations.
News, Sports, and Weather
Many apps provide access to the latest news, stories, current events, sports scores, sporting events, and weather forecasts. You also can configure these apps to deliver text messages and other types of alerts to your device when certain events occur,
Superscalar
Means they can execute more than one instruction per clock cycle
Machine Cycle: Storing
Means writing the result to memory
videoconference
Meeting between geographically separated people who use a network to transmit video/audio Requires videoconferencing software, a microphone, a speaker, and a webcam
MBps
Megabytes per second
Two common types of cache are
Memory cache and Disk cache
File Transfer
Method of uploading files to and downloading files from servers on the Internet May require an FTP client program Integrated in some operating systems Many applications (such as web authoring software) that require frequent transfer of files to the Internet have built-in FTP capabilities
Game Console
Mobile computing device designed for single or multi-player video games
game console
Mobile computing device designed for single-player or multiplayer video games.
RAM (random access memory or main memory)
Most common type of volatile memory Typically refer when discussing computer and mobile device memory The processor interprets and executes a program or application's instructions while the program or application and data are requested, they also load into this from storage Can accommodate multiple programs and applications simultaneously If the instruction or data is not found in memory, then it must search a slower speed storage medium, such as a hard drive or optical disc consists of memory chips that can be read from and written to by the processor and other devices
Digital
Most computers are this The computers recognize only two discrete states: on and off
Stretch Gesture
Move two fingers apart.
Pinch Gesture
Move two fingers together.
Dynamic RAM
Must be re energized constantly or they lose its contents. Many variations of DRAM chips exist, most of which are faster than the basic DRAM
If you want to connect multiple devices together in your home to share a single Internet connection and devices such as a printer, what should you do?
Network your devices
Proper Care of Optical Disc
Never bend one Don't expose to extreme temperatures Stacking them, touching the underside, or exposing them to contaminant may scratch it Place in its protective case (JEWEL CASE)
Word size
Number of bits the processor can interpret and execute at a given time Computers with a larger this can process more data in the same amount of time than computers with a smaller word size
Binary System
Number system that has just two unique digits. 0 and 1, called bits The two digits, 0 and 1, easily can represent these two states (Figure 6-8). The digit 0 represents the electronic state of off (absence of an electronic charge). The digit 1 represents the electronic state of on (presence of an electronic charge).
Features found on Music Sharing Sites
Playlists: musicians and listeners can organize the songs and albums into specific categories, such as by artist or genre. In a playlist, each song can be played sequentially or shuffled to play in random order. Compatibility: Some file types will not play on specific mobile devices, so check permissible formats before attempting to upload or download songs. Features: Services show the album cover, list artist information, and provide song previews. Titles: Musicians use music hosting websites as a convenient method of distributing their works.
Streaming Audio and Video
Podcasts, video blogs, clips or episodes from a television show, or even entire movies are available through a variety of streaming media web and mobile apps Streaming media enables you to view and listen to content without downloading it to your computer or device.
Portable Document Format Developed by Adobe Systems To interact with a PDF file, you need a PDF reader application, such as Adobe Reader With a document reader, you can view, create, search, convert, annotate, edit, share, and print documents
notebook computer
Portable, personal computer often designed to fit on your lap. See also laptop computer.
laptop computer
Portable, personal computer often designed to fit on your lap. See also notebook computer.
Virus
Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
Virus
Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. The programmer of a virus, known as a virus author, intentionally writes a virus program
Toner
Powdered ink used in a laser printer
green computing
Practices that involve reducing the electricity consumed and environmental waste generated when using a computer.
Swipe Gesture
Press and hold one finger and then move the finger horizontally or vertically on the screen.
Drag or Slide Gesture
Press and hold one finger on an object and then move the finger to the new location.
Press and Hold Gesture
Press and hold one finger to cause an action to occur, or until an action occurs.
execute
Process of a computer carrying out the instructions in a program.
Machine Cycle: Executing
Process of carrying out the commands
Synchronize or Sync
Process of matching the files on computers or mobile devices in two or more locations with each other. Syncing can be a one-way or a two-way process. With a one-way sync, also called mirroring, you add, change, or delete files in a destination location, called the target, without altering the same files in the original location, called the source. In two-way sync, any change made in one location also is made in any other sync location.
Machine Cycle: Fetching
Process of obtaining a program or an application instruction or data items from memory
installing
Process of setting up software to work with the computer, printer, and other hardware components.
Streaming
Process of transferring data in a continuous and even flow which allows users to access and use a file while it is transmitting You can listen to streaming audio or watch streaming video, such as a live performance or broadcast, as it downloads to your computer, mobile device, or an Internet-connected television.
Uploading
Process of transferring documents, graphics, and other objects from a computer to a server on the Internet.
run
Process of using software.
information
Processed data that conveys meaning and is useful to people.
spyware
Program placed on a computer without the user's knowledge that secretly collects information about the user.
Worm
Program that copies itself repeatedly
Trojan Horse
Program that hides within or looks like a legitimate program
Web Filtering Software
Program that restricts access to certain material on the Web.
Web Filtering Software
Program that restricts access to certain material on the Web. Some restrict access to specific websites; others filter websites that use certain words or phrases
Tap Gesture
Quickly touch and release one finger one time.
Double Tap Gesture
Quickly touch and release one finger two times.
RFID
Radio Frequency Identification, a technology that uses radio signals to communicate with a tag placed in or attached to an object or a person RFID tags, which contain a memory chip and an antenna, are available in many shapes and sizes.
Precautions smartphone users can take against malware threats
Read reviews of apps and the companies that create them before downloading the apps to your mobile device. Use mobile malware and antivirus protection. Grant apps access to only the data or phone capabilities needed to run. Turn off or delete apps that you do not use regularly. Keep the operating system and apps up to date. Enable the screen lock feature, and use a strong password to unlock the device. Reset the mobile device to factory settings before selling or trading it in.
Video-conference
Real time meeting between two or more geographically separated people who use a network to transmit audio and video
instant message
Real-time Internet communication where you exchange messages with other connected users.
Instant Messaging
Real-time exchange of messages, files, audio, and/or video with another online user
Internet Messaging
Real-time exchange of messages, files, images, audio, and/or video with another online user Requires messaging software Provided by some online social networks Also available as a browser plug-in
Chat Rooms
Real-time typed conversation among two or more people on a computers or mobile devices connected to a network
Chat
Real-time, online typed conversation with one or more users Requires chat client software Integrated in some operating systems and built into some websites Included with some paid ISPs
podcast
Recorded audio stored on a Web site that can be downloaded to a computer or a portable media player such as an iPod.
Green Computing Strategies (the six mentioned in the book)
Recycling, using energy efficient hardware and energy saving features, regulating manufacturing processes, extending the life of computers, immediately donating or properly disposing of replaced computers.
How to locate keyboard toggling?
Run Detection Software Regularly: several antivirus and spyware detection programs check for known keylogging programs. Review Hard Drive Files: regularly look at the most recent files and note any that are updated continually. These files might be the keylogging software's logs. Check Running Programs: periodically examine which software is loaded from the computer's hard drive into memory when you start the computer and which are running while you are using the computer. If you are uncertain of any program names, perform a search to learn the software's function and if it is a known keylogging program.
How to use a Browser to display a WEbpage
Run a browser. (Running programs and apps is discussed later in this module.) If necessary, click the address bar to select it and any previously displayed web address it may contain. (A web address is a unique address that identifies a web page.) In the address bar, type the web address of the webpage you want to visit and then press the enter key or click the Go (or similar) button to display the webpage. For example, www.cengagebrain.com is a valid web address, which displays the CengageBrain webpage. (Module 2 discusses the components of a web address.) If necessary, scroll to view the entire webpage. You can scroll either by sliding your finger across a touch screen or by using a pointing device, such as a mouse, to drag the scroll bar. Click links on the web page to navigate to the link's destination.
Common DRAM
SDRAM (Synchronous DRAM) Synchronized to the system clock Much faster than DRAM DDR SDRAM (Double Data Rate SDRAM) Transfers data twice, instead of once, for each clock cycle Faster than SDRAM DDR2 Second generation of DDR Faster than DDR DDR3 Third generation of DDR Designed for computers with multi-core processors Faster than DDR2 DDR4 Fourth generation of DDR Faster than DDR3 RDRAM (Rambus DRAM) Much faster than SDRAM
Two types of memory modules are
SIMM and DIMM
Why Would You Use a Software Suite Instead of a Stand-Alone Application?
SS offer: Ease of use; Integration; and Lower Cost
How a laser reads data on an optical disc
STEP 1 - a laser diode shines a light beam toward the disc STEP 2 -if light strikes a pit, it scatters, if light strikes a land, it is reflected back toward the last diode. STEP 3 -reflected light is deflected to a light sensing diode, which sends a digital signal of 1 to the computer absence of reflected light signal of 0
How a hard disk works
STEP 1 -the circuit board controls the movement of the head actuator and a small motor. STEP 3 -a small motor spins the platter while the computer is running STEP 4 -when software requests disk access, the read/write heads determine the current or new location of the data. STEP 5 -the head actuator positions the read/write head arms over the correction location on the platters to read or write data.
Cloud Computing Reason 4
Scalability: Provides the flexibility to increase or decrease computing requirements as needed
Registers
Small high-speed locations that temporarily hold data and instructions Part of the processor, not part of memory or a permanent storage device. Functions include storing the location from where an instruction was fetched, storing an instruction while the control unit decodes it, storing data while the ALU calculates it, and storing the results of a calculation
Wearable Device
Small mobile computing consumer device designed to be worn and that often communicate with a mobile device or printer. Two popular wearable devices are activity trackers and smartwatches. Activity trackers monitor heart rate, measure pulse, count steps, and track sleep patterns. In addition to keeping time, a smartwatch can communicate with a smartphone to make and answer phone calls, read and send messages, access the web, play music, work with apps, such as fitness trackers and GPS, and more.
Chip
Small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
Earbuds
Small speakers that rest inside each ear canal
earbuds
Small speakers that rest inside each ear canal
Cookie
Small text file that a Web server stores on a computer when you view a page Used to remember information Typically expire after short periods (30 days)
Compact Keyboard
Smaller than a standard keyboard and usually does not include a numeric keypad
Bit (binary digit)
Smallest unit of data the computer can process
Expansion slot
Socket on a desktop or server motherboard that can hold an adapter card.
Browser
Software that enables users with an Internet connection to access and view webpages on a computer or mobile device.
Search Engine
Software that finds websites, webpages, images, videos, news , maps,and other information related to a specific topic.
Keyboard Monitoring Software
Software that runs undetected and stores every keystroke in a file for later retrieval. When used in a positive fashion, employers can measure the efficiency of data entry personnel. This software also can verify that employees are not releasing company secrets, are not viewing personal or inappropriate content on work computers, and are not engaging in activities that could subject the company to harassment, hacking, or other similar charges. When used for malicious purposes, criminals use the programs on both public and private computers to capture user names, passwords, credit card numbers, and other sensitive data and then use this data to access financial accounts and private networks.
Desktop as a Service
Some companies specify the applications, security settings, and computing resources available to employees on their desktop computers. These images, or configurations, provide a common desktop work environment available to employees across an entire organization. Because the desktop and its applications appear to be installed on the user's own computer, desktop as a service also is known as a virtual desktop.
How Are Productivity Web Apps Different from Productivity Desktop Apps?
Some word processing, spreadsheet, and presentation software applications are available as web apps. These online versions often have limited functionality compared to their desktop counterparts. Online productivity apps save your work on the cloud instantly as you type. Both the apps and the documents created with them are stored on the cloud. In contrast, desktop apps are installed on your computer. Documents created with desktop apps may be stored on your computer, on the cloud, or synchronized between both locations.
Adapter Card
Sometimes called an expansion card or adapter board, is a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices
Cloud Computing Reason 3
Space Savings: Floor space required for servers, storages devices, and other hardware shifts away from the user
Tablet PC
Special type of notebook computer that resembles a letter-sized slate, which allows a user to write on the screen using a digital pen.
embedded computer
Special-purpose computer that functions as a component in a larger product.
RSS
Specification that enables web content to be distributed to subscribers
Backup Plan
Specifies a schedule for copying/storing important data, information, and apps Includes: The location of backup data, supplies, and equipment; Who is responsible for gathering backup resources and transporting them to an alternate computer facility; The methods by which data will be restored from cloud storage; A schedule indicating the order and approximate time each application should be up and running
Hardware
The physical components of a computer.
What is a person called who can accomplish many types of daily tasks using technology?
Tech Savvy
Internet-enabled
Technology that allows mobile devices to connect to the Internet wirelessly.
Bluetooth
Technology that uses short-range radio signals to transmit data between two specifically enabled devices . Bluetooth devices have to be within about 33 feet of each other, but the range can be extended with additional equipment
Cache
Temporary storage area
enterprise computing
Term large companies use to refer to the use of a huge network of computers that meets their diverse computing needs.
Web 2.0
Term used to refer to Web sites that provide a means for users to share personal information, allow users to modify Web site content, and have application software built into the site for visitors to use.
Types of output
Text: examples are text messages Graphics: many forms of output include graphics to enhance visual appeal and convey information Audio: users download their favorite songs and listen to music Video: users watch news reports, movies, sporting events, weather conditions, and live performances on a computer or mobile device.
The Steps in a Machine Cycle Step 3
The ALU performs calculations on the data
Clock Cycle
The System clock generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit and each tick equates to this
Web Publishing
The creation and maintenance of websites Steps to web publishing 1. plan the website 2. design the website 3. create the website 4. host the website 5. Maintain the website -some are dedicated to a portion of web publishing and others provide a variety of services such as website design, content management, web hosting, website marketing, website analysis, and survey development
Third way of how memory stores
The data being processed by the applications and the resulting information
payload
The destructive event or prank a virus was created to deliver. Can do so in a variety of ways: such as when a user opens an infected file, runs an infected program, connects an unprotected computer or mobile device to a network, or when a certain condition or event occurs, such as the computer's clock changing to a specific date
Payload
The destructive event or prank the virus was created to deliver.
sectors
The disk's storage locations are divided into wedge-shaped sections, which break the tracks into small arcs
CPU
The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
Secondary Storage
The physical material on which a computer keeps data, instructions, and information.
storage media
The physical material on which a computer keeps data, instructions, and information.
The Internet
The internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Services of the internet include web, messaging, and video communications, chat rooms, discussion forums, and file transfer Users can connect their computers and mobile devices to the Internet through wired or wireless technology and then access its services free or for a fee. With wired connections, a computer or device physically attaches via a cable or wire to a communications device, such as a modem, that transmits data and other items over transmission media to the Internet. For wireless connections, many mobile computers and devices include the necessary built-in technology so that they can transmit data and other items wirelessly.
Motherboard
The main circuit board of the personal computer.
Read/write head
The mechanism that reads items and writes items in the drive as it barely touches the disk's recording surface.
Accessories and Input Technologies
The more popular game consoles work with a wide variety of accessories and input techniques for directing movements and actions of on-screen players and objects. They include gamepads, voice commands, and fitness accessories, some of which are shown here. Although many games are played using a controller, several game consoles operate by allowing the player to be the controller.
First way of how memory stores
The operating system and other programs that control or maintain the computer and its devices
Clock Speed
The pace of the system clock is measured by the number of ticks per second The faster the clock speed, the more instructions the processor can execute per second.
UI (User Interface)
The visual elements that a user must interact with to control a computer
Stored Program Concept
This role of memory to store both data and programs
Hits
Thousands to billions of search results
Blog
Time-stamped articles, or posts, in diary or journal format, usually listed in reverse chronological order Bloggers (author) use blogging software to create/maintain blog Some blog services provide blogging software so users do not have to install it on their own servers
Uncompress
To unzip or expand a zipped (compressed) file, which restores it to its original form.
Fax
Transmission and receipt of documents over telephone lines
Transmission of messages and files over a computer network
Why Would You Use an External Hard Drive Instead of a Second Internal Hard Drive?
Transport a large number of files. Back up important files or an entire internal hard drive Easily store large audio and video files. Secure your data; for example, at the end of a work session, you can relocate or lock up an external hard drive, leaving no data in a computer Add storage space to a mobile computer, such as a laptop or tablet. Add storage space to a desktop without having to open the case or connect to a network.
A headset contains both a microphone and a speaker.
True
A program is another term for software.
True
Protecting yourself From Engineering Scams
Verify the identity of any person or organization requesting personal or confidential information. When relaying personal or confidential information, ensure that only authorized people can hear your conversation. When personal or confidential information appears on a computer or mobile device, ensure that only authorized people can see your screen. Shred all sensitive or confidential documents. After using a public computer, clear the cache in its browser. Avoid using public computers to conduct banking or other sensitive transactions.
What are Safe Browsing Techniques
Verify the website is safe Turn off location sharing Clear browser history Never store passwords Use a phishing filter Enable a pop-up or pop-under blocker Use private browsing Use a proxy server
Features Found on Popular Video Sharing Sites
Video Creation: editing tools allow special effects, editing, titles, and descriptions. Audience interaction: on-screen and keyboard controls allow viewers to play, pause, fast-forward, and stop the videos. Audience members can rate the videos and browse specific categories. Features: most services accept files saved in a variety of file formats, but the maximum file size may be restricted or limited. Genre: Some websites accept a wide variety of content, while others require original work.
Gaming
Video gamers spend billions of dollars each year making the most of their downtime with game consoles and devices. An estimated 1.2 billion people worldwide are active video gamers, half of whom play at least 2 hours per day.
Geofence
Virtual perimeter or boundary to disable certain apps or cameras in secure areas, such as labs or meeting rooms.
Skimmer
Virtually undetectable, a device that is placed directly on top of an ATM face and captures credit card numbers and pins.
Which Internet communication service can you use to speak to other users over the Internet?
VoIP
VoIP
Voice Over Internet Protocol - allows users to speak to each other over the internet without using phones.
Two types of memory
Volatile Memory and NonVolatile Memory
Popular Broadband Internet Service Technologies
WIRED Cable internet service: provides high-speed Internet access through the cable television network via a cable modem DSL: provides high-speed Internet connections through the telephone network via a DSL modem Fiber to the premises: sues fiber-optic cable to provide high-speed Internet access often via a modem WIRELESS Wi-Fi: uses radio signals to provide high-speed Internet connections to computers and devices with built-in Wi-Fi capability or a communications device that enables Wi-Fi connectivity Mobile broadband: offers high-speed Internet connections over the cellular radio network to computers and devices with built-in compatible technology (such as 3G, 4G, or 5G) or a wireless modem or other communications device Fixed wireless: provides high-speed Internet connections using a dish-shaped antenna on a building, such as a house or business, to communicate with a tower location via radio signals Satellite internet service: provides high-speed Internet connections via satellite to a satellite dish that communicates with a satellite modem
Mobile Web App
Web app that is optimized for display in a browser on a mobile device
How other devices connected to the computer communicate with the processor to carry out a task,
When a user runs an application, for example, Its instructions transfer from a storage device to memory. Data needed by these programs and applications enters memory from either an input device or a storage device The control unit interprets and executes instructions in memory. Resulting information is stored in memory, from which it can be sent to an output device or a storage device for future access, as needed
Volatile Memory
When the computer's power is turned off it loses its contents temporary memory RAM is the most common type Temporary
Questions to ask when Researching Media Sharing Locations
Where do my original files need to reside What is the cost How do I access and share files safely What privacy rights are available Can you annotate your media Are there online reviews What help and support are available
Intel compatible processors
Which have an internal design similar to Intel Processors, perform the same functions, and can be as powerful, but often are less expensive. These manufacturers often identify their processor chips by a model name or model number.
USB Adapter
Which is a dongle that plugs into a USB port, enhances functions of a mobile computer, and/or provides connections to peripheral devices Can also be used to add memory, communications, multimedia, security, and storage capabilities to a mobile computers
Plug and Play Technology
Which means that the computer automatically can recognize peripheral devices as you install them. This support means that you can plug in a device and then immediately begin using it
WiFi
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. Most mobile computers and devices are Wi-Fi enabled, along with routers and other communications devices. For successful Wi-Fi communications in open or outdoor areas free from interference, the Wi-Fi computers or devices should be within 300 feet of each other. In closed areas, the wireless range is about 100 feet.
Developing Projects
With productivity applications, users often create, edit, format, save, and share projects. Projects include documents, presentations, spreadsheets, notes, calendars, contact lists, budgets, drawings, and more.
Serial vs Parallel
With serial transfers, data is sent one bit at a time. Parallel transfers, by contrast, send several bits at once.
Search Text
Word or phrase entered in a search engine's text box that describes the item you want to find. See also search query. Search text can be broad, such as spring break destinations, or more specific, such as walt disney world.
telecommuting
Work arrangement in which employees work away from a company's standard workplace and often communicate with the office through the computer.
Web
Worldwide collection of electronic documents called Web pages, the Web is one of the more popular services on the Internet. See also World Wide Web.
Internet
Worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals.
Disc Burning Software
Writes text, graphics, audio, and video files on a recordable or rewritable disc Enables home users to easily back up contents of their hard drive on an optical disc and makes duplicate of uncopyrighted music or movies
Careers and Employment
You can search the web for career information and job openings. Job search websites list thousands of openings in hundreds of fields, companies, and locations This information may include required training and education, salary data, working conditions, job descriptions, and more. In addition, many organizations advertise careers on their websites.
ICANN
^^ This nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for Assigned Names and Numbers. ICANN previously managed the domain names
Link or Hyperlink
a built-in connection to other documents, graphics, audio files, videos, webpages, or websites.
Chat rooms
a chat is a real-time types conversation that takes place on a computer or mobile device with many other online users a chat room is a website or application that permits users to chat with other who are online at the same time A server echoes the user's message to everyone in the chat room.
clip art/image gallery
a collection of clip art and photos Many clip art/image galleries also provide fonts, animations, sounds, video clips, and audio clips.
network
a collection of computers and devices connected together via communications devices and transmission media
media library
a collection of stored digital media
Data
a collection of unprocessed items including text, numbers, images, audio and video once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information
Photo printer
a color printer that produces lab-quality photos. Many photo printers use ink-jet technology
email address
a combo of a user name and a domain name that identifies a user so that they can receive internet email
JPEG
a compressed graphics format that attempts to reach a balance between image quality and file size
server
a computer dedicated to providing one or more services to other computers or devices on a network -provided by servers include storing content and controlling access to hardware, software, and other resources They can support from two to several thousand connected computers or devices at the same time
two-step verification
a computer or mobile device uses two separate methods, one after the next, to verify the identity of a user ATMs usually require these (slide card in then enter PIN)
Bluetooth Printing
a computer or other device transmits output to a printer via radio waves
Handheld computers
a computer small enough to fit in one hand -communicate wirelessly with other devices or computers some have specialized keyboards or touch screen with stylus -many are industry-specific and serve the needs of mobile employees, such as parcel delivery people or warehouse employees
FTP server
a computer that allows users to upload and/or download files using FTP
terminal
a computer, usually with limited processing power, that enables users to send data to and/or receive info from a server or host computer •Most retail stores use a POS terminal to record purchases, process credit or debit cards, and update inventory
Mobile Device
a computing device small enough to hold in your hand Popular types of mobile devices are smartphones, digital cameras, portable and digital media players, e-book readers, and wearable devices.
Mobile Devices
a computing device small enough to hold in your hand Types: smartphones, digital cameras portable and digital media players, e-book readers, and wearable devices
mobile device
a computing divide small enough to hold in your hand types: laptops, tablets, desktops, servers and terminals, smartphone, digital camera, e-book readers, portable, and digital media players, and wearable devices (game devices and embedded computers)
What do processors contain?
a control unit and an arithmetic logic unit (ALU). These two components work together to perform processing operations The control unit interprets and executes instructions in memory, and the arithmetic logic unit performs calculations on the data in memory.
Password Manager (password organizer)
a convenient service that stores all your account information securely The first time you view a password-protected website and enter your user name and password, the password manager saves this information. Some managers offer the option to generate random passwords
Software
a series of related instructions, organized for a common purpose that tells a computer or mobile device what tasks to perform and how to perform them. When software developers write programs or apps, they usually enter the instructions into the computer or mobile device by using a keyboard, mouse, or other input method. The software developer then stores the program or app in a file that a user can execute (run). When a user runs a program or app, the computer or mobile device loads the program or app from a storage medium into memory. Thus, a program or app is entered into a computer's or mobile device's memory.
tower server
a server built into an upright cabinet (tower) that stands alone -the tower can be similar in size and shape to a desktop tower or larger
blade server
a server in the form of a single circuit board, or blade -the individual blades insert in a blade server chassis that can hold many blades
DNS server
a server on the Internet that usually is associated with an ISP
personal finance software
a simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer funds, track investments, and evaluate financial plans determine where, and for what purpose, you are spending money so that you can manage your finances. financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings. Other features include managing home inventory and setting up budgets
Pixel
a single point in an electronic image
Ink Cartridges
a small container of ink for use in a printer Each cartridge has fifty to several hundred small ink holes, or nozzles When the cartridge runs out of ink, you simply replace the cartridge. Most ink-jet printers use two or more ink cartridges, one containing black ink and the other(s) containing colors. Some color cartridges contain a variety of ink colors; others contain only a single color.
Stylus
a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink
wearable devices
a small mobile computing device designed to be worn by a consumer -communicate with mobile device and computer EX) activity trackers, smartwatches, and smart glasses.
Handheld game device
a small mobile device that contains a screen, speakers, controls, and game console all in one unit most communicate wirelessly
Label Printer
a small printer that prints on an adhesive-type material that can be placed on a variety of items
Pointer
a small symbol on the screen whose location and shape change as a user moves a pointing device
Thumbnail
a small version of a larger image -usually click a thumbnail to display the full size image
Touchpad
a small, flat, rectangular pointing device that is sensitive to pressure and motion To move the pointer using a touchpad, slide your fingertip across the surface of the pad. Some touchpads have one or more buttons around the edge of the pad that work like mouse buttons; others have no buttons. On most touchpads, you also can tap the pad's surface to imitate mouse operation
Mobile printer
a small, lightweight, battery powered printer that allows a mobile user to print from a laptop, smartphone or other mobile device
Plotter
a sophisticated printer used to produce high-quality drawings such as blueprints, maps and circuit diagrams
Web App
a special type of cloud app that is accessed by visiting a website in a browser.
Embedded Computers
a special-purpose computer that functions as a component in a larger product Types: consumers electronics (Mobile phones, digital phones, digital televisions, cameras, video recorders, DVD players and recorders, answering machines) home automated devices (Thermostats, sprinkling systems, security systems, vacuum systems, appliances, lights) automobiles (Anti Lock brakes, engine control modules, electronic stability control, airbag control unit, cruise control, navigation systems and GPS receivers) process controllers and robotics (Remote monitoring systems, power monitors, machine controllers, medical devices) computer devices and office machines (Keyboards, printers, fax and copy machines)
folder
a specific named location on a storage medium that contains related documents
PictBridge
a standard technology that allows you to print photos directly from a digital camera by connecting a cable from the digital camera to the USB port of the printer
Trackball
a stationary pointing device with a ball on its top or side To move the pointer using a trackball, you rotate the ball with your thumb, fingers, or the palm of your hand. In addition to the ball, a trackball usually has one or more buttons that work like mouse buttons.
Hard Disk
a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information
Solid-state drive
a storage device that typically uses flash memory to store data, instructions, and information
digital rights management (DRM)
a strategy designed to prevent illegal distribution of movies, music, and other digital content
Insertion Point (cursor)
a symbol on the screen, usually a blinking vertical bar, that indicates where the next character you type will appear
Neural Network
a system that attempts to imitate the behavior of the human brain
Convertible Tablet
a tablet that has a screen it is lid and keyboard in its base with the lid and base connected by swivel-type hinge can be used as a traditional laptop or it can be rotated and fold down over the keyboard so it looks like a slate tablet
Spoofing
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Product Activation
a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed Usually, the software can be run a preset number of times, has limited functionality, or does not function until you activate it via the Internet or by phone. Thus, activation is a required process for programs that request it.
Computer vision syndrome (CVS)
a technology-related health condition that affects eyesight -may have it if you have sore, tired, burning, itchy eyes, blurred double vision after prolonged staring at a display device, headache or sore neck, difficulty shifting focus, difficulty focusing on screen, after images, and increased sensitivity to light
thin client
a terminal that looks like a desktop but has limited capabilities and components -typically do not contain a hard drive and can run programs and access data on a network or the internet
Domain name
a text-based name that corresponds to the IP address of the server, such as a web server that hosts a website -is part of the web address that you type in a browser's address bar to access a website -•A DNS server translates the domain name into its associated IP address
image viewer
a tool that allows users to display, copy, and print the contents of a graphics file, such as a photo
screen saver
a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time
file manager
a tool that performs functions related to file management Some of the file management functions that a file manager performs are displaying a list of files on a storage medium organizing files in folders; and copying, renaming, deleting, moving, and sorting files
uninstaller
a tool that removes a program, as well as any associated entries in the system files The uninstaller deletes files and folders from the hard drive, as well as removes program entries from the system files.
Disk Defragmenter
a tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster Fragmentation slows down file access and, thus, the performance of the entire computer. Defragmenting the hard disk, or reorganizing it so that the files are stored in contiguous sectors, solves this problem
Touch screen
a touch sensitive display device, do not require a separate device for input
Touch mouse
a touch sensitive mouse that recognizes gestures, in addition to a detecting movement of the mouse and traditional click scroll operations
Interactive whiteboard
a touch-sensitive device, resembling a device board, that display the image on a connected computer, usually via a projector A presenter controls the program by clicking a remote control, touching the whiteboard, drawing on or erasing the whiteboard with a special digital pen and eraser, or writing on a special tablet.
Web Based Training (WBT)
a type of CBT that uses internet technology and consists of application software on the web CBT and WBT typically consist of self-directed, self-paced instruction about a topic. WBT is popular in business, industry, and schools for teaching new skills or enhancing existing skills of employees, teachers, and students.
Webcam
a type of DV camera that enables you to capture video and still images, and usually audio input for viewing or manipulation on a computer or mobile device
Computer Based Training (CBT)
a type of education in which students learn by using and completing exercises with instructional software
Photo Editing Software
a type of image editing software that allows users to edit and customize digital photos users can enhance photos, add lighting filters, crop images, remove red-eye, create collages, crop and resize images, color-correct images, straighten images, remove or rearrange objects in a photo, and more
Projects you can work on with Programs and Apps
creating letters, memos, reports, and other documents; developing presentations; preparing and filing taxes; drawing and altering images; recording and enhancing audio and video clips; obtaining directions or maps; playing games individually or with others; composing email messages; protecting computers and mobile devices from malware; organizing media; locating files;
______ is a collection of unprocessed items, including text, images, audio, and video.
data
Decrypt
decode
social engineering
defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
Aspect ratio
defines the display's width relative to height
Software as a Service
describes a computing environment where an Internet server hosts and deploys applications Editing documents or photos, sending email messages, and managing finances are common consumer tasks of SaaS applications.
Software as a Service (SaaS)
describes a computing environment where an Internet server hosts and deploys applications and makes them available to users via the internet
cyberfare
describes an attack whose goal ranges from disabling a government's computer network to crippling a country
Contrast ratio
describes the difference in light intensity between the brightest white and darkest black that can be produced on a display. Contrast ratios vary between 500:1 to 2000:1
Mobile Browser
designed for their smaller screens and limited computing power
Malware removers
detect and delete spyware, adware, and other malware
Retina Display
developed by Apple, produces vibrant colors and supports viewing from all angles bc LCD technology is built into the screen instead of behind it
text to speech
device speaks the contents of the printed page
USB Hub
device that plugs in a USB port on the computer or mobile device and contains multiple USB ports, into which you plug cables from USB devices.
Peripheral Device
device that you connect to a computer or mobile device to expand its capabilities. Examples include keyboard, mouse, microphone, monitor, printer, scanner, external hard drive, webcam, speakers
strategy designed to prevent illegal distribution of movies, music, and other digital content
digital rights management
slide show
displayed on a large monitor or on a projection screen from a computer or mobile device.
Flat panel display
displays which have shallow depth and a flat screen
Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to move an item around on the screen. Mia tells her she should ______.
drag or slide
e-book reader
electronic book reader - a mobile device that is used primarily for reading ebooks and other digital publications - is an electronic version of a printed book, readable on computers and other mobile devices typically transfer the digital publication from a computer or the Internet, if the device is Internet capable, to the e-book reader.
Unethical Employees
employees who break into employers' computers to exploit a security weakness, obtain revenge as a disgruntle employee, or to seek financial gains from selling confidential information
VoIp
enables users to speak to other users via their internet connection -VoIP uses the Internet to connect a calling party to one or more local or long-distance called parties To place an Internet phone call, you need a broadband network connection, a microphone and speaker, both of which are included with a standard computer or mobile device, and VoIP software, such as Skype. Some VoIP services require that you purchase a separate phone and VoIP router and that you subscribe to their service. Others offer certain services free and require a subscription for additional services
Creating a project
enter text or numbers, insert images, add contacts, schedule appointments, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.
Megabyte (MB)
equal to approx. one million characters
Mobile computers and devices typically have a separate physical display device.
false
Voice mail
functions much like an answering machine, allows someone to leave a voice message for one or more people -a computer in the voice mail system converts an analog voice message into digital form
Thermal printer
generates images by pushing electrically heated pins against heat sensitive paper. Basic thermal printers are inexpensive but the print quality is low, images fade and the paper is expensive Used in self service gas pumps and POS terminals
copyright
gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials A copyright protects any tangible form of expression
Skimming
handheld device used by thieves to swipe the card and then obtain and store account details.
Cyberbullying
harassment using technology
A(n) ______ disk is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.
hard
Perpendicular Recording
hard disks align the magnetic particles vertically, or perpendicular to the disk's surface, making much greater storage capacities possible
Computers contain many electric, electronic, and mechanical components known as ______
hardware
Communications Device
hardware capable of transferring items from computers and devices to transmission media and vice versa Examples of communications devices are modems, wireless access points, and routers
Ergonomic keyboard
has a design that reduces the chance of repetitive strain injuries (RSIs) of wrist and hand.
Blu-ray
has a higher capacity and better quality than standard DVDs, especially for high-definition audio and video.
magnetic stripe card
has a magnetic stripe that contains information identifying you and the card The information in the stripe often includes your name, account number, and the card's expiration date. When you swipe the card through a magstripe reader, discussed in the previous module, it reads information stored on the stripe.
fragmented hard disk
has many files stored in noncontiguous sectors.
Streaming Cam
has the illusion of moving images because it sends a continual stream of still images
game pad
held with both hands, controls the movement and actions of players or objects in video games or computer games On the gamepad, users press buttons with their thumbs or move sticks in various directions to trigger events.
ENERGY STAR program
help reduce the amount of electricity used by computers and related devices This program encourages manufacturers to create energy-efficient devices.
website authoring software
helps users create business websites for a variety of purposes such as online stores, restaurants, small businesses, or personal interests, generally without requiring advanced HTML skills.
calendar and contact management software
helps you organize your calendar, keep track of contacts, and share this information with other users provides a way for individuals and workgroups to organize, find, view, and share appointment and contact information easily.
Disadvantage of SSDs
hey typically have lower storage capacities than hard disks, data recovery in the event of failure can be more difficult than for traditional hard disks, and their cost is higher per gigabyte. In order to keep the price of a laptop affordable, laptops with SSDs usually have a lower storage capacity than laptops with a traditional hard disk.
enhanced resolution
higher because it uses a specific formula to add pixels between those generated by the optical resolution
Corporate Spies
hired to break into a specific computer and steal proprietary data and information or help identify security risks in their own organization
Redundancy
if one component fails or malfunctions, another can assume its tasks
password
is a private combination of characters associated with the user name that allows access to certain computer resources Do not disclose your password to anyone or write it on a slip of paper kept near the computer, especially taped to the monitor or under the keyboard. Email and telemarketing scams often ask unsuspecting users to disclose their credit card numbers, so be wary if you did not initiate the inquiry or phone call. Security experts recommend using different user names and passwords for every account and changing the passwords frequently.
passphrase
is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that user name that allows access to certain computer resources
adware remover
is a program that detects and deletes adware
search tool
is a program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app, or any other item stored on your computer or mobile device based on criteria you specify
memory card
is a removable flash memory storage device that you insert and remove from a slot in a computer, mobile device, or card reader/writer ex. -SDHC -SDXC -miniSD -microSDHC -microSDXC -CF -xD Picture Card -Memory Stick PRO Duo -M2
Network attached storage (NAS)
is a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network
encryption key
is a set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
operating system
is a set of programs that coordinates all the activities among computer hardware devices ex. tools and utilities (enable you to perform maintenance-type task usually related to managing devices, media, and programs used by computers and mobile devices) system software (they consist of the programs that control or maintain the operations of the computer and its devices.) Desktop operating systems includes (macOS, Windows, Linux, and Chrome OS. Mobile operating systems include Android, iOS, and Windows) serves as the interface between the user, the applications and other programs, and the computer's or mobile device's hardware
encryption algorithm or cypher
is a set of steps that can convert readable plaintext into unreadable cipertext
cookie
is a small text file that a web server stores on your computer Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences. Use To: track preferences, to store usernames and passwords, keep track of items in user's shopping cart (session cookie), track how often users visit a site and web pages they visit, to target advertisements
Spyware
is a type of program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online
Adware
is a type of program that displays an online advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other Internet services
code of conduct
is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
disaster recovery plan
is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
DisplayPort
is an alternative to DVI and also supports HDMI
e-book or digital book
is an electronic version of a printed book, readable on computers and other digital devices. In addition to books, you typically can purchase and read other forms of digital media such as newspapers and magazines.
digital signature
is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender used to ensure that an impostor is not participating in an Internet transaction
CD-RW
is an erasable multisession disc users can write on multiple times overcome major disadvantage of CD-R because it allows users to write and rewrite data, instructions, and information on the CD-RW disc multiple times — instead of just once.
Bar code
is an identification code that consists of either a set of vertical lines and spaces of different widths or 2-D pattern of dots, squares and other images
track
is divided into evenly sized sectors
gigabyte (GB)
is equal to approx. one billion characters
memory
is faster than storage but is expensive and not practical for all storage requirements.
firewall
is hardware and/or software that protects a network's resources from intrusion by users on another network, such as Internet
Storage
is less expensive but is slower than memory.
cracker
is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills
A(n) ______ network is a system that attempts to imitate the behavior of the human brain.
neural
digital forensics (cyberforensics)
is the discovery, collection, and analysis of evidence found on computers and networks involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks. Many areas use digital forensics, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector.
storage device
is the hardware that records and/or retrieves items to and from storage media
capacity
is the number of bytes a storage medium can hold
encryption
is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access You treat encrypted data just like any other data. That is, you can store it or send it in an email message.
Formatting
is the process of dividing a disk into tracks and sectors.
content filtering
is the process of restricting access to certain material
reading
is the process of transferring items from a storage medium into memory Similarly, when storage devices read from storage media, they function as a source of input. Nevertheless, they are categorized as storage devices, not as input or output devices.
writing
is the process of transferring items from memory to a storage medium When storage devices write on storage media, they are creating output
license agreement
is the right to use software That is, you do not own the software.
software piracy or piracy
is the unauthorized and illegal duplication of copyrighted software piracy is the most common type of software theft
cloud storage
keeps information on servers on the Internet, and the actual media on which the files are stored are transparent to the user
Real Time Clock
keeps track of the date and time in a computer. The battery continues to run the real-time clock even when the computer is off.
Firefox
known for its extensive array of plug-ins This free browser was first released in 2004 and must be downloaded and installed. It has enhanced privacy and security features, a spelling checker, tabbed browsing, and a password manager.
JavaScript
language used to add special effects to a website
LED
light-emitting device, LED-displays consume less power, last longer and are thinner, lighter and brighter than CCFL technology
LCD
liquid crystal display, sandwiches a liquid compound between two sheets of material that present sharp, flicker-free images when the screen in illuminated
stylus
looks like a small ink pen, that you can use instead of a fingertip to enter data, make selections, or draw on a touch screen may include button to stimulate clicking
Storage as a Service
loud storage providers offer file management services such as storing files online, system backup, and archiving earlier versions of files. Cloud storage is especially useful to tablet and smartphone users, because it enables them to access their files from all of their devices.
Platter
made of aluminum, glass, or ceramic and has a thin coating of alloy material that allows items to be recorded magnetically on its surface
tower
made of metal or plastic -a frame that houses the system unit on a desktop
MICR
magnetic-ink character recognition devices read text printed with magnetized ink. Used for check processing MICR reader converts MICR characters into a form the computer can process.
Motherboard (system board)
main circuit board of the computer Many of the electronic components, such as the processor and the memory, attach to the motherboard; others are built into it.
Internet Backbone
major carriers of network traffic
Back up
make a copy of (a computer file) especially for storage in another place as a security cop
Editing a Project
make changes to its existing content. Common editing tasks include inserting, deleting, cutting, copying, and pasting. Inserting involves adding text, images, or other content. Deleting involves removing text, images, or other content. Cutting is the process of removing content and storing it in a temporary storage location, called a clipboard. Copying is the process of placing content on a clipboard, with the content remaining in the project. Pasting is the process of transferring content from a clipboard to a specific location in a project.
Cloud app
makes use of software and data that are not stored on your computer or mobile device You can access the software and data using a computer or mobile device, with or without a browser, as long as it is connected to a network, such as the Internet. Examples include apps for accessing online social networks, web-based email services, and online calendars.
Network Server
manages network traffic
Printer Server
manages printers and documents being printed
Mapping
maps can be displayed in a variety of views, including terrain, aerial, maps, streets, buildings, traffic, and weather. Several mapping website and web apps exist that enable you to display up-to-date maps by searching for an address, postal code, phone number, or point of interest Many work with GPS to determine where a user is located, eliminating the need for a user to enter the starting point and enabling the website to recommend nearby points of interest.
voice verification system
measures a person's live speech with their stored voice pattern
Hand Geometry System
measures the shape and size of a person's hand they often are used in larger companies to track worker's time and attendance or as security device
hand geometry system
measures the shape and size of person's hand
M2
memory stick micro
madware
mobile adware
Power Management Tool
monitors a laptop or mobile device's battery usage, showing apps that consume the most battery power, displaying battery usage since the device was last charged, and estimating usage time remaining Power management apps can enable power saving mode automatically when a device's battery runs low so that the battery will last longer until charged.
single-user license agreement or end-user license agreement
most common type of license agreement with software purchased by individual users
MMS
multimedia message service -have a digital camera built into the device includes mobile to mobile and mobile to email -can send picture and video message services
A(n) ______ is a collection of computers and devices connected together, often wirelessly.
network
Uses of Smart CArds
storing medical records, vaccination data, and other health care and identification information; tracking information, such as employee attendance or customer purchases; storing a prepaid amount of money, such as for student purchases on campus or fares for public transportation; and authenticating users, such as for Internet purchases or building access.
Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to zoom in. Mia tells her she should ______.
stretch
top-level domain
suffix of the domain naim identifies the type of organization associated with the domain -new TDL's are introduced to give individual's and businesses flexibility and creativity when purchasing domain names
When you ______ computers and mobile devices, you match the files in two or more locations with each other.
sync
Google Street View
takes images using moving vehicles equipped with GPS and cameras to create a panoramic view of an area Is protested by privacy advocates
Digital pens are most often used for
taking notes
Portrait Orientation
taller than it is wide, like a portrait picture that focuses on a single, upright figure
optical resolution
the actual photographed resolution
web address
the address of the webpage If you know the web address of a webpage, you can type it in the address bar of the browser A web address consists of a protocol, domain name, and sometimes the host name, path to a specific webpage, or file name of the webpage. AKA URL
Animation
the appearance of motion created by displaying a series of still images in sequence ex./ tect that animates by scrolling across the screen can serve as a ticker to display stock updates, news, sports, scores, weather, etc
Netiquette
the code of acceptable behaviors users should follow while on the internet -the conduct expected of individuals while online
Biometric Payment
the customer's fingerprint is read by a fingerprint reader that is linked to a payment method such as a checking account or credit card.
Output
the data that has been processed into a useful form. Recall that computers process data (input) into information (output) The form of output varies, depending on the hardware and software being used and the requirements of the user. Users view or watch output on a screen, print it, or hear it through speakers, headphones, or earbuds.
ciphertext
the encrypted (scrambled) data
supercomputer
the fastest and most powerful computer and the most expensive -are capable of processing many trillions of instructions in a single second Applications requiring complex, sophisticated mathematical calculations use supercomputers. For example, large-scale simulations and applications in medicine, aerospace, automotive design, online banking, weather forecasting, nuclear energy research, and petroleum exploration use a supercomputer.
restore
the files by copying the backed up files to their original location on the computer or mobile device
Backlight
the light source for LCD, often uses CCFL (cold cathode fluorescent light or LED technology
Domain Name Server (DNS)
the method that the Internet uses to store domain names and their corresponding IP addresses translates the domain name to its associated IP address so that the request can be routed to the correct computer.
server virtualization
uses software to enable a physical server to emulate the hardware and computing capabilities of one or more servers, known as virtual serves users can use software to configure storage, processing power, memory, operating system, and other characteristics Behaves like physical server, is easy to manage, doesn't require physical server, and can be created and configure quickly
public key encryption (asymmetric key encryption)
uses two encryption keys: a public key and private key
Public Key encryption
uses two keys: a public key that everyone can have and a private key for only the recipient
Tablets
usually smaller than a laptop and larger than a phone -thin, light-weight mobile computer that has a touch screen Types: slate and convertible battery typically lasts longer than laptops
Examples of Malware (the 7 mentioned in the book)
viruses, worms, trojan horses, rootkits, spyware, adware, and zombies
Static Webpage
visitors all see the same content each time they view the webpage
Activity trackers and smartwatches are two types of ______ devices.
wearable
Content Aggregation
website or web app, sometimes called a curation website, allows users to collect and compile content from a variety of websites about a particular topic or theme Types of content that may be compiled includes news, reviews, images, videos, podcasts (discussed later in this module), and blogs. Content aggregation websites save users time because they need to visit only one website (the content aggregation website) instead of visiting multiple websites to obtain information.
Juice jacking
when a hacker steals data from or transfers malware to the device via a USB cable at a charging station This process is possible because the USB cable is used for two purposes: supplying power and syncing data. It can occur within one minute after plugging into the charger. Anything on the device is susceptible, including photos, contacts, and music, and some malware can create a full backup of your data, leaving you prone to identity theft.
Catfishing
when someone creates a fake online social network or online dating profile and forms relationships with unsuspecting users
How SD cards work
when you insert a memory in a card slot, the memory card's metallic conductors make contact with connections in the card reader/writer or card slot, allowing the transfer of photos, and other items between the card and the reading/writing device. STEP 2 -a notch on the side of the memory prevents the card from accidentally slipping out of the card reader/writer or card slot STEP 3 -flash memory chips store photos and other types of data and information . when requested, the controller transfers items stored on the flash memory chips to metallic conductors, using register for temporary storage, as needed. STEP 4 -some memory cards contain white protect switches prevent you from accidentally erasing photos and other items stored on the flash memory chips.
Storage Media
where a computer keeps data, instructions, and information The amount of storage for each type of storage media varies, but hard disks and solid-state drives generally have the largest capacities, followed by optical discs, USB flash drives, and memory cards. Some storage media are portable, meaning you can remove the medium from one computer and carry it to another computer.
tape library
where individual tape cartridges are mounted in a separate cabinet
Streaming
where you access the media content while it downloads
predictive text
where you press one key on the keyboard or keypad or each letter in a word and software on the phone predicts the word you want
Electrical Storefront
which contains product descriptions, images, and a shopping cart
power usage effectiveness (PUE)
which is a ratio that measures how much power enters the computer facility or data center against the amount of power required to run the computers and devices
Digital Pen
which is slightly larger than a stylus, an input device which captures and converts a users handwriting or drawings into a digital format which users can upload (transfer) to a computer or mobile device
Force feedback
which is technology that sends resistance to the device in response to actions of the user
Http
which stands for Hypertext Transfer Protocol, is a set of rules that defines how webpages transfer on the Internet.
Landscape Orientation
wider than it is tall, like a landscape picture that shows a broad panoramic view
A(n) ______ is a collaborative website that allows users to create, add to, modify, or delete content.
wiki
HTML
•(Hypertext Markup Language) is a set of symbols that developers use to specify the headings, paragraphs, images, links, and other content elements that a webpage contains
USB port
•A USB port, short for universal serial bus port, can connect up to 127 different peripheral devices together with a single connector * Devices that connect to a USB port include the following: card reader, digital camera, external hard drive, game console, joystick, modem, mouse, optical disc drive, portable media player, printer, scanner, smartphone, digital camera, speakers, USB flash drive, and webcam. •Instead of connecting peripheral devices directly to ports on a mobile computer, some mobile users prefer the flexibility of port replicators and docking stations •Instead of connecting computers and mobile devices to peripheral devices with a cable, some peripheral devices use wireless communications technologies -Bluetooth -Wi-Fi -NFC
Browser
•A browser is an application that enables users with an Internet connection to access and view webpages on a computer or mobile device -Internet-capable mobile devices such as smartphones use a special type of browser, called a mobile browser ie: Chrome
Protecting Hardware
•To help reduce the chances of theft, companies and schools use a variety of security measures -Physical access controls -Alarm system -Physical security devices -Security or device-tracking app -Require identification •Hardware can fail for a variety of reasons: aging hardware; random events such as electrical power problems; and even errors in programs or apps)
embedded computer
•a special-purpose computer that functions as a component in a larger product -Consumer electronics -Home automation devices -Automobiles -Process controllers and robotics -Computer devices and office machines
surge protector
•also called a surge suppressor, uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment it aborts small overvoltages generally without damage to computer and equipment Repeated small overvoltages can weaken a surge protector permanently. Some experts recommend replacing a surge protector every two to three years.
World Wide Web (WWW)
•or web, consists of a worldwide collection of electronic documents (webpages) •A website is a collection of related webpages and associated items •A web server is a computer that delivers requested webpages to your computer or mobile device
Search Engine
•software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic •A subject directory classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories Thousands of search engines are available. Some search engines, such as Bing, Google, and Yahoo!, are helpful in locating information on the web for which you do not know an exact web address or are not seeking a specific website.
Homepage
•the first page that a website displays a website's home page provides information about its purpose and content. Many websites allow you to personalize the home page so that it contains areas of interest to you.