Computer Competency Exam
Virus
is a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged.
Wireless Range Extender
is a device that amplifies your wireless signal to extend to parts of a user's home that are experiencing poor connectivity.
Surge Protector
is a device that protects a computer against power surges.
Biometric Authentication Device
is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it ot a digital code.
Bookmarks (or Favorites)
is a feature that places a marker of the site's URL in an easily retrievable list in the user's browser's toolbar.
Cache Memory
is a form of RAM that gets data to the CPU for processing much faster than bringing the data in from the computer's RAM. There are three levels of cache memory, defined by their proximity to the CPU (level 1, 2, and 3 cache).
Really Simple Syndication (RSS)
is a format that sends the latest content of a podcast series automatically to an aggregator (an example would be Itunes).
Backward Compatibility
the ability of current devices to use earlier standards in addition to the current standard.
Physical Memory
the amount of RAM actually sitting on memory modules in a computer.
Cat 6 Cable
the best choice in UTP cables which is designed to achieve data transfer rates that support a gigabit Ethernet network.
Instruction Set
the collection of commands that a specific CPU can execute.
Assembly Language
the commands in an instruction set are written in this language instead of binary to make it easier for humans to understand.
Affective Computing
the development of computer systems that can recognize and simulate human emotions
Vacuum Tubes
the earliest generation of electronic computers used these as their switches.
Kernel
the essential component of the OS that is responsible for managing the processor and all other components of the OS.
Web 2.0
the faster Internet that developed as a result of more web applications appearing. It allowed users to contribute content easily and easily connect with each other
Mac OS
the first commercially available OS to incorporate a GUI (graphical user interface) with user-friendly point and click technology.
Power-On Self-Test (POST)
the first job BIOS performs which is to ensure that essential peripheral devices are attached and operational.
IBM PC
the first personal computer that was released by IBM in 1981. Due to companies being familiar with IBM mainframes, they were adopted quickly and dominated the market.
Altair 8800
the first personal computer, created in 1975
Osborne
the first portable computer that was released in 1981 by The Osborne Company. It weighed 24.5 pounds, had a 5-inch screen, and cost $1,795 (approximately $4,612 today).
Lisa
the first successful personal computer brought to market that utilized GUI (which was an Apple Product) in 1983.
Mosiac
the first web browser that was released in 1993. This allowed users to view multimedia on the web, causing internet traffic to increase by nearly 350%.
WordStar
the first word processing software which paved the way for Word for MS-DOS (the precursor to Microsoft Word) and WordPerfect.
Collaborative Consumption
the idea that technology has connected individuals in a way that enables them to join in groups to use products more efficiently
Binary language
the language of computers that consists of two digits: 0 and 1
Host
the location that maintains the computers that store the website files. Top-Level Domain: the suffix on a URL that indicates the kind of organization to which the host belongs. Examples would be ".com" ".edu", ".org" and ".net".
Motherboard
the main circuit board that contains the central electronic components of the computer
Gigabit Ethernet
the most commonly used wired Ethernet standard for home networks. A data transfer rate of 1 gigabit per second is possible when using this standard.
Service Set Identifier (SSID)
the name of a wireless network used to identify it. Firmware: read-only memory that has software written to it. Routers use firmware.
Camera Resolution
the number of data points a camera records for each image captured.
CPU Usage
the percentage of time the CPU is working.
Random Access Memory (RAM)
the place in the computer where the programs and data that the computer is currently using are stored. RAM is a temporary or volatile storage location. Saved data is stored elsewhere
Universal Serial Bus (USB) Port
the port most commonly used to connect input and output devices to a computer
Virtual Memory
the process of optimizing RAM storage by borrowing hard drive space.
Data Mining
the process of searching huge amounts of data in order to find a pattern
Synchronizing (syncing)
the process of updating your data so your to-do lists, schedules, and other files on your cell phone and computer, to make them the same.
Operating System (OS)
the program that controls how the computer system functions
Hypertext Transfer Protocol (HTTP)
the protocol that allows files to be transferred from a web server so that a user can see it on their computer.
Ergonomics
the science that deals with the design and location of machines and furniture so that people using them aren't subjected to an uncomfortable or unsafe experience
Software
the set of computer programs that enables the hardware to perform different tasks
Application Software
the set of programs on a computer that carry out tasks
System Software
the set of programs that allow a computer's hardware devices and application software to work together
Clock Cycle
the steady beats or ticks of the system clock that set the pace (clock speed) by which the computer moves from process to process.
Operating System (OS)
is a group of programs that controls how a computer functions. It manages the computer hardware (such as processor, memory, and storage devices), provides a consistent means for application software to work with the central processing unit (CPU), and is responsible for the management, scheduling, and coordination of tasks. Examples of operating systems include Windows 7, Windows 8, Windows 10, iOS 7, Android 4.4, and Linux.
Botnet
is a large group of software programs that runs autonomously on zombie computers.
Metropolitan Area Network (MAN)
is a large network designed to provide access to a specific geographic area, such as an entire city.
Local Area Network (LAN)
is a network in which the nodes are located within a small geographical area.
Global Positioning System (GPS)
is a network of 21 satellites that constantly orbit the earth and send information to GPS devices to determine the user's geographical location.
Personal Area Network (PAN)
is a network used for communication among devices close to one person, such as smartphones, notebooks, and tablets using wireless technologies such as Bluetooth or WiFi.
Blog (short for weblog)
is a personal log or journal that is posted on the web. Video Log (Vlog): is a blog that uses video as the primary content.
Thunderbolt Port
is a port that allows users to connect up to six different peripherals to their computer
Virus Signature
is a portion of a virus code that's unique to a particular computer virus.
Machine Cycle
is a process in which a CPU performs a program instruction by fetching, decoding, executing, and storing.
Packet Analyzer (Sniffer)
is a program developed by hackers that looks at each packet of data as it travels on the internet. Used often for identity theft on Public WiFi locations such as a coffee shop.
Trojan Horse
is a program that appears to be something useful or desirable, like a game or a screen saver, but while it runs, it does something malicious in the background, without the user's knowledge.
Master Boot Record
is a program that executes whenever a computer boots up, ensuring that the virus will be load into memory immediately, even before some virus protection programs can load.
Spooler
is a program that helps coordinate all print jobs currently being sent to a printer.
Codec (compression/decompression)
is a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space.
Graphics Processing Unity (GPU)
is a separate processing chip specialized to handle 3-D graphics and image and video processing with incredible efficiency and speed.
Digital Convergence
the use of a single unifying device to handle media, Internet, entertainment, and telephony needs. An example would be smartphones.
Telephony
the use of equipment to provide voice communications over a distance.
Social Networking Tools
tools like Facebook and Twitter that enable groups of people to connect and share ideas
methods, such as e-mail or network connections, to spread on their own. Script
is a series of commands that is executed without the user's knowledge. Macro Virus: is a virus that attaches itself to a document that uses macros. E-Mail Virus: use a user's address book in their e-mail to distribute the virus.
Internet Protocol (IP) Address
is a set of four groups of numbers separated by periods which are the means by which computers connected to the internet identify each other. It is similar to a license plate but instead of identifying your vehicle it identifies your computer. An example would be 72.21.211.176
Redundant Array of Independent Disks (RAID)
is a set of strategies for using more than one drive in a system. RAID 0 and RAID 1 are the most popular options for consumer machines.
Plug and Play (PnP)
is a software and hardware standard designed to facilitate the installation of new hardware in personal computers by including in the OS the drivers these devices need in order to run.
Firewall
is a software program or hardware device designed to protect computers from hackers. One designed for home networks is referred to as a personal firewall.
Home Area Network (HAM)
is a specific type of LAN located in a home.
World Wide Web (www.)
is a subset of the internet dedicated to broadcasting HTML pages, which is the most common means by which users access information over the internet.
Digital Rights Management (DRM)
is a system of access that allows only limited use of material that has been legally purchased (normally in terms of digital music but not limited to it).
Pipelining
is a technique that allows the CPU to work on more than one instruction (or stage of processing) at the same time, thereby boosting CPU performance.
Surround Sound
is a type of audio processing that makes the listener experience sound as if it were coming from all directions by using multiple speakers.
Scareware
is a type of malware that downloads onto a user's computer and tries to convince them that their computer is infected with a virus or other type of malware.
Network Interface Card (NIC)
is a type of network adapter that comes installed in all desktops, laptops, smartphones, and tablets.
Polymorphic Virus
is a virus that changes its own code or periodically rewrites itself to avoid detection.
Time Bomb
is a virus that is triggered by the passage of time or on a certain date. Worm: a worm is different than a virus as it takes advantage of file transport
Logic Bomb
is a virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times.
Wireless Fidelity (WiFi)
is a wireless Ethernet network.
End User License Agreement (EULA) or Software License
is an agreement between the user and the software company. Users accept this agreement before installing the software on their machine. It is a legal contract that outlines the acceptable uses of the program and any actions that may violate the agreement.
Beta Version
is an application that is still undergoing development. Developers distribute Beta Versions in hopes users will report errors and bugs they come across.
Sound Card
is an expansion card that attaches to the motherboard inside your system unit and enables the computer to drive the speaker system.
Video Card (or Video Adapter)
is an expansion card that's installed inside the system unity to translate binary data into images a user views on their monitor.
Data Plan
is an internet connectivity plan that must be purchased for smartphones.
Linux
is an open source OS designed for use on personal computers and as a network OS. Linux has a reputation as a stable OS that is not subject to crashes or failures because the code is open and available to anyone, so it can be modified or updated quickly by hundreds of programmers around the world.
Microsoft Windows
is an operating environment that incorporates a user- friendly, visual interface like the one that was first introduced by Apple's OS.
Spam Filter
is an option a user can select in their e-mail account that places known or suspected spam message into a special folder (called Spam or Junk Mail).
Spyware
is an unwanted piggyback program that usually downloads with other software you install from the internet and runs in the background of your system.
Multimedia
is anything that involves one or more forms of media in addition to text. This includes Graphics, Audio files, and Video files.
Piggybacking
is connecting to a wireless network without the permission of the owner.
Freeware
is copyrighted software that users can use for free. However, users need to be on guard for viruses and malware as some use freeware to get users to allow them to breach the security of their personal computer.
Multipartite Virus
is designed to infect multiple file types in effort to fool the antivirus software that is looking for it.
Web-Based E-Mail
is e-mail such as Yahoo! Mail or Gmail that is managed within a user's web browser and allows them to access their e-mail from the web.
Open Source Software
is free software that is available with few licensing and copyright restrictions. This allows a community of users to improve and alter the software.
Tagging (or Social Bookmarking)
is like bookmarking but instead of saving the website to the user's browser for only themselves, it is saving it to a social bookmarking site so that the user can share it with others.
Streaming Media
is multimedia (audio and video) that is continuously fed to a user's browser so they avoid having to wait for the entire file to download completely before listening or watching it. An example of a service that provides streaming would be Pandora or Spotify.
Menu-Driven Interface
is one in which a user choose commands from menus displayed on the screen.
Command-Driven Interface
is one in which you enter the commands to communicate with the computer system. This refers to DOS.
Software Suite
is proprietary software that is bundled as a package such as Microsoft Office or Apple iWork.
Secure Sockets Layer
is protocol that has been applied to manage the security of a website. This is the difference between websites that have "http://" and "https://" in the beginning of their URL.
Vertical Market Software
is software designed for a specific industry, such as property management software for real estate professionals.
Web Browser
is software that allows users to display and interact with text and other media on the web. Examples include internet explorer, mozilla firefox, safari, and google chrome
System Software
is software that helps run the computer and coordinate instructions between application software and the computer's hardware devices.
Proprietary Software (or Commercial Software)
is software users buy, such as Microsoft Office. These can be purchased online or on a CD or DVD.
Web-Based Applications (Software as a Service aka SaaS)
is software which the vendor hosts online and users can access over the internet without having to install it on their computer.
Hacker
is someone who breaks into computer systems to create mischief or steal information.
Antivirus Software
is specifically designed to detect virus and protect a user's computer and files from harm.
Keystroke Logger (Key Logger)
is spyware that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.
Webcast
is the (usually live) broadcast of audio or video content over the Internet. The real time/live content is what helps separate it from podcasts which are normally pre-recorded.
Copyleft
is the concept of redistributing modified open source software under the same terms as the original software. Thus, all enhancements, additions, and other changes to copyleft software must also be distributed as free software.
4G
is the latest service standard and offers the fastest data-access speeds over cell- phone networks.
Word Size
is the number of bits a computer can work with at a time.
Arithmetic Logic Unit (ALU)
is the part of the CPU designed to perform mathematical operations such as addition, subtraction, multiplication, and division and to test the comparison of values such as greater than, less than, and equal to.
Ethics
is the study of the general nature of morals and of the specific moral choices individuals make.
Base-10 Number System (Decimal Notation)
is the system used to represent all of the numeric values used in everyday life. It is called base 10 because it uses 10 digits to represent any value (0-9).
Spam
is unwanted or junk e-mail
Task Manager
is used if a program has stop working. It allows a user to check on the program or to exit the nonresponsive program.
Electronic Ink (E Ink)
is very crisp, sharp grayscale representation of text used in E-Readers.
Platform
is what computer's combination of an OS and a specific processor is referred to as.
Sleep Mode
is when a computer enters a state where all of the documents, applications, and data that were in use remains in RAM, allowing them to be quickly accessed again when the computer is restarted
Cold Boot
is when a user starts a computer when the computer is in a completely turned off state
Image Backup (or System Backup)
is when all system, application, and data files are backed up, not just files that change.
Peer to Peer (P2P) Network
is when each node connected to a network can communicate directly with every other node on the network.
Inoculation
is when the antivirus software records key attributes about your computer files, such as file size and date created, and keeps these statistics in a safe place on the hard drive.
Base Transceiver Station
large communication towers with antennas, amplifiers, receivers, and transmitters.
Multiuser Operating System or Network Operating System
lets more than one user access the computer system at a time by handling and prioritizing request from multiple users. An example of which would be UNIX.
Machine Language
long strings of binary code that the control unit uses to set up hardware in the CPU for the rest of the operations it needs to perform.
Phishing
lures internet users to reveal personal information such as credit card numbers, social security numbers, or other information that could lead to identity theft.
Ethics Involving Technology
topics to be considered when dealing with technological ethics include social justice, intellectual property, privacy, e- commerce, electronic communication, computer abuse, and many others. Refer to pages 208-219 of your text book for detailed examples and explanations of each.
Router
transfers packets of data between two or more networks.
Types of Wired Connections
twisted-pair cable (made up of copper wires that are twisted around each other and surrounded by plastic), coxial cable (consists of a single copper wire surrounded by layers of plastic), and fiber-optic cable (made up of plastic or glass fibers that transmit data at extremely fast speeds).
Fiber-Optic Service
uses fiber-optic lines to connect a user's computer to the internet.
Digital Subscriber Line (DSL)
uses twisted-pair cable to connect a user's computer to the internet.
Authentication
verification of a user's login name and password. This process blocks unauthorized users from entering the system.
Macintosh
was an improved version of Lisa released by Apple in 1984. It could do everything Lisa could and then some, but it only cost a third of the price of Lisa. It was also the first personal computer to utilize the 3.5-inch floppy disks with a hard cover.
Windows 95
was the first Microsoft OS designed to be principally a GUI OS, which was released in 1995. It included Internet Explorer which is a browser that integrated web functionality into Microsoft Office applications and Windows 95 OS.
Pascalene
was the first accurate mechanical calculator which was invented by Blaise Pascal in 1642. It utitilized revolutions of gears to count by tens. It could add, subtract, multiply, and divide.
Microsoft Excel and Lotus 1-2-3
were also spreadsheet programs that were released in 1983. Their popularity lead to VisiCalc going out of business.
Node
what a device connected to a network is considered.
Base-2 Number System (Binary Number System)
what computers use instead of Base-10 Number System, which involves using either a 1 or a 0. This is because each switch can be in one of two positions: on or off.
Distributed Denial-of-Service
when a hacker performs a DoS attack from more than one zombies (sometimes thousands) at the same time.
Satellite Internet
when a satellite dish is placed outside a user's home and is connected to their computer with a coaxial cable.
Overclocking
when a user runs the CPU at a faster speed than the manufacturer recommends. This increases speed but also produces more heat, meaning a shorter lifetime for the CPU and usually voids any warranty on the product.
Quarantining
when antivirus places a virus in a secure area on the user's hard drive so that it won't spread to other files.
Logical Port Blocking
when firewalls ignore requests that originate from the internet for access to certain ports.
Denial-of-Service (DoS) Attack
when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie.
Drive-By Download
when malicious web sites find exploits in a computers operating system and download harmful software onto a user's computer.
Parallel Processing
when there is a large network of computers, with each computer working on a portion of the same problem simultaneously.
CPU Usage Graph
windows records and graphs the CPU usage for the past minute and is visible in the Task Manager.
Real-Time Operating System (RTOS)
machinery that performs a repetitive series of specific tasks in an exact amount of time. These require minimal user interaction. This type of OS is a program with a specific purpose, and it must guarantee certain response for particular computing tasks; otherwise, the machine is useless. This is used for devices that must perform regimented tasks or record precise results - such as measurement instruments found in the scientific, defense, and aerospace industries.
File Compression Utility
makes a large file more compact, making easier and faster to send in large attachments by e-mail, to upload on the web, or to save to a disc. Examples of which include WinZip and WinRar.
Tethering
makes sure that as long as a user has 3G/4G signal, their computer can access the internet even when it tells the user there are no available wireless networks.
Control Unit
manages the switches in a CPU. It is programmed by CPU designers to remember the sequence of the processing stages for that CPU and how each switch in the CPU should be set (either on or off) for each stage of the Machine Cycle (fetch, decode, execute, and store).
Input
manipulates, calculates or organizes that data into information
ASCII
most of today's personal computers use this, which represent each letter or character as an 8-bit binary code.
Identity Theft
occurs when a thief steals personal information such as name, address, social security number, birth date, bank account number, and credit card information and runs up debt in the person's name.
Pharming
occurs when malicious code is planted on a user's computer, either by viruses or by visiting malicious websites, which then alters their browser's ability to find web addresses.
Short Message Service (SMS)
often referred to as texting, is a technology that lets you send short text messages (up to 160 characters) over cellular networks.
Gigabyte (GB)
one billion bytes
Megabyte (MB)
one million bytes
Kilobyte (KB)
one thousand bytes
Terabyte (TB)
one trillion bytes
Stakeholders
people or entities who are affected by operations of a business.
Productivity Software
programs that lets users perform various tasks required at home, school, and business and includes word processing, spreadsheet, presentation, database, and personal information management programs.
Computer Aided Design (CAD)
programs used by engineers to create automated designs, technical drawings, and 3-D model visualizations. An example would be Autodesk's AutoCAD.
File Transfer Protocol (FTP)
protocol that is often used when a user has large files to upload or download.
Ethernet Port
a connectivity port that resembles a standard phone jack that allows the transfer of data at speeds up to 10,000 Mbps, mostly commonly used to connect to the internet or a cable modem
Core
a core on a CPU contains the parts of the CPU required for processing. Hyperthreading: provides a quicker processing of information by enabling a set of instruction to start executing before the previous set has finished.
Computer
a data processing device that gathers data or allows users to enter data
Network-Ready Device
a device that can be connected directly to a network. This can be done either through a wired or wireless connection.
Input Device
a device that enters data into a computer like a keyboard, mouse or stylus
Output Device
a device that sends processed data out of a computer in the form of text, pictures, sounds or video like a monitor or printer
Solid-State Drive
a drive with no moving parts that runs with no noise, emit little heat and require little power
External Hard Drive
a drive with similar storage capacities to an internal drive that resides outside the system and connects to it through a port
Podcast
a form of digital media compromised of a series of audio or video files that are distributed over the Internet. These services deliver their content using Really Simple Syndication (RSS).
Flash Drive
a form of storage that uses solid-state flash memory and stores information on an internal memory chip. Sometimes referred to as a jump drive, USB drive or Thumb drive
Ultrabook
a full-featured but lightweight laptop computer designed to compete with the MacBook Air
Internal Hard Drive
a hard drive that resides within the system unit and usually holds all permanently stored programs and data
Beginners All-Purpose Symbolic Instruction Code (BASIC)
a language that beginning programming students could easily, created in 1964.
Tablet PC
a laptop with a monitor that swivels or folds flat
Mainframe
a large, expensive computer that supports many users simultaneously
QR (quick response) codes
a marketing technology that allows any piece of print host a link to online information and video content
Hertz (Hz)
a measurement for the speed of the processor
SuperFetch
a memory-management technique utilized by windows that monitors the applications a user uses the most and preloads them into your system memory so that they'll be ready to be used when you want them.
Ethernet Network
a network that uses the Ethernet protocol as the means by which the nodes on the network communicate. Examples would be home and corporate networks.
Commodore PET
a personal computer aimed at the business market that did well in Europe in 1977.
Apple I
a personal computer released by Steve Wozniak and Steve Jobs in 1976. The two also formed Apple Computer Company in the same year.
FireWire 800 Port
a port common with apple computers that provides a transfer rate of 800 Mbps which benefit devices such as external hard drives and digital video cameras due to the speedy data transfer ability
Tablet Computer
a portable computer (iPad or Samsung Galaxy Tab) integrated into a flat multitouch-sensitive screen
Laptop or Notebook Computer
a portable computer that has a keyboard, monitor and other devices integrated into a single compact case
Inkjet Printer
a printer that sprays tiny drops of ink onto paper
Laser Printer
a printer that uses laser beams and static electricity to deliver toner onto the correct areas of the page. It can create high-resolution images
Thermal Printer
a printer that uses melted wax-based ink or burns dots onto specially coated paper
Impact Printer
a printer with tiny hammer-like keys that strike the paper through an inked ribbon to transfer marks onto the paper
Network Address Translation (NAT)
a process used by firewalls to assign internal IP addresses on a network.
Basic Input/Output System (BIOS)
a program that manages the exchange of data between the OS and all the input and output devices attached to the system.
Data
a representation of a fact, a figure or an idea
Cloud Storage
a service that keeps your files on the Internet rather than storing them only on a local device
Personal Ethics
a set of formal or informal ethical principles you use to make decisions in your life.
Software
a set of instructions that tells the computer what to do.
Search Engine
a set of programs that searches the web for keywords and then returns a list of the sites on which those keywords are found. The most popular search engine today is Google.
Macro
a small program that groups a series of commands so that they will run as a single command. These are best used to automate a routine task or a complex series of commands that must be run frequently.
Netbook
a small, lightweight laptop computer that is usually 7-10 inches wide and has a longer battery life than a laptop
Plug-in (or a player)
a special software component that adds a specific feature to an existing software program. Examples include adobe reader, flash player, quicktime player, shockwave player, Silverlight, and windows media player.
Digital Signal Processor
a specialized chip in phones that handles the compression work required. Unlike the phone's processor, this can perform mathematical operations required to compress quickly.
Embedded Computer
a specially designed computer chip that resides in another device
Supercomputer
a specially designed computer that can perform complex calculations very rapidly
Mobile Switching Center
a station in a central location that passes the requests of phones.
Subject Directory
a structured outline of websites organized by topic and subtopics.
Computer Forensics
a technique used in criminal justice that analyzes computer systems to gather possible legal evidence
Cognitive Surplus
a term used to describe how the Internet has created a new combination of leisure time and the tools to be creative
Digital Divide
a term used to describe the gap in levels of Internet access and access to technology in different places in the world
Crisis-Mapping Tool
a tool that collects information from e-mails, text messages blog posts and Twitter tweets, maps that information and makes it publically available
Broadband
a type of connection that offers a means to connect to the Internet faster throughput. Also called high-speed Internet.
Wiki
a web application that allows users to add, remove, or edit its content. The most well-known and popular being Wikipedia.
Bluetooth Technology
a wireless transmission standard that connects devices such as smartphones, tablets and laptops to peripheral devices such as keyboards and headsets
Switch
acts as traffic signal on a network. They receive data packets and send them to their intended nodes on the same network.
Graphical User Interface (GUI)
allowed users to interact with their computers more easily versus having to use complicated command- or menu-driven interfaces. Apple was the first company to take full commercial advantage of GUI but it was not invented by them.
File History
allows Windows to automatically create a duplicate of your libraries, desktop, contacts, and favorites and copy it to another storage device, such as an external hard drive. This protects your data in the event your hard drive fails or files are accidently erased.
Network Adapter
allows different nodes on a network to communicate with each other and access the network.
Network Navigation Devices
allows packets (bundles of data) to flow between nodes on a network.
Desktop Publishing (DTP) Software
allows professionals to design books and other publications that require complex layouts. An example would be Microsoft Publisher.
System Clock
allows the motherboard to move from one stage of the machine cycle to the next.
Electronic Mail (E-Mail)
allows users on the internet to send communications to other users and is considered the most widely used form of communication on the internet.
Wireless Internet Service Provider (Wireless ISP)
allows users to connect smartphones to the Internet.
Word Processing Software
allows users to create and edit documents such as research papers, and class notes.
Presentation Software
allows users to create high-quality presentations without a lot of training. They are generally considered simple to use. An example would be Microsoft PowerPoint.
Drawing Software
allows users to create or edit 2-D, line based drawings
Custom Installation
allows users to decide which features they want installed on their hard drive, which allows them to save space on their hard drive.
Image-Editing Software
allows users to edit their photos. An example would be Adobe Photoshop which allows users to remove red-eye from photos, modify the contrast and sharpness in an image, among many other features.
Simulation Programs
allows users to experience or control the software as if it were an actual event. These are utilized to teach military flight training, surgical instrument training, and machine operation training. These allow users to take risks and learn from their mistakes without any real life consequences.
User Interface
allows users to interact with their OS. Examples are the desktop, icons, and menus.
Spreadsheet Software
allows users to make calculations and perform numerical analyses. It is often used to keep track of expenses and budgets. An example would Microsoft Excel.
Personal Information Manager (PIM) Software
allows users to manage e-mail, contacts, calendars, and tasks all in one place. The most commonly used one can be considered Microsoft Outlook.
Tax Preparation Software
allows users to prepare their state and federal taxes on their own instead of hiring a professional. Two examples would be Intuit TurboTax and H&R Block At Home.
Digital Video-Editing Software
allows users to refine their videos by cutting out unwanted segments and adding audio tracks as well as other editing tools. Examples include Adobe Premiere Pro, Apple's Final Cut Pro, and Windows Movie Maker.
Multimedia Message Services (MMS)
allows users to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.
Internet Service Providers (ISPs)
allows users to share an internet connection. Examples of providers would be Comcast, Optimum, and Verizon FioS.
Database Software
allows users to store and organize data. It is generally used for larger and more complicated data that would be burdensome to use in a spreadsheet. Examples include Oracle, MySQL, and Microsoft Access.
IT
an acronym for Information Technology, a field of study that focuses on the management and processing of information and the automatic retrieval of information
Event
an action, such as a keystroke, to which an OS responds to.
Apple II
an improvement on Apple I released in 1977 that included a color monitor, sound, and game paddles.
Program
an instruction set that provides a means for users to interact with and use the computer without the need for programming skills.
Application Programming Interface (API)
rather than having the same blocks of code for similar procedures in each program, the OS includes blocks of code, API -that application software needs in order to interact with the CPU.
Social Networking
refers to using the web to communicate and share information among friends and others. Examples include (but not limited to) Facebook, Twitter, Youtube, Flickr, and Pinterest.
Netscape
released in 1994, was a web browser which became a predominant player in browser software. In 1998 Netscape was made available for no charge and made their code available to the public.
E-Mail Client
requires a program, such as Microsoft Outlook, to be installed on a user's computer and helps manage e-mails.
Encryption Virus
run a program that searches for common types of data files, such as Microsoft word or excel files, and compresses them using a complex encryption key that renders the files unusable.
Storage
saves data and information for later use
Metasearch Engines
search engines that search other search engines rather than individual websites. An example would be Dogpile.com.
Network
simply to or more computers that are connected via software and hardware so they can communicate with each other.
Utility Programs
small applications that perform special functions on the computer.
Application Software
software used to do tasks at home, school, and work (includes productivity software, business software, and media/entertainment software).
Wide Area Network (WAN)
spans a large physical distance. The largest WAN is the internet.
Device Driver
special programs for devices that facilitates communication between the device and the OS. The device driver translates the device's specialized commands into commands the OS can understand, and vice versa.
Network Operating System (NOS)
specialized software for client/server networks. This software handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes.
System Requirements
specifies the minimum recommended standard for the operating system, processor, primary memory, and hard drive capacity needed to run a software program.
Sampling Rate
specifies the number of times the analog is measured each second when it comes to digital music.
Bluetooth
technology that uses radio waves to transmit data signals over distances up to approximately 300 feet.
CPU (Central Processing Unit)
the CPU controls all of the functions performed by the computer's other components and processes all the commands issued to it by software instructions. It is often referred to as the "brains" of the computer
Interrupt and Interrupt Handler
an interrupt is a unique signal that tells the OS that it is in need of immediate action. Every device has its own type of interrupt, which is associated with an interrupt handler, a special numerical code that prioritizes the requests. These requests are placed in the interrupt table in the computer's primary memory. The OS processes the task assigned a higher priority before processing a task assigned to a lower priority. This is called preemptive multitasking.
MS-DOS
an operating system written by Bill Gates and Microsoft for IBM computers and Intel chips in 1980.
Flash Memory Card
another form of portable storage that uses solid-state flash memory such as an SD card, however not all desktop and laptops include the slot for these and may require plugging in a memory card reader via a USB port. They tend to be very small, some even smaller than a the size of a postage stamp
TRS-80
another personal computer released in 1977 that sold approximately 10,000 units the U.S. consumer market.
Hardware
any part of the computer you can physically touch
Cellular Phones (Cell Phones)
any phone that uses mobile, cellular technology. Feature Phones: inexpensive phones that have modest processors, simpler interfaces, and often no touch screen.
Grey-Hat Hackers
are a cross of the two. They often illegally break into systems to merely flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.
Backups
are copies of the files that a user can use to replace the original if they're lost or damaged.
Optical Drive
are disc drives that use a laser to store and read data. Data is saved to a compact disc (CD), a digital video disc (DVD) or a Blu-ray disc (BD) within established tracks and sectors, just like on a hard drive.
Transistors
are electrical switches built out of layers of a special type of material called semiconductor (any material that can be controlled either to conduct electricity or to act as an insulator)
Template
are included in many productivity applications and provide the basic structure for a particular kind of document, spreadsheet, or presentation.
CPU Benchmarks
are measurements used to compare performance between processors.
Backdoor Programs and Rootkits
are programs that allow hackers to gain access to your computer and take almost complete control of it without the user's knowledge. Computers controlled this way by hackers are referred to as Zombies.
Instant Messaging (IM)
are programs that let users communicate in real time over the internet.
Memory Modules (or Memory Cards)
are small circuit boards that hold a series of RAM chips and fit into special spots on the motherboard.
Utility Programs
are small programs that perform many of the general housekeeping tasks for a computer, such as system maintenance and file compression.
Cookies
are small txt files that some website automatically store on a user's hard drive when you visit them.
Home Network Server
are specialized devices designed to store files, share files across the network, and back up files on computers connected to the network.
Hyperlinks
are specially coded elements that let a user jump from one web page to another either within the same website or to another website all together.
Electronic Text (E-Text)
are textual information captured digitally so that it can be stored, manipulated, and transmitted by electronic devices.
Microprocessors
are the chips that contain a central processing unit (CPU).
Electric Switches
are the devices inside the computer that are flipped between the two states of 1 and 0, signifying "on" and "off".
Integrated Circuits (or Chips)
are tiny regions of semiconductor material that support a huge number of transistors.
Distributions or Distros
are various packages of Linux available for download. They include the underlying Linux kernel and special modifications to the OS, and may include additional open source software.
Crowdfunding
asking for small donations from a large number of people, often by using the Internet
Boolean Operators
assist in refining a search. Words such as AND, NOT, and OR help describe the relationship between keywords in a search.
White-Hat Hackers
break in to systems for nonmalicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses.
Black-Hat Hackers
break into systems to destroy information or for illegal gain.
Crowdsourcing
checking in with the voice of the crowd
Mobile Broadband
connects users to the internet through the same cellular network that cell phones use to get 3G or 4G internet access.
Registry
contains all the different configurations (settings) used by the OS and by other applications.
Analog-to-Digital Converter Chip
converts a user's voice's sound waves into digital signals.
Full Installation
copies all the most commonly used files and programs from the distribution disc to a user's computer's hard drive.
Information
data that has been organized or presented in a meaningful fashion
Moore's Law
describes the pace at which the central processing unit (CPU) improve. This rule predicts that the number of transistors inside a CPU will increase so fast that CPU capacity will double about every two years. This rule of thumb has held true for over 45 years.
VisiCalc
developed by Dan Bricklin and Bob Frankston, VisiCalc was a computer spreadsheet program that was released in 1978 and helped users see the benefit of owning a personal computer.
Disk Operating System (DOS)
developed by Wozniak and introduced in 1977, was the operating system that controlled the first Apple computers.
E-Readers
devices that can display e-text and have supporting tools, like note taking, bookmarks, and integrated dictionaries.
Clock Speed
dictates how many instructions the CPU can process each second.
Touch Screens
display screens that respond to commands initiated by touching them with a finger or stylus or other body part
Process
displays data and information in a form suitable for the user
Binary digit
each 0 or 1 referred to as a bit for short
Byte
eight binary digits combined
Transmission Media
establish a communications channel between nodes on a network.
Whole-House Surge Protectors
function like surge protectors but instead protect all electronic devices in the home.
Connectivity Port
gives a user access to networks and the Internet, an example would be an Ethernet Port
Power Supply
hardware that is stored inside the system unit of a computer that transforms the wall voltage to voltages required by computer chips. Required to turn a computer on and off
Accounting Software
helps small business owners manage their finances more efficiently by providing tools for tracking accounts receivable and accounts payable. They also offer inventory management, payroll, and billing tools.
Financial Planning Software
helps users manage their daily finances. These tend to include electronic checkbook registers and automatic bill payment tools.
Wizard
helps walks users through the steps necessary to complete a complicated task. At each step in the process the wizard will ask the users questions and based on their responses, it helps them complete that portion of the task. This is most commonly used when installed new software on a computer.
Course Management Software
in addition to traditional classroom tools such as calendars and grade books, these programs provide special areas for students and instructors to exchange ideas and information through chat rooms, discussion forums, and e-mails. The most notable course management software utilized by higher education is Blackboard.
Network Administration
in charge of tasks such as installing new computers and devices, monitoring the network to ensure it's performing efficiently, updating andinstalling new software on the network, as well as configuring proper security for a network.
Multimedia Software
includes digital image- and video-editing software, digital audio software, and other specialty software required to produce computer games, animations, and movies.
Network Architectures
includes the distance between nodes, the way in which the network is managed, the set of rules or protocol used to exchange the data between network nodes, and the communications medium used to transport data.
Audio -Editing Software
includes tools that make editing audio files as easy as editing text files. An example would be the open source software Audacity.
Jacquard Loom
invented by Joseph Jacquard around 1840 revolutionized the fabric industry by automating the weaving of complex patterns.
Incremental Backup (or Partial Backup)
involves backing up only files that have changed or have been created since the last backup was performed.
Pretexting
involves creating a scenario that sounds legitimate enough that someone will trust you.
Hexadecimal Notation
is a base- 16 number system. This includes 0-9 as well as A-F.
All-in-one Computer
a computer that eliminates the need for a separate tower by housing the computer's processor and memory in the monitor
Server
a computer that receives the request for data from the Client and returns the data to the Client
Video Memory
RAM that is included on all video systems.
Throughput
The actual speed of data transfer that is achieved.
System Files
The main files of the OS.
System Restore
a Windows utility that allows a user to roll their system settings back to a specific date when everything was working properly. A system restore point is a snapshot of the user's entire system settings, is generated prior to certain events, such as installing or updating software, or automatically once a week if no other restore points were created in that time. These can also be created manually.
Error-Checking
a Windows utility that checks for lost files and fragments as well as physical errors on a user's hard drive.
Cable Internet
a broadband service that transmits data over the coaxial cables that also transmit cable television signals.
High-Definition Multimedia Interface (HDMI) Port
a compact audio-video interface that allows both HD video and uncompressed digital audio to be carried on one cable
Peripheral Device
a component like a monitor or keyboard that connects to the computer
Desktop Computer
a computer intended for use at a single location that has a separate case or tower that houses the main components of the computer
Client
a computer that asks for data from a Server