Intro to Computers Ch. 1 and Ch. 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Network Interface

The network interface provides an RJ-45 port into which a network cable can be connected. On desktop computers, this port is usually found on the back. On notebooks, it is usually found on the side of the system.

Lossless Compression

A compression algorithm that doesn't affect the original data. In other words, the uncompressed file will be exactly the same as the file before compression, bit for bit. Common lossless file types include: -GIF -PNG -PDF -ZIP

Lossy Compression

A compression algorithm that slightly alters the data to make it easier to store. Lossy compression takes advantage of the limitations of human sight and hearing, and is usually used for images, videos, and audio files. Common lossy file types include: -JPG -MP3 -MP4

Gaming

Scientific research in artificial intelligence has been applied to video games since the mid-twentieth century. In the early years, AI development was focused on how to beat human players. More recently, AI has been applied to enhance players' gaming experiences. AI elements in gaming include complex machine learning systems and more believable visuals that capture natural human emotion.

Conventional Database Tools

Conventional database tools work well with structured data that are organized into relational databases and data warehouses. These tools are designed for relational database management systems (RDBMS) and use Structured Query Language (SQL) for querying and maintaining the databases. Traditional tools do not work well with big data, which requires query languages and other tools that are more flexible and dynamic.

The Web

Short for World Wide Web, the Web refers to the digital content that is delivered over the Internet, usually through a web browser.

Flow Charts

The main purpose of flowcharts is to visually represent the flow of logic in a program. An advantage of using flowcharts is that they make programming logic easier to read, especially for those who have little experience with programming. The following are important symbols associated with flowcharts: ⊂⊃ Pill Shape. Pill shapes represent the start or end of a program. ▱ Parallelogram. Parallelograms are used for input or output. ◇ Diamond. Diamonds represent decisions answered with a Yes or a No. ▭ Rectangle. Rectangles are used for processes. ➝ Arrow. Arrows are used to determine the logical flow of the program

SQL (Structured Query Language)

SQL is a computer language used by most relational databases for creating queries. By using SQL, a database user can view, edit, delete, and create database records.

Query

Queries are used to ask questions about the data stored in a database's tables. Generally, it's not useful to look at an entire data table. Instead, database users build queries, which retrieve only the relevant information they want to look at. For example, if you've ever searched for a single TV show from a streaming service, you've queried a database.

Raster Images

Raster (or bitmap) images are the most common kind of digital image. Computers store raster images by remembering the color of each pixel. For example, a yellow pixel might take three bytes to encode - one each for red, green, and blue. Since yellow is a combination of red and green, the computer might store the yellow pixel by using eight 1s for red, eight 1s for green, and eight 0s for blue. When the computer interprets this data, it turns the red and green lights all the way on, and the blue light all the way off. Raster images have several advantages. Because they store each individual pixel, they can be very detailed. Digital photographs, for example, are raster images. Raster files are also easy to create. If you have a camera on your phone, you can create a raster image in just a few seconds. All that detail comes at a cost, though, because raster images use tons of storage space. They also have limits to how much you can scale the file. If you take a small raster image and make it larger, it'll become pixelated, which means you can see the individual pixels.

Reconnaissance

Reconnaissance passively gathers information about a potential victim. The goal is to identify key information needed to further exploit the victim. Common reconnaissance techniques include the following: ~ Shoulder surfing involves looking over a user's shoulder, looking for sensitive information displayed on the screen. This can even include watching keystrokes as a user types in a password or PIN. ~ Eavesdropping involves listening to conversations to obtain sensitive information. ~ Dumpster diving involves searching through the trash for discarded documents containing sensitive information.

Bit Depth

Recording programs have to decide how much memory they should allocate to store the value of each sample. The amount of memory used is called the bit depth. 8-bit sound uses eight bits (or one byte) to store the value of each sample. 16-bit sound uses two bytes per sample. Generally speaking, the better the bit depth, the better the sound.

Resolution

Resolution is a measure of how many pixels wide and tall each frame of a digital video is. The higher the resolution, the clearer the image will be.

Keyboard

The keyboard is covered with buttons called keys that you can use to type text and send commands to the computer through a USB cable.

Reload

The reload button allows you to refresh the current web page.

URL

A URL, or Universal Resource Locator, is the reference or address to a resource on the Internet. An example of a website URL is http://www.testout.com/home/about/privacy. It consists of a protocol identifier (HTTP), a web server and domain name (www.testout.com), and an optional path to the resource (home/about/privacy).

Run-Length Encoding

A common lossless compression algorithm. Instead of storing each individual bit of a file, it stores how many of each bit appears in a sequence. For example, instead of storing thirty zeros in a row, it would just store the number thirty, followed by a zero. It can also store repeated patterns in data, such as identical pixels in an image.

Database Administrator

A database administrator (or DBA) is responsible for designing, maintaining, backing up, and securing an organization's databases, which include inventory tracking, customer relationship management, and personnel data. While larger companies usually have a dedicated DBA, systems administrators often assume the role in smaller companies. DBAs are in charge of managing enterprise database platforms such as Microsoft SQL Server and Oracle Database. They often work closely with data analysts to query databases and provide information to help businesses make informed decisions.

Device Drivers

A device driver is software that helps an operating system communicate with hardware devices, such as printers, video cards, scanners, and cameras. Let's use printers as an example. There are thousands of printer models available, and each one needs to get instructions from the computer in a slightly different way. It would be impossible and unnecessary for an operating system such as Windows to know how to communicate with every single kind of printer. Instead, users install the driver for their specific printer, which translates signals from the operating system into instructions the printer can understand.

Field

A field describes a single attribute of each record in a table. For example, in a database of people you may have a field for first names. Every person's first name will be stored in the first name field. Fields are comparable to columns on a spreadsheet.

Record

A record is a single instance of a thing stored in a database table. For example, in a database of people, each individual person would be a record. Generally, each record has one field designated as the primary key. Records are comparable to rows on a spreadsheet.

Technological Singularity

A hypothetical point in the future when artificial intelligence will surpass human intelligence, triggering an explosion in technology advancement that could threaten the human race. Scientists disagree on whether the technological singularity could ever be achieved.

Neural Networks

A more recent AI technology built on neural networks is designed to closely mimic the physical connections of the human brain. Sometimes called deep learning, neural networks are better than traditional expert systems in accepting multiple inputs and recognizing patterns in raw data.

Report

A report is a formatted, easy-to-read listing of the results of a query. Without reports, query results would resemble a spreadsheet. When you search for an online video and are presented with a list of relevant options, the list is a report.

Support Specialist

A support specialist communicates with both employees and customers in helping them resolve hardware and software problems. They respond to technical support phone calls, emails, live chats, and online discussion forums. Support specialists troubleshoot and then resolve issues either in person or remotely. These are typically entry-level positions that require skills in problem solving and customer service.

Tab

A tab displays a web page and allows for multiple web pages to be opened within a single window.

Supported Browsers: Google Chrome 35+, Firefox 42+, Safari 8+, Edge 20+

A web browser is an application that's used to access files through the Internet. The word web is short for World Wide Web, which refers to the naming and linking of digital content stored on the Internet. Some commonly used web browsers include Microsoft Edge, Mozilla Firefox, Google Chrome, and Apple Safari.

Algorithms

Algorithms are specific, step-by-step procedures that illustrate how a problem will be solved. They include all of the necessary logic, such as conditional statements, branches, and loops. Before they are implemented in code, algorithms are often expressed in flowcharts or in pseudocode.

Artificial Intelligence

An area of computer science that focuses on intelligent machines. AI has already been implemented in various technologies ranging from computer games and simple voice recognition to advanced robotics and expert systems.

Intranet

An intranet is like a miniature Internet. It's a private network, not a public one, but it uses many of the same technologies that are used on the Internet, such as websites and email. An organization's intranet may or may not be connected to the public Internet. A security boundary prevents devices on the Internet from accessing the devices within the intranet.

Sampling Rate

Another setting that affects sound recording quality is the sampling rate, or how many individual samples are taken each second. This rate is measured in hertz (Hz). For example, a sampling rate of one thousand samples per second is the same as one thousand hertz, or one kilohertz (kHz). Most modern sound recordings are made at 44.1 kHz.

Anti-Malware Software

Anti-malware software should be installed on computer systems to detect and prevent malware infections. The following are some of the many types of malicious software, or malware: ~ Viruses attach to files and spread when the files are opened. ~ Worms infect systems and spread automatically through the network. ~ Trojan horse programs appear to be useful programs but secretly install malware without your knowledge. Spyware tracks your computer or browser activity. There are countless anti-malware packages that can be used on Windows systems, including the following: ~ Microsoft Windows Defender ~ Microsoft Security Essentials ~ McAfee AntiVirus Plus ~ Trend Micro Antivirus+ ~ Bitdefender Antivirus Plus ~ Kapersky Anti-Virus ~ Malwarebytes Anti-Malware Premium

QA Engineer

Any time a programmer writes code, there are bound to be a few bugs that pop up. Whenever these bugs make it to the end customer, it hurts the company. That's why companies hire Quality Assurance Engineers, or QA Engineers. These specialists monitor software development to make sure the quality of the finished product meets the standards of the company.

Application Developer

Application Developers are one of the most common careers in programming. Their job is to create applications for computers and mobile devices. They usually work together in teams, and they create all kinds of software - word processors, games, database systems, graphics programs, web browsers, and much more.

Expert Systems

Artificial intelligence is used heavily in expert systems, which are programs designed to solve complex problems in a specific domain. For example, expert systems have been developed to analyze the lubricating fluid used during oil drilling and to help doctors diagnose diseases. These systems are programmed as a complex web of conditional IF...THEN statements.

RAM: 4GB or higher

As data is processed by the CPU, it's stored temporarily in Random Access Memory, or RAM. Complex programs, such as the software simulations in this course, require more RAM for optimal performance. While RAM can be accessed efficiently, it's not persistent. That means any data stored in RAM will be lost when the system is turned off.

1890 - Hollerith's Tabulating Machine

At the end of the 19th century, the population of the United States was rapidly growing. Because there were so many people, the 1880 census took seven years to compile, and it was predicted that the 1890 census would take nearly twice as long. To solve this problem, the government hired Herman Hollerith to devise a solution. Hollerith created an electromechanical tabulating machine to process the census data. It worked by punching data into paper cards, then inserting them into the machine. Inside the machine, small metal pins would pass through the holes into a vial of mercury, completing an electrical circuit. This in turn powered an electric motor, which turned the appropriate gear in the machine to keep track of the count. Using this machine, the entire census was compiled in two and a half years.

Machine Language

At their most basic level, computers are machines that respond to physical signals, such as positive and negative electric charges, which we represent as ones and zeros. Processors recognize specific configurations of ones and zeros as commands. This is called machine language. Machine language is extremely difficult for humans to understand. Imagine being a programmer and trying to work with a file with millions of ones and zeros. Even if you knew how to interpret the binary, it would take you hours just to figure out what the code was supposed to do. Fortunately, modern developers don't have to work directly with machine language. Instead, they use programming languages. These languages make computer instructions much easier for humans to read and write.

NoSQL

Because of the unstructured and complex nature of big data, we typically can't use SQL to query an organized collection of relational databases. For this reason, the nonrelational databases that arise from big data are often called NoSQL. NoSQL databases are sometimes called "Not only SQL," since the query languages that support them are often used in conjunction with certain relational database features that do support SQL.

Data Extraction

Before analyzing and interpreting big data, it needs to be gathered and organized. This is a challenge because big data is typically unstructured and distributed over several locations. And because it's so complex, combining various types of information, big data can't be processed quickly into a relational database. Very often, it includes images, documents, complex numbers, and video. And the data are constantly expanding.

Big Data Analytics

Big data analytics is the process of asking specific questions to help interpret data. For example, a business might be interested in making an informed decision regarding product features. Medical researchers can use patient information and gene mappings to predict who might need specific treatments. Cities can take advantage of traffic sensor technology to better design roads and keep traffic moving smoothly.

Browser Attacks

Browser attacks convince the victim that they are performing a legitimate task within their browser window, when in fact they are being tricked into revealing sensitive information or installing malware on their computer. Browser-based attacks can take many forms, including the following: ~ Pharming redirects web traffic sent to a legitimate site to a malicious site that looks identical to the real website. Once there, the attacker tricks the victim into supplying sensitive information, such as user names, passwords, bank account numbers, or credit card numbers. ~ Rogue antivirus attacks employ a pop-up browser window that tells the user their computer is infected with a virus and that they must click a link to clean it. Sometimes this exploit merely tricks users into paying for worthless software they don't need. However, it is frequently used to install malware on the victim's computer.

Chat With a Representative

Companies frequently include an option to open a chat window, where you'll be connected with a customer service representative. This is a great way to get help immediately when you need it, rather than having to wait for support to get back to you.

Branching

By default, computer programs start at the first line, then execute one line at a time until the end. However, many programs need to change their behavior based on user input or other circumstances. This is called branching. Consider the following common example. In the pseudocode for an online store, the program is watching for the user to click "Add to cart." When they do, it checks to see whether the user is logged in. If they are, the code adds their item to the cart and suggests similar items. If they aren't, they get redirected to the login page. This type of conditional branching is typically made up of IF-ELSE statements inside the program. In the example, if the user is logged in, the program runs the code under the IF statement. Otherwise, it runs the code under the ELSE statement.

Cascading Style Sheets (CSS)

CSS gives websites their look and feel. On this page, the table style, font, margins, and background are all generated by CSS. CSS is like adjectives in speech; it says how the HTML is supposed to look.

Color Depth

Color depth is a measure of how much memory the computer uses to display colors. Eight-bit color images use one byte of data for each pixel, which means each pixel must be one of these 256 colors. 24-bit color, which uses three bytes for each pixel, can use millions of different colors.

Hardware Manufacturing

Companies in this sector take raw materials, like metal, glass, and silicon, and make them into computer hardware components. The server this course is stored on, the routers and wires that transported it to you, and the screen you're looking at right now were all manufactured by ICT companies.

Compiled Languages

Compiled programming languages, which include C and C++, use a software tool called a compiler to translate the code into machine language because the source code written in these languages can't be run immediately after it's written. The compiler saves the translation as a file called a binary executable, or .exe file. This method has several strengths. Because the executable file is already written in machine language, it can go directly to the processor without any additional steps, resulting in fast execution. Another advantage is that these programs have full access to everything on the platform, including cameras, motion sensors, USB-connected devices, and GPS. Because of these advantages, resource-intensive programs such as top-end video games are generally written in compiled languages. Unfortunately, compiled programs have a serious weakness - different kinds of computers speak different machine languages. An executable that works just fine on an XBOX won't work on a PlayStation or Nintendo console. To make a compiled program work on multiple platforms, the developer needs to rewrite and recompile for each one (a process called porting), which is slow and prone to errors.

Hardware

Computer hardware includes all of the physical components of the system that you can see and touch. Computer hardware typically includes the following: Keyboard Mouse Monitor Printer Connectors Cables Storage devices Processor Chip Memory Chips Power Supply

RGB Display

Computer monitors are made up of tiny red, green, and blue lights. This is called an RGB display. Red, green, and blue are the three primary colors of light, and they can be combined to make all the colors of the visible spectrum. Each set of three lights is called a pixel. The image above uses three lights to represent a single pixel. When all three lights shine at the same time, our eyes perceive them together as white light. By combining two colors, you get the secondary colors of light. Red and green make yellow, red and blue make magenta, and green and blue make cyan. By varying the brightness of one or more of the lights, each pixel can display any color on the visible spectrum.

Computer Software

Computer software encompasses all of the programs running on the system to perform specific computing tasks. Several different types of software must be present on a computer for it to work properly, including the operating system (such as Microsoft Windows) and applications (such as Microsoft PowerPoint and Google Chrome).

Software

Computer software encompasses all of the programs running on the system to perform specific computing tasks. Several different types of software must be present on a computer for it to work properly, including: Operating system (e.g. Microsoft Windows, Linux, macOS) Applications (e.g. Microsoft PowerPoint, Google Chrome) Drivers (special programs that tell the operating system how to communicate with the computer's hardware)

Sharing Data

Computers can share data with each other over a network. Networks use special equipment to create communication channels between computers, allowing them to send and receive data.

Processing Data

Computers process the data they receive from input devices using software running on the system. Internal components that temporarily store and process data include: Central processing unit (CPU) Random-access memory (RAM)

Storing Data

Computers store and maintain data on long-term storage devices. This allows the data to be retrieved and used at a later time. Common long-term storage devices include: Hard disk drives (internal and external) Optical drives (CD-ROM, DVD, and Blu-ray) Flash storage devices

Binary Number System

Computers work by converting physical signals, such as electrical charge, into 1s and 0s which can be processed digitally. The numbering system made of 1s and 0s is called the binary system. In this lesson, we'll walk through the process of converting the decimal number 206 into a binary number.

DNS

DNS, short for Domain Name System, is a protocol that associates domain names (such as web servers) with unique IP addresses. DNS servers translate URLs into machine-readable IP addresses.

Big Data Analytics

Data mining experts use AI in machine learning algorithms that discover patterns in vast amounts of data collected from Internet searches, social media posts, customer transactions, and weather sensors. These patterns can help businesses better understand their customers and help data scientists identify potential threats.

Data Mining

Data mining is a broad and open-ended analysis of extracted data. Data mining experts use automated tools and algorithms to discover trends or patterns in the data. These patterns can be descriptive, helping us understand what's going on in a business operation. Or the patterns might be predictive, putting data scientists in a better position to identify potential threats or forecast future trends.

Desktops

Desktop computers have been around for many years and are very widely used, especially in business and industry occupations. Desktop systems are equipped with peripheral devices, such as a monitor, keyboard, mouse, and speakers. Desktop systems have several advantages. ~ They are modular, allowing them to be customized to perform specific functions. ~ They are easier to repair and upgrade. ~ They are usually more powerful than other types of computing devices. Desktop systems also have some disadvantages: ~ They are not mobile. ~ They require continuous access to an A/C power outlet.

DSL

Digital Subscriber Line, or DSL, is a better alternative to dial-up. It uses the same phone connection as dial-up; however, DSL signals are sent using the high-frequency ranges that voice calls don't need to use. This means that the data connection doesn't use up the phone connection. In other words, a phone call can be made while someone has Internet access at the same time.

1947 - First Transistor Developed

Early computers sent signals via mechanical relays. Relays were metal switches that would physically move to make and break electrical circuits, representing 1s and 0s. Because the parts had to physically move, they were slow and tended to wear down over time. In 1947, scientists at Bell Laboratories invented the transistor. Transistors contain silicon, a semiconductor that can be made to sometimes conduct electricity and sometimes not. Because they didn't have any moving parts, silicon transistors were smaller, faster, cheaper, and more durable than mechanical relays.

Bytes

Eight bits together form a byte. The value of a single byte can range from 0 (eight 0s) to 255 (eight 1s). Because a single byte can't store much information, we usually talk about them in groups. -1 kilobyte = 1024 bytes -1 megabyte = 1024 kilobytes -1 gigabyte = 1024 megabytes -1 terabyte = 1024 gigabytes

Email Attacks

Email attacks attempt to exploit a victim using email messages. Email attacks come in several forms: ~ Phishing emails are crafted to appear as though they were sent from a legitimate organization, such as a bank or an ecommerce website. They convince the user to click a link that takes them to a malicious website where they are tricked into providing sensitive information. Spear phishing involves gathering as much information about the victim as possible first, such as identifying which online banks they use or where they shop online. ~ Then the attacker sends phishing emails that appear to be from the trusted bank or web store. ~ Nigerian scams use emails to trick the user into to sending a small amount of money in return for a (supposedly) greater amount of money later. ~ Email hoaxes prey on overly trusting email recipients. Usually they trick the reader into deleting key system files or downloading malware.

IP Address

Every computing device that accesses the Internet is assigned a unique Internet Protocol (IP) address. These addresses consist of either four (IPv4) or eight (IPv6) parts. An example of a four-part IP address is 137.75.68.206.

Fiber Optic

Fiber networks use fiber optic cables to send signals with light instead of electricity. This has a few considerable advantages - light isn't vulnerable to electromagnetic interference, and it has potential for much higher speeds than DSL or cable. The downside is that fiber networks are expensive to build, so many areas don't have access to a fiber connection.

Firewall

Firewalls control the flow of network traffic and protect systems from unauthorized network connections. They are configured with a set of rules that define what kind of traffic is allowed and what kind is not allowed. For example, if a malicious user on the Internet tries to establish a connection with your computer, the firewall identifies it as a violation and blocks the connection. There are two general types of firewalls. ~ A Network firewall is configured at the border of a network where it connects to the Internet. By placing a firewall in this location, it can protect an entire network. ~ A Host firewall is installed on an individual computer and protects only that system. Typically, most networks will use both types of firewalls. Network firewalls must be purchased separately and installed manually. However, host-based firewalls are usually installed and enabled by default on most modern operating systems.

Firmware

Firmware is preinstalled, read-only software on a device that tells it how to work. In many ways, it's like a low-level operating system. Firmware can be found in televisions, remote controls, game consoles, printers, cameras, music players, and even automobiles. Sometimes, manufacturers release firmware updates that fix bugs and add new features.

Processor: Intel i3, Intel i5, Intel i7, AMD A12 or better

Generally, the word "processor" refers to the Central Processing Unit or CPU. The CPU is the brains of the computer where most calculations take place. It is an integrated circuit that processes instructions sent from the operating system and software programs. In terms of computing power, the CPU is the most important element of a computer system.

Other Language Categories

HTML and other markup languages are generally not considered to be programming languages. The main purpose of HTML is to tell web browsers how to display static text on the screen. Another language category includes query languages such as SQL that are used to retrieve information from databases.

Hypertext Markup Language (HTML)

HTML is used to create the content and structure of a website. All the words you're reading right now are part of an HTML document. In fact, if you press Ctrl+U (Windows), you can see the HTML for this page. HTML is like nouns in speech; it says what should be displayed.

Waterfall Model

Historically, the waterfall model has been the most widely used development model. It divides the SDLC into a series of sequential or linear phases, from preliminary analysis and design to implementation and maintenance.

HTML

Hypertext Markup Language (HTML) is the programming language that web pages use to display content through web browsers, such as Firefox or Google Chrome.

Allow an Unknown App

If you have an application installed that needs to communicate through the firewall that Windows isn't aware of, you can add an exception for it. However, you must first tell Windows Firewall the name of the application's executable file. This is done by completing the following: 1. In the Windows search field, enter Windows Firewall and open Windows Firewall. 2. Click Allow an app or feature through Windows Firewall. 3. To add a new app, click Allow another app.... 4. Click Browse, then browse to and select the application's executable file. 5. Click Open, and then click Add. 6. Enable an exception for the program. This can be done separately for each network type. 7. Click OK.

Allow or Block a Known App

If you have an application installed that needs to communicate through the firewall, you can add an exception for it. You can also block communications for the application. Either option can be configured by doing the following: 1. In the Windows search field, enter Windows Firewall and open Windows Firewall. 2. Click Allow an app or feature through Windows Firewall. A list of known programs is displayed. 3. Enable or disable an exception for any of the programs listed. This can be done separately for each network type. 4. Click OK.

Back/Forward

If you have navigated to the wrong webpage, click on the left arrow (Back) to go back to the previous page or click on the right arrow (Forward) to return to the page you just left.

Enable or Disable Windows Firewall

If you need to enable or disable the Windows Firewall, do the following: 1. In the Windows search field, enter Windows Firewall and open Windows Firewall. 2. Alternatively, you can open Control Panel and navigate to System and Security > Windows Firewall. 3. Click Turn Windows Firewall on or off. 4. Turn the Windows Firewall on or off, as needed. Note that you can enable or disable the firewall separately for each type of network.

1977 - The Personal Computer Revolution

In 1977, three successful personal computers were released to the public: The Apple II, the TRS-80 Model 1, and the Commodore Pet 2001. These three computers became known as the "1977 trinity." 1977 also saw the release of the Atari 2600, the first popular home video game console. For the first time, computers were marketed to the general public, rather than just businesses and hobbyists. Four years later, IBM followed up with the IBM PC, giving birth to the PC/Apple rivalry that still exists today.

Analysis Phase

In the analysis phase, the project team takes a close look at any existing information systems that are already in place. For example, if the organization currently uses a transaction processing system to track customer orders, the team will determine if this system is adequate or needs to be upgraded. Does the organization need a better support system to help business leaders make more informed decisions? Do product developers have the processes and tools they need to work efficiently? The requirements for the new information system will bridge the gap between the existing system and the goals of the new one.

Dial-Up

In the early days of the Internet, most home computers used a dial-up connection. To get Internet access, the computer would make a phone call to the ISP. Just like a regular voice call, this call was an analog signal - as the computer dialed in, you could actually hear the sound of the data. A device called a modem, or modulator/demodulator, sat between the computer and the phone line. The modem turned digital data from the computer into analog sound data for the phone line, and the other way around. The main disadvantages to dial-up connections were that they were extremely slow and they tied up the phone line.

Implemmetation Phase

In the implementation phase, developers and administrators purchase and install new hardware and software, integrate the various system components, and test the operation of the new system. For example, developers would need to ensure that a new ecommerce application operates seamlessly with an organization's existing inventory control and distribution systems. After the system is thoroughly tested, employees may need to receive training. Before retiring the old system, the project team might decide to keep it running in parallel with the new system for a while. Another way of easing the transition to a new system is to implement it with a small pilot group first.

Maintenance Phase

In the maintenance phase, the new system needs to be monitored and evaluated. When the project team identifies problems, they might need to cycle back to the earlier planning and analysis phases to improve the system. For example, if a data breach is discovered, the organization must determine the cause of the breach and implement a plan to avoid future vulnerabilities.

Security Analyst

Information security analysts are in charge of designing and implementing security methods to protect an organization's computer systems and networks. In addition to installing firewalls and anti-malware protection, they research new threats and vulnerabilities, inspect the company's network for security breaches, and recommend measures to prevent future attacks.

InkJet Printer

Inkjet printers spray small dots of ink from an ink reservoir onto a sheet of paper. Inkjet printers can produce high-quality output and are relatively inexpensive to purchase. However, they have several disadvantages.

Accepting Input

Input devices send data to the computer for processing. Common input devices include: Standard input devices: ~ Mouse ~ Keyboard ~ Touchscreen Gaming input devices: ~ Game pad ~ Joystick Media input devices: ~ Scanner ~ Digital camera and camcorder ~ Webcam Audio input devices: ~ Microphone ~ Line-in audio device

ISP

Internet Service Providers, or ISPs, manage an access point to the Internet. They don't manage the entire Internet. If you think of the Internet as a big freeway, then ISPs manage the on-ramp to the freeway. They're responsible for building the on-ramp and keeping it maintained and open, but they're not responsible for the Internet itself.

Internet Bandwidth: 3.6 Mbps per user

Internet bandwidth is the amount of data that can be transmitted over an Internet connection in a fixed amount of time. It is typically measured in Megabits per second. When users share an Internet connection, the total bandwidth is divided among them.

Interpreted Languages

Interpreted languages are another solution to making a program work on multiple platforms. These languages include Python, JavaScript, and Ruby. Programs written in these languages don't translate source code into binary ahead of time. Instead, a program called an interpreter executes the instructions written in the source code whenever the application is run. Interpreted programs have the huge advantage of being platform independent. However, this comes at a major cost to performance; they are slower than compiled programs and have limited access to the system's resources. Most applications you access through your web browser, including the labs in this course, are written in interpreted languages.

Runtime Engines

Interpreted languages are another solution to making a program work on multiple platforms. These languages include Python, JavaScript, and Ruby. Programs written in these languages don't translate source code into binary ahead of time. Instead, a program called an interpreter executes the instructions written in the source code whenever the application is run. Interpreted programs have the huge advantage of being platform independent. However, this comes at a major cost to performance; they are slower than compiled programs and have limited access to the system's resources. Most applications you access through your web browser, including the labs in this course, are written in interpreted languages.

Retail and Wholesale

It doesn't do IT companies much good if they make excellent products but can't sell them to customers. Retail and wholesale businesses take technology created by other companies and sell it to end users.

Micro USB

Micro USB connectors are the smallest type of USB connector. They are commonly used for connections to mobile devices, such as tablets and phones. Cables with a Micro USB connector generally use a Type A connector on the other end of the cable to connect to the computer.

Mini USB

Mini USB connectors are a smaller type of USB connector. They are commonly used for digital cameras and sometimes external hard drives. Cables with a Mini USB connector usually use a Type A connector on the other end of the cable to connect to the computer.

JavaScript

JavaScript is used to make webpages interactive. If you click and drag on this page, you'll either scroll the content or move to a new page. This is because of JavaScript code that tells the browser how to react to user inputs like dragging the mouse. JavaScript is like verbs in speech; it tells the content from HTML and CSS what to do.

Laser Printer

Laser printers use electrical charges and heat to fuse tiny plastic particles (called toner) to the paper.

Satellite

Many ISP service types require physical wires to transmit data. However, there's a good chance those who live in a rural areas don't have a nearby wired network to connect to. Fortunately, they can still connect to the Internet via a satellite connection. By aligning a satellite dish to an orbital satellite hovering above the equator, you can get data from the Internet from nearly anywhere in the world. The main downside of a satellite connection is latency - because the data has to travel to space and back, it can take a few seconds longer to exchange data. While this may not seem like much, it makes a big difference for real-time applications like online gaming and video conferencing.

Link to Home Page

Many corporate websites have their company logo near the top left of each page of their website. Generally, the logo is also a hyperlink to the website's home page.

Mobile Devices

Mobile devices, such as tablets and smart phones, are very small computing devices. ~ They have several advantages. ~ They are much more mobile than any other type of computing device. ~ They include a variety of integrated devices, including cameras, microphones, and wireless networking. ~ They can be less expensive than notebooks or desktops. ~ They use a touch-screen interface. Mobile devices also have several disadvantages: ~ They are difficult to repair and nearly impossible to upgrade. ~ If the battery fails, it can be very difficult to replace. ~ Typically, they don't support the same productivity applications as notebook and desktop systems. ~ They provide much less computing power than a desktop or notebook system.

RJ-45

Most computers provide a Registered Jack 45 (RJ-45) connector that allows you to connect the system to a network.

Audio

Most computers provide audio connectors. The pink connector is the microphone jack, which is used to connect a microphone to the system. The blue connector is the line-in connector, which can be used to connect an external audio source to the computer. The green connector is the line-out connector, which is used to connect speakers to the system.

Navigation Bar

Most corporate websites have a group of links that take you to different pages of the website. This is usually called the navigation bar. A few options you'll commonly see in navigation bars are: -About: This link gives you a general overview of the company's purpose, and sometimes profiles of top company leadership. -Catalog: Especially common for retail sites, this option takes you to the list of items available to purchase. -News: This link takes you to a page where you can see recent changes and other happenings at the company. -Contact: This lets you know your options for contacting the company. Contact information often includes a phone number, email addresses, and physical addresses. -Support: Many software sites have a page dedicated to providing individualized help to customers with problems.

Form

Most database users don't write queries in query language directly. Instead, they enter information into a form, which then builds the query automatically. A good example of a form is the search bar of a search engine. When you enter your search terms and press enter, the information from the form is plugged into a query, which then retrieves your information.

Primary Key

Most records in a database require a way to distinguish them from other records. This unique identifier is called a primary key. Primary keys are usually numbers, but they can be any unique value. If you have a driver's license, the license number is a primary key. Even though other people may share your same first and last name, nobody else shares your license number.

Natural Language Processing

Natural language processing includes speech recognition and translation into different languages, such as English to Spanish. After converting speech into text, AI technology can be used to process the meaning of the text and carry on a basic conversation. Computer programs called chatbots can resolve common customer service concerns quickly and efficiently. Chatbots become more effective as they add new customer interactions to their knowledge base.

Network Architect

Network architects develop and implement an organization's communication network, including the hardware and software components needed for both physical and wireless connections. Based on the needs of an organization, they design intranets, cloud infrastructure, and information security. They work with communication hardware such as cabling, routers and network adaptors. Network architects are familiar with network protocols, data formats, and project management. In addition to several years of on-the-job experience, these positions typically require industry certifications in network design and implementation.

Notebooks

Notebook systems are more mobile than desktop systems. Notebook systems have several advantages. ~ They can run the same productivity applications as desktop systems. ~ They are much smaller and lighter. ~ They usually provide integrated mouse, keyboard, camera, microphone, and wireless networking hardware. ~ They include batteries that allow them to run without external power for a period of time. Notebook systems also have several disadvantages: ~ They are more difficult to upgrade or repair. ~ They are usually more expensive than comparable desktop systems. ~ They typically have less computing power than comparable desktops.

Foreign Key

Often, a table in a database will reference records in another table. They do this by using the primary key value of the record they want to reference. When a table uses a primary key from another table, it's called a foreign key.

Outputting Data

Once the computer is done processing data, it can present, play, or transmit the information using output devices. Common output devices include: Monitor Speakers Printer

HTTPS

One of the biggest downsides of HTTP is that it transmits data as plain text. This is a problem, because an attacker could intercept the signal during transmission and read the sensitive information it contains. To send data securely, most webpages use HTTPS, which combines HTTP with the Secure Sockets Layer (SSL) protocol. SSL encrypts data so unauthorized parties can't understand the data even if they manage to intercept it.

Pretexting

Pretexting attempts to trick the victim into revealing sensitive information under false pretenses. There are many forms of pretexting, including the following: ~ Intimidation seeks to frighten a user. The attacker assumes a false position of authority over the victim and attempts to intimidate them into providing sensitive information. ~ Familiarity uses the premise of a supposed friendship to convince the victim to provide sensitive information. ~ Social validation uses peer pressure to coerce the victim into revealing sensitive information.

Programmer

Programmers, also known as developers or software engineers, create software applications. They use various programming languages to write instructions that are translated into binary code that a computer can understand. Programmers are also responsible for testing or debugging their software. They are the problem solvers and creative minds behind software companies.

Looping

One thing computers excel at is doing the same thing over and over in exactly the same way. In programming, this is called a loop. There are two main types of loops: "for" loops and "while" loops. ~ "For" loops run a specific number of times. Using the online store example, let's say our user has added a few more items to their shopping cart and is ready to check out. When they go to the checkout page, the computer will loop through the items in the cart. "For" each item, it will display the item name to the list and add the price to the running total. The number of times the loop runs is determined by the number of items in the cart. After the last item, the loop stops. ~ "While" loops keep running as long as a certain condition is met. Consider the following example from an online card game. The game has a block of code that says "while cardsInHand < 5." When the program gets to this block, it'll check the number of cards in the player's hand. If it's less than 5, it'll remove a card from the deck and put that card into the player's hand. Then, it'll loop back to the top and check again. If the number of cards in hand is still less than five, it'll deal another card. Once the player has five cards, this condition is no longer met, so the loop stops running.

Online and Cloud Services

Online and cloud services are businesses that users access though an app or web browser and run on the Internet. These include search engines, social media, and retailers.

1994 - The World Wide Web

Personal computer ownership began to skyrocket in the mid-nineties with the advent and rise of the World Wide Web, which began in 1991. In 1994, the web became public, and the world got a lot smaller. With new technology like email and chatrooms, computers became a viable way of communicating with other people, and thus became more popular. In the early 2000s, social media sites like MySpace and Facebook were launched.

Cable

Phone lines aren't the only way ISPs can send signals. They can also send them over television cables. Cable Internet is generally provided by the same company that sends cable TV signals to your house. Since cable companies can already send multiple TV channels on the same cable, they can easily add a few extra channels for data. Just like with dial up, cable connections require a modem to convert analog cable signals into digital computer signals.

Cellular

Phones and other mobile devices use cellular connections. Using radio signals, phones connect to the nearest cellular base station, which is usually a tall tower. Unlike the other types of connections, cellular data is likely to be rate limited. Instead of paying a monthly fee for as much data as you want, cellular providers generally limit the amount of data you can download.

Big Data Ethics

Since big data is often obtained without the knowledge or consent of users, information can be sold to other organizations in a way that violates user privacy. Another potential problem is that big data analytics can uncover misleading or harmful information on innocent people. For example, we might falsely associate a person with terrorism. This same kind of analysis could also warn health insurance companies when an applicant has a higher risk for genetic disease. These examples illustrate why big data needs to be used with caution and ethical responsibility.

Software Publishers

Software Publishers are companies that create and sell software. There are thousands of these companies around the world. Software has traditionally been sold as a perpetual license installed on a user's computer. However, the subscription model has become increasingly common in recent years. This model is often called Software as a Service (SaaS) or on-demand software. Users typically pay a monthly subscription fee to access the software over the Internet. Advantages of this method include automatic software updates, lower up-front costs, and lower hardware requirements.

FireWire

Some computers provide a FireWire connector. FireWire connectors are rectangular in shape with a bevel on one end to keep you from inserting them the wrong way. FireWire allows you to connect external devices, such as digital cameras, extra hard drives, and scanners, to the computer.

Database Programmer

Some programmers specialize in a specific discipline within programming. For example, database programmers write code to design, create, implement, and maintain databases. Since databases store vital information that must be easily accessible and secure, database programmers are vital for most large companies.

Compression Artifact

Sometimes, when a video is compressed to a very small size, patches of pixels appear that have less visible detail than the rest of the image. These are called compression artifacts. They often appear in educational videos (such as the ones in this course) because file size is prioritized over video sharpness, which allows the videos to stream well on suboptimal hardware.

Sample

Sound is caused by vibrating objects, which create pressure waves in the air. Digital sound recordings capture this continuous wave and divide it into discrete segments. Then, it assigns a value to each segment. A single segment's value is called its sample height.

Anti-Spam Software

Spam is unwanted, unsolicited email that is sent to your email account. Some spam is merely annoying and doesn't present a security risk to your computer. However, spam often carries viruses, advertisements for questionable products, and phishing attacks. Some anti-malware software can also block spam for you, but others cannot. If your package does not, you should consider installing additional anti-spam software or switching to an anti-malware package that is capable of blocking spam.

Speakers

Speakers play audio output from the computer. Headphones are actually small speakers.

TCP/IP

TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is the suite of protocols or rules that facilitate Internet communication.

Table

Tables are used to store the information in a relational database. Each table is comprised of fields (columns) and rows (records). There is no limit to the number of fields and records a table can contain, as long as there's enough storage space on the hard drive.

Telecoms

Telecoms (telecommunications) companies specialize in transmitting electronic information from one place to another. For example, this course was transmitted to you over the Internet by way of an Internet Service Provider, or ISP.

CPU Speed: 2.4 Ghz or higher

The CPU speed is the speed at which the CPU executes instructions. Every computer contains an internal clock that regulates the rate at which instructions are executed. A faster processor will generally improve the performance of software on your computer.

Customize and Control

The Customize and Control menu options provide access to your bookmarks, history, downloads, browser settings, and other features. The option to clear your browsing data is found under the More tools submenu. To add a customized home button next to the address bar, choose Settings. In the Appearance section, enable the Show home button option and enter a custom web address.

DVI Video

The Digital Visual Interface (DVI) connector is designed to connect newer digital monitors to a computer.

DNS

The Domain Name System (DNS) matches unique IP addresses with easy-to-read URLs. When you navigate to a website, your computer asks a DNS server which IP address corresponds to the URL you want to visit. DNS returns the correct IP address, which is then connected using the IP protocol.

HDMI

The High-Definition Multimedia Interface (HDMI) connector is used to connect a computer to an HDMI monitor or TV.

HTTP and FTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer content on the web. Some web pages use the HTTPS protocol, which adds an additional layer of encryption to make data transfers more secure. The File Transfer Protocol (FTP) can also be used to transfer data between computers on a network.

HTTP

The Hypertext Transfer Protocol (HTTP) is used to identify resources and transfer hypertext pages on the World Wide Web.

IP

The Internet Protocol (IP) is used to route information over the Internet. When you send a file over the Internet, IP divides it into small pieces, and adds a header to each one. The header contains the source address and the destination address. The piece of data combined with the header is called a packet.

Internet of Things

The Internet of Things refers to the network of physical devices that are connected to the Internet and capable of communicating and sharing data through sensors, network connectivity, barcodes, QR codes, and other technologies. The Internet of Things is made up of devices such as refrigerators, thermostats, street lights, and environmental tracking systems.

TCP

The Transmission Control Protocol (TCP) adds a header to each IP packet. The TCP header helps the receiving computer to assemble the packets into the right configuration once the entire file is downloaded. The headers also allow the sending and receiving computers to verify with each other that each packet was received correctly.

USB Type C

The USB Type C specification was introduced in 2014. It is simpler than the previous types. Both ends of a Type-C connector are the same and the cord allows bi-directional power flow, so a host device can charge a peripheral, and a peripheral device can charge a host. Best of all, you don't need a specialized connector for each pair of devices; all ports are Type-C and one connector will work for all ports, even Thunderbolt ports in newer devices.

UDP

The User Datagram Protocol (UDP) is generally used when speed in transmission is more important than accuracy, such as streaming audio or video. Like TCP, UDP adds a header to each packet. However, unlike TCP, the sending computer doesn't verify that the packets were correctly received. This makes transmissions happen twice as fast, but leaves room for transmission errors.

VGA Video

The Video Graphics Array (VGA) connector is used to connect older monitors to a computer. You can identify this connector by its blue color and three rows of pins.

Monitor

The computer monitor is a device that is used to display visual output from the computer tower. It requires a separate power source and is connected to the tower by a cable.

Design Phase

The design phase takes the system requirements document from the analysis phase and produces detailed specifications that cover all aspects of the system. These specifications account for security risks and include computer system requirements, network configuration, cloud hosting services, database design, and application software solutions. In some cases, the design phase might include a series of prototypes that can be tested by potential users of the new system.

Robotics

The field of robotics includes self-driving cars and autonomous drones that have the potential to be safer and more efficient than their human-operated counterparts. Artificial intelligence enters the picture when cars, drones, and other robots are programmed to learn from their mistakes without direct human intervention.

Sign Up/Login

The first time you use a new website, you'll often need to create an account with them to access certain features. This usually involves clicking a Sign Up button, then filling in a form with your personal information. If you already have an account, you can click Login to enter your username and password to gain access to your account.

System Development Life Cycle

The methodology used by systems analysts is called the System Development Life Cycle, or SDLC. Since software applications are typically central to an organization's system, SDLC can also stand for Software Development Life Cycle. Traditionally, the SDLC is divided into a series of phases, from preliminary analysis and design to implementation and maintenance.

Assembly Language

The most basic human-readable computer language is called assembly language. Unlike the other languages, assembly language is closely related to the binary machine language. For example, 1010010101000000000 is a machine language command that tells the processor to store the number 42 to a temporary register. The same command written in assembly language is add ax, 42. Even though assembly language is much easier to understand than machine language, it's cumbersome to write and use, and you'll usually only hear about it in discussions of computer history.

Mouse

The mouse moves the onscreen cursor and lets you interact with elements displayed on the monitor screen. The mouse communicates with the computer tower either through wireless signals or through a USB cable.

Network Cabling

The network cabling connects the computer to the wired network. One end of the cable connects to the RJ-45 port on the computer. The other end connects to the RJ-45 port in the wall jack.

Operating System: 64-bit Windows OS or Intel-based Mac OS

The operating system is the most important software program that runs on a computer. It controls computer processing, provides a platform for software applications such as Microsoft Word, and manages communication between computer peripherals and other hardware. Some of the more advanced features of software programs may require later versions of an operating system.

Vector Images

The other kind of digital image are vector graphics. If you've ever seen a 3D computer-animated movie or video game, then you've seen vector graphics at work. Fonts are also vectors. Instead of storing each individual pixel, the computer stores points and curves. For example, to create a circle, a vector image may store four points, then tell the computer to connect the points with quarter arcs and fill the shape with a color. One of the main advantages of vector images is that they're scalable. That means you can increase and decrease the size of the image without losing any image quality. Vectors are often used to create logos, because the same file can be shrunk to fit on a business card and stretched to fit on a billboard. Another advantage is that vector files generally take up less storage space than raster files. That said, vector images also have some disadvantages. For one, they're difficult to create. Anyone with a camera can take raster photographs, but vectors require special software and training. Also, vector graphics usually lack the fine detail of raster images, which is why they're usually used for images with only a few colors.

Planning Phase

The planning phase involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project. In this phase, the organization decides who will supervise the project and who will be part of the design and development team. The final planning document details the goals of the information system in responding to new business opportunities and making operations more efficient.

Bits

The smallest unit of digital information. Each individual one and zero in a binary sequence is a bit.

Computer Tower

The tower includes the physical components of the system that store and process data, including the power supply, processor and memory chips, and internal storage devices such as the hard drive. Input and output devices are connected to the computer tower through cables and connectors.

Wall Jack

The wall jack has an RJ-45 port that provides a connection to the wired network. It appears similar to a telephone wall jack but is larger in size.

Data Destruction

There are security issues to be aware of when you get rid of old computers and storage devices. You need to dispose of devices in a manner that prevents sensitive data from being exposed. For example, if you are selling a computer, you need to remove all data from the hard disk drive. However, just deleting the files is insufficient. The data actually remains on the drive and can be easily reconstructed by someone with the right tools. To prevent this, consider the following options: ~ If you are selling or recycling a computer, use disk wiping software to overwrite the hard drive with random data, obliterating any old data still on the drive. ~ If you are disposing of a computer, consider physically destroying the hard disk to make the data it contains inaccessible.

New Tab

This button allows you to open a new tab.

Bookmark this Page

This button will bookmark webpages for quicker access.

Minimize

This button will hide the browser window but keep it running and available on the taskbar at the bottom of the screen.

Close Tab

This closes only the specific tab instead of the whole web browser.

Address Bar

This is where you can type the address for the website you want to visit. Another name for a web address is the URL, or Uniform Resource Locator. You can also perform an Internet search by entering terms directly into the address bar. If you enter words without an extension like .com or .org, the web browser assumes you're entering search terms rather than a URL.

2007 - Smart Phones

Through the mid 2000s, Internet access was mostly limited to computers and laptops. Then, in 2007, Apple unveiled the iPhone, the world's first smartphone. Now, people could access the Internet anywhere. Smartphones are now extremely common in the developed world, almost completely replacing other kinds of personal telephones.

1959 - Invention of the Microchip

Throughout the 1950s, computers were large and expensive. Most computers were owned by governments, universities, and businesses - they had no place in the typical home. Then, in 1959, researchers at Texas Instruments developed an integrated circuit, or microchip. This new technology allowed an entire computer to be built into a single board, rather than needing large modules for each part of the computer. Microchips paved the way for personal computer ownership.

Access a Shared Folder

To access a shared folder on the network, do the following: Open File Explorer. Click Network. Double-click the network server where the shared folder resides. Double-click the shared folder.

Iterative Design

Today, most information systems are developed using an iterative process that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design. For example, rather than redesigning the entire system at once, an organization might start by implementing a single enterprise application, such as new sales and marketing software. This process continues until the entire system is in place. The Agile method is one of the most popular iterative models, especially in the software development industry.

USB Type B

Type B connectors have a square shape with a bevel on one edge to keep them from being plugged in the wrong way. They are designed for devices that are usually left plugged in for long periods of time, such as: Printers Scanners USB hubs Cables with a USB Type B connector typically use a Type A connector on the other end of the cable to connect to the computer.

USB Type A

Universal Serial Bus (USB) Type A connectors are rectangular in shape. Commonly, one end is plugged directly into the computer and the other is plugged into a peripheral device. They are designed for devices that may be plugged in and unplugged frequently, such as: Keyboards Mice Cameras Flash drives External hard drives

Utility Hardware

Utility software analyzes, configures, and optimizes the computer. Unlike application software, which benefits the end user directly, utility software is used to support and maintain the computer system itself. Some common types of utility software include: ~ Backup software, which creates backup copies of data and restores them if the original data is lost or corrupted ~ Compression software, which compresses and decompresses files, making storage more efficient ~ Disk cleaners, which delete temporary or unnecessary information from disk drives ~ Antivirus software, which prevents viruses and other malware from harming the computer system

Frame Rate

Videos are made of a sequence of still images shown in rapid succession. Each individual image is called a frame. Frame rate is a measure of how many frames are shown each second. Most digital videos have a frame rate of about 30 frames per second.

VoIP

Voice over IP (VoIP) sends voice phone calls using the TCP/IP protocol over digital data lines. With VoIP, phone calls are made through a network connection rather than through a standard phone line. When you make the phone call, it is converted into digital data and sent through the network or over the Internet.

Web Developer

Web developers create websites and other technologies that are delivered through the Internet. For example, the course you're using right now was created by a highly-qualified team of skilled web developers. There are three main types of web developer. Front-end developers use HTML, CSS, and JavaScript to create websites. Everything you see when you visit a website was made by a front-end developer. Back-end developers do the behind-the-scenes coding that you don't see directly. Databases, user accounts, and security are all part of the back end. Full-stack developers do both front-end and back-end work.

Support Services

Wherever there are computers there will be computer problems. That's why part of the ICT industry is dedicated to providing support services. Many companies, including TestOut, offer customer support as part of their product. Other companies specialize entirely in helping individuals and businesses solve computer problems.

The Internet

While often used synonymously with the Web, the term Internet typically refers to the vast collection of networking hardware and physical computing devices that make up the Internet.

Wi-Fi

Wi-Fi uses radio signals to connect a cell phone to a smaller network, which in turn can be connected to an ISP. By using Wi-Fi, you can download data to your phone over a wired Internet connection like DSL or fiber. Since you don't run into the data limits imposed by cellular data plans, many cell phone owners prefer to use Wi-Fi whenever they can. In addition to cell phones, Wi-Fi can be used by laptops and other devices with wireless capabilities.

WiFi

WiFi is a technology that provides wireless Internet connectivity through wireless routers. A WiFi network uses radio waves to transmit data within a particular area referred to as a hotspot.

1944 - Harvard Mark 1 Completed

Working together, engineers from Harvard University and IBM created the Harvard Mark 1, which at the time was the most powerful computing machine ever built. It was fifty feet long, weighed five tons, and was built from about 750,000 individual mechanical parts. The Mark 1 was used by the Allies during World War II, and assisted in creating simulations for the Manhattan Project. It could perform three additions or subtractions every second, and one multiplication every six seconds.

Close Window

You can close the web browser by clicking on this X in the upper right corner.

Maximize/Restore Down

You can expand the window to full screen or restore it down to the previous size.

Map a Drive to a Shared Folder

You can map a drive letter to a shared folder to enable faster access. Browse to the shared folder on the network server in File Explorer. Right-click the share and then select Map Network Drive. Select a drive letter to be assigned to the shared folder. The network path to the share should automatically be entered for you. Click Finish.

Share a Folder

You can share existing folders or create new folders to share. To share a folder, complete the following steps: 1. In File Explorer, identify the folder to be shared. 2. Right-click the folder, then click Share with > Specific people. 3. In the drop-down list, select the user you want to share the folder with and then click Add. 4. In the Permission Level column, specify what the user should be able to do with files within the shared folder. ~Read allows the user to open and view files, but not save any changes. ~Read/Write allows the user to open files, view their contents, make changes, and save those changes. 5. Click Share. The network path to the share is displayed. This is the information you must provide to other users who want to connect to the shared folder. The network path consists of the following: ~Two backslashes (\\) ~The name of the computer ~A backslash (\) ~The name of the share 6. Click Done.

Benefits of Cloud Computing

~ Backup-The cloud provides reliable backup solutions that mean you won't lose your data when a local storage device fails. ~ Accessibility-The cloud gives you access to your data on any device and from any location. All you need is the right application and an Internet connection. ~ Collaboration-Cloud-based applications give you the ability to share documents and collaborate with other people in creating and editing them. ~ Resource Pooling-Many businesses want to expand their computing resources without having to purchase and maintain additional in-house hardware. For these companies, low-cost cloud hosting solutions are a great option.

Drawbacks of Cloud Computing

~ Privacy and Security Concerns-Data files stored on the cloud are susceptible to hackers, who gain access to cloud storage devices or tap into data as it travels over the Internet between your local device and the cloud. Nearly all cloud service providers use encryption for this reason. ~ Internet Connection Issues-While storing your data on the cloud is a huge benefit when you need access from multiple devices, it's a big problem when your Internet connection goes down. Without a local copy of files, your productivity may be completely dependent on the quality of your Internet connection. ~ Cloud Hosting Outages-Even if your Internet is up and running, you may be unable to access your files when the cloud service is down. Google, Amazon, Microsoft, and other cloud hosting businesses work hard to avoid any downtime, but there will always be short periods of hardware or software failure. For this reason, you should keep an offline copy of any critically important files or applications.


संबंधित स्टडी सेट्स

The Court of Justice of the European Union

View Set

Chapter 19 Study Guide- Anatomy 2

View Set

Penny Review: Chap 17 Uterus & Vagina

View Set