Intro to the Internet: Test 1 (Modules 1-5)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Wi-Fi

(short for wireless fidelity) is wireless networking technology that uses access points to wirelessly connect users to networks within a range of 250-1000 feet (75-300 meters).

Mega

1,000,000

Giga

1,000,000,000

Tera

1,000,000,000,000

Peta

1,000,000,000,000,000

Exa

1,000,000,000,000,000,000

Kilo

1000

Each cell tower has a transmission and receiving range of 3 to ____ miles depending on geography and environment.

15

The hexadecimal number system, or base ____, is used in digital graphics as a shorthand for RGB color representation.

16

The current ____ IP address system can support about 4.3 billion addresses.

32-bit

There are over __ billion Internet users today, roughly ___ percent of the total global population.

3; 43

Global mobile data traffic has been growing by roughly ____ percent annually, reaching in excess of ___ exabytes per month in 2014.

80; 2

Network Interface Card (NIC) - Network Connection Device

A circuit board or PC card that, when installed, provides a port for the device to connect to a wired network with traditional network cables

Wireless Adapter - Network Connection Device

A circuit board, PC card, or an external device that connects through an antenna-equipped USB port that is able to send and receive network radio signals

Network Adapter - Network Connection Device

A computer circuit board, PC card, or USB device installed in a computer so that the computer can be connected to a network

Switch

A fundamental part of most networks; a switch makes it possible for several users to send information over a network at the same time. Switches direct signals to the intended recipient only.

Gateway

A network point that acts as an entrance to another network.

Hub

A small electronic box used as a central point for connecting a series of computers; sends the signal from each computer to all the other computers on the network. Hubs have largely been replaced by switches in today's networks.

Broadband Over Power Line Connection (BPL)

BPL utilizes existing power lines to carry Internet signals. To connect to BPL, users only have to plug a BPL modem into an electrical outlet. BPL currently has limited availability in the U.S. but is gaining traction in other countries. BPL is viewed as a good technology for delivering Internet to remote areas that may not have phone lines or cable TV but do have electricity. BPL access speeds will likely rival cable and DSL at comparable cost.

In the formula 2b = i, b is the number of ____ and i represents the units of information represented.

Bits

Cable Modem Connection - $50/month, 6 Mbps $60/month, 50 Mbps $115/month, 105 Mbps

Cable modem is an always-on connection that uses a cable TV connection to provide high-speed Internet service. A cable TV receiver receives the frequencies reserved for television, and a cable modem receives the frequencies used for Internet. Another box can be added to include phone service. The cable modem connects to a computer either using an Ethernet cable or through a wireless router. Internet over cable is typically packaged with TV and sometimes phone service. The prices quoted here are for Internet only. Cable companies may offer significant deals for the first 12 months of service.

Cellular Data Connection - $20/month, 300MB per month $30/month, 3GB (4G) $50/month, 5GB

Cellular data plans charge by the amount of data you download each month rather than the speed of the connection. A 3G data connection provides speeds under 1 megabit per second (Mbps) while 4G provides speeds of up to 12 Mbps. 4G is growing in its availability and is offered in most mid- to large-sized cities. Subscribers use cellular data connections to access the Internet on their mobile phone or through a computer using a mobile hotspot. Rates shown here are for data only. Data rates are typically packaged together with phone and texting and can vary widely as mobile carriers compete in this highly lucrative market.

Cellular Devices - Network Connection Devices

Cellular network carriers provide several options for connecting computers to the Internet. Cellular connect cards are USB devices that connect a notebook to the Internet through a cellular data plan. Some carriers allow users to "tether" or wirelessly connect computers to mobile phones to access the Internet. Mi-Fi routers are palm-size devices that wirelessly connect computers to the Internet through a mobile phone's data service using Wi-Fi technology.

A web browser such as Internet Explorer is a _____ that requests a webpage from a web server, such as www.monster.com.

Client

Communication

Computers enhance human interaction through voice, text, and video communications, providing anywhere, anytime contact.

Repeater

Connects multiple network segments; listens to each segment and repeats the signal heard on one segment onto every other segment connected to the repeater. Repeaters are helpful in situations where a weak signal requires a boost to continue on the medium.

Bridge

Connects two or more network segments, as a repeater does; a bridge also helps to regulate network traffic.

Digital Subscriber Line Connection (DSL) - $40/month, 3 Mbps $65/month, 24 Mbps

DSL is an always-on connection that uses the customer's phone line, but there is no dialing up and users can use the Internet and talk on the phone simultaneously. This service is similar to cable modem, except that the telephone line is split to carry signals to both a DSL modem and the telephone. As with a cable modem, a DSL modem is connected to a computer through an Ethernet cable or wireless router.

Digital Satellite Service Connection - (DSS) $40/month, 10 Mbps $100/month, 15 Mbps

DSS is a wireless high-speed Internet service that utilizes a satellite and satellite dish, provided by companies such as HughesNet. It is faster than dial-up service but typically slower than cable modem or DSL. For this reason, it is used primarily in areas where DSL and cable are unavailable. Satellite is the only service with substantial setup and equipment costs. Although DSS offers an always-on connection, it requires a clear line of sight to a satellite in the sky and may suffer signal loss during stormy weather.

Voice over IP refers to technologies that support voice communications using the Internet Protocol over ____ networks.

Data

Packet-Switched Network

Data that travels over the Internet is broken into small data packets to traverse the Internet more efficiently. Each packet includes a header with information about where the packet is going and where it originated, along with other information necessary to transport the packet to its destination and recreate the original document. Data packets travel over the Internet from router to router until reaching their destinations. Each router examines incoming data packet headers to see where the packet is destined and then uses a routing table to determine the best path for the data packet to take to get closer to its destination.

Firewall

Device or software that filters the information coming onto a network; it protects the network computers from hackers, viruses, and other unwanted network traffic. Many routers include firewall capabilities.

Dial-up Connection - $10/month, 56 Kbps

Dial-up is the original method people used to connect to the Internet from home and is gradually being phased out in most areas. Dial-up is a low-speed Internet service that utilizes the customer's existing phone line for Internet access. Customers are typically provided with a local or toll-free phone number along with a username and password. The computer's modem dials the number, establishes a connection to the ISP, and logs on. Dial-up connections tie up the phone line and cannot be used simultaneously with voice communications.

The ______ divide refers to the social and economic gap between those who have access to computers and the Internet and those who do not.

Digital

2nd Generation Cell Phone

Digital cell phone service.

True or False: A gateway is a network control device that determines the best path for passing a data packet between networks to its destination.

False

True or False: Aristotle believed that a truly wise person will know what is right, do what is good, and therefore be happy.

False

True or False: Bytes are typically represented with a lowercase b and bits with an uppercase B.

False

True or False: Computers that are ENERGY STAR certified save 75-85 percent on energy consumption on average.

False

True or False: DSS is faster than dial-up service and DSL.

False

True or False: For telecommunications to function as intended, both the sending device and the receiving device can speak different languages.

False

True or False: Most users choose a prepaid system rather than signing a two-year contract.

False

True or False: The Children's Online Privacy Protection Act of 2000 prohibits businesses from collecting personal data online from children under the age of 18.

False

True or False: The expression "computer fluency" understates the level of computer skills that hiring businesses expect of today's college graduates.

False

True or False: The most popular add-on service is text ringtones.

False

______ is the most popular international standard for mobile phones, and is used by over a billion people across more than 200 countries.

GSM

The predominant digital networking standards for cell phone networks are __________________.

GSM and CDMA.

Continue to work to improve search engines.

Google, Microsoft, Apple, and Yahoo!

____ computer ethics refers to a government's responsibility to create laws to protect citizens from unethical computer use, and provide citizens with equal access to computers and information technologies as well as their benefits.

Governmental

The World Wide Web, introduced in the early 1990s, provided a(n) ________ interface to the Internet that launched the digital information revolution.

Graphical User

4th Generation Cell Phone

High-speed Internet service over cellular networks.

3rd Generation Cell Phone

Internet services over cellular networks.

Ethics is a branch of philosophy that deals with issues of ____—consideration of what human actions and reactions are morally right and wrong.

Morality

The World Wide Web Consortium (W3C) has developed Web Content Accessibility Guidelines for businesses and organizations to use in making their web content accessible to users with disabilities, such as those who are unable to ____.

Move, Hear or See

_____ switching and the use of routers allow the Internet to operate efficiently and effectively.

Packet

The cellular service option that sends images and videos from phone to phone or from phone to email is ________.

Picture and Video Messaging

A cellular ____ defines the terms of service provided by a cellular carrier to which a cellular user subscribes.

Plan

Governments shoulder the computer-related ethical responsibilities of entire countries and cultures. These responsibilities generally fall into two categories: ____ and empowerment.

Protection

Cable Modem - Network Connection Device

Provides Internet access to PCs and computer networks over a cable television network

Dial-Up Modem - Network Connection Device

Provides narrowband Internet connections over phone lines

Tiny storage modules called mini or micro ____ cards can add several gigabytes of storage to your mobile phone.

SD

To digitize sound, a process called _____ is used to measure the amplitude of a sound wave thousands of times per second.

Sampling

Microwave signals are used for high-speed, high-capacity communication links and ____ communications.

Satellite

Signal frequency is measured in hertz (Hz), or cycles per ____.

Second

DSL Modem - Network Connection Device

Similar to a cable modem but provides high-speed Internet service over telephone lines

A ____ is an agreed-upon way of doing something within an industry.

Standard

__________________ was introduced in the early 1990s.

The World Wide Web

1st Generation Cell Phone

The original analog cell phone network.

Preamble

The short version of the code summarizes aspirations at a high level of the abstraction; the clauses that are included in the full version give examples and details of how these aspirations change the way we act as software engineering professionals. Without the aspirations, the details can become legalistic and tedious; without the details, the aspirations can become high sounding but empty; together, the aspirations and the details form a cohesive code. Software engineers shall commit themselves to making the analysis, specification, design, development, testing and maintenance of software a beneficial and respected profession. In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles: 1. PUBLIC - Software engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - Software engineers shall act in a manner that is in the best interests of their client and employer consistent with the public interest. 3. PRODUCT - Software engineers shall ensure that their products and related modifications meet the highest professional standards possible. 4. JUDGMENT - Software engineers shall maintain integrity and independence in their professional judgment. 5. MANAGEMENT - Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance. 6. PROFESSION - Software engineers shall advance the integrity and reputation of the profession consistent with the public interest. 7. COLLEAGUES - Software engineers shall be fair to and supportive of their colleagues. 8. SELF - Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

True or False: A cellular network is a radio network.

True

True or False: A radio wave is an electromagnetic wave transmitted through an antenna.

True

True or False: Depending on the service and service provider, an Internet connection might be blazing fast or snail slow, filtered or unfiltered, limited or unlimited.

True

True or False: Digital literacy has become a valuable asset for leading a productive, fulfilling life.

True

True or False: Hacker activists, or hacktivists, hack computer networks for a perceived righteous cause.

True

True or False: Participants running software that utilizes the P2P model allow their computers to act as servers.

True

True or False: Personal ethics regarding computer use typically combines legal considerations, what is best for the public good, and what is best for the person in terms of mental, physical, and spiritual well-being.

True

True or False: Pharming replaces the IP addresses in a DNS with the IP addresses of fraudulent websites designed to spread malware.

True

True or False: Routers, switches, firewalls, modems, and other network control devices include software interfaces that allow you to change device settings.

True

True or False: The cables, switching stations, communication towers, and satellites that make up these networks are the hardware over which Internet traffic flows.

True

True or False: The power of computing can improve every aspect of life, both professionally and personally.

True

True or False: The predominant digital networking standards for cell phone networks are GSM and CDMA.

True

Wireless Action Point

Typically a Wi-Fi device, connected to a wired or cellular network to send and receive data to wireless adapters installed in computers and other devices; it allows devices to connect to a network wirelessly.

Today, the encoding scheme named ____ has arisen to take over for ASCII for many applications.

Unicode

The most popular U.S. carriers are __________.

Verizon, T-Mobile, AT&T, and Sprint.

Ethics

a branch of philosophy that deals with issues of morality, that is, consideration of which human actions and reactions are morally right and wrong.

Digital Camera

a camera that captures photographs, and sometimes video, and stores them digitally rather than on film.

Data Center

a climate-controlled building or set of buildings that houses servers that store and deliver mission-critical information and services.

Computer Network

a collection of computing devices connected together to share resources such as files, software, processors, storage, printers, and Internet connections.

Database

a collection of data organized to meet users' needs.

Cellular Carrier

a company that builds and maintains a cellular network and provides cell phone service to the public.

Internet Service Provider (ISP)

a company that provides individuals and organizations with access to the Internet.

Ubiquitous computing (ubicomp)

a concept in software engineering and computer science where computing is made to appear everywhere and anywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, networks, mobile protocols, location and positioning and new materials. This paradigm is also described as pervasive computing,[1] ambient intelligence,[2] ambient media[3] or 'everyware'.[4] When primarily concerning the objects involved, it is also known as ... the Internet of Things.

Computer

a digital electronics device that combines hardware and software to accept the input of data and then process and store the data to produce some useful output.

Byte

a group of 8 bits; the standard grouping for representing and storing most data; can represent up to 256 units of information (2^=256); provides more than enough storage for every character on a computer keyboard; represent the values 0 to 255; represented by a B

Central Processing Unit (CPU)

a group of circuits that perform the processing in a computer, typically in one integrated circuit called a microprocessor.

Central Processing Unit (CPU)/ Processors

a group of circuits that perform the processing in a computer, typically in one integrated circuit called a microprocessor.

Home Network

a local area network designed for personal or business use in the home.

Client/ Server

a network architecture in which one computer or program (the client) makes a service request from another computer or program (the server), which provides the service.

Peer-to-peer (P2P)

a network architecture that does not utilize a central server but facilitates communication directly between clients, with computers acting as both client and server.

Router

a network device that manages network traffic by evaluating messages and routing them over the fastest path to their destination; located where one network is joined to another network.

Server

a powerful computer that often utilizes many processors to provide services to many users simultaneously over a network.

Cellular Network

a radio network in which a geographic area is divided into cells with a transceiver antenna (tower) and station at the center of each cell, to support wireless mobile communications.

Operating System

a set of computer programs that runs or controls the computer hardware, and acts as a user interface.

Search Engine

a valuable software tool that enables users to find information on the web by specifying words that are key to their topics of interest—keywords.

Unicode

able to handle all types of international character sets yet is backward compatible with ASCII.

Digital Technology and Digital Electronics

allow us to manipulate all types of information as digits (1s and 0s) in order to store and manage the information more efficiently and effectively.

User Interface (UI)

allows one or more people to have access to and command of a computer system or computer software.

Antivirus Software

also known as virus scan software, uses several techniques to find viruses, worms, and spyware on a computer system; remove them if possible; and keep additional viruses, worms, and spyware from infecting the system.

Hacker

an individual who subverts computer security without authorization.

Coaxial Cable

an inner conductor wire surrounded by insulation, a conductive shield, and a cover used for cable TV and other applications. Supports faster data speeds but is more expensive than twisted pair.

Printer

an output device dedicated to providing computer output printed on paper.

Personal Computer (PC)

any general-purpose computer designed to meet the many computing needs of one individual.

Input

anything that a computer can collect, such as keyboard characters, mouse or touch pad movements, menu selections on a cell phone made with keyboard arrows or voice commands, music streamed from an Internet server to a smartphone, or a heartbeat monitored by medical sensors.

Telecommunications Signals

are analog or digital electronic transmissions for the purpose of communication.

Business Systems

are computer-based information systems that provide organizations with valuable information in a timely and effective manner to allow the functional areas of the enterprise to work together to achieve goals.

Special-Purpose Computers

are computers designed to meet a specific need and are more prevalent, yet less noticeable, than general-purpose computers; game devices, digital music players, digital cameras, GPS navigators, digital thermostats and other smart appliances, and a host of industry-specific devices, such as pacemakers, airport security scanners, and bank ATMs, are all special-purpose computers.

Web Technologies

are the hardware, software, and protocols that allow the web to exist.

Information/Knowledge Economy/ Knowledge Management (KM) System

assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and, sometimes, its partners and customers.

Decimal Number System

base 10; digits 0-9; each column is a base 10 number; from right to left there are the ones column, the tens column, the hundreds column, etc. Another way to represent decimal (base 10) numbers is the (ones) column, then the (tens) column, then the (hundreds) column, etc.

Hexadecimal Number System

base 16, is used in digital graphics as a shorthand for RGB color representation. Also known as Hex, this number system includes 16 digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F.

Octal Number System

base 8, is another number system used by computer scientists as a shorthand method of communicating values stored in bytes.

Data

bytes stored in a computer that may represent numbers, characters, sounds, or colors.

Computer Fluency

captures the essence of business expectations unlike computer literacy, but they mean the same thing.

Primary Uses of Computers

computation, automation, communication, entertainment and managing information.

Automation

computers automate otherwise human actions and tasks, such as identifying explosive materials and safely disposing of them as well as recording your favorite television program while you are away.

Managing Information

computers manage information, using databases that can filter and query billions of records to deliver the needed information.

Entertainment

computers provide entertainment through digital music and media players, interactive games, motion picture special effects, and many other forms of entertainment.

Computation

computers' computational power—their ability to calculate and analyze—is solving many of life's biggest mysteries, such as balancing your budget as well as unraveling the mysteries of protein folding to find cures for numerous diseases.

Intellectual Property Rights

concern the legal ownership and use of intellectual property, such as software, music, movies, data, and information.

Fiber-Optic Cable

consists of thousands of extremely thin strands of glass or plastic bound together in a sheathing (a jacket); transmits signals with light beams. Much faster than coaxial and twisted pair, but also much more expensive. Used for backbones of telecom networks and in some wide area and local area networks.

Internetwork

created by joining networks together into larger networks so that users on different networks can communicate.

The Energy Star Program

created in 1992 by the U.S. Environmental Protection Agency (EPA) to inspire energy conservation in electronics products. Computers that are Energy Star certified save 20 to 30 percent on energy consumption on average. The ENERGY STAR 5 requirements for computers went into effect in 2009 and have the strictest energy requirements to date.

Information

data organized in such a way that provides value to the user, such as music, images, the result of calculations, or useful information from a database query.

Cellular Plan

defines the terms of service provided by a cellular carrier to which a cellular user subscribes.

Cloud Computing

delivers a variety of computing resources from the Internet as a service for free or for a fee, to relieve users from the burden of installing, maintaining, and securing those resources themselves.

General-Purpose Computers

designed to carry out a wide variety of activities, depending on the software being used; include personal computers (PCs), mobile computers, servers, and supercomputers.

U.S. Department of Education

developed Requirements for Accessible Software Design to ensure that all software used in schools is accessible to all students, faculty, and staff.

World Wide Web Consortium (W3C)

developed Web Content Accessibility Guidelines for businesses and organizations to use in making their web content accessible to users with disabilities, such as those who are unable to see, hear, or move.

Hacker Activists/ Hacktivists

hack computer networks for a perceived righteous cause; choose their targets based on some injustice that has occurred or in order to retaliate against agencies that threaten hacktivists.

Today, nearly one ____ of the world's population has Internet access.

half.

Telecommunications Media

include anything that carries a signal and creates an interface between a sending device and a receiving device.

Cellular Service

include specific features of a cell phone plan beyond voice communications, such as text messaging, high-speed Internet, and streamed media.

Cellular Services

include specific features of a cell phone plan beyond voice communications, such as text messaging, high-speed Internet, and streamed media.

Telecommunications Devices

include the wide variety of computer hardware designed to support telecommunications activities for individuals and businesses.

Lifelogging

individuals wear video cameras to capture all their daily activities.

Professional Computer Ethics

involves the ethical issues faced by professionals in their use of computer systems as part of their jobs.

Telecommunications Software

is software based on telecommunications protocols used to control, monitor, and troubleshoot data traveling over a telecommunications network.

Surveillance

is the close monitoring of behavior through electronic technologies such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID.

Global System for Mobile Communications (GSM)

is the most popular international standard for mobile phones, used by over a billion people across more than 200 countries. AT&T, T-Mobile, and most international carriers use GSM.

Network Service Providers (NSP)

large telecom companies; Verizon, Sprint, British Telecom, and AT&T.

Domain Name System (DNS)

maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook, supplying information to Internet nodes and routers working to get data packets to their destination.

Processing

manipulating bits to carry out the instructions provided by software, using specially designed circuitry and a well-defined routine to transform data into useful outputs.

Conflict Materials

natural resources that are extracted in conflict zones and sold to perpetuate the fighting.

Code Division Multiple Access (CDMA)

networking standard is used in the United States, where it is in equal competition with GSM. Sprint and other smaller U.S. carriers use CDMA. Verizon is moving from CDMA to GSM with its adoption of 4G LTE technology. LTE is the evolution of GSM to a faster wireless network standard. Carriers around the world are embracing LTE as the 4G standard of choice.

Distracted Driving

occurs when drivers focus on their cell phones or other distractions rather than on the road.

Napster

original music-sharing website

Twisted Pair Cable

pairs of twisted wires covered with an insulating layer, used for telephone and computer networks. Available in varying categories ("cats") to support a wide range of bandwidths.

Radio Spectrum

part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 KHz to 300 GHz and their assigned uses.

Lifecasting

people broadcast the details of their daily lives.

Digitizing Images

process of breaking down an analog phenomenon—by continuously varying shades of color and light—into fundamental components called pixels, and describing those components using values that represent intensities of red, green, and blue (or RGB color).

Quantified Self

process of collecting such detailed information about your body.

A Primary Purpose of Computers

processing data.

Children's Online Privacy Protection Act of 2000

prohibits businesses from collecting personal data online from children under the age of 13.

Display

provides visual computer output for observation on a monitor or screen.

U. S. Privacy-Protective Laws

refer to legislation designed to protect the private information of U.S. citizens.

Computer Addictions

refer to the compulsive use of digital technologies such as the Internet, video games, online gambling, and pornography.

Computer Literacy

refers to a functional understanding of the fundamentals of computers and their uses.

Governmental Computer Ethics

refers to a government's responsibility to create laws to protect citizens from unethical computer use and provide citizens with equal access to computers and information technologies as well as their benefits; responsibilities generally fall into two categories: protection and empowerment.

RGB Color

refers to a method of specifying color digitally, using values for the intensity levels of red, green, and blue (RGB) as combined to create all colors; employs 24 bits to represent over 16 million colors.

Network Neutrality

refers to a principle applied to high-speed Internet services, whereby all data is delivered to all users with equal priority; a free and open Internet where all Internet traffic is treated equally by Internet service providers; service providers like Comcast and AT&T believe that they have the right to charge.

Digital Literacy

refers to an understanding of how computers represent different types of data with digits and how the usefulness of that representation assists people in leading productive lives; a fundamental difference between the economies of successful, developed countries and those of struggling countries; is closely aligned with financial opportunity and independence.

Privacy

refers to being free from intrusion; it is the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself.

E-Waste

refers to discarded digital electronics devices and components. The Environmental Protection Agency estimates that 400,000 tons of e-waste is sent to recycling centers each year. Much of that waste contains dangerous contaminants such as lead, cadmium, and beryllium as well as brominate flame retardants.

Information Management/ Information Systems

refers to software and computer-based systems dedicated to collecting, storing, and manipulating data in a manner that produces useful information on which to base decisions.

Web Server

refers to software that fulfills webpage requests from web clients and to the computers that run such software.

Voice over IP (VoIP)

refers to technologies that support voice communications using the Internet Protocol over data networks; Skype utilizes P2P.

Wireless Data Communications

refers to telecommunications that take place over the air to provide data and Internet access.

Freedom of Speech

refers to the ability of a person to publicly speak or publish any thought without legal constraints or repercussions.

Internet of Things (IoT)

refers to the ability of physical objects to communicate over the Internet through the use of embedded computing devices.

Storage

refers to the ability to maintain data within the system temporarily or permanently either by using electrical charges or magnetic particles on disks or tapes or by burning pits into the surface of a CD, DVD, or Blu-ray disc.

Internet Censorship

refers to the control of speech and other forms of expression over the Internet and web by a government or authority.

Green Computing

refers to the efforts of individuals, businesses, and governments to utilize environmentally conscious practices in the manufacturing and use of digital technologies; initiatives generally fall into one of two categories: energy efficiency or ecology.

Software

refers to the electronic instructions that govern a computer's actions in order to provide a computing service.

Telecommunications

refers to the electronic transmission and reception of signals for voice and data communications.

Mobile Phone

refers to the handset used by the subscriber to communicate on the cellular network.

Infrastructure

refers to the hardware, software, and protocols that support telecommunications.

Digital Lifestyle

refers to the influence of digital technologies on the manner in which people live their lives.

Internet Backbone

refers to the main Internet pathways and connections, made up of the many national and international communication networks that are owned by major telecom companies such as Verizon, AT&T, and Sprint—the same companies and networks that provide telephone service; consists of mostly fiber-optic cables that span the globe over land and under sea to provide connections between individuals, companies, organizations, and governments.

Information Security

refers to the protection of computers, information systems, data, and information against unauthorized access, use, manipulation, or destruction.

Accessible Computing

refers to the provision of equal access to computers and information technology for individuals with disabilities.

Personal Computer Ethics

refers to the responsible use of computers by individuals outside of professional environments typically combine legal considerations.

Digital Divide

refers to the social and economic gap between those who have access to computers and the Internet and those who do not.

Hardware

refers to the tangible parts of a computer or digital device and typically includes support for processing, storage, input, and output.

Digital Etiquette

refers to using digital technologies in a manner that is respectful to others.

Social Media/ Social Networks

refers to websites that allow people to share information, ideas, photos and other forms of media in virtual communities and to comment on items shared.

Internet History

relatively short, dating back only to around 1970. In that time, the Internet has had as great an impact as any invention, and its story has only just begun.

Pharming

replaces IP addresses in the DNS with the IP addresses of fraudulent websites designed to spread malware.

Americans with Disabilities Act of 1990

requires businesses to provide equal access to individuals with disabilities, including access to web content and services.

Identity Theft Protection Act of 2005

requires businesses to secure sensitive data physically and technologically and to notify consumers nationwide when such data is compromised.

Section 255 of the U.S. Telecommunications Act of 1996

requires telecommunications manufacturers and service providers to make their products and services accessible to people with disabilities, if readily achievable.

Internet Hosts

servers that provide information and services to Internet users.

Global Supply Management (GSM)

service provides methods for businesses to find the best deals on the global market for raw materials and supplies needed to manufacture their products.

Malware

short for "malicious software" and includes any software designed to damage, corrupt, or illegally manipulate computer resources. Common forms include viruses, worms, and spyware.

Bit

short for binary digit—is a digit that can be 1 or 0. A bit is the smallest unit of information that a digital electronics device can manipulate; provide a simple manner of representing information digitally; assign the information to a particular state of a bit or group of bits; two bits can represent four colors, three bits can represent eight colors, four bits can represent sixteen colors, and so on. With each additional bit, you double the amount of information that can be represented. The formula for this relationship between bits and units of information is 2^b=i, where b is the number of bits and i represents the units of information represented; represented by a b

Solid-State Storage Device

stores data using solid-state electronics such as transistors and, unlike magnetic and optical media, does not require any moving mechanical parts; are poised to replace hard disk drives, providing faster data access and dramatic energy savings.

Web Browser

such as Chrome, Internet Explorer, Safari, or Firefox, is used to request webpages from web servers, interpret the HTML code in the webpage that is delivered, and display the content as defined onscreen.

Analog Information

such as sight and sound.

Optical Character Recognition (OCR)

technology applied to identify the text in the image and transform it to ASCII representation, which then may be read aloud by a synthesized voice.

President Eisenhower formed what two government agencies under the Department of Defense (DOD) to advance space technologies, weapons, and communication systems?

the Advanced Research Projects Agency (ARPA) and the National Aeronautics and Space Administration (NASA).

What four computer networks were connected by ARPANET, commissioned by the Advanced Research Projects Agency (ARPA), to establish closer communications for research?

the University of California at Los Angeles, Stanford University, the University of California at Santa Barbara, and the University of Utah.

Sputnik

the first artificial earth satellite; created by the USSR in 1957.

Packet-Switching Network

the internet; Internet applications divide up information, such as an email message, into small packets to make efficient use of the network. Upon arriving at their destination, the packets are reconstructed into the original message.

Input and Output (I/O)

the manner in which data is received into a computer system, and the manner in which information and the results of processing are provided to the user.

Supercomputers

the most powerful type of computer, often utilizing thousands or even tens of thousands of processors to solve the world's most difficult problems.

Sampling

the process of digitizing sound through measuring the amplitude of a sound wave thousands of times per second.

Digitization/ Digitizing

the process of transforming information, such as text, images, and sounds, into a digital representation (1s and 0s) so that it can be stored and processed by computers; In order to manipulate and explore information with computers, the information must first be transformed into the digital representation that computers can process.

Transmission Control Protocol (TCP) and Internet Protocol (IP); known together as TCP/IP

the protocols on which the internet is based.

Character Encoding

the representation of characters on the keyboard with bytes, most having roots in the earliest standard, ASCII (American Standard Code for Information Interchange).

Output

the results of the processing; may take the form of images or words shown on a display, or printed to paper, sounds pumped through speakers or headphones, or alerts vibrating on a wrist or in a pocket; can also be used as input into another computing process.

Internet

the world's largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world; combination of protocols, hardware, and software

Light-Emitting Diodes (LEDs)

used in some newer displays reduce energy use by 80 percent over CRT monitors.

Binary Number System

uses only two digits, 1 and 0, is commonly used for representing values in computers; base 2; perfect for the on and off electronic switches in computers; when we represent values in binary (base 2), the columns change to the (ones) column, then (twos), then (fours), etc. So, the decimal number 2 is 10 in binary since the second column of binary numbers is the 2s column (which explains the caption for the image at the top of this page).

Global Positioning System (GPS)

uses satellites to pinpoint the location of objects on earth.

Radio Frequency Identification (RFID)

uses tiny transponders in tags that can be attached to merchandise or other objects and read wirelessly using an RFID reader, typically for inventory and supply chain management or to facilitate commercial transactions.

Points of Presence (POP)

utility stations Internet users use to connect to their networks.

Digital Native

was coined and popularized by education consultant, Marc Prensky in his 2001 article entitled Digital Natives, Digital Immigrants, in which he relates the contemporaneous decline in American education to educators' failure to understand the needs of modern students.[1] His article posited that "the arrival and rapid dissemination of digital technology in the last decade of the 20th century" had changed the way students think and process information, making it difficult for them to excel academically using the outdated teaching methods of the day. In other words, children raised in a digital, media-saturated world, require a media-rich learning environment to hold their attention, and Prensky dubbed these children "digital natives".

ASCII

was published in 1963 as a character-encoding scheme for the English alphabet and other characters; maps characters to values that are represented as binary numbers in the computer.

Internet Technologies

work together to provide information and services over the Internet, including a variety of protocols, hardware, and software; support many applications and services, such as the web, email, instant messaging, social media, Google Apps, Microsoft Office Online, streaming music and video, and Bing Maps


संबंधित स्टडी सेट्स

MGMT 494 FINAL EXAM PART 1 (CH 1-6)

View Set

Science Flashcards T/L 3C: Scientific Theory Versus Laws Active Study Methods

View Set

Section 3: Project Management Processes (Quiz/questions)

View Set

A+ Core 1 Troubleshooting: The Troubleshooting Process 5.1

View Set

Chapter 16, Holes Human Anatomy; Lymphatic system

View Set

Lilly Chapter 8: Valvular Heart Disease

View Set

ECON-2302 Inquizitive Ch. 3 - The Market at Work - Supply & Demand

View Set

Chapter 13: Special Senses: Ears

View Set