IT and Computer Hardware
Ethical behaviors IT follow
-Be fair and honest with customers. -Respect confidentiality of data. -Do not use access to computer systems in unprofessional or inappropriate ways. -Protect passwords and system access of users. -Protect sensitive information. -Do no harm to a company when leaving voluntarily or involuntarily.
Identify the peripherals that require a sound card to work:
-CD-ROM -Microphone -Speaker
Advantage
-Computing "comes to us" -Wireless is globally available for communication -Businesses can reduce costs for office space, since work can be done from most anywhere
Which of the following activities may be legal but are unethical?
-Cookies deposited by websites collect information about your browsing habits -A law enforcement officer asks you to eavesdrop on a friend's phone conversations -A computer browser records your browsing history
Check the devices that are internal peripheral devices
-DVD drive -e-Card readers
Identify what a computer needs to communicate sound:
-Driver -Digital sound
paperless society ideal
-Electronic documents give more people access to knowledge and information -Information loss is reduced when electronic copies are made -Paper waste is reduced
How does technology improve productivity at home?
-Enables online download of music -Enables reading while exercising -Reduces the need for printing
How does technology improve productivity at work?
-Enables sending documents to multiple recipients -Provides savings on travel expenses by supporting virtual meetings -Provides flexible work schedules and environments
In what ways can technology help you be more productive?
-Enables you to create electronic documents that present your ideas clearly and effectively -Enables you to communicate with people anywhere in the world -Enables you to store documents on a thumb drive
Storage devices include:
-Hard drive -Flash drive -CD -DVD
Disadvantage
-Managers expect employees to always be available -Employees are available for work while on vacation -Wireless technology creates a more complex work/life balance -Salary does not cover 24/7 worker availability
Identify industries and career-based activities in which computer technology makes people's work easier or more efficient (Industries)
-Medicine -Banking -Finance
digital age actually increased paper usage:
-People print e-mails for archiving, to make them easier to read, and to create a paper trail -The Internet caused more printing of research -Networked all-in-one printers, copiers, and scanners encouraged people to make multiple copies of documents
Identify industries and career-based activities in which computer technology makes people's work easier or more efficient (Career-Based Activities)
-Pharmacist filling a prescription -Doctor diagnosing a patient -Teacher keeping track of student grades -Stock broker keeping track of stock prices
Computer life cycle
-Planning for and purchasing equipment -Deploying computers -Supporting and upgrading -Retiring computers
The call center employee clearly explains the doctor referral process in simple terms and asks if the caller has any questions about it
-Protect passwords and system access of users -Protect sensitive information
Which of the following tasks would be very difficult using only a keyboard and text?
-Renaming a file -Drawing a picture -Writing a document -Playing games -Sending an e-mail
Which of the following are peripheral devices?
-Speakers -Graphic cards
Which of the following are current and emerging advancements in technology?
-Tablet computer -Cloud storage
The mental health hotline receives a wide range of calls from people who are considering getting help from a doctor to people who are experiencing life-threatening situations. The call center employee is a caller's first point of contact; this employee directs all calls to the appropriate medical professional
-The call center employee makes sure to speak in a calm voice and ensures that the caller is directed to a medical professional who can provide help -The call center employee clearly explains the doctor referral process in simple terms and asks if the caller has any questions about it
Which of the following explains the growing need for a standard IT professional licensing program?
-There are few certification programs that are robust enough to be Microsoft ANSI-accredited -An IT professional can be termed a certified professional by attending some program certifications.
Which of the following are peripheral devices that could be connected to the computer you are using?
-Web camera -Mouse -Keyboard -Graphics card
Network
-an interconnection of computers sharing data and peripherals -transformed computing by they providing fast, easy access to messages or data and to other users
Which of the following describes a hot spot?
-an unsecured wireless network -inherently vulnerable to hackers -susceptible to third-party viewing
How can computers contribute toward creating a "paperless society"?
-by using LMS online programs in primary and secondary education -by increasing the scope and type of input devices -by making information available online to a larger number of people
Which of the following describe advantages of miniaturization?
-cheaper -faster -portable -use power more efficiently
Which of the following scenarios describes an IT professional using the Internet and computer system access in an unprofessional or inappropriate way?
-checking social media networks during working hours -surfing the Internet during working hours for what to do on the weekend -downloading a favorite band's latest album from a file-sharing service
All of the following activities are legal when requested by a law enforcement officer, but they may be unethical. Which are unethical?
-collecting browsing history from a cell phone's browser -obtaining a record of phone calls -recording a phone conversation -disclosing e-mail activity
IT professionals have a responsibility to find and use wireless devices that have which of the following features?
-compatibility -ability to work well with other wireless devices -ability to communicate wirelessly with other devices, such as a printer and laptop
Douglas Engelbart
-computer inventor -demonstrated many new computing technologies, including the computer mouse
buy a new computer:
-computer is more than five years old -New software may be needed that will not run properly on older hardware -not enough memory or hard drive space on the old computer -current computer system is slow
What are the most important considerations when comparing computer systems?
-computer speed -amount of storage
Which of the following is an advantage of word processing productivity programs?
-create versions of documents -save and modify documents indefinitely -create a variety of layouts using text and graphics -check a document for spelling and grammar accuracy
Which of the following storage devices are portable?
-external hard drive -flash drive
Which of the following are input devices commonly used on a computer?
-keyboard -mouse
Which of the following are input devices?
-keyboard -mouse -scanner
Which of the following describes a possible consequence of IT professionals acting in an unethical way in the workplace?
-loss of job -negative impact on reputation
How have productivity programs improved the professional lives of people?
-made it easier and faster to communicate with others -made it easier to manipulate numbers in a spreadsheet -made it easier and less expensive to present information
Check the devices that are external peripheral devices:
-mouse -keyboard
Which of the following statements is true of wireless cellular networks?
-operate on a grid pattern -search for signals to confirm that service is available -provide voice communications and Internet connectivity
Spreadsheets are used for:
-personal finance -tax preparation -invoices and accounting -data manipulation
Choose all stages of the information processing cycle.
-processing -storage -input -output
Which of the following are ethical guidelines an IT professional might use in his or her daily work?
-protect the best interests of an employer -be fair and honest with customers -protect customers' best interests -protect his or her own best interests
Word processing programs
-provide many advantages for document creation -Instead of writing everything down on paper, word processing programs allow people to type documents that can be easily modified and manipulated
The main benefits of computers are their ability to:
-save files -retrieve files -modify files
Which output device would a teacher use to show a movie to the class?
-speakers -projector
machine cycle
-the process of getting instructions from RAM -decoding them for the computer to understand -executing the instructions -storing the result back to memory
IT professionals have a responsibility to educate employees about the risks of hot spots. Which of the following are risks associated with hot spots?
-third-party viewing -unsecured public network -potential for computer hackers -unauthorized use
Electronic Numerical Integrator and Computer (ENIAC)
-took up 1800 square feet and weighed 30 tons
laser printers
-use a laser beam and static electricity to transfer words and images to paper -are primarily business printers because they produce high-quality printed material and are expensive to purchase
Which of the following actions is a good example of protecting sensitive information?
-using a paper shredder to discard documents that contain personal medical information -keeping patient files in a secure electronic file system with limited access -maintaining a confidential patient consultation area in a doctor's office
Mainframe computers
-very large and had heavy power consumption -those limitations meant they were not practical for any but the most important calculations
Which of the following activities is not permissible for IT professionals while on the job?
-working on a side job while at work for one's primary job -viewing sexual content on a company computer -sending coworkers an e-mail joke containing suggestive humor -downloading music from a file-sharing service
gigabytes
1 billion bytes
megabytes
1 million bytes
terabytes
1 trillion bytes
kilobytes
1,000 bytes
safest way to install external hardware:
1.Plug it in, usually through a USB port 2.Wait for your computer to detect the hardware 3.Follow the instructions on the pop-up dialog box 4.Install the drivers, if necessary, using the computer's automatic process for finding drivers or the installation disk that came with the hardware
Based on the trend in the graph, the best prediction for the number of transistors on a circuit in 2020 is ______
10 trillion
In 1971, integrated circuits had about ______ transistors
2 thousand
By 2011, some circuits had more than ______ transistors
2.5 billion
How many bits are in one computer byte?
8
Which IEEE standards define Wi-Fi technology?
802.11 standards
External hard drive
A portable device to store all types files, including photos, movies, and music
Thumb drive
A small-scale version of an external hard drive
For which of the following careers is technology's speed factor most important?
Air traffic controller
Cloud storage
An online repository that allows you to save files on servers instead of on your personal devices
___________ enables information to be viewed in an easily understandable format
An output device
a low-power radio wave used for short distances
Bluetooth
Wireless cellular networks divide regions into smaller blocks or
Cells
Which of the following is an information storage method that allows you to save files on Internet servers instead of on your computer devices?
Cloud storage
information processing cycle
Computer software performs four basic operations -Input -Processing -Output -Storage
Portability:
Consider where you will be using the system the most - in different locations, or in a fixed location like your home, school, or office
An IT worker discloses his employer's business and financial plans to a competing company
Corporate Espionage
The CPU converts _________ into information.
Data
Price and maintenance
Desktops are used primarily for business offices because they are easier to upgrade, less expensive to buy, and a lower security risk than laptops
A computer programmer turns over all access to files before leaving a company for retirement
Do no harm to a company when leaving
Which of the following ethical guidelines is best described as refraining from using granted authorizations for personal gain or activities that are not appropriate in the workplace?
Do not use computer access or the Internet for unprofessional or inappropriate purposes
Smatphones
Enable you to call, text, video chat, and send e-mail
Virtual meeting
Enable you to video-conference with people around the world
Social media
Enables you to keep in touch with friends, family, and coworkers
All of the following are information storage methods that make people's personal and professional lives more productive, except:
Ethernet
All of the following are methods of communication except:
External hard drive
Which of the following ports offers a fast connection that could be used to download and watch your favorite TV shows?
FireWire
Many people use __________ instead of maps
GPS
Which port carries high-definition video and audio in one connection?
HDMI port
Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?
HIPAA
Which of the following is true of laws governing the actions of IT professionals?
HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow
Examples of ______ include the central processing unit and random access memory
Hardware
A computer system is made of two main parts: ______ and ______
Hardware, Software
Which of the following statements is true of licensing procedures for IT professionals?
IT professionals are primarily governed by the information they use
digital signal is a series of on and off messages — 1s and 0s. There's no message between on and off.
Numerical Example: 0 1 0 1 1 0 0 1
analog signal is a series of messages that can have a range of different values between 0 and 1, such as 0.5 or 0.75
Numerical Example: 0.3, 0.54, 0.27, 0.8
Which device stemmed from the original cell phone and allowed for synchronized contact information?
PDA
toner
Powdered ink used in a laser printer
How did punch cards improve the weaving process?
Punch cards allowed a weaver to give instructions to the loom
wireless technology that lets you identify and track objects
RFID
Which of the following ethical guidelines is best described as preventing Social Security numbers, bank account numbers, addresses, and phone numbers from getting in the wrong person's hands?
Respect confidentiality of data.
An angry executive who is terminated from Company A reveals Company A's key ingredient for its most popular soda to Company B. In return, the executive is paid $10 million
Sale of trade secrets
Sale of Trade Secrets
Selling trade secrets involves the release of information about a highly confidential product or service to the public
A college student needs a laptop that can be used while commuting on the train and sitting in lecture
Size
Which device followed the PDA?
Smartphone
Productivity programs are an example of ______
Software
A parent needs a computer that can hold family photos
Storage
Turing's Machine
The device would read, change, add, or remove symbols on the tape -Turing imagined a device moving along a strip of tape
Which of the following statements is true of the digital age and its intention to create a paperless society?
The digital age intended to create a paperless society, but it actually increased paper usage
Sampling rate
The number of measurements per second -measured in Kilohertz (kHz)
Moore's Law
The number of transistors that can be inexpensively placed on a circuit doubles approximately every two years
Identity Theft
Theft of personal identification such as Social Security numbers, bank account numbers, and credit card and medical information can result in financial ruin for the victim
Software Piracy
This involves making unauthorized copies of computer software and distributing application or source codes
Corporate Espionage
This type of espionage involves the release of confidential corporate financial or product information to competitors -It can cause great damage to a company.
For which of the following careers is technology's connectivity factor most important?
Traveling salesperson
Turing's Legacy
Turing is often called the father of modern computing
Turing's Key Insight
Turing supposed that he could perform any calculation with his device
Which of the following ports is the most common on computers?
USB
Sneaker-Net
Users had to copy data to a floppy disk and then physically hand it to someone else, who then had to load it onto another computer
What is the basic port used to connect a computer to a screen?
VGA port
The most secure form of encryption is referred to as
WPA
Which of the following scenarios describes an IT professional using good methods to protect passwords and system access of users?
When setting up the e-mail program for each employee's computer, the IT professional has the employee enter his or her e-mail password to protect privacy.
Power sources
While laptops are portable, they depend upon batteries. The more applications and processing power needed, the shorter the battery life. Batteries tend to wear out over time and may need to be replaced every six to twelve months
smartphone
a cell phone that enables you to call, text, video chat, and send e-mail
Smartphone
a cell phone that has added functionality
device driver (software driver)
a computer program that allows higher-level computer programs to interact with a hardware device
minicomputers (PCs)
a computer that is small and affordable enough for personal use
desktop computer
a computer with separate hardware components for the monitor, keyboard, and mouse
tablet computer
a computing device that uses a touch screen interface
Analog signals
a continuous wave that fluctuates infinitely within its frequency range
Mouse
a device external to a computer usually operated by hand and used to move the mouse button to interact with graphical elements on the screen -The internal version of this is a touchpad -an electronic device external to a computer and operated by hand
Scanner
a device that captures a copy of an image or document and then transmits it to a computer -Scanners, then, convert a paper document into an image storable on a computer -an electronic device that captures a copy of an image or document and then transmits it to a computer
graphic cards
a device that is installed in a computer to assist with processing and displaying images
Microphone
a device used to pick up sound to record with a computer -This may be internal or external -an electronic device that records sound
Camera
a device used to record still and moving images that can be stored on a computer
surge protector
a device with an electrical cord that plugs into the wall
digital signal
a distinct and separate signal that operates in "on and off" states
Double data rate (DDR)
a fast type of RAM
microprocessor
a general purpose computer that fits onto a single computer chip -can receive input for calculations and then output results
Computer forensics
a growing discipline in the IT industry -purpose is to search and analyze computer activity to find evidence for a trial
motherboard
a large circuit board that contains all electronic components for data processing
Bluetooth
a low-power radio wave, and is used only for short distances (30 feet max) to connect wireless devices -Wireless headsets -Wireless computer mice -Hands-free, in-car microphones and speakers -Wireless printers and scanners
server
a main hub of storage for many different computers connected through a network
Analytical Engine
a mechanical computer -could be instructed with punch cards to calculate many different mathematical problems
widget
a mini program that performs a function with one click or keystroke -stock tickers -weather update programs
Local Area Network (LAN)
a network that is confined to a small area -usually limited to a single geographic area, such as a home, school, or work site
Institute of Electrical and Electronics Engineers (IEEE)
a nonprofit professional organization that develops computer technology standards
Computer
a noun that means someone or something that computes
cache
a part of the computer's memory where information that needs to be found quickly is located
Virtual memory (VM)
a part of the hard drive that can function as RAM, if needed
bad sector
a part of the hard drive that is physically damaged
I/O port
a physical plug-in point on a computer that can be used for inputting data and outputting information
peripheral
a piece of computer hardware that may be added or connected to a computer to expand its capabilities
Random access memory (RAM)
a piece of computer hardware that temporarily stores information when software is being used
video card
a piece of hardware that controls the appearance and display of images on your computer's screen
tablet computer
a portable computer, smaller than a laptop, that is operated by a touch screen
External hard drive
a portable device to store all types of files, such as photos, movies, and music
e-textbook
a portable electronic textbook viewable on a computer
Sleep
a power-saving mode that allows a computer to quickly resume full-power operation (typically within several seconds) when you want to start working again
Encryption
a security measure that changes the format of data so that others cannot view it without password access
electronic circuit
a series of electronic components that channel the flow of electric current
Keyboard
a set of keys or buttons used to enter letters, numbers, and symbols into a computer -a system of keys used to send text and other input to a computer.
Short Message Service (SMS)
a short text message that contains only text - no pictures, audio, or video
Personal digital assistants (PDAs)
a small hand-held device that resembles a touch-screen computer -do business calendaring, e-mail, phone service, and spreadsheet applications all in one mobile device
Flash drive (USB drive)
a small-scale portable version of an external hard drive
PDAs were replaced by
a smartphone
computer driver
a software program that controls the installation of hardware devices
bus
a subsystem that either transfers data between peripherals and the central processing unit (CPU) or between computers
Ethernet
a system of cables or wireless connections to link computers over a network
Radio frequency identification (RFID )
a type of wireless technology that lets you identify objects that have been fitted with special tags
interactive whiteboard
a wall-mounted board that responds to touch; information is projected onto the board through a digital projector connected to a computer
File systems
a way to organize files so you can easily locate them based on specific criteria, such as date, type, or category
Each card has its own uniquely identifiable
address
Printers
allow a user to create a paper copy of what is on the screen
Speakers or earphones
allow a user to hear sound
Multimedia Messaging Service (MMS)
allows you to send regular text-only messages as well as audio, video, and pictures
system bus
an electrical route on a computer that transfers information between core components, such as the CPU, motherboard, and RAM
integrated circuit (microchips)
an electronic circuit that combines all the electronic components onto a single surface, or circuit board
touch-screen
an electronic display surface on which user inputs are made through touch
transistor
an electronic switch that turns electrical current on and off -replaced the need for vacuum tubes, allowing computing devices to shrink and consume far less electricity
port
an interface between computer devices
Hibernation
another power-saving mode, but it is designed primarily for laptops
nodes
any computer or digital device (wired or wireless) using the network to exchange data between other computers
The term software refers to ______ that direct hardware what to do
applications
Presentation
applications are used to display slide show-style presentations
Wireless technology changed the workday to
around-the-clock availability
Computer A: -2.6 GHz processor -512 GB hard drive -8 GB RAM
better processor and RAM
The computer processor speed is 4.5 GHz, which means the processor performs at 4.5 ______ machine cycles per second
billion
What is the basic unit of measurement for RAM specs?
byte
a high-end gaming computer
can also be required for editing high-definition videos and manipulating music and image files
laptops
can weigh less than 3 pounds and are comparable in computing speed to many desktop computers
punch cards
cards with patterns of holes punched into them
In a classroom, an interactive whiteboard replaced the
chalkboard
The debit card replaced the need to use
checks
______ is an area of IT work that focuses on the investigation and analysis of computer activity for use in a trial
computer forensics
random access memory (RAM)
computer hardware that temporarily stores information when software is being used
The CPU is responsible for
controlling all computer functions
Documents
convey the written word electronically and in print by allowing users to input and modify text and images
3D printers
create a 3D object from a digital file
Smartphone technological advancements added ________ services
data
hertz (Hz)
defined as machine cycles per second
Network interface cards (NICs)
developed to allow computers to communicate using networking standards -today are built into new computers and are integrated into the motherboard during manufacture
External peripherals
devices that attach outside the computer -keyboard -mouse -monitor -printer -scanner -webcam -microphone.
Moonlighting business
doing work for a secondary job -moonlighting while at your primary job could get you fired
vacuum tubes
electrical switches that switched on or off to store digital signals
Roaming
enables cellular customers to continue making voice calls and connect to the Internet when away from home
Sound cards
expansion cards that allow the computer to output, input, or manipulate sound
top-of-the-line computers
expensive, as they include powerful graphics cards, very fast hard drives, fast processors, and higher-quality monitors, sound cards, and speakers than budget or entertainment computers
Identity theft is a breach of
good ethical practices
computing device used with Bluetooth
hands-free microphone in a car
Input devices
hardware that send data to a computer -text -sound (audio) -video (visual) -example: keyboard or mouse
Computer B: -2.4 GHz processor -650 GB hard drive -6 GB RAM
has more internal memory
Budget computers
have only basic capabilities and are cheaper than other computers -may be cheaper than other computers, but it is not as capable of handling movies, games, or software programs that manipulate large media files
Computer speed is measured in
hertz
Processing
how computers sort and handle inputs. Processing turns inputs into outputs.
Storage
how files are saved on computer hardware -a file is saved on a hard drive when a software program tells the computer where to store a file
Communication
how people interact with others
A help desk employee uses a customer's credit card number to make a small purchase
identity theft
Pixels
illuminate to create the images or text
graphics card
increases the computer's capacity to generate images to display -example of internal peripheral
Classified information
information withheld from the general public to protect national security
A student types text into a word processing program
input
The keyboard and mouse are examples of ______ devices
input
The part of the information processing cycle in which raw data is received is known as
input
Expansion cards
inserted into slots to add memory or graphics capabilities or to support special devices
Internal peripherals
integrated into the computer -CD drives -DVD drives -internal modems, slots -expansion cards -e-card readers
Which key hardware component was typically not included in first-generation personal computers?
internal hard drive
core
is a microprocessor
The Wi-Fi alliance
is a trade group that promotes wireless technology and owns the trademark for the term "Wi-Fi."
is considered by some to be the most important program because of its popularity and wide use
thumb drive
is essentially a smaller version of an external hard drive.
Slowing down a process
is not a reason why new technologies are introduced to a profession.
byte
is often, but not always, a series of eight bits -Example: 0 1 0 1 1 0 0 1 (0: off, 1: On)
Bluetooth
is wireless technology used for short distances in devices like remote controls, hands-free headsets, and printing
looms
machines that weave fibers into complex patterns -to change the shape of the weave, an entirely new loom needed to be built
analog signal
made of physical waves that travel through matter
read-only memory (ROM)
makes up a small portion of the computer's memory
The CPU is the mastermind of the computer, controlling everything that goes on through a series of
mathematical sequence
Miniaturization
means that computers became smaller over time
Another name for the CPU is
microprocessor
Wireless technology is best described as a/an
mobile computing system
A computer screen that is contained in its own case and is not part of the computer system is called a
monitor
A high-resolution screen has
more pixels
The first cell phones in widespread use were
mounted in cars and not very portable
Classified government information should not be disclosed to the public because it is a risk to
national security
An IT worker at a government agency tells his friends about the work he is doing for computers aboard spy planes
national security breach
Wireless cellular networks
networks that operate on a grid pattern that divides regions like cities into smaller blocks or cells
Which of the following behaviors does not harm a company if your employment is terminated?
notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave
Raw data
numbers and characters on a computer hard drive or file that have not been processed
hard drive failure
occurs when the hard disk malfunctions and all data stored on the hard disk becomes inaccessible
bit
one individual digital signal
Slots
openings in a computer where printed circuit boards can be inserted to expand the computer's capabilities
The computer shows possible misspellings on the screen
output
The series of mathematical steps taken by the CPU during processing results in
output
medical uses of RFID
patient identification
Advancements in technology occur because
people need to solve new problems
Hardware refers to the _________________ of a computer
physical components
Peripherals
pieces of computer hardware that may be added to your computer (internally or externally) to expand its capabilities -Sound cards (handle sound) -graphic cards (handle images) -network cards (handles network connections)
word processing software
prepare written work, such as a book report, calendar, or party invitations
Storage is different from RAM because for storage, information is _________, even if power is turned off
preserved
Which output device allows a user to create a copy of what is on the screen?
printer
inkjet
printer works by spraying ink onto paper
Sensitive information
privileged information owned by an organization -If such information is lost, misused, or disclosed, the organization could be harmed
The computer checks and compares all words entered to find misspellings
processing
The part of the information processing cycle where raw data is converted into meaningful information is
processing
Software refers to the ______________that direct hardware to perform a task
programming instructions
Spreadsheet
programs have revolutionized the accounting industry
HIPAA Privacy Rule
provides federal protections for personal health information held by some businesses
hot spots
public Wi-Fi networks, such as those found in restaurants, airport terminals, coffee shops, and cafes -NOT secure
The memory used by the CPU to temporarily hold data while processing is called _______
random access memory
The type of memory used during the processing cycle is
random access memory
Information storage
refers to how and where you save digital information
Disclosure of ______ could seriously damage a company
sensitive information
program
series of simple commands
Monitor or display
shows text, graphics, and video on the screen
Advancements in technology often make computer hardware and software more convenient to use as well as able to fit a variety of budgets. As technology advances, it usually gets
smaller and less expensive
Why did cell phones gain in popularity?
smaller and lighter components
A technological device used by IT professionals to check e-mail, make phone calls, and surf the Internet while away from the office is a/an
smartphone
Examples of ______ include multimedia and presentation applications
software
Productivity programs
software applications used to create documents, organize data, and present information -Microsoft Word -Excel -PowerPoint -Outlook/Gmail
A software developer makes a copy of the software she is using at one job so she can use it in her other job
software privacy
Drivers
software programs that communicate with the operating system and other software regarding how to communicate with a specific piece of hardware
learning management system (LMS)
software used to administer and deliver online courses and track users' progress
Learning Management Systems (LMS)
software used to administer and deliver online courses, and to track users' progress
CDs and DVDs are examples of
storage
You save the revised document to the hard disk
storage
What is the primary function of RAM?
stores information temporarily
A computer with sufficient RAM will be able to ______ with greater ease
switch between applications
A portable technological device is a
tablet computer
Output devices
take computer data and translate it into visual and auditory signals that humans can interpret
Wi-Fi
technology that enables an electronic device to communicate wirelessly over a computer network using the IEEE 802.11 standards
CPU or microprocessor
the "brain" of the computer
VGA port
the commercial standard port to connect a screen to a computer
Optical drive
the disk drive in or attached to a computer that reads CDs or DVDs - uses electromagnetic waves to read or write data from inserted CDs or DVDs
A computer is an electronic device that performs four basic operations called________
the information processing cycle
Internal hard drive
the main storage device inside a computer where programs and files are saved
hard drive
the main storage device inside a computer where programs and files are saved
computer specifications
the measurement of how well a computer will perform
all-in-ones
the monitor and CPU are contained in one case
The CPU is located on what part of the computer?
the motherboard
Wired equivalent privacy (WEP)
the original standard and is good for home use, but it is not the most secure
Central Processing Unit (CPU)
the processing and control center of the computer -controls all tasks that go on in a computer -it takes inputs and turns them into outputs
Output
the result of a processed input
Sectors
the small units that make up the sections of a hard disk
monitor
the visual output hardware
High resolution
there are more pixels per square inch
Technology makes people's lives more productive because
they can do things more efficienlty
Sampling
to measure the wave at frequent intervals and turn it into 0's and 1's
Laser printers use a special powdered ink called
toner
Braille embossers
translate text into braille
What can you do if a computer is running slowly and you suspect it is because you have insufficientRAM?
upgrade the RAM
digital
use electrical impulses represented as 0's and 1's
Projectors
use projected light to throw a computer screen image onto a wall
Roaming
used to describe connecting to a foreign cellular network when outside the geographic area of one's home network
Presentation applications
used to display slide show-type presentations on a computer -Microsoft PowerPoint
Media Access Control (MAC)
used to identify the computer where data on a network originates
Wi-Fi protected access (WPA)
uses a stronger method of encryption and is used by businesses. WPA is the most secure
binary number system
uses the digits 0 and 1 to represent all numbers
decimal number system
uses the ten digits from 0 to 9 to represent all numbers -Also known as base ten or denary
Which of the following activities is permissible for IT professionals in the conduct of computer access and authorizations?
using the company's e-mail software to send work-related e-mails
Input
what goes into the computer, such as data from another device or user
microprocessor (CPU)
where computer processing occurs. It is located on the motherboard
paperless society
where things that traditionally require paper could be replaced by electronic versions
hard disks
which are magnetic disks used to save data in storage