TestOut IT Fundamentals - Chapter 1-8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

IEEE 802.11 Standards

A family of standards under the 802 standards that dictate how data is transferred between hosts in a wireless network. Popular 802.11 standards are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac.

Pop-up Blocker

A feature of most web browsers that prevents pop-up windows such as advertisements from being displayed.

Attenuation

A feature of radio waves where the signal becomes weaker as the wave travels further from its point of origin. 802.11 standards require that signals are strong enough to cover a specific distance.

Windows Update

A feature of the Windows operating system that keeps the system up to date.

Human-computer Interaction

A field of study that looks at how computers and other kinds of technology interact with humans.

Print Job

A file or set of files that have been submitted to a printer.

Virtual Machine

A file that acts like a computer but in reality only exists virtually as opposed to physically.

Messaging

A form of written communication similar to texting but is typically done with the use of an app like Facebook Messenger or WhatsApp, usually on a mobile device.

Programming language

A formal language comprising a set of instructions that produce various kinds of output. A compiler converts the high-level programming languages into machine language (ones and zeros).

Net Neutrality

A government policy that required Internet Service Providers to allow equal access to all web content.

Form

A graphical interface that allows users to query a database by filling in information on the form.

Byte

A group of eight bits joined together.

Local Area Network (LAN)

A group of networked computers that are physically close together, usually in the same building.

Client

A host on a network that consumes network services.

Server

A host on a network that provides network services.

Assembly language

A human-readable, low-level computer language that is a symbolic representation of binary machine language.

Malicious Software Infection

A kind of software that can harm a computer and compromise security.

Basic Input/Output System (BIOS)

A simple program that's written directly into the motherboard's hardware used to initiate hardware in the booting process.

Notebook/Laptop

A small computer that combines a display and keyboard and is designed to be easily carried.

Home Router

A small network device with modem, firewall, routing, and switching features that is used in homes and small businesses.

Information Systems

A discipline that involves collecting and utilizing data to help organizations know what information they need, how to generate it, and how to turn it into meaningful decisions.

Information Technology

A discipline that is dedicated to meeting the computer needs of businesses, schools, governments, and other organizations.

RGB Display

A display on a computer monitor that is made up of sets of tiny red, green, and blue (RGB) lights, each set combining to make a pixel. A pixel will display different colors depending on the brightness of each light.

IEEE 802 Standards

A family of standards that mostly dictate with how data is transferred between hosts in a local area network (LAN).

Doxing

Publishing the private contact information of one's political opponents online.

(RFID)

Radio Frequency ID, or RFID, a technology typically used for tacking objects. There are two types of RFID, passive (does not require power) and active (does require power). Passive RFID tags can be embedded in labels and sticker which is helpful for tracking objects.

Managed Service Provider

A third party technical support organization employed by a company in order to cut costs and focus on business operations.

Hacktivism

Malicious attacks on networks and websites for the purpose of promoting social change, regarded by some as civil disobedience and others as cyberterrorism.

File Transfer Protocol (FTP)

A set of rules that govern the transfer of files between computers.

Hypertext Transfer Protocol (HTTP)

A set of rules that govern the transfer of web content between computers.

Internet Service Providers (ISP)

A company that provides individuals and businesses access to the internet and other related services.

3D Printing

3D Printing, sometimes known as additive manufacturing, is the process of creating a three-dimensional solid object from a digital file.

SOHO

A LAN that only services a home or small business, it is sometimes referred to as a Small Office Home Office, or SOHO.

Windows 10 App

A Windows program that is installed and maintained through the Windows Store and uses the type of interface you would typically see on a touchscreen device.

Blog

A blog is a website that produces content in forms of blog posts that can contain text, images, video, or other media. Blogs usually have a more casual, conversational style than more mainstream websites.

Network Cable

A cable that provides connectivity between network devices. A common network cable connects a computer's network interface with a wall jack.

Coaxial Cable

A cable that provides transmission on a network through its inner wire in the form of electrical signals. The wire is made up of four different components: an inner conductor, an insulator made of flexible PVC, a metallic shield, and a plastic jacket coating.

Twisted Pair Cable

A cable that transmits data through electrical signals and provides better signals because of its eight unique plastic-coated copper wires that are twisted into four pairs.

Fiber Optic Cable

A cable that uses light pulses to transmit data instead of electrical signals.

Speed

A characteristic of 802.11 protocols that requires them to transfer data at a specific number of bits per second.

Frequency

A characteristic of a radio signal that carries digital information in a wireless network. 802.11 standards specify two frequencies, 2.4 GHz and 5 GHz.

Default Address Class

A class designation (A through E) that specifies a default subnet mask value which defines the default network address portion of the IP address.

Cloud Storage

A cloud computing service that remotely maintains, manages, and backs up data and makes that data available to users over a network.

Microsoft OneDrive

A cloud storage service that is offered by Microsoft.

HTTP Method

A command that tells the server what the user wants to do. The most common methods are POST, GET, PATCH, and DELETE. These methods are used for CRUD operations which stand for Create, Read, Update, and Delete.

Software Crash

A common issue in which software stops running properly, forcing you to exit and reopen the program.

System Slowness

A common issue where the software starts running more slowly than usual and every command the computer makes may be delayed by a few seconds or longer.

Run-Length Encoding

A common lossless compression algorithm that looks for repeated patterns of bits or bytes and records the pattern and then number of times the pattern is repeated.

Flash Storage

A compact, portable storage device that uses special memory chips to store data.

Lossless Compression

A compression algorithm, such as GIF, PNG, PDF, and ZIP, that doesn't affect the original data. A file compressed using a lossless compression algorithm, when decompressed, will be exactly the same as the file before compression, bit for bit.

Lossy Compression

A compression algorithm, such as JPG, MP3, and MP4, that slightly alters the data to make it easier to store, taking advantage of the limitations of human sight and hearing, and is usually used for images, videos, and audio files.

Network Interface

A computer component that provides a port (usually RJ-45) where a network cable can be connected.

Hypertext Markup Language (HTML)

A computer language that web pages use to display content through web browsers.

Operating System

A computer program that makes it so people, hardware, and software can interface with each other in a meaningful way.

Compiled language

A computer programming language, such as C and C++, that uses a software tool called a compiler to translate the code into binary machine language.

Interpreted language

A computer programming language, such as Python, JavaScript, and Ruby, that requires a program called an interpreter to execute the instructions written in the source code each time the application is run.

Function

A computer routine or snippet of code that can be reused in a computer program.

Gaming Server

A computer that provides a gaming environment that tracks events in multiplayer video games.

Mail Server

A computer that provides email services to a network.

File Server

A computer that provides network access to shared disk storage.

Database Server

A computer that stores databases, which are huge repositories of organized data.

Web Server

A computer that stores web pages and hypertext documents and transmits them to devices requesting these pages.

Internet of Things (IoT)

A computing concept that describes the network of everyday physical devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Internet of Things (IoT)

A computing concept that describes the network of physical devices and everyday devices (including refrigerators, thermostats, streetlights, and environmental tracking systems) that communicate with the internet.

Client-Server Model

A computing model where computer servers supply network and computational services (such as email, file sharing, online gaming, and VoIP) that are consumed by client computers.

Print Queue

A container that holds print jobs that are waiting to be sent to a printer that may be too busy to accept the print job.

Graphic Designer

A creative artist who designs digital images and illustrations for a wide variety of purposes, including ads, logos, emails, marketing materials, websites, social media, and mobile apps.

Table

A data structure in a relational database that is comprised of fields (columns) and records (rows).

Windows Registry

A database that stores settings for the operating system and other programs. These settings are stored as keys and values.

Print Server

A device or computer that connects client computers to printers. Client computers send print jobs to a print server that may hold them in a print queue before forwarding them to a printer.

Proxy Server

A device that stands as an intermediary between an application such as a web browser and the Internet. A proxy server intercepts all requests and can use filter rules to allow or deny internet traffic.

Solid State Devices (SSD)

A device with similar capacity to an HDD that uses flash storage instead of magnetic disks to store data. SSDs are much faster and more durable than hard disk drives but usually are more expensive.

Wall Jack

A device, usually located on a building wall, that provides a port (usually RJ-45) where a network cable can be connected. On the hidden side of a wall jack is wiring to a patch panel or to a network device.

Certificate

A digital document that contains encryption keys and is used for encryption and identification.

Social Media Marketing

A marketing tool used on social media to present a business and its message quickly and in the best light possible with the intent to interact with and influence potential customers and expand their business potential.

Data Corruption

A memory issue in which unintentional changes have been introduced to your original files resulting in missing files or data, scrambled documents, crashing programs, spontaneous reboots, registry errors, and missing systems.

Query

A method of asking questions about the data stored in a database.

Cloud Hosting

A method of delivering applications by hosting them in the cloud.

Streaming

A method of transmitting and receiving data (especially video and audio information) over a network as a steady, continuous flow, allowing playback while the data is being transferred.

Smartphone

A mobile phone that functions as a computer and allows users to access the internet.

Access Point

A network device that connects wireless devices to a wired network.

Router

A network device that moves traffic between two different IP networks.

Switch

A network device that moves traffic within an IP network.

Registered Jack 45 (RJ-45) Interface

A network interface or connection with eight pins that is similar to an RJ-11 connector, but wider. RJ-45 is used to create a wired connection between a computer and a network.

Registered Jack 45 (RJ-45) Interface

A network interface or connection with eight pins, that is similar, but wider than RJ-11 connectors. RJ-45 is used to create a wired connection between a computer and a network.

Registered Jack 11 (RJ-11) Interface

A network interface or connection with four pins and a clip to hold the plug into a wall socket. RJ-11 is used to connect to a plain old telephone line. In a DSL network, this interface connects the modem to the wall jack.

Dynamic Host Configuration Protocol (DHCP)

A network management protocol that assigns IP addresses on a network. It is part of the larger set of built-in networking protocols known as TCP/IP.

Dark Web

A network of encrypted content that allows users to engage in untraceable activity.

Wide Area Network (WAN)

A network of interconnected LANs across a large geographical location.

Firewall

A network security device that protects a network by examining the traffic before transferring it to the network.

Metropolitan Area Network (MAN)

A network that covers a larger geographical area than a LAN, but is usually as large as a WAN. The term generally refers to smaller networks that are connected throughout a city into one larger, centralized network.

Bus Topology

A network topology in which all the devices are connected to each other by a single central cable.

Star Topology

A network topology in which devices are not connected to each other but rather to a centralized device called a switch.

Ring Topology

A network topology in which each host is connected to two other hosts in a circle.

Mesh Topology

A network topology where each device on the network has a point-to-point connection to every other device on the network. This topology was previously just theoretical until the rise of smart devices and wireless connecting media which allowed devices to communicate directly to every other device through one network adapter in each device using radio signals and wireless network adapters.

Transmission Control Protocol/Internet Protocol (TCP-IP)

A set of rules that facilitates internet communication.

Hexadecimal System

A numbering system that uses sixteen digits, 0 through 9, and A through F.

Decimal System

A numbering system that uses ten digits, 0 through 9.

Binary System

A numbering system that uses two digits, 0 and 1.

IP Address

A numerical label that is assigned to devices so they can connect and communicate on a network.

Compression Artifact

A patch of pixels in a compressed image or video that have less visible detail than the rest of the image.

Digital Data

A physical signal, such as text, numbers, graphics, or sound, interpreted by converting it into binary numbers.

App Store

A platform that allows users to search for a variety of apps that can be delivered to many different devices. Most apps in app stores can be downloaded for free while others must be purchased.

Desktop

A popular type of computer system that can be equipped with peripheral devices such as a monitor, keyboard, mouse, and speakers.

Shared Printer

A printer that is attached to one computer but allows printing access to multiple computers and devices connected to the same network.

Intranet

A private network, usually hidden from the internet and protected by a security device, that uses the same technologies that are used on the internet and may or may not be connected to the internet.

Troubleshooting

A process that combines knowledge, experience, and intuition to quickly identify the cause of a problem.

Social Media Marketer

A professional who uses creative and technical skills to create content for social media platforms in order to reach and influence current and potential customers.

Internet Service Technician

A professional who works with telecommunications equipment and hardware to build infrastructures for networking, telephones, radio, and other communications channels.

Container

A program element, such as an array or vector, that holds a set of values.

Web Application

A program or app that uses the internet and a web browser to complete a task. The user's computer interacts with a remote server to access the app.

Task Manager

A program used by Windows to provide information about how a computer is performing and which processes and services are running at any given time.

Scripting language

A programming language that supports scripts and uses an interpreter that compiles the code line by line at runtime.

Object-Oriented Programming (OOP)

A programming paradigm based on the concept of objects that can contain both data and programming code.

Hypertext Transfer Protocol Secure (HTTPS)

A protocol that combines HTTP with the Secure Sockets Layer (SSL) protocol to securely transfer web content between computers.

Hypertext Transfer Protocol (HTTP)

A protocol that governs the transfer of web content between computers.

Domain Name System (DNS)

A protocol that helps internet users and network devices discover other devices using a human-readable hostname instead of numeric IP addresses.

Internet Message Access Protocol (IMAP)

A protocol used to receive email. With IMAP, email is saved on a server even after it is downloaded to a client.

Post Office Protocol 3 (POP3)

A protocol used to receive email. With POP3, email is deleted from a server after it is downloaded to a client.

Simple Mail Transfer Protocol (SMTP)

A protocol used to send email.

Blue Light

A range of the visible light spectrum, typically used to refer to light emitted from electronic devices, which can lead to eyestrain, headaches, fatigue, and long-term vision problems.

Device Management

A role of the operating system that determines the hardware that is connected to the system, interprets instructions from the hardware, and sends instructions to it. Device management includes managing device drivers.

Disk Management

A role of the operating system that helps keep storage devices well organized and maintained.

Application Management

A role of the operating system that manages applications or programs that are installed on a system. Applications are run, configured, and deleted through application management.

Access Control/Protection

A role of the operating system that requires users to log in with their credentials before accessing sensitive information on the computer. It also manages antivirus and antimalware software to prevent malicious files from accessing the computer.

Service Management

A role of the operating system that runs processes or programs automatically in the background. These programs are services that perform functions like indexing files for better searches, verifying that software is up to date, and backing up files.

Web Search

A search of the World Wide Web using a web browser, often done by visiting a web search engine site such as Google, Bing, or Yahoo.

Cookie

A small piece of data sent from a website and stored on a user's computer by the web browser while the user is browsing. Cookies are designed to help websites remember information such as items in an online shopping cart and entries in a web form so that the website can customize a web page for the user.

Transistor

A smaller, faster, cheaper, and more durable electronic device that replaced mechanical relays, which were slow and tended to wear down over time.

Runtime engine

A special interpreter that translates bytecode into computer specific machine language. Bytecode is a platform independent, low-level language that is compiled from source code.

Technical Support Specialist

A specialist that serves as the main contact for a company's help desk or support organization, often performing tasks such as recording help desk tickets, simple troubleshooting, researching a knowledge base, and providing basic support.

Optical Drive

A storage device that uses light instead of magnetism to store information. This include CD-ROM, DVD, and Blu-ray devices.

On-Demand Streaming

A streaming method that allows users to select and watch or listen to video or audio when they choose, rather than at a scheduled broadcast time.

Live Streaming

A streaming method that transmits data in real time as it is created.

Database

A structured set of data held in a computer, usually in a way that is accessible by multiple concurrent users.

Domain Name System (DNS)

A system and set of rules that associates domain names (such as web servers) with unique IP addresses so users can find and use network resources by an easily readable name instead of by IP address.

RSS

A system based on simple text files that are read by a program to provide a stream of updates or feed about a particular topic. RSS originally stood for RDF Site Summary but is also known as "really simple syndication" or "rich-site summary."

World Wide Web

A system for making digital resources publicly available over the internet using a web browser that paved the way for email, chatrooms, and social media sites.

PC Repair Technician

A technician who repairs both software and hardware issues including but not limited to installing, troubleshooting, servicing, and repairing devices, as well as network equipment such as routers, switches, cables, and related network hardware.

Wi-Fi

A technology that allows computers, smartphones, and other devices to communicate on a wireless network.

Asynchronous Technology

A technology that allows groups to communicate by taking turns, such as in emailing and text messaging.

Synchronous Technology

A technology that allows two or more groups to communicate in real time such as video conferencing, VoIP, or live streaming.

Satellite

A technology that sends signals to and from a satellite to establish connectivity to the internet through an ISP.

Voice over IP (VoIP)

A technology that sends voice phone calls using the TCP/IP protocol over digital data lines.

Cable

A technology that uses cable TV lines to establish high-speed connectivity to the internet through an ISP.

Cellular

A technology that uses cellular radio signals to establish connectivity to the internet.

Fiber optic

A technology that uses fiber optic cables that carry light signals to establish high-speed connectivity to the internet through an ISP.

Digital Subscriber Line (DSL)

A technology that uses phone lines to establish high-speed connectivity to the internet through an ISP.

Wi-Fi

A technology that uses radio signals to connect a device to an access point.

Near Field Communications (NFC)

A technology that uses specially encoded tags that respond in a specific way when scanned by a radio frequency reader. NFC is often used by placing a smartphone near a scanner to pay for an item in a store.

Dial up

A technology used in the early days of the internet that required a computer to make a phone call to the ISP to establish internet connectivity.

Bluetooth

A technology used to create wireless connections between computers and devices.

Software as a Service (SaaS)

A term associated with cloud hosting. SaaS provides users with the applications they need to do their day-to-day work through the cloud.

Power-on Self Test (POST)

A test that ensures that all the system's hardware is in working order before loading the operating system. During this test, an error message may display on the screen notifying you of the faulty component.

Virtual Private Network (VPN)

A tool that allows internet users to create a secure, private network when using a public internet connection. A VPN masks a user's IP address to make actions untraceable and shields the user's data from others.

Windows Application

A traditional desktop application or program.

Identifier

A user-defined name of a program element, such as a variable or constant.

Defragmentation

A utility in which all fragmented files on a drive are found and reconsolidated into the same physical location on the disk.

Registry Editor

A utility of the Windows operating system which lets you view and change all the keys in the registry, giving users greater control over their computers.

Subnet Mask

A value given to an address in a subnetted network that tells a computer which numbers are part of the network or subnet address and which are part of the host address.

Flowchart

A visual representation of the logic in a program.

Computer programming

A way of giving computers precise, line-by-line instructions to follow. Computer programming uses programming languages.

Crowdsourcing

A way of reaching out to a large group for help solving a problem. It can involve collecting ideas from users or professionals, or pooling money or resources from a variety of people.

File Compression

A way of reducing the size of files, making them easier to store.

Data Modeling

A way to help programmers and other related parties make sense of database information.

Pseudocode

A way to represent code in a manner that is easier for a wide range of people to understand.

Social Media Platform

A web-based technology to distribute information and encourage people to connect with others who share a common interest. Examples of social media platforms are Facebook, Twitter, LinkedIn, and Instagram.

External Hard Disk Drives

An HDD that can be connected as a peripheral to a computer.

Video Production Specialist

An IT professional who designs, records, and edits instructional videos, marketing materials, commercials, and other digital video content.

Web Designer

An IT professional who employs skills in color, font, layout, and images to create appealing and useful websites.

Digital Audio Producer

An IT professional who specializes in recording and editing high-quality audio for videos, podcasts, and many other purposes.

Encapsulation

An OOP concept that describes how data and methods are bundled together within one unit or class.

Logical Address

An address assigned by software and, as such, can be changed. It includes two parts, the network address and the host address. The most common types of logical addresses are those assigned by the IP protocol and are called IP addresses.

Ray Tracing

An advanced rendering method that is used to create incredibly realistic lighting effects for things like video games and movies.

Web Browser

An application for accessing information on the World Wide Web.

Artificial Intelligence

An area of computer science that focuses on intelligent machines.

Data type

An attribute attached to a value that tells the compiler or interpreter how the data should be used.

Beep Codes

An audible alarm that occurs when a computer encounters an issue before a power-on self test (POST) has completed when booting. The number and frequency of the beeps can be used to compare information found in the motherboard manual and identify the issue.

Podcast

An audio program split up into episodes that can be enjoyed on demand. Podcast topics can range from cooking, fashion, music, and about any other topic you can think of.

Hollerith's Tabulating Machine

An early computing machine that used punched cards and metal pins. It was used to compile the 1890 US census.

Report

An easy-to-read listing of the results of a query.

Microchip

An electronic device that allowed entire computers to be built into a single board, replacing modules for each part of the computer. Microchips paved the way for personal computer ownership.

Transmission Control Protocol (TCP)

An important protocol in the internet protocol suite that enables two hosts to establish a connection and exchange data.

User Datagram Protocol (UDP)

An important protocol in the internet protocol suite that is generally used when speed in transmission is more important than accuracy since the sending computer doesn't verify that the packets were correctly received.

Electrical Engineer

An industry professional who oversees the design and development of computer devices and other systems that use electricity and electronics.

Unicode

An international 16-bit encoding standard that accommodates character sets from multiple languages, with each letter, digit, or symbol being assigned a unique numeric value.

System Crash

An issue in which software problems cause the system to crash completely, possibly forcing the entire system to restart. This can cause data loss.

Wiki

An online encyclopedia that uses hyperlinks to connect each entry to other relevant entries.

Online Chat

An online written form of communication that is typically web based and used by businesses as customer service tools to assist online users who visit their websites.

Graphical User Interface

An operating system interface that allows a user to interact with the computer by displaying pictures, icons, and other images on a screen to represent files, folders, and system controls and by accepting input from a mouse or a touch screen.

Command Line Interface

An operating system interface that allows a user to interact with the computer by displaying text on a screen and accepting input from the keyboard. The input is entered as commands. The command line is used primarily by IT and other tech professionals.

Ethernet

Any wired network that conforms to the 802.3 protocols developed and maintained by the IEEE.

Academic Source

Books or articles written by experts who have credentials in a particular field of study.

Intellectual Property

Content that is owned by a copyright holder.

Downloading

Creating a copy of a file from a web or network server and saving it to your local computer. This allows a user to open the file at any time even if they don't have a network connection.

Operational Data

Data that is produced by an organization's everyday operations. It's gathered in real time to provide a snapshot of what's happening in the present.

Interference

Dense material (such as steel) or electronic devices (such as cordless phones) that reduce or block Wi-Fi signals.

Subnetting

Dividing a network into smaller subnets.

Cyberloafing

Employees using their company's internet connection for personal use on company time.

Green Computing

Environmentally sound policies that prescribe energy efficiency, recycling, and eco-friendly disposal of electronic equipment.

Analytical Data

Historical data that is used to help people make decisions in the present. It's various categories include market data, transactional data, sensor data, natural language, and machine data.

Raster Images

Images stored by dividing a picture into rows of pixels and collecting the color values of each pixel, in order, row-by-row.

Vector Images

Images stored by mathematically describing the shapes in the image. A circle might be stored as a center point and the distance from the center point to the circle's edge. A square is stored as four lines, each with a beginning point and a length. More complex shapes can be stored as a set of small lines.

Windows Settings App

In Windows 10, an application that organizes the settings and customizes how the computer looks and functions.

Output

Information that a computer returns to a user such as images on a screen, sounds from speakers, and printed pages.

Input

Information that a user physically enters into a computer by pressing a key on a keyboard, clicking a mouse, tapping a touch screen, pushing a button on a game controller, speaking into a microphone, etc.

Internet Service Providers (ISP)

Internet Service Providers (ISP) are organizations that provide many services for accessing and using the Internet.

Bitrate

Kilobits of audio data processed each second.

Predictive Policing

Law enforcement practice that involves analyzing data from traffic cameras, surveillance footage, and social media postings for the purpose of preventing crimes before they are actually committed.

Employee Monitoring

Observing and recording the activities of employees, sometimes without their direct consent.

Ethics

Personal behaviors that build responsibility and trust. Computer ethics requires more than just avoiding unlawful acts but also upholding standards such as confidentiality, human dignity, civility, and property rights.

Texting

Phone communication in written form sent through SMS (Short Message Service) that can be sent over a cellular network or the internet. Multimedia Messaging Service (MMS) is an extension of SMS that supports picture, audio, and video messaging.

Video Codecs

Pieces of software that either compress or decompress digital media.

Firmware

Preinstalled, read-only software on a device that tells it how to work.

ASCII

Pronounced ask-ee and short for American Standard Code for Information Interchange, the most common format for text files in computers on the internet where each character is represented by a unique 7-bit binary code. Extended ASCII uses an 8-bit binary code and allows for international characters.

Algorithm

Specific, step-by-step procedures that illustrate how a problem will be solved.

Compression

Reencoding a file to consume less storage space.

Secondary Source

Resources such as articles or books that review, analyze, or describe primary sources.

Primary Source

Resources such as original speeches, letters, poems, laws, scientific fieldwork, and artwork.

Consumer-level Source

Resources such as personal websites, online forums, news websites, and online magazines whose audience is consumers of information -- people looking for practical information to solve a problem, make a purchasing decision, or just become better informed on current events and issues.

Tertiary Source

Resources that compile or summarize material from other sources including bibliographies, abstracts, and online article indexes and databases.

Netiquette

Rules of etiquette that should be observed while using computer networks, such as the internet.

IEEE 802.11 Encryption Protocols

Security protocols that govern how data in a wireless network is secured by encryption. Examples of these protocols are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.

The Web

Short for World Wide Web. Digital content that is delivered over the Internet, usually through a web browser.

Modem

Short for modulator/demodulator, a network device that converts digital signals used by modern networks to analog signals that are typically carried by telephone or cable television lines.

Mobile Device

Small computing devices such as tablets and smart phones that are much more portable than desktops and laptops.

Business Software

Software designed for advanced or specialized business functions such as database management, project management, customer relationship management, accounting, desktop publishing, graphic design, and computer aided design.

Digital Assistant

Software found on almost every computer or smart device that makes a variety of tasks easier, especially by allowing you to control your device with just your voice. Examples of digital assistants are Apple's Siri, Microsoft's Cortana, Amazon's Alexa, and Google's Google Assistant.

Browser Extension

Software that adds functionality to a web browser.

Device Drivers

Software that allows an operating system to communicate with hardware devices, such as printers, video cards, scanners, and cameras.

Database Management System (DBMS)

Software that allows users to define, manipulate, retrieve, and manage data stored in a database. Examples are Microsoft SQL Server, Oracle Database, MySQL, and Microsoft Access.

Utility Software

Software that analyzes, configures, and optimizes the computer, including backup software, compression software, disk cleaners, and antivirus software.

Collaboration Software

Software that facilitates the sharing, processing, and management of files, documents and other data between members of a team. This software includes message boards, screen sharing, conferencing software, email, calendaring, instant messaging, text messaging, and online workspace and document sharing.

Productivity Software

Software that is used to perform common tasks in a business or home office such as word processing, spreadsheets, presentations, web browsing, and visual diagramming.

Software Subscription

Sometimes called SaaS or on-demand software, software that requires a monthly or annual fee to use the software and receive regular updates.

File Permissions

The use of user and file attributes that control which users can read, write, move, or delete each file.

CMOS

The CMOS, an acronym for complementary metal-oxide-semiconductor, is a chip where the BIOS settings are stored.

Synthesized DNA Strands

Synthetically produced artificial DNA that is capable of storing vast amounts of information and may be a solution to long-term massive storage.

Plagiarism

The act of taking someone else's work and passing it off as one's own.

Color Depth

The amount of memory the computer uses to display colors in a digital image or a digital video. 8-bit color images use one byte of data for each pixel. 24-bit color uses three bytes for each pixel.

Bit Depth

The amount of memory used to store the numeric value of a sound sample during digital sound recording. 8-bit sound uses eight bits (or one byte) to store the value of each sample. 16-bit sound uses two bytes per sample. Generally speaking, the better the bit depth, the better the sound.

Downlink

The data being transferred from the ISP to your computer.

Uplink

The data being transferred from your computer to the ISP.

Twisted Pair Category

The different types of twisted pair cabling that are defined by the several aspects of a cabl,e including its transmission specifications and intended use. Common categories include Cat 5e and Cat 6.

Supercomputers

The fastest, most powerful computers that exist at a given time. These computers have processing capabilities designed to solve problems that are too complex for regular computers. They play vital roles in the advancement of national defense, science, and social change.

Wireframes

The first step in designing a 3D model which provides the outline of the model, including only the vertices and lines without including any surfaces, textures, or lighting.

Citation Style

The format used for citing academic sources, including author, date of publication, and journal title.

Throughput

The measurement in bits per second that information is transferred through a network from one computer to another. Throughput is measured in Kbps (kilobits per second), Mbps (megabits per second), and Gbps (gigabits per second).

Storage Space

The measurement in bytes of the volume that a storage device can contain. Storage space is measured in kilobytes (1024 bytes), megabytes (1024 kilobytes), gigabytes (1024 megabytes), and terabytes (1024 gigabytes).

File System

The methods and structures that an operating system uses to organize files on a storage device like a hard drive. File systems often use directory structures to keep track of files.

Hard Disk Drive (HDD)

The most common type of long-term storage that uses thick magnetic disks encased in a protective housing to store data.

Frame Rate

The number of images, or frames, that are taken each second during digital video recording. Most digital videos have a frame rate of about 30 frames per second.

Sampling Rate

The number of individual samples taken each second during digital sound recording. Measured in Hertz, the higher the sampling rate, the better the recording. Most modern sound recordings are made at 44.1 kHz.

Resolution

The number of pixels in the width and height of each frame in a digital video recording. The higher the resolution, the clearer the image will be.

Processing

The operations performed by a computer to retrieve, transform, or classify information.

Sample

The part of a sound wave that is captured, measured, and assigned a numeric value during digital sound recording.

Buffering

The pre-loading of data from a stream into memory to help avoid interruptions while waiting for data that is received in bursts.

Processor Speed

The speed at which a computer processes information, as measured by the number of cycles per second (Hertz) that the computer's CPU operates at. Processor speed is measured in kilohertz, megahertz, and gigahertz.

Caching

The storing of images, sounds, web pages, and other information associated with particular websites that allows a browser to redisplay data without having to reload it from the website.

File Format

The way a file is organized. File formats are indicated by an extension such as .jpg, .gif, .png., .mp3, .wav, .wma, .mp4, .avi, and .wmv.

The Internet

The worldwide system of interconnected computers and public networks.

Internet Protocol (IP)

The principal communications protocol in the internet protocol suite that is used to route information over the Internet.

Internet Protocol (IP)

The principal communications protocol in the internet protocol suite that is used to route information over the internet.

Encryption

The process of converting information so it cannot be understood without decrypting it using a key, especially to prevent unauthorized access.

Partitioning

The process of dividing a single physical disk into multiple logical drives called volumes.

Hotspot/tethering

The process of providing access to a computer through the mobile device's cellular connection.

Virtualization

The process of running a virtual instance of a computer system on its own partition, creating a software-based version of something such as an application, server, network, or storage.

Journaling

The process of tracking changes to a file so that a file can be repaired or restored in case of file corruption or data loss.

Client-Side Scripting

The process of transferring source code from a web server to a web browser and running that code directly in the browser.

Universal Resource Locator (URL)

The reference or address to a resource on the Internet. Example: http://www.testout.com/home/about/privacy

Encoded Integers

The representation of integers using a group of bytes. Normally, one bit in one of the byes represents the sign, 1 for negative and 0 for positive. The remaining 31 bits are used to encode the number itself using binary digits.

Encoded Text

The representation of text by assigning a unique binary code to each character.

Netiquette

The rules of etiquette that should be observed while using computer networks, such as the internet.

Storage

The saving of information on memory chips, discs, or other storage media by a computer for later use.

Rendering

The second step in designing a 3D model which converts the models into 2D images on a computer.

File

The smallest container within a computer's storage system that is used to store information such as data, settings, and commands used in a computer program. A file is the smallest container that can be copied, deleted, or moved within a file system.

Bit

The smallest unit of digital information, represented by a 1 or 0.

Computer Science

The study of computers and computing concepts. In practice, computer science deals with creating software and using computers to solve problems.

Ergonomics

The study of how people function most effectively in their work environment.

Drive

The top-level folder, or directory, of a file system.

Physical Address

The unique, burned-into read-only memory address of a network interface. This is also called the media access control address, or MAC address. MAC addresses are burned into the read-only memory of every single network interface, such as wireless network adapters and network interface cards. This makes it virtually impossible to change the device's MAC address.

Cloud Computing

The use of remote services hosted on the internet to store, manage, and process data.

Heat-Assisted Magnetic Recording

Type of drive that allows bits of data to become smaller and more tightly packed together while still retaining data. It uses a tiny laser to briefly heat the recording surface of the hard drive to write the data making it more receptive to the effects of magnetism, which allow writing on much smaller areas than were possible before.

3D Flash Memory

Type of memory that implements tiers of solid-state flash memory stacked on top of each other allowing for much greater storage capacity at a lower cost than 2D flash memory.

Fragmentation

When parts of a single file, program, or application are stored in different areas of a physical disk.

UEFI

UEFI, which stands for Unified Extensible Firmware Interface, is a graphical boot tool that is utilized to configure the BIOS for the end user, offering several advantages including faster booting, supporting larger hard drives, and providing more security features.

Electromagnetic Interference

When an electrical current passes through any kind of copper wire, that creates an electromagnetic field just outside the wire.


संबंधित स्टडी सेट्स

Biology 12 - Reproductive System

View Set

PSY 207 Chapter 10 Guided Reading Questions

View Set

Chapter 14: The Market Labor and Other Factors of Production

View Set

Quiz Four- "The Nature of Ethical Disagreement" by Charles L. Stevenson

View Set

Weber Chapter 14: Assessing Skin, Hair, Nails

View Set