Computer Competency Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Virus

is a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged.

Wireless Range Extender

is a device that amplifies your wireless signal to extend to parts of a user's home that are experiencing poor connectivity.

Surge Protector

is a device that protects a computer against power surges.

Biometric Authentication Device

is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it ot a digital code.

Bookmarks (or Favorites)

is a feature that places a marker of the site's URL in an easily retrievable list in the user's browser's toolbar.

Cache Memory

is a form of RAM that gets data to the CPU for processing much faster than bringing the data in from the computer's RAM. There are three levels of cache memory, defined by their proximity to the CPU (level 1, 2, and 3 cache).

Really Simple Syndication (RSS)

is a format that sends the latest content of a podcast series automatically to an aggregator (an example would be Itunes).

Backward Compatibility

the ability of current devices to use earlier standards in addition to the current standard.

Physical Memory

the amount of RAM actually sitting on memory modules in a computer.

Cat 6 Cable

the best choice in UTP cables which is designed to achieve data transfer rates that support a gigabit Ethernet network.

Instruction Set

the collection of commands that a specific CPU can execute.

Assembly Language

the commands in an instruction set are written in this language instead of binary to make it easier for humans to understand.

Affective Computing

the development of computer systems that can recognize and simulate human emotions

Vacuum Tubes

the earliest generation of electronic computers used these as their switches.

Kernel

the essential component of the OS that is responsible for managing the processor and all other components of the OS.

Web 2.0

the faster Internet that developed as a result of more web applications appearing. It allowed users to contribute content easily and easily connect with each other

Mac OS

the first commercially available OS to incorporate a GUI (graphical user interface) with user-friendly point and click technology.

Power-On Self-Test (POST)

the first job BIOS performs which is to ensure that essential peripheral devices are attached and operational.

IBM PC

the first personal computer that was released by IBM in 1981. Due to companies being familiar with IBM mainframes, they were adopted quickly and dominated the market.

Altair 8800

the first personal computer, created in 1975

Osborne

the first portable computer that was released in 1981 by The Osborne Company. It weighed 24.5 pounds, had a 5-inch screen, and cost $1,795 (approximately $4,612 today).

Lisa

the first successful personal computer brought to market that utilized GUI (which was an Apple Product) in 1983.

Mosiac

the first web browser that was released in 1993. This allowed users to view multimedia on the web, causing internet traffic to increase by nearly 350%.

WordStar

the first word processing software which paved the way for Word for MS-DOS (the precursor to Microsoft Word) and WordPerfect.

Collaborative Consumption

the idea that technology has connected individuals in a way that enables them to join in groups to use products more efficiently

Binary language

the language of computers that consists of two digits: 0 and 1

Host

the location that maintains the computers that store the website files. Top-Level Domain: the suffix on a URL that indicates the kind of organization to which the host belongs. Examples would be ".com" ".edu", ".org" and ".net".

Motherboard

the main circuit board that contains the central electronic components of the computer

Gigabit Ethernet

the most commonly used wired Ethernet standard for home networks. A data transfer rate of 1 gigabit per second is possible when using this standard.

Service Set Identifier (SSID)

the name of a wireless network used to identify it. Firmware: read-only memory that has software written to it. Routers use firmware.

Camera Resolution

the number of data points a camera records for each image captured.

CPU Usage

the percentage of time the CPU is working.

Random Access Memory (RAM)

the place in the computer where the programs and data that the computer is currently using are stored. RAM is a temporary or volatile storage location. Saved data is stored elsewhere

Universal Serial Bus (USB) Port

the port most commonly used to connect input and output devices to a computer

Virtual Memory

the process of optimizing RAM storage by borrowing hard drive space.

Data Mining

the process of searching huge amounts of data in order to find a pattern

Synchronizing (syncing)

the process of updating your data so your to-do lists, schedules, and other files on your cell phone and computer, to make them the same.

Operating System (OS)

the program that controls how the computer system functions

Hypertext Transfer Protocol (HTTP)

the protocol that allows files to be transferred from a web server so that a user can see it on their computer.

Ergonomics

the science that deals with the design and location of machines and furniture so that people using them aren't subjected to an uncomfortable or unsafe experience

Software

the set of computer programs that enables the hardware to perform different tasks

Application Software

the set of programs on a computer that carry out tasks

System Software

the set of programs that allow a computer's hardware devices and application software to work together

Clock Cycle

the steady beats or ticks of the system clock that set the pace (clock speed) by which the computer moves from process to process.

Operating System (OS)

is a group of programs that controls how a computer functions. It manages the computer hardware (such as processor, memory, and storage devices), provides a consistent means for application software to work with the central processing unit (CPU), and is responsible for the management, scheduling, and coordination of tasks. Examples of operating systems include Windows 7, Windows 8, Windows 10, iOS 7, Android 4.4, and Linux.

Botnet

is a large group of software programs that runs autonomously on zombie computers.

Metropolitan Area Network (MAN)

is a large network designed to provide access to a specific geographic area, such as an entire city.

Local Area Network (LAN)

is a network in which the nodes are located within a small geographical area.

Global Positioning System (GPS)

is a network of 21 satellites that constantly orbit the earth and send information to GPS devices to determine the user's geographical location.

Personal Area Network (PAN)

is a network used for communication among devices close to one person, such as smartphones, notebooks, and tablets using wireless technologies such as Bluetooth or WiFi.

Blog (short for weblog)

is a personal log or journal that is posted on the web. Video Log (Vlog): is a blog that uses video as the primary content.

Thunderbolt Port

is a port that allows users to connect up to six different peripherals to their computer

Virus Signature

is a portion of a virus code that's unique to a particular computer virus.

Machine Cycle

is a process in which a CPU performs a program instruction by fetching, decoding, executing, and storing.

Packet Analyzer (Sniffer)

is a program developed by hackers that looks at each packet of data as it travels on the internet. Used often for identity theft on Public WiFi locations such as a coffee shop.

Trojan Horse

is a program that appears to be something useful or desirable, like a game or a screen saver, but while it runs, it does something malicious in the background, without the user's knowledge.

Master Boot Record

is a program that executes whenever a computer boots up, ensuring that the virus will be load into memory immediately, even before some virus protection programs can load.

Spooler

is a program that helps coordinate all print jobs currently being sent to a printer.

Codec (compression/decompression)

is a rule, implemented in either software or hardware, that squeezes the same audio and video information into less space.

Graphics Processing Unity (GPU)

is a separate processing chip specialized to handle 3-D graphics and image and video processing with incredible efficiency and speed.

Digital Convergence

the use of a single unifying device to handle media, Internet, entertainment, and telephony needs. An example would be smartphones.

Telephony

the use of equipment to provide voice communications over a distance.

Social Networking Tools

tools like Facebook and Twitter that enable groups of people to connect and share ideas

methods, such as e-mail or network connections, to spread on their own. Script

is a series of commands that is executed without the user's knowledge. Macro Virus: is a virus that attaches itself to a document that uses macros. E-Mail Virus: use a user's address book in their e-mail to distribute the virus.

Internet Protocol (IP) Address

is a set of four groups of numbers separated by periods which are the means by which computers connected to the internet identify each other. It is similar to a license plate but instead of identifying your vehicle it identifies your computer. An example would be 72.21.211.176

Redundant Array of Independent Disks (RAID)

is a set of strategies for using more than one drive in a system. RAID 0 and RAID 1 are the most popular options for consumer machines.

Plug and Play (PnP)

is a software and hardware standard designed to facilitate the installation of new hardware in personal computers by including in the OS the drivers these devices need in order to run.

Firewall

is a software program or hardware device designed to protect computers from hackers. One designed for home networks is referred to as a personal firewall.

Home Area Network (HAM)

is a specific type of LAN located in a home.

World Wide Web (www.)

is a subset of the internet dedicated to broadcasting HTML pages, which is the most common means by which users access information over the internet.

Digital Rights Management (DRM)

is a system of access that allows only limited use of material that has been legally purchased (normally in terms of digital music but not limited to it).

Pipelining

is a technique that allows the CPU to work on more than one instruction (or stage of processing) at the same time, thereby boosting CPU performance.

Surround Sound

is a type of audio processing that makes the listener experience sound as if it were coming from all directions by using multiple speakers.

Scareware

is a type of malware that downloads onto a user's computer and tries to convince them that their computer is infected with a virus or other type of malware.

Network Interface Card (NIC)

is a type of network adapter that comes installed in all desktops, laptops, smartphones, and tablets.

Polymorphic Virus

is a virus that changes its own code or periodically rewrites itself to avoid detection.

Time Bomb

is a virus that is triggered by the passage of time or on a certain date. Worm: a worm is different than a virus as it takes advantage of file transport

Logic Bomb

is a virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times.

Wireless Fidelity (WiFi)

is a wireless Ethernet network.

End User License Agreement (EULA) or Software License

is an agreement between the user and the software company. Users accept this agreement before installing the software on their machine. It is a legal contract that outlines the acceptable uses of the program and any actions that may violate the agreement.

Beta Version

is an application that is still undergoing development. Developers distribute Beta Versions in hopes users will report errors and bugs they come across.

Sound Card

is an expansion card that attaches to the motherboard inside your system unit and enables the computer to drive the speaker system.

Video Card (or Video Adapter)

is an expansion card that's installed inside the system unity to translate binary data into images a user views on their monitor.

Data Plan

is an internet connectivity plan that must be purchased for smartphones.

Linux

is an open source OS designed for use on personal computers and as a network OS. Linux has a reputation as a stable OS that is not subject to crashes or failures because the code is open and available to anyone, so it can be modified or updated quickly by hundreds of programmers around the world.

Microsoft Windows

is an operating environment that incorporates a user- friendly, visual interface like the one that was first introduced by Apple's OS.

Spam Filter

is an option a user can select in their e-mail account that places known or suspected spam message into a special folder (called Spam or Junk Mail).

Spyware

is an unwanted piggyback program that usually downloads with other software you install from the internet and runs in the background of your system.

Multimedia

is anything that involves one or more forms of media in addition to text. This includes Graphics, Audio files, and Video files.

Piggybacking

is connecting to a wireless network without the permission of the owner.

Freeware

is copyrighted software that users can use for free. However, users need to be on guard for viruses and malware as some use freeware to get users to allow them to breach the security of their personal computer.

Multipartite Virus

is designed to infect multiple file types in effort to fool the antivirus software that is looking for it.

Web-Based E-Mail

is e-mail such as Yahoo! Mail or Gmail that is managed within a user's web browser and allows them to access their e-mail from the web.

Open Source Software

is free software that is available with few licensing and copyright restrictions. This allows a community of users to improve and alter the software.

Tagging (or Social Bookmarking)

is like bookmarking but instead of saving the website to the user's browser for only themselves, it is saving it to a social bookmarking site so that the user can share it with others.

Streaming Media

is multimedia (audio and video) that is continuously fed to a user's browser so they avoid having to wait for the entire file to download completely before listening or watching it. An example of a service that provides streaming would be Pandora or Spotify.

Menu-Driven Interface

is one in which a user choose commands from menus displayed on the screen.

Command-Driven Interface

is one in which you enter the commands to communicate with the computer system. This refers to DOS.

Software Suite

is proprietary software that is bundled as a package such as Microsoft Office or Apple iWork.

Secure Sockets Layer

is protocol that has been applied to manage the security of a website. This is the difference between websites that have "http://" and "https://" in the beginning of their URL.

Vertical Market Software

is software designed for a specific industry, such as property management software for real estate professionals.

Web Browser

is software that allows users to display and interact with text and other media on the web. Examples include internet explorer, mozilla firefox, safari, and google chrome

System Software

is software that helps run the computer and coordinate instructions between application software and the computer's hardware devices.

Proprietary Software (or Commercial Software)

is software users buy, such as Microsoft Office. These can be purchased online or on a CD or DVD.

Web-Based Applications (Software as a Service aka SaaS)

is software which the vendor hosts online and users can access over the internet without having to install it on their computer.

Hacker

is someone who breaks into computer systems to create mischief or steal information.

Antivirus Software

is specifically designed to detect virus and protect a user's computer and files from harm.

Keystroke Logger (Key Logger)

is spyware that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

Webcast

is the (usually live) broadcast of audio or video content over the Internet. The real time/live content is what helps separate it from podcasts which are normally pre-recorded.

Copyleft

is the concept of redistributing modified open source software under the same terms as the original software. Thus, all enhancements, additions, and other changes to copyleft software must also be distributed as free software.

4G

is the latest service standard and offers the fastest data-access speeds over cell- phone networks.

Word Size

is the number of bits a computer can work with at a time.

Arithmetic Logic Unit (ALU)

is the part of the CPU designed to perform mathematical operations such as addition, subtraction, multiplication, and division and to test the comparison of values such as greater than, less than, and equal to.

Ethics

is the study of the general nature of morals and of the specific moral choices individuals make.

Base-10 Number System (Decimal Notation)

is the system used to represent all of the numeric values used in everyday life. It is called base 10 because it uses 10 digits to represent any value (0-9).

Spam

is unwanted or junk e-mail

Task Manager

is used if a program has stop working. It allows a user to check on the program or to exit the nonresponsive program.

Electronic Ink (E Ink)

is very crisp, sharp grayscale representation of text used in E-Readers.

Platform

is what computer's combination of an OS and a specific processor is referred to as.

Sleep Mode

is when a computer enters a state where all of the documents, applications, and data that were in use remains in RAM, allowing them to be quickly accessed again when the computer is restarted

Cold Boot

is when a user starts a computer when the computer is in a completely turned off state

Image Backup (or System Backup)

is when all system, application, and data files are backed up, not just files that change.

Peer to Peer (P2P) Network

is when each node connected to a network can communicate directly with every other node on the network.

Inoculation

is when the antivirus software records key attributes about your computer files, such as file size and date created, and keeps these statistics in a safe place on the hard drive.

Base Transceiver Station

large communication towers with antennas, amplifiers, receivers, and transmitters.

Multiuser Operating System or Network Operating System

lets more than one user access the computer system at a time by handling and prioritizing request from multiple users. An example of which would be UNIX.

Machine Language

long strings of binary code that the control unit uses to set up hardware in the CPU for the rest of the operations it needs to perform.

Phishing

lures internet users to reveal personal information such as credit card numbers, social security numbers, or other information that could lead to identity theft.

Ethics Involving Technology

topics to be considered when dealing with technological ethics include social justice, intellectual property, privacy, e- commerce, electronic communication, computer abuse, and many others. Refer to pages 208-219 of your text book for detailed examples and explanations of each.

Router

transfers packets of data between two or more networks.

Types of Wired Connections

twisted-pair cable (made up of copper wires that are twisted around each other and surrounded by plastic), coxial cable (consists of a single copper wire surrounded by layers of plastic), and fiber-optic cable (made up of plastic or glass fibers that transmit data at extremely fast speeds).

Fiber-Optic Service

uses fiber-optic lines to connect a user's computer to the internet.

Digital Subscriber Line (DSL)

uses twisted-pair cable to connect a user's computer to the internet.

Authentication

verification of a user's login name and password. This process blocks unauthorized users from entering the system.

Macintosh

was an improved version of Lisa released by Apple in 1984. It could do everything Lisa could and then some, but it only cost a third of the price of Lisa. It was also the first personal computer to utilize the 3.5-inch floppy disks with a hard cover.

Windows 95

was the first Microsoft OS designed to be principally a GUI OS, which was released in 1995. It included Internet Explorer which is a browser that integrated web functionality into Microsoft Office applications and Windows 95 OS.

Pascalene

was the first accurate mechanical calculator which was invented by Blaise Pascal in 1642. It utitilized revolutions of gears to count by tens. It could add, subtract, multiply, and divide.

Microsoft Excel and Lotus 1-2-3

were also spreadsheet programs that were released in 1983. Their popularity lead to VisiCalc going out of business.

Node

what a device connected to a network is considered.

Base-2 Number System (Binary Number System)

what computers use instead of Base-10 Number System, which involves using either a 1 or a 0. This is because each switch can be in one of two positions: on or off.

Distributed Denial-of-Service

when a hacker performs a DoS attack from more than one zombies (sometimes thousands) at the same time.

Satellite Internet

when a satellite dish is placed outside a user's home and is connected to their computer with a coaxial cable.

Overclocking

when a user runs the CPU at a faster speed than the manufacturer recommends. This increases speed but also produces more heat, meaning a shorter lifetime for the CPU and usually voids any warranty on the product.

Quarantining

when antivirus places a virus in a secure area on the user's hard drive so that it won't spread to other files.

Logical Port Blocking

when firewalls ignore requests that originate from the internet for access to certain ports.

Denial-of-Service (DoS) Attack

when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie.

Drive-By Download

when malicious web sites find exploits in a computers operating system and download harmful software onto a user's computer.

Parallel Processing

when there is a large network of computers, with each computer working on a portion of the same problem simultaneously.

CPU Usage Graph

windows records and graphs the CPU usage for the past minute and is visible in the Task Manager.

Real-Time Operating System (RTOS)

machinery that performs a repetitive series of specific tasks in an exact amount of time. These require minimal user interaction. This type of OS is a program with a specific purpose, and it must guarantee certain response for particular computing tasks; otherwise, the machine is useless. This is used for devices that must perform regimented tasks or record precise results - such as measurement instruments found in the scientific, defense, and aerospace industries.

File Compression Utility

makes a large file more compact, making easier and faster to send in large attachments by e-mail, to upload on the web, or to save to a disc. Examples of which include WinZip and WinRar.

Tethering

makes sure that as long as a user has 3G/4G signal, their computer can access the internet even when it tells the user there are no available wireless networks.

Control Unit

manages the switches in a CPU. It is programmed by CPU designers to remember the sequence of the processing stages for that CPU and how each switch in the CPU should be set (either on or off) for each stage of the Machine Cycle (fetch, decode, execute, and store).

Input

manipulates, calculates or organizes that data into information

ASCII

most of today's personal computers use this, which represent each letter or character as an 8-bit binary code.

Identity Theft

occurs when a thief steals personal information such as name, address, social security number, birth date, bank account number, and credit card information and runs up debt in the person's name.

Pharming

occurs when malicious code is planted on a user's computer, either by viruses or by visiting malicious websites, which then alters their browser's ability to find web addresses.

Short Message Service (SMS)

often referred to as texting, is a technology that lets you send short text messages (up to 160 characters) over cellular networks.

Gigabyte (GB)

one billion bytes

Megabyte (MB)

one million bytes

Kilobyte (KB)

one thousand bytes

Terabyte (TB)

one trillion bytes

Stakeholders

people or entities who are affected by operations of a business.

Productivity Software

programs that lets users perform various tasks required at home, school, and business and includes word processing, spreadsheet, presentation, database, and personal information management programs.

Computer Aided Design (CAD)

programs used by engineers to create automated designs, technical drawings, and 3-D model visualizations. An example would be Autodesk's AutoCAD.

File Transfer Protocol (FTP)

protocol that is often used when a user has large files to upload or download.

Ethernet Port

a connectivity port that resembles a standard phone jack that allows the transfer of data at speeds up to 10,000 Mbps, mostly commonly used to connect to the internet or a cable modem

Core

a core on a CPU contains the parts of the CPU required for processing. Hyperthreading: provides a quicker processing of information by enabling a set of instruction to start executing before the previous set has finished.

Computer

a data processing device that gathers data or allows users to enter data

Network-Ready Device

a device that can be connected directly to a network. This can be done either through a wired or wireless connection.

Input Device

a device that enters data into a computer like a keyboard, mouse or stylus

Output Device

a device that sends processed data out of a computer in the form of text, pictures, sounds or video like a monitor or printer

Solid-State Drive

a drive with no moving parts that runs with no noise, emit little heat and require little power

External Hard Drive

a drive with similar storage capacities to an internal drive that resides outside the system and connects to it through a port

Podcast

a form of digital media compromised of a series of audio or video files that are distributed over the Internet. These services deliver their content using Really Simple Syndication (RSS).

Flash Drive

a form of storage that uses solid-state flash memory and stores information on an internal memory chip. Sometimes referred to as a jump drive, USB drive or Thumb drive

Ultrabook

a full-featured but lightweight laptop computer designed to compete with the MacBook Air

Internal Hard Drive

a hard drive that resides within the system unit and usually holds all permanently stored programs and data

Beginners All-Purpose Symbolic Instruction Code (BASIC)

a language that beginning programming students could easily, created in 1964.

Tablet PC

a laptop with a monitor that swivels or folds flat

Mainframe

a large, expensive computer that supports many users simultaneously

QR (quick response) codes

a marketing technology that allows any piece of print host a link to online information and video content

Hertz (Hz)

a measurement for the speed of the processor

SuperFetch

a memory-management technique utilized by windows that monitors the applications a user uses the most and preloads them into your system memory so that they'll be ready to be used when you want them.

Ethernet Network

a network that uses the Ethernet protocol as the means by which the nodes on the network communicate. Examples would be home and corporate networks.

Commodore PET

a personal computer aimed at the business market that did well in Europe in 1977.

Apple I

a personal computer released by Steve Wozniak and Steve Jobs in 1976. The two also formed Apple Computer Company in the same year.

FireWire 800 Port

a port common with apple computers that provides a transfer rate of 800 Mbps which benefit devices such as external hard drives and digital video cameras due to the speedy data transfer ability

Tablet Computer

a portable computer (iPad or Samsung Galaxy Tab) integrated into a flat multitouch-sensitive screen

Laptop or Notebook Computer

a portable computer that has a keyboard, monitor and other devices integrated into a single compact case

Inkjet Printer

a printer that sprays tiny drops of ink onto paper

Laser Printer

a printer that uses laser beams and static electricity to deliver toner onto the correct areas of the page. It can create high-resolution images

Thermal Printer

a printer that uses melted wax-based ink or burns dots onto specially coated paper

Impact Printer

a printer with tiny hammer-like keys that strike the paper through an inked ribbon to transfer marks onto the paper

Network Address Translation (NAT)

a process used by firewalls to assign internal IP addresses on a network.

Basic Input/Output System (BIOS)

a program that manages the exchange of data between the OS and all the input and output devices attached to the system.

Data

a representation of a fact, a figure or an idea

Cloud Storage

a service that keeps your files on the Internet rather than storing them only on a local device

Personal Ethics

a set of formal or informal ethical principles you use to make decisions in your life.

Software

a set of instructions that tells the computer what to do.

Search Engine

a set of programs that searches the web for keywords and then returns a list of the sites on which those keywords are found. The most popular search engine today is Google.

Macro

a small program that groups a series of commands so that they will run as a single command. These are best used to automate a routine task or a complex series of commands that must be run frequently.

Netbook

a small, lightweight laptop computer that is usually 7-10 inches wide and has a longer battery life than a laptop

Plug-in (or a player)

a special software component that adds a specific feature to an existing software program. Examples include adobe reader, flash player, quicktime player, shockwave player, Silverlight, and windows media player.

Digital Signal Processor

a specialized chip in phones that handles the compression work required. Unlike the phone's processor, this can perform mathematical operations required to compress quickly.

Embedded Computer

a specially designed computer chip that resides in another device

Supercomputer

a specially designed computer that can perform complex calculations very rapidly

Mobile Switching Center

a station in a central location that passes the requests of phones.

Subject Directory

a structured outline of websites organized by topic and subtopics.

Computer Forensics

a technique used in criminal justice that analyzes computer systems to gather possible legal evidence

Cognitive Surplus

a term used to describe how the Internet has created a new combination of leisure time and the tools to be creative

Digital Divide

a term used to describe the gap in levels of Internet access and access to technology in different places in the world

Crisis-Mapping Tool

a tool that collects information from e-mails, text messages blog posts and Twitter tweets, maps that information and makes it publically available

Broadband

a type of connection that offers a means to connect to the Internet faster throughput. Also called high-speed Internet.

Wiki

a web application that allows users to add, remove, or edit its content. The most well-known and popular being Wikipedia.

Bluetooth Technology

a wireless transmission standard that connects devices such as smartphones, tablets and laptops to peripheral devices such as keyboards and headsets

Switch

acts as traffic signal on a network. They receive data packets and send them to their intended nodes on the same network.

Graphical User Interface (GUI)

allowed users to interact with their computers more easily versus having to use complicated command- or menu-driven interfaces. Apple was the first company to take full commercial advantage of GUI but it was not invented by them.

File History

allows Windows to automatically create a duplicate of your libraries, desktop, contacts, and favorites and copy it to another storage device, such as an external hard drive. This protects your data in the event your hard drive fails or files are accidently erased.

Network Adapter

allows different nodes on a network to communicate with each other and access the network.

Network Navigation Devices

allows packets (bundles of data) to flow between nodes on a network.

Desktop Publishing (DTP) Software

allows professionals to design books and other publications that require complex layouts. An example would be Microsoft Publisher.

System Clock

allows the motherboard to move from one stage of the machine cycle to the next.

Electronic Mail (E-Mail)

allows users on the internet to send communications to other users and is considered the most widely used form of communication on the internet.

Wireless Internet Service Provider (Wireless ISP)

allows users to connect smartphones to the Internet.

Word Processing Software

allows users to create and edit documents such as research papers, and class notes.

Presentation Software

allows users to create high-quality presentations without a lot of training. They are generally considered simple to use. An example would be Microsoft PowerPoint.

Drawing Software

allows users to create or edit 2-D, line based drawings

Custom Installation

allows users to decide which features they want installed on their hard drive, which allows them to save space on their hard drive.

Image-Editing Software

allows users to edit their photos. An example would be Adobe Photoshop which allows users to remove red-eye from photos, modify the contrast and sharpness in an image, among many other features.

Simulation Programs

allows users to experience or control the software as if it were an actual event. These are utilized to teach military flight training, surgical instrument training, and machine operation training. These allow users to take risks and learn from their mistakes without any real life consequences.

User Interface

allows users to interact with their OS. Examples are the desktop, icons, and menus.

Spreadsheet Software

allows users to make calculations and perform numerical analyses. It is often used to keep track of expenses and budgets. An example would Microsoft Excel.

Personal Information Manager (PIM) Software

allows users to manage e-mail, contacts, calendars, and tasks all in one place. The most commonly used one can be considered Microsoft Outlook.

Tax Preparation Software

allows users to prepare their state and federal taxes on their own instead of hiring a professional. Two examples would be Intuit TurboTax and H&R Block At Home.

Digital Video-Editing Software

allows users to refine their videos by cutting out unwanted segments and adding audio tracks as well as other editing tools. Examples include Adobe Premiere Pro, Apple's Final Cut Pro, and Windows Movie Maker.

Multimedia Message Services (MMS)

allows users to send messages that include text, sound, images, and video clips to other phones or e-mail addresses.

Internet Service Providers (ISPs)

allows users to share an internet connection. Examples of providers would be Comcast, Optimum, and Verizon FioS.

Database Software

allows users to store and organize data. It is generally used for larger and more complicated data that would be burdensome to use in a spreadsheet. Examples include Oracle, MySQL, and Microsoft Access.

IT

an acronym for Information Technology, a field of study that focuses on the management and processing of information and the automatic retrieval of information

Event

an action, such as a keystroke, to which an OS responds to.

Apple II

an improvement on Apple I released in 1977 that included a color monitor, sound, and game paddles.

Program

an instruction set that provides a means for users to interact with and use the computer without the need for programming skills.

Application Programming Interface (API)

rather than having the same blocks of code for similar procedures in each program, the OS includes blocks of code, API -that application software needs in order to interact with the CPU.

Social Networking

refers to using the web to communicate and share information among friends and others. Examples include (but not limited to) Facebook, Twitter, Youtube, Flickr, and Pinterest.

Netscape

released in 1994, was a web browser which became a predominant player in browser software. In 1998 Netscape was made available for no charge and made their code available to the public.

E-Mail Client

requires a program, such as Microsoft Outlook, to be installed on a user's computer and helps manage e-mails.

Encryption Virus

run a program that searches for common types of data files, such as Microsoft word or excel files, and compresses them using a complex encryption key that renders the files unusable.

Storage

saves data and information for later use

Metasearch Engines

search engines that search other search engines rather than individual websites. An example would be Dogpile.com.

Network

simply to or more computers that are connected via software and hardware so they can communicate with each other.

Utility Programs

small applications that perform special functions on the computer.

Application Software

software used to do tasks at home, school, and work (includes productivity software, business software, and media/entertainment software).

Wide Area Network (WAN)

spans a large physical distance. The largest WAN is the internet.

Device Driver

special programs for devices that facilitates communication between the device and the OS. The device driver translates the device's specialized commands into commands the OS can understand, and vice versa.

Network Operating System (NOS)

specialized software for client/server networks. This software handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes.

System Requirements

specifies the minimum recommended standard for the operating system, processor, primary memory, and hard drive capacity needed to run a software program.

Sampling Rate

specifies the number of times the analog is measured each second when it comes to digital music.

Bluetooth

technology that uses radio waves to transmit data signals over distances up to approximately 300 feet.

CPU (Central Processing Unit)

the CPU controls all of the functions performed by the computer's other components and processes all the commands issued to it by software instructions. It is often referred to as the "brains" of the computer

Interrupt and Interrupt Handler

an interrupt is a unique signal that tells the OS that it is in need of immediate action. Every device has its own type of interrupt, which is associated with an interrupt handler, a special numerical code that prioritizes the requests. These requests are placed in the interrupt table in the computer's primary memory. The OS processes the task assigned a higher priority before processing a task assigned to a lower priority. This is called preemptive multitasking.

MS-DOS

an operating system written by Bill Gates and Microsoft for IBM computers and Intel chips in 1980.

Flash Memory Card

another form of portable storage that uses solid-state flash memory such as an SD card, however not all desktop and laptops include the slot for these and may require plugging in a memory card reader via a USB port. They tend to be very small, some even smaller than a the size of a postage stamp

TRS-80

another personal computer released in 1977 that sold approximately 10,000 units the U.S. consumer market.

Hardware

any part of the computer you can physically touch

Cellular Phones (Cell Phones)

any phone that uses mobile, cellular technology. Feature Phones: inexpensive phones that have modest processors, simpler interfaces, and often no touch screen.

Grey-Hat Hackers

are a cross of the two. They often illegally break into systems to merely flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches.

Backups

are copies of the files that a user can use to replace the original if they're lost or damaged.

Optical Drive

are disc drives that use a laser to store and read data. Data is saved to a compact disc (CD), a digital video disc (DVD) or a Blu-ray disc (BD) within established tracks and sectors, just like on a hard drive.

Transistors

are electrical switches built out of layers of a special type of material called semiconductor (any material that can be controlled either to conduct electricity or to act as an insulator)

Template

are included in many productivity applications and provide the basic structure for a particular kind of document, spreadsheet, or presentation.

CPU Benchmarks

are measurements used to compare performance between processors.

Backdoor Programs and Rootkits

are programs that allow hackers to gain access to your computer and take almost complete control of it without the user's knowledge. Computers controlled this way by hackers are referred to as Zombies.

Instant Messaging (IM)

are programs that let users communicate in real time over the internet.

Memory Modules (or Memory Cards)

are small circuit boards that hold a series of RAM chips and fit into special spots on the motherboard.

Utility Programs

are small programs that perform many of the general housekeeping tasks for a computer, such as system maintenance and file compression.

Cookies

are small txt files that some website automatically store on a user's hard drive when you visit them.

Home Network Server

are specialized devices designed to store files, share files across the network, and back up files on computers connected to the network.

Hyperlinks

are specially coded elements that let a user jump from one web page to another either within the same website or to another website all together.

Electronic Text (E-Text)

are textual information captured digitally so that it can be stored, manipulated, and transmitted by electronic devices.

Microprocessors

are the chips that contain a central processing unit (CPU).

Electric Switches

are the devices inside the computer that are flipped between the two states of 1 and 0, signifying "on" and "off".

Integrated Circuits (or Chips)

are tiny regions of semiconductor material that support a huge number of transistors.

Distributions or Distros

are various packages of Linux available for download. They include the underlying Linux kernel and special modifications to the OS, and may include additional open source software.

Crowdfunding

asking for small donations from a large number of people, often by using the Internet

Boolean Operators

assist in refining a search. Words such as AND, NOT, and OR help describe the relationship between keywords in a search.

White-Hat Hackers

break in to systems for nonmalicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses.

Black-Hat Hackers

break into systems to destroy information or for illegal gain.

Crowdsourcing

checking in with the voice of the crowd

Mobile Broadband

connects users to the internet through the same cellular network that cell phones use to get 3G or 4G internet access.

Registry

contains all the different configurations (settings) used by the OS and by other applications.

Analog-to-Digital Converter Chip

converts a user's voice's sound waves into digital signals.

Full Installation

copies all the most commonly used files and programs from the distribution disc to a user's computer's hard drive.

Information

data that has been organized or presented in a meaningful fashion

Moore's Law

describes the pace at which the central processing unit (CPU) improve. This rule predicts that the number of transistors inside a CPU will increase so fast that CPU capacity will double about every two years. This rule of thumb has held true for over 45 years.

VisiCalc

developed by Dan Bricklin and Bob Frankston, VisiCalc was a computer spreadsheet program that was released in 1978 and helped users see the benefit of owning a personal computer.

Disk Operating System (DOS)

developed by Wozniak and introduced in 1977, was the operating system that controlled the first Apple computers.

E-Readers

devices that can display e-text and have supporting tools, like note taking, bookmarks, and integrated dictionaries.

Clock Speed

dictates how many instructions the CPU can process each second.

Touch Screens

display screens that respond to commands initiated by touching them with a finger or stylus or other body part

Process

displays data and information in a form suitable for the user

Binary digit

each 0 or 1 referred to as a bit for short

Byte

eight binary digits combined

Transmission Media

establish a communications channel between nodes on a network.

Whole-House Surge Protectors

function like surge protectors but instead protect all electronic devices in the home.

Connectivity Port

gives a user access to networks and the Internet, an example would be an Ethernet Port

Power Supply

hardware that is stored inside the system unit of a computer that transforms the wall voltage to voltages required by computer chips. Required to turn a computer on and off

Accounting Software

helps small business owners manage their finances more efficiently by providing tools for tracking accounts receivable and accounts payable. They also offer inventory management, payroll, and billing tools.

Financial Planning Software

helps users manage their daily finances. These tend to include electronic checkbook registers and automatic bill payment tools.

Wizard

helps walks users through the steps necessary to complete a complicated task. At each step in the process the wizard will ask the users questions and based on their responses, it helps them complete that portion of the task. This is most commonly used when installed new software on a computer.

Course Management Software

in addition to traditional classroom tools such as calendars and grade books, these programs provide special areas for students and instructors to exchange ideas and information through chat rooms, discussion forums, and e-mails. The most notable course management software utilized by higher education is Blackboard.

Network Administration

in charge of tasks such as installing new computers and devices, monitoring the network to ensure it's performing efficiently, updating andinstalling new software on the network, as well as configuring proper security for a network.

Multimedia Software

includes digital image- and video-editing software, digital audio software, and other specialty software required to produce computer games, animations, and movies.

Network Architectures

includes the distance between nodes, the way in which the network is managed, the set of rules or protocol used to exchange the data between network nodes, and the communications medium used to transport data.

Audio -Editing Software

includes tools that make editing audio files as easy as editing text files. An example would be the open source software Audacity.

Jacquard Loom

invented by Joseph Jacquard around 1840 revolutionized the fabric industry by automating the weaving of complex patterns.

Incremental Backup (or Partial Backup)

involves backing up only files that have changed or have been created since the last backup was performed.

Pretexting

involves creating a scenario that sounds legitimate enough that someone will trust you.

Hexadecimal Notation

is a base- 16 number system. This includes 0-9 as well as A-F.

All-in-one Computer

a computer that eliminates the need for a separate tower by housing the computer's processor and memory in the monitor

Server

a computer that receives the request for data from the Client and returns the data to the Client

Video Memory

RAM that is included on all video systems.

Throughput

The actual speed of data transfer that is achieved.

System Files

The main files of the OS.

System Restore

a Windows utility that allows a user to roll their system settings back to a specific date when everything was working properly. A system restore point is a snapshot of the user's entire system settings, is generated prior to certain events, such as installing or updating software, or automatically once a week if no other restore points were created in that time. These can also be created manually.

Error-Checking

a Windows utility that checks for lost files and fragments as well as physical errors on a user's hard drive.

Cable Internet

a broadband service that transmits data over the coaxial cables that also transmit cable television signals.

High-Definition Multimedia Interface (HDMI) Port

a compact audio-video interface that allows both HD video and uncompressed digital audio to be carried on one cable

Peripheral Device

a component like a monitor or keyboard that connects to the computer

Desktop Computer

a computer intended for use at a single location that has a separate case or tower that houses the main components of the computer

Client

a computer that asks for data from a Server


Set pelajaran terkait

Chapter 7 Legal Dimensions of Nursing Practice

View Set

1.6 Real Estate The Business of Value

View Set

Chapter 5-Disability Income and Related Insurance ExamFx quizzes

View Set

Chapter 5 - Arrests and seizures without warrants

View Set

Chapter 39: Assessment and Management of Patients With Rheumatic Disorders

View Set

Chapter 10: Valuation & Rates of Return

View Set

Chapter 4 Assessment and Instruction

View Set

FLORIDA REAL ESTATE 63 HOUR PRACTICE TEST

View Set