Lecture 1: Computers and Networking (+ chapters 2-4)
ResearchGAte
a professional networking site for researchers and scientists that allows members to share research post published papers, and collaborate with others
a professional social networking site that proves a way to connect with other business professionals, share information, or look for new career opportunities
Google Chrome (aka Chrome), Safari (primarily for Macintosh), and Firefox. Internet Explorer (unreliable)
common web browsers and their reliability
hardwired
computers wired together or wired to something that physically exists
router
connect multiple devices to the same network; has one or two antennas to transmit the wifi signal
network
connection of two or more computers, which allows the computer to communicate
operating systems
controls how software and files are managed, stored, and displayed.
when the license comes in a package and you distribute it as a stand alone software when it should come all together; selling stand alone software with an accompanying product
describe OEM unbundling
-U.S. law, Title 17 that provides exclusive rights to the originator of a document, film, record, music, art, software, etc. -The symbol, © does not have to be present to be considered copyrighted material.
describe copyright law
License explains where and how it can be installed. Examples: -Only one computer -Multiple computers, but only one copy used at a time -Multiple computers for one user
describe the copyright license
shareware
developers of this software encourage users to give copies to friends and colleagues to try out; continuing to use this without paying the registration fee is software piracy
No control over content as not on your server, security, sometimes targeted by online thieves.
disadvantages of cloud computing
electronic mail
urban legends
false stories repeated so many times that people believe them to be true
broadband
high speed or wide data transmission via computers
pharming
hijacks the user when they have entered a correct URL but are taken to an alternate website
nearly all web pages (your bank, Eaglesnest, etc.) are now secure -see a lock at one corner of the screen, often near the URL, when the website is secure and encrypted (128- to 256-bit), which mean you can safely enter data there without it being captured by a thief.
how do you know if a website is secure?
Voice over Internet Protocol (VoIP)
terminology for telephony product, which allow one to make a telephone call anywhere in the world with voice and video by using the Internet, thereby bypassing the phone company
dynamic IP address
the IP address that changes each time a user connects to the internet
speech recognition
the ability to translate the spoken work into text
backup and sharing
the advantages of cloud computing
freeware
the application the programmer has decided to make freely available to anyone who wishes to use it; it is closed source with some restricted usage rights; the author maintains the copyright
Linux
the computer system used by developers and non mainstream users
operating system (OS)
the most important program on your computer; coordinates input from the keyboard with output on the screen, responds to mouse and touch pad clicks, heeds commands to save a file and retrieves files etc - provides access to applications such as office software and email
to access online software and/or file storage on remote servers - it gives better access to files - it is more secure
the purpose of cloud computing
bandwidth
the rate of digital communication for data transmission
open source
the software that has copyright protection , but the software source code is available to anyone who wants it - purpose: to allow other people to make improvements of the code and make a bug-free product
intranet, extranet, and VPN
there are three main types of networks for internet use:
Social Engineering
using deception to obtain unauthorized access to information resources
social networking
websites that serve to connect millions of users worldwide
WPA2
what is a better security than WPA because it uses an advanced encryption standard
since 1992, felony with fines and jail time.
when has software piracy been an issue? and what is the consequence?
Graphical User Interface (GUI)
which means that instead of typing in commands in a computer language to get our software to run, we can use an input device: mouse, trackpad, etc. to point and click for commands.
two-factor authentication
which requires personal info for account changes to prevent unauthorized users from hacking your account
nodes
wireless devices that pick up signals sent by a user and transmit them to the central server or rebroadcast them to another node
folksonomy
word descriptor tags used for content and often achieved by group consensus
applications (apps)
work with a specific operating system
data encryption
you can use _________________________ software to encrypt an entire hard drive or encrypt selected files; to access encrypted files you must decrypt them
hashtag
#; identifies the keyword or topic of the Tweet
Wireless (Wi-Fi)
A network connection where a device does not need to be hard wired to the internet but connects to it using a modem and router, which emits a signal through an antenna.
Real Simple Syndication (RSS) Feeds
A nurse frequently reads/follows a blog where a group of nurses write about caring for terminally ill patients. What term describes the feature that automatically sends an alert to the nurse when a new post is added?
Webcast
A nurse needs to renew her license and decides to use the Internet to obtain continuing education credits. The nurse views a one-way presentation about new treatment options for coronary artery disease. Which one of the following is the nurse using?
public domain software
A program distributed for free without a copyright.; there are no copyright restrictions
Professional Networking
A subset of social media where interactions focus on business themes.
iCloud
Apple's version of cloud storage; includes free cloud office apps, pages, numbers, and keynote; it also includes an address book, Contacts.
internet telephone
Computer software and hardware that can perform functions usually associated with a telephone.
intranet
a private network within an organization, which allows users of an organization to share information
corporate piracy
Illegal duplication of copyrighted material for use within an organization; Healthcare and Educational Institutions have been fined for this; have heavy fines
OneDrive
Microsoft office also provides free cloud file storage capabilities using _________________________
javascript
Scripting language often used to create interactive web pages.
data encryption
What feature allows an individual to password protect their files so that thieves will not be able to steal their data.
virtual private network
What term describes a private network that uses the Internet to share its information and is encrypted to prevent others from seeing it? (Doctors and nurse practitioners must use this network when accessing/documenting medical records from their home computers.)
Should consider if software is proprietary, shareware, or freeware. Consider if the friend will also still be using the software. Should not be using the same software if it is proprietary. If it is shareware, the student should be willing to pay if continues to use. Also if viruses/scanned, if compatible with the computer, etc.
Your friend offers to give you a software file to install on your computer. Identify the software information you should consider before installing a computer application given to you by a friend. Use correct terminology about each possible type of software license and explain the rationale for your decision.
Transmission Control Protocol (TCP)/ Internet protocol (IP)
a computer communication technology created by the US Defense Advanced Research Projects Agency
Web 2.0
a descriptor for what online companies and services that survived the dot.com bubble burst in 2000 had in common; includes the shift from only reading to reading, interacting, and writing on the Internet
out-of-office reply
a feature that will automatically send an out of office email to each person who sent an email
plug ins and add ons
a helper program for a web browser that increases the functionality of the browser
Digital Subscriber Line (DSL)
a home network that connects a router to the internet; uses a regular phone line
Webinar
a live seminar over the Internet where users must log in to a website address; audience members can ask questions during the presentation and the speaker can ask for feedback
computer virus
a malware program from the Internet designed to execute and replicate itself without the user's knowledge
a mini blogging platform where an individual can send messages of 140 characters or less, known as tweets, to family, friends, or the general web community photos and short videos can also be shared
Campus Area Network (CAN)
a network that encompasses a defined geographic area, such as a college campus
text speak
a new language system that uses letter, numbers, and symbols instead of spelling out words
wiki
a piece of server software that allows users to freely create and edit content on a web page using any web browser
Wikipedia
a popular free publicly edited online encyclopedia which began in 2001
java
a programming language that some websites use to display data
hoax
a sensational message claiming to contain a virus though it dose not contain one; damaging hoaxes can direct a use to delete a file that is necessary for a computer to function properly
internet radio
a social media form for streaming audio using the Internet
a social media website that provides the ability for users to create personal pages, groups, and includes email messaging and chat features
Network Authentication
a standard for work and home computer networks that requires a user to enter an authentication code to use a secure Wi-Fi network
firwall
acts to block destructive forces; work with a router program to filter the traffic both coming in and out
URLs (Uniform Resource Locators)
addresses used to navigate
web cookies
allows a website to safe a message to the users computer from a web server
active server page
allows access to databased to present real-time data based upon the user's request
streaming
allows delivery of audio and video to the user before downloading the entire file
bookmarks/favorites
allows the user to save links to favorite websites from a menu
social media
allows us to share our stories, pictures, videos, career goals, research, and thoughts with others online using the Internet
static IP address
an IP address that remains the same each time the computer connects to the internet
Uniform Resource Locator (URL)
an address assigned to all web documents: usually begins with https://www
FaceTime
an app created by Apple that allows iPhone and iPad users to have video calls over Wi-Fi with others who have a Mac computer, iPhone , or iPad
listserv
an email discussion list of a group of people with a common interest such as pediatric nursing
extranet
an extension of an intranet with added security features; provides accessibility to the intranet to a specific group of outsiders
IP address
an identifier of four sets of numbers separated by periods or dots, making it possible for each computer on the internet to be electronically located
blog
an online weblog or discussion about thoughts or topics of interest
internet service provider
an organization that provides access to the internet
groupware
application suites or programs with multiple users to collaborate on same file.
proprietary
commercial software is _______________________-
collective intelligence
intelligence that emerges from group collaboration
chat
is a real-time typed conversation that takes place on a computer
Purchaser is only licensed to use, does not own the software.
is the purchaser owning the software?
phishing
legitimate looking email with instructions to confirm account information as an alternate hyperlink
hard disk loading
loading unauthorized copies of software to a computer; not original packaging is a red flag
Windows, Macintosh
main computer systems
ransomware
malicious software that blocks the victims access to their computers without paying a ransom; ransomware has attacked healthcare information systems worldwide
spyware
maliciously tracks web surfing and reads cookies to tailor advertisements and monitor key strokes
trojan horse
masquerades itself as a useful program then collects information like keystrokes to send to the remote attacker
Local Area Network (LAN)
network confined to a small area such as a building or a group of buildings
botnet
network of computers that have been hijacked by a virus then infects other computers that access that server
Metropolitan Area Network (MAN)
network that encompasses a city or town
Wide Area Network (WAN)
network that encompasses a large geographical area (might be two or more LANs)
illegal instillation
on more computers/users than allowed (soft-lifting)
YouTube and Vimeo
online video sharing sites
web browser
software used to access files from the world wide web, such as google chrome or firefox
Protocols
system of rules for data transfer
android and iOS
operating systems for the tablet and phone
domain name
originally showed the type of website the computer server belonged to, such as government or institution
popular social media platform for photosharing
counterfeit software
producing fake copies of software
-office type applications -scheduling -financial management/inventory -EHRs are essentially groupware Office365, Google Drive, iCloud
purpose and types of groupware
malware
refers to all forms of computer software designed by criminals specifically to damage or disrupt a computer system often for profit
hacked
refers to unauthorized use of a social media account
microblogging
refers to very brief web journaling; could be simply a sentence fragment
-OneDrive, iCloud, Google Drive, iCloud, Dropbox store your files remotely, share files with others.
remote file storage
search engines
search the web with natural language terms
podcast
sharing audio and video content on the web; some developers publish podcasts as a theme series on a specific subject and make the podcasts available as RSS feeds
Ctrl + C
shortcut: copy selected text
Ctrl + X
shortcut: cut selected items
Ctrl + V
shortcut: paste selected items
Ctrl + S
shortcut: save
Crtl + A
shortcut: select all items
Ctrl + Z
shortcut: undo
web conferencing
similar to an open telephone call, but with the added element of video; provides participants with the ability to mark up documents or images, as well as "chat" by using a keyboard
worm
small malware that replicates itself by going through security holes, causing damage
active X controls
small programs to allow animation or help with tasks
networking sites, blogging, microblogging, and content sharine
social media has four main classifications:
podcatching
software that allows users to aggregate podcast feeds and play podcasts on their computers, smartphones, and tablet devices