CIS 101 - ALL

Ace your homework & exams now with Quizwiz!

Graphics and Media Software

- Computer - Aided Design (CAD) Software - Desktop Publishing Software - Paint/ Image editing Software - Photo editing software - Clip Art / Image Gallery - Video and audio editing software

NFC tag

-contains a chip and an antenna that contains information to be transmitted - are self-adhesive -NFC-enabled phone communicates with the NFC reader to send a mobile payment.

users often used process with productivity applications

-create a project -edit a project -format a project -save a project -distribute a project

Portable Flash Memory Storage

-digital camera -smartphone -printer -tablet -laptop -card reader/writer

NFC (Near Field Communication)

-enabled device contains an NFC chip

variety of storage opitions

-internal solid-state-drive -internal hard disk -NFC tags -RFID tag -smard card -magnetic stripe card -network attached storage device -optical device -cloud storage -USB flash drive -memory cards -external hard drive

terms used to define storage

-kilobyte -megabyte -gigabyte -terabyte -petabyte -exabyte -zettabyte -yottabyte

The technologies that developers use to create apps often depends whether they will be installed on a user's device or accessed via a network

-native app -cloud app -web app -mobile web app

Head crash

-occurs when a read/write head touches the surface of a platter -Always keep a backup of your hard disk

Special purpose terminals

-perform specific tasks and contain features uniquely designed for use in a particular industry EX) point of sale, ATMs, and self service kiosks

botnet (zombie army)

A group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes.

joystick

A handheld vertical lever, mounted on a base, that you move in different directions to control the actions of the simulated vehicle or player. has buttons (triggers) that you use to initiate events

USB Flash Drive

A portable flash memory storage device that you plug in a USB port.

Mobile Computer

A portable personal computer designed so that a user can carry it from place to place.

Mobile-Computer

A portable personal computer designed so that a user easily can carry it from place to place.

Function

A predefined formula that performs a calculation. EX) =SUM(B9:B16) Spreadsheet applications contain many built-in functions to perform financial, mathematical, logical, date and time, and other calculations. Many spreadsheet applications allow users to write their own customized functions to perform special purpose calculations.

Software

A program or instructions that give directions to the computer.

Spyware

A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

Ransomware

A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money

Rootkit

A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

___ is a program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device

A rootkit

Access Controls

A security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Proxy Server

A server outside the organization's network that controls which communications pass into the organization's network.

Operating System

A set of programs that coordinates all the activities among computer or mobile device hardware.

Tag

A short descriptive label that you assign to webpages, photos, videos, blog posts, email messages, and other digital content so that it is easier locate at a later time

Text Message

A short note, typically fewer than 300 characters, sent to or from a smartphone or other mobile device.

System Unit

The case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage.

Coding scheme

The combinations of 0s and 1s that represent uppercase and lowercase letters, numbers, and special symbols are defined by patterns

The Steps in a Machine Cycle Step 2

The control unit decodes the calculation's instructions and sends the instructions and data to the ALU

The Steps in a Machine Cycle Step 1

The control unit fetches the calculation's instructions and data from memory.

Power Supply

The power suitable to a computer or mobile device ranges from 5 to more than 15 volts. Laptop AC Adapter converts the wall outlet power into DC power Different motherboards require different wattages on the power supply If it is not providing the necessary power, then the computer will not function properly

Ripping

The process of copying audio and/or video data from a purchased disc and saving it on your own media

Audio Input

The process of entering any sound into the computer To enter high-quality sound into computer, the computer uses a sound card or integrated sound capability Some users also record live music and other sound effects into a computer by connecting external music devices, such as an electronic keyboard, guitar, drums, harmonica, and microphones, to a computer. Music production software allows users to record, compose, mix, and edit music and sounds.

Pairing

The process of initiating contact between two Bluetooth devices and allowing them to communicate with each other.

Downloading

The process of transferring content from the Internet to a computer or mobile device.

The Steps in a Machine Cycle Step 4

The results of the calculation are stored in memory

Output

The results of the operation of any system.

Screen Protector

Thin plastic film that adheres to the screen of your device it will protect the screen from minor scratches obtained through normal use.

Google is an example of a search engine.

True

Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices.

True

Advanced Transfer Cache

Type of L2 cache built directly on the processor chip Processors that use this perform at much faster rates than those that do not use it

Flash Memory

Type of nonvolatile memory that can be erased electronically and rewritten. Most computers use flash memory to hold their start-up instructions because it allows the computer to update its contents easily. Also store data and programs on many mobile devices and peripheral devices, such as smartphones, portable media players, printers, digital cameras, automotive devices and digital voice recorders

netbook

Type of notebook computer that is smaller, lighter, and often not as powerful as a traditional notebook computer.

Optical Disc

Type of storage medium that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.

utility program

Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs.

graphical user interface (GUI)

Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons.

Address

Unique number that identifies the location of a byte in memory. To access data or instructions in memory,

UPC

Universal Product Code, used by retailers and grocery stores

Cellular Seizure Investigation Stick (CSI)

A thief can plug this into a phone and then download sensitive data in seconds.

Tablet

A thin, lighter-weight mobile computer that has a touch screen. Like laptops, tablets run on batteries or a power supply or both; however, batteries in a tablet typically last longer than those in laptops.

Laptop

A thin, lightweight mobile computer with a screen in its lid and a keyboard in its base. Designed to fit on your lap and for easy transport, most laptops weigh up to 7 pounds

ccTLD

A two-letter country code in a web address.

SAS (serial-attached SCSI)

A type of SCSI that uses serial signals to transfer data, instructions, and information. Advantages of SAS over parallel SCSI include thinner, longer cables; reduced interference; lower cost; support for many more connected devices at once; and faster speeds.

computer-aided design (CAD)

A type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models. For example, home design/landscaping software is an application that assists users with the design, remodeling, or improvement of a home, deck, or landscape.

Online Security Service

A web app that evaluates our computer or mobile device to check for Internet and email vulnerabilities.

Social Networking Network

A website that encourages members in its online community to share their interests, ideas, stories, photos, music, and videos with other registered users.

Internet

A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individuals.

IP address

AKA Internet Protocol address -a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network -Internet uses two IP addressing schemes: IPv4 and IPv6 ^The original IPv4 address began dwindling in availability ^IPv6 increased the available number of IP addresses

touch-sensitive pad

An input device that contains buttons and/or wheels you operate with a thumb or finger. allows you to scroll through and play music

Graphics Formats Used on the Web

BMP - Bitmap: Desktop backgrounds Scanned images GIF - Graphics Interchange Format: Images with few colors Simple diagrams Shapes JPEG - Joint Photographic Experts Group: Digital camera photos Game screenshots Movie still shots PNG - Portable Network Graphics: Comic-style drawings Line art Web graphics TIFF - Tagged Image File Format: Photos used in printing industry

network

Collection of computers and devices connected together, often wirelessly, via communications devices and transmission media, allowing computers to share resources.

Web site

Collection of related Web pages and associated items stored on a Web server.

data

Collection of unprocessed items, which can include text, numbers, images, audio, and video.

USB Flash Drive

Common USB adapter that provides computers and mobile devices with additional storage capability as long as it is plugged in

Comparison Operations

Comparing one data with another to determine whether the first item is greater than, equal to, or less than the other item

Things Search Engines let you Search for

Audio: music, songs, recordings, and sounds' Blogs: specific opinions and ideas of others Businesses: addresses and phone numbers Images: photos, diagrams, and drawings Maps: maps of a business or address, or driving directions to a destination Publications: news articles, journals, and books Shipments: track locations of packages in transit to specific destinations Transportation: Directions, routes, and arrival and departure times Videos: home videos, music videos, television programs, and movie clips Weather: local and worldwide conditions and forecasts

Creating Strong passwords

Avoid personal information Use at least 8 characters, upper/lower case, numbers, punctuation marks and symbols Change it at least every 3 months Don't use the same password Use a passphrase Avoid common sequences Memorize passwords Use online tools to evaluate password strength

Control Unit

Component of the processor that directs and coordinates most of the operations in the computer Interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction. Types of internal components that the control unit directs include the arithmetic logic unit, registers, and buses,

Cloud Computing Reason 2

Cost Savings: The expense of software and high-end hardware, such as fast processors and high-capacity memory and storage devices, shifts away from the user

Trojan Horse

Destructive program disguised as a real program, such as a screen saver trojan horse hiding inside can capture information, such as user names and passwords, from your computer or enable someone to control your computer remotely

Selecting the Right Processor

Determine your needs Determine your current processor Research processor models

Bus width

Determines the number of bits that the computer can transmit at one time The larger the number of bits handled by the bus, the faster the computer transfers data

digital camera

Device that allows users to take pictures and store the photographed images digitally, instead of on traditional film.

digital media player/streaming media player

Device, typically used in a home, that streams digital media from a computer or network to a television, projector, or some other entertainment device

DVI

Digital Video Interface port enables signals to transmit directly to a monitor

Nonvolatile memory

Does not lose its contents when power is removed from the computer permanent Examples are ROM, flash memory, and CMOS Permanent

CMOS (complementary metal-oxide semiconductor)

Provides high speeds and consumes little power. CMOS technology uses battery power to retain information even when the power to the computer is off. Battery-backed CMOS memory chips, for example, can keep the calendar, date, and time current even when the computer is off. The flash memory chips that store a computer's start-up information often use CMOS technology.

Sound card

Enhances the sound-generating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones

Gigabyte

Equals 1 billion bytes

Using Personal Finance Apps Safely

Evaluate the apps Use strong passwords Guard smartphone Verify transaction

Green Computing

Reducing the electricity consumed and environmental waste generated when using a computer.

Read only memory

Refers to memory chips storing permanent data and instructions. date on most ROM chips can't be modified It is nonvolatile, which means its contents are not lost when power is removed from the computer Many peripheral devices contain this

Flash memory has many moving parts, making it less durable and shock resistant than other types of media.

False

Storage consists of electronic components that store instructions and data waiting to be executed.

False

A computer accepts data, called output.

False, it's input

Static RAM

Faster and more reliable than any variation of DRAM chips. Do not need to be re energized as often as DRAM chips More expensive than DRAM chips

supercomputer

Fastest, most powerful, and most expensive computer, capable of processing more than one quadrillion instructions in a single second.

Speech to Text

Feature that recognizes a user's spoken words and enters them into email messages, text messages, or other applications that support typed text entry.

FTP

File Transfer Protocol - Permits users to transfer files to and from servers on the internet

FTP

File Transfer Protocol - allows users to transfer items to and from other computers on the Internet.

Cloud Backup

Files are backed up to the cloud as they change. Cloud backup provider maintains backup hardware. Files may be retrieved or restored from anywhere with an Internet connection and app on any device. Requires an Internet connection and app, otherwise files are marked for backup when the computer goes back online.

sequential access

Refers to reading or writing data consecutively In much the same way you would find a specific song on a cassette tape or videotape, you must forward or rewind to a specific position to access a specific piece of data.

System Unit

Refers to the case on a desktop that contains and protects the motherboard, hard drive, memory, and other electronic components

Machine Cycle: Decoding

Refers to the process of translating the instruction into signals the computer can execute

Actions a virus performs

First, a virus replicates by attaching itself to program files. Viruses conceal themselves to avoid detection. Finally, viruses watch for a certain condition or event and activate when that condition or event occurs.

Dance Pad

Flat electronic device divided into panels that users press with their feet in response to instructions from a music video game.

Firmware

For example, ROM chips in printers contain data for fonts Manufactures of ROM chips often record data, instructions, or information on the chips when they manufacture the chips Contain permanently written data, instructions, or information, such as a computer or mobile device's start-up instructions.

Fibre Channel (FC)

Interface often used in enterprise storage because it has much faster transmissions rates than SCSI and other interfaces.

smart phone

Internet-enabled telephone that usually also provides personal information management functions.

Nanosecond (ns)

One billionth of a second Extremely fast electricity travels about one foot in a nanosecond.

zombie

One whose owner is unaware the computer is being controlled remotely by an outsider

Newsgroups

Online areas in which users have written discussions about a particular subject

social networking Web site

Online community that encourages its members to share their interests, ideas, stories, photos, music, and videos with other registered users. See also online social network.

online social network

Online community that encourages its members to share their interests, ideas, stories, photos, music, and videos with other registered users. See also social networking Web site.

online banking

Online connection to a bank's computer to access account balances, pay bills, and copy monthly transactions to a user's computer.

Online Discussion

Online forums where users have written discussions May require a reader program to manage and follow discussion posts Integrated in some operating systems, email programs, online social networks, and browsers

cybercrime

Online or Internet-based illegal acts such as distributing malicious software or committing identity theft

mini disc

Optical disc used in some game consoles and mobile devices that has a diameter of 3 inches of less.

OLED

Organic LED, consume less power and is brighter but can have a shorter life span

Privacy and Security Risks with Online Social Networks

Register with caution Manage your profile Choose friends carefully Limit friends Divulge only relevant information Be leery of urgent requests for help Read the privacy policy

Memory card

Removable flash memory, usually no bigger than 1.5 inches in height or width, that you insert and remove from a slot in a computer, mobile device, or card/reader writer.

Cooling Pad

Rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat

Acceptable Use Policy (AUP)

Outlines the activities for which the computer and network may and may not be used. It should specify the acceptable use of technology by employees for personal reasons and specify the personal activities, if any, that are allowed on company time

programmer

Person who writes and modifies computer programs. See also developer.

developer

Person who writes and modifies computer programs. See also programmer.

Microprocessor

Personal computer processor chip

mobile computer

Personal computer that a user can carry from place to place.

video phone

Phone that can send video messages.

picture message

Photo or other image, sometimes along with sound and text, sent to or from a smart phone or other mobile device.

DIMM (dual inline memory module)

Pins on opposite sides of the circuit board do not connect and, thus, form two sets of contacts

Application

Programs designed to make users more productive and/or assist them with personal tasks.

system software

Programs that control or maintain the operations of a computer and its devices.

Health Concerns

Prolonged use of devices can lead to injuries or disorders of the hands, wrists, elbows, eyes, neck, and back.

Academic

Schools often subscribe to educational apps that provide students with games, quizzes, and lessons about course topics. Using these apps, teachers can keep track of students' progress and pinpoint areas where they may need extra help.

What do people use the Web for?

Search for information Conduct research Communicate with and meet other people Share information, photos, and videos with others Access news, weather, and sports Participate in online training Shop for goods and services Play games with others Download or listen to music Watch videos Download or read books Make reservations

SDHC

Secure Digital High Capacity

Using DV technology

Select a DV camera Record a video Transfer and manage videos Edit a video Distribute a video

Wireless Messaging Services

Send and receive wireless messages to and from smartphones, mobile phones, handheld game devices, and other mobile devices using text messaging and picture/video messaging.

Symmetric Key Encryption

Sender and receiver use single, shared key

Quarentine

Separate area of a hard disk that holds the infected file until a virus can be removed. Ensures that other files won't be infected

information processing cycle

Series of input, process, output, and storage activities performed by a computer.

software

Series of instructions that tells a computer what tasks to perform and how to perform them. See also program.

program

Series of instructions that tells a computer what tasks to perform and how to perform them. See also software.

What to Consider when Securing Photo Sharing

Services: many services allow users to print the images. They also offer photo-customizing products. Tools: owners can create web pages and keep photos organized by using albums, titles, and tags. They also can join forums to share experiences. Features: it is efficient if you can upload many files simultaneously in one batch. Many websites allow visitors to write comments on uploaded photos. Storage Space: some services offer unlimited storage, while others may limit members to a maximum number of stored photos or limit the total storage space.

operating system

Set of programs that coordinates all the activities among computer hardware devices.

Voice Mail Message

Short audio recording sent to or from a smartphone or other mobile device.

E-commerce

Short for electronic commerce, a business transaction that occurs over an electronic network such as the Internet.

text message

Short note, typically fewer than 300 characters, sent to or from a smart phone or other mobile device.

Mobile (Text) Messaging

Short text, picture, or video messages sent and received, mainly on mobile devices over a mobile carrier's network May require messaging plan from mobile service provider Requires messaging software Integrated in most mobile devices

video message

Short video clip, usually about 30 seconds, sent to or from a smart phone or other mobile device.

Blogger

Similar to an editorial section in a newspaper, blogs reflect the interests, opinions, and personalities of the author

Multi-core processor

Single chip with two or more separate processor cores These are used in all sizes of computers

L2 cache

Slightly slower than L1 cache but has a much larger capacity

Heat sink

Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components such as a processor Has fans to help distribute air dissipated by the heat sink

telesurgery

Surgery in which a surgeon performs an operation on a patient who is not located in the same physical room as the surgeon. See also remote surgery.

Services Offered by Cloud Storage Providers

Synchronize files Write documents Back up files Stream music Post photos Play games Evaluate providers

Two Categories of Software

System Software: consists of the programs that control or maintain the operations of the computer and its devices. Application Software

A computer has a

System bus, possibly a backside bus, and an expansion bus

Safeguarding against Theft & Vandalism and Failure

T&V: physical access controls, alarm system, physical security device, device-tracking app F: surge protector, uninterruptible power supply, duplicate components or duplicate computers, fault-tolerant computer

Hardware Theft & Vandalism and Failure

T: act of stealing digital equipment V: defacing or destroying digital equipment F: can fail because of aging, natural or man-made disasters, or random events, or even errors in programs or apps.

Common Gestures

Tap, double tap, press and hold, drag or slide, swipe, stretch, pinch

Subwoofer

boosts low bass sounds, found in surround sound speaker systems In some configurations, a cable connects the speakers or the subwoofer to a port on the computer or device. With wireless speakers, however, a transmitter connects to a port on the computer, which wirelessly communicates with the speakers

a program that performs a repetitive task on a network

bot

private key encryption (symmetric key encryption)

both the originator and the recipient use the same secret key to encrypt and decrypt the data

CD-ROM

can be read from but not written to -Single-session disc (manufacturers write all items on disc at one time)

3-D printer

can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and more

OCR (optical character recognition) Software

can read and convert text documents into electronic files, included in many scanners

Signature capture pad

captures a handwritten signature through a stylus then transmits signal to a central computer where signature is stored

Face Recognition System

captures a live face image and compares it with a stored image to determine if the person is a legitimate user

fingerprint reader

captures curves and indentations of a fingerprint

Videoconference

a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data To participate in a videoconference using a computer, you need videoconferencing software or access to a videoconferencing web app, along with a microphone, speakers, and a video camera attached to or built into a computer.

Push Notification

a message that initiates from the sending location without a request from the receiver

game console

a mobile computing device designed for single-player or multiplayer video games. gamers often connect console to television or monitor so they can review gameplay on screen game consoles that are Internet capable enable gamers to download games, stream games or movies, and play with others online. Some gamers connect keyboards or webcams so that they more easily can send text messages or conduct video chats with other gamers.

Portable Media Player

a mobile device on which you can store, organize, and play or view digital media enable you to listen to music, view photos, and watch videos, movies, and television shows. With most, you transfer the digital media from a computer or the web, if the device is Internet capable, to the portable media player. S

portable media player

a mobile device on which you can store, organize, and play or view digital media AKA smart phones allow you to listen to music, view photos, watch videos, movies, and television shows, and even record audio

digital camera

a mobile device that allows users to take photos and store the photographed images digitally

Track

a narrow recording band that forms a full circle on the surface of the disk

GPS

a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location

server farm

a network of several servers together in a single location it makes it possible to combine the power of multiple servers

PNG

a patent free compressed graphics format that restores all images details when the file is viewed -the PNG does not lose image quality during compression

Mouse

a pointing device that fits under the palm of your hand comfortably

mobile computer

a portable personal computer, such as a laptop or tablet, designed so that a user easily can carry it from place to place, whereas a desktop to be in a stationary location can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time

Pointing stick

a pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard

Passphrase

a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources More secure than passwords but can be easy to remember because they contain words

back door

a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network A rootkit can be a back door. Some worms leave back doors, which have been used to spread other worms or to distribute spam from the unsuspecting victim computers.

media player

a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device

Media Player

a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device Media players available for download include iTunes, RealPlayer, and VLC Player. You can download media players free from the web.

Adware

a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services

PC maintenance tool

a program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance

Bot

a program that performs a repetitive task on a network

Phishing Filter

a program that warns or blocks you from potentially fraudulent or suspicious websites

Query

a request for information from a database

Phishing

a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information

Lock Screen

a screen that restricts access to a computer or mobile device until a user performs a certain action

personal firewall

a security tool that detects and protects a personal computer and its data from unauthorized intrusions Personal firewalls constantly monitor all transmissions to and from a computer or mobile device and may inform a user of attempted intrusions.

DVD kiosk

a self service DVD rental machine that connects to a host computer through network -are associated with a particular vendor -to rent movies

external hard drive

a separate freestanding storage device that connects with a cable to a USB port or other port on a computer or mobile device Both hard disks and SSDs are available as external hard drives.

Format a Project

change its appearance Formatting is important because the overall look of a project significantly can affect its capability to communicate information clearly. Examples of formatting tasks are changing the font (name assigned to specific design of character), font size (indicates the size of the characters in a particular font), and font style (adds emphasis to a font)

Subject Directory

classifies web pages in an organized set of categories, such as sports or shopping, and related subcategories Using a subject directory, you locate a particular topic by clicking links through different levels, moving from the general to the specific.

Ink-Jet printers

a type of nonimpact printer that forms characters and graphics by spraying tiny drops on liquid ink onto a piece of paper. These have become a popular type of color printer for home use Ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types and sizes

spyware remover

a type of program that detects and deletes spyware and similar programs

slate tablet

a type of tablet that does not contain a physical keyboard

Username (User ID)

a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user

user name

a unique combo of characters, such as letters of the alphabet and/or numbers, that identifies a specific user Your user name must be different from the other user names in the same domain. In an Internet email address, an @ (pronounced at) symbol separates the user name from the domain name. Your service provider supplies the domain name. A possible email address for Rick Claremont would be [email protected],

Nit

a unit of visible light intensity equal to one candela per sq meter. Used to measure brightness of a display

Troll

a user who posts negative, inflammatory comments on a blog post or article with the intent of inciting other users.

graphics

a visual representation of non-text information such as a drawing chart or photo

smartwatch

a wearable device that in addition to keeping time can communicate wirelessly with a smartphone to make and answer phone calls, read and send messages, access the web, play music, and work with apps such as trackers and GPS

activity tracker

a wearable device that monitors fitness-related activitties such as distance walked, heart rate, pulse, calories consumed, and sleep patterns typically wireless with web or mobile app on computer or mobile device to extend capability

Mobile Web App

a web app that runs on a mobile device Mobile web apps often have a responsive web design, which means the app is optimized for display in a browser on a mobile device, regardless of screen size or orientation. Examples of web apps include websites for shopping, banking, and online social networks accessed in a browser.

Media Sharing Site

a website that enables members to manage and share media such as photos, videos, and music These websites are sometimes called photo sharing sites, video sharing sites, and music sharing sites, respectively. Media sharing sites, which may be free or charge a fee, provide a quick and efficient way to upload, organize, store, and download media. EX) youtube

Bookmarking Site

a website that enables members to organize, tag, and share links to media and other online content

Portal

a website that offers a variety of internet services from a single, convenient location a wireless portal is a portal designed for Internet-capable mobile devices. Most portals offer these free services: search engine; news, sports, and weather; web publishing; yellow pages; stock quotes; maps; shopping; and email and other communications services.

secure site

a website that uses encryption techniques to secure its data Secure sites typically use digital certificates along with security protocols.

Hot spot

a wireless network that provides Internet connections to mobile computers and devices

Hot spot

a wireless network that provides internet connections to mobile computers and devices -although most hot spots enable unrestricted or open access, some require that users agree to terms of services, obtain a password, or perform some other action in order to connect to the internet -can make wifi, or mobile hotspots

Hashtag

a word(s) preceded by a # symbol that describes or categorizes a post. Users can search for posts on a topic by searching for a hashtag.

Input

accepting data

security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

access control

AMOLED

active-matrix OLED, what many mobile computers and devices use. Combines the benefits of high-quality viewing from all angles with lower power consumption

Responsive Web Design

adapts the layout of the website to fit the screen on which it is being displayed

resolution

affects the quality of the digital camer the number of horizontal and vertile pixels in a display

Bar code reader

aka a bar code scanner, an optical reader that uses laser beams to read bar codes

Graphics tablet

aka a digitizer, an electronic plastic board that detects and converts movements of a stylus or digital pen into digital signals that are sent to the computer Each location on the graphics tablet corresponds to a specific location on the screen.

Voice Recognition

aka speech recognition, is the computer or mobile devices capability of distinguishing spoken words

Longitudinal Recording

aligns the magnetic particles horizontally around the surface of the disk

Continuous Data Protection (CDP)

all data is backed up whenever a change is made The only real-time backup. Very fast recovery of data. Very expensive and requires a great amount of storage.

Video Call

all parties see one another as they communicate over the internet

Online Backups

allow files to be saved to remote servers via the Internet

email marketing services

allow organizations to create campaigns, and then senf them by email to everyone whose name is on the list of distribution

Platform as a service

allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software

Enterprise hardware

allows large organizations to manage and store data and information using devices intended for heavy use, maximum efficiency, and maximum availability -RAID duplicates data, instructions, and information to improve data reliability

Revolutions per minute

allows nearly instant access to all tracks and sectors on the platters

Shopping Cart

allows the user to collect purchases

multimedia authoring software

allows users to combine text, graphics, audio, video, and animation in an interactive application With this software, users control the placement of text and images and the duration of sounds, video, and animation

Backup Tool

allows users to copy, or back up, selected files or the contents of an entire storage medium to another storage location such as another hard drive, optical disc, USB flash drive, or the cloud Most require less storage than original

database software

allows users to create, access, and manage a database Using database software, you can add, change, and delete data in a database; sort and retrieve data from the database; and create forms and reports using the data in the database. Each row, called a record, contains data about a given item in the database, such as a person, product, object, or event. Each column, called a field, contains a specific category of data within a record.

Voice recognition application

allows users to dictate text and enter instructions by speaking into a microphone

Voice Mail

allows users to leave a voice message for one or more people

spreadsheet software (AKA workbook)

allows users to organize data in rows and columns and perform calculations allow users e columns and rows collectively it can contain thousands of related individual worksheets (this is why it is referred to as a workbook) Each worksheet usually can have thousands of columns and rows. A cell is the intersection of a column and row. The spreadsheet software identifies cells by the column and row in which they are located.

Microblog

allows users to publish short messages usually less than 10,000 characters, for others to read

Personal Cloud

allows you to access its files over the internet you maintain storage device which files are located versus a cloud storage provider where your files are stored on servers on the internet that a cloud storage provider configures, maintains, and backs up

Favorites

also called bookmarks, are links to preferred websites. When you add a website to the list of favorites, you can visit that website simply by clicking its name in a list instead of typing its web address. Favorites can be organized into folders, alphabetized, and sorted by date or how frequently you view the websites.

paint software

also called illustration software, allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, eyedropper, and paint bucket.

Direct Access

also called random access, means that the device can locate a particular data item or file immediately, without having to move consecutively through items stored in front of the desired data item or file.

SCSI (small computer system interface)

also uses parallel signals, but can support up to 8 or 15 peripheral devices. Supported devices include hard disks, SSDs, RAID, optical disc drives, tape drives, printers, scanners, network cards, and more

hacker

although, originally a complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally

Smartphone

an Internet-capable phone that usually also includes a calendar, an appointment book, an address book, a calculator, a notepad, games, and several other apps Smartphones typically communicate wirelessly with other devices or computers. With most smartphone models, you also can listen to music, take photos, and record videos. Most smartphones have a touch screen

Smart TV

an Internet-enabled HDTV from which you can browse the web, stream videos from online, listen to Pandora, communicate on social media and play online games

point and shoot camera

an affordable and lightweight digital camera with lenses built onto it and a screen that displays an approximation of the image to be photographed -range in size and features provide acceptable quality photographic images for the home or small office user

Unmanned Aerial Vehicle

an aircraft piloted by remote control or onboard computers

project management software

an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project helps users manage project variables, such as the tasks required to complete a project and the allotted time and resources for each, allowing them to complete a project on time and within budget.

Video Editing Software

an application that allows professionals to modify a segment of a video, called a clip For example, users can reduce the length of a video clip, reorder a series of clips, or add special effects, such as words that move across the screen.

tax preparation software

an application that can guide individuals, families, or small businesses through the process of filing federal taxes These programs forecast tax liability and offer money-saving tax tips, designed to lower your tax bill. After you answer a series of questions and complete basic forms, the software creates and analyzes your tax forms to search for missed potential errors and deduction opportunities.

Desktop Publishing Software (DTP)

an application that enables designers to create sophisticated publications that contain text, graphics, and many colors

Audio Editing Software

an application that enables users to modify audio clips, produce studio-quality soundtracks, and add audio to video clips Most television shows and movies and many online videos are created or enhanced using video and audio editing software.

accounting software

an application that helps businesses of all sizes record and report their financial transactions business users perform accounting activities related to the general ledger, accounts receivable, accounts payable, purchasing, invoicing and payroll functions enables business users to write and print checks, track checking account activity, and update and reconcile balances on demand. cost of accounting software for small businesses ranges from less than one hundred to several thousand dollars. Accounting software for large businesses can cost several hundred thousand dollars.

Image Editing Software

an application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images

Ergonomics

an applied science devoted to incorporating comfort, efficiency, and safety into the design items in the workplace -type of configuration of chair, keyboard, display, and work surface

Computer

an electronic device, operating under the control of instructions stored in its own memory that can accept data (input) process the data according to specific rules, produce info (output) and store the information for future use

Cloud computing

an environment that provides resources and services accessed via the internet -resources include email messages, schedules, music, photos, videos, games, websites, programs, web apps, servers, storage, and more -services include accessing software, storing files online, and configuring an environment of servers for optimal performances Businesses use this to more effectively manage resources, such as servers, and programs by shifting usage to the internet It also allows companies to diversify their network and server infrastructure.

Port Replicator

an external device that provides connections to peripheral devices through ports built into the device The mobile user accesses peripheral devices by connecting the port replicator to a USB port or a special port on the mobile computer. Port replicators sometimes disable ports on the mobile computer to prevent conflicts among the devices on the computer and port replicator.

Blog

an informal website consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order

Repetitive strain injury (RSI)

an injury or disorder of the muscles, nerves, tendons, ligaments, and joints -Tendonitis: tendons is inflammation of a tendon due to repeated motion or stress on that tendon. Symptoms: Symptoms of tendonitis of the wrist include extreme pain that extends from the forearm to the hand, along with tingling in the fingers. -Carpal Tunnel Syndrome (CTS) is inflammation of the nerve that connects the forearm to the palm of the hand. Symptoms: include burning pain when the nerve is compressed, along with numbness and tingling in the thumb and first two fingers.

Keyboard

an input device that contains keys you press to enter data and instructions into a computer or mobile device

bar code reader

an input device that uses laser beams to read bar codes on products When it scans the computer uses the manufacturer name and item number to look up price and product name

User response

an instruction a user issues by responding to a message displayed by a program or app A response to the message instructs the program or app to perform certain actions. For example, when a program or app asks the question, 'Do you want to save the changes made to this file?', and you respond with the instruction of 'Yes', the program or app will save the file with the changes you made. If you respond with the instruction of 'No', the program or app will not save your changes before exiting.

Command

an instruction that causes a program or app to perform a specific action Programs and apps respond to commands that a user issues. Users issue commands in a variety of ways, which include touching an area on a screen, pressing keys on the keyboard, clicking a mouse button to control a pointer on the screen, or speaking into a microphone.

EIDE ( enhanced integrated drive electronics)

an interface that uses parallel signals to transfer data, instructions, and information

pop-under ad

an internet advertisement that is hidden behind the browser window so that it will be viewed when users close their browser windows

Broadband

an internet service that transfers data at a faster speed and its always-on connection -users can download webpages quickly, play online games, communicate in real-time with others and more

FTP (File Transfer Protocol)

an internet standard that permits file uploading and downloading to and from other computers on the internet

smartphone

an internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, browser, and numerous other apps in addition to sending/receiving messages, accessing web, communicate wirelessly, function as a portable media player, one or more built-in digital cameras, talk directly into smartphone's microphone or into a bluetooth, connect to video calls, GPS, synchronize data, support voice control, connect to external devices, serve as a wireless access point

clickjacking

an object that can be tapped or clicked such as a button, image, or link on a website contains a malicious program

Scanner

an optical scanner, a light-sensing input device that reads printed text and graphics and then translates the results to a form the computer can process

Certificate Authority

an organization that issues public and private keys and records the public key in a digital certificate

Registrar

an organization that sells and manages domain names.

Source document

an original save of the data, some input devices users save time by capturing data directly from this Examples of source documents include time cards, order forms, invoices, paychecks, advertisements, brochures, photos, inventory tags, or any other document that contains data to be processed.

Printer

an output device that produces text and graphics on a physical medium such as paper

Input

any data and instructions entered into the memory of a computer

digital security risk

any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability Common digital risk: network attacks, unauthorized access and use, hardware theft, software theft, information theft, system failure

Input Device

any hardware component that allows you to enter data and instructions into a computer or mobile device

Output Device

any hardware component that conveys information from a computer or mobile device to one or more people

computer crime

any illegal act involving the use of a computer or related devices

Anonymous FTP

anyone can transfer some, if not all, available files

Marketplace

app store native apps can be downloaded from these

Native App

app written for a specific platform and installed on a computer or mobile device Native apps can take advantage of specific features of the devices on which they are installed, such as a smartphone's camera or contacts list.

Mashups

applications that incorporate data from multiple providers into a new application

optical discs

commonly store items in a single track that spirals from the center of the disc to the edge of the disc

smart digital camera

communicate wirelessly with other devices and can include apps similar to those on a smartphone

Traffic

communications activity on the internet -includes main transmission media to carry internet traffic AKA Internet Backbone ^exchanges data at several different major cities across the country (transfers data from one network to another until reaching the final destination

miniSD, microSDHC, micro SDXC

compactflash

Voice Verification System

compares a person's live speech with their stored voice pattern Larger organizations sometimes use voice verification systems as time and attendance devices. Many companies also use this technology for access to sensitive files and networks. Some financial services use voice verification systems to secure phone banking transactions.

Zipped Files

compressed files

Product Activation

conducted either online or by phone, users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed

optical disk

consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser

program or software

consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them

RFID tag

consists of an antenna and a memory chip that contains the information to be transmitted via radio waves An active RFID tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader. A passive RFID tag does not contain a battery and, thus, cannot send a signal until the reader activates the tag's antenna by sending out electromagnetic waves.

thread

consists of the original article and all subsequent related files ex./ companies set this up for their customers to ask questions or share info about their products

Friends

contacts created on social networking sites Some sites, such as Facebook and LinkedIn, require friends to confirm a friendship, while others, such as Twitter and Google+, allow users to follow one another without confirmation.

RFID Tags

contain a memory chip and an antenna, available in many shapes and sizes

magnetic strip

contains information that identifies you and the card

Keyboard

contains keys you press to enter data and instructions into a computer or mobile device

Web Feed

contains links to or information about updated or changed content on a website

Web Feed

contains links to or information about updated or changed content on a website Mass media, blogs, and online social networks often provide web feeds, saving users the time spent checking the websites for updated content. Most browsers contain the capability to read web feeds.

Contact List or Address Book

contains names, addresses, phone numbers, email addresses, and other details about people with whom you communicate.

Dynamic Webpage

content of the webpage is regenerated each time a user displays it

A(n) __ backup method is the only real-time back up, providing very fast recovery of data

continuous data protection

Analog

continuous wave pattern

User interface

controls how you enter data and instructions and how information is displayed on the screen

Digital device ______ is the trend of computers and devices with technologies that overlap.

convergence

Information

conveys meaning and is useful to people

Full backup

copies all of the files on media in the computer Fastest recovery method. All files are saved.Longest backup time.

Differential Backup

copies only the files that have changed since the last full backup

Incremental Backup

copies only the files that have changed since the last full or incremental backup

keygen

creates software registration numbers and sometimes activation codes

eSATA

faster than USB

Automatic Update

feature that regularly provides new features or corrections to the program

Technology overload

feeling distress when deprived of technology, even for a short length of time, or feel overwhelmed with the amount of technology they are required to manage

Controller

formerly called a disk controller, consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer.

Impact printer

forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper Impact printers are ideal for printing multi part forms because they print through many layers of paper easily.

Non-impact Printer

forms characters and graphics on a piece of paper without actually contacting the paper. Some spray ink while others use heat or pressure to create images

Video

images displayed in motion accompanied by audio -you can upload, share, or view video clips at a video sharing site Simple video applications on the web consist of individual video files, such as movie or television clips, that you must download completely before you can play them on a computer or mobile device.

Mirroring

in RAID level 1, a backup disk exists for each drive. It writes data on two drives at the same time to duplicate the data

Off site

in a location separate from where you typically store or use your computer or mobile device

plaintext

in the encryption process, the encrypted, readable

distributed DoS attack

in which a zombie army is used to attack computers or computer networks Have been able to stop powerhouses such as Yahoo!, eBay, Amazon.com, and CNN.com. The damage caused by a DoS or DDoS attack usually is extensive.

OCR devices

include a small optical scanner for reading characters and sophisticated software to analyze what is read

Audio

includes music, speech, or any other sound -are compressed to reduce their file sizes Simple applications consist of individual audio files available for download to a computer or device. Once downloaded, you can play (listen to) the content of these files. ex./ the MP3 reduces an audio file to about one-tenth its original size while preserving much of the original quality of the sound ^need a media player to play

Wireless transmission

includes radio waves and satellite signals -Computers without a communications device can use a wireless modem or other communications device that enables wireless connectivity --Wi-Fi (wireless fidelity) -Mobile broadband -Fixed wireless -Satellite Internet Service

Test Plan

includes simulating various levels of disasters and recording their ability to recover

Soft copy

information on a display exists electronically and appears for a temporary period

An employee using an organization's computer to send personal email messages might be an example of ___

intellectual property rights violation

Air Gestures

involve moving your body or a handheld input device through the air A device containing a camera detects your gestures and converts it to a digital signal that is sent to a computer mobile

employee monitoring

involves the use of computers, mobile devices, or cameras to observe, record, and review an employee's use of technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited

software suite

is a collection of individual related applications available together as a unit Productivity software suites typically include, at a minimum, word processing, presentation, spreadsheet, and email applications.

pop-up blocker or pop under blocker

is a filtering program that stops pop-up or pop-under ads from displaying on webpages. Many browsers include these blockers. You also can download pop-up and pop-under blockers from the web at no cost.

DVD-ROM

is a high-capacity optical disc on which users can read but not write on or erase

Gaming Keyboard

is a keyboard designed specifically for gaming Gaming keyboards typically include programmable keys so that gamers can customize the keyboard to the game being played. The keys on gaming keyboards light up so that the keys are visible in all lighting condition

tape

is a magnetically coated ribbon of plastic capable of storing large amounts of data and information

E-book reader (e-reader/electronic book reader)

is a mobile device that is used primarily for reading e-books.

digital certificate

is a notice that guarantees a user or a website is legitimate

Hot plugging

Unlike adapter cards that require you to open the system unit and install the card on the motherboard, you can change a removable flash memory device without having to open the system unit or restart the computer Allows you to insert and remove a device while the computer is running ( be sure, though, to stop or eject the device before removing it)

Securing a Webcam

Unplug webcam when not in use Cover lens and plug the microphone Register the hardware Use a strong password

Tips to keep Credit Card Safe

Use a card with added security features, such as a photo. Draw a line through blank areas on restaurant charge slips. If you have left a cash tip on the table, write the words, On Table, in the slip's tip amount section. Cover the keypad when entering a PIN. Save charge receipts and check them against monthly statements or online postings. Keep a record in a safe place of all your credit card numbers, expiration dates, and toll-free numbers to call if you need to report a lost or stolen card. Purchase an RFID-proof wallet to shield smart cards from remote readers. Shred new credit account mail solicitations. Look for skimmers, which can capture a credit card number.

How to protect your phone when making purchases

Use a password on your phone. Select an approved payment app from your device's app store that requires you to enter a password to start the transaction. Use a secure Internet connection when making a purchase online. When using a mobile web app, be sure that the browser shows https:// in the website's web address and a padlock symbol appears. Be vigilant about checking receipts and mobile transactions against monthly statements from the credit card company.

online investing

Use of a computer to buy and sell stocks and bonds online, without using a broker.

Protection from Viruses and other Malware

Use virus protection software Use a firewall Be suspicious of all unsolicited email and text messages Disconnect your computer from the internet Download software with caution Close spyware windows Before using removable media, scan for malware Keep it current Back up regularly

Protection from virus and other malware

Use virus protection software Use a firewall Be suspicious of all unsolicited email and text messages Disconnect computers from internet Download software with caution Close spyware windows Before using any removable media, scan it for malware. Keep current Back up regularly

Data Bus

Used to transfer actual data

Address BUS

Used to transfer information about where the data should reside in memory

power user

User who requires the capabilities of a workstation or other powerful computer, typically working with multimedia applications and using industry-specific software.

home user

User who spends time on a computer at home.

Selective Backup

Users choose which folders and files to include in a backup. Fast backup method. Provides great flexibility. Difficult to manage individual file backups. Least manageable of all the backup methods.

mobile users

Users who work on a computer while away from a main office, home office, or school.

Liquid cooling technology

Uses a continuous flow of fluids such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor.

Analog

Uses continuous signals that vary in strength and quality

Mapping

Using your mobile device's GPS capability, you can use mapping mobile apps to obtain directions, maps, and recommendations for restaurants or other points of interest based on your current location.

Connecting a laptop to an External Display

Verify that your laptop is compatible with the external display. Make sure that you have a cable that can connect from a port on your laptop to a port or cable connected to the external display. If not, you may need to purchase an adapter. Verify that your laptop supports a screen resolution that the external display also supports. Use the cable to connect your laptop's video port to the video input port for the external display. External displays often have multiple video input ports; make sure the external display is configured to display the content from the port to which your laptop is connected. If necessary, configure the laptop to display content on the external display. This often can be done by pressing a key on the keyboard or accessing the operating system's display settings. If necessary, change the screen resolution on the laptop so that the contents display properly on the external display.

Web application

Web site that allows users to access and interact with software through a Web browser on any computer or device that is connected to the Internet. See also Web app.

Byte

When 8 bits are grouped together as a unit Provides enough different combinations of 0s and 1s to represent 256 different characters These characters include numbers, uppercase and lowercase letters of the alphabet, punctuation marks, and other keyboard symbols, such as an asterisk (*), ampersand (&), and dollar sign ($).

DVD-R or DVD+R

are competing DVD-recordable WORM formats, on which users can write once but not erase

DVD-RW, DVD+RW, and DVD+RAM

are competing DVD-rewritable formats that users can write on multiple times

chip cards

are contact and contactless When you insert a contact smart card in a specialized card reader, the information on the smart card is read and, if necessary, updated. Contactless smart cards communicate with a reader using a radio frequency, which means the user simply places the card near the reader.

all-in-one

a desktop that does not have a tower and instead houses the display, system unit, and possibly an optical drive in the same case

Digital Camera

a device that allows you to take photos and store the photographed images digitally A smart digital camera also can communicate wirelessly with other devices and include apps similar to those on a smartphone. Many mobile computers and devices, such as tablets and smartphones, include at least one integrated digital camera.

Headset

a device that contains a microphone and speakers and is worn on one's head many communicate wirelessly with the computer or mobile device

uninterruptible power supply (UPS)

a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power -a UPS connects your connects your computer and a power source

Hardware firewall

a device that controls computers from one point.

card reade/writer

a device that reads from and writes on memory cards

Data projector

a device that takes the text and images displaying on a computer or mobile device screen and projects images onto a larger screen

steaming media player (digital media player)

a device typically used in a home that streams digital media from a computer or network to a television, projector, or some entertainment force

Display

a display device, an output device that visually conveys text, graphics and video information

Anti-spam program

a filtering program that attempts to remove spam before it reaches your inbox or forum

SSD (solid state drive)

a flash memory storage device that contains its own processor to manage its storage

self-service kiosk

a freestanding terminal that usually has a touch screen for user interaction Types of services financial: pay bills, add money to prepaid cards and phone plans, and perform other financial activities photo: print photos from digital images, allow editing of digital photos, users may print directly or send an order ticket: print tickets vending: dispense item after payment is received visitor: manage and track visitors upon check in

portable keyboard

a full sized keyboard that communicates with a smartphone via a dock, cables, or wirelessly

email list

a group of email addresses used for mass distribution of a message -you subscribe to an email list by adding your email address to a mailing list, which is stored in a list server To remove your name, you unsubscribe from the mailing list.

RAID (redundant array of independent disks)

a group of two or more integrated hard disks RAID is an ideal storage solution in situations where uninterrupted access to the data is critical

GPS receiver

a handheld, mountable, or embedded device that contains an antenna, a radio receiver, and a processor

Function keys

are labeled with the letter F followed by a number, these are special keys programmed to issues commands to a computer. Functions MAY VARY depending on the program which you are interacting

Earbuds

are placed in the ear canal

Headphones

are placed outside the ear Both headphones and earbuds usually include noise-cancelling technology to reduce the interference of sounds from the surrounding environment.

Satellite speakers

are positioned so that sound emits from all directions

technology ethics

are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies Frequently discussed areas of computer ethics are unauthorized use of computers, mobile devices, and networks; software theft (piracy); information accuracy; intellectual property rights; codes of conduct; green computing; and information privacy.

Intellectual property rights

are the rights to which creators are entitled for their work

Biometric Device

authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer or mobile device verifying a physical or behavioral characteristic grant access to programs, computers, or rooms using computer analysis of some biometric identifier

biometric device

authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioural characteristic

ATM

automated teller machine -a self service banking terminal that connects to a host computer through a network -banks place ATMs in public locations, including grocery stores, convenience stores, retail outlets, shopping malls, sports and concert venues and gas stations -can withdraw and make deposits, transfer funds, or inquire about an account balance

Backup servers

back up and restores files, folders, and media

A(n) ______ is a duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.

backup

Byte

basic storage unit on a computer or mobile device and represents a single character.

Laser Printer

a high-speed, high-quality non impact printer. Print text and graphics in high quality resolution Depending on the quality, speed, and type of laser printer, the cost ranges from a few hundred to a few thousand dollars When printing a document, laser printers process and store the entire page before they actually print i

Toggle Key

a key that switches between two states each time a user presses the key. Ex: CAPS lock

mainframe

a large expensive, powerful server that can handle hundreds or thousands of connected users simultaneously

face recognition system

a live face and compares it with a stored image to determine if the person is a legitimate user

Bandwidth

a measure of the capability of a network to send and receive data -a high bandwidth connection transmits more data than a low bandwidth connection during the same time period -usually megabytes or gigabytes

Creative Commons

nonprofit organization that allows content owners to specify how their online content can be reused, if at all, on other websites.

Density

number of bits in an area on a storage medium. A higher density means more storage capacity.

Data Collection Device

obtains data directly at the location. ex: scans items for inventory at stores Data collection devices and many mobile computers and devices have the capability of wirelessly transmitting data over a network or the Internet. Increasingly more users today send data wirelessly to central office computers using these devices.

Peripheral Devices

occupy space outside the system unit and communicate with the system unit using wired or wireless technology.

IP spoofing

occurs when an intruder uses fools a network into believing its IP address is associated with a trusted source

information theft

occurs when someone steals personal or confidential information To further protect information on the Internet and networks, organizations and individuals use a variety of encryption techniques.

software theft

occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a programs Physically stealing software Intentionally erasing software Illegal registration/activation Illegal copying

Technology additction

occurs when technology use consumes someone's entire life -is a growing health problem, but can be treated through therapy and support groups

Undervoltage

occurs when the electrical supply or voltage drops, often defined as more than five percent brownout is a prolonged (more than a minute) undervoltage A blackout is a complete power failure. Under Voltages can cause data loss but generally do not cause equipment damage

Overvoltage or power surge

occurs when the incoming electrical supply or voltage increases, often defined as more than five percent, above the normal volts. A momentary overvoltage (spike) occurs when the increase in power lasts for less than one millisecond

document conversion software

saves documents created in any application into a common format that has the same appearance as the original document

Safely Scanning QR codes

scan trustworthy sources verify the web address choose a reputable QR scanner do not supply personal information check for tampering

A(n) ______ is a light-sensing input device that converts printed text and images into a form the computer can process.

scanner

A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic.

search engine

Email spoofing

occurs when the sender's address or other components of an email header are altered so that it appears that the email message originated from a different sender

Gaming

offer a social component, enabling you to chat within the game environment, find friends who play the same game apps, and post your scores on social media.

A Massive Open Online Course (MOOC)

offers access to quality education anywhere the Internet is available through a combination of video instruction and interaction with an instructor and students in an online classroom most involve videos of lectures, assigned readings, assignments, and interactive discussions. Khan Academy is one of the more popular MOOCs,

Outsourcing

offload all (or at least the backup) storage management to an outside organization or a cloud storage provider

Internet messaging

often occurs in real-time, are communication services that notify you when one or more of your established contacts are online and then allows you to exchange messages or files or join a private chat room with them -real time meaning that you and the people with whom you are conversing are online at the same time

state of computer illustration of volatility

on and off

Travel and Tourism

on these websites you typically can read travel reviews, search for and compare flights and prices, order airline tickets, book a room, or reserve a rental car.

Handwriting recognition software

once uploaded, translates the handwritten letters and symbols created on the screen into typed or text or objects that a computer or device can process. Most are used for notetaking

Hertz

one cycle per second

Keyboard shortcut

one or more keyboard keys that you press to perform an operating system or application based task

Speakers

or speaker systems that generate higher-quality sounds for doing stuff Typically have tone and volume controls, allowing users to adjust settings

Public Technical Identifiers (PTI)

organization that approves and controls TLD

augmented reality app

overlays information and digital content on top of physical objects or locations EX) used in medical field

Several words separated by spaces used in place of a password are called what?

passphrases

dedicated servers

perform a specific service and can be placed with other dedicated servers to perform multiple services -each type uses software designed specifically to manage its service -typically require a faster processor, more memory, and additional storage

PIN

personal identification number numeric password either assigned by company or selected by a user. Provide an extra level of security

PIN

personal identification number verifies that you are the holder of the bank card

Wired Transmission media

phone lines, coaxial cable, and fiber-optic cable -•With wired connections, a computer or device physically attaches via a cable or wire to a communications device --Cable Internet service -DSL (digital subscriber line) -Fiber to the Premises (FTTP)

Dot pitch

pixel pitch, is the distance in millimeters between pixels on a display. Average dot pitch should be .30 mm or lower

striping

portions of each drive are placed on multiple drives. strips data, instructions, and information across multiple drives in the array it improves drive access times but doesn't offer data duplication

on-screen keyboard

press keys on the screen using their fingertip or a stylus

Opera

second-oldest browser is free, fast, and small. Used on both computers and mobile devices, Opera must be downloaded and installed.

SDXC

secure digital extended capacity

Hard copy/printout

printed content

Hard copy

printed material

Rootkit

program that hides in a computer and allows someone from a remote location to take full control of the computer Rootkits can be very dangerous and often require special software to detect and remove.

virtual keyboard

projects an image of a keyboard on a flat surface

antivirus program

protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files scan for programs that attempt to modify a computer's start-up files, the operating system, and other programs that normally are read from but not modified

Game Server

provides a central location for online gaming

Sarbanes-Oxley Act

provides a myriad of financial reporting requirements and guidelines for publicly traded companies.

virtual reality app

provides an immersive user experience Some require a specialized viewer, which may have a built-in display, or make use of a smartphone to display 360-degree images or video content.

Home Server

provides storage, internet connections, or other services to computers and devices in a household

virtual private network (VPN)

provides the mobile user with a secure connection to the company network server, as if the user has a private line

Tactile output

provides the user with a physical response from the device

OMR devices

read hand drawn marks, such as small circles or rectangles. Ex: a person places marks on a form, survey or answer sheet

tape drive

reads and writes data and information on a magnetic tape

RFID Reader

reads the information on the tag via radio waves, can be mounted on door or in a handheld device

RFID reader

reads the radio signal and transfers the information to a computer or computing device

Pull Notification

receiver requests info from sending location

signature verification system

recognizes the shape of your handwritten signature, as well as measures the pressure exerted and the motion used to write the signature

Podcast

recorded media that users can download or stream to a computer or portable media player

Storage Device

records (writes) and/or retrieves (reads) items to and from storage media

audit trail

records in a file both successful and unsuccessful access attempts An unsuccessful access attempt could result from a user mistyping his or her password, or it could result from a perpetrator trying thousands of passwords.

Digital Video Camera (DV)

records video as digital signals, which you can transfer directly to a computer or mobile device with an appropriate connection

Hard Drive

refers collectively to hard disks and SSDs. Hard drives can be internal or external. That is, they can reside inside a computer or mobile device, or they can be an external device that connects to a computer or some mobile devices

multimedia

refers to any application that combines text with media -media includes graphics, animation, audio, video, and virtual reality

Surfing the Web

refers to the activity of using links to explore the web

system unit

refers to the case that contain and protects the motherboard, internal hard drive, memory, and other electronic components of the computer from damage

information privacy

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Intellectual Property

refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, logos

Defragmenting

reorganizes the files so that they are located in contiguous sectors, which speeds access time.

Worm

resides in active memory and replicates itself over a network to infect computers and devices using system resources and possibly shutting down the system

Keywords

results that include all the important words in the phrase that search engines display

tape robot

retrieves tape cartridges

Restore Tool

reverses the process and returns backed up files to their original form

A common way to display a shortcut menu using a mouse is to ______.

right-click

mobile app

runs on a mobile device

Safari

s, Safari has been the default browser for macOS since 2003 and is relatively new to Windows. The browser has built-in sharing with online social networks, fast performance, parental controls, and ease of use.

A web ______ is a computer that delivers requested webpages to your computer or mobile device.

server

Online shopping websites generally use a ___ to keep track of items in a user's shopping cart.

session cookie

Balance Board

shaped like a weight scale and contains sensors that measure a game player's balance and weight

Infographic

short for information graphic, which is a visual representation of data or information designed to communicate quickly, simplify complex concepts, or present patterns or trends ex./ maps, signs, charts, and diagram -JPEG and PNG format is most common

Magstripe reader

short for magnetic stripe card reader, reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, identification cards The stripe contains information identifying you and the card issuer. Some information stored in the stripe may include your name, account number, the card's expiration date, and a country code.

pixel

short for picture element the smallest element in an electronic image -im megapixels (MP) or millions of pixels (digital cameras are usually stated with this) the greater number of pixels the camera uses the better quality

SMS

short message services -users can send and receive short text messages, typically fewer than 300 characters on a phone or other mobile device or computer -text message services typically provide users with several options for sending and receiving messages such as mobile to mobile, mobile to email, mobile to provider, web to mobile

file compression tool

shrinks the size of a file(s) You may need to compress a file so that it will fit on a smaller storage medium, such as a USB flash drive

SLR camera

single lens reflex camera - a high end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed -are much heavier and larger than point and shoot cameras

crimeware

software used by cybercriminals

Hardware gets instructions from...

software.

cyberextortionist

someone who demands payment to stop an attack on an organization's technology infrastructure They may threaten to destroy or damage computers for political reasons

cyberterrorist

someone who uses the Internet or network to destry or damage computers for political reasone

Selective Backup

sometimes called a (PARTIAL BACKUP) allows the user to choose specific files to back up, regardless of whether or not the files have changed since the last incremental backup.

Dye-sublimation printer

sometimes called a digital photo printer, uses heat to transfer color dye to specially coated paper. Used by photography studios, medical labs and security identification systems

USB flash drives

sometimes called a thumb drive plug into a USB port on a computer or mobile device convenient for mobile users because they are small and lightweight enough to be transported on a keychain or in a pocket. With a USB flash drive, users easily transfer documents, photos, music, and videos from one computer to another.

Full Backup

sometimes called an (ARCHIVAL BACKUP) provides the best protection against data loss because it copies all program and data files

Software Developer

sometimes called an application developer or computer programmer, is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information

Internet service provider (ISP)

sometimes called an internet access provider -is a business that provides individuals and organizations access to the Internet free or for a fee -often charge a fixed amount for internet connections, offering customers a variety of plans based on desired speeds, bandwidth, and services -may also include additional services like email and online storage

application (or app)

sometimes called application software, consists of programs designed to make users more productive and/or assist them with personal tasks

Motion input

sometimes called gesture recognition, users can guide on-screen elements using air gestures

Two popular adapter cards are

sound cards and video cards

Recovery Plan

specifies the actions to be taken to restore full info processing operations

Emergency Plan

specifies the steps to be taken immediately after a disaster strikes Includes: names and phone numbers of people and organizations to notify; Computer equipment procedures, such as equipment or power shut off, and file removal; Employee evacuation procedures; Return procedure

QR code

square-shaped coded graphic that corresponds to a web address or other information

nonvolatile

storage - its contents remain when power off

Index

stores a variety of information about a file including its name, date, modified, author name, and so on Each entry in the index contains a link to the actual file on the storage media for easy retrieval.

Mail Server

stores and delivers email messages

Web Server

stores and delivers requested webpages to a computer via a browser

List Server

stores and manages email lists

File server (storage server)

stores and manages files

Database server

stores and provides access to a database

Application Server

stores and runs apps

smart card

stores data on an integrated circuit embedded in the card

Domain Name Server

stores domain names and their corresponding IP addresses

FTP Server

stores files for user upload or download via FTP

Resolution

the number of horizontal and vertical pixels in a display A higher resolution uses a greater number of pixels and, thus, provides a smoother, sharper, and clearer image. As the resolution increases, however, some items on the screen appear smaller.

storage medium

the physical material on which a computer keeps data, information, programs, and applications

Port

the point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data to or receive information from the computer or mobile device

Cloud Storage

the practice of computer and mobile device users keeping their files on the cloud

Crowdsourcing

the practice of obtaining information or input into a task or project by enlisting the services of a large number of people, either paid or unpaid, typically via the Internet.

Virtualization

the practice of sharing or pooling computing resources, such as servers and storage devices

Video input

the process of capturing full motion images and storing them on a computer or mobile devices storage medium, such as a hard drive and an optical disk

Voice Input

the process of entering input by speaking into a microphone

e-filing

the process of filing your tax forms electronically

Burning

the process of writing on an optical disc

output

the production of information

Loads

the program's instructions are copied from storage to memory

Native resolution

the resolution for which displays are optimized for

script kiddie

the same intent as a cracker but does not have the technical skills and knowledge. Script kiddes often use prewritten hacking and cracking programs to break into computers and networks.

Transfer Rate

the speed with which data, instructions, and information transfer to and from a device

Candela

the standard unit of luminous intensity Displays today typically range from 250 to 700 nits. The higher the nits, the brighter the images.

Response time

the time (milliseconds) that it takes to turn a pixel on or off. These range between 2-16 ms

Access Time

the time it takes a storage device to locate its stored data The access time of storage devices is slow compared with the access time of memory. Memory (chips) accesses items in billionths of a second (nanoseconds). Storage devices, by contrast, access items in thousandths of a second (milliseconds) or millionths of a second (microseconds).

Email

the transmission of messages and files via a computer network -one of the original services on the internet, enabling scientists and researchers working on government-sponsored projects to communicate with collegues at other locations

unauthorized use

the use of a computer or its data for unapproved or possibly illegal activities

unauthorized access

the use of a computer or network without permission

Computer Aided Design (CAD)

the use of computers in the design of products

Computer-aided manufacturing

the use of computers to assist with manufacturing processes, such as fabrication and assembly Industries use CAM to reduce product development costs, shorten a product's time to market, and stay ahead of the competition

Virtual Reality

the use of computers to simulate a reali imagined environment that appears as a 3-D space -VR involves the display of 3-D images that users explore and manipulate interactively In addition to games and simulations, many practical applications of VR also exist. Science educators create VR models of molecules, organisms, and other structures for students to examine. Companies use VR to showcase products or create advertisements. Architects create VR models of buildings and rooms so that clients can see how a completed construction project will look before it is built.

Blogsphere

the worldwide collection of blogs

Backward Compatible

they support older USB devices as well as newer ones

Active-matrix or TFT

thin-film transistor, uses a separate transistor to apply charges to each liquid crystal cell and thus, displays high quality color from all angles. Available in several types

Disk Cleanup

tool that searches for and removes unnecessary files Unnecessary files may include downloaded program files, temporary Internet files, deleted files, and unused program files

Multi-touch

touch screens that recognize multiple points of contact at the same time

Tethering

transforms a smartphone or internet capable tablet into a portable communications device that shares its Internet access with other computers and devices wirelessly Users may pay additional fees for mobile hot spot and tethering services. -mobile devices can be used for tethering also

Morphing

transforms one video image into another image over the course of several frames of video

Digital Device Convergence

trend of computers and devices with technologies that overlap it means that consumers may need fewer devices for the functionality that they require.

Wiki

type of software that creates an interface that enables users to add or edit the content of some types of websites

software registration

typically is optional and usually involves submitting your name and other personal information to the software manufacturer or developer

Spam

unsolicited email messages or posting sent to many recipients or forums at once considered Internet junk mail

Smart Cities

use the IoT, as well as advanced communications technologies, to help manage the city. For example, some cities might use connected devices to monitor and manage energy use or control traffic.

email program

used to create, send, receive, forward, store, print, and delete email messages Email programs are available as desktop apps, web apps, and mobile apps.

CSS (Cascading Style Sheets)

used to specify the contents appearance

Text Editor

used to type information when it does not need to be formatted with fonts, page numbers, or other styles

L4 cache

used with some newer processor and doesn't reside on the processor

Online Auction

users bid on an item being sold by someone else

Online Banking

users can access accounts, pay bills, transfer funds, calculate mortgage payments, and manage other financial activities from their computer or mobile device users can access accounts, pay bills, transfer funds, calculate mortgage payments, and manage other financial activities from their computer or mobile device

visual voice mail

users can view message details, such as the length of calls -can read message content instead of listening to them

swipe keyboards

users enter words by tracing a path on an on-screen keyboard with their fingertip or stylus from one letter to the next in a continuous motion

3-D Printer

uses a process called additive manufacturing to create an object by adding material to a three-dimensional object, one horizontal layer at a time. 3-D printers can print solid objects, such as clothing, prosthetics, eyewear, implants, toys, parts, prototypes, and more

wireless modem

uses a wireless communications technology (suh as cellular radio, satellite, or WiFi) to connect to the internet

NFC

uses close-range radio signals to transmit data between two NFC-enabled devices

Plasma Display

uses gas plasma technology, which sandwiches a layer of gas between two glass plates

Laser mouse

uses laser sensors that emit and sense light to detect the mouse's movement

Large-format printer

uses laser-ink printer technology, just on a much larger scale, it creates photo-realistic quality color prints. Used by graphic designers, v expensive v high performance

LCD projecter

uses liquid crystal to display technology, attaches directly to a computer or mobile device and uses its own light source to display the information shown on the computer screen.

Optical mouse

uses optical sensors that emit and sense light to detect the mouses movement

Wi-Fi

uses radio signals to provide high-speed Internet and network connections to computers and devices capable of communicating via Wi-Fi.

SATA (Serial Advanced Technology Attachment)

uses serial signals to transfer data, instructions, and information The primary advantage of SATA interfaces is that their cables are thinner, longer, more flexible, and less susceptible to interference than cables that use parallel signals.

Bluetooth

uses short-range radio signals to enable Bluetooth-enabled computers and devices to communicate with each other

IaaS (Infrastructure as a Service)

uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed

Real Time

you and the people with whom you are conversing are online at the same time For real-time Internet messaging to work, both parties must be online at the same time. Also, the receiver of a message must be willing to accept messages.

DV Technology

you can input, edit, manage, publish, and share your videos

Photo Management Software

you can view, organize, sort, catalog, print, and share digital photos

Pen-input

you touch a stylus or digital pen on a flat surface to write, draw or make selections

Media Sharing

you use the digital camera on your mobile device to take quality photos and/or videos and then instantly can share the photos or videos on online social networks.

web app

•an application stored on a web server that you access through a browser -Web apps usually store users' data and information on their hosts' servers -ie cloud storage

A connector

•joins a cable to a port •A connector at one end of a cable attaches to a port on the computer or mobile device, and a connector at the other end of the cable attaches to a port on the peripheral device

Gigahertz

One billion ticks of the system clock per second

E-retail

You can purchase just about any product or service on the web

Restore

Copying the backed up files to their original location on the computer or mobile device

portable media player

Mobile device on which you can store, organize, and play digital media.

Picture Message

A photo or other image, sometimes along with sound and text, sent to or from a smartphone or other mobile device.

GPS

(Global Positioning System) Navigation system that assists users with determining their location, ascertaining directions, and more

security suite

(Internet security programs) Collection of individual security tools available together as a unit

Point of Sale Terminals

(POS) records purchases, process credit or debit cards and update inventory Output from POS serves as input to other computers to maintain sales records, update inventory, verify credit, and perform other activities associated with sales transactions

Fingerprint Reader

(fingerprint scanner) captures curves and indentations of a fingerprint

M-Commerce

(mobile commerce) used to identify e-commerce that takes place using mobile devices.

QR Code

(quick response code) is known as a 2-D bar code bc it stores information in both vertical and horizontal directionin a square-shaped graphic that represents a web address or other content, such as contacts or phone numbers

Resources

networks share these such as hardware, software, data, and information. Sharing resources saves time and money

personal interest applications

- Lifestyle applications(Access the latest news or sports scores, check the weather forecast, compose music, research genealogy, find recipes, meet or chat with friends online near you, or locate nearby restaurants, gas stations, or points of interest.) - Medical applications (Research symptoms, establish a fitness or health program, track exercise activity, refill prescriptions, count calories, or monitor sleep patterns.) - Entertainment applications (Listen to music or the radio, view photos, watch videos or shows, read a book or other publication, organize and track fantasy sports teams, and play games individually or with others.) - Convenience applications (Obtain driving directions or your current location, convert speech to text instead of typing, set an alarm or timer, check the time, calculate a tip, use your phone as a flashlight, or use a personal assistant that acts on your voice commands) - Education applications (Access how-to guides, learn or fine-tune a particular skill, follow a tutorial, run a simulation, assist children with reading and other elementary skills, or support academics.)

security tools

-Anti-spam programs -Web filtering software -Phishing filters -Pop-up and pop-under blockers

communication applications

-Blog -Browser -Chat -Online Discussion -Email -File Transfer -Internet Phone -Internet Messaging -Mobile (Text) Messaging -Videoconference

TYPES OF OPTICAL DISC

-CD- ROM -CD-R -CD-RW -DVD-ROM -DVD-R/DVD+R -DVDRW/DVD+RW/ DVD+RAM

An SSD (solid state drive) has several advantages over traditional (magnetic) hard disks:

-Faster access times -Faster transfer rates -Quieter operation -More durable -Lighter weight -Less power consumption -Less heat generation -Longer life (more than 10 times longer) -Defragmentation not required

ENTERPRISE COMPUTING A large organization, commonly referred to as an enterprise, requires special computing solutions because of its size and geographic distribution

-Human resources software (manages employee information, such as pay rate, benefits, personal information, performance evaluations, training, and vacation time.) -Accounting and finance software (A manages everyday transactions, such as sales and payments to suppliers. F helps managers budget, forecast, and analyze.) -Engineering or product development software (allows engineers to develop plans for new products and test their product designs) -Manufacturing software (assists in the assembly process, as well as in scheduling and managing the inventory of parts and products.) -Marketing software (allows marketing personnel to create marketing campaigns, target demographics, and track their effectiveness.) -Sales software (enables the salesforce to manage contacts, schedule meetings, log customer interactions, manage product information, and take customer orders.) -Distribution software (analyzes and tracks inventory and manages product shipping status) -Customer service software (manages the day-to-day interactions with customers, such as phone calls, email messages, web interactions, and messaging sessions.) -Information technology software (use a variety of programs and apps to maintain and secure the hardware and software in an enterprise.)

Programs and apps are distributed in a variety of forms

-Retail software (mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company) -Custom software (performs functions specific to a business or industry.) -Shareware (copyrighted software that is distributed at no cost for a trial period) -Freeware (copyrighted software provided at no cost by an individual or a company that retains all rights to the software) -Open source software (software provided for use, modification, and redistribution. May have restrictions form copyright holder) -Public domain software (has been donated for public use and has no copyright restrictions.)

types of volatile

-SCREEN DISPLAY -contents disappear when power is removed -RAM-its contents are erased when power is removed from a computer or mobile device

Types of websites

-Search engine -Online social network -Informational and research -Media sharing -Bookmarking -News, weather, sports, and other mass media •Educational •Business, governmental, and organizational •Blogs •Wiki and collaboration •Health and fitness •Science •Entertainment •Banking and finance •Travel and tourism •Mapping •Retail and auctions •Careers and employment •E-commerce •Portals •Content aggregation •Website creation and management

The storage capacity of hard disks varies and is determined by:

-The number of platters the hard disk contains -The composition of the magnetic coating on the platters -Whether the disk uses longitudinal or perpendicular recording -Density

Characteristics of a hard disk include:

-Tracks -Sectors -Platters -Form factor -Read/write head -Revolutions per minute

Productivity applications can assist you in becoming more effective and efficient while performing daily activities at work, school, and home

-Word processing -Presentation -Spreadsheet -Database -Note taking -Calendar and contact term-57 -management -Project management -Accounting -Personal finance -Legal -Tax preparation -Document management -Support services -Enterprise computing

word processing software

-allows users to create and manipulate documents containing text and graphics -to develop documents such as letters, memos, reports, mailing labels, and newsletters Word processing software has many features to create professional and visually appealing documents. Word processing software allows users to incorporate graphics, such as digital photos and clip art, in document The page setup feature of word processing software allows you to define the size of the paper on which to print and to specify the margin Word processing software typically includes tools to assist you with the writing process

presentation software

-allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group -provides tools for creating slides with content arranged in a variety of formats. typically provides a variety of predefined presentation formats that suggest complementary colors for backgrounds, text, and graphical accents on the slides. Can set up slide timing, apply special effects, include images, photos, videos, clips, and audio clips, can be viewed in a variety of formats (including hard copy)

hard disk (hard disk drive, HDD)

-storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information -desktops and laptops often contain at least one hard disk. In a personal computer is enclosed inside an airtight, sealed case. (The laptop hard disk is much smaller than the desktop hard disk.)

"Software gives instructions to..."

...hardware." -Barb

Popular TLDs

.biz: Businesses .com: Commercial organizations, businesses, and companies .edu: Educational institutions .gov: Government agencies .mil: Military organizations .museum: Museums and individual museum professionals .name: Individuals .net: Network providers or commercial companies .org: Nonprofit organizations .pro: Licensed professionals .technology: Technology information .travel: Entities whose primary area of activity is in the travel industry

Gigabyte (GB)

1 billion bytes (2^30) 1 073 741 824

Megabyte (MB)

1 million (1,048,576) bytes

Yottabyte (YB)

1 septillion bytes

Zettabyte (ZB)

1 sextillion bytes

Kilobyte (KB)

1 thousand bytes 2^10 bytes 1,024 bytes

Terabyte (TB)

1 trillion bytes

Opporaters

1. space or + ex./ Art + Music 2. or Dog or puppy 3. () -combines search results 4. - excludes a word from research results ex./ automobile-convertible 5. "" search for an excat phrase in a certain order 6. * substitute characters in place of the asterisk

Evolution of the internet

1. started with a networking project started by the Pentagon's Advanced Research Project Agency (ARPA) and U.S. Department of Defense 1a) their goals were a network that allowed scientists at different physical locations to share information and work together on military and scientific projects and could function even if part of the network were disabled or destroyed by a disaster such as a nuclear attack. 2. created a network known as ARPANET (1969) linking scientific and academic scientists across the world 3. Today: Millions of hosts connect to the internet

Access time measures:

1. the amount of time it takes a storage device to locate an item on a storage medium 2. the time required to deliver an item from memory to the processor

Exabyte (EB)

1000 PB a quintillion bytes (10^18)

Petabyte (PB)

1000 TB or a quadrillion bytes

Widescreen monitors aspect ratio

16:9 or 16:10

A(n) ______ printer can print solid objects from materials including plastic, nylon, or wood.

3D

Docking Station

An external device that attaches to a mobile computer or device and contains a power connection and provides connections to peripheral devices.

Backup Plans

A backup plan specifies a regular schedule for copying and storing important data, information, apps, and programs. Organizations should state their backup plans clearly, document them in writing, and follow them consistently. Home and small business users can use a calendar app or other reminder to keep a backup schedule for their computers or mobile devices, or use a program or app that performs automatic backups.

Wireless Keyboard

A battery-powered device that transmits data to the computer or mobile device using wireless technology.

Wireless Mouse

A battery-powered device that transmits data using wireless technology.

Wiki

A collaborative website that can be edited by anyone that can access it.

Network

A collection of computers and devices connected together, often wirelessly, via communications devices and transmission media.

Database

A collection of data organized in a manner that allows access, retrieval, and use of that data Computer stores the data on a storage medium, such as a hard drive or flash drive, or the cloud.

Website

A collection of related webpages, which are stored on a web server.

Data

A collection of unprocessed items, which can include text, numbers, images, audio, and video.

Data (Input)

A collection of unprocessed items, which can include text, numbers, images, audio, and video.

Server

A computer dedicated to providing one or more services to other computers or devices on a network. A server can support from two to several thousand connected computers and devices at the same time. Smaller applications, such as at home, sometimes use a high-end desktop as a server. Larger corporate, government, and web applications use powerful, expensive servers to support their daily operations.

Buses

A computer processes and stores data as a series of electronic bits. These bits transfer internally within the circuitry of the computer along electrical channels, Allows the various devices both inside and attached to the system unit to communicate with one another Just as vehicles travel on a highway to move from one destination to another, bits travel on a bus Used to transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to output or storage devices

Personal Computer

A computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time

Web Server

A computer that delivers requested webpages to your computer or mobile device.

worksheet

A computerized spreadsheet in Excel. columns and rows collectively

The Internet of Things

A computing environment where everyday objects, or things, are connected to the Internet Sensors connected to these objects may gather, share, transmit, and receive data about the objects with other devices or servers online

storage area network (SAN)

A dedicated network storage facility that provides access to data storage over a high-speed network. -provides centralized storage for servers and networks. Includes only storage devices. High-speed fiber-optic cable usually connects other networks and servers to the storage area network, so that the networks and servers have fast access to large storage capacities.

All -in-One Computer

A desktop that does not contain a tower but instead uses the same case to house the display and the processing circuitry.

Phablet

A device that combines the features of a smartphone with a tablet. Larger than smartphones but smaller than tablets

Convergence

A device that has multiple focuses.

Stand Alone Device

A device with one main focus. May have more features and functionality than combined devices Might also be bought because person wants to use this and a combined device at the same time

Monitor

A display that is packaged as a separate peripheral device. Today's monitors have a small footprint, meaning they do not take up much desk space. Sizes of these displays vary based on the mobile device or computer

Backup

A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed

Backup

A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.

Anticybersquatting Consumer Protection Act (ACPA)

A federal statute that permits trademark owners and famous persons to recover domain names that use their names where the domain name has been registered by another person or business in bad faith.

Single Sign On

A gateway service that permits users to log in once with a single user ID and password to gain access to multiple software applications. EX) google, microsoft, twitter, facebook

Network License

A legal agreement that allows multiple users to access software on the server simultaneously.

Site License

A legal agreement that permits users to install software on multiple computers-usually at a volume discount.

Gesture

A motion you make on a touch screen with the tip of one or more fingers or your hand.

Personal Computer (PC)

A personal computer (PC) is a mobile computer or desktop that can perform all of its input, processing, output, and storage activities by itself and its intended to be used by one person at a time

Desktop Computer

A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. The screen is separate from the tower with the exception of the all-in-one.

Video Message

A short video clip, usually about 30 seconds, sent to or from a smartphone or other mobile device.

dongle

A small device that connects to a computer and enables additional functions when attached

tape cartridge

A small, rectangular, plastic housing for tape.

Personal Firewall

A software firewall that detects and protects a personal computer and its data from unauthorized intrusions Personal firewalls constantly monitor all transmissions to and from the computer and may inform a user of any attempted intrusions.

Wheel

A steering-wheel-type input device that users turn to simulate driving a car, truck, or other vehicle

Slate Tablet

A tablet that does not contain a physical keyboard.

Blog

An informal website consisting of time-stamped articles in a diary or journal format, usually listed in reverse chronological order.

stick computer

AKA PC stick - a small computer which usually is the same size as or a little larger than a USB flash drive -typically plug into an HDMI port on a computer monitor or a TV and can run operating systems and apps similar to those that run on a desktop or laptop -most rely on stick computer to browse the web, stream media, run apps, and play games they are small and easy to transport. They have limited storage and not as powerful as laptops but are typically cheaper

Laptop

AKA a notebook computer is a thin, lightweight mobile computer with a screen in its lid and a keyoboard in its base -have input devices such as keyboards, touchpad, webcam -have output devices such as screens and speakers -have storage such as hard drive and maybe optic disk drive

Plug ins

AKA add-on -a program that extends capability of a browser ex./ your browser may require Adobe Reader to view and print PDF files ^can download plug-ins at no cost from various websites \\ >some plug-ins run on all types of computers and mobile devices; others have special versions for mobile devices

desktop

AKA desktop computer -a personal computer designed to be in a stationary location, where all of its components fit on or under a desk or tablet Components: peripheral devices such as keyboard, mouse, and webcam (input devices), speakers and printer (output devices), external hard drive *storage device), router/modem (communication devices)

online discussion

AKA discussion forum -an online area in which users have writte discussions about a particular subject -to participate, a user posts a message called an article and other users reply with a message

Printout

AKA hard copy is either in portrait or landscape mode

Malware

AKA malicious software Consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices

rack server

AKA rack-mounted server -a server that is housed in a slot on a metal frame (rack) -a rack can contain multiple servers, each with a different bay. The rack is fastened to a flat service

smartglasses

AKA smart eyewear -augmented reality glasses are reality glasses,are wearable head-mounted eyeglass-type device that enables the user to view info or take photos and videos that are projected to a miniature screen in the users field of vision.

digital media player

AKA streaming media player - a device typically used in a home that streams digital media from a computer or network to a TV, projector or some other entertainment device

Motherboard

AKA systems board Is the main circuit board of the personal computer. Many electrical components attach to the motherboard. They can also integrate sound, video, and networking capabilities Components: processor and memory

Virus Signature

AKA virus definition a known specific pattern of virus code helps to identify the virus should be updated frequently

Mobile service provider

AKA wireless data provider EX) Verizon Wireless -an ISP that offers wireless Internet access to computers and mobile devices with the necessary built in wireless capability such as wifi, wireless modems, or other communication devices to enable wireless connectivity

ARPANET

ARPANET consisted of 4 main computers at California at LA, the University of California, Stanford Research Institute, and the University of Utah 1984 ARPANET has more than 1000 individual computers linked as hosts function even if part of the network were disabled or destroyed by a disaster

Advantages of Cloud Storage

Access files from any computer. Store large files instantaneously, Allow others to access their files. View time-critical data and images immediately. Store offsite backups. Provide data center functions

Why SSds have Faster Access Time than Hard Disc

Access time on a hard disk depends on the location of the data. That is, the data on the platter near the read/write head is accessed faster. The data on an SSD, by contrast, can be accessed almost instantly wherever it is located because the drive contains no moving parts.

Cloud Computing Reason 1

Accessibility: Data and/or applications are available worldwide from any computer or device with an Internet Connection

Tasks Personal Assistants do

Activate your device's personal assistant Change phone settings Dial a number Obtain information Obtain driving instructions Run an app Schedule a meeting Send a text message Set a reminder Set a timer Set an alarm

Expansion bus

Allows the processor to communicate with peripheral devices

Browser

Allows users to access and view webpages on the Internet Requires browser software Integrated in most operating systems Many alternative browsers are available

Internet Phone

Allows users to speak to other users via an Internet connection Requires a microphone, a speaker, a high-speed Internet connection, and VoIP software Some subscription services also require a separate phone and VoIP router With a webcam, some services also support video chat or videoconferences

Video Card

Also called a graphics card, converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen.

All in One Printer

Also called a multi function printer (MFP) a single device that looks like a printer or a copy machine, but provides the functionality of a printer, scanner, copy machine and perhaps a fax machine

System Bus

Also called the front side bus (FSB) Part of the motherboard and connects the processor to main memory

Dots per Inch (dpi)

Also known as printer resolution. The number of dots of colour a printer is capable of producing in a certain amount of space.

When Should You Use a Database Instead of a Spreadsheet Program?

Although databases and spreadsheets both store data, these programs have different purposes and capabilities. Spreadsheet programs are ideal for calculating results or creating charts from value in the worksheet. You should use a database program, however, if want to collect, reorganize and filter data, and/or create reports from the data.

ASCII

American Standard Code for Information Interchange, is the most widely used coding scheme to represent a set of characters

Touch-Sensitive Pad

An input device that contains buttons and/or wheels you operate with a thumb or finger. Using the touch-sensitive pad, you can scroll through and play music; view photos; watch videos or movies; navigate through song, photo, or movie lists; display a menu; adjust volume; customize settings; and perform other actions.

ADA

Americans With Disabilities Act requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers Besides voice recognition, which is ideal for blind or visually impaired users, several other input options are available. Users with limited hand mobility who want to use a keyboard can use an on-screen keyboard or a keyboard with larger keys. Users with limited hand movement can use a head-mounted pointer to control the pointer or insertion point Hearing-impaired users, for example, can instruct programs to display words instead of sounds. Visually impaired users can change screen settings, such as increasing the size or changing the color of the text to make the words easier to read. Instead of using a monitor, blind users can work with voice output.

Access Time

Amount of time it takes the processor to read data, instructions, and information from memory. Directly affects how fast the computer processes data accessing data in memory can be more than 200,000 times faster than accessing data on a hard disk because of the mechanical motion of the hard disk.

Pop-up ad

An Internet advertisement that suddenly appears in a new window on top of a webpage displayed in a browser.

Cloud Storage

An Internet service that provides remote storage to computer users. Types of services offered by cloud storage providers vary. Some provide storage for specific types of media, such as photos, whereas others store any content and provide backup services

Trackpad

An alternative to a mouse often found on laptops. It is a small rectangle of touch-sensitive material, so you can move your pointer and/or click by touching it with and moving your.

Desktop App

An application stored on a computer.

Web App

An application stored on a web server that you can access through a browser.

legal software

An application that assists in the preparation of legal documents and provides legal information to individuals, families, and small businesses Legal software provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.

note taking software

An application that enables users to enter typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook. Users also can include audio recordings as part of their notes. Some enable users to sync their notes to the cloud so that they can access the notes on any computer or mobile device. Many note taking applications also include a calendar feature.

Trial Version

An application you can use at no charge for a limited time, to see if it meets your needs. Limited functionality

Mobile App

An application you download from a mobile device's application store or other location on the Internet to a smartphone or other mobile device.

denial of service attack (DoS attack)

An assault whose purpose is to disrupt computer access to an Internet service such as the web or email. The victim computer network slows down considerably and eventually becomes unresponsive or unavailable, blocking legitimate visitors from accessing the network.

Computer

An electronic device that operates under the control of a set of instructions that is stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use.

Webpage

An electronic document on the web which can contain text, graphics, audio, and video.

Signs of Virus and Malware infections

An unusual message or image is displayed on the computer screen. An unusual sound or music plays randomly. The available memory is less than what should be available. A program or file suddenly is missing, or an unknown program or file mysteriously appears. The computer's security tools, such as antivirus software or firewall, become disabled. The size of a file changes without explanation. A file becomes corrupted. A program will not run. The computer operates much slower than usual. Your browser displays pop-ups that you cannot close or webpages you did not request when you are online.

Arithmetic Logic Unit

Another component of the processor, performs arithmetic, comparison, and other operations

Notebook Computer

Another term for a laptop computer.

Host

Any computer or device that provides services and connections to other computers or devices on a network -a web server is an example of a host -hosts often use high-speed communications to transfer data and messages over a network

Enterprise

Any employee or customer who uses computers, mobile devices, and other technology within the big business enterprise

Small/Home Office User (SOHO)

Any employees of a company with fewer than 50 employees, as well as the self-employed who work from home

input device

Any hardware component that allows users to enter data and instructions into a computer.

output device

Any hardware component that conveys information to one or more people.

Power User

Any person who requires the capabilities of a powerful computer such as engineers, scientists, architects, desktop publishers, and graphic artists

Home User

Any person who spends time using technology at home

Mobile User

Any person who works with computers or mobile devices while away from a main office, home, or school

user

Anyone who communicates with a computer or utilizes the information it generates.

User

Anyone who interacts with a computer or mobile device, or utilizes the information it generates.

desktop app

Applications stored on a laptop computer or desktop

Second way of how memory stores

Applications that carry out a specific task, such as word processing

Steps to replace broken mobile device

Back up the data on your mobile device before starting a screen replacement. While a successful screen replacement should not threaten the data, it is a good idea to keep a backup in case a problem arises unexpectedly. Turn off the mobile device and disconnect it from all power sources. If the device uses a removable battery, remove it. Protect your hands and eyes before beginning glass replacement. If possible, carefully remove all pieces of broken glass. Consider using compressed air to remove any dust. Remove the display assembly. Refer to your device's documentation for information about removing the display. You may need a small, nonmagnetic screwdriver and/or metal or plastic tool to remove the assembly. If the display assembly is connected to the mobile device with a cable, carefully disconnect the cable. Unpack the new screen and connect it to the mobile device, connecting any necessary cables. Reassemble the mobile device, reconnect the power source and/or the battery, and turn on the device.

UPC (Universal Product Code)

Bar code used by retail and grocery stores.

Arithmetic Operations

Basic calculations, such as addition, subtraction, multiplication, and division

Practices gamers should practice to increase security

Before downloading any software or apps, including patches to games, or disclosing any private details, check the developer to be certain the website or the person making the request is legitimate. Read the permissions notices to learn what information is being requested or being collected. Avoid games requiring passwords to be saved to an online account on a smartphone. Exercise extreme caution if the game requires ActiveX or JavaScript to be enabled or if it must be played in administrator mode. Use a firewall and make exceptions to allow only trusted individuals to access your computer or mobile device when playing multiplayer online games. Do not share personal information with other gamers whom you meet online.

Parvati wants to find out more information about purchasing a computer, so she performs a web search. Parvati should use a search engine, such as ______.

Bing

microblog

Blog that allows users to publish short messages, usually between 1. Introduction to Computers00 and 200 characters, for others to read.

Types & Purposes of some Adapter Cards

Bluetooth: enables Bluetooth connectivity MIDI: connects to musical instruments Modem: connects to transmission media, such as cable television lines or phone lines Network: provides network connections, such as to an Ethernet port Sound: connects to speakers or a microphone TV tuner: allows viewing of digital television broadcasts on a monitor USB: connects to high-speed USB ports Video: provides enhanced graphics capabilities, such as accelerated processing or the ability to connect a second monitor Video capture: connects to a digital video camera

Antistatic Wristband

Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user.

L1 cache

Built directly on the processor chip. Usually has a very small capacity

Types of E-Commerce Websites

Business-to-consumer (B2C) e-commerce consists of the sale of goods and services to the general public, such as at a shopping website. Consumer-to-consumer (C2C) e-commerce occurs when one consumer sells directly to another, such as in an online auction. Business-to-business (B2B) e-commerce occurs when businesses provide goods and services to other businesses, such as online advertising, recruiting, credit, sales, market research, technical support, and training.

CD-R

CD-recordable is an optical disc on which users can write once, but not erase format called WORM (b/c you can write once and read many) some are MULTISESSION (you can write on part of disc at one time and another part at another time)

Photo CD

CDs that contain only photos.

common short code

CSC a four or five digit number assigned to a specific content or mobile service provider sometimes forllowed by the message ex./ a vote for a TV program contestant or donation to a charity

L3 Cache

Cache on the motherboard that is separate from the processor chip

Transistor

Can act as an electronic switch that opens or closes the circuit for electrical charges Today's computer chips contain millions or billions of transistors.

system unit

Case that contains the electronic components of a computer that are used to process data.

How to download apps safely?

Choose apps from Google Play for Android devices or the App Store for Apple devices. Choose software from reputable shareware, freeware, and public-domain download websites that offer products for your computer or device. Be wary of apps that do not have many reviews or apps that were added recently, unless you can verify the developer or publisher. Search for reviews from reputable websites. Obtain the latest versions of shareware, freeware, and public-domain software and apps.

Chrome

Chrome has independent tabbed browsing; if one tab experiences a problem, the other tabs continue to function.

Useful Products in Securing and Tracking Hardware

Clamps, cables, and locks Intrusion detection Tracking software Asset tags Personal safes

desktop computer

Computer designed so the system unit, input devices, output devices, and any other devices fit entirely on or under a desk or table.

handheld computer

Computer small enough to fit in one hand. See also handhelds or Ultra-Mobile PC (UMPC).

personal computer

Computer that can perform all of its input, processing, output, and storage activities by itself and contains a processor, memory, and one or more input and output devices, and storage devices.

server

Computer that controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information.

enterprise user

Computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with offices across a region, the country, or the world.

mobile device

Computing device small enough for a user to hold in his or her hand.

Backside Bus

Connects the processor to a cache

Solid State Media

Consist entirely of electronic components and contain no moving parts. The lack of moving parts makes flash memory storage more durable and shock resistant than other types of media, such as magnetic hard disks or optical discs.

Web

Consists of a worldwide collection of electronic documents.

Social Media

Consists of content that users create and share online, such as photos, videos, music, links, blog posts, Tweets, wiki entries, podcasts, and status updates. Social media websites facilitate the creation or publishing of social media online and include media sharing sites, bookmarking sites, blogs and microblogs, wikis, podcasts, online social networks, and online gaming sites.

Memory

Consists of electronic components that store instructions waiting to be executed and the data needed by those instructions.

Memory

Consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data(information) Usually consists of one or more chips on the motherboard or some other circuit board in the computer

Main memory

Consists of memory chips that can be read from and written to by the processor and other devices

The back end of Cloud Computing

Consists of the servers and storage devices that manage and store the resources accessed by users

Integrated circuit

Contains many microscopic pathways capable of carrying electrical current. Each integrated circuit can contain millions of elements such as resistors, capacitors, and transistors

System Clock

Control the timing of all computer operations System clock generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit.

VoIP

Conversation that takes place over internet using telephone connected to computer, mobile device, or other device

Differential backup

Copies only the files that have changed since the last full backup. Fast backup method. Requires minimal storage space to back up. Recovery is time-consuming because the last full backup plus the differential backup are needed.

Incremental Backup

Copies only the files that have changed since the last full or incremental backup. Fastest backup method. Requires minimal storage space to back up. Only most recent changes saved. Recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed.

Photo Editing Features

Crop: removes unwanted areas of a photo Remove red-eye: removes the appearance of red eyes caused by the camera flash Resize: changes the physical dimensions of the photo Compress: decreases the photo's file size Adjust Sharpness: increases or decreases crispness of objects in the photo Adjust brightness: adjusts lightness or darkness in the photo

Tabbed browsing

Current browsers typically support - the top of the browser shows a tab (similar to a file folder tab) for each webpage you display To move from one displayed web page to another, you click the tab in the browser. Tabbed browsing allows users to have multiple home pages that automatically are displayed when the browser runs You also can organize tabs in a group, called a tab group, and save the group as a favorite, so that at any time you can display all tabs at once.

Digital light processing

DLP projector, uses tiny mirrors to reflect light, which produces crisp, bright colorful images, the remain in focus and can be seen clearly even in well-lit room

What to Avoid to Keep Credit Card Safe

DO NOT Reveal your account number during a phone call unless you have initiated the call. Write your PIN on the card or on the protective envelope. Sign a blank charge slip. Carry extra cards, especially when traveling to unfamiliar locations. Let your card out of sight. While you may not be able to follow this advice at a restaurant when you hand the card to a server, you can be observant of employees' behaviors.

Data as a Service

DaaS (data as a service) allows users and applications to access a company's data

small office/home office (SOHO)

Describes any company with fewer than 50 employees, as well as the self-employed who work from home.

online

Describes the state of a computer when it is connected to a network.

Workstation

Designed to handle intense calculations and sophisticated graphics. Used by power users

Gaming Desktop

Desktop that offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games

Two common types of RAM

Dynamic RAM and Static RAM

Parts of a web address

EX) https://www.nps.gov/history/preserve-places.htm Protocol: https:// Host Name: www. Domain Name: nps.gov/ Path: history/ Webpage Name: preserve-places.htm

Multi Core vs Single Core Processor

Each processor core on a multi-core processor generally runs at a slower speed than a single-core processor, but multi-core processors typically increase overall performance. Multi-core processors also are more energy efficient than separate multiple processors, requiring lower levels of power consumption and emitting less heat inside the case.

Edge

Edge is a Microsoft browser included in the Windows operating system. It is the default browser for Windows on most devices and is not compatible with prior versions of Windows. Features include integration with Cortana and OneDrive, along with annotation and reading tools.

hardware

Electric, electronic, and mechanical components contained in a computer.

5 types of hardware

Electric, electronic, mechanical components, motherboard, CPU

processor (aka CPU central processing unit)

Electrical component that interprets and carries out the basic instructions that operate a computer.

processor

Electronic component on a computer's motherboard that interprets and carries out the basic instructions that operate the computer. See also CPU (central processing unit).

memory

Electronic components in a computer that store instructions waiting to be executed and data needed by those instructions.

computer

Electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use.

Web page

Electronic document on the Web, which can contain text, graphics, animation, audio, and video and often has built-in connections to other documents, graphics, Web pages, or Web sites.

Wireless Internet Access Points

Enables users with computers and mobile devices to connect to the Internet wirelessly

Licence Agreement

End User License Agreement (EULA) the right to use a program or app provides specific conditions for use of the software, which a user typically must accept before using the software

telemedicine

Form of long-distance health care where health-care professionals in separate locations conduct live conferences on the computer.

Graphics Processing Unit

GPU, the chip which controls the manipulation and display of graphics on display devices

Motion-Sensing Game Controller

Game controllers that allow the user to guide on-screen elements with air gestures, that is, by moving their body or handheld input device through the air. some are sold with specific game or with general purposes

Obtaining Games

Gamers have several options available for obtaining games. For tablets and smartphones, they can download games from an app store to a mobile computer or device. For game consoles, they can purchase or rent discs or other media that contain games, download or transfer them from online stores, or sign up for cloud services that stream or transfer games on demand.

GBps

Gigabytes per second.

The front end of Cloud Computing

Hardware and software with which a user interacts to access the cloud

communications device

Hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers.

storage device

Hardware used to record (write and/or read) items to and from storage media.

resources

Hardware, software, data, and information shared using a network.

Storage Appliance

Has its own IP address, usually does not have a keyboard or display, and contains at least one hard disk, often configured in a RAID.

SIMM (single inline memory module)

Has pins on opposite sides of the circuit board that connect together to form a single set of contacts

digital literacy

Having a current knowledge and understanding of computers and their uses. See also computer literacy.

Digital Literacy

Having a current knowledge and understanding of computers, mobile devices, the web, and other related technologies.

Memory Cache

Helps speed the processes of the computer because it stores frequently used instructions and data

HDTV

High def TV, is the MOST advance form of digital television, working with digital broadcast systems, transmitting digital sound, supporting widescreens and providing high resolutions

iris recognition system

High security areas use iris recognition systems. The camera in an iris recognition system uses iris recognition technology to read patterns in the iris of the eye. These patterns are as unique as a fingerprint. Iris recognition systems are quite expensive and are used by government security organizations, the military, and financial institutions that deal with highly sensitive data. Some organizations use retinal scanners, which work similarly but instead scan patterns of blood vessels in the back of the retina.

HDMI

High-Def Media Interface port combines DVI with high def TV and video

Digital Media

Includes music, photos, and videos

Hard Copy

Information that exists on a physical medium such as paper Many users opt for electronic distribution because it contributes to green computing.

Internet and Network Attacks

Information transmitted over networks has a higher degree of security risk than information kept on an organization's premises Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

The Chip (Microchip)

Inserted under skin at neck or shoulder has a unique number that is registered to the owner's name and address. It contains an antenna and transponder encased in a glass tube. The antenna receives low-frequency radio waves when a scanning device passes over the chip, and the transponder sends a signal with the chip's number back to the scanner.

Leading manufacturers of personal computers processor chips

Intel and AMD

Processor (Central Processing Unit; CPU)

Inteprets and carries out the basic instructions that operate a computer It significantly impacts overall computing power and manages most of a computer's operations

KBps

Kilobits per second

mainframe

Large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information.

Alphanumeric Characters

Letters and numbers and special symbols to a sequence of numeric values that a computer can process

Most personal computers today have two types of memory cache:

Level 1(L1) cache and Level 2 (L2) cache Some also have Level 3 (L3)

Home Automation

Lighting: controlling lighting is one of the more common uses of technology in the home. Thermostats: programmable thermostats adjust to seasonal needs and can be set to control temperatures in individual rooms. Appliances: smart appliances, such as dishwashers, can be programmed to run at non peak electrical times. Security: security systems can detect break-ins at doors and heat from fires, and they can send text and email messages to alert a homeowner when someone has entered or left the home. Remotes: many people are turning to using their smartphones and tablets to control all the devices in the room.

PDA

Lightweight mobile device that provides personal information management functions such as a calendar, appointment book, address book, calculator, and notepad. See also personal digital assistant.

FAQ

List that helps a user find answers to commonly asked questions.

Health and Fitness

Losing weight, training for a race, or following a low-calorie diet are some uses of health and fitness apps.

Malware

Malicious Software - Software that acts without a user's knowledge and deliberately alters the computer's or mobile device's operations.

News, Sports, and Weather

Many apps provide access to the latest news, stories, current events, sports scores, sporting events, and weather forecasts. You also can configure these apps to deliver text messages and other types of alerts to your device when certain events occur,

Superscalar

Means they can execute more than one instruction per clock cycle

Machine Cycle: Storing

Means writing the result to memory

videoconference

Meeting between geographically separated people who use a network to transmit video/audio Requires videoconferencing software, a microphone, a speaker, and a webcam

MBps

Megabytes per second

Two common types of cache are

Memory cache and Disk cache

File Transfer

Method of uploading files to and downloading files from servers on the Internet May require an FTP client program Integrated in some operating systems Many applications (such as web authoring software) that require frequent transfer of files to the Internet have built-in FTP capabilities

Game Console

Mobile computing device designed for single or multi-player video games

game console

Mobile computing device designed for single-player or multiplayer video games.

RAM (random access memory or main memory)

Most common type of volatile memory Typically refer when discussing computer and mobile device memory The processor interprets and executes a program or application's instructions while the program or application and data are requested, they also load into this from storage Can accommodate multiple programs and applications simultaneously If the instruction or data is not found in memory, then it must search a slower speed storage medium, such as a hard drive or optical disc consists of memory chips that can be read from and written to by the processor and other devices

Digital

Most computers are this The computers recognize only two discrete states: on and off

Stretch Gesture

Move two fingers apart.

Pinch Gesture

Move two fingers together.

Dynamic RAM

Must be re energized constantly or they lose its contents. Many variations of DRAM chips exist, most of which are faster than the basic DRAM

If you want to connect multiple devices together in your home to share a single Internet connection and devices such as a printer, what should you do?

Network your devices

Proper Care of Optical Disc

Never bend one Don't expose to extreme temperatures Stacking them, touching the underside, or exposing them to contaminant may scratch it Place in its protective case (JEWEL CASE)

Word size

Number of bits the processor can interpret and execute at a given time Computers with a larger this can process more data in the same amount of time than computers with a smaller word size

Binary System

Number system that has just two unique digits. 0 and 1, called bits The two digits, 0 and 1, easily can represent these two states (Figure 6-8). The digit 0 represents the electronic state of off (absence of an electronic charge). The digit 1 represents the electronic state of on (presence of an electronic charge).

Features found on Music Sharing Sites

Playlists: musicians and listeners can organize the songs and albums into specific categories, such as by artist or genre. In a playlist, each song can be played sequentially or shuffled to play in random order. Compatibility: Some file types will not play on specific mobile devices, so check permissible formats before attempting to upload or download songs. Features: Services show the album cover, list artist information, and provide song previews. Titles: Musicians use music hosting websites as a convenient method of distributing their works.

Streaming Audio and Video

Podcasts, video blogs, clips or episodes from a television show, or even entire movies are available through a variety of streaming media web and mobile apps Streaming media enables you to view and listen to content without downloading it to your computer or device.

PDF

Portable Document Format Developed by Adobe Systems To interact with a PDF file, you need a PDF reader application, such as Adobe Reader With a document reader, you can view, create, search, convert, annotate, edit, share, and print documents

notebook computer

Portable, personal computer often designed to fit on your lap. See also laptop computer.

laptop computer

Portable, personal computer often designed to fit on your lap. See also notebook computer.

Virus

Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

Virus

Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. The programmer of a virus, known as a virus author, intentionally writes a virus program

Toner

Powdered ink used in a laser printer

green computing

Practices that involve reducing the electricity consumed and environmental waste generated when using a computer.

Swipe Gesture

Press and hold one finger and then move the finger horizontally or vertically on the screen.

Drag or Slide Gesture

Press and hold one finger on an object and then move the finger to the new location.

Press and Hold Gesture

Press and hold one finger to cause an action to occur, or until an action occurs.

execute

Process of a computer carrying out the instructions in a program.

Machine Cycle: Executing

Process of carrying out the commands

Synchronize or Sync

Process of matching the files on computers or mobile devices in two or more locations with each other. Syncing can be a one-way or a two-way process. With a one-way sync, also called mirroring, you add, change, or delete files in a destination location, called the target, without altering the same files in the original location, called the source. In two-way sync, any change made in one location also is made in any other sync location.

Machine Cycle: Fetching

Process of obtaining a program or an application instruction or data items from memory

installing

Process of setting up software to work with the computer, printer, and other hardware components.

Streaming

Process of transferring data in a continuous and even flow which allows users to access and use a file while it is transmitting You can listen to streaming audio or watch streaming video, such as a live performance or broadcast, as it downloads to your computer, mobile device, or an Internet-connected television.

Uploading

Process of transferring documents, graphics, and other objects from a computer to a server on the Internet.

run

Process of using software.

information

Processed data that conveys meaning and is useful to people.

spyware

Program placed on a computer without the user's knowledge that secretly collects information about the user.

Worm

Program that copies itself repeatedly

Trojan Horse

Program that hides within or looks like a legitimate program

Web Filtering Software

Program that restricts access to certain material on the Web.

Web Filtering Software

Program that restricts access to certain material on the Web. Some restrict access to specific websites; others filter websites that use certain words or phrases

Tap Gesture

Quickly touch and release one finger one time.

Double Tap Gesture

Quickly touch and release one finger two times.

RFID

Radio Frequency Identification, a technology that uses radio signals to communicate with a tag placed in or attached to an object or a person RFID tags, which contain a memory chip and an antenna, are available in many shapes and sizes.

Precautions smartphone users can take against malware threats

Read reviews of apps and the companies that create them before downloading the apps to your mobile device. Use mobile malware and antivirus protection. Grant apps access to only the data or phone capabilities needed to run. Turn off or delete apps that you do not use regularly. Keep the operating system and apps up to date. Enable the screen lock feature, and use a strong password to unlock the device. Reset the mobile device to factory settings before selling or trading it in.

Video-conference

Real time meeting between two or more geographically separated people who use a network to transmit audio and video

instant message

Real-time Internet communication where you exchange messages with other connected users.

Instant Messaging

Real-time exchange of messages, files, audio, and/or video with another online user

Internet Messaging

Real-time exchange of messages, files, images, audio, and/or video with another online user Requires messaging software Provided by some online social networks Also available as a browser plug-in

Chat Rooms

Real-time typed conversation among two or more people on a computers or mobile devices connected to a network

Chat

Real-time, online typed conversation with one or more users Requires chat client software Integrated in some operating systems and built into some websites Included with some paid ISPs

podcast

Recorded audio stored on a Web site that can be downloaded to a computer or a portable media player such as an iPod.

Green Computing Strategies (the six mentioned in the book)

Recycling, using energy efficient hardware and energy saving features, regulating manufacturing processes, extending the life of computers, immediately donating or properly disposing of replaced computers.

How to locate keyboard toggling?

Run Detection Software Regularly: several antivirus and spyware detection programs check for known keylogging programs. Review Hard Drive Files: regularly look at the most recent files and note any that are updated continually. These files might be the keylogging software's logs. Check Running Programs: periodically examine which software is loaded from the computer's hard drive into memory when you start the computer and which are running while you are using the computer. If you are uncertain of any program names, perform a search to learn the software's function and if it is a known keylogging program.

How to use a Browser to display a WEbpage

Run a browser. (Running programs and apps is discussed later in this module.) If necessary, click the address bar to select it and any previously displayed web address it may contain. (A web address is a unique address that identifies a web page.) In the address bar, type the web address of the webpage you want to visit and then press the enter key or click the Go (or similar) button to display the webpage. For example, www.cengagebrain.com is a valid web address, which displays the CengageBrain webpage. (Module 2 discusses the components of a web address.) If necessary, scroll to view the entire webpage. You can scroll either by sliding your finger across a touch screen or by using a pointing device, such as a mouse, to drag the scroll bar. Click links on the web page to navigate to the link's destination.

Common DRAM

SDRAM (Synchronous DRAM) Synchronized to the system clock Much faster than DRAM DDR SDRAM (Double Data Rate SDRAM) Transfers data twice, instead of once, for each clock cycle Faster than SDRAM DDR2 Second generation of DDR Faster than DDR DDR3 Third generation of DDR Designed for computers with multi-core processors Faster than DDR2 DDR4 Fourth generation of DDR Faster than DDR3 RDRAM (Rambus DRAM) Much faster than SDRAM

Two types of memory modules are

SIMM and DIMM

Why Would You Use a Software Suite Instead of a Stand-Alone Application?

SS offer: Ease of use; Integration; and Lower Cost

How a laser reads data on an optical disc

STEP 1 - a laser diode shines a light beam toward the disc STEP 2 -if light strikes a pit, it scatters, if light strikes a land, it is reflected back toward the last diode. STEP 3 -reflected light is deflected to a light sensing diode, which sends a digital signal of 1 to the computer absence of reflected light signal of 0

How a hard disk works

STEP 1 -the circuit board controls the movement of the head actuator and a small motor. STEP 3 -a small motor spins the platter while the computer is running STEP 4 -when software requests disk access, the read/write heads determine the current or new location of the data. STEP 5 -the head actuator positions the read/write head arms over the correction location on the platters to read or write data.

Cloud Computing Reason 4

Scalability: Provides the flexibility to increase or decrease computing requirements as needed

Registers

Small high-speed locations that temporarily hold data and instructions Part of the processor, not part of memory or a permanent storage device. Functions include storing the location from where an instruction was fetched, storing an instruction while the control unit decodes it, storing data while the ALU calculates it, and storing the results of a calculation

Wearable Device

Small mobile computing consumer device designed to be worn and that often communicate with a mobile device or printer. Two popular wearable devices are activity trackers and smartwatches. Activity trackers monitor heart rate, measure pulse, count steps, and track sleep patterns. In addition to keeping time, a smartwatch can communicate with a smartphone to make and answer phone calls, read and send messages, access the web, play music, work with apps, such as fitness trackers and GPS, and more.

Chip

Small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

Earbuds

Small speakers that rest inside each ear canal

earbuds

Small speakers that rest inside each ear canal

Cookie

Small text file that a Web server stores on a computer when you view a page Used to remember information Typically expire after short periods (30 days)

Compact Keyboard

Smaller than a standard keyboard and usually does not include a numeric keypad

Bit (binary digit)

Smallest unit of data the computer can process

Expansion slot

Socket on a desktop or server motherboard that can hold an adapter card.

Browser

Software that enables users with an Internet connection to access and view webpages on a computer or mobile device.

Search Engine

Software that finds websites, webpages, images, videos, news , maps,and other information related to a specific topic.

Keyboard Monitoring Software

Software that runs undetected and stores every keystroke in a file for later retrieval. When used in a positive fashion, employers can measure the efficiency of data entry personnel. This software also can verify that employees are not releasing company secrets, are not viewing personal or inappropriate content on work computers, and are not engaging in activities that could subject the company to harassment, hacking, or other similar charges. When used for malicious purposes, criminals use the programs on both public and private computers to capture user names, passwords, credit card numbers, and other sensitive data and then use this data to access financial accounts and private networks.

Desktop as a Service

Some companies specify the applications, security settings, and computing resources available to employees on their desktop computers. These images, or configurations, provide a common desktop work environment available to employees across an entire organization. Because the desktop and its applications appear to be installed on the user's own computer, desktop as a service also is known as a virtual desktop.

How Are Productivity Web Apps Different from Productivity Desktop Apps?

Some word processing, spreadsheet, and presentation software applications are available as web apps. These online versions often have limited functionality compared to their desktop counterparts. Online productivity apps save your work on the cloud instantly as you type. Both the apps and the documents created with them are stored on the cloud. In contrast, desktop apps are installed on your computer. Documents created with desktop apps may be stored on your computer, on the cloud, or synchronized between both locations.

Adapter Card

Sometimes called an expansion card or adapter board, is a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices

Cloud Computing Reason 3

Space Savings: Floor space required for servers, storages devices, and other hardware shifts away from the user

Tablet PC

Special type of notebook computer that resembles a letter-sized slate, which allows a user to write on the screen using a digital pen.

embedded computer

Special-purpose computer that functions as a component in a larger product.

RSS

Specification that enables web content to be distributed to subscribers

Backup Plan

Specifies a schedule for copying/storing important data, information, and apps Includes: The location of backup data, supplies, and equipment; Who is responsible for gathering backup resources and transporting them to an alternate computer facility; The methods by which data will be restored from cloud storage; A schedule indicating the order and approximate time each application should be up and running

Hardware

The physical components of a computer.

What is a person called who can accomplish many types of daily tasks using technology?

Tech Savvy

Internet-enabled

Technology that allows mobile devices to connect to the Internet wirelessly.

Bluetooth

Technology that uses short-range radio signals to transmit data between two specifically enabled devices . Bluetooth devices have to be within about 33 feet of each other, but the range can be extended with additional equipment

Cache

Temporary storage area

enterprise computing

Term large companies use to refer to the use of a huge network of computers that meets their diverse computing needs.

Web 2.0

Term used to refer to Web sites that provide a means for users to share personal information, allow users to modify Web site content, and have application software built into the site for visitors to use.

Types of output

Text: examples are text messages Graphics: many forms of output include graphics to enhance visual appeal and convey information Audio: users download their favorite songs and listen to music Video: users watch news reports, movies, sporting events, weather conditions, and live performances on a computer or mobile device.

The Steps in a Machine Cycle Step 3

The ALU performs calculations on the data

Clock Cycle

The System clock generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit and each tick equates to this

Web Publishing

The creation and maintenance of websites Steps to web publishing 1. plan the website 2. design the website 3. create the website 4. host the website 5. Maintain the website -some are dedicated to a portion of web publishing and others provide a variety of services such as website design, content management, web hosting, website marketing, website analysis, and survey development

Third way of how memory stores

The data being processed by the applications and the resulting information

payload

The destructive event or prank a virus was created to deliver. Can do so in a variety of ways: such as when a user opens an infected file, runs an infected program, connects an unprotected computer or mobile device to a network, or when a certain condition or event occurs, such as the computer's clock changing to a specific date

Payload

The destructive event or prank the virus was created to deliver.

sectors

The disk's storage locations are divided into wedge-shaped sections, which break the tracks into small arcs

CPU

The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.

Secondary Storage

The physical material on which a computer keeps data, instructions, and information.

storage media

The physical material on which a computer keeps data, instructions, and information.

The Internet

The internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Services of the internet include web, messaging, and video communications, chat rooms, discussion forums, and file transfer Users can connect their computers and mobile devices to the Internet through wired or wireless technology and then access its services free or for a fee. With wired connections, a computer or device physically attaches via a cable or wire to a communications device, such as a modem, that transmits data and other items over transmission media to the Internet. For wireless connections, many mobile computers and devices include the necessary built-in technology so that they can transmit data and other items wirelessly.

Motherboard

The main circuit board of the personal computer.

Read/write head

The mechanism that reads items and writes items in the drive as it barely touches the disk's recording surface.

Accessories and Input Technologies

The more popular game consoles work with a wide variety of accessories and input techniques for directing movements and actions of on-screen players and objects. They include gamepads, voice commands, and fitness accessories, some of which are shown here. Although many games are played using a controller, several game consoles operate by allowing the player to be the controller.

First way of how memory stores

The operating system and other programs that control or maintain the computer and its devices

Clock Speed

The pace of the system clock is measured by the number of ticks per second The faster the clock speed, the more instructions the processor can execute per second.

UI (User Interface)

The visual elements that a user must interact with to control a computer

Stored Program Concept

This role of memory to store both data and programs

Hits

Thousands to billions of search results

Blog

Time-stamped articles, or posts, in diary or journal format, usually listed in reverse chronological order Bloggers (author) use blogging software to create/maintain blog Some blog services provide blogging software so users do not have to install it on their own servers

Uncompress

To unzip or expand a zipped (compressed) file, which restores it to its original form.

Fax

Transmission and receipt of documents over telephone lines

Email

Transmission of messages and files over a computer network

Why Would You Use an External Hard Drive Instead of a Second Internal Hard Drive?

Transport a large number of files. Back up important files or an entire internal hard drive Easily store large audio and video files. Secure your data; for example, at the end of a work session, you can relocate or lock up an external hard drive, leaving no data in a computer Add storage space to a mobile computer, such as a laptop or tablet. Add storage space to a desktop without having to open the case or connect to a network.

A headset contains both a microphone and a speaker.

True

A program is another term for software.

True

Protecting yourself From Engineering Scams

Verify the identity of any person or organization requesting personal or confidential information. When relaying personal or confidential information, ensure that only authorized people can hear your conversation. When personal or confidential information appears on a computer or mobile device, ensure that only authorized people can see your screen. Shred all sensitive or confidential documents. After using a public computer, clear the cache in its browser. Avoid using public computers to conduct banking or other sensitive transactions.

What are Safe Browsing Techniques

Verify the website is safe Turn off location sharing Clear browser history Never store passwords Use a phishing filter Enable a pop-up or pop-under blocker Use private browsing Use a proxy server

Features Found on Popular Video Sharing Sites

Video Creation: editing tools allow special effects, editing, titles, and descriptions. Audience interaction: on-screen and keyboard controls allow viewers to play, pause, fast-forward, and stop the videos. Audience members can rate the videos and browse specific categories. Features: most services accept files saved in a variety of file formats, but the maximum file size may be restricted or limited. Genre: Some websites accept a wide variety of content, while others require original work.

Gaming

Video gamers spend billions of dollars each year making the most of their downtime with game consoles and devices. An estimated 1.2 billion people worldwide are active video gamers, half of whom play at least 2 hours per day.

Geofence

Virtual perimeter or boundary to disable certain apps or cameras in secure areas, such as labs or meeting rooms.

Skimmer

Virtually undetectable, a device that is placed directly on top of an ATM face and captures credit card numbers and pins.

Which Internet communication service can you use to speak to other users over the Internet?

VoIP

VoIP

Voice Over Internet Protocol - allows users to speak to each other over the internet without using phones.

Two types of memory

Volatile Memory and NonVolatile Memory

Popular Broadband Internet Service Technologies

WIRED Cable internet service: provides high-speed Internet access through the cable television network via a cable modem DSL: provides high-speed Internet connections through the telephone network via a DSL modem Fiber to the premises: sues fiber-optic cable to provide high-speed Internet access often via a modem WIRELESS Wi-Fi: uses radio signals to provide high-speed Internet connections to computers and devices with built-in Wi-Fi capability or a communications device that enables Wi-Fi connectivity Mobile broadband: offers high-speed Internet connections over the cellular radio network to computers and devices with built-in compatible technology (such as 3G, 4G, or 5G) or a wireless modem or other communications device Fixed wireless: provides high-speed Internet connections using a dish-shaped antenna on a building, such as a house or business, to communicate with a tower location via radio signals Satellite internet service: provides high-speed Internet connections via satellite to a satellite dish that communicates with a satellite modem

Mobile Web App

Web app that is optimized for display in a browser on a mobile device

How other devices connected to the computer communicate with the processor to carry out a task,

When a user runs an application, for example, Its instructions transfer from a storage device to memory. Data needed by these programs and applications enters memory from either an input device or a storage device The control unit interprets and executes instructions in memory. Resulting information is stored in memory, from which it can be sent to an output device or a storage device for future access, as needed

Volatile Memory

When the computer's power is turned off it loses its contents temporary memory RAM is the most common type Temporary

Questions to ask when Researching Media Sharing Locations

Where do my original files need to reside What is the cost How do I access and share files safely What privacy rights are available Can you annotate your media Are there online reviews What help and support are available

Intel compatible processors

Which have an internal design similar to Intel Processors, perform the same functions, and can be as powerful, but often are less expensive. These manufacturers often identify their processor chips by a model name or model number.

USB Adapter

Which is a dongle that plugs into a USB port, enhances functions of a mobile computer, and/or provides connections to peripheral devices Can also be used to add memory, communications, multimedia, security, and storage capabilities to a mobile computers

Plug and Play Technology

Which means that the computer automatically can recognize peripheral devices as you install them. This support means that you can plug in a device and then immediately begin using it

WiFi

Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. Most mobile computers and devices are Wi-Fi enabled, along with routers and other communications devices. For successful Wi-Fi communications in open or outdoor areas free from interference, the Wi-Fi computers or devices should be within 300 feet of each other. In closed areas, the wireless range is about 100 feet.

Developing Projects

With productivity applications, users often create, edit, format, save, and share projects. Projects include documents, presentations, spreadsheets, notes, calendars, contact lists, budgets, drawings, and more.

Serial vs Parallel

With serial transfers, data is sent one bit at a time. Parallel transfers, by contrast, send several bits at once.

Search Text

Word or phrase entered in a search engine's text box that describes the item you want to find. See also search query. Search text can be broad, such as spring break destinations, or more specific, such as walt disney world.

telecommuting

Work arrangement in which employees work away from a company's standard workplace and often communicate with the office through the computer.

Web

Worldwide collection of electronic documents called Web pages, the Web is one of the more popular services on the Internet. See also World Wide Web.

Internet

Worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals.

Disc Burning Software

Writes text, graphics, audio, and video files on a recordable or rewritable disc Enables home users to easily back up contents of their hard drive on an optical disc and makes duplicate of uncopyrighted music or movies

Careers and Employment

You can search the web for career information and job openings. Job search websites list thousands of openings in hundreds of fields, companies, and locations This information may include required training and education, salary data, working conditions, job descriptions, and more. In addition, many organizations advertise careers on their websites.

ICANN

^^ This nonprofit organization is an affiliate of ICANN which stands for Internet Corporation for Assigned Names and Numbers. ICANN previously managed the domain names

Link or Hyperlink

a built-in connection to other documents, graphics, audio files, videos, webpages, or websites.

Chat rooms

a chat is a real-time types conversation that takes place on a computer or mobile device with many other online users a chat room is a website or application that permits users to chat with other who are online at the same time A server echoes the user's message to everyone in the chat room.

clip art/image gallery

a collection of clip art and photos Many clip art/image galleries also provide fonts, animations, sounds, video clips, and audio clips.

network

a collection of computers and devices connected together via communications devices and transmission media

media library

a collection of stored digital media

Data

a collection of unprocessed items including text, numbers, images, audio and video once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information

Photo printer

a color printer that produces lab-quality photos. Many photo printers use ink-jet technology

email address

a combo of a user name and a domain name that identifies a user so that they can receive internet email

JPEG

a compressed graphics format that attempts to reach a balance between image quality and file size

server

a computer dedicated to providing one or more services to other computers or devices on a network -provided by servers include storing content and controlling access to hardware, software, and other resources They can support from two to several thousand connected computers or devices at the same time

two-step verification

a computer or mobile device uses two separate methods, one after the next, to verify the identity of a user ATMs usually require these (slide card in then enter PIN)

Bluetooth Printing

a computer or other device transmits output to a printer via radio waves

Handheld computers

a computer small enough to fit in one hand -communicate wirelessly with other devices or computers some have specialized keyboards or touch screen with stylus -many are industry-specific and serve the needs of mobile employees, such as parcel delivery people or warehouse employees

FTP server

a computer that allows users to upload and/or download files using FTP

terminal

a computer, usually with limited processing power, that enables users to send data to and/or receive info from a server or host computer •Most retail stores use a POS terminal to record purchases, process credit or debit cards, and update inventory

Mobile Device

a computing device small enough to hold in your hand Popular types of mobile devices are smartphones, digital cameras, portable and digital media players, e-book readers, and wearable devices.

Mobile Devices

a computing device small enough to hold in your hand Types: smartphones, digital cameras portable and digital media players, e-book readers, and wearable devices

mobile device

a computing divide small enough to hold in your hand types: laptops, tablets, desktops, servers and terminals, smartphone, digital camera, e-book readers, portable, and digital media players, and wearable devices (game devices and embedded computers)

What do processors contain?

a control unit and an arithmetic logic unit (ALU). These two components work together to perform processing operations The control unit interprets and executes instructions in memory, and the arithmetic logic unit performs calculations on the data in memory.

Password Manager (password organizer)

a convenient service that stores all your account information securely The first time you view a password-protected website and enter your user name and password, the password manager saves this information. Some managers offer the option to generate random passwords

Software

a series of related instructions, organized for a common purpose that tells a computer or mobile device what tasks to perform and how to perform them. When software developers write programs or apps, they usually enter the instructions into the computer or mobile device by using a keyboard, mouse, or other input method. The software developer then stores the program or app in a file that a user can execute (run). When a user runs a program or app, the computer or mobile device loads the program or app from a storage medium into memory. Thus, a program or app is entered into a computer's or mobile device's memory.

tower server

a server built into an upright cabinet (tower) that stands alone -the tower can be similar in size and shape to a desktop tower or larger

blade server

a server in the form of a single circuit board, or blade -the individual blades insert in a blade server chassis that can hold many blades

DNS server

a server on the Internet that usually is associated with an ISP

personal finance software

a simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer funds, track investments, and evaluate financial plans determine where, and for what purpose, you are spending money so that you can manage your finances. financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings. Other features include managing home inventory and setting up budgets

Pixel

a single point in an electronic image

Ink Cartridges

a small container of ink for use in a printer Each cartridge has fifty to several hundred small ink holes, or nozzles When the cartridge runs out of ink, you simply replace the cartridge. Most ink-jet printers use two or more ink cartridges, one containing black ink and the other(s) containing colors. Some color cartridges contain a variety of ink colors; others contain only a single color.

Stylus

a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink

wearable devices

a small mobile computing device designed to be worn by a consumer -communicate with mobile device and computer EX) activity trackers, smartwatches, and smart glasses.

Handheld game device

a small mobile device that contains a screen, speakers, controls, and game console all in one unit most communicate wirelessly

Label Printer

a small printer that prints on an adhesive-type material that can be placed on a variety of items

Pointer

a small symbol on the screen whose location and shape change as a user moves a pointing device

Thumbnail

a small version of a larger image -usually click a thumbnail to display the full size image

Touchpad

a small, flat, rectangular pointing device that is sensitive to pressure and motion To move the pointer using a touchpad, slide your fingertip across the surface of the pad. Some touchpads have one or more buttons around the edge of the pad that work like mouse buttons; others have no buttons. On most touchpads, you also can tap the pad's surface to imitate mouse operation

Mobile printer

a small, lightweight, battery powered printer that allows a mobile user to print from a laptop, smartphone or other mobile device

Plotter

a sophisticated printer used to produce high-quality drawings such as blueprints, maps and circuit diagrams

Web App

a special type of cloud app that is accessed by visiting a website in a browser.

Embedded Computers

a special-purpose computer that functions as a component in a larger product Types: consumers electronics (Mobile phones, digital phones, digital televisions, cameras, video recorders, DVD players and recorders, answering machines) home automated devices (Thermostats, sprinkling systems, security systems, vacuum systems, appliances, lights) automobiles (Anti Lock brakes, engine control modules, electronic stability control, airbag control unit, cruise control, navigation systems and GPS receivers) process controllers and robotics (Remote monitoring systems, power monitors, machine controllers, medical devices) computer devices and office machines (Keyboards, printers, fax and copy machines)

folder

a specific named location on a storage medium that contains related documents

PictBridge

a standard technology that allows you to print photos directly from a digital camera by connecting a cable from the digital camera to the USB port of the printer

Trackball

a stationary pointing device with a ball on its top or side To move the pointer using a trackball, you rotate the ball with your thumb, fingers, or the palm of your hand. In addition to the ball, a trackball usually has one or more buttons that work like mouse buttons.

Hard Disk

a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information

Solid-state drive

a storage device that typically uses flash memory to store data, instructions, and information

digital rights management (DRM)

a strategy designed to prevent illegal distribution of movies, music, and other digital content

Insertion Point (cursor)

a symbol on the screen, usually a blinking vertical bar, that indicates where the next character you type will appear

Neural Network

a system that attempts to imitate the behavior of the human brain

Convertible Tablet

a tablet that has a screen it is lid and keyboard in its base with the lid and base connected by swivel-type hinge can be used as a traditional laptop or it can be rotated and fold down over the keyboard so it looks like a slate tablet

Spoofing

a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

Product Activation

a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed Usually, the software can be run a preset number of times, has limited functionality, or does not function until you activate it via the Internet or by phone. Thus, activation is a required process for programs that request it.

Computer vision syndrome (CVS)

a technology-related health condition that affects eyesight -may have it if you have sore, tired, burning, itchy eyes, blurred double vision after prolonged staring at a display device, headache or sore neck, difficulty shifting focus, difficulty focusing on screen, after images, and increased sensitivity to light

thin client

a terminal that looks like a desktop but has limited capabilities and components -typically do not contain a hard drive and can run programs and access data on a network or the internet

Domain name

a text-based name that corresponds to the IP address of the server, such as a web server that hosts a website -is part of the web address that you type in a browser's address bar to access a website -•A DNS server translates the domain name into its associated IP address

image viewer

a tool that allows users to display, copy, and print the contents of a graphics file, such as a photo

screen saver

a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time

file manager

a tool that performs functions related to file management Some of the file management functions that a file manager performs are displaying a list of files on a storage medium organizing files in folders; and copying, renaming, deleting, moving, and sorting files

uninstaller

a tool that removes a program, as well as any associated entries in the system files The uninstaller deletes files and folders from the hard drive, as well as removes program entries from the system files.

Disk Defragmenter

a tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster Fragmentation slows down file access and, thus, the performance of the entire computer. Defragmenting the hard disk, or reorganizing it so that the files are stored in contiguous sectors, solves this problem

Touch screen

a touch sensitive display device, do not require a separate device for input

Touch mouse

a touch sensitive mouse that recognizes gestures, in addition to a detecting movement of the mouse and traditional click scroll operations

Interactive whiteboard

a touch-sensitive device, resembling a device board, that display the image on a connected computer, usually via a projector A presenter controls the program by clicking a remote control, touching the whiteboard, drawing on or erasing the whiteboard with a special digital pen and eraser, or writing on a special tablet.

Web Based Training (WBT)

a type of CBT that uses internet technology and consists of application software on the web CBT and WBT typically consist of self-directed, self-paced instruction about a topic. WBT is popular in business, industry, and schools for teaching new skills or enhancing existing skills of employees, teachers, and students.

Webcam

a type of DV camera that enables you to capture video and still images, and usually audio input for viewing or manipulation on a computer or mobile device

Computer Based Training (CBT)

a type of education in which students learn by using and completing exercises with instructional software

Photo Editing Software

a type of image editing software that allows users to edit and customize digital photos users can enhance photos, add lighting filters, crop images, remove red-eye, create collages, crop and resize images, color-correct images, straighten images, remove or rearrange objects in a photo, and more

Projects you can work on with Programs and Apps

creating letters, memos, reports, and other documents; developing presentations; preparing and filing taxes; drawing and altering images; recording and enhancing audio and video clips; obtaining directions or maps; playing games individually or with others; composing email messages; protecting computers and mobile devices from malware; organizing media; locating files;

______ is a collection of unprocessed items, including text, images, audio, and video.

data

Decrypt

decode

social engineering

defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others

Aspect ratio

defines the display's width relative to height

Software as a Service

describes a computing environment where an Internet server hosts and deploys applications Editing documents or photos, sending email messages, and managing finances are common consumer tasks of SaaS applications.

Software as a Service (SaaS)

describes a computing environment where an Internet server hosts and deploys applications and makes them available to users via the internet

cyberfare

describes an attack whose goal ranges from disabling a government's computer network to crippling a country

Contrast ratio

describes the difference in light intensity between the brightest white and darkest black that can be produced on a display. Contrast ratios vary between 500:1 to 2000:1

Mobile Browser

designed for their smaller screens and limited computing power

Malware removers

detect and delete spyware, adware, and other malware

Retina Display

developed by Apple, produces vibrant colors and supports viewing from all angles bc LCD technology is built into the screen instead of behind it

text to speech

device speaks the contents of the printed page

USB Hub

device that plugs in a USB port on the computer or mobile device and contains multiple USB ports, into which you plug cables from USB devices.

Peripheral Device

device that you connect to a computer or mobile device to expand its capabilities. Examples include keyboard, mouse, microphone, monitor, printer, scanner, external hard drive, webcam, speakers

strategy designed to prevent illegal distribution of movies, music, and other digital content

digital rights management

slide show

displayed on a large monitor or on a projection screen from a computer or mobile device.

Flat panel display

displays which have shallow depth and a flat screen

Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to move an item around on the screen. Mia tells her she should ______.

drag or slide

e-book reader

electronic book reader - a mobile device that is used primarily for reading ebooks and other digital publications - is an electronic version of a printed book, readable on computers and other mobile devices typically transfer the digital publication from a computer or the Internet, if the device is Internet capable, to the e-book reader.

Unethical Employees

employees who break into employers' computers to exploit a security weakness, obtain revenge as a disgruntle employee, or to seek financial gains from selling confidential information

VoIp

enables users to speak to other users via their internet connection -VoIP uses the Internet to connect a calling party to one or more local or long-distance called parties To place an Internet phone call, you need a broadband network connection, a microphone and speaker, both of which are included with a standard computer or mobile device, and VoIP software, such as Skype. Some VoIP services require that you purchase a separate phone and VoIP router and that you subscribe to their service. Others offer certain services free and require a subscription for additional services

Creating a project

enter text or numbers, insert images, add contacts, schedule appointments, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.

Megabyte (MB)

equal to approx. one million characters

Mobile computers and devices typically have a separate physical display device.

false

Voice mail

functions much like an answering machine, allows someone to leave a voice message for one or more people -a computer in the voice mail system converts an analog voice message into digital form

Thermal printer

generates images by pushing electrically heated pins against heat sensitive paper. Basic thermal printers are inexpensive but the print quality is low, images fade and the paper is expensive Used in self service gas pumps and POS terminals

copyright

gives authors, artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials A copyright protects any tangible form of expression

Skimming

handheld device used by thieves to swipe the card and then obtain and store account details.

Cyberbullying

harassment using technology

A(n) ______ disk is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information.

hard

Perpendicular Recording

hard disks align the magnetic particles vertically, or perpendicular to the disk's surface, making much greater storage capacities possible

Computers contain many electric, electronic, and mechanical components known as ______

hardware

Communications Device

hardware capable of transferring items from computers and devices to transmission media and vice versa Examples of communications devices are modems, wireless access points, and routers

Ergonomic keyboard

has a design that reduces the chance of repetitive strain injuries (RSIs) of wrist and hand.

Blu-ray

has a higher capacity and better quality than standard DVDs, especially for high-definition audio and video.

magnetic stripe card

has a magnetic stripe that contains information identifying you and the card The information in the stripe often includes your name, account number, and the card's expiration date. When you swipe the card through a magstripe reader, discussed in the previous module, it reads information stored on the stripe.

fragmented hard disk

has many files stored in noncontiguous sectors.

Streaming Cam

has the illusion of moving images because it sends a continual stream of still images

game pad

held with both hands, controls the movement and actions of players or objects in video games or computer games On the gamepad, users press buttons with their thumbs or move sticks in various directions to trigger events.

ENERGY STAR program

help reduce the amount of electricity used by computers and related devices This program encourages manufacturers to create energy-efficient devices.

website authoring software

helps users create business websites for a variety of purposes such as online stores, restaurants, small businesses, or personal interests, generally without requiring advanced HTML skills.

calendar and contact management software

helps you organize your calendar, keep track of contacts, and share this information with other users provides a way for individuals and workgroups to organize, find, view, and share appointment and contact information easily.

Disadvantage of SSDs

hey typically have lower storage capacities than hard disks, data recovery in the event of failure can be more difficult than for traditional hard disks, and their cost is higher per gigabyte. In order to keep the price of a laptop affordable, laptops with SSDs usually have a lower storage capacity than laptops with a traditional hard disk.

enhanced resolution

higher because it uses a specific formula to add pixels between those generated by the optical resolution

Corporate Spies

hired to break into a specific computer and steal proprietary data and information or help identify security risks in their own organization

Redundancy

if one component fails or malfunctions, another can assume its tasks

password

is a private combination of characters associated with the user name that allows access to certain computer resources Do not disclose your password to anyone or write it on a slip of paper kept near the computer, especially taped to the monitor or under the keyboard. Email and telemarketing scams often ask unsuspecting users to disclose their credit card numbers, so be wary if you did not initiate the inquiry or phone call. Security experts recommend using different user names and passwords for every account and changing the passwords frequently.

passphrase

is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that user name that allows access to certain computer resources

adware remover

is a program that detects and deletes adware

search tool

is a program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app, or any other item stored on your computer or mobile device based on criteria you specify

memory card

is a removable flash memory storage device that you insert and remove from a slot in a computer, mobile device, or card reader/writer ex. -SDHC -SDXC -miniSD -microSDHC -microSDXC -CF -xD Picture Card -Memory Stick PRO Duo -M2

Network attached storage (NAS)

is a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices attached to the network

encryption key

is a set of characters that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext

operating system

is a set of programs that coordinates all the activities among computer hardware devices ex. tools and utilities (enable you to perform maintenance-type task usually related to managing devices, media, and programs used by computers and mobile devices) system software (they consist of the programs that control or maintain the operations of the computer and its devices.) Desktop operating systems includes (macOS, Windows, Linux, and Chrome OS. Mobile operating systems include Android, iOS, and Windows) serves as the interface between the user, the applications and other programs, and the computer's or mobile device's hardware

encryption algorithm or cypher

is a set of steps that can convert readable plaintext into unreadable cipertext

cookie

is a small text file that a web server stores on your computer Cookie files typically contain an identification code(s) that links to a file on a web server that contains data about you, such as your user name, postal code, or viewing preferences. Use To: track preferences, to store usernames and passwords, keep track of items in user's shopping cart (session cookie), track how often users visit a site and web pages they visit, to target advertisements

Spyware

is a type of program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

Adware

is a type of program that displays an online advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other Internet services

code of conduct

is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

disaster recovery plan

is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

DisplayPort

is an alternative to DVI and also supports HDMI

e-book or digital book

is an electronic version of a printed book, readable on computers and other digital devices. In addition to books, you typically can purchase and read other forms of digital media such as newspapers and magazines.

digital signature

is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender used to ensure that an impostor is not participating in an Internet transaction

CD-RW

is an erasable multisession disc users can write on multiple times overcome major disadvantage of CD-R because it allows users to write and rewrite data, instructions, and information on the CD-RW disc multiple times — instead of just once.

Bar code

is an identification code that consists of either a set of vertical lines and spaces of different widths or 2-D pattern of dots, squares and other images

track

is divided into evenly sized sectors

gigabyte (GB)

is equal to approx. one billion characters

memory

is faster than storage but is expensive and not practical for all storage requirements.

firewall

is hardware and/or software that protects a network's resources from intrusion by users on another network, such as Internet

Storage

is less expensive but is slower than memory.

cracker

is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills

A(n) ______ network is a system that attempts to imitate the behavior of the human brain.

neural

digital forensics (cyberforensics)

is the discovery, collection, and analysis of evidence found on computers and networks involves the examination of media, programs, data and log files on computers, mobile devices, servers, and networks. Many areas use digital forensics, including law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments in the private sector.

storage device

is the hardware that records and/or retrieves items to and from storage media

capacity

is the number of bytes a storage medium can hold

encryption

is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access You treat encrypted data just like any other data. That is, you can store it or send it in an email message.

Formatting

is the process of dividing a disk into tracks and sectors.

content filtering

is the process of restricting access to certain material

reading

is the process of transferring items from a storage medium into memory Similarly, when storage devices read from storage media, they function as a source of input. Nevertheless, they are categorized as storage devices, not as input or output devices.

writing

is the process of transferring items from memory to a storage medium When storage devices write on storage media, they are creating output

license agreement

is the right to use software That is, you do not own the software.

software piracy or piracy

is the unauthorized and illegal duplication of copyrighted software piracy is the most common type of software theft

cloud storage

keeps information on servers on the Internet, and the actual media on which the files are stored are transparent to the user

Real Time Clock

keeps track of the date and time in a computer. The battery continues to run the real-time clock even when the computer is off.

Firefox

known for its extensive array of plug-ins This free browser was first released in 2004 and must be downloaded and installed. It has enhanced privacy and security features, a spelling checker, tabbed browsing, and a password manager.

JavaScript

language used to add special effects to a website

LED

light-emitting device, LED-displays consume less power, last longer and are thinner, lighter and brighter than CCFL technology

LCD

liquid crystal display, sandwiches a liquid compound between two sheets of material that present sharp, flicker-free images when the screen in illuminated

stylus

looks like a small ink pen, that you can use instead of a fingertip to enter data, make selections, or draw on a touch screen may include button to stimulate clicking

Storage as a Service

loud storage providers offer file management services such as storing files online, system backup, and archiving earlier versions of files. Cloud storage is especially useful to tablet and smartphone users, because it enables them to access their files from all of their devices.

Platter

made of aluminum, glass, or ceramic and has a thin coating of alloy material that allows items to be recorded magnetically on its surface

tower

made of metal or plastic -a frame that houses the system unit on a desktop

MICR

magnetic-ink character recognition devices read text printed with magnetized ink. Used for check processing MICR reader converts MICR characters into a form the computer can process.

Motherboard (system board)

main circuit board of the computer Many of the electronic components, such as the processor and the memory, attach to the motherboard; others are built into it.

Internet Backbone

major carriers of network traffic

Back up

make a copy of (a computer file) especially for storage in another place as a security cop

Editing a Project

make changes to its existing content. Common editing tasks include inserting, deleting, cutting, copying, and pasting. Inserting involves adding text, images, or other content. Deleting involves removing text, images, or other content. Cutting is the process of removing content and storing it in a temporary storage location, called a clipboard. Copying is the process of placing content on a clipboard, with the content remaining in the project. Pasting is the process of transferring content from a clipboard to a specific location in a project.

Cloud app

makes use of software and data that are not stored on your computer or mobile device You can access the software and data using a computer or mobile device, with or without a browser, as long as it is connected to a network, such as the Internet. Examples include apps for accessing online social networks, web-based email services, and online calendars.

Network Server

manages network traffic

Printer Server

manages printers and documents being printed

Mapping

maps can be displayed in a variety of views, including terrain, aerial, maps, streets, buildings, traffic, and weather. Several mapping website and web apps exist that enable you to display up-to-date maps by searching for an address, postal code, phone number, or point of interest Many work with GPS to determine where a user is located, eliminating the need for a user to enter the starting point and enabling the website to recommend nearby points of interest.

voice verification system

measures a person's live speech with their stored voice pattern

Hand Geometry System

measures the shape and size of a person's hand they often are used in larger companies to track worker's time and attendance or as security device

hand geometry system

measures the shape and size of person's hand

M2

memory stick micro

madware

mobile adware

Power Management Tool

monitors a laptop or mobile device's battery usage, showing apps that consume the most battery power, displaying battery usage since the device was last charged, and estimating usage time remaining Power management apps can enable power saving mode automatically when a device's battery runs low so that the battery will last longer until charged.

single-user license agreement or end-user license agreement

most common type of license agreement with software purchased by individual users

MMS

multimedia message service -have a digital camera built into the device includes mobile to mobile and mobile to email -can send picture and video message services

A(n) ______ is a collection of computers and devices connected together, often wirelessly.

network

Uses of Smart CArds

storing medical records, vaccination data, and other health care and identification information; tracking information, such as employee attendance or customer purchases; storing a prepaid amount of money, such as for student purchases on campus or fares for public transportation; and authenticating users, such as for Internet purchases or building access.

Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to zoom in. Mia tells her she should ______.

stretch

top-level domain

suffix of the domain naim identifies the type of organization associated with the domain -new TDL's are introduced to give individual's and businesses flexibility and creativity when purchasing domain names

When you ______ computers and mobile devices, you match the files in two or more locations with each other.

sync

Google Street View

takes images using moving vehicles equipped with GPS and cameras to create a panoramic view of an area Is protested by privacy advocates

Digital pens are most often used for

taking notes

Portrait Orientation

taller than it is wide, like a portrait picture that focuses on a single, upright figure

optical resolution

the actual photographed resolution

web address

the address of the webpage If you know the web address of a webpage, you can type it in the address bar of the browser A web address consists of a protocol, domain name, and sometimes the host name, path to a specific webpage, or file name of the webpage. AKA URL

Animation

the appearance of motion created by displaying a series of still images in sequence ex./ tect that animates by scrolling across the screen can serve as a ticker to display stock updates, news, sports, scores, weather, etc

Netiquette

the code of acceptable behaviors users should follow while on the internet -the conduct expected of individuals while online

Biometric Payment

the customer's fingerprint is read by a fingerprint reader that is linked to a payment method such as a checking account or credit card.

Output

the data that has been processed into a useful form. Recall that computers process data (input) into information (output) The form of output varies, depending on the hardware and software being used and the requirements of the user. Users view or watch output on a screen, print it, or hear it through speakers, headphones, or earbuds.

ciphertext

the encrypted (scrambled) data

supercomputer

the fastest and most powerful computer and the most expensive -are capable of processing many trillions of instructions in a single second Applications requiring complex, sophisticated mathematical calculations use supercomputers. For example, large-scale simulations and applications in medicine, aerospace, automotive design, online banking, weather forecasting, nuclear energy research, and petroleum exploration use a supercomputer.

restore

the files by copying the backed up files to their original location on the computer or mobile device

Backlight

the light source for LCD, often uses CCFL (cold cathode fluorescent light or LED technology

Domain Name Server (DNS)

the method that the Internet uses to store domain names and their corresponding IP addresses translates the domain name to its associated IP address so that the request can be routed to the correct computer.

server virtualization

uses software to enable a physical server to emulate the hardware and computing capabilities of one or more servers, known as virtual serves users can use software to configure storage, processing power, memory, operating system, and other characteristics Behaves like physical server, is easy to manage, doesn't require physical server, and can be created and configure quickly

public key encryption (asymmetric key encryption)

uses two encryption keys: a public key and private key

Public Key encryption

uses two keys: a public key that everyone can have and a private key for only the recipient

Tablets

usually smaller than a laptop and larger than a phone -thin, light-weight mobile computer that has a touch screen Types: slate and convertible battery typically lasts longer than laptops

Examples of Malware (the 7 mentioned in the book)

viruses, worms, trojan horses, rootkits, spyware, adware, and zombies

Static Webpage

visitors all see the same content each time they view the webpage

Activity trackers and smartwatches are two types of ______ devices.

wearable

Content Aggregation

website or web app, sometimes called a curation website, allows users to collect and compile content from a variety of websites about a particular topic or theme Types of content that may be compiled includes news, reviews, images, videos, podcasts (discussed later in this module), and blogs. Content aggregation websites save users time because they need to visit only one website (the content aggregation website) instead of visiting multiple websites to obtain information.

Juice jacking

when a hacker steals data from or transfers malware to the device via a USB cable at a charging station This process is possible because the USB cable is used for two purposes: supplying power and syncing data. It can occur within one minute after plugging into the charger. Anything on the device is susceptible, including photos, contacts, and music, and some malware can create a full backup of your data, leaving you prone to identity theft.

Catfishing

when someone creates a fake online social network or online dating profile and forms relationships with unsuspecting users

How SD cards work

when you insert a memory in a card slot, the memory card's metallic conductors make contact with connections in the card reader/writer or card slot, allowing the transfer of photos, and other items between the card and the reading/writing device. STEP 2 -a notch on the side of the memory prevents the card from accidentally slipping out of the card reader/writer or card slot STEP 3 -flash memory chips store photos and other types of data and information . when requested, the controller transfers items stored on the flash memory chips to metallic conductors, using register for temporary storage, as needed. STEP 4 -some memory cards contain white protect switches prevent you from accidentally erasing photos and other items stored on the flash memory chips.

Storage Media

where a computer keeps data, instructions, and information The amount of storage for each type of storage media varies, but hard disks and solid-state drives generally have the largest capacities, followed by optical discs, USB flash drives, and memory cards. Some storage media are portable, meaning you can remove the medium from one computer and carry it to another computer.

tape library

where individual tape cartridges are mounted in a separate cabinet

Streaming

where you access the media content while it downloads

predictive text

where you press one key on the keyboard or keypad or each letter in a word and software on the phone predicts the word you want

Electrical Storefront

which contains product descriptions, images, and a shopping cart

power usage effectiveness (PUE)

which is a ratio that measures how much power enters the computer facility or data center against the amount of power required to run the computers and devices

Digital Pen

which is slightly larger than a stylus, an input device which captures and converts a users handwriting or drawings into a digital format which users can upload (transfer) to a computer or mobile device

Force feedback

which is technology that sends resistance to the device in response to actions of the user

Http

which stands for Hypertext Transfer Protocol, is a set of rules that defines how webpages transfer on the Internet.

Landscape Orientation

wider than it is tall, like a landscape picture that shows a broad panoramic view

A(n) ______ is a collaborative website that allows users to create, add to, modify, or delete content.

wiki

HTML

•(Hypertext Markup Language) is a set of symbols that developers use to specify the headings, paragraphs, images, links, and other content elements that a webpage contains

USB port

•A USB port, short for universal serial bus port, can connect up to 127 different peripheral devices together with a single connector * Devices that connect to a USB port include the following: card reader, digital camera, external hard drive, game console, joystick, modem, mouse, optical disc drive, portable media player, printer, scanner, smartphone, digital camera, speakers, USB flash drive, and webcam. •Instead of connecting peripheral devices directly to ports on a mobile computer, some mobile users prefer the flexibility of port replicators and docking stations •Instead of connecting computers and mobile devices to peripheral devices with a cable, some peripheral devices use wireless communications technologies -Bluetooth -Wi-Fi -NFC

Browser

•A browser is an application that enables users with an Internet connection to access and view webpages on a computer or mobile device -Internet-capable mobile devices such as smartphones use a special type of browser, called a mobile browser ie: Chrome

Protecting Hardware

•To help reduce the chances of theft, companies and schools use a variety of security measures -Physical access controls -Alarm system -Physical security devices -Security or device-tracking app -Require identification •Hardware can fail for a variety of reasons: aging hardware; random events such as electrical power problems; and even errors in programs or apps)

embedded computer

•a special-purpose computer that functions as a component in a larger product -Consumer electronics -Home automation devices -Automobiles -Process controllers and robotics -Computer devices and office machines

surge protector

•also called a surge suppressor, uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment it aborts small overvoltages generally without damage to computer and equipment Repeated small overvoltages can weaken a surge protector permanently. Some experts recommend replacing a surge protector every two to three years.

World Wide Web (WWW)

•or web, consists of a worldwide collection of electronic documents (webpages) •A website is a collection of related webpages and associated items •A web server is a computer that delivers requested webpages to your computer or mobile device

Search Engine

•software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic •A subject directory classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories Thousands of search engines are available. Some search engines, such as Bing, Google, and Yahoo!, are helpful in locating information on the web for which you do not know an exact web address or are not seeking a specific website.

Homepage

•the first page that a website displays a website's home page provides information about its purpose and content. Many websites allow you to personalize the home page so that it contains areas of interest to you.


Related study sets

Chapter 12.1-12.3: Surface Area and Volume

View Set

BUS 101 Chapter 2 Study Questions

View Set

Juice WRLD: Goodbye & Good Riddance

View Set

NCSF CPT Unit 1 Lesson Two- Health and Performance Components of Fitness

View Set

Switching in networking chapter 2

View Set

AJM 10 STS REVIW EQUATION OF MOTION

View Set