Computer Concepts Chapters 6-9
Examples of cloud storage services...
-Dropbox -Google -Microsoft -Amazon -Apple
What is a toggle key and an example of it?
-turn a feature on and off -EX/Caps Lock
Several factors affect how data is transmitted. These factors include ______________ and _________________.
1) Bandwidth 2) Protocols
Ways to Protect from Cyber attacks
1) Be careful what you write on the internet 2)Only do business on the internet if you know its legit. 3)Completely remove all personal info from the hard drive when selling a computer. 4)Moniter your credit.
what are the 2 common network strategies?
1) Client/server 2) peer-to-peer
What are the 3 commonly used types of modems?
1) DSL 2) cable 3) wireless
What are the 3 commonly used types of modems?
1) DSL (digital subscriber line) 2) cable modem 3) wireless modem
What are the most widely used optical disks?
1) DVD 2) CD 3) Blu-ray disks
________________ can always be replaced. A company's __________, however, may be irreplaceable.
1) Equipment 2)Data
Some of the mass storage devices that support this strategy of the enterprise storage system are:
1) File servers 2) Network attached storage )NAS) 3) RAID systems 4) Organizational cloud storage
Privacy Modes: Google Chrome provides ___________________accessible from the Chrome menu, and Safari provides___________________- accessible from the Safari option on the main menu.
1) Incognito Mode 2)Private Browsing
What portable computers present ergonomic challenges?
1) Laptops 2) Tablets 3) Cell phones EX/ tablet hunch EX/ Blackberry hunch
Benefits of Cloud-Based Backups
1) Security 2) Automation 3) Cloud-Based
There are many VoIP services available for free that do not require any dedicated hardware. Examples of these services are ___________ from Microsoft, ___________ from Google, and ___________ from Apple.
1) Skype 2) Hangouts 3) Facetime
Safety Precautions when Using Hotspots
1) Use a firewall 2) Avoid fake hotspots 3) Turn off file sharing 4) Check if connection is encrypted
Ways to add capacity to an Optical Disk...
1) double-sided 2) multiple recording layers
Two benefits of an LAN are ________________.
1) economy 2) flexibility
what are the two basic types of hard disks?
1) internal 2) external
Many devices combine input and output capabilities. Sometimes this is done to ____________. Other times it is done for very _________________. Common combination devices include headsets, multifunctional devices, telephones, drones, robots, and virtual reality headgear and gloves
1) save space 2) specialized applications
What are the 4 basic elements of a communication system?
1) sending and receiving devices 2) connecting devices 3) data transmission specifications 4) communication channel
Computer users can alleviate these health problems by __________________ and by _______________________
1) taking frequent rest breaks 2) using well-designed computer furniture
What are the four basic categories of keyboards?
1) traditional 2)laptop 3)virtual 4)thumb
Some issues of privacy include...
1)Collecting public, but personally identifying, information 2)Spreading information without personal consent 3) Spreading inaccurate information
Three ways to improve the performance of hard disks are:
1)disk caching 2)redundant arrays of inexpensive disks 3)file compression/ decompression
What are the 4 basic types of optical scanners?
1)flatbed 2)document 3)portable 4)3D
What are the four most popular and specialized game controllers?
1)joysticks 2)gaming mice 3)gamepads 4)motion-sensing devices
use lasers, cameras, or robotic arms to record the shape of an object. Like 2D scanners, most _________ scanners cannot recognize light, dark, and colored areas.
3D scanners
What is one of the most widely used types of DSL?
ADSL (asymmetric digital subscriber line)
relates to the responsibility of those who have data to control who is able to use that data
Access
elates to the responsibility of those who collect data to ensure that the data is correct.
Accuracy
-are the newest form of optical storage designed to store hi def (high definition) video -comes from a special blue-colored laser used to read the discs that gives them a typical capacity of 50 GB—ten times the capacity of DVDs. Optical discs that store hi def video and the newest video games are often ______________..
Blu-ray disks (BDs)
Wireless connections typically use ______________ technology.
Bluetooth
a short-range radio communication standard that transmits data over short distances of up to approximately 33 feet; iis widely used for wireless headsets, printer connections, and handheld devices.
Bluetooth
What is the most popular PAN technology and what is its max range?
Bluetooth, 33 ft
were the first widely available optical format for PC users. Typically, __________ drives store 700 MB (megabytes) of storage. Optical discs that store music are often ________________
CD (compact disks)
scanners that are able to recognize special characters and marks. They are specialty devices that are essential tools for certain applications
Character and mark recognition devices
The most important characteristic of a monitor is its _________________
Clarity
Protects e-mail messages as they move across the Internet. One of the most widely used personal e-mail encryption programs is Pretty Good Privacy
E-mail encryption
Asks..how do the actions of individual users and companies affect society?
Ethics
restricts disclosure of educational records
Family Educational Rights and Privacy Act (FERPA)
has begun to replace 3G networks in some areas with providers using LTE (Long Term Evolution) connections to provide faster transmission speeds. While a user's experience with this will depend on several factors, including carrier, geography, and proximity to cell towers, these technologies can provide speeds up to 10 times faster than 3G.
Fourth-generation mobile telecommunications (4G)
The goal for next-generation storage is focused on _________________.
Hard drives-increasing their capacity, decreasing their size
federal law that protects medical records
Health Insurance Portability and Accountability Act (HIPAA)
simply a scam using the Internet
Internet scam
widely used for older monitors and is typically less expensive
LCD (Liquid crystal display)
Networks with nodes that are in close physical proximity—within the same building, for instance—are called __________________. -span distances less than a mile and are owned and operated by individual organizations -widely used by colleges, universities, and other types of organizations to link personal computers and to share printers and other resources
Local Area Networks (LAN)
monitors replace the LED monitor's backlighting technology with a thin layer of organic compound that produces light. By eliminating the backlight, ____________________ monitors can be even thinner with better power efficiency and contrast ratios.
OLED (Organic light-emitting diode)
relates to who owns data.
Property
Most keyboards use an arrangement of keys given the name _________________.
QWERTY
__________ does NOT lose information when a computer is turned off
ROM
discs that cannot be written on or erased by the user. Optical discs that you buy in a store, such as music CDs, DVD movies, and Blu-ray video games, are often this .
Read-only (ROM for read-only memory) discs
measured by the diagonal length of a monitor's viewing area. Common sizes are 15, 17, 19, 21, and 24 inches.
Size, or active display area
the VoIP application that uses Internet rather than traditional telephone lines to support voice communication
Telephony, also known as Internet Telephony
so compact that they can be transported on a key ring. These drives conveniently connect directly to a computer's USB port to transfer files and can have capacities ranging from 1 GB to 256 GB, with a broad price range to match. Due to their convenient size and large capacities, __________ have become a very popular option for transporting data and information between computers, specialty devices, and the Internet
USB drives or flash drives
what else is 3D printing known as?
additive manufacturing
telephones typically send and receive ________________, which are continuous electronic waves.
analog signals
In the future, with wearable ______________________, information will appear instantly, right before your eyes.
augmented reality displays EX/ look at the sky and tell weather information EX/ problem: how to power it
devices are either handheld wand readers or platform scanners. They contain photoelectric cells that scan or read bar codes, or the vertical zebra-striped marks printed on product containers.
bar code readers or scanners
the vertical zebra-striped marks printed on product containers
bar codes
measures how much a particular storage medium can hold.
capacity
found among heavy computer users, consists of damage to nerves and tendons in the hands. Some victims report the pain is so intense that they cannot open doors or shake hands and that they require corrective surgery
carpal tunnel syndrome
communication uses multiple antennae (cell towers) to send and receive data within relatively small geographic regions (cells). Most cell phones and mobile devices use these networks
cellular
a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core. In terms of the number of telephone connections, this has over 80 times the transmission capacity of twisted pair. _____________cable is used to deliver television signals as well as to connect computers in a network.
coaxial cable
the process of sharing data, programs, and information between two or more computers.
computer communications
-Another way your web activity can be monitored -small data files that are deposited on your hard disk from websites you have visited
cookies
a legal concept that gives content creators the right to control use and distribution of their work
copyright
a computer criminal who creates and distributes malicious programs
cracker
the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person
cyberbullying
any criminal offense that involves a computer and a network. -It was recently estimated that it affects over 400 million people and costs over $400 billion each year.
cybercrime or computer crime
For years, individuals relied on ______________ using existing telephones and telephone modems to connect to the Internet. This type of service has been replaced by higher-speed connection services including DSL, cable, satellite, and cellular services.
dial-up services
uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account
dictionary attack
-To prevent copyright violations, corporations often use ________________. -encompasses various technologies that control access to electronic media and files -Typically, used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file.
digital rights management (DRM)
Computers, in contrast, send and receive ______________. These represent the presence or absence of an electronic pulse—the on/off binary signals we mentioned in Chapter 5.
digital signals
are responsible for recovering systems and data after a disaster strikes an organization. In addition, they often create plans to prevent and prepare for such disasters
disaster recovery specialists
receiving data from a satellite
downlink
the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key, or, simply, a key
encryption
To make the computer easier on the eyes, take a 15-minute break every hour or two. Keep everything you're focusing on at about the same distance. For example, the computer screen, keyboard, and a document holder containing your work might be positioned about 20 inches away. Clean the screen of dust from time to time
eyestrain and headache
dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data.
file servers
consists of hardware and software that control access to a company's intranet and other internal networks. Most use software or a special computer called a proxy server.
firewall
have sensors that collect data about your hand movements. Coupled with software, this interactive sensory equipment lets you immerse yourself in a computer-generated world
gloves
The most common black ink selection is ______________, in which images are displayed using many shades of gray
grayscale
A vast industry of data gatherers known as ______________________ now exists that collects, analyzes, and sells such personal data.
information resellers or information brokers
Unlike radio waves, this uses ___________ light waves to communicate over short distances. Like microwave transmissions, __________is a line-of-sight communication. Because light waves can only travel in a straight line, sending and receiving devices must be in clear view of one another without any obstructions blocking that view. One of the most common ______________ devices is the TV remote control.
infrared
located inside the system unit. These hard disks are able to store and retrieve large quantities of information quickly. They are used to store programs and data files. For example, nearly every personal computer uses its i___________ hard disk to store its operating system and major applications such as Word and Excel. To ensure adequate performance of your __________ hard disk and the safety of your data, you should perform routine maintenance and periodically make backup copies of all important files; provide fast access, they have a fixed amount of storage and cannot be easily removed from the system unit
internal hard disk
control game actions by users varying the pressure, speed, and direction of a control stick
joysticks
one of the most common ways to input data
keyboard
records every activity and keystroke made on your computer system, including credit card numbers, passwords, and e-mail messages
keystroke logger
these keyboards are smaller than traditional keyboards and are widely used on laptop computers. While the precise location and number of keys may differ among manufactures, ___________ keyboards typically have fewer keys, do not include a numeric keypad, and do not have a standard location for the function and navigation keys
laptop keyboards
uses a technology similar to that used in a photocopying machine. ______________ use a laser light beam to produce images with excellent letter and graphics quality. More expensive than inkjet printers, _____________ are faster and are used in applications requiring high-quality output
laser printers
short for malicious software. They are specifically designed to damage or disrupt a computer system. The three most common types are viruses, worms, and Trojan horses.
malware
To convert the digital signals to analog signals and vice versa, you need a _______________.
modem
control games by user movements. For example, Microsoft's Kinect _____________________ accepts user movements and spoken commands to control games on the Xbox 360.
motion-sensing devices
There are a wide variety of pointing devices, including the ___________________________________________.
mouse, touch screen, game controller, and stylus
-can hold over 128 gigabytes of data. That is the equivalent of millions of typewritten pages or a medium-sized library all on a single disc. -are very common, with most software and many movies available on ______________ -a laser beam alters the surface of a plastic or metallic disc to represent data. Unlike hard disks, which use magnetic charges to represent 1s and 0s, ___________- use reflected light -The 1s and 0s are represented by flat areas called lands and bumpy areas called pits on the disc surface -The disc is read by an optical disc drive using a laser that projects a tiny beam of light on these areas. The amount of reflected light determines whether the area represents a 1 or a 0. -use tracks and sectors to organize and store files. Unlike the concentric tracks and wedge-shaped sectors used for hard disks, however, optical discs typically use a single track that spirals outward from the center of the disc. This single track is divided into equal-sized sectors.
optical disks
What mouse is the most widely used? It emits and senses light to detect mouse movement. Traditionally, the detected movements are communicated to the system unit through a cord
optical mouse
high-speed Internet connection to a dedicated remote storage facility. These facilities contain banks of file servers to offer enormous amounts of storage.
organizational cloud storage
processed data or information. _____________ typically takes the form of text, graphics, photos, audio, and/or video. For example, when you create a presentation using a presentation graphics program, you typically input text and graphics. You also could include photographs, voice narration, and even video. The ____________ would be the completed presentation
output
help you create strong passwords. Additionally, they will store all your passwords in one location and automatically provide the appropriate password when requested from one of your favorite sites
password managers
secret words or phrases (including numbers, letters, and special characters) that must be keyed into a computer system to gain access
passwords
A network may consist only of ______________ computers, or it may integrate personal computers or other devices with larger computers. Networks can be controlled by all nodes working together equally or by specialized nodes coordinating and supplying all resources. Networks may be simple or complex, self-contained or dispersed over a large geographic area.
personal
concerned with protecting hardware from possible human and natural disasters
physical security
representing some other person's work and ideas as your own without giving credit to the original source
plagiarism
typically a handheld device that slides across the image, making direct contact
portable scanner
RAM is also referred to as __________________.
primary storage
translate information that has been processed by the system unit and present the information on paper
printers
Most wireless connections use __________________ to communicate.
radio waves EXs/ Bluetooth, WiFi, microwave, cell, and satellite connections
basic distinguishing features of all printers
resolution, color capability, speed, memory, and duplex printing
a node that forwards or routes data packets from one network to their destination in another network.
router
use satellites to provide wireless connections. While slower than DSL and cable modem, these connections are available almost anywhere using a satellite-receiving disk.
satellite-connection services
Credit cards are also known as ______________?
smart cards
the output is often referred to as a _________________
soft copy
the unauthorized copying and/or distribution of software
software piracy
devices have no moving parts. Data and information are stored and retrieved electronically directly from these devices much as they would be from conventional computer memory.
solid-state storage
The most widely used audio-output devices are __________ and _____________.
speakers and headphones
used to describe a wide range of programs that are designed to secretly record and report an individual's activities on the Internet
spyware
a penlike device typically used with tablets and mobile devices; uses pressure to draw images on a screen. Often interacts with the computer through handwriting recognition software
stylus
prepare instruction manuals, technical reports, and other scientific or technical documents. Most _____________ work for computer software firms, government agencies, or research institutions. They translate technical information into easily understandable instructions or summaries
technical writers
At one time nearly all computer communication used _______________lines.
telephone
input and output devices for receiving and sending voice communication
telephones
the ability to fully experience the reality of a different place without actually being there
telepresence
use heat elements to produce images on heat-sensitive paper. These printers are widely used with ATMs and gasoline pumps to print receipts
thermal printers
type of cookie usually generated by an advertising company that is affiliated with the website you are currently visiting. These cookies are used by the advertising company to keep track of your web activity as you move from one site to the next.
third-party cookie or tracking cookie
these keyboards are used on smartphones and other small mobile devices. Designed primarily for communicating via texting and connecting to the web, these keyboards are very small.
thumb keyboards
A network can be arranged or configured in several different ways. This arrangement is called the network's ______________.
topology
Another important monitor feature is the ability to accept _________________________
touch input
allows users to select actions or commands by touching the screen with a finger or penlike device
touch screen
What are some commonly used input devices?
touch screens, game controllers, scanners, digital cameras, voice recognition, and audio-input devices
rings of concentric circles on the platter (on hard disks)
tracks
Benefits of E-books
transporting, searching, bookmarking, adding highlights and notes, purchasing
each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes that in turn are connected to other subordinate nodes, and so forth, forming a treelike structure.
tree network
programs that appear to be harmless; however, they contain malicious programs. -not viruses. Like worms, however, they can be carriers of viruses. -The most common types appear as free computer games and free screensaver programs that can be downloaded from the Internet.
trojan horses
consists of pairs of copper wire that are twisted together. Both standard telephone lines and Ethernet cables use this kind of physical connection. Ethernet cables are often used in networks and to connect a variety of components to the system unit
twisted-pair cable
provides a very-low-cost alternative to long-distance telephone calls using electronic voice and video delivery.
videoconferencing
an artificial, or simulated, reality created in 3D by computers. It strives to create a virtual or immersive experience by using specialized hardware that includes headgear and gloves (able to sit in a car they have designed but not yet built)
virtual reality (VR)
programs that migrate through networks and operating systems, and most attach themselves to different programs and databases. While some are relatively harmless, many can be quite destructive.
viruses
Creating ____________ is not anywhere near as difficult as recognizing and interpreting voice input. In fact, ___________ is quite common. It is used with many smart phones, cars, and soft drink machines. It is used as a reinforcement tool for learning, such as to help students study a foreign language. It also is used in many supermarkets at the checkout counter to confirm purchases. One of its most powerful capabilities is to assist the physically challenged
voice output (like Google translate ish)
also known as low bandwidth, is used for standard telephone communication. Personal computers with telephone modems and dial-up service use this bandwidth. While effective for transmitting text documents, it is too slow for many types of transmission, including high-quality audio and video.
voiceband
invisible images or HTML code hidden within a web page or e-mail message
web bugs
What is a combination key and an example of it?
-perform an action when held down in combination with another key -EX/ Ctrl
What are the 5 types of scanning devices?
1)optical scanners 2)card readers 3)bar code readers 4)RFID readers 5)character and mark recognition devices
widely used by the United Parcel Service (UPS) and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages.
Maxicode
What button does the Windows keyboard include to directly access the start menu?
Windows key
Almost all flat-panel displays are _________________-, meaning that a common source of light is dispersed over all the pixels on the screen. There are three basic types of flat-panel monitors: LCD, LED, and OLED
backlit
refers to the quality and sharpness of the displayed images. It is a function of several monitor features, including resolution, dot pitch, contrast ratio, size, and aspect ratio
clarity
any data or instructions used by a computer
input
converts what we understand into what the system unit can process
input devices
any hardware used to provide or to create output. They translate information that has been processed by the system unit into a form that humans can understand. There are a wide range of ____________________. The most widely used are monitors, printers, and audio-output devices
output devices
specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet. ____________ are built into most smartphones and tablets. Desktop and laptop _________ are either built in or attached to the computer's monitor.
webcams
Some mice have a ______________ that can be rotated to scroll through information that is displayed on the monitor
wheel button
There are two categories of laser printers. ________________________ are less expensive and are used by a single user. They typically can print 15 to 17 pages a minute. ___________________ typically support color, are more expensive, and are used (shared) by a group of user, typically print over 50 pages a minute
1) personal laser printers 2)shared laser printers
It is estimated that over _________________ smartphones are in use worldwide.
1.5 billion
convert sounds into a form that can be processed by the system unit. By far the most widely used ____________ device is the microphone. _____________ can take many forms, including the human voice and music.
Audio input
makes it illegal to deactivate or otherwise disable any antipiracy technologies including DRM technologies
Digital Millennium Copyright Act (ILLEGAL to copy movies and music from the internet)
produces images that reflect light like ordinary paper, making the display easy to read
E-ink
started in the 1980s using analog radio signals to provide analog voice transmission service.
First-generation mobile telecommunications (1G)
include the locations, or addresses, of sites that you have recently visited
History files
Every computer on the internet is identified by a unique number called an ____________________.
IP address
Identification: Every computer on the Internet has a unique numeric address called an ______________________. Similar to the way a postal service uses addresses to deliver mail, the Internet uses these to deliver e-mail and to locate websites. Because these numeric addresses are difficult for people to remember and use, a system was developed to automatically convert text-based addresses to numeric ____________________. This system uses a domain name server (DNS) that converts text-based addresses to ________________. For example, whenever you enter a URL, say www.mhhe.com, a DNS converts this to an _________________ before a connection can be made.
IP address (Internet protocol address)
work with firewalls to protect an organization's network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic
Intrusion Detection Systems (IDS)
span distances up to 100 miles. These networks are frequently used as links between office buildings that are located throughout a city. Unlike a LAN, is typically not owned by a single organization. Rather, it is owned either by a group of organizations or by a single network service provider that provides network services for a fee.
Metropolitan Area Networks (MANs)
What are some examples of combination input and output devices?
Multifunctional devices and telephones
a type of file server designed for homes and small businesses; is less expensive, easier to set up, and easier to manage than most file servers. However, it does not include powerful management tools and features found in many large-scale file servers.
Network attached storage (NAS)
senses the presence or absence of a mark, such as a pencil mark. _____________ is often used to score standardized multiple-choice tests.
Optical-mark recognition (OMR)
Asks..What are the threats to personal privacy, and how can we protect ourselves? -concerns the collection and use of data about individuals. There are three primary issues: Accuracy, Property, Access
Privacy
memory
RAM
For years, large corporations have been leasing special high-speed lines from telephone companies. Originally, these were copper lines, known as ______________, that could be combined to form higher-capacity options known as T3 or DS3 lines. These lines have largely been replaced by faster optical carrier (OC) lines.
T1 lines
started in the 2000s and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones.
Third-generation mobile telecommunications (3G)
these full-size keyboards are widely used on desktops and larger computers. The standard U.S. ___________ keyboard has 101 keys. Some ______________ keyboards include a few additional special keys. For example, the Windows keyboard includes a Windows key to directly access the Start menu. ______________ keyboards provide function keys, navigation keys, and a numeric keypad. Some keys, such as the Caps Lock key, are toggle keys. These keys turn a feature on or off. Others, such as the Ctrl key, are combination keys, which perform an action when held down in combination with another key.
Traditional
What is a UAV or drone?
Unmanned Aerial Vehicle- aircraft without a human pilot
encrypt connections between company networks and remote users such as workers connecting from home
Virtual private networks (VPNs)
input and output devices for receiving and sending voice communication
Voice over IP (VoIP)
uses high-frequency radio signals to transmit data. A number of standards for this exist, and each can send and receive data at a different speed. Most home and business wireless networks use this
WiFi (wireless fidelity)
what device is used to issue commands?
a mouse
measures the amount of time required by the storage device to retrieve data and programs.
access speed
This ever-growing volume of data is often referred to as ________________.
big data
A collection of zombie computers is known as a ____________________.
botnet or robot network
widely used for DSL, cable, and satellite connections to the Internet. Several users can simultaneously use a single _____________ connection for high speed data transfer.
broadband
each device is connected to a common cable called a bus or backbone, and all communications travel along this bus.
bus network
uses the same coaxial cable as your television. Like a DSL modem, a this creates high-speed connections using the system unit's USB or Ethernet port.
cable modem
is provided by cable television companies using their existing television cables. These connections are usually faster than DSL.
cable service
a node that requests and uses resources available from other nodes. Typically, is a user's personal computer.
client
where the Internet acts as a "cloud" of servers that supply applications to clients as a service rather than a product.
cloud computing
capability is provided by most printers today. Users typically have the option to print either with just black ink or with __________. Because it is more expensive to print in ________________-, most users select black ink for letters, drafts, and homework
color
electronic systems that transmit data from one location to another. Whether wired or wireless, every _______________________ has four basic elements: sending and receiving devices, connection devices, data transmission specifications, communication channel
communication system
guidelines for the morally acceptable use of computers in our society
computer ethics
indicate a monitor's ability to display images. It compares the light intensity of the brightest white to the darkest black. The higher the ratio, the better the monitor. Good monitors typically have __________________ between 500:1 and 2000:1
contrast ratios
Optical scanners, like traditional copy machines, can make a _________ from an original. For example, an optical scanner can make a digital _______ of a photograph. Image capturing devices, on the other hand, create or capture original images. These devices include digital cameras and webcams.
copy
the ___________ or __________ mouse uses radio waves or infrared light waves to communicate with the system unit. These devices eliminate the mouse cord and free up desk space.
cordless or wireless
concerned with protecting software and data from unauthorized tampering or damage
data security
a specialized server that manages resources, such as user accounts, for an entire network.
directory server
improves hard-disk performance by anticipating data needs, improves processing by acting as a temporary high-speed holding area between a secondary storage device and the CPU; requires a combination of hardware and software; The transfer rate from memory is much faster than from the hard disk. As a result, overall system performance is often increased by as much as 30 percent
disk caching
a private network that connects more than one organization. Many organizations use Internet technologies to allow suppliers and others limited access to their networks
extranet
transmits data as pulses of light through tiny tubes of glass. The data transmission speeds of these cables are incredible; recently speeds of 1 petabit per second were measured (a petabit is 1 million gigabits). Compared to coaxial cable, it is lighter, faster, and more reliable at transmitting data; is rapidly replacing twisted-pair cable telephone lines.
fiber-optic cable
designed to be held by two hands and provide a wide array of inputs including motion, turning, stopping, and firing
gamepads
someone gains unauthorized access to our computer or other computers that contain information about us.. These people are commonly known as computer ____________. -It should be noted that not all hackers are intent on malicious actions and that not all are criminals.
hackers
Printer output is often called _____________________.
hard copy
combine the functionality of microphones and headphones. The microphone accepts audible input and headphones provide audio output. _____________ are an integral part of serious video game systems
headsets
any computer system connected to a network that provides access to its resources.
host
create or capture original images. These devices include digital cameras and webcams
image capturing devices
the information that people voluntarily post about themselves online
internet identity
a private network within an organization that resembles the Internet. Like the public Internet, intranets use browsers, websites, and web pages
intranet
What do output devices convert machine language into?
letters, numbers, sounds, and images that people can understand
refers to the tremendous amount of secondary storage required by large organizations
mass storage
this topology is the newest type and does not use a specific physical layout (such as a star or a tree). -Rather, this network requires that each node have more than one connection to the other nodes.
mesh network
short for modulator-demodulator enables digital personal computers to communicate across different media, including telephone wires, cable lines, and radio waves.
modems
What are commonly used output devices?
monitors, printers, audio and video output devices
any device that is connected to a network. It could be a computer, printer, or data storage device.
node
Cloud storage is also known as....
online storage
An __________________, also known simply as a scanner, accepts documents consisting of text and/or images and converts them to machine-readable form. These devices do not recognize individual letters or images. Rather, they recognize light, dark, and colored areas that make up individual letters or images. Typically, scanned documents are saved in files that can be further processed, displayed, printed, or stored for later use. There are four basic types of _________________: flatbed, document, portable, and 3D. They are powerful tools for a wide variety of end users, including graphics and advertising professionals who scan images and combine them with text
optical scanner
converts information processed by the system units into a form we can use
output devices
It is also wise to store files on an _______________ source.
outside
If you exceed the monthly data limit, wireless providers will start charging ________________. For example, one provider charges $10 for every extra gigabyte used. To minimize overage charges, consider the following: -WiFi access points -streaming music/video -downloading -moniter your data usage
overage charges
attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate
phishing
special-purpose printers for producing a wide range of specialized output. Using output from graphics tablets and other graphical input devices, _____________ create maps, images, and architectural and engineering drawings. __________ are typically used by graphic artists, engineers, and architects to print out designs, sketches, and drawings
plotters
ensures that your browsing activity is not recorded on your hard disk
privacy mode
rules for exchanging data between computers are known as
protocols
the process of accessing information from secondary storage
reading
each device is connected to two other devices, forming a ring. When a message is sent, it is passed around the ring until it reaches the intended destination.
ring network
use cameras, microphones, and other sensors as inputs. Based on these inputs, robotic outputs can be as complex as exploring damaged nuclear reactors to as simple as taking a photo. _____________ can be found almost everywhere including in a home vacuuming floors, in a factory assembling cars, on a farm sorting produce, and in hospitals assisting in surgery
robots
a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return
scam
provide a collection of utility programs designed to protect your privacy and security while you are on the web
security suites
a node that shares resources with other nodes. Dedicated servers specialize in performing specific tasks. Depending on the specific task, they may be called an application server, communication server, database server, file server, printer server, or web server.
server
measured in the number of pages printed per minute. Typically, printers for personal use average 15 to 19 pages per minute for single-color (black) output and 13 to 15 pages per minute for color output
speed
way of coordinating the sharing of information and resources
strategy
contain web page content and instructions for displaying this content
temporary internet files or browser cache
provides very efficient direct text communication between individuals using short electronic messages.
texting
sending data to a satellite
uplink
elepresence seeks to create the illusion that you are actually at a remote location, seeing, hearing, and, someday maybe, even feeling as though you _________________. (robots)
were really there
programs that simply replicate themselves over and over again
worms
The benefits of cloud computing are...
1) Maintenance- the cloud takes care of encryption and security 2) Hardware upgrades- the cloud will never run out of space, can replace failed hard disks without interupption to the user 3) File sharing and collaboration- users can share info as long as they have an internet connection
If you accidentally delete a file, ______________...
1) Recovery/ undelete software 2) Testing USB ports 3) professional recovery services
Disadvantages of cloud storage include...
1) access speed- dependent on internet 2) File security- dependent on cloud's security
Secondary storage devices have always been an indispensable element in any computer system. They have similarities to output and input devices. Like _____________ devices, secondary storage devices receive information from the system unit in the form of the machine language of 0s and 1s. Rather than translating the information, however, secondary storage devices save the information in machine language for later use. Like _______________ devices, secondary storage devices send information to the system unit for processing. However, the information, since it is already in machine form, does not need to be translated. It is sent directly to memory (RAM), where it can be accessed and processed by the CPU.
1) output 2) input
For example, if you wanted to send an e-mail to a friend, you could create and send the message using your computer, the 1)_________________. Your modem, a 2)______________________, would modify and format the message so that it could travel efficiently across 3)_________________________, such as telephone lines. The specifics describing how the message is modified, reformatted, and sent would be described in the 4)_________________________________. After your message traveled across the channel, the receiver's modem, a connection device, would reformat it so that it could be displayed on your friend's computer, the 5)__________________.
1) sending device 2) connection device 3) communication channels 4) data transmission specifications 5) receiving device
Creating and knowingly spreading a virus is a very serious crime and a federal offense punishable under the ________________.
Computer Fraud and Abuse Act
makes it a crime for unauthorized persons even to view—let alone copy or damage—data using any computer across state lines. It also prohibits unauthorized use of any government computer or a computer used by any federally insured financial institution
Computer Fraud and Abuse Act
modem uses standard phone lines to create a high-speed connection directly to your phone company's offices. These devices are usually external and connect to the system unit using either a USB or an Ethernet port.
DSL (digital subscriber line)
are the standard optical discs in PCs. ________ are very similar to CDs except that typical DVD discs can store 4.7 GB (gigabytes)—seven times the capacity of CDs. Optical discs that store movies or software are often _________. _______ drives and CD drives look very similar.
DVDs (digital versatile disks)
These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel.
Data transmission specifications
is provided by telephone companies using existing telephone lines to provide high-speed connections. ADSL (asymmetric digital subscriber line) is one of the most widely used types of this; is much faster than dial-up.
Digital subscriber line (DSL) service
were once too expensive for anything but military budgets. However, today's ___________ are inexpensive, faster, and smarter, making them a valuable tool and fun high-tech toy. Most ____________ take input from a controller from either a radio joystick or a Wi-Fi connected tablet or laptop. The ___________ act as an output device, sending back video and sound to the user. The resulting combination of video and aerial maneuverability has made ___________ a popular choice for a wide variety of activities ranging from amateur cinematographers to civil engineers
Drones, or unmanned aerial vehicles (UAV)
dedicated mobile devices for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Two well-known __________________ are Amazon's Kindle and Barnes & Noble's Nook Simple Touch
E-book readers (e-readers)
traditional printed books in electronic format. These books are available from numerous sources including many public and private libraries, bookstore websites, and the cloud
E-books (electronic books)
There are a variety of different standards or ways in which nodes can be connected to one another and ways in which their communications are controlled in a LAN. The most common standard is known as ___________________.
Ethernet (Ethernet LANs)
is showing up in some areas, but it is a new technology and not widely available. Current providers include Google and Verizon with speeds faster than cable or DSL connections.
Fiber-optic service (FiOS)
Protects sensitive files by encrypting them before they are stored on a hard drive. Files can be encrypted individually, or specialized software can be used to encrypt all files automatically each time they are saved to a certain hard drive location
File encryption
act as a security buffer between a corporation's private network and all external networks, including the Internet
Firewalls
a service that supports cloud printing. Once a user activates a printer using the Google Chrome OS, the user can access that printer anywhere with a smartphone or any other type of computer that is connected to the Internet. For example, you could use a smartphone from almost anywhere to send documents to be printed on a printer located at your home or school
Google Cloud print
federal law that protects personal financial information
Gramm-Leach-Bliley Act
responsible for maintaining the security of a company's networks, systems, and data. Their goal is to ensure the confidentiality, integrity, and availability of information
IT security analysts
the illegal assumption of someone's identity for the purposes of economic gain
Identity Theft Identity theft
What are the 3 basic types of flat-panel monitors?
LCD (liquid crystal display) is widely used for older monitors and is typically less expensive. LED (light-emitting diode) monitors use similar technology with a more advanced backlighting technology. They produce better-quality images, are slimmer, and are more environmentally friendly as they require less power and use fewer toxic chemicals to manufacture. Most new monitors are LED. OLED (organic light-emitting diode) monitors replace the LED monitor's backlighting technology with a thin layer of organic compound that produces light. By eliminating the backlight, OLED monitors can be even thinner with better power efficiency and contrast ratios
monitors use similar technology with a more advanced backlighting technology. They produce better-quality images, are slimmer, and are more environmentally friendly as they require less power and use fewer toxic chemicals to manufacture. Most new monitors are _______________.
LED (light-emitting diode)
What does LTE stand for?
Long Term Evolution
used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips. A special-purpose machine known as a reader/sorter reads these numbers and provides input that allows banks to efficiently maintain customer account balances.
Magnetic-ink character recognition (MICR)
What are the 3 types of character and mark recognition devices?
Magnetic-ink character recognition (MICR)—used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips. A special-purpose machine known as a reader/sorter reads these numbers and provides input that allows banks to efficiently maintain customer account balances. Optical-character recognition (OCR)—uses special preprinted characters that can be read by a light source and changed into machine-readable code. A common OCR device is the handheld wand reader. (See Figure 6-12.) These are used in department stores to read retail price tags by reflecting light on the printed characters. Optical-mark recognition (OMR)—senses the presence or absence of a mark, such as a pencil mark. OMR is often used to score standardized multiple-choice tests.
The most frequently used output device is the ___________. Also known as display screens, ___________ present visual images of text and graphics. The output is often referred to as soft copy. ______________ vary in size, shape, and cost. Almost all, however, have some basic distinguishing features.
Moniters
a computer specialist responsible for efficient network operations and implementation of new networks
Network Administrator
manage a company's LAN and WAN networks -They may be responsible for design, implementation, and maintenance of networks. Duties usually include maintenance of both hardware and software related to a company's intranet and Internet networks. -are typically responsible for diagnosing and repairing problems with these networks. -Some duties include planning and implementation of network security as well.
Network Administrators
as discussed in Chapter 5, these are expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter.
Network Interface Cards (NIC)
control and coordinate the activities of all computers and other devices on a network. These activities include electronic communication and the sharing of information and resources.
Network Operating Systems (NOS)
uses special preprinted characters that can be read by a light source and changed into machine-readable code. A common _____________ device is the handheld wand reader. These are used in department stores to read retail price tags by reflecting light on the printed characters.
Optical-character recognition (OCR)
type of wireless network that works within a very small area—your immediate surroundings. -connect cell phones to headsets, keyboards to cell phones, and so on. These networks make it possible for wireless devices to interact with each other.
Personal Area Network (PAN)
larger versions of the specialized devices discussed earlier in this chapter that enhance organizational security by constantly making backup copies of files moving across the organization's networks.
RAID systems
holds or stores data and programs that the CPU is presently processing. Before data can be processed or a program can be run, it must be in __________. For this reason, ____________ is sometimes referred to as primary storage.
RAM (random access memory)
tiny chips that can be embedded in most everything. They can be found in consumer products, driver's licenses, passports, and any number of other items. (See Figure 6-11.) These chips contain electronically stored information that can be read using an RFID reader located several yards away. They are widely used to track and locate lost pets; to monitor production and update inventory; and to record prices, product descriptions, and locations of retail items
RFID (radio-frequency identification) tags
improve performance by expanding external storage, improving access speed, and providing reliable storage; The connected hard-disk drives are related or grouped together, and the computer system interacts with the ___________ system as though it were a single large-capacity hard-disk drive. The result is expanded storage capability, fast access speed, and high reliability. For these reasons, _________ is often used by Internet servers and large organizations
Redundant arrays of inexpensive disks (RAID)
any injury that is caused by fast, repetitive work that can generate neck, wrist, hand, and arm pain. RSI is by far the greatest cause of workplace illnesses, resulting in compensation claims totaling billions of dollars and lost productivity every year
Repetitive strain injury: Repetitive strain injury (RSI)
are similar to write-once discs except that the disc surface is not permanently altered when data is recorded. These changeable, portable storage options are popular for storing and sharing audio, video, and large multimedia presentations.
Rewritable (RW for rewritable or RAM for random-access memory) discs
Free Wi-Fi networks are available almost everywhere from libraries to fast-food restaurants and coffee shops. These imitate these free networks. These rogue networks operate close to the legitimate free hotspots and typically provide stronger signals that many users unsuspectingly connect to. Once connected, the rogue networks capture any and all information sent by the users to legitimate sites including user names and passwords.
Rogue Wi-Fi hotspots
designed to be connected inside a personal computer system the same way an internal hard disk would be but contain solid-state memory instead of magnetic disks to store data; are faster and more durable than hard disks, also require less power, which can lead to increased battery life for laptops and mobile devices; are more expensive and generally have a lower capacity than hard disks, but this is changing as their popularity continues to increase
SSDs (solid state drives)
started in the 1990s using digital radio signals.
Second-generation mobile telecommunications (2G)
Asks..How can access to sensitive information be controlled, and how can we secure hardware and software?
Security
Another widely used Internet protocol is ______________________-. The essential features of this protocol involve (1) identifying sending and receiving devices and (2) breaking information into small parts, or packets, for transmission across the Internet.
TCP/IP (transmission control protocol/Internet protocol)
2 different types of codes
UPC and MaxiCode codes. UPCs (Universal Product Codes) are widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records. MaxiCode is widely used by the United Parcel Service (UPS) and others to automate the process of routing packages, tracking in-transit packages, and locating lost packages.
widely used by retail stores to automate the processes to check out customers, to change product prices, and to maintain inventory records.
UPCs (Universal Product Codes)
delivers a much clearer and more detailed wide-screen picture than regular HDTV. Because the output is digital, users can readily freeze video sequences to create high-quality still images. The video and still images can then be edited and stored for later use. This technology is very useful to graphic artists, designers, and publishers. One of the most recent and dramatic advances is 3D ________________ Using special viewing glasses, 3D ______________ provides theater-quality three-dimensional viewing
Ultra-high-definition television (UHDTV)
What happens to RAM in an instance like a power outage?
Unfortunately, most RAM provides only temporary or volatile storage. That is, it loses all of its contents as soon as the computer is turned off. Its contents also are lost if there is a power failure that disrupts the electric current going into the system unit. This volatility results in a need for more permanent or nonvolatile storage for data and programs. We also need external storage because users need much more storage capacity than is typically available in a computer's primary or RAM memory.
What is another name for drones?
Unmanned Aerial Vehicles (UAV)
create a secure private connection between a remote user and an organization's internal network. -Special VPN protocols create the equivalent of a dedicated line between a user's home or laptop computer and a company server. The connection is heavily encrypted, and, from the perspective of the user, it appears that the workstation is actually located on the corporate network.
VPN (Virtual Private Networks)
-the most widely used wireless network encryption for home wireless networks -typically established for a wireless network through the network's wireless router -While the specifics vary between routers, is usually set through the router's settings options
WPA2 (Wi-Fi Protected Access)
Secures web transactions, especially financial transactions
Website encryption
a new standard that extends the range of Wi-Fi networks using microwave connections; is commonly used by universities and others to extend the capability of existing Wi-Fi networks.
WiMax (Worldwide Interoperability for Microwave Access)
countrywide and worldwide networks. These networks provide access to regional service (MAN) providers and typically span distances greater than 100 miles. They use microwave relays and satellites to reach users over long distances
Wide Area Networks (WANs)
can be written on once. After that, the disc can be read many times but cannot be written on or erased. These discs are ideal for creating permanent archives, such as CD-R, often used for storing family photos, and DVD-R, often used to store home movies.
Write-once (R for recordable) discs
also known as additive manufacturing, create three-dimensional shapes by adding very thin layer after layer of material until the final shape is fully formed. There are a variety of different processes and materials that can be used to create each layer. One of the most common sprays a liquid plastic or plasticlike substance through a nozzle similar to an inkjet printer (price dropped to as low as $200)
additive manufacturing
indicates the proportional relationship between a display's width and height. Typically, this relationship is expressed by two numbers separated by a colon (:). Many older, more square-shaped monitors have a 4:3 __________________. Almost all newer monitors have a 16:9 __________________ designed to display wide-screen content
aspect ratio
translate audio information from the computer into sounds that people can understand. These devices connect to a sound card within the system unit. This connection can be by cable to an audio jack on the system unit, or the connection can be wireless
audio-output devices
To help avoid back and neck problems, make sure your equipment is adjustable. You should be able to adjust your chair for height and angle, and the chair should have good back support. The monitor should be at eye level or slightly below eye level. Use a footrest, if necessary, to reduce leg fatigue
back and neck pain
a measurement of the width or capacity of the communication channel. Effectively, it means how much information can move across the communication channel in a given amount of time. For example, to transmit text documents, a slow ____________ would be acceptable. However, to effectively transmit video and audio, a wider __________ is required. There are four categories...voiceband, medium band, broadband, and baseband.
bandwidth
widely used to connect individual computers that are located close to one another. Like broadband, it is able to support high-speed transmission. Unlike broadband, however, this can only carry a single signal at a time.
baseband
devices such as fingerprint and iris (eye) scanners
biometric scanning
Nearly everyone uses a credit card, debit card, access (parking or building) card, and/or some type of identification card. These cards typically have the user's name, some type of identification number, and signature on the card. Additionally, encoded information is often stored on the card. ________________ interpret this encoded information
card readers
including Verizon, AT&T, Sprint, and T-Mobile, support voice and data transmission to wireless devices using cellular networks. These networks have gone through different generations. First-generation mobile telecommunications (1G) started in the 1980s using analog radio signals to provide analog voice transmission service. Second-generation mobile telecommunications (2G) started in the 1990s using digital radio signals. Third-generation mobile telecommunications (3G) started in the 2000s and provided services capable of effective connectivity to the Internet, marking the beginning of smartphones.
cellular service providers
use central servers to coordinate and supply services to other nodes on the network. The server provides access to resources such as web pages, databases, application software, and hardware -widely used on internet -advantage ability to handle very large networks efficiently
client/ server
printers connected to the Internet that provide printing services to others on the Internet
cloud printers
This is the actual connecting or transmission medium that carries the message. This medium can be a physical wire or cable, or it can be wireless.
communication channel
an essential element of every communication system. These actually carry the data from one computer to another. There are two categories: One category connects sending and receiving devices by providing a physical connection, such as a wire or cable. The other category is wireless
communication channels
perhaps the most invasive and dangerous type of spyware. One type known as a keystroke logger
computer monitering software
a communication system that connects two or more computers so that they can exchange information and share resources; can be set up in different arrangements to suit users' needs.
computer network
These devices act as an interface between the sending and receiving devices and the communication channel. They convert outgoing messages into packets that can travel across the communication channel. They also reverse the process for incoming messages.
connection devices
a concept related to using computer networks to link people and resources. For example, ________________ means that you can connect your personal computer to other computers and information sources almost anywhere.
connectivity
uses similar technology as flat-panel monitors except it has a concave screen that provides better viewing angles near the edges of the screen. _________________are widely use for high-end televisions and for gamers searching for a highly immersive viewing experience. ________________ are just beginning to appear in smartphones and wearable computers. For smartphones, ______________ allow the screen to wrap around the edge of the phone for alternative display and button options. For smartwatches, a curved screen allows for large displays that contour to the shape of your wrist
curved monitor
runs through each track of a stack of platters. ____________ are necessary to differentiate files stored on the same track and sector of different platters. When a hard disk is formatted, tracks, sectors, and _____________ are assigned.
cylinders
defines how much data you can download using your 3G or 4G connection. These plans can be very confusing, but for most individuals, the plan that gives you a few gigabytes per month is best. Although a few providers have unlimited _________________, they may slow down, or throttle, your connection speed significantly if they deem that your usage is excessive.
data plans
These are rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel.
data transmission specifications
the process of converting from analog to digital
demodulation
attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data
denial of service (DoS) attack
refers to how tightly these charges can be packed next to one another on the disk.
density
capture images digitally and store the images on a memory card or in the camera's memory. Most _______________ are also able to record video as well. Almost all tablets and smartphones have built-in ________________ capable of taking images and video. You can take a picture, view it immediately, and even place it on your own web page, within minutes.
digital cameras
specialized devices with a large display connected to a computer or projector. The computer's desktop is displayed on the digital whiteboard and controlled using a special pen, a finger, or some other device. ___________________ are widely used in classrooms and corporate boardrooms
digital or interactive whiteboards
project the images from a traditional monitor onto a screen or wall. This is ideal for presentations or meetings when several people need to see the screen at the same time
digital projectors
large organizations; describing ways to continue operating until normal computer operations can be restored
disaster recovery plans
similar to a flatbed scanner except that it can quickly scan multipage documents. It automatically feeds one page of a document at a time through a scanning surface.
document scanner
the distance between each pixel. Most newer monitors have a _____________ of 0.30 mm (30/100th of a millimeter) or less. The lower the ________________ (the shorter the distance between pixels), the clearer the images produced
dot (pixel) pitch
allows automatic printing on both sides of a sheet of paper. Although not currently a standard feature for all printers, it will likely become standard in the future as a way to reduce paper waste and to protect the environment
duplex printing
Viruses and worms typically find their way into personal computers through ____________________.
e-mail attachments and programs downloaded from the Internet
buying and selling goods electronically
electronic commerce
highly detailed and personalized descriptions of individuals.
electronic profiles
provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents
many businesses search employees' electronic mail and computer files using ___________________. These programs record virtually everything you do on your computer.
employee-monitoring software
Most large organizations have established a strategy called an ______________________________ to promote efficient and safe use of data across the networks within their organizations
enterprise storage system
the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task. For computer users and manufacturers this means designing input and output devices to increase ease of use and to avoid health risks
ergonomics
-essential element that controls how computers are used today -standards of moral conduct
ethics
provide slower access and are typically connected to a USB or Thunderbolt port on the system unit and are easily removed. Like an internal hard disk, ___________ hard disks have a fixed amount of storage. However, since each removable hard disk can be easily replaced by another removable hard disk, a single port on the system unit can provide access to an unlimited amount of storage; use the same basic technology as internal hard disks and are used primarily to complement an internal hard disk. Because they are easily removed, they are particularly useful to protect or secure sensitive information. Other uses for _________________.include backing up the contents of the internal hard disk and providing additional hard-disk capacity
external hard drives
increase storage capacity by reducing the amount of space required to store data and programs. File compression is not limited to hard-disk systems; File compression programs scan files for ways to reduce the amount of required storage. One way is to search for repeating patterns. The repeating patterns are replaced with a token, leaving enough tokens so that the original can be rebuilt or decompressed. These programs often shrink files to a quarter of their original size. EX/ Winzip
file compression and decompression
a type of cookie that is generated (and then read) only by the website you are currently visiting
first-party cookie
small solid-state storage devices widely used in portable devices. Some of the cards are used within devices such as laptops, smartphones, and GPS navigation systems. Other cards provide removable storage. For example, ___________ is used to store images captured from digital cameras and then to transfer the images to desktop and other computers. ____________ is used in digital media players like the iPod to store and play music and video files
flash memory cards
Solid-state storage devices provide access to _________________; offers a combination of features of RAM and ROM. Like RAM it can be updated and like ROM it does not lose information when a computer is turned off. Flash memory is a little slower than traditional memory but much faster than traditional hard disks.
flash memory, also known as solid-state storage
the most widely used type of monitor today. Compared to other types, they are thinner, are more portable, and require less power to operate
flat-panel monitors
much like a copy machine. The image to be scanned is placed on a glass surface, and the scanner records the image.
flatbed scanner
devices that provide input to computer games. While keyboards and traditional mice can be used as __________________, the four most popular and specialized __________________ are joysticks, gaming mice, gamepads, and motion-sensing devices
game controllers
similar to traditional mice with higher precision, faster responsiveness, programmable buttons, and better ergonomics
gaming mice
translates handwritten notes into a form that the system unit can process.
handwriting recognition software
save files by altering the magnetic charges of the disk's surface to represent 1s and 0s. _______________ retrieve data and programs by reading these charges from the magnetic disk. Characters are represented by positive (+) and negative (−) charges using the ASCII, EBCDIC, or Unicode binary codes.
hard disks
use rigid metallic platters that are stacked one on top of another; store and organize files using tracks, sectors, and cylinders
hard disks
occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface. A ____________ is a disaster for a hard disk. The disk surface is scratched, and some or all of the data is destroyed. At one time, ____________ were commonplace. Now, fortunately, they are rare; so thin that a smoke particle, fingerprint, dust, or human hair could cause it
head crash
has earphones and three-dimensional stereoscopic screens
headgear
what are some common combination devices?
headsets, multifunctional devices, telephones, drones, robots, and virtual reality headgear and gloves
Tree network is used to share corporatewide data and is also known as _________________________.
hierarchal network
There are a variety of different standards or ways in which nodes can be connected to one another and ways in which their communications are controlled in a LAN. The most common standard is known as -used by individual sin homes and apartments
home network
Wireless access points that provide Internet access are widely available in public places such as coffee shops, libraries, bookstores, colleges, and universities. These access points are known as _____________ and typically use Wi-Fi technology.
hotspots
-the most widely used Internet protocol -This protocol requires that the browser and the connecting site encrypt all messages, providing a safer and more secure transmission.
https (hypertext transfer protocol secure)
is widely used to protect the transfer of sensitive information
https, or hypertext transfer protocol secure
They think that as long as they are using their own computer and are selective about disclosing their names or other personal information, then little can be done to invade their personal privacy. Experts call this the _____________________.
illusion of anonymity
spray ink at high speed onto the surface of paper. This process produces high-quality images in a variety of colors, making it ideal for printing photos. ______________ are relatively inexpensive and are the most widely used printers. In addition, they are reliable and quiet. The most costly aspect of _____________ is replacing the ink cartridges. For this reason, most users specify black ink for the majority of print jobs and use the more expensive color printing for select applications. Typical ____________ produce 15 to 19 pages per minute of black-only output and 13 to 15 pages of color output
inkjet printers
Large organizations constantly compile information about us and store it in ______________________.
large databases
the most common card reader. The encoded information is stored on a thin magnetic strip located on the back of the card. When the card is swiped through the ________________card reader, the information is read
magnetic card reader
specialized high-capacity secondary storage devices designed to meet organizational demands for data storage. These mass storage solutions allow large corporations and institutions to centralize their maintenance and security of data, thereby reducing costs and personnel.
mass storage devices
the physical material that holds the data and programs
media
used in special leased lines to connect midrange computers and mainframes as well as to transmit data over long distances. This bandwidth is capable of very-high-speed data transfer.
medium band
within a printer is used to store printing instructions and documents waiting to be printed. The more ______________, the faster it will be able to print large documents
memory
communication uses high-frequency radio waves. It is sometimes referred to as line-of-sight communication because can only travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances. Thus, this is a good medium for sending data between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of stations with dishes or antennas.
microwave
the electronic profile of one person is switched with another
mistaken identity
a stand-alone device that connects to a 3G or 4G network. It will then allow multiple devices near it to access the Internet via a Wi-Fi connection.
mobile hotspot device
the name of the process of converting from digital to analog
modulation
What is 'modem' short for?
modulator-demodulator
controls a pointer that is displayed on the monitor
mouse
usually appears in the shape of an arrow. It frequently changes shape, however, depending on the application
mouse pointer
typically combine the capabilities of a scanner, printer, fax, and copy machine. These ____________ offer a cost and space advantage. They cost about the same as a good printer or copy machine but require much less space than the single-function devices they replace. Their disadvantages are lower quality and unreliability. The output quality for any one function is often not quite as good as that of the separate single-purpose devices. The reliability of ___________ suffers because problems with one of the functional parts can make the entire device inoperable. Even so, ________________ are widely used in home and small business offices
multifunctional devices (MFD)
can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. ___________________ are commonly used with tablets and smartphones, as well as some laptop computers and desktop monitors
multitouch screens
describes how a network is arranged and how resources are coordinated and shared
network architecture
\a device that allows one LAN to be linked to other LANs or to larger networks
network gateway
Information sent or transmitted across the Internet usually travels through numerous interconnected networks. Before the message is sent, it is reformatted or broken down into small parts called packets. Each packet is then sent separately over the Internet, possibly traveling different routes to one common destination. At the receiving end, the packets are reassembled into the correct order.
packetization
nodes have equal authority and can act as both clients and servers. The most common way to share games, movies, and music over the Internet -growing in popularity because people are wanting to share worldwide
peer-to-peer (P2P) network
laser printers that are less expensive and are used by a single user. They typically can print 15 to 17 pages a minute
personal laser printers
provide an intuitive interface with the system unit by accepting physical movements or gestures such as a finger pointing or moving across a screen and converting these movements into machine-readable input
pointing devices
one of the most important features. Images are formed on a monitor by a series of dots or pixels (picture elements). (See Figure 6-15.) __________ is expressed as a matrix of these dots or pixels. For example, many monitors today have a _____________ 1,920 pixel columns by 1,080 pixel rows for a total of 2,073,600 pixels. The higher a monitor's ____________ (the more pixels), the clearer the image produced
resolution
or a printer is similar to monitor _______________-. It is a measure of the clarity of images produced. Printer __________________, however, is measured in dpi (dots per inch). Most printers designed for personal use average 1,200 by 4,800 dpi. The higher the dpi, the better the quality of images produced
resolution
putting guards on company computer rooms and checking the identification of everyone admitted
restricted access
communication uses this orbiting about 22,000 miles above the earth as microwave relay stations. orbit at a precise point and speed above the earth. They can amplify and relay microwave signals from one transmitter on the ground to another; can be used to send and receive large volumes of data. Uplink is a term relating to sending data to a ________________. Downlink refers to receiving data from a _____________. The major drawback to this communication is that bad weather can sometimes interrupt the flow of data One of the most interesting applications of these communications is for global positioning. A network owned and managed by the Department of Defense continuously sends location information to earth. Global positioning system (GPS) devices use that information to uniquely determine the geographic location of the device. Available in many automobiles to provide navigational support, these systems are often mounted into the dash with a monitor to display maps and speakers to provide spoken directions. Most of today's smartphones and tablets use GPS technology for handheld navigation.
satellite
convert scanned text and images into a form that the system unit can process. There are five types of ____________________: optical scanners, card readers, bar code readers, RFID readers, and character and mark recognition devices.
scanning devices
If you don't have the right ___________________, your computer will slow to a crawl, your digital camera won't take pictures, and your phone won't be able to run apps.
secondary storage
provides permanent or nonvolatile storage
secondary storage
such as a hard-disk drive, data and programs can be retained after the computer has been shut off. This is accomplished by writing files to and reading files from ______________________
secondary storage devices
used to save, back up, and even transport files consisting of data or programs from one location or computer to another
secondary storage devices
Each track is divided into invisible wedge-shaped sections called _________________. (on hard disks)
sectors
Matters of ________________ prompt most of the questions concerning today's computer usage.
security
involves protecting individuals and organizations from theft and danger. -specifically focuses on protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
security
often a computer or specialized communication device. They originate (send) as well as accept (receive) messages in the form of data, information, and/or instructions.
sending and receiving devices
typically support color, are more expensive, and are used (shared) by a group of users, typically print over 50 pages a minute
shared laser printers
each device is connected directly to a central network switch. -Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. -is the most widely used network topology today. It is applied to a broad range of applications from small networks in the home to very large networks in major corporations.
star network
-recent mass storage development is ______________. _________ is an architecture to link remote computer storage devices, such as enterprise storage systems, to computers such that the devices are as available as locally attached drives. In a __________ system, the user's computer provides the file system for storing data, but the ____________ provides the disk space for data. The key to a __________ is a high-speed network, connecting individual computers to mass storage devices. Special file systems prevent simultaneous users from interfering with each other. __________ provide the ability to house data in remote locations and still allow efficient and secure access.
storage area networks (SAN systems)
hardware that reads data and programs from storage media. Most also write to storage media
storage devices
central node that coordinates the flow of data by sending messages directly between sender and receiver nodes. A hub previously filled this purpose by sending a received message to all connected nodes, rather than just the intended node.
switch
____________ can also display e-books. They are larger, heavier, and more expensive than e-book readers. They are also much more flexible, with displaying e-books being only one of their any number of applications. Unlike dedicated e-book readers, these _____________ use LCD displays that provide crisp, colorful images; however, they are difficult to read in bright light due to their reflective nature. Two well-known traditional ____________ are Apple's iPad and Samsung's Galaxy Tab
tablets
What is the primary difference between a PAN, LAN, MAN, and WAN?
the geographic range
What are the signals put in by the keyboard sent to and processed by?
the system unit
Like a mouse, a ______________ is used to control the mouse pointer and to make selections. Unlike a mouse, however, a ____________ operates by moving or tapping your finger on the surface of a pad. These devices are widely used instead of a mouse with laptops and some types of mobile devices
touch pad
The speed with which modems transmit data varies. This speed, called ________________, is typically measured in millions of bits (megabits) per second (Mbps). The higher the speed, the faster you can send and receive information. For example, to download a complete full-length motion picture (700 MB) on a 1.5-Mbps modem would take about 1 hour. Using a 10.0-Mbps modem would take about 9 minutes.
transfer rate
these keyboards are used primarily with mobile devices and tablets. Unlike other keyboards, ___________ keyboards do not have a physical keyboard. Rather, the keys are typically displayed on a screen and selected by touching their image on the screen.
visual keyboards
use a microphone, a sound card, and special software. These systems allow users to operate computers and other devices as well as to create documents using voice commands. As discussed in Chapter 4, most smartphones include a digital assistant that uses voice recognition to accept voice commands to control operations. Apple phones come with Siri, Windows phones come with Cortana, and Google phones come with Google Now
voice recognition systems
A wireless local area network is typically referred to as a __________________.
wireless LAN (WLAN)
All communications pass through the network's centrally located _____________________. This interprets incoming radio frequencies and routes communications to the appropriate devices
wireless access point or base station.
The single most dramatic change in connectivity and communications in the past decade has been the widespread use of mobile devices like smartphones and tablets with ____________________________.
wireless internet connectivity
also known as a WWAN (wireless wide area network) modem. Almost all computers today have these built-in. For those that do not, wireless adapter cards are available that plug into USB or special card ports.
wireless modem
the process of saving information to the secondary storage device
writing
computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes
zombies