CSCI 1000 chapter 1-5 exam
shareware
Small developers often use the _____ model as a low-cost distribution method
VOIP
sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection
mobile
technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.
embedded
term used to describe an object, software, or hardware that is independent and does not need an external program or device to run it
interpreter
translates source code into machine code one line at a time
RAM
type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes.
device driver
A _____ is software that helps peripheral devices communicate with a computer
disk cleanup
A _____ utility removes unused files like temporary Internet files from your hard drive so the computer doesn't search through unneeded files
power supply
A device that provides power to a computer
boolean operator
A word or symbol that identifies the relationship between keywords, such as AND, OR, and NOT
link
A(n) _____ is a connection to a different area on the Web page, another Web page on the same site, or even a Web page on a different site
embedded computer
A(n) ______________ is a tiny special-purpose computer included as a component in a larger product
W3C
Agency that sets standards and guidelines for the Web
peripheral
An add-on device that extends a computer's functionality; for example, by adding printing, scanning, or video capturing capabilities
web apps
An advantage to _____ is that you always have access to the most up-to-date version of the software without paying for an upgrade
telecommuting
An arrangement that employees who need flexible work schedules use to work from home is called ______
web crawler
An automated program that uses hyperlinks to jump between Web pages and collect data
EULA
Another term for a single-user license
wireless network
Any type of computer network that is not connected by cables of any kind
asynchronous
Because a blogger doesn't need to be online at the same time that readers are, a blog is considered _____ communication.
computer aided
Companies streamline production and perform tasks too dangerous or monotonous for humans using _____ manufacturing
open source
Copyrighted software whose source code is available to the public is known as _____ software
C2C
Craigslist is a popular _____ Web site
tim berners lee
Created the World Wide Web in 1989
search engine
Creates a query based on your search criteria and stores the data it collects in a database
motion
Creating the appearance of _____ by displaying a sequence of still images is called animation.
tablet
Device often used for online applications such as Web browsing or e-mail, but not great for creating complex spreadsheets
scanner
Device that converts a printed document into a bitmap file and assigns colors to each cell
SaaS
Google Drive is an example of _____ , which runs software directly from the Internet
binary code
Groupings of 1's and 0's that makes information that a computer can understand
synchronous
In ______________ online education, the instructor holds a class that students attend virtually and at the same time.
timeline
Method used in editing video, using separate tracks for video and sound
B2B
Most e-commerce actually occurs between businesses and is called the ____ model
cookies
Online shopping sites track items that you select using _____
douglas englebart
Patented the first mouse in 1970
hardware
Physical elements of a computing systems (printer, circuit boards, wires, keyboard, etc)
vertical market
Productivity software that is customized for specific industries
spyware
Programs that can track and steal your personal information and change the settings on your browser without your permission are called _____
machine language
Programs written in binary code
ROM
Read Only Memory-Data stored in ROM can only be modified slowly, with difficulty, or not at all, so it is mainly used to store firmware
digital certificate
Secure Web sites often use a _____, which verifies the identity of a person or an organization
software
Set of instructions that tells the hardware what to do. It is what guides the hardware and tells it how to accomplish each task.
CAD
Software used by architects, scientists, designers, and engineers to create technical drawings
OS
Software used to control the computer and its peripheral equipment
hard drive
Storage device that stores digitally encoded data on rapidly rotating rigid disks with magnetic surfaces. The device is either permanently installed within the computer case or can be portable
DRM
Technologies that include encryption to make digital content unreadable without a valid encryption key
streaming video
Technology that transfers only a segment of a video file at a time from the Web to your computer
DNS server
The Internet's system for converting alphabetic names into numeric IP addresses
enterprise computing
The computer network a business uses to let employees communicate with customers, vendors, and other employees is referred as _____
ARPANET
The first computer network, consisting of four computers, created by the U.S. Department of Defense
digital divide
The gap between people who can access digital information and those who cannot is called the _____
copyright
The legal right to copy, distribute, modify, and sell an original work
encryption
The process of temporarily scrambling data so it is not readable is called ____________
ergonomics
The study of safe and efficient working environments
keyword stuffing
The unethical practice of manipulating meta keywords to push a Web site to the top of a search result list
productivity
Type of application software that automates common or repetitive tasks
lossy
Type of compression used in JPEG files where some of the original file data is discarded
vector
Type of graphic image based on simple objects that can be grouped and layered
bitmap
Type of graphic image where colors are assigned to individual screen pixels
shrink wrap liscence
Type of license agreement for packaged software, which is activated when you open the package
utility
Type of program that includes device drivers
system
Type of software that is categorized as operating system (OS) software and utility programs
aggregate
Web sites such as NexTag and PriceGrabber are called _____ sites because they collect and organize data from other Web sites and transmit it to consumers
e-commerce
When you make purchases over the Internet, you are engaging in _____
streaming video
When you play _____, the server transmits a small segment of a file that starts to play on your computer while the server is sending the next segment
m-commerce
When you use wireless mobile devices to make retail purchases, you are engaging in ____________.
virus protection
You should set your _____ software to scan any incoming messages and programs to protect your computer
ASPs
_____ provide software-based services over the Internet
ip address
a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication
digital literacy
ability to access, process, understand and create information or media content in the digital environment
service pack
collection of major system updates
asynchronous
communication in which messages are sent and received at different times
video card
connects to the motherboard of a computer system and generates output images to display
printer
device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper
output device
device that projects images, gives sound, and basically gives out the info from the computer so the user can obtain it (ex: monitor, printer, projector, speakers)
input device
device used to insert data into a computer or other device (ex: keyboard, mouse, microphone, scanner, voice recognition)
amazon
e-commerce
high level language
easier for humans to understand
monitor
electronic visual computer display that includes a screen, circuitry and the case in which that circuitry is enclosed
VPN
extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network
cable modem
hardware device that allows your computer to communicate with an Internet service provider over a landline connection
social media
interactive computer-mediated technologies that facilitate the creation and sharing of information, ideas, career interests and other forms of expression via virtual communities and networks
malware
malicious software
speaker
output hardware device that connects to a computer to generate sound
firmware
permanent software programmed into a read-only memory
desktop
personal computer that fits on or under a desk. It has a monitor or another display, keyboard, mouse, and either a horizontal or vertical (tower) form factor
memory
physical device capable of storing information temporarily
CPU
piece of hardware that carries out the instructions of a computer program. It performs the basic arithmetical, logical, and input/output operations of a computer system
hard drive
primary computer storage device, which spins, reads and writes one or more fixed disk platters
motherboard
printed circuit board containing the principal components of a computer or other device, with connectors into which other circuit boards can be slotted
digital forensics
process of uncovering and interpreting electronic data. The goal of the process is to preserve any evidence in its most original form while performing a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events
storage
process through which digital data is saved within a data storage device by means of computing technology
utility software
provides additional functionality to the operating system
network
set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet
keyboard
set of typewriter-like keys that enables you to enter data into a computer or other devices
mouse
small handheld input device that controls a computer screen's cursor or pointer in conjunction with the way it is moved on a flat surface