Intro to Computers Final Review

Ace your homework & exams now with Quizwiz!

Lion

A Mac OS release name.

Linux

A UNIX like computer open source operating system.

USB

A common connectivity specification.

VPN

A computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by dedicated physical wires.

File Manager

A computer program that provides a user interface to work with file systems.

Instant Messenging (IM)

A form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared clients.

Utility Software

A kind of system software designed to help analyze, configure, optimize and maintain the computer.

Latency

A measure of time delay experienced in a system.

Multitasking

A method where multiple tasks, called processes, share CPU resources.

Mesh

A network that has a web like structure with potentially each node has a point to point link with every other node.

Peer-to-Peer

A network where every computer can communicate with all the other machines on the network, but in general each one stores its own files and runs its own applications.

Internet Addiction

A possible medical condition involving overuse of technologies that provide Internet access.

Virus

A program that has infected some executable software and, when run, causes the virus to spread to other executable files.

Attenuation

A signal gets weaker the further it travels, because some of its energy is absorbed by the transmission medium.

SAN

A storage network set up to exclusively back up data from different computers on a central backup server.

Intranet

A typically private network that is meant to allow local communication only.

Cache Memory

A very fast type of memory that is found within the processor.

ECPA

Act that makes it unlawful under certain conditions for an individual to reveal the information of electronic communication and contains a few exceptions.

Keylogging

Action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

Full Backup

All system data is copied to a backup media, most often once a day.

Computer

An electronic device that is able to follow instructions, written in programs, to manipulate data.

Research

Any gathering of data or information.

Adware

Any software package which automatically plays, displays, or downloads advertisements to a computer.

Time Management Matrix

Categorizes activities into quadrants based upon importance and urgency.

Workstation

Characterized by high-performance processors and graphics displays, with large local disk storage, networking capability, and running under a multitasking operating system.

Digital Divide

Chasm, or barrier, between those that do not have access to information and communication technologies and those that do.

Network

Composed of two or more computers that communicate over a wired or wireless medium to share data and other resources, exchange files, or to provide for communications.

Application Software

Computer software designed to help the user to perform specific tasks, such as create a presentation.

Embedded Systems

Computer systems with specific control functionality within a larger system, often with real-time constraints.

Tethering

Connecting a computer to a cell phone signal for the purpose of accessing the Internet.

Internetwork

Connection of multiple computer networks via a common routing technology using routers.

Cookie

Data stored on a user's computer that assists in automated access to web sites or web features, or other state information required in complex websites.

Communication Protocols

Defines the formats and rules for exchanging information via a network.

Internet Privacy

Desire or mandate of personal privacy concerning transactions or transmission of data via the Internet.

Firewall

Device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.

Peripherals

Devices connected to a computer that are dependent upon the computer for operation.

E-Waste

Discarded electronics that contains hazardous materials.

Last Mile

Distance between communities and residences and the internet service provider's communications network.

Virtualization

Emulating another platform on a running system.

Assistive Technology

Enables persons with disabilities to perform tasks that they previously were unable to perform.

Metasearch

Enables users to enter a search query once and have it run against multiple search engines simultaneously, creating a list of aggregated search results.

Evernote

Example of Internet Research Software.

Symbian

Example of a mobile operating system.

Sound Card

Facilitates the input and output of audio signals to and from a computer under the control of computer programs.

Jaquard Loom

First machine to use punched cards to control a sequence of operations.

GUI

Graphical user interface.

GPU

Handles all of the mathematical and geometric calculations for image rendering.

HTML

Hypertext Markup Language.

HTTP

Hypertext transfer protocol.

Repetitive Stress Injury

Injury to the soft tissues (tendons) in the hand and/or wrist.

Spyware

Is a type of malicious software that can be installed on computers, and which collects small pieces of information about users without their knowledge.

Open Source

Is licensed, free software that comes with the source code that users may modify and redistribute.

Folder

Known as directory.

Nettop

Low-cost, lean-function, desktop computers.

System Software

Manages and integrates a computer's capabilities, but typically does not directly apply them to the direct benefit of the user.

Application Suite

Multiple applications bundled together. They usually have related functions, features and user interfaces, and may be able to interact with each other.

Client-server Network

One or more servers will perform critical functions on behalf of the other machines (the clients) on the network.

Web Dictionary

Organizes subjects in a hierarchical fashion that lets users investigate the breadth of a specific topic and drill down to find relevant links and content.

ARPENET

Original research network that lay the foundation for today's Internet.

Upward Compatible

Programs written for the older machines can be executed on the new machine.

TCP

Provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer.

Software Piracy

Refers to several practices which involve the unauthorized copying of computer software.

Protocol

Rules for communicating.

HTTPS

Secure HTTP.

Boolean Operator

Serves to define relationships between words or groups of words. Include AND, OR, & NOT.

Web Browser

Software application for retrieving, presenting, and traversing information resources on the World Wide Web.

Operating System

Software that manages computer hardware resources, runs other programs, and provides common services for the user and application software.

Ergonomics

Study of how people physically interact with their work and involves fitting the job, the equipment and the work environment to the worker.

Parallel Processing

The ability to carry out multiple tasks simultaneously.

Platform

The combination of hardware and operating system.

Electromechanics

The combination of the sciences of electromagnetism, of electrical engineering and mechanics.

Display Resolution

The number of distinct pixels in each dimension that can be displayed.

Clock Rate

The number of pulses per second.

Moore's Law

The number of transistors that can be placed inexpensively on an integrated circuit doubles approximately every two years.

Computer Ethics

The practice of making a principled choice between right and wrong as applied to computer technology and its use.

Motherboard

The primary circuit board within a personal computer.

Cloud Computing

The use of and access to multiple server-based computational resources via a network.

Plagiarism

To steal and pass off the ideas or words of another as one's own or tow use another's production without crediting the source.

Digital Footprint

Trail left due to interactions in the digital environment.

VPN (7)

Type of network access that requires remote users of the network to be authenticated, and often secure data with encryption technologies to prevent disclosure of private information to unauthorized parties.

End User License Agreement

Typically state the software manufacturer is not responsible should the installation of the software cause issues with the user's computer or data.

URL

Uniform resource locator.

Mobile Computing

Use of computing technology while on the go.

Transistor

Used to amplify a signal or as an on/off switch. Is found is most modern electronic devices.

Hierarchical File System

Uses directories to organize files into a tree structure.

Conditional Branching

Where a sequence of programming code is executed at a branching point only when certain conditions are either true or false.

CSMA/CD

Where a transmitting data station detects another signal while transmitting a frame, stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.


Related study sets

PrepU Chapter 36: Immunodeficiency

View Set

Life, Health, and Variable Annuities

View Set

Chapter 7: Founding a Nation, 1783—1791

View Set

Superlist 50 - Descriptions 821-840

View Set

ENG#1 Email English formal and informal phrases

View Set

Professional Communication Chapter 5-Therapeutic Relationships (PrepU)

View Set