You are on page 1of 21

I ) Connecting and Communicating Device

1. The Internet is a worldwide collection of networks that connects millions of businesses,

government agencies, educational institutions, and individuals

2. The Internet originated as ARPANET in September 1969 and had two main goals:
- Allow scientists at different physical locations to share information and work together
- Function even if part of the network were disabled or destroyed by a disaster
3. Connecting to the Internet :
• With wired connections, a computer or device physically attaches via a cable or wire to a
communications device
• Computers without a communications device can use a wireless modem or other
communications device that enables wireless connectivity
• Wired: Cable Internet Service, DSL (digital subcriber line), Fiber to the Premises (FTTP)
• Wireless: Wi-fi(wireless fidelity), Mobile broadband, fixed wireless, Satellite Internet
Service
4. A hot spot is a wireless network that provides Internet connections to mobile computers and
devices
5. An Internet service provider (ISP) is a business that provides individuals and organizations
access to the Internet free or for a fee
6. Bandwidth represents the amount of data that travels over a network
– Megabyte (MB)
– Gigabyte (GB)
7. An IP address is a sequence of numbers that uniquely identifies each computer or device
connected to the Internet
8. A domain name is a text-based name that corresponds to the IP address
9. A DNS server translates the domain name into its associated IP address
10. The World Wide Web (WWW), or web, consists of a worldwide collection of electronic
documents (webpages)
11. A website is a collection of related webpages and associated items
12. A web server is a computer that delivers requested webpages to your computer
13. Web 2.0 refers to websites that provide a means for users to share personal information,
allow users to modify website content, and provide applications through a browser
14. A browser is an application that enables users with an Internet connection to access and view
webpages on a computer or mobile device
15. A home page is the first page that a website displays
16. Current browsers typically support tabbed browsing
17. A browser is an application that enables users with an Internet connection to access and view
webpages on a computer or mobile device
18. A home page is the first page that a website displays
19. Current browsers typically support tabbed browsing
20. A webpage has a unique address, called a web address or URL
21. A web app is an application stored on a web server that you access through a browser
22. A web search engine is software that finds websites, webpages, images, videos, news, maps,
and other information related to a specific topic
23. A subject directory classifies webpages in an organized set of categories, such as sports or
shopping, and related subcategories
24. Web publishing is the creation and maintenance of websites
25. Multimedia refers to any application that combines text with media : graphics, animation,
audio, video, virtual reality
26. A graphic is a visual representation of nontext information
27. Graphic formats include BMP, GIF, JPEG, PNG, and TIFF
28. An infographic is a visual representation of data and information, designed to communicate
quickly, simplify complex concepts, or present patterns or trends
29. Animation is the appearance of motion created by displaying a series of still images in
sequence
30. Virtual reality (VR) is the use of computers to simulate a real or imagined environment that
appears as a three-dimensional space
31. Email is the transmission of messages and files via a computer network
32. An email program allows you to create, send, receive, forward, store, print, and delete email
messages
33. An email list is a group of email addresses used for mass distribution of a message
34. Instant messaging services notify you when one or more of your established contacts are
online and then allows you to exchange messages or files or join a private chat room with them
35. A chat is a real-time typed conversation that takes place on a computer or mobile device with
many other online users
36. A chat room is a website or application that permits users to chat with others who are online
at the same time
37. An online discussion is an online area in which users have written discussions about a
particular subject
38. VoIP (Voice over IP) enables users to speak to other users via their Internet connection

II) Programs and Apps

1. A program, or software, consists of a series of related instructions, organized for a

common purpose, that tells the computer what tasks to perform and how to perform them

2. An application, or app, sometimes called application software, consists of programs

designed to make users more productive and/or assist them with personal tasks

3. An operating system is a set of programs that coordinates all the activities among

computer or mobile device hardware

– Tools and utilities

– System software

4. Software is available in a variety of forms: Retail, Custom, web app, mobile app, mobile

web app, shareware, freeware, open source, public domain

5. Productivity applications can assist you in becoming more effective and efficient while

performing daily activities at work, school, and home

6. Word processing software allows users to create and manipulate documents

7. A major advantage of using word processing software is that it enables users to change

their written words easily


8. Presentation software allows users to create visual aids for presentations to communicate

ideas, messages, and other information to a group

9. Spreadsheet software allows users to organize data in columns and rows and perform

calculations on the data

10. A database is a collection of data organized in a manner that allows access, retrieval, and

use of that data

– Database software allows users to create, access, and manage a database

11. Note taking software is an application that enables users to enter typed text, handwritten

comments, drawings, sketches, photos, and links anywhere on a page

12. Calendar and contact management software is an application that helps you organize your

calendar, keep track of contacts, and share this information with other users

13. A software suite is a collection of individual related applications available together as a

unit

14. Project management software is an application that allows a user to plan, schedule, track,

and analyze the events, resources, and costs of a project

15. Accounting software is an application that helps businesses of all sizes record and report

their financial transactions

16. Personal finance software is a simplified accounting application that helps home users

and small/home office users balance their checkbooks, pay bills, track personal income

and expenses, verify account balances, transfer funds, track investments, and evaluate

financial plans
17. Legal software is an application that assists in the preparation of legal documents and

provides legal information to individuals, families, and small businesses

18. Tax preparation software is an application that can guide individuals, families, or small

businesses through the process of filing federal and state taxes

19. Document management software is an application that provides a means for sharing,

distributing, and searching through documents by converting them into a format that can

be viewed by any user

20. A large organization, commonly referred to as an enterprise, requires special computing

solutions because of its size and geographic distribution

21. Multimedia authoring software allows users to combine text, graphics, audio, video, and

animation in an interactive application

22. Website authoring software helps users of all skill levels create webpages that include

graphics, video, audio, animation, and special effects with interactive content

23. A media player is a program that allows you to view images and animations, listen to

audio, and watch video files on your computer or mobile device

24. Disc burning software writes text, graphics, audio, and video files on a recordable or

rewritable disc

25. A personal firewall is a security tool that detects and protects a personal computer and its

data from unauthorized intrusions

26. An antivirus program protects a computer against viruses by identifying and removing

any computer viruses found in memory, on storage media, or on incoming files


27. Spyware is a type of program placed on a computer or mobile device without the user’s

knowledge that secretly collects information about the user and then communicates the

information it collects to some outside source while the user is online

28. Adware is a type of program that displays an online advertisement in a banner or pop-up

or pop-under window on webpages, email messages, or other Internet services

29. A spyware remover is a type of program that detects and deletes spyware and similar

programs

30. An adware remover is a program that detects and deletes adware

31. A file manager is a tool that performs functions related to file management

32. A search tool is a program, usually included with an operating system, that attempts to

locate a file, contact, calendar event, app, or any other item stored on your computer or

mobile device based on criteria you specify

33. An image viewer is a tool that allows users to display, copy, and print the contents of a

graphics file, such as a photo

34. An uninstaller is a tool that removes a program, as well as any associated entries in the

system files

35. A disk cleanup tool searches for and removes unnecessary files

36. A disk defragmenter is a tool that reorganizes the files and unused space on a computer’s

hard disk so that the operating system accesses data more quickly and programs run faster

37. A screen saver is a tool that causes a display device’s screen to show a moving image or

blank screen if no keyboard or mouse activity occurs for a specified time


38. A file compression tool shrinks the size of a file(s)

39. A PC maintenance tool is a program that identifies and fixes operating system problems,

detects and repairs drive problems, and includes the capability of improving a computer’s

performance

40. A backup tool allows users to copy, or back up, selected files or the contents of an entire

storage medium to another storage location

41. A restore tool reverses the process and returns backed up files to their original form

III) Introduction to computer and mobile devices

1. A mobile computer is a portable personal computer, designed so that a user easily can carry it

from place to place

2. A personal computer (PC) is a mobile computer or desktop that can perform all of its input,

processing, output, and storage activities by itself and is intended to be used by one person at a

time

3. A handheld computer is a computer small enough to fit in one hand

4. A desktop, or desktop computer, is a personal computer designed to be in a stationary location,

where all of its components fit on or under a desk or table

5. A server is a computer dedicated to providing one or more services to other computers or

devices on a network
– Rack server
– Blade server
– Tower server
6. Virtualization is the practice of sharing or pooling computing resources, such as servers and
storage devices
– Server virtualization uses software to enable a physical server to emulate the
hardware and computing capabilities of one or more servers, known as virtual
servers
7. A server farm is a network of several servers together in a single location
8. A mainframe is a large, expensive, powerful server that can handle hundreds or thousands of
connected users simultaneously
9. A terminal is a computer, usually with limited processing power, that enables users to send
data to and/or receive information from a server, or host computer
10. A thin client is a terminal that looks like a desktop but has limited capabilities and
components
11. Most retail stores use a POS terminal to record purchases, process credit or debit cards, and
update inventory
12. An ATM (automated teller machine) is a self-service banking terminal that connects to a host
computer through a network
13. A self-service kiosk is a freestanding terminal that usually has a touch screen for user
interaction
14. A supercomputer is the fastest, most powerful computer – and the most expensive
- Capable of processing many trillions of instructions in a single second
15. Cloud computing refers to an environment that provides resources and services accessed via
the Internet
16. A smartphone is an Internet-capable phone that usually also includes a calendar, an address
book, a calculator, a notepad, games, browser, and numerous other apps
17. Many smartphones have touch screens. Instead of or in addition to an on-screen keyboard,
some have a built-in mini keyboard on the front of the phone or a keyboard that slides in and out
from behind the phone
18. A digital camera is a mobile device that allows users to take photos and store the
photographed images digitally
– Smart digital camera
– Point-and-shoot camera
– SLR camera
19. Resolution is the number of horizontal and vertical pixels in a display
20. A portable media player is a mobile device on which you can store, organize, and play or
view digital media
21. An e-book reader (short for electronic book reader), or e-reader, is a mobile device that is
used primarily for reading e-books and other digital publications
22. A wearable device or wearable is a small, mobile computing device designed to be worn by a
consumer
23. A game console is a mobile computing device designed for single-player or multiplayer
video games
24. A handheld game device is a small mobile device that contains a screen, speakers, controls,
and game console all in one unit
25. Game controllers include gamepads, joysticks and wheels, dance pads, and a variety of
motion-sensing controllers
26. An embedded computer is a special-purpose computer that functions as a component in a
larger product
27. A port is the point at which a peripheral device attaches to or communicates with a computer
or mobile device so that the peripheral device can send data to or receive information from the
computer or mobile device
28. A surge protector, also called a surge suppressor, uses electrical components to provide a
stable current flow and minimize the chances of an overvoltage reaching the computer and other
electronic equipment

IV) Digital security, Ethics and privacy


1. A digital security risk is any event or action that could cause a loss of or damage to a
computer or mobile device hardware, software, data, information, or processing
capability

2. Any illegal act involving the use of a computer or related devices generally is referred to
as a computer crime

3. A cybercrime is an online or Internet-based illegal act


4. Malware, short for malicious software, consists of programs that act without a user’s
knowledge and deliberately alter the operations of computers and mobile devices

5. A botnet is a group of compromised computers or mobile devices connected to a network


to attack other networks

6. A compromised computer or device is known as a zombie

7. A denial of service attack (DoS attack) disrupts computer access to an Internet service
such as a web or email

8. A devastating type of Dos is Distributed DoS attack (DDoS attack): a zombie army is
used to attack

9. A back door is a program or set of instructions in a program that allow users to bypass
security controls

10. Spoofing is a technique intruders use to make their network or Internet transmission
appear legitimate

11. A firewall is hardware and/or software that protects a network’s resources from intrusion

12. Organizations take several measures to help prevent unauthorized access and use:

Acceptable use policy

Disable file and printer sharing

13. Access controls define who can access a computer, device, or network; when they can
access it; and what actions they can take while accessing it

14. The computer, device, or network should maintain an audit trail that records in a file
both successful and unsuccessful access attempts

User name

Password

15. A passphrase is a private combination of words, often containing mixed capitalization


and punctuation, associated with a user name that allows access to certain computer
resources
16. A PIN (personal identification number), sometimes called a passcode, is a numeric
password, either assigned by a company or selected by a user

17. A possessed object is any item that you must possess, or carry with you, in order to gain
access to a computer or computer facility

18. A biometric device authenticates a person’s identity by translating a personal


characteristic into a digital code that is compared with a digital code in a computer or
mobile device verifying a physical or behavioral characteristic

19. Two-step verification uses two separate methods, one after the next, to verify the identity
of a user

20. Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks

21. Many manufacturers incorporate an activation process into their programs to ensure the
software is not installed on more computers than legally licensed

22. During the product activation, which is conducted either online or by phone, users
provide the software product’s identification number to associate the software with the
computer or mobile device on which the software is installed

23. A license agreement is the right to use software

24. Information theft occurs when someone steals personal or confidential information

25. Encryption is a process of converting data that is readable by humans into encoded
characters to prevent unauthorized access

26. A digital signature is an encrypted code that a person, website, or organization attaches to
an electronic message to verify the identity of the message sender

- Often used to ensure that an impostor is not participating in an Internet transaction

27. A digital certificate is a notice that guarantees a user or a website is legitimate

28. A website that uses encryption techniques to secure its data is known as a secure site

29. Hardware theft is the act of stealing digital equipment


30. Hardware vandalism is the act of defacing or destroying digital equipment

31. A backup is a duplicate of a file, program, or media that can be used if the original is lost,
damaged, or destroyed

-To back up a file means to make a copy of it

32. Off-site backups are stored in a location separate from the computer or mobile device site

33. Technology ethics are the moral guidelines that govern the use of computers, mobile
devices, information systems, and related technologies

34. Information accuracy is a concern

- Not all information on the Internet is correct

35. Intellectual property refers to unique and original works such as ideas, inventions, art,
writings, processes, company and product names, and logos

36. Intellectual property rights are the rights to which creators are entitled to their work

37. A copyright protects any tangible form of expression

38. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of
movies, music, and other digital content

39. A code of conduct is a written guideline that helps determine whether a specification is
ethical/unethical or allowed/not allowed

40. Green computing involves reducing the electricity and environmental waste while using
computers, mobile devices, and related technologies

41. Information privacy refers to the right of individuals and companies to deny or restrict the
collection, use, and dissemination of information about them

42. A cookie is a small text file that a web server stores on your computer

43. Phishing is a scam in which a perpetrator sends an official looking email message that
attempts to obtain your personal and/or financial information
44. Spyware is a program placed on a computer or mobile device without the user’s
knowledge that secretly collects information about the user and then communicates the
information it collects to some outside source while the user is online

45. Adware is a program that displays an online advertisement in a banner or pop-up window
on webpages, email messages, or other Internet services

46. Social engineering is defined as gaining unauthorized access to or obtaining confidential


information by taking advantage of the trusting human nature of some victims and the
naivety of others

V) Computer components:
1. The case contains and protects the electronics of the computer or mobile device from damage
2. The motherboard is the main circuit board of the computer
- A computer chip contains integrated circuits
3. The processor, also called the central processing unit (CPU), interprets and carries out the
basic instructions that operate a computer
4. A multi-core processor is a single chip with two or more separate processor cores
5. Processors contain a control unit and an arithmetic logic unit (ALU)
6. The control unit is the component of the processor that directs and coordinates most of the
operations in the computer
7. The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations
8. The processor contains registers, that temporarily hold data and instructions
9. The system clock controls the timing of all computer operations
10. The leading manufacturers of personal computer processor chips are Intel and AMD
11. A processor chip generates heat that could cause the chip to malfunction or fail
Require additional cooling
– Heat sinks
– Liquid cooling technology
– Cooling pads
12. IOT: a computing environment where everyday objects, or things, are connected to the
Internet
13. Sensors connected to these objects may gather, share, transmit, and receive data about the
objects with other devices or servers online
14. Users can access data or control individual objects using web or mobile apps.
15. Analog signals are continuous and vary in strength and quality
16. Digital signals are in one of two states: on or off
17. Memory consists of electronic components that store instructions waiting to be executed by
the processor, data needed by those instructions, and the results of processing the data
18. Memory size commonly is measured in gigabytes (GB) or terabytes (TB)
19. Computers and mobile devices contain two types of memory: Volatile and Nonvolatile
memory
20. RAM chips usually reside on a memory module and are inserted into memory slots
21. Memory cache speeds the processes of the computer because it stores frequently used
instructions and data
22. Read-only memory (ROM) refers to memory chips storing permanent data and instructions
23. Flash memory can be erased electronically and rewritten
- CMOS technology uses battery power to retain information when when the power to the
computer is off
24. Access time is the amount of time it takes the processor to read from memory
25. An adapter card enhances functions of a component of a desktop or server system unit and/or
provides connections to peripherals
– Sound card and video card
26. An expansion slot is a socket on a desktop or server motherboard that can hold an adapter
card
27. With Plug and Play, the computer automatically can recognize peripheral devices as you
install them
28. A USB adapter enhances functions of a mobile computer and/or provides connections to
peripheral devices
29. A bus allows the various devices both inside and attached to the system unit to communicate
with one another
– Data bus
– Address bus
30. Word size is the number of bits the processor can interpret and execute at a given time
31. The power supply or laptop AC adapter converts the wall outlet AC power into DC power
32. Mobile computers and devices can run using either a power supply or batteries
33. Batteries typically are rechargeable lithium-ion batteries

VI) Input and Output

1. Input is any data and instructions entered into the memory of a computer

2. A keyboard is an input device that contains keys users press to enter data and instructions
into a computer or mobile device

3. An ergonomic keyboard has a design that reduces the chance of repetitive strain injuries
of wrist and hand

4. Ergonomics incorporates comfort, efficiency, and safety in the design of the workplace

5. A pointer is a small symbol on the screen whose location and shape change as a user
moves a pointing device

6. A mouse is a pointing device that fits under the palm of your hand comfortably

7. A touchpad is a small, flat, rectangular pointing device that is sensitive to pressure and
motion

8. A trackball is a stationary pointing device with a ball on its top or side

9. A touch screen is a touch-sensitive display

10. With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make
selections

11. A graphics tablet, also called a digitizer, is an electronic plastic board that detects and
converts movements of a style or digital pen into signals that are sent to the computer

12. Voice input is the process of entering input by speaking into a microphone
13. Voice recognition, also called speech recognition, is the computer or mobile device’s
capability of distinguishing spoken words

14. Video input is the process of capturing full-motion images and storing them on a
computer or mobile device’s storage medium

15. A videoconference is a meeting between two or more geographically separated people

16. A scanner is a light-sensing input device that reads printed text and graphics and then
translates the results into a form the computer can process

17. A flatbed scanner works in a manner similar to a copy machine except it creates a file of
the document in memory instead of a paper copy

18. An optical reader is a device that uses a light source to read characters, marks, and codes
and then converts them into digital data that a computer can process

19. A bar code reader, also called a bar code scanner uses laser beams to read bar codes

20. A QR code stores information in both a vertical and horizontal direction

21. RFID (radio frequency identification) uses radio signals to communicate with a tag
placed in or attached to an object

22. An RFID reader reads information on the tag via radio waves

23. MICR (magnetic ink character recognition) devices read text printed with magnetized ink

24. An MICR reader converts MICR characters into a form the computer can process

25. Banking industry uses MICR for check processing

26. A display visually conveys text, graphics, and video information

27. A monitor is a display that is packaged as a separate peripheral device

VII) Digital Storage


1. A storage medium is the physical material on which a computer keeps data, information,
programs, and applications
2. Cloud storage keeps information on servers on the Internet, and the actual media on
which the files are stored are transparent to the user

3. A storage device is the hardware that records and/or retrieves items to and from storage
media

4. Capacity is the number of bytes a storage medium can hold

5. Access time measures:

-The amount of time it takes a storage device to locate an item on a storage medium

-The time required to deliver an item from memory to the processor

6. A hard disk, also called a hard disk drive (HDD) contains one or more inflexible, circular
platters that use magnetic particles to store data, instructions, and information

7. The storage capacity of hard disks varies and is determined by:

-The number of platters the hard disk contains

-Whether the disk uses longitudinal or perpendicular recording

-Density

8. Formatting is the process of dividing the disk into tracks and sectors

9. A head crash occurs when a read/write head touches the surface of a platter

10. Always keep a backup of your hard disk

11. An SSD (solid state drive) is a flash memory storage device that contains its own
processor to manage its storage

12. An SSD (solid state drive) has several advantages over traditional (magnetic) hard disks

13. An external hard disk is a separate freestanding storage device that connects with a cable
to a USB port or other port on a computer or mobile device

14. RAID (redundant array of independent disks) is a group of two or more integrated hard
disks or SSDs
15. A memory card is a removable flash memory storage device that you insert and remove
from a slot in a computer, mobile device, or card reader/writer

16. USB flash drives plug into a USB port on a computer or mobile device

17. Cloud storage is an Internet service that provides storage to computer or mobile device
users

18. An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer
that is written and read by a laser

19. Optical discs commonly store items in a single track that spirals from the center of the
disc to the edge of the disc

20. Track is divided into evenly sized sectors

21. A DVD-ROM is a high-capacity optical disc on which users can read but not write on or
erase

22. A DVD-R or DVD+R are competing DVD-recordable WORM formats, on which users
can write once but not erase

23. DVD-RW, DVD+RW, and DVD+RAM are competing DVD-rewritable formats that
users can write on multiple times

24. Network attached storage (NAS) is a server that is placed on a network with the sole
purpose of providing storage to users, computers, and devices attached to the network

25. A storage area network (SAN) is a high-speed network with the sole purpose of providing
storage to other attached servers

26. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data
and information

27. A tape drive reads and writes data and information on a magnetic tape

28. A magnetic stripe card has a magnetic stripe that contains information

29. A smart card stores data on an integrated circuit embedded in the card
30. The RFID tag consists of an antenna and a memory chip that contains the information to
be transmitted via radio waves

31. An RFID reader reads the radio signal and transfers the information to a computer or
computing device

32. An NFC-enabled device contains an NFC chip

33. An NFC tag contains a chip and an antenna that contains information to be transmitted

34. Most NFC tags are self-adhesive


IV)

You might also like