Professional Documents
Culture Documents
2. The Internet originated as ARPANET in September 1969 and had two main goals:
- Allow scientists at different physical locations to share information and work together
- Function even if part of the network were disabled or destroyed by a disaster
3. Connecting to the Internet :
• With wired connections, a computer or device physically attaches via a cable or wire to a
communications device
• Computers without a communications device can use a wireless modem or other
communications device that enables wireless connectivity
• Wired: Cable Internet Service, DSL (digital subcriber line), Fiber to the Premises (FTTP)
• Wireless: Wi-fi(wireless fidelity), Mobile broadband, fixed wireless, Satellite Internet
Service
4. A hot spot is a wireless network that provides Internet connections to mobile computers and
devices
5. An Internet service provider (ISP) is a business that provides individuals and organizations
access to the Internet free or for a fee
6. Bandwidth represents the amount of data that travels over a network
– Megabyte (MB)
– Gigabyte (GB)
7. An IP address is a sequence of numbers that uniquely identifies each computer or device
connected to the Internet
8. A domain name is a text-based name that corresponds to the IP address
9. A DNS server translates the domain name into its associated IP address
10. The World Wide Web (WWW), or web, consists of a worldwide collection of electronic
documents (webpages)
11. A website is a collection of related webpages and associated items
12. A web server is a computer that delivers requested webpages to your computer
13. Web 2.0 refers to websites that provide a means for users to share personal information,
allow users to modify website content, and provide applications through a browser
14. A browser is an application that enables users with an Internet connection to access and view
webpages on a computer or mobile device
15. A home page is the first page that a website displays
16. Current browsers typically support tabbed browsing
17. A browser is an application that enables users with an Internet connection to access and view
webpages on a computer or mobile device
18. A home page is the first page that a website displays
19. Current browsers typically support tabbed browsing
20. A webpage has a unique address, called a web address or URL
21. A web app is an application stored on a web server that you access through a browser
22. A web search engine is software that finds websites, webpages, images, videos, news, maps,
and other information related to a specific topic
23. A subject directory classifies webpages in an organized set of categories, such as sports or
shopping, and related subcategories
24. Web publishing is the creation and maintenance of websites
25. Multimedia refers to any application that combines text with media : graphics, animation,
audio, video, virtual reality
26. A graphic is a visual representation of nontext information
27. Graphic formats include BMP, GIF, JPEG, PNG, and TIFF
28. An infographic is a visual representation of data and information, designed to communicate
quickly, simplify complex concepts, or present patterns or trends
29. Animation is the appearance of motion created by displaying a series of still images in
sequence
30. Virtual reality (VR) is the use of computers to simulate a real or imagined environment that
appears as a three-dimensional space
31. Email is the transmission of messages and files via a computer network
32. An email program allows you to create, send, receive, forward, store, print, and delete email
messages
33. An email list is a group of email addresses used for mass distribution of a message
34. Instant messaging services notify you when one or more of your established contacts are
online and then allows you to exchange messages or files or join a private chat room with them
35. A chat is a real-time typed conversation that takes place on a computer or mobile device with
many other online users
36. A chat room is a website or application that permits users to chat with others who are online
at the same time
37. An online discussion is an online area in which users have written discussions about a
particular subject
38. VoIP (Voice over IP) enables users to speak to other users via their Internet connection
common purpose, that tells the computer what tasks to perform and how to perform them
designed to make users more productive and/or assist them with personal tasks
3. An operating system is a set of programs that coordinates all the activities among
– System software
4. Software is available in a variety of forms: Retail, Custom, web app, mobile app, mobile
5. Productivity applications can assist you in becoming more effective and efficient while
7. A major advantage of using word processing software is that it enables users to change
9. Spreadsheet software allows users to organize data in columns and rows and perform
10. A database is a collection of data organized in a manner that allows access, retrieval, and
11. Note taking software is an application that enables users to enter typed text, handwritten
12. Calendar and contact management software is an application that helps you organize your
calendar, keep track of contacts, and share this information with other users
unit
14. Project management software is an application that allows a user to plan, schedule, track,
15. Accounting software is an application that helps businesses of all sizes record and report
16. Personal finance software is a simplified accounting application that helps home users
and small/home office users balance their checkbooks, pay bills, track personal income
and expenses, verify account balances, transfer funds, track investments, and evaluate
financial plans
17. Legal software is an application that assists in the preparation of legal documents and
18. Tax preparation software is an application that can guide individuals, families, or small
19. Document management software is an application that provides a means for sharing,
distributing, and searching through documents by converting them into a format that can
21. Multimedia authoring software allows users to combine text, graphics, audio, video, and
22. Website authoring software helps users of all skill levels create webpages that include
graphics, video, audio, animation, and special effects with interactive content
23. A media player is a program that allows you to view images and animations, listen to
24. Disc burning software writes text, graphics, audio, and video files on a recordable or
rewritable disc
25. A personal firewall is a security tool that detects and protects a personal computer and its
26. An antivirus program protects a computer against viruses by identifying and removing
knowledge that secretly collects information about the user and then communicates the
28. Adware is a type of program that displays an online advertisement in a banner or pop-up
29. A spyware remover is a type of program that detects and deletes spyware and similar
programs
31. A file manager is a tool that performs functions related to file management
32. A search tool is a program, usually included with an operating system, that attempts to
locate a file, contact, calendar event, app, or any other item stored on your computer or
33. An image viewer is a tool that allows users to display, copy, and print the contents of a
34. An uninstaller is a tool that removes a program, as well as any associated entries in the
system files
35. A disk cleanup tool searches for and removes unnecessary files
36. A disk defragmenter is a tool that reorganizes the files and unused space on a computer’s
hard disk so that the operating system accesses data more quickly and programs run faster
37. A screen saver is a tool that causes a display device’s screen to show a moving image or
39. A PC maintenance tool is a program that identifies and fixes operating system problems,
detects and repairs drive problems, and includes the capability of improving a computer’s
performance
40. A backup tool allows users to copy, or back up, selected files or the contents of an entire
41. A restore tool reverses the process and returns backed up files to their original form
1. A mobile computer is a portable personal computer, designed so that a user easily can carry it
2. A personal computer (PC) is a mobile computer or desktop that can perform all of its input,
processing, output, and storage activities by itself and is intended to be used by one person at a
time
devices on a network
– Rack server
– Blade server
– Tower server
6. Virtualization is the practice of sharing or pooling computing resources, such as servers and
storage devices
– Server virtualization uses software to enable a physical server to emulate the
hardware and computing capabilities of one or more servers, known as virtual
servers
7. A server farm is a network of several servers together in a single location
8. A mainframe is a large, expensive, powerful server that can handle hundreds or thousands of
connected users simultaneously
9. A terminal is a computer, usually with limited processing power, that enables users to send
data to and/or receive information from a server, or host computer
10. A thin client is a terminal that looks like a desktop but has limited capabilities and
components
11. Most retail stores use a POS terminal to record purchases, process credit or debit cards, and
update inventory
12. An ATM (automated teller machine) is a self-service banking terminal that connects to a host
computer through a network
13. A self-service kiosk is a freestanding terminal that usually has a touch screen for user
interaction
14. A supercomputer is the fastest, most powerful computer – and the most expensive
- Capable of processing many trillions of instructions in a single second
15. Cloud computing refers to an environment that provides resources and services accessed via
the Internet
16. A smartphone is an Internet-capable phone that usually also includes a calendar, an address
book, a calculator, a notepad, games, browser, and numerous other apps
17. Many smartphones have touch screens. Instead of or in addition to an on-screen keyboard,
some have a built-in mini keyboard on the front of the phone or a keyboard that slides in and out
from behind the phone
18. A digital camera is a mobile device that allows users to take photos and store the
photographed images digitally
– Smart digital camera
– Point-and-shoot camera
– SLR camera
19. Resolution is the number of horizontal and vertical pixels in a display
20. A portable media player is a mobile device on which you can store, organize, and play or
view digital media
21. An e-book reader (short for electronic book reader), or e-reader, is a mobile device that is
used primarily for reading e-books and other digital publications
22. A wearable device or wearable is a small, mobile computing device designed to be worn by a
consumer
23. A game console is a mobile computing device designed for single-player or multiplayer
video games
24. A handheld game device is a small mobile device that contains a screen, speakers, controls,
and game console all in one unit
25. Game controllers include gamepads, joysticks and wheels, dance pads, and a variety of
motion-sensing controllers
26. An embedded computer is a special-purpose computer that functions as a component in a
larger product
27. A port is the point at which a peripheral device attaches to or communicates with a computer
or mobile device so that the peripheral device can send data to or receive information from the
computer or mobile device
28. A surge protector, also called a surge suppressor, uses electrical components to provide a
stable current flow and minimize the chances of an overvoltage reaching the computer and other
electronic equipment
2. Any illegal act involving the use of a computer or related devices generally is referred to
as a computer crime
7. A denial of service attack (DoS attack) disrupts computer access to an Internet service
such as a web or email
8. A devastating type of Dos is Distributed DoS attack (DDoS attack): a zombie army is
used to attack
9. A back door is a program or set of instructions in a program that allow users to bypass
security controls
10. Spoofing is a technique intruders use to make their network or Internet transmission
appear legitimate
11. A firewall is hardware and/or software that protects a network’s resources from intrusion
12. Organizations take several measures to help prevent unauthorized access and use:
13. Access controls define who can access a computer, device, or network; when they can
access it; and what actions they can take while accessing it
14. The computer, device, or network should maintain an audit trail that records in a file
both successful and unsuccessful access attempts
User name
Password
17. A possessed object is any item that you must possess, or carry with you, in order to gain
access to a computer or computer facility
19. Two-step verification uses two separate methods, one after the next, to verify the identity
of a user
20. Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks
21. Many manufacturers incorporate an activation process into their programs to ensure the
software is not installed on more computers than legally licensed
22. During the product activation, which is conducted either online or by phone, users
provide the software product’s identification number to associate the software with the
computer or mobile device on which the software is installed
24. Information theft occurs when someone steals personal or confidential information
25. Encryption is a process of converting data that is readable by humans into encoded
characters to prevent unauthorized access
26. A digital signature is an encrypted code that a person, website, or organization attaches to
an electronic message to verify the identity of the message sender
28. A website that uses encryption techniques to secure its data is known as a secure site
31. A backup is a duplicate of a file, program, or media that can be used if the original is lost,
damaged, or destroyed
32. Off-site backups are stored in a location separate from the computer or mobile device site
33. Technology ethics are the moral guidelines that govern the use of computers, mobile
devices, information systems, and related technologies
35. Intellectual property refers to unique and original works such as ideas, inventions, art,
writings, processes, company and product names, and logos
36. Intellectual property rights are the rights to which creators are entitled to their work
38. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of
movies, music, and other digital content
39. A code of conduct is a written guideline that helps determine whether a specification is
ethical/unethical or allowed/not allowed
40. Green computing involves reducing the electricity and environmental waste while using
computers, mobile devices, and related technologies
41. Information privacy refers to the right of individuals and companies to deny or restrict the
collection, use, and dissemination of information about them
42. A cookie is a small text file that a web server stores on your computer
43. Phishing is a scam in which a perpetrator sends an official looking email message that
attempts to obtain your personal and/or financial information
44. Spyware is a program placed on a computer or mobile device without the user’s
knowledge that secretly collects information about the user and then communicates the
information it collects to some outside source while the user is online
45. Adware is a program that displays an online advertisement in a banner or pop-up window
on webpages, email messages, or other Internet services
V) Computer components:
1. The case contains and protects the electronics of the computer or mobile device from damage
2. The motherboard is the main circuit board of the computer
- A computer chip contains integrated circuits
3. The processor, also called the central processing unit (CPU), interprets and carries out the
basic instructions that operate a computer
4. A multi-core processor is a single chip with two or more separate processor cores
5. Processors contain a control unit and an arithmetic logic unit (ALU)
6. The control unit is the component of the processor that directs and coordinates most of the
operations in the computer
7. The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations
8. The processor contains registers, that temporarily hold data and instructions
9. The system clock controls the timing of all computer operations
10. The leading manufacturers of personal computer processor chips are Intel and AMD
11. A processor chip generates heat that could cause the chip to malfunction or fail
Require additional cooling
– Heat sinks
– Liquid cooling technology
– Cooling pads
12. IOT: a computing environment where everyday objects, or things, are connected to the
Internet
13. Sensors connected to these objects may gather, share, transmit, and receive data about the
objects with other devices or servers online
14. Users can access data or control individual objects using web or mobile apps.
15. Analog signals are continuous and vary in strength and quality
16. Digital signals are in one of two states: on or off
17. Memory consists of electronic components that store instructions waiting to be executed by
the processor, data needed by those instructions, and the results of processing the data
18. Memory size commonly is measured in gigabytes (GB) or terabytes (TB)
19. Computers and mobile devices contain two types of memory: Volatile and Nonvolatile
memory
20. RAM chips usually reside on a memory module and are inserted into memory slots
21. Memory cache speeds the processes of the computer because it stores frequently used
instructions and data
22. Read-only memory (ROM) refers to memory chips storing permanent data and instructions
23. Flash memory can be erased electronically and rewritten
- CMOS technology uses battery power to retain information when when the power to the
computer is off
24. Access time is the amount of time it takes the processor to read from memory
25. An adapter card enhances functions of a component of a desktop or server system unit and/or
provides connections to peripherals
– Sound card and video card
26. An expansion slot is a socket on a desktop or server motherboard that can hold an adapter
card
27. With Plug and Play, the computer automatically can recognize peripheral devices as you
install them
28. A USB adapter enhances functions of a mobile computer and/or provides connections to
peripheral devices
29. A bus allows the various devices both inside and attached to the system unit to communicate
with one another
– Data bus
– Address bus
30. Word size is the number of bits the processor can interpret and execute at a given time
31. The power supply or laptop AC adapter converts the wall outlet AC power into DC power
32. Mobile computers and devices can run using either a power supply or batteries
33. Batteries typically are rechargeable lithium-ion batteries
1. Input is any data and instructions entered into the memory of a computer
2. A keyboard is an input device that contains keys users press to enter data and instructions
into a computer or mobile device
3. An ergonomic keyboard has a design that reduces the chance of repetitive strain injuries
of wrist and hand
4. Ergonomics incorporates comfort, efficiency, and safety in the design of the workplace
5. A pointer is a small symbol on the screen whose location and shape change as a user
moves a pointing device
6. A mouse is a pointing device that fits under the palm of your hand comfortably
7. A touchpad is a small, flat, rectangular pointing device that is sensitive to pressure and
motion
10. With pen input, you touch a stylus or digital pen on a flat surface to write, draw, or make
selections
11. A graphics tablet, also called a digitizer, is an electronic plastic board that detects and
converts movements of a style or digital pen into signals that are sent to the computer
12. Voice input is the process of entering input by speaking into a microphone
13. Voice recognition, also called speech recognition, is the computer or mobile device’s
capability of distinguishing spoken words
14. Video input is the process of capturing full-motion images and storing them on a
computer or mobile device’s storage medium
16. A scanner is a light-sensing input device that reads printed text and graphics and then
translates the results into a form the computer can process
17. A flatbed scanner works in a manner similar to a copy machine except it creates a file of
the document in memory instead of a paper copy
18. An optical reader is a device that uses a light source to read characters, marks, and codes
and then converts them into digital data that a computer can process
19. A bar code reader, also called a bar code scanner uses laser beams to read bar codes
21. RFID (radio frequency identification) uses radio signals to communicate with a tag
placed in or attached to an object
22. An RFID reader reads information on the tag via radio waves
23. MICR (magnetic ink character recognition) devices read text printed with magnetized ink
24. An MICR reader converts MICR characters into a form the computer can process
3. A storage device is the hardware that records and/or retrieves items to and from storage
media
-The amount of time it takes a storage device to locate an item on a storage medium
6. A hard disk, also called a hard disk drive (HDD) contains one or more inflexible, circular
platters that use magnetic particles to store data, instructions, and information
-Density
8. Formatting is the process of dividing the disk into tracks and sectors
9. A head crash occurs when a read/write head touches the surface of a platter
11. An SSD (solid state drive) is a flash memory storage device that contains its own
processor to manage its storage
12. An SSD (solid state drive) has several advantages over traditional (magnetic) hard disks
13. An external hard disk is a separate freestanding storage device that connects with a cable
to a USB port or other port on a computer or mobile device
14. RAID (redundant array of independent disks) is a group of two or more integrated hard
disks or SSDs
15. A memory card is a removable flash memory storage device that you insert and remove
from a slot in a computer, mobile device, or card reader/writer
16. USB flash drives plug into a USB port on a computer or mobile device
17. Cloud storage is an Internet service that provides storage to computer or mobile device
users
18. An optical disc consists of a flat, round, portable disc made of metal, plastic, and lacquer
that is written and read by a laser
19. Optical discs commonly store items in a single track that spirals from the center of the
disc to the edge of the disc
21. A DVD-ROM is a high-capacity optical disc on which users can read but not write on or
erase
22. A DVD-R or DVD+R are competing DVD-recordable WORM formats, on which users
can write once but not erase
23. DVD-RW, DVD+RW, and DVD+RAM are competing DVD-rewritable formats that
users can write on multiple times
24. Network attached storage (NAS) is a server that is placed on a network with the sole
purpose of providing storage to users, computers, and devices attached to the network
25. A storage area network (SAN) is a high-speed network with the sole purpose of providing
storage to other attached servers
26. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data
and information
27. A tape drive reads and writes data and information on a magnetic tape
28. A magnetic stripe card has a magnetic stripe that contains information
29. A smart card stores data on an integrated circuit embedded in the card
30. The RFID tag consists of an antenna and a memory chip that contains the information to
be transmitted via radio waves
31. An RFID reader reads the radio signal and transfers the information to a computer or
computing device
33. An NFC tag contains a chip and an antenna that contains information to be transmitted