4 - Hardware and Software Flashcards
Information Technology concepts and vocab
32 bit processor 64 bit processor
32 bit - can effectively utilize up to 4 GB (Gigabytes) of main memory 64 bit - processor that can use more than 4 GB / can effectively use an almost unlimited amount of Main Memory
Adware
Program installed on the computer without users’ knowledge Can observe keystrokes, modify computer activity, and report user activity to sponsoring orgs Most adware does not perform malicious activites and stealing of data, but rather watches your activities and produces pop-up ads.
Android
A mobile operating system that is a version of Linux. Android runs on Google Nexus 7, Amazon Kindle Fire, and many other devices.
Application Software
Programs that perform a business function Some application programs are general purpose, such as Excel or Word Other application programs are specific to a business function, such as Accounts Payable
ARM
A computer architecture and instruction set that is designed for portable devices, such as smartphones and tablets
Binary Digits
The means by which computers represent data, AKA bits. A binary digit is either 0 or 1
Bit
The means by which computers represent data, AKA binary digits. A bit is either 0 or 1
Bus
Channel which the CPU reads instructions and data from main memory and writes data to main memory.
Bytes
(1) 8-bit chunks of data (2) Characters of data
Cache
A small amount of very fast memory in a CPU The CPU keeps frequently used instructions in the Cache. A large cache makes the computer faster, but a cache is expensive.
Central Processing Unit (CPU)
The portion of a computer that selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory.
Client
PCs, tablets, and smartphones that access servers via the Cloud.
Client-server applications
Applications that process code on both the client and the server.
Closed source
Source code that is highly protected and only available to trusted employees and carefully vetted contractors.
Custom-developed software
Tailor-made to a company’s specific requirements
Data channel
Medium by which the CPU reads instructions and data from main memory, and writes data to main memory.
Desktop Program
Client applications, such as Word Excel or Acrobat, that run on a personal computer and do not require a connection to a server.
Desktop Virtualization
Also called client virtualization or PC virtualization. Process of storing a users’ desktop on a remote server It enables a user to run their desktop from many different client computers.
Dual Processor
A computer with 2 CPUs
Scale of Bytes
Firmware
- Computer software that is installed into devices such as printers, print services, and various types of communication devices.
- Software is coded just like other software, but it is installed into the special, programmable memory of the Printer or other device.
GNU
A set of tools for creating and managing Open Source software.
Originally created to develop an open-source, Unix-like operating system.
GNU General Public Licence (GPL) Agreement
One of the standard license agreements for open source software
Hardware
Electronic components and related gadgets that input, process, output, store, and communicate data according to instructions encoded in computer programs or software.
Horizontal-market Application
Software that provides capabilites common across all orgs and industries, for example:
- word processors
- graphics programs
- spreadsheets
- Presentation Programs
Host Operating System
In virtualization, the operating system that hosts the virtual operating system.
Input Hardware
Hardware devices that attach to a computer, for example:
- Keyboard
- Mouse
- Document Scanners
- Bar Code (UPC) Scanners
iOS
The operating system used on the iPhone, iPod Touch, and iPad
License
A contract that stipulates how a program can be used.
Most specify the # of computers on which program can be installed, some specify # of users who can connect remotely.
Limited liability on software vendor related to consequences of use
Linux
A version of Unix that was developed by the open-source community
The open-source community owns Linux, and there is no fee to use it
Linux is a popular operating system for Web servers
Mac OS
An operating system developed by Apple Computer, Inc. for Macintosh. The current version is Mac OS X.
Machine Code
Code that has been compiled by source code and is ready to be processed by a computer
Cannot be understood by humans
Main Memory
Memory that works in conjunction with the CPU
Stores data and instructions read by the CPU, and stores the results of the CPU’s computations.
Malware
Viruses, worms, Trojan horses, spyware, and adware
Memory swapping
The movement of programs and data into and out of memory.
If a computer has insufficient memory for its workload, such swapping will degrade system performance.
Modern-style applications
Windows applications that are touchscreen-oriented and provide context sensitive, pop-up menus
Microsoft Windows
The most popular nonmobile client operating system.
Also refers to Windows Server, a popular server operating system that competes with Linux.
Nonvolatile
Memory that preserves data even when not powered (e.g. magnetic and optical disks).
With this you can turn computer off and on, and contents will be unchanged.
Off-the-shelf software
Off-the-shelf-software with alterations
- Software used as-is
- Software purchased as-is but modified to fit the needs of the organization
One-of-a-kind application
Software that is developed for a specific, unique need, usually for a single company’s requirements
Operating System (OS)
A computer program that controls the computer’s resources
- Manages contents of main memory
- Processes key strokes & mouse movements
- sends signals to Display monitor
- reads and writes disk files
- Controls processing of other programs
Output Hardware
Hardware that displays results of computer’s processing.
Consists of:
- Video Displays
- Printers
- Audio Speakers
- Overhead Projectors
- Etc.
Payload
The program codes of a virus that causes unwanted or hurtful actions, such as deleting programs or data, or modifying data in ways that are unselected by the user.
PC Virtualization
Same as Desktop Virtualization
PixelSense
The Microsoft product formerly known as Surface.
It allows many users to process the same table-top touch interface.
Primarily used in hotels and entertainment centers
Quad Processor
A computer with 4 CPUs
RAM
Random Access Memory
Another name for computer’s Main Memory.
Server Farm
A large collection of server computers that is organized to share work and COMPENSATE for one another’s failures.
Servers
Computers that provide some sort of service, such as:
- Hosting a database
- Running a blog
- Publishing a website
- Selling Goods
Server computers are faster, larger, and more powerful than client computers
Server Virtualization
Process of running two or more operating system instances on the same server
The host operating system runs virtual operating system instances as applications
Site license
A license purchased by an organization to equip all the computers on site with a certain software.
Source Code
Computer code as written by humans that is understandable by humans.
Source code must be translated into machine code before it can be processed.
Spyware
Programs installed on user’s computer w/o knowledge or permission that reside in background and:
- Observe keystrokes
- modify computer activity
- report activity to sponsoring orgs
MALICIOUS spyware captures keystrokes of passwords, account #s, and other sensitive info
Other spyware is used for marketing analysis, observing what users do, websites visited, products purchased, etc.
Storage Hardware
Hardware that saves data and programs.
Magnetic disks is by far the most common storage device, although optical disks, such as CDs and DVDs, also are popular.
Surface
- Renamed PixelSense in 2012
- AFTER 2012, this became the name of Microsoft’s tablet computing device
Symbian
A mobile client operating system that is popular on phones in Europe and the Far East, but less so USA
Thick-client application
A software application that requires programs other than just the browser on the users’ computer
- Requires code on both client AND server computers
- See also “native application”
Thin-client application
A software application that requires nothing more than just the browser.
Trojan Horses
Viruses that masquerade as useful programs or files
A typical Trojan Horse appears to be a computer game, an MP3 file, or some other useful innocent program.
Universal Serial Bus (USB)
A standard for connecting computers and external devices such as printers, keyboards, mice
A USB Device is a peripheral device that conforms to the USB standard
Unix
An operating system developed at Bell Labs in the 1970s
It has been the workhorse of the scientific and engineering communities since then
Vertical-market Application
Software that serves the needs of a specific industry. Ex:
- Programs used by dental offices to schedule and bill patients
- Those used by automechanics to keep track of customer data and repairs
- Parts warehouses use them to track inventory, purchases and sales
Virtualization
The process whereby multiple operating systems run as clients on a single host operating system.
Gives the appearance of many computers running on a single computer.
Virtual Machines (VM)
Computer programs that present the appearance of an independent operating system within a second host operating system.
The host can support multiple virtual machines, possibly running different operating system programs (Windows, linux) each of which is assigned assets such as disk space, devices, and network connections over which it has control.
Virus
A computer program that replicates itself
Volatile
Data that will be lost when the computer or device is not powered
Windows RT
A version of Windows 8 that is specifically designed to provide a touch-based interface for devices that use ARM architecture, including
- Phones
- Tablets
- Some computers
Windows Server
A version of Windows that has been specifically designed and configured for server use
It has much more stringent and restrictive security procedures than other versions of Windows
Popular on servers in organizations that have strong commitment to Microsoft
Worm
Virus that propagates itself using the Internet or some other computer network
Worm code is written specifically to infect another computer as quickly as possible