AIT-1 Flashcards
hardwere, that may convert electrical signals to acoustic signals or vice versa. An example is the hydrophone. which responds to waterborne sound waves and is useful in underwater sound detection
acoustictoelectric transducer
the part of a hard disk to which the read/write arm attaches which controls the movements of the read/write arm
actuator
Ecommerce is the activity of buying or selling of products on online services or over the Internet. Developer. Consequently. is the person who creates the such a sites
ecommerce developer
let you watch DVDs. play music and listen to the radio on the Internet.
media player
Browser hijacking is a form of unwanted software that modifies a web browser’s settings without a user’s permission. to inject unwanted advertising into the user’s browser. A browser hijacker may replace the existing home page. error page. or search engine with its own.
browser hijacking
The desktop consists of … such as windows. icons. menus
graphical user interfaces (GUI)
can store up to 650700 MB of data
CDs (compact discs)
is any software that brings harm to a computer system. Malware can be in the form of worms. viruses. trojans. spyware. adware and rootkits. etc.. which steal protected data. delete documents or add software not approved by a user.
malware/malicious software
defines the Internet domain name of the web server that hosts the website
Domain
a symbol that appears on the display screen and that you move to select objects and commands
cursor/pointer
a person or thing that makes partial or minor changes to something.
modifiers
a computer program used to prevent. detect. and remove malware.
antivirus program
business transactions conducted on the Internet
ecommerce
documents. pictures. sounds and even computer programs
attachments
provide little or no abstraction from a computers commands in the language map closely to processor instructions. Generally they refer to machine code.
lowlevel language
the blog administration should not be confused with the actual writing of a blog His responsibilities are adding photos is often key.Topics of the blog should be tweaked by a blog administrator. In one word it is the pesron who is respi=osible for the blogs (for example) of famous perple. They obviously have no time to post pictures. reply to commetns. promote some stock and ets
blog administrator
it such links refer to multimedia. i.e. audiovisual elements
hypermedia
a wireless technology standard for exchanging data over short distances from fixed and mobile devices. and building PANs
bluethoot
in agreement with something
in concurrence
makes a PC easier for disabled users to use
accessibility software
a microprocessor designed to supplement the capabilities of the primary processor
coprocessor/coprocessor
a small device able to be connected to and used with a computer. especially to allow access to wireless broadband or use of protected software
dongle/key
carbon copy sent to another addressee
CC
technology of very small devices made of silicon or polymer which perform nonelectronic functions such as typically sensing and actuation
microsystems
a message posted to a public Internet discussion group with the intent of provoking an angry response or argument over a topic
flamebait
a level of access above that of a normal user. … In an application environment. users with ‘superuser’ or system administratorroles and responsibilities would be considered to have Administrator Access.
administratorlevel access
makes copies of all information stored on a disk and restores either the entire disk or selected files
backup software
The delete key is a key on most computer keyboards which typically is used to delete either (in text mode) the character ahead of or beneath the cursor. or (in GUI mode) the currentlyselected object.
Delete key
military branches
.mil
is the overall size (generally height) of a font shown on a screen or printed on a page. A font is typically measured in a point (pt) size
font size
a row of items titles that. when clicked. display dropdown menus of other items or commands
menu bar
a small picture that represents an object or program
icon
a small area on a screen in which the user is prompted to provide information or select commands.
dialog box
buttons on a computer keyboard that are either programmed or designated to move the cursor in a specified direction.
arrow keys
Almost the same as a whiteboard. but it is a desk. there is no projectors only sensors
interactive table
is one of the oldest browsers predominantly used on Windows computers
Internet Explorer
Manages projects. technology and people. Takes responsibility for the maintenance of servers and installation of new software. and for staffing a helpdesk and a support group
IT Manager
the use of the Internet or other electronic means to stalk or harass an individual. group. or organization. It may include false accusations. defamation. slander and libel. It may also include monitoring. identity theft. threats. vandalism. solicitation for sex. or gathering information that may be used to threaten. embarrass or harass.
cyberstalking
Can be responsible for installation. maintenance or repair of computers and associated equipment. Installs hardware. ranging from personal computers to mainframe machines. and tests by running special software.
Computer Services Engineering Technician
small pictures that are stored on a computer and can be easily added to a document
clip art
a thirdparty entity that manages and distributes softwarebased services and solutions to customers across a wide area network from a central data center
Application Service Provider (ASP)
fixed into the surface of something: The thorn was embedded in her thumb.(встроенный)
embedded
for schools
.edu
small pieces of data sent from a website
cookies
is the brains of the computer where the actual processing data takes place
CPU
an input device consisting of a flat. pressuresensitive pad which the user draws on or points at with a special stylus. to guide a pointer displayed on the screen.
graphics tablet
the large system of connected computers around the world that allows people to share information and communicate with each other
internet
the learning or developing of a skill. habit. or quality.
acquisition
a computer hardware component that connects a computer to a computer network
Network Interface Card (NIC)
blank/blind carbon copy sent to a recipient without the recipients address appearing in the message
BCC
software that contains advertisements embedded in the application
adware/advertisingsupported software
a distinctive attribute or aspect of something
feature
Advises potential customers about available hardware and sells equipment to suit individual requirements.
Computer Salesperson
defines the domain host (default host for http is www)
Host
defines the name of a single web page
Filename
change the form. character. or function of something.
convert
is small programs that harm the computer system
carry viruses
the physical and electronic parts of a computer
hardware
conforming to the law or to rules.
legitimate
the practice of sharing computer data or space on a network
file swapping
interprets software programs written in assembly language into machine code
assembler
a central connection point in the star network topology. which does not distinguish to which port data packets should be sent
hub
press a computer mouse button twice in quick succession to select a file. program. or function.
double click
a type of broadband communications technology which is up to 24 Mbps fast
ADSL (Asymetric Digital Subscriber Line)
at the bottom. top. and/or sides of the screen–
menu
software that is specifically designed to disrupt. damage. or gain unauthorized access to a computer system.
malware
a machinereadable representation of the UPC (Universal Product Code) which is read by a scanner that passes over the code and registers the UPC
barcode
is a feature in Microsoft Excel that automatically adjusts the width or height of a cell.
AutoFit Behaviour panel
the creation of documents using page layout skills on a personal desktop computer primarily for print
desktop publishing (DTP)
is a harddisk failure that occurs when a read/write head comes in contact with its rotating platter. resulting in permanent and usually irreparable damage
head crash
a rapid transition from one phase of a business enterprise or project to another.
cutover
is the luminance of images that is measured in cd/m^2(candela per square metre)
brightness
navigation key. A keyboard key used to move the cursor (pointer) around on the screen. They include the four Arrow keys. PageUp. PageDown. Home and Endkeys.
navigation keys
a company in UK
.co.uk
Software protection and anticheat for games. against copying. piracy and illegal use. Copy protection is a system of measures aimed at countering unauthorized duplication of information. usually presented in electronic form.
anticopying software
a small device on a piece of electrical or electronic equipment which is pressed to operate it.
button
the authoring language used to create documents on the Web
HyperText Markup Language (HTML)
a device or piece of equipment designed to perform a specific task.
appliance
is an error. flaw. failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result
bug
a sheet of information in the form of a table. graph. or diagram
chart
longterm storage devices. which means the data is still saved even if the computer is turned off or unplugged
mass storage device
a key on keyboards that turns insert mode on and off
Insert key
the state of being watchful for possible danger.
alert(n)
a special type of expansion cards designed specifically for the purpose of accelerating various workloads.
acceleration card
the keyboard key that originally pushed the typewriter carriage one position backwards. and in modern computer systems moves the display cursor one position backwards. deletes the character at that position. and shifts back the text after that position by one position.
Backspace key
Will allow you to move in the begging of the string
Home key
an arrangement of text and graphics
layout
is a freeware web browser developed by Google in 2008
Chrome
Researches. designs. and develops computers. or parts of computers and the computerized element of appliances. machines. and vehicles.
Hardware Engineer/Hardware Architect
compress the contents of a disk. increasing the capacity of the disk
disk compression utilities
technology is a type of online chat that offers realtime text transmission over the Internet. A LAN messenger operates in a similar way over a local area network.
instant messaging (IM)
nonprofit organizations
.org
Input devices are devices such as cameras and scanners which are used to record an image of some physical scene. Outputdevices are devices such as displays and printers on which images are produced.
imaging device
an email utility that automatically replies to an email message with a prewritten response when that email comes into a specific email or Internet address
autoresponder
the time a program or device takes to locate a single piece of information and make it available to the computer for processing
access time/seek time
the code used to create Web pages
HTML
Function and Edit Keys. … These keys would include cursor keys and editoperation keys. and are referred to here as edit keys. Left arrow.right arrow. up arrow. down arrow. Home key. End key. Page Up.Page Down. Insert. Delete
editing keys
a measurement that indicates the diagonal distance between likecolored phosphor dots on a display screen
dot pitch/phosphor pitch (note: DPI dots per inch is a number of dots per 2.54 cm)
which examines the instructions in the users program. interprets each instruction and causes the circuits and the rest of the components disk drives. monitor. etc. to be activated to execute the functions specified
Control unit
a line or block of text that is automatically added to the bottom of every page
footer
is a mechanism that is controlled or monitored by computerbased algorithms. tightly integrated with the Internet and its users. In cyberphysical systems. physical and software components are deeply intertwined. each operating on different spatial and temporal scales. exhibiting multiple and distinct behavioral modalities. and interacting with each other in a lot of ways that change with context.
cyberphysical system
a specific geographic location in which an access point provides public wireless broadband network services to mobile visitors through a WLAN
hotspot
is a large. powerful computer that handles the processing for many users simultaneously (up to several hundred users
Mainframe
the amount of data that can be transmitted in a fixed amount of time or range within a band of frequencies or wavelengths
bandwidth
is a more active version of the word include if you _____. you are adding something to the mix.
incorporate
a published false statement that is damaging to a person’s reputation a written defamation
libel
a component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air
heat sink/cooler/fan