Chapter 1-IT Flashcards
Introduction to the world of tech
What is a computer
Is a programmable,eletronic device that accepts data,performs operations on that data and stores the data
Basic operations
Input: Entering data into the computer
Processing: Performing operations on the data
Output: Presenting the results
Storage: Saving data, programs ,or output for future use
Communications: Sending/ receiving data
Data vs Info
Data is raw, unorganized facts
Info is data that has been processed into meaningful form
Input devices
Used to input data into the computer
Keyboards, mice, scanners, cameras, microphones, pens, touch pads, touch screens, fingerprint readers
Processing devices
Includes CPU- performs calculations and controls the computer’s operation
also includes GPU and memory
Output devices
Present results to the user
Includes additional screen monitors, printers ,speakers, headphones
Storage devices
Used to store data on or access data from storage media
Includes hard drives ,CD/DVD discs and drives, USB Flash drives
Communications devices
Allows users to communicate with others and to electronically access remote information
Includes modems, network adapters and routers
What is Software
The program or instructions used to tell the computer hardware what to do
What does the OS do?
Starts up the computer and control its operation, computer cannot function without an OS .OS boots the computer and launches programs at the user’s direction. Most use graphical objects to interact with users such as icons
Includes Windows, OSX ,Linux ,Android ,IOS
Application software
Allows users to perform specific tasks
Computer users(end users)
Use a computer to perform tasks or to obtain info
Programmers-write programs that computers use
System analysts-Design computer systems
Computer operations personnel-Manage day-to-day computers operations
Security specialists-Secure computers and networks against hackers
Embedded computer
Is designed to perform specific tasks or functions for the product in which it is embedded
Household appliances, sewing machines, cars, self-driving cars
Mobile device
A very small device with some type of built-in computing/internet capability
Voice/touch input, has a small screen and keyboard, can perform internet searches, pay for products and view documents
Personal computer(Microcomputer)
A small computer designed to be used by one person at a time(PC)
Desktop computer
Not portable, sit on or next to a desk
Thin client
Is designed to utilize a network for much of its processing
has a limited storage capacity and processing power(relies on network, cloud)
Advantages and disadvantages of a thin client
A: Includes lower cost, increased security(doesn’t store data), and easier maintenance
D: Limited/no local storage and the inability to function if the network is down
Internet appliance
An ordinary device that can be used for accessing the internet
Some use apps to deliver news ,music
Refrigerators ,smart TVs
Server
Is a midrange computer used to host programs and data for a small network
Virtualization
Creating virtual rather than actual server environments
Server virtualization vs Desktop virtualization
S:Is used to share a server for increased efficiency
D:Delivers a user’s desktop to his/her current device
Mainframe computer
Is a powerful computer used by many large organizations to manage large amounts of centralized data
Runs programs to meet the needs of a wide variety of users as well as large processing tasks during off hours
Supercomputer(high-end servers/enterprise-class servers)
Is the fastest ,most expensive, most powerful type of computer (good for weather forecasting)
Computer network
Is a collection of hardware and other devices that are connected together
Users can share hardware, software and data
Users can communicate with each other
Users can share an internet connection
Most computers and mobile devices today connect to computer network school networks, home networks, mobile telephone networks
The internet
Is the largest/most well-known computer network in the world
Users connect using ISP
ISPs connect to regional networks ,which connect to backbone networks ,which connect to form the internet
The WWW
A vast collection of Web pages available through the Internet
Web pages contain hyperlinks(texts or graphics to click to go to another)
Websites contain web pages stored on web servers
Web pages are viewed using a web browser
Accessing a Network/Internet
Need a network adapter to connect(or a modem)
Many networks require a username and password
Direct(always-on) connectors
Dial-up connections(ADSL)
Internet address
Used to access resources on the internet
IP addresses and domain names(domain corresponds to an IP)(to identify computers)
Uniform resource locator(to identify computers)
E-mail addresses(to identify people)
Cloud Computing
Resources stored on computers in a “cloud” of computers rather than on users’ computers. Accessible to any web-enabled device. Google drive/doc
Web browser
Used to display web pages
Search site
Is a web page that help you to locate web pages and other resources
The process of exchanging electronic messages between individuals over a network
Benefits of Technology
Design before construction leads to safer products
Earlier medical diagnoses and more effective treatment
Devices that allow physically and/or visually challenged individuals to perform job tasks
Risks of Technology
Stress and health concerns
Security issues
Computer viruses/malware
Identity theft and phishing
Spam
Eniac vs Univac
E:was the first large-scale general purpose computer
U:was the first computer to be mass produced for general commercial use
Disadvantages of cloud computing
Potentially high data transfer costs
No/reduced functionality without an internet connection
Malware
Harmful programs that can be installed without our knowledge -can erase data, locate sensitive data, take control of your computer for criminal
Identity theft vs Phishing
IT-Using someone elses’ identity to purchase goods/services to illegally pretend to be that person
Phishing-An email appears to come from a well known legitimate organization but aims to trick you into giving sensitive personal info
How can anonymity be abused
Rude comments and personal attacks
Committing other illegal /unethical acts
Using multiple identities