Computer Flashcards

1
Q

Computing

A

the process of using a computer to complete a goal oriented task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware

A

the physical components of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software

A

the instructions (programs) the computer uses to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input Device

A

Hardware used to put data in into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Output Device

A

Hardware used to display or give information back to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Storage Hardware

A

Hardware used to store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Processing Hardware:

A

Components (hardware) used to process the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit

A

one “on or off” of computer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Byte

A

eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Megabyte

A

approximately 1000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gigabyte

A

approximately 1,000,000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terabyte

A

approximately 1,000,000,000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating System

A

the software that runs the computer device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilities Software

A

software used to optimize, analyze, configure or maintain the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Applications Software

A

software that the performs tasks, directed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spamming

A

Sending unsolicited, undesired e-mail. E-mail version of junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Flaming

A

Hostile and insulting interaction between Internet users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber-Bullying

A

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Libel

A

A written false statement that is damaging to a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Slander

A

A spoken false statement that is damaging to a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Censoring/Filtering

A

Suppressing speech, public communication or other information which may be considered objectionable, harmful, sensitive, or politically incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Intellectual Property

A

Creations of the mind, such as:

  • Inventions
  • Literary & artistic works
  • Designs
  • Symbols
  • Images used in commerce
24
Q

Piracy

A

Unauthorized use or reproduction of another’s work

25
Q

Copyright

A

Exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work)

26
Q

Software Licensing

A

Legally binding agreement that specifies the terms of use for an application
******
Most computer licensing allows you to run the program on only one machine and to make copies of the software only for backup purposes

27
Q

Digital Footprint

A

A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. A “passive digital footprint” is a data trail you unintentionally leave online.

28
Q

Hacking

A

Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator’s original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.

29
Q

Netiquette

A

the correct or acceptable way of communicating on the Internet.

30
Q

Email

A

messages distributed by electronic means from one computer user to one or more recipients via a network

31
Q

Text

A

In general, text is a collection of words or letters that are understandable by the reader. On a computer text can be created, viewed, edited, and modified using a text editor or word processing program

32
Q

VOIP

A

short for Voice over Internet Protocol.

33
Q

Computer system

A

all functional components of a computer, including an input device, processing unit, memory and storage, and an output device

34
Q

Computer network

A

a group of computers such as those in businesses and schools that are linked together so users can share hardware, software, and data

35
Q

Central processing unit(CPU)

A

the control center of the computer

36
Q

Program

A

a series of detailed , step-by-step instructions that tell the computer what functions to complete

37
Q

Computer language

A

a system of letters, words, numbers, and symbols used to communicate with a computer.

38
Q

Operating system software

A

a computer program that translates command and allows application programs to interact with the computer’s hardware

39
Q

Application software

A

computer programs that perform specific tasks such as word processing, database management , or accounting

40
Q

Computer-assisted instruction(CAI)

A

the use of computers to help people learn or improve skills at their own pace

41
Q

E-commerce

A

conducting business transactions using the Internet or other technology

42
Q

Robotics

A

mechanical devise programmed to do routine tasks such as those in many factories

43
Q

Artificial intelligence (AI)

A

software that enables computers to reason, learn , and make decisions using logical methods similar to the methods humans use

44
Q

Expert systems

A

computer programs that help people solve technical programs

45
Q

Computer- aided design (CAD)

A

the use of technology to create product styles and designs

46
Q

Telecommuting

A

allows employees who primarily use personal computers and other technology to work from home. They communicate with managers, coworkers, and customers using the Internet, telephone, and fax machines

47
Q

Piracy

A

stealing or illegally copying software packages or information

48
Q

Computer virus

A

a program code hidden in a system that can later do damage to software or stored data

49
Q

Management information system(MIS)

A

a coordinated system of processing and reporting information in an organization

50
Q

What is Data?

A

Data is Raw Input – information BEFORE it has been

processed.

51
Q

Aggregate Data

A

To aggregate means to
combine. Combined, or aggregate data, is often used for PROFILING. For instance, the FBI collects data from Facebook pages, text messages, phone calls,
locations, and then puts that data together proof a person.

52
Q

Advocacy Data

A

Advocacy data, is data used for making a case.

53
Q

(Discovery Data.)

A

data that informs a discovery

54
Q

Binary

A

relating to, composed of, or involving two things.

55
Q

Decimal

A

121

56
Q

Denary

A

Base 10

57
Q

Hexadecimal

A

Is used for images, sounds, etc..