Computer Flashcards

1
Q

Computing

A

the process of using a computer to complete a goal oriented task.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware

A

the physical components of the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Software

A

the instructions (programs) the computer uses to run.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Input Device

A

Hardware used to put data in into the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Output Device

A

Hardware used to display or give information back to the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Storage Hardware

A

Hardware used to store data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Processing Hardware:

A

Components (hardware) used to process the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Bit

A

one “on or off” of computer data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Byte

A

eight bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Megabyte

A

approximately 1000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Gigabyte

A

approximately 1,000,000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Terabyte

A

approximately 1,000,000,000 bytes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Operating System

A

the software that runs the computer device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Utilities Software

A

software used to optimize, analyze, configure or maintain the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Applications Software

A

software that the performs tasks, directed by the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Spamming

A

Sending unsolicited, undesired e-mail. E-mail version of junk mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Flaming

A

Hostile and insulting interaction between Internet users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cyber-Bullying

A

The use of electronic communication to bully a person, typically by sending messages of an intimidating or threatening nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Libel

A

A written false statement that is damaging to a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Slander

A

A spoken false statement that is damaging to a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Censoring/Filtering

A

Suppressing speech, public communication or other information which may be considered objectionable, harmful, sensitive, or politically incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Intellectual Property

A

Creations of the mind, such as:

  • Inventions
  • Literary & artistic works
  • Designs
  • Symbols
  • Images used in commerce
24
Q

Piracy

A

Unauthorized use or reproduction of another’s work

25
Copyright
Exclusive legal right to reproduce, publish, sell, or distribute the matter and form of something (as a literary, musical, or artistic work)
26
Software Licensing
Legally binding agreement that specifies the terms of use for an application ****************************** Most computer licensing allows you to run the program on only one machine and to make copies of the software only for backup purposes
27
Digital Footprint
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. A "passive digital footprint" is a data trail you unintentionally leave online.
28
Hacking
Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective. Those individuals who engage in computer hacking activities are typically referred to as “hackers.
29
Netiquette
the correct or acceptable way of communicating on the Internet.
30
Email
messages distributed by electronic means from one computer user to one or more recipients via a network
31
Text
In general, text is a collection of words or letters that are understandable by the reader. On a computer text can be created, viewed, edited, and modified using a text editor or word processing program
32
VOIP
short for Voice over Internet Protocol.
33
Computer system
all functional components of a computer, including an input device, processing unit, memory and storage, and an output device
34
Computer network
a group of computers such as those in businesses and schools that are linked together so users can share hardware, software, and data
35
Central processing unit(CPU)
the control center of the computer
36
Program
a series of detailed , step-by-step instructions that tell the computer what functions to complete
37
Computer language
a system of letters, words, numbers, and symbols used to communicate with a computer.
38
Operating system software
a computer program that translates command and allows application programs to interact with the computer's hardware
39
Application software
computer programs that perform specific tasks such as word processing, database management , or accounting
40
Computer-assisted instruction(CAI)
the use of computers to help people learn or improve skills at their own pace
41
E-commerce
conducting business transactions using the Internet or other technology
42
Robotics
mechanical devise programmed to do routine tasks such as those in many factories
43
Artificial intelligence (AI)
software that enables computers to reason, learn , and make decisions using logical methods similar to the methods humans use
44
Expert systems
computer programs that help people solve technical programs
45
Computer- aided design (CAD)
the use of technology to create product styles and designs
46
Telecommuting
allows employees who primarily use personal computers and other technology to work from home. They communicate with managers, coworkers, and customers using the Internet, telephone, and fax machines
47
Piracy
stealing or illegally copying software packages or information
48
Computer virus
a program code hidden in a system that can later do damage to software or stored data
49
Management information system(MIS)
a coordinated system of processing and reporting information in an organization
50
What is Data?
Data is Raw Input – information BEFORE it has been | processed.
51
Aggregate Data
To aggregate means to combine. Combined, or aggregate data, is often used for PROFILING. For instance, the FBI collects data from Facebook pages, text messages, phone calls, locations, and then puts that data together proof a person.
52
Advocacy Data
Advocacy data, is data used for making a case.
53
(Discovery Data.)
data that informs a discovery
54
Binary
relating to, composed of, or involving two things.
55
Decimal
121
56
Denary
Base 10
57
Hexadecimal
Is used for images, sounds, etc..