Final Exam Review Flashcards
What is a computer?
A programmable machine that processes raw data into useful information
What is ubicomp?
invisible computing all around- used everywhere- ubiquitous computing
What was Charles Babbage responsible for doing?
Mechanical Computer design
Who is Ada Lovelace?
First computer programmer
What did Alan Turing do?
developed machines concept and performed mathematical computations
What are turing machines?
mathematical computations
What are turing tests?
Artificial human intelligence
What is the CPU?
microprocessor of computer processor, controls all functions, brain of computer
What are PC’s?
Personal Computers- tablets, laptops, netbook, apps
What is a workstation?
attached to a network and found in business
GPS
triangulation, signals
Geocaching
scavenger hunt
Video game simulation
recreates realistic scenarios
Backward capability
option to play older games
Servers
client computers, connected to network
Distributed computing
processing and grid computing
Grid computing-
using various computers
Universal design principles
assists people with disabilities
4 steps in information processing cycle
input, processing, output, storage
System unit
contains motherboard, memory, power supply, CPU
Drive bays
hold storage devices, hard drives, peripheral devices
Functions of CPU
fetch, decode, execute, and store
Rom
holds start up instructions, permanent memory
Drive controller
part of motherboard, provides drive interface
SATA
standard internal device interface used to connect other devices to motherboard
BIOS
chip on motherboard, starts up computer
LCD
Liquid Crystal Display
Optical Scanners
convert paper to digital documents
RFID
Radio Frequency Track Inventory scanner
Inkjet printer
most common printer- sprays ink onto paper
Network adapter
connect computer to network
Operating system
manages system resources, communication of hardware and software application
Utility software
enables users to maintain, repair, and protect the computer
Firmware
program stored on ROM chip
Virtual memory
when RAM storage is full, borrowing hard drive space
Paging
process of data and instructions
Path
sequence of opened folders
File explorer
Windows 10, organize files and folders
Finder
used to manage files
Spotlight
search utility
Cloud storage
saving files to be accessed from different devices
Server
multiuser computer system
Wireless adapter
built into a computer and connected with a USB port
Phishing
crime through instant message or email
Pharming
redirects you to a phony website
Clickjacking
clicking on a link with unwanted linkpages
Number of needed characters for password
8
Steps of troubleshooting
Verifying network adapter is turned on
The correct network is selected
Entering correct network security information
Checking connectivity
Drive imaging
software that creates a minor image of the entire hard disk and to restore the entire system
Logic bomb
triggered when certain conditions are met
Botnet
network of computer zombies or bots
Rootkit
set of programs that allow cybercriminals to gain control over computer systems
Security suites
packages of security software that enable having complete protection from a single product
LMS
Learning Management system, software application used for educational purposes
Saas
Software as a service- on demand software, licensing and delivery model
Proprietary software
non- free computer software where the software’s publisher has intellectual property rights or copyrights and patent rights
Http
describes protocol of webpage- rules
Domain name
follows protocol and represents company
DNS
Domain Name System, looks up IP address
VOIP
Voice over internet protocol, skype, facetime
Captcha
verifies a human is setting up an account
Microblogging
short comments that are streamed online of your daily activities
Metasearch engines
search other search engines
Boolean search
uses logical operators- And, Not, Or
Netiquette
rules for acceptable behavior and manners on the internet
Flame
message that expresses free opinion- no filter
Sharepoint
microsoft technology used to share information from multiple devices
Platform neutral
run on any devices
Energy star
to save energy - 20-30% energy star
Device
Location services
determine your location by gps/wireless services
Computer Information Processing Cycle
Input, Processing, Output, Storage
Mainframes
most common found in business produce massive amounts of data/transitions
Port
attaches/connect peripheral devices to motherboard
Not a modifier key
Caps Lock
Analog
input devices - continous data that transforms to electronic waves/pulses
firmware
small ROM chip in hardware
Linux
free open source operating system
Android
embeded version of Linux
Black Hat
hackers with malicious motivation/theft
Dos
Denial of Service
Cookie
tracks your web surfing habits- website on a computer when you visit
Spyware- secretly will gather your information
Payload
virus attack is also known as
Keylogger
captures key strokes-hackers, highly dangerous
Productivity programs
help you work more effiecently with personal and business computers
JPg
graphic format store up to 16.7 million colors
GIF
256 color graphic file
MP3
1/10th size of a CD
DRM
Digital rights Management
Paas
Platform as a service
SRM
used in retention ans graduation rates- academic tool
Broadband
using anything over 0 mbps
Cable Internet Access
between 16-50 mbps
Adobe Reader
plug in
Forums
orignial forms of social media
Thread
conversation in a forum
microblogging site- needs to be small
google name
In 1997 the google.com domain name was registered
Dogpile
metasearch engine
Nor
not a valid boolean search term
Happy Birthday to You
determined to be public domain in 2015