Introduction to Computing (M: 1 and 2) Flashcards
Offers a foundation that permits graduates to adapt to new technologies and new ideas.
Computer Science
Concerned with the information that computer systems can provide to aid a company, non-profit or governmental organization in defining and achieving its goals.
Information Systems
As a name of an undergraduate degree program, it refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organization.
Information Technology (IT)
Department in business or government agency that employs people in computer-related jobs.
IT Department
What career does E-commerce administrator belong to?
Management
What career does Help desk specialist belong to?
Training
What career does Technical writer belong to?
System development and programming
Manufacturers and distributors of computers and computer-related hardware.
Computer equipment field
Companies that develop, manufacture, and support software.
Computer software field
Someone that analyzes requirements, designs solutions, and oversees software development process.
Project leader
Someone who writes and tests computer programs.
Programmer
Someone who designs and develops software.
Software engineer
Someone who researches, invents, and develops solutions to complex software problems.
Computer scientist
Provides preventative maintenance, component installation, and repair services.
Computer service and repair field
Someone who installs, maintains, and repairs hardware.
Computer technician
They need general understanding of computers and specific knowledge of the product they are selling.
Computer sales people
Individual who draws upon expertise in specialized area of computers.
IT consultant
Programs that emphasize technical knowledge and skills
Computer information systems (CIS)
Programs that stress the theoretical side of programming and operating systems.
Computer science (CS)
Teaches students how to design and develop the electrical components found in computers and peripheral devices.
Computer engineering (CE)
A collection of people with common computer equipment of software interests.
User group
Process of verifying technical knowledge in a particular area.
Certification
What is acknowledged with a certificate.
Proficiency
This provides access to technical information, advanced training, and discounts on publications and tools.
Vendors
How does certification benefit customers?
Receiving better service from employees with certification.
Sometimes called end-user certifications.
Application software certifications
Holders of what certificate are considered highly credible during computer crimes cases?
Computer forensics certifications
Discovery, collection, and analysis of evidence found on computers and networks.
Computer forensics
Focus on particular skills — user operator, system administrator, and system engineer.
Operating systems certifications
Awarded to professionals who demonstrate expertise in planning, installing, managing and troubleshooting a network.
Networking certifications
Measure a candidate’s ability to identify and control security risks to computer resources.
Security certifications
Awarded for knowledge of a specific database management system.
Database system certifications
Refers to computer systems built to mimic human intelligence and perform tasks such as recognition of images, speech, or patterns and decision making.
Artificial Intelligence
It is a subset of AI
Machine Learning
These are some subsets of Machine Learning.
Neural networks, natural language processing (NLP) and Deep learning
It is the use of software to automate business processes and repetitive tasks that people used to do.
Robotic Process Automation (RPA)
It can be described as data you can only add to, not take away from or change and are consensus-driven so no one entity can take control of the data.
Blockchain
Designed to help solve some problems of cloud computing as a way to bypass the latency caused by cloud computing and getting data to a data center for processing.
Edge computing
This immerses the user in an environment.
Virtual Reality
This enhances their environment.
Augment Reality (AR)
This enables devices, home appliances cars and much more to be connected to and exchange data over the Internet.
IoT
It is an electronic device, operating under the control of instructions stored in its own memory.
Computer
It can perform all of its input, processing, output and storage activities by itself.
Personal computer
They help to keep people informed about the latest developments in the computer industry.
Computer industry publications
This department directs the planning, research, development, evaluation, and integration of technology.
Management
This department analyzes, designs, develops, and implements new information technology and maintains and improves existing systems.
System development and programming
This department evaluates and integrates new technologies, administers the organization’s data resources, and supports the centralized computer operating system and servers.
Technical services
This department operates the centralized computer equipment and administers the network, including both data and voice communications.
Operations
This department teaches employees how to use components of the information system or answers specific questions.
Training
This department develops and enforces policies designed to safeguard data and information from unauthorized users.
Security
The four primary ways to current with computer technology and trends.
1.) Professional organizations and personal networks.
2.) Professional growth and continuing education activities.
3.) Computer publications and Web sites.
4.) Certification.
It is a scientific and educational organization dedicated to advancing knowledge and proficiency of information technology.
Association for Computing Machinery (ACM)
It is a professional association of programmers, systems analysts, and information processing managers.
Association of Information Technology Professionals (AITP)
It involves having current knowledge and understanding of computers and their users.
Computer literacy
A collection of unprocessed items, which includes text, numbers, images, audio, and video.
Data
Conveys meaning and is useful to people.
Information
The electric, electronic, and mechanical components of a computer called….
Hardware
Allows you to enter data or instructions into a computer.
Input device
Conveys information to one or more people.
Output device
A case that contains the electronic components of a computer that are used to process data.
System Unit
It records and retrieves items to and from storage media.
Storage device
It enables a computer to send and receive data, instructions, and information to and from one or more computers.
Communications device
Anyone who communicates with a computer or utilizes the information it generates.
User
A collection of computers and devices connected together.
Network
A series of related instructions, organized for a common purpose.
Software
Two types of software.
System and Application
It is a personal computer you can carry from place to place.
Mobile computer
A computer small enough to fit on your lap.
Laptop or notebook computer
A computing device small enough to hold in your hand.
Mobile device
A mobile computing device designed for single player or multiplayer games.
Game console
It controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information.
Server
A large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
Mainframe
Fastest, most powerful computers that are capable of processing more than one quadrillion instructions in a single second.
Supercomputer
A special-purpose computer that functions as a component in a larger product.
Embedded computer
What standard game consoles use as an input device.
Handheld controller
Provides personal information management functions such as a calendar, an appointment book, address book, a calculator and a notepad.
PDA or personal digital assistant
A special type of notebook computer that allows you to draw or write on the screen using a digital pen.
Tablet PC
Smartphones are ___________ that usually also provides personal information management.
Internet-enabled
A mobile electronic device that is designed primarily for the purpose of reading digital e-books and periodicals.
E-reader
A handheld computer is sometimes referred to as an _______.
Ultra-Mobile PC (UMPC)
Most major corporations use _________ for business activities.
Mainframes
The most ancient calculating device known.
Abacus
An extremely complex rule that functions as an analog computer.
Slide Rule
Uses a chain of punch cards to instruct the loom on how to make intricate textiles. Invented by Joseph Marie Jacquard.
Jacquard Loom
The Father of Computer
Charles Babbage
Considered to be the concept for the general mechanical Computer.
Analytical engine
Used by the First Generation of Computers.
Are glass tubes with circuits inside and had no air or gas inside.
Vacuum Tubes
meaning of UNIVAC
Universal Automatic Computer
First instance of a computer bug was a….
Moth
Used by Second Generation of Computers.
Used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal.
Transistors
What date were Transistors invented?
December 23, 1947
Used by the Third Generation of Computers
Integrated circuits
Used by the Fourth Generation of Computers
Microprocessor
involves reducing the electricity consumed and environmental waste generated when using a computer.
Green computing
This is used to interact with the software using text, graphics and visual images such as icons. by
A GUI or graphical user interface
It controls how you enter data and instructions and how information is displayed on the screen.
User Interface
The process of setting up software to work with the computer, printer, and other hardware.
Installing
Refers to the use of computers to assist with manufacturing processes such as fabrication and assembly.
Computer-aided manufacturing (CAM)
A family member who uses a computer for a variety of reasons.
Home user
It includes any company with fewer 50 employees.
A small office/home office (SOHO)
Employees and students who work on a computer while away from a main office, home office or school.
Mobile users
Uses a workstation or other powerful computer to work with industry-specific software.
Power user
Works in or interacts with a company with many employees and uses a computer and computer network that processes high volumes of transactions in a single day.
Enterprise user
In finance, People use computers for __________
online banking/online investing
This is a case that contains electronic components of the computer used to
process data.
system unit
This is the main circuit board of the
system unit
motherboard
It is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
computer chip
This interprets and carries out the basic instructions that operate a computer.
central processing unit (CPU / processor
Processors contain a ___________ that directs and coordinates most of the operations in the computer.
control unit
It performs arithmetic, comparison, and other operations.
arithmetic logic unit (ALU)
get an instruction from Main Memory
fetching
translate it into computer commands
decoding
actually process the command
executing
write the result to Main Memory
storing
This is a set of four basic operations that the processor repeats for every instruction.
machine cycle
A processor contains small high-speed storage locations called ________.
registers
One gigahertz (GHz) equals
one billion ticks
On _________________, electronic components and most storage devices are part of the system unit and other devices, such as the keyboard, mouse, and monitor, normally occupy space outside the system unit.
desktop personal computers
To fit in notebook and many handheld computers, the keyboards usually are
smaller and have fewer keys
Hard copy is called a _____________
printout
____________ uses devices that emit and sense light to detect movement.
Optical mouses
the inflexible, circular platters on _______ use magnetic particles to store data, instructions, and information on a disk’s surface.
Hard Disks
A ____________ which is contained on an integrated circuit, can act as an electronic switch that opens or closes the circuit for electrical charges.
transistor
Some computers improve hard disk access time by using a
disk cache
It is a flash memory storage device that plugs in a USB port on a computer or portable device.
USB drive
Each tick of the system clock equates to a
clock cycle
An ________________, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
integrated circuit
They are special keys programmed to issue commands to a computer.
Function Keys
Optical discs usually are _______________.
4.75 inches in diameter and less than one-twentieth of an inch thick.
It is a self-contained unit that you insert in and remove from a slot or USB port in a device or a computer.
Pocket hard drive
This controls the timing of all computer operations.
system clock
The pace of the system clock is called the
clock speed
It consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data.
Memory
Loses its contents when the power is turned off.
Volatile memory
This is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit.
Dynamic RAM
has three different states. It can be in: standby (the circuit is idle), reading (the data has been requested) and writing (updating the contents).
Static RAM
Data in MRAM is not stored as electric charge or current flows, but by magnetic storage elements.
Magnetoresistive RAM
RAM chips usually reside on a ______________ and are inserted into memory slots.
memory module, memory
slots
The amount of ____ necessary in a computer often depends on the types of software you plan to use.
RAM
This speeds the processes of the computer
because it stores frequently used instructions and data.
Memory cache
It refers to memory chips storing permanent data and instructions.
Read-only memory (ROM)
It can be erased electronically and
rewritten.
Flash memory
It is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces.
hard disk drive
It is an optical disc storage media format.
DVD
It is an optical disc storage medium to supersede the standard DVD format. Its main uses are for storing PlayStation 3 games, high-definition video and data storage with up to 50GB per disc.
Blu-ray Disc
It consists of a NAND-type flash memory data storage device integrated with a
USB interface.
USB flash drive
It is a solid-state electronic flash memory data storage device capable of storing digital contents.
memory card or flash memory card
The __________, of a number system is
the total number of unique symbols
available in that system.
radix or base
The octal number system has a base, or radix, of ___
8
Binary number system has a base, or radix, of ___
2
Binary numbers are composed of two symbols: _____
0 and 1
The hexadecimal number system has a base, or radix, of ___
16
Hexadecimal numbers are composed of
sixteen symbols
consists of the programs that control or maintain the operations of the computer and its devices.
System software
Two types of system softwares
Operating systems and Utility programs
a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
operating system (OS)
The process of starting or restarting a computer
booting
Turning on a computer that has been
powered off completely
Cold boot
Using the operating system to restart a computer
Warm boot
It is the drive from which your computer starts
boot drive
saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-
power state
Sleep mode
saves any open documents and programs to a hard disk before removing power from the computer
Hibernate
It controls how you enter data and instructions and how information is displayed on the screen
user interface
With this, you interact with menus and visual images
graphical user interface (GUI)
The operating system determines the order in which tasks are processed
task scheduling
automatically configures new devices as you install them.
Plug and Play
a program that assesses and reports information about various computer
resources and devices.
performance monitor
It is a complete operating system that works on a desktop computer, notebook
computer, or mobile computing device
stand-alone operating system
It resides on a ROM chip on a mobile device or consumer electronic device.
embedded operating system
It is a type of system software that allows a user to perform maintenance-type tasks
utility program
detects and protects a personal computer from unauthorized intrusions
personal firewall
It describes a potentially damaging computer program that affects a computer negatively.
virus
It copies itself repeatedly in
memory or over a network
worm
It hides within or looks like a
legitimate program
Trojan horse
It protects a computer against viruses
antivirus program
It is a program placed on a computer without the user’s knowledge that secretly collects information about the user
Spyware
It displays an online advertisement in a banner or pop-up window
Adware
For email spams
Anti-spam programs
It consists of programs designed to make users more productive and/or assist with personal tasks
Application software
It is application software that assists
people while performing business activities
Business software
An organized collection of information which can easily be retrieved
database
allows users to create, access, and manage a database
Database software
allows users to create visual aids for presentations to communicate ideas, messages, and other information to a
group
Presentation software
is a Web site that allows users to access and interact with software from any computer or device that is connected to the
Internet
Web application
refers to a collection of multiple
pieces of equipment involved in the dissemination of
information.
information system (IS)
Common types of information systems
- Transaction processing systems
- Management information systems
- Decision support systems
- Executive information systems
Six elements of a Computer Based Informations System (CBIS)
- Hardware
- Software
- Data
- Procedures
- People
- Communication
It refers to the computers themselves, along with any and all peripherals, including servers, routers, monitors, printers and storage devices.
Hardware
It tells the hardware how to function. It gathers, organizes and manipulates data and carries out
instructions.
Software
This is the information part of an information system, and whether that is statistical data, sets of instructions, lists of
names or even graphics and animations, it is all key to a CBIS.
Data
Frequently covered in instruction or user manuals that describe how to use the hardware, software and data.
Procedures
Individuals who design and operate the software, input the data, build the hardware and keep it running, write the
procedures and it is ultimately people who determine the success or failure of a CBIS.
People
The components that allow one computer to communicate with another are hardware and are controlled by software.
Communication
It is related for a specific purpose or topic.
Set of data
A list of related information in columns and rows
Table
It is a database object that can be used to extract or show information in Datasheet view.
Query
It is a database object that you can use to enter, edit, or display data from a table or a query.
Forms
It is another database object which can be use to summarize information from a table or query.
Report
It can be used to create an action or set of actions that can be used to automate a task.
Macros
It is a field or set of fields in your table that
acts as a unique identifier for every row.
Primary Keys
It is a situation that exists between two
relational database tables when one table has a foreign key that references the primary key of the other table.
Relationships
It exist when a primary record from
the primary table has only one related record in the related table.
One-to-One relationship
It exist when a primary record from the primary table is related to many records in the related table.
One-to-Many relationship
It exist when a primary record from the primary table is related to many records in the related table AND a related record in the related table is also related to many records in the primary table.
Many-to-Many relationship
Drawbacks of using file systems to store data
Data redundancy and inconsistency
Difficulty in accessing data
Data isolation
Integrity problems
Atomicity of updates
Concurrent access by multiple users
Security problems
It is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
computer network
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver
Network Topologies
It is a network type in which every computer and network device is connected to single cable.
Bus topology
It forms a ring connecting all devices with
its exactly two neighboring devices.
Ring topology
All the devices are connected to a single hub through a cable.
Star topology
every device is connected to another
device via particular channel.
Mesh topology
It is a collection of two or more topologies which are described above.
Hybrid topology
It is a worldwide collection of networks that
links millions of businesses, government agencies, educational institutions, and individuals.
Internet
ARPANET
(Advanced Research Project Agency Network)
It oversees research and sets guidelines and standards
World Wide Web Consortium (W3C)
It is a business that provides individuals and organizations access to the Internet free or for a fee
access provider
It is a number that uniquely identifies each
computer or device connected to the Internet
IP address
It is the text version of an IP address
domain name
It translates the domain name into its
associated IP address
DNS server
It consists of a worldwide collection of electronic documents (Web pages)
World Wide Web
It is a collection of related Web pages and
associated items
Web site
It is a computer that delivers requested Web pages to your computer
Web server
It allows users to access Web pages and Web 2.0 programs
Web browser
It is the first page that a Web site displays
home page
It is the process of receiving information
Downloading
Unique address for a web page
URL or Web address
It allows you to open and view multiple
Web pages in a single Web browser window
Tabbed browsing
search engine
Refers to any application that combines text
Multimedia
It is a digital representation of nontext
information
graphic
It is a small version of
a larger graphic
thumbnail
It is the appearance of motion created by
displaying a series of still images in sequence
Animation
It includes music, speech, or any other sound
Audio
It is the process of transferring data in a
continuous and even flow
Streaming
consists of images displayed in motion
Video
It is the use of computers to simulate a
real or imagined environment that appears as a three-dimensional space
Virtual reality (VR)
It is a program that extends the capability of a Web browser
plug-in
It is the development and maintenance of
Web pages
Web publishing
It is the transmission of messages and files via a computer network
It allows you to create, send, receive, forward, store, print, and delete e-mail
messages
e-mail program
It enables users to speak to other
users over the Internet
VoIP
It is the code of acceptable Internet behavior
Netiquette
Action that causes loss of or damage to computer system.
computer security risk
Identifies and removes computer
viruses
antivirus program
Makes a network or Internet transmission appear legitimate
spoofing
Unique combination of characters that
identifies user
user name
It is private combination of characters
associated with the user name that allows access to computer resources
Password
personal identification number (PIN)
Authenticates person’s identity using personal characteristic
biometric device
It is act of stealing computer equipment
Hardware theft
It is act of defacing or destroying computer equipment
Hardware vandalism
Act of stealing or illegally copying software or intentionally erasing programs
software theft
It is illegal duplication of copyrighted
software
Software piracy
Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
license agreement
Process of converting plaintext (readable data) into ciphertext (unreadable characters)
encryption
unwanted electrical signal
Noise
drop in electrical supply
undervoltage
significant increase in electrical power
Overvoltage or power surge
Protects computer and equipment from electrical power disturbances
surge protector
In case of system failure or corrupted files
restore files by copying to original location
duplicate of file. program, or disk
backup
Moral guidelines that govern use of computers and information systems
computer ethics
rights to which creators are
entitled for their work
Intellectual property rights
Written guideline that helps determine
whether computer action is ethical
code of conduct
Right of individuals and companies to
deny or restrict collection and use of
information about them
information privacy
Small file on your computer that
contains data about you
cookie
It is unsolicited e-mail message sent
to many recipients
Spam
Scam in which a perpetrator sends an official looking e-mail that attempts
to obtain your personal and financial information
phishing
Process of restricting access to certain material
content filtering
Discovery, collection, and analysis of evidence found on computers and networks
computer forensics
when computer consumes entire
social life
Computer addiction
eye and vision problems
Computer vision syndrome
Applied science devoted to comfort, efficiency, and safety in workplace
ergonomics