Microcomputer Basics Flashcards

1
Q

Motherboard

A

Central Processing Unit - on motherboard
Arithmetic and logical calculations
Controls all internal and external devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motherboard - Memory

A

On motherboard

RAM-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cache stores

A

Near CPU-instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ROM

A

Non-volatile

Start up instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motherboard - Expansion Cards

A

Sound and video cards
Laptops use integrated components
Provides extra functionality
Fits into slots on motherboard and most have ports on back of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Video Card

A

Translates binary data into images
Includes HDMI ports
Usually have their own video RAM and processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sound Card

A

Cable connects to DVD/Blue Ray

Ports for audio, line, mice and joystick inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Motherboard - Network Interface Card (NIC)

A

Enables computer to connect to other computers and the internet.
Attaches to or is integrated into the motherboard.
Access to ethernet for wired networking or wireless network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Major Component - Power Supply

A

Provides power for all components and peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major Component - Hard Drive

A

Largest storage component of computer system.
In sealed case.
SSD or Platters
Connects to Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Major Component - DVD/Blue Ray Drive

A

Not normally available on laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Literacy

A

Understanding the capability and limitations of computers, and knowing how to use them safely and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elements of Computer Literacy

A
  1. Avoiding hackers and viruses.
  2. Protecting your privacy.
  3. Understanding the real risks.
  4. Using the web wisely.
  5. Avoiding online annoyances
  6. Being able to maintain, upgrade, and troubleshoot your computer.
  7. Knowing which technologies are on horizon and how to integrate them into your life.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LCD Monitors

A

Flat panel monitors are popular on new computers and as replacements or upgrades.
Most common
Light and energy efficient.
Fixed grid of pixels.
Cold Cathode Fluorescent Lamps (CCFL) to provide the backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pixel

A

Each is comprised of three sub pixels of red, blue, and green.
Blocking or passing of light causes images to form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LED Monitors

A

Newer, and use light emitting diode technology.

More energy efficient, better color accuracy, and thinner panels than LCD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OLED Monitors

A

Organic light emitting diode display.
Uses organic compounds that produce light when exposed to an electric current.
Do not require a backlight to function, so draw less power and have thinner displays than LCD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Choosing a Monitor

A

Two of the most important factors are:
Aspect ratio
Resolution
Consider size, resolution, and brightness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Aspect Ratio

A

One of most important factor.
The width to height proportion of a monitor.
Older were 4:3, newer are 16:9 (HD format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Resolution (monitor)

A

Dictated by the screen size and aspect ratio.
Clearness/sharpness of the image, reflects the number of pixels on the screen.
Max resolution of 1600x1200=1,600 vertical columns, with 1,200 pixels in each column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Contrast Ratio

A

Difference in light intensity between brightest white and darkest black a monitor can produce.
Ratios between 400:1 and 1,000:1 are good
Too low ratios results in fading colors when brightness is adjusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Viewing Angle

A

Measured in degrees; 150 degrees or more preferable.
Too low means you need to sit directly in front to get a good image.
Distance in degrees from which you can move to the side/above/below before the image degrades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Brightness

A

300 cd/m2 or greater (candelas per sq meter/nits)
Greatest amount of light showing when the monitor is displaying pure white.
Image hard to see in a bright room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Response Time

A

Lowest if viewing live action sports.
High results in jerky images.
Time in milliseconds it takes for a pixel to change color.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Monitors: Bigger always better?

A

No.

You can display more with a bigger screen, but using two smaller monitors may work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Monitors - Size Does Matter

A

HD-DVD-Blu Ray > 1920 x 1080 resolution

Larger monitors can create the effect of 2 separate monitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

LCD Monitor Sizes

A

Wide Screen-work with multiple windows or watch a lot of movies.
4:3=H is 3/4 of width (4units w x 3 units h)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ink Jet Printers

A

Spray tiny drops of ink onto paper.
Advantages: high-quality color printouts; good quality printers are affordable; images on the right paper look professional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Laser Printers

A

Static electricy signals where to print ink.
Faster than inkjet and higher quality printouts.
Price competitive, but more economical than inkjet long term when factoring in ink/toner.
Use toner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Choosing a Printer

A

Speed
Resolution
Color
Cost of consumables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Printer Speed

A

Measured in pages per minute

Black/white faster, esp. laser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Printer Resolution

A
A printer's image clarity measured in dpi
Recommended dpi:
  300  Black and white text
1,200  General purpose images
4,800 Photos
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Printer Color v. B and W

A

Best have separate cartridges for each color.
Inkjet and laser generally have 4:
black, cyan, magenta, yellow - standard
add light cyan and light magenta to high quality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Printer Costs of Consumables

A

Printer cartridges and paper.
Research in consumer magazines.
Some printer cartridges can exceed the cost of some printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How a LCD Monitor Works

A

A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals mov around, blocking light waves generated or letting them shine through.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Binary Numbers

A

Based on 0 and 1, off or on.
Each binary digit is called a bit.
Everything storable is encoded into binary.
Computer reads and outputs alpha-numeric characters, graphics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Base Systems

A

Place value gives meaning to the digits in a number.

  • Decimal - Base 10
  • Hexadecimal - Base 16
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Decimal System

A

A 3-digit decimal number has a:

  • 100’s place (10 2)
  • 10’s place (10 1)
  • 1’s place (10 0)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Hexadecimal System

A

A 3 digit hexadecimal number has a:

  • 256’s place (16 2)
  • 16’s place (16 1)
  • 1’s place (16 0)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Base Conversion

A

Humans use decimal (base 10) numbers.
Computers use binary (base 2).
Hexadecimal (base 16) is compromise.
-Represents larger numbers with fewer digits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Comparison of Decimal/Hexadecimal/Binary

A

Decimal - 256
Hexadecimal - 100
Binary - 000100000000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

RGB Systems

A

Represent color on monitor.
Each of 3 colors has value between 0-255.
The number scale represents how bright the light for that color shines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Color Values

A

White:
Red-255 / FF
Green-255 / FF
Blue-255 / FF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Smartphones are Computers

A
Hardware (CPU and storage)
Input/Output devices
Ports
Software
Sensors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Smartphone Input/Output Devices

A

Touch sensitive screen
Microphone
Keypad
Camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Smartphone Storage

A

ROM - OS
RAM - Data and application programs

Size dictates use of special processors and OS’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Smartphone Display

A

OLED displays
Resolution up to 1920 x 1080
Up to 6 inches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Smartphone Sensors

A
Accelerometers
GPS Chips
Light sensors
Proximity sensors
Barometers
Digital Compases
Biometric security (fingerprint/iris)
Magnetometer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Accelerometers

A

Detect shaking or rotation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

GPS Sensor

A

Location aware software.
System of satellites built by US Department of Defense.
Antenna to pick up signal from satellites and translate to latitude and longitude to within 10 feet.
Airplanes/Cars/Boats
Geotriggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Smartphone Connectivity

A

Internet - wireless and cellular
Bluetooth
NFC - car or bill paying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Smartphone Memory and Storage

A

Up to 256 GB internal memory
Internal or external micro SD cards-memory expansion
iPhone doesn’t allow addition of any memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Mobile Operating Systems

A

iPhone iOS
Google Android - most popular
Windows Based - less than 1% of mobile market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Cloud Storage

A

Backup - easy and safe
Photos - instant and synced
(Google photos available for iOS and Android for free, and is unlimited.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Main Artificial Intelligence Assistants

A

iOS - Siri

Android - Google Assistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

AI Assistants

A

Support voice commands.
Gather information you need based on your location or task lists.
Works in background w/no specific requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Google Assistant

A

What package being delivered by FedEx today
Learns from e-mail and web searches.
Remind you to leave for the airport based upon time.
Locate your frequent flyer number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Google Assistant

A

What package being delivered by FedEx today
Learns from e-mail and web searches.
Remind you to leave for the airport based upon time.
Locate your frequent flyer number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Phone Gadgets

A
Flir - window leaks
Kardia - EKG
BacTrac - breathalyzer
Ravensburger Smartscope
Skulpt Scanner - muscle scanner/analyzer
Automatic Pro - car's ODB-II port
Hidrate Spark - smart water bottle
Photomath - scan and get help solving math problems
Wilson X - basketball coach
iBobber - Fish finder
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Each ___ can represent one letter, number, or symbol?

A

Byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is a laptop that can convert into a tablet-like device?

A

A 2-in-1 PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Touch-screen devices usually feature _____ keyboards.

A

Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

The fastest computer port is the:

A

Thunderbolt.

10 gigabits per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Which computer component drains the battery the fastest?

A

Display screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Ergonomics

A

Important consideration for all computing devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

The most common output device for soft output is:

A

The display screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Display Monitor

A

Can be both an input and output device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Optical Storage Media

A

CD-ROM
DVD-ROM
DVD-RAM
Blu-Ray

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Types of Ports

A

Thunderbolt
HDMI
USB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

A power control option that performs a warm boot:

A

Restart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Byte

A

8 bits of data

Can hold a number between 0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Bits

A

Short for binary digit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Kilobyte

A

KB

1,024 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Bytes

A
Kilobyte  - one thousand (1,024)
Megabyte - one million (1,048,576)
Gigabyte - one billion (1,073,741,824)
 (786,432 pages of text)
Terabyte - one trillion
Petabyte - one quadrillion (1k terabytes)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Hertz

A

Machine Cycles per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Terabyte

A

More than 1 trillion bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

System Unit

A
Hard drive unit
Optical drive unit
Motherboard
Fan
Expansion Slots
Connectors
Power supply and fan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Expansion Hub

A

An expansion hub is a powered hub that is 2.0 and USB. It simply allows you to connect to devices that you were not able to connect to with a regular hub.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Flash Memory

A

Can store 256 GB of data
Often used in smartphones
PCMCIA Type I and Type II memory cards (used as solid-state disks in laptops)
Can be plugged directly into a USB port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Ethernet Port

A

Connects a computer to a cable modem or a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

USB Port

A

Commonly used for connecting input and output devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

DVI Port

A

Not generally for audio
Same capability as HDMI
Used to connect projectors to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

HDMI Port

A

Used for home theater systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

VGA Port

A

Used to connect CRT monitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Fastest Data Transfer Rate

A

USB 3.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What kind of numbering system is ordinarily used by people?

A

Decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Hexadecimal represents numbers by using which base?

A

Sixteen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In the RGB system, when all three component colors are set to zero, the result is?

A

Black

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

How many colors are used by the RGB system?

A

Three

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

A single hexadecimal number is represented by how many digits in the binary numbering system?

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What numbering system uses base 2?

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

When storing information in a computer, the binary system uses what to represent an on switch?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

When storing information in a computer, the binary system uses what to represent an off switch?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

For each numbering base system, the far right always has a place value of what?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

For each numbering base system, as you move to the left, the value of each digit becomes how much greater?

A

Exponentially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What numbering system is used in place of binary numbers because binary numbers are difficult to read?

A

Hexadecimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

In the RGB system, each color can have a value from what to what?

A

0-255

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

In the hexadecimal numbering system, each place value digit is how many times greater than the digit to its right?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

In the binary numbering system, each digit can have how many possible values?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

In what numbering system does each place value digit have ten times greater than the digit to its right?

A

Decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Computers store information in which numbering system, which is difficult, if not impossible for humans to read?

A

Binary, base two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

The Internet

A

A network of networks connecting billions of computers globally.
Evolved from a U.S. Government funded project called the Advanced Research Projects Agency Network (ARPANET). Needed a computer network that wouldn’t be disrupted in case of attack.
Established a secure form of communications.
Created a means of communication for all computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Client/Server Network

A

Client asks for data.

Server receives request and returns data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Internet Protocol (IP) Address

A

How computers identify each other.
Websites have unique IP addresses.
Text versions of IP addresses because IP addresses too hard to remember.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IP Address

A

Set of four groups of numbers separated by periods.
Dotted quad or dotted decimal.
Identifies a website.
Identifies a computer connecting to the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Web 2.0

A

Social Web.
Collaboration tools.
Social Media.
Includes social networking, wikis, blogs, podcasts, and webcasts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Social Networking

A

Facebook
Twitter
Many precautions for using social networking sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Project Collaboration and File Sharing Tools

A

Wikis
Project management tools
Blogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Blogs

A

Blog - weblog
Video log - vlog
A personal log or journal posted on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Wikipedia

A

A wiki, a web application that allows users to add, remove, or edit its content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Google Drive

A

Has wiki-like features to promote online collaboration.

Specific wiki software, such as Wikispaces and MediaWiki

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Wikipedia Foundation

A

Hosts other collaborative projects such as Wikibooks, Wikiversity, and Wikisource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Project Management Tools

A

Incorporate tasks and calendars so the individual components and project can stay on schedule.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Microblog

A

Blogs with limits on how much text can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Problems with Blogs

A

Spam blogs - splogs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Podcast

A

A form of digital media composed of a series of audio or video files that are distributed over the internet.
Delivered via RSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

RSS

A

Really Simple Syndication

Delivers podcast automatically to an aggregator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Aggregator

A

Receives RSS podcast feeds.

Locates all the RSS series to which you’ve subscribed and automatically downloads the new content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Webcast

A

Broadcast of audio or video over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Media Sharing Platforms

A

YouTube, Flickr, Instagram, Sound Cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Communicating over the Web

A

E-mail
Instant Messaging
Texting
VOIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

E-Mail

A

Primary means of communication over the internet.
Fast and convenient means of exchanging and collaborating on documents via attachments.
Two types are web based and using e-mail client
Asynchronous
More private than social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Asynchronous

A

e-mail

Users don’t need to be communicating at the same time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Instant Messaging

A

Real time
AIM, Google Chat, Windows Messenger are proprietary IM services
Synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

Proprietary IM Services

A

Chat with only those who share the same IM service and are on buddy list.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Universal Chat Services

A

Allow you to chat with users of all popular IMs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Texting

A

Sending of messages between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Voice over Internet Protocol (VOIP)

A

Uses the internet to make phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

e-Commerce Business Models

A

Business to Consumer (B2C)
Business to Business (B2B)
Consumer to Consumer (C2C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Business to Consumer (B2C)

A

Business sells to consumers

Amazon.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

Business to Business (B2B)

A

Business sells to other businesses
Paper company that distributes paper to other companies.
Omahapaper.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

Consumer to Consumer (C2C)

A

Consumers sell to other consumers

ebay.com, craigslist.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Electric Commerce (e-commerce) Safeguards

A

Use secure websites - secure sockets layer protocol.
Well-known, reputable sites
Pay by Credit, not Debit card.
Copy order, confirmation number and return policy
Avoid shopping on public computers.Bro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

Secure Website

A

SSL protocol

URL is “https://”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Browser

A
Software that lets you locate, view, and navigate the web.
Most are graphical.
Google Chrome
Microsoft Edge
Firefox
Safari
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Graphical Browsers

A

Can display pictures in addition to text, sound, and video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

Google Chrome

A

Most popular browser
Can run on any device and with any OS
Sync between devices open tabs, bookmarks recent search results.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Microsoft Edge

A

Available only on Windows 10

Requires Microsoft Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

Firefox

A

Open source
Mozilla
Lets you keep only the features you want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

Safari

A

Developed by Apple for Mac

Has a Windows version for PCs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

Universal Resource Locator (URL)

A

Use to access a website.

Identify the web document it stands for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Protocol

A

Set of rules used to retrieve a document.

  1. Hypertext Transfer Protocol
  2. File Transfer Protocol
  3. BitTorrent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

Domain Name

A

Main domain name is a site’s home page.

http://newyorktimes.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

URL

A
http://www.nytimes.com/pages/technology
Protocol: http:
Domain: www.nytimes
Top Level: .com
Path/sub-directory: pages/technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Hyperlinks

A

Specially coded elements that let you jump from one web page to another within the same website or to another website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Breadcrumb Trail

A

Help navigate more quickly through a website.

A navigation aid that shows users the path they have taken to get to a web page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

History

A

List that shows all the websites and pages you’ve visited over a certain period of time.
Organized by day, up to 3 weeks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Bookmarks

A

Allows you to return to a specific web page without having to remember the address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

Live Bookmark

A

A feature in Firefox that adds the technology of RSS feeds to bookmarking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

Tagging/Social Bookmarking

A

Saves your favorite website to a social bookmarking site so you can share it with others.
Delicious.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Search Engine

A

A set of programs that searches for keywords and returns a list of websites on which those keywords are found.
Search only sites that are relevant.
Metasearch searches other search engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Metasearch Engine

A

Searches other search engines rather than individual websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Spider

A

Search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Obtaining Better Search Results

A

Boolean Operators
Search for a phrase
Search within a website
Search with a wild card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

Evaluating Websites

A
Authority
Bias
Relevance
Audience
Links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Digital Activism

A
Raise awareness about specific issues.
#IceBucketChallenge
#BringBackOurGirls
Question if effective or fosters a false sense of involvement.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

Geolocation

A
GPS chip that can calculate exact position
Targets consumers by their location
Used by 3rd party advertising networks
Can be a violation of privacy rights
No specific laws yet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Using the Web Effectively

A

Accessing and moving around the web
Searching the web effectively
Using the web ethically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

Tools used to Navigate the Web

A
Hyperlinks
Breadcrumb trail
Bookmarks
History
Tagging
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Visual Indications of Secure Website

A

https://
Closed padlock and green-colored address bar
Consider the validity of the site.
TRUSTe and Better Business Bureau

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Safe on-line Shopping

A

Investigate unknown sites with bbb.org or bizrate.com
Check return policy, save copy of order, make sure you receive a confirmation number.
Make sure company has phone number and address.
Pay with credit, rather than debit card.
Use common sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

Credit Cards

A

U.S. federal consumer credit card protection laws protect credit card purchases, not debit card purchases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

Click and Brick business

A

Business with both a traditional and on-line store.

Barnes and Nobles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

Social Commerce

A

A subset of e-commerce that uses social networks to assist in marketing and purchasing products.
“Liking” a company.
Ordering a latte and paying w/Starbucks app.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Avoid Shopping on Public Computers

A

May have spyware installed that can track and log keystrokes.
Also avoid wireless transactions in public hotspots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

HTTP

A

Hyper Text Transfer Protocol
Start most URLs
Enables files to be transferred from a web server so you can see them on your browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

FTP

A

File Transfer Protocol

Used to upload and download files from one computer to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

TLD

A

Top Level Domain
Indicates the kind of organization the host is.
The three-letter suffix
.com - originally commercial, but now all
.biz - Businesses
.edu - Degree granting institutions
.gov - Local, state, and federal
.info - Information service providers
.mil - U.S. military
.net - originally for networking, but now all
.org - organizations such as not-for-profits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

Blogs

A

One of the most popular ways of sharing content on web.
Web log
A journal posted on the web.
Usually written by a single author, arranged as a list, and are public, and can be created by anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

Setting up a Blog

A

Blogger.com
Sign up and create a blog name.
Accessible with a google account.
New blog, create a name, pick a design template, create URL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

Posting Content to a Blog

A

Click on new post icon next to heading.
Type title for entry in post title box, then content.
Click Link to create a URL for your post.
Insert Image to add a photo.
Click preview to preview blog.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Reader Comments on Blogs

A

Feedback helps shape future entries and direct you to other blogs you may find interesting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

Mobile Blogging

A

Install blogger app on smart phone.

Add, edit content, send links or location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

Set up a Blogger Profile

A

Don’t provide personal information and let others know your personal interests.
Click the icon near your name and click blogger profile link, add photo, link to home page, save profile button.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Searching for Blogs

A

Many directories
Blogs.botw.org
blogsearchengine.com
blogcatalog.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

Differentiate between Keyword and Metasearch Engines

A

Google vs. dogpile/info.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Keyword Search Engines

A

Google or Bing

Not sorted, returns a list of websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Metasearch Engines

A

Dogpile or info.com
Search engine that searches other search engines.
Combine and compare results from multiple search engines to make search the web more efficient.
Eliminates duplicates and searches for relevancy for more complete listing in less time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Different Search Engines

A
ChaCha - Human search engine
Technorati - Blog search engine
Monster - Job search engine
Blinkx - multimedia metasearch engine
TheSearchEngineList - Comprehensive list of search engines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

Alternative Search Engines

A

ChaCha - Human search engine
Technorati - Blog search engine
Monster - Job search engine
Blinkx - multimedia metasearch engine (YouTube)
TheSearchEngineList - Comprehensive list of search engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

Effective Searches

A

Ensure terms are not too broad.
Use a minus sign to exclude some results.
Find synonyms ~
Specific file types: Info:, Define:, Numrange “..”
Quotes for exact search terms
Google has modifiers under search box (video, Images)
Google, click settings, Advanced Search for search form
LearnTheNet.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

Networking Sites

A
Media Sharing
Business Networking and Collaboration
Information Sharing
e-Commerce and Payment
Social Travel
Health and Fitness
Wiki
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Media Sharing Sites

A
Instagram
YouTube
Pinterest
Flickr
Periscope
Vine
Bandcamp
Spotify
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Business Networking and Collaboration

A

LinkedIn
Slack
Kickstarter
StartupNation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Information Sharing

A
Delicious
SlideShare
StumbleUpon
Reddit
Digg
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

ASCII Code

A

Developed as the standard for computers from different manufacturers to exchange data.
Character to binary.
1963

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

Advanced Research Projects Agency (ARPA)

A

1958 Established for the US Department of Defense.

Created ARPANET, the beginnings of the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

First Internet Message

A

1969 by UCLA sent first internet message to Stanford University. Beginning of network communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

Ray Tomlinson

A

1972 wrote program to send e-mail over ARPANET
Develops “User@host” e-mail convention.
1978 there were 111 Internet domains on ARPANET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

Vincent Cerf and Robert Kahn

A

1973 developed a set of communication rules - the TCP/IP protocol that allows different types of computers to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

Tim Berners-Lee

A

Developed and made public HTTP protocol and WWW.

Developed the first web browser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

WWW

A

1991 A subset of the Internet that is connected via hypertext (text containing hyperlinks to other documents and media.
1997 1million internet domains on ARPANET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

Client Server Network

A
  1. User enters www.amazon.com in browser (client.)
  2. Request sent to servicer via data pathways.
  3. Data flows along backbone and on to smaller pathways until it reaches server for Amazon.
  4. Server returns requested data using fastest pathway (which may be different than arrival path.)
  5. Web browser interprets the data and displays it on your monitor.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

IP Address

A

Identifies your computer.

A set of 4 numbers separated by periods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

e-Commerce and Payment

A

Venmo
Paypal
SquareCash
Groupon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

Social Travel

A

Uber
Airbnb
TripAdvisor
Wase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

Health and Fitness

A

MapMyFitness
Fitocracy
MyFitnessPal
Happier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

Wiki

A

Project collaboration and file sharing.

Screen sharing, project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Social Media Sharing

A
Blogs
Podcasts
Webcasts (realtime)
e-mail (most common)
Instant Messaging
Texting
VoIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Podcast Directories and Aggregators

A

iTunes (itunes.com)
Podfeed (podfeed.net)
Stitcher (stitcher.com)
YouTube (youtube.com)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

Web Based email vs. e-mail Client

A

Accessible from any computer with internet.

Software installed on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Instant Messaging

A

Real time exchange.
Used by multiple persons simultaneously,
Video/audio chats available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Text Messaging

A

Uses short messaging service (SMS) to send asynchronous messages between multiple mobile devices.
Can include images or video.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

VoIP

A

Voice communication via Internet
Free or low cost calls
Some reliability issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

OnLine Shopping Precautions

A
Use a firewall and antivirus
Don't shop on public wifi (spyware)
Check for visual indicators (https, padlock, green)
Third party verification (BBB)
Use credit, not debit card.
Create a strong password.
Deals too good to be true usually are.
Read the fine print.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

Common Browser Features

A

Privacy browsing
Tabbed browsing
Address bar/search box
Pin tabs of favorite sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

Google Specialized Search

A
Custom Search
Finance
Trends
Shopping
Scholar
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

Boolean Operators in Searchers

A

Use AND, NOT, OR between keywords in a search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

Cloud Storage

A

OneDrive
Dropbox and GoogleDrive alternatives
No more flash drives needed
Share File or Folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

Letter K

A

01001011

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

What factors should you consider processor speed?

A

Processor speed is a measure of how many tasks the main chip can perform in 1 second.
Other factors such as the number of cores, cache memory, and FSB, how fast data is exchanged between the CPU and RAM.

212
Q

Machine Cycle (hertz Hz)

A

Machine cycles per second.
The process of the CPU getting the data or information from RAM and decoding the instructions into something the computer can understand.
The CPU executes and stores the results back into system memory.

213
Q

What size hard drive do I need?

A

Consider storage needs as well as any external forms of storage you may use.
Today’s internal drives have capacities of 8Tb or more.

214
Q

External Hard Drives

A

Internal hard drives that have been made portable by enclosing them in a protective case and making them small and lightweight.
Used to backup internal hard drive.

215
Q

Flash/Jump/USB/Thumb Drives

A

Significant storage capacity, up to 256 Gb.

216
Q

Cloud Storage

A

Keeps your files on the Internet.
Requires that you install software on device.
Dropbox, OneDrive, iCloud, Google Drive.

217
Q

Flash Memory

A

Your computer will need a slot into which you can insert the flash memory card.
Also memory card readers that plug into a USB port.
Digital cameras, smartphones, video cameras, and printers.
Use Solid State Flash memory, and have capacities that exceed DVD’s.

218
Q

Ports

A

Places which peripheral devices attach to the computer to exchange data.

219
Q

Adding Ports to your System

A
Expansion cards (clip into expansion slot on motherboard.)
Expansion hub.
220
Q

Expansion Hub

A

A device that connects to one port to provide additional new ports.

221
Q

Thunderbolt Port

A

Newest input/output technology.
Uses fiber optic technology and can achieve extremely fast transfer speeds.
Apple the first to integrate.

222
Q

USB (Universal serial bus) Ports

A

Most common to connect input/output devices to the computer.

USB 3.1 up to 10 Gbps and charges devices faster.

223
Q

Ethernet Ports

A

Connect to a DSL or cable modem, or network.

Transfer speeds up to 10,000 Mbps.

224
Q

HDMI Port

A

High definition multimedia interface.
High definition video and uncompressed digital audio in one cable.
All monitors, DVD payers, TVs and game consoles have at least one.

225
Q

Types of Ports

A

USB
Ethernet
HDMI
Thunderbolt

226
Q

Which browser feature enables you to secure a tab permanently?

A

Pinned tabs

227
Q

What is a Specialty Search Engine?

A

Searches only sites deemed appropriate to an interest or industry.

228
Q

Two Basic Types of Software

A

Application software

System software

229
Q

Software

A

A set of instructions that tells the computer what to do.

230
Q

Application Software

A

Is used to do tasks at home, school, and work.

231
Q

System Software

A

Helps run the computer and coordinate instructions between application software and the computer’s hardware devices.

232
Q

Ways to Distribute Software

A

Local installation
Software as a service (SaaS)
Subscription

233
Q

Ways to Purchase Software

A
DVD from brick and mortar store
Download from internet
Student discounts
Freeware
Beta Versions
234
Q

Installing Software

A

System requirements
Create a restore point
Full installation vs. custo installation
Recovering from a computer crash using a recovery drive

235
Q

Uninstalling Software

A

Removes the software from your hard drive.

236
Q

Upgrading Software

A

Upgrades and updates are not required if you have a subscription to the software or are using software as a service.
You don’t need to rush to get every upgrade
Many software is backward compatible.

237
Q

Backwards Compatibility

A

Vendors make new versions backward compatible, meaning that the new versions can recognize and open files created with older versions.

238
Q

Software Licenses

A
End User License Agreement (EULA)
Ultimate owner of the software;
Whether copies can be made;
Number of installations allowed;
Warranties.
239
Q

Two Categories of Software

A

Productivity and Business Software

Multimedia and Educational Software

240
Q

Productivity and Business Software

Installed-Proprietary

A

Microsoft Office

Apple iWork

241
Q

Productivity and Business Software

Installed-Open Source

A

LibreOffice

242
Q

Productivity and Business Software

Web-Based

A

Microsoft Office Online
Google Docs
Zoho
ThinkFree

243
Q

Microsoft Office

A
Word
Excel
PowerPoint
Access
OneNote
Outlook
244
Q

Apple iWork

A

Pages
Numbers
Keynote

245
Q

LibreOffice

A

Writer
Calc
Impress
Base

246
Q

Microsoft Office Online

A
Word
Excel
PowerPoint
OneNote
Outlook
247
Q

Google Docs

A

Docs
Sheets
Slides
Gmail

248
Q

Zoho

A
Writer
Sheet, Books
Show
Creator
Notebook
249
Q

ThinkFree

A

Write
Calc
Show
Note

250
Q

Word Processing Software

A
Create and edit documents for:
Research papers;
Class notes;
Resumes.
Microsoft Word (most popular) or Zoho Writer
251
Q

Spreadsheet Software

A
Performs calculations and numerical analyses.
Text;
Values and dates;
Formulas;
Functions.
Microsoft Excel; Apache OpenOffice Calc
252
Q

Presentation Software Tips

A

Use images;
Be careful with color;
Use bullets for key points, limit 4-6 per slide;
Consider font size and style;
Keep animation and background audio to a minimum.

253
Q

Database Software

A
Store and organize data in:
Fields-a data category
Records-related fields
Tables-related records
Oracle, MySQL, Access
254
Q

Note Taking Software

A

Research, brainstorming, and collaboration. Organize notes into tabbed sections.
Access from other office applications.
OneNote
Evernote

255
Q

Personal Information Manager Software

A

Manage e-mail, contacts, calendars, tasks.
Outlook is most widely used PIM.
Web-based PIMs-Google, Yahoo!-similar to Outlook
Other Options-Toodledo-coordinates well with Outlook, OmniFocus for Mac.

256
Q

Productivity Software Features

A

A wizard walks through the steps necessary to complete a task.
A template is a predesigned form.
A macro is a small program that groups a series of commands.

257
Q

Personal Financial Software

A

Manage daily finances;
Electronic checkbook registers;
Automatic bill payment tools
Intuit Turbo Tax and HandR Block at Home for tax preparation.

258
Q

Software for Large and Specialized Businesses

A

Vertical market software is designed for a specific industry.
Computer-aided design (CAD) creates automated designs, technical drawings, and 3D model visualizations.
SketchUp Make for home/landscape planning.

259
Q

Small Business Software

A

Accounting software to track accounts receivable and payable, inventory, payroll, and billing.
Desktop Publishing software (DTP)
Web Authoring software

260
Q

Desktop Publishing Software

A

Newsletters, catalogs, annual reports or other large complicated publications.

261
Q

Multimedia Software

A

Required to produce computer games, animations, and movies.
Photo and image editing;
Digital audio and video-editing.

262
Q

Drawing Software

A
Two dimensional, line based drawings.
Technical diagrams.
Animations
Adobe Illustrator
Home and landscape with Broderbund.
263
Q

Digital Audio Software

A
Digital audio files
Downloaded music files, audiobooks, or podcasts.
Compressed: MP3 (most common), ACC, WMA
Uncompressed: WAV, AIFF
Digital audio workstation software.
Audio-Editing software.
264
Q

App Creation Software

A

Create characters to extend a game: EverQuest, Oblivion, Unreal Tournament
Create your own games: Unity, Adobe Flash, RPG Maker VX, GameMaker

265
Q

Educational and Reference Software

A
Test Preparation;
Simulation;
Instructional;
Trip Planning;
Home Design/Improvement;
Course Management;
Brain Training;
Genealogy; 
Typing, languages, cooking.
266
Q

Freeware

A

Copyrighted software that certain program developers distribute for free.
Filehippo.com and majorgeeks.com

267
Q

Open Source Software

A

Free software that is available with few licensing and copyright restrictions.
Offer little or no formal support except by community of users.
Community of users keep it current.

268
Q

Beta Versions

A

Free of charge.

Still under development, but developers hope users will report errors or bugs.

269
Q

Installing Beta, Open Source and Freeware

A

Always set a restore point before downloading any kind of software.
Only use programs designed to work with your operating system.
Wait until last version is released.
Stick with reliable developers.
Make sure virus protection is up to date.

270
Q

Software for Students

A

Students may be able to buy regular software at discount prices from a campus computer store or bookstore, on-line or mail-order.
Some software developers offer discounts to students.

271
Q

How do I know if the software I buy will work on my computer?

A

Every software has a set of minimum requirements for the operating system, processor, primary memory (RAM) and hard drive, video card, and peripherals.

272
Q

Do you have to do anything special if you’re downloading software from the internet?

A

For the most part software is downloaded in a zipped format and automatically, without special interaction.

273
Q

Installing Software

A

Must be installed on hard drive.
May differ between DVD or from the web.
Both usually offer installation wizards.

274
Q

Full or Custom Installation

A

Full copies all program files to computer while Custom you decide what features to install.

275
Q

Installing Downloaded Software

A

Locate the setup.exe file, and take recommended actions to complete the installation.

276
Q

Uninstalling Software

A

Go to the Programs and Features in the Control Panel and choose the application you want to delete.

277
Q

Uninstalling Software in Windows 8-10

A

Right click the program tile on the Start Screen and then select Uninstall.

278
Q

Uninstalling Software using the Programs and Features Icon in the Control Panel

A

Choose Uninstall, Change or Repair.

Uninstall will run the proper cleanup routine to clear all files and restore settings that have been changed.

279
Q

Productivity Software Suites

A

Includes word processing, spreadsheet, presentation, database, and PIM programs.
For Microsoft (proprietary) software its cheaper to buy the suite than individually.
Include installed as well as web-based.

280
Q

What sort of software would I use to create a website?

A

Squarespace and Adobe Dreamweaver are two programs that both professionals and casual web page designers use to create web pages.
MSOffice also lets users convert to a web-compatible format.
Also web-page authoring software

281
Q

Web Page Authoring Software

A

Allows the novice to design interesting and interactive web pages without knowing any HTML code.
Often include wizards, templates, and reference materials.
Squarespace and Adobe Dreamweaver.

282
Q

What software do I need for designing a newsletter?

A

Many word processing programs have features that are hallmarks of desktop publishing.
For professional projects use QuarkXPress and Adobe InDesign.

283
Q

Desktop Publishing Software

A

Tools you can use to format and arrange text and graphics.
Also import files from other sources, manipulate graphics, and publish files to web.
QuarkXPress and Adobe InDesign.

284
Q

Adobe Photoshop Elements

A

A good basic program for casual users.

Correct red eye, improve color balance, touch up, and add creative effects.

285
Q

Full-Featured Image Editing Software

A

Adobe Photoshop and Corel PaintShop Pro.
Layering images and masking images.
Create enhanced digital images used commercially in logos, advertisements, and on book and CD covers.

286
Q

Digital Video Editing Software

A

Edit and manipulate digital video.
Most moderately priced software have enough features for the casual user.
Microsoft Movie Maker is free.
Adobe Premiere Pro is premium software.

287
Q

Adobe Illustrator

A

Tools to create professional quality creative and technical illustrations.
Pencils, pens, and paintbrushes.
Drag geometric images and use paint bucket, eye-dropper, and spray can tools.

288
Q

Computer Aided Design Software

A

3D modeling engineers use to create automated designs, technical drawings, and model visualizations.
Can be rotated.

289
Q

CAD Projects

A

Medical engineering-solid models of human anatomy for medical implants.

290
Q

Simulation Software

A

Educational software that allow you to experience or control the software as if it were an actual event, such as flying a plane.

291
Q

Course Management Software

A

Blackboard.

Provide traditional classroom tools such as calendars, and grade books over the internet.

292
Q

Windows Calculator

A

Converts between decimal, binary, and hexadecimal.

293
Q

How each system represents values:

A

Decimal
0 1 2 3 4 5 6 7 8 9

Hexadecimal
0 1 2 3 4 5 6 7 8 9 A B C D E F

Binary
0 1

294
Q

Binary Digits Converted to Hex

A

A 16 digit binary pattern converts to a 4 digit hexadecimal value.
1110-0011-1000-1011 = E38B

295
Q

Hex Codes

A

www.psyclops.com/tools/rgb

296
Q

Binary to Hex Conversion

A
0      0000               8      1000
1       0001                9      1001
2      0010                A      1010
3      0011                 B      1011
4      0100                C      1100
5      0101                 D      1101
6      0110                 E      1110
7      0111                  F      1111
297
Q

HTML Proramming Colors

A

FFFFFF White
000000 Black

Red/green/blue: 153, 51, 255
Hex Code: 9933FF

298
Q

Programming for End Users

A

Macros

299
Q

Macro

A

Small program that groups series of commands so they run as a single command.
Used to automate routine tasks or complex series of commands that must be run frequently.
MSOffice includes Visual Basic (VBA) to provide functionality for recording macros (procedures.)

300
Q

Advantages of Macros

A

Simplify complex tasks.
Reusable.
Can be edited and changed.

301
Q

Creating a Macro in Word

A

Add the Developer tab to the ribbon.
Record a macro in Word to insert a table.
Run the macro.
No blank spaces.

302
Q

Insert Developer Tab in Word

A

File tab, Word Options, Customize Ribbon, Commands, Click Developer Box

303
Q

The easiest way to automate a task in Word is to:

A

Perform the task while recording a macro.

304
Q

Software as a Service

A

When a vendor hosts software on a website and you don’t need to install the software on your device.

305
Q

Copyleft

A

The practice of offering people the right to freely distribute copies and modified versions of open source software with the stipulation that the same rights be preserved in derivative works down the line.[1] Copyleft software licenses are considered protective or reciprocal, as contrasted with permissive free software licenses.

306
Q

App Inventor

A

Software package that can be used to create mobile applications.

307
Q

Benefits of Simulation Programs

A

Help prevent costly errors.
Allow users to experience or control the software as if it were an actual event.
Allow users to experience potentially dangerous situations without risk.

308
Q

Bloatware

A

Pre-installed software that is best to delete if not used.

309
Q

Moodle

A

Course management software.

310
Q

How many binary digits are represented by one hexadecimal digit?

A

4

311
Q

Each digit in a hexadecimal number represents how many bits?

A

4

312
Q

The decimal number 12 is represented in hexadecimal as:

A

C

313
Q

Expressed in base systems the RGB range is:

A

00000000-11111111 Binary
00-FF Hexadecimal
0-255 Decimal

314
Q

Operating System Consists of what 2 primary types of programs:

A

Operating system

Utility programs

315
Q

Operating System Functions

A
  1. Manages computer’s memory and storage.
  2. Consistent means for application software to work with CPU.
  3. Manage, schedule and coordinate tasks. An orchestra’s conductor.
    Other:
    Provide a user interface.
    Manages computer hardware and peripherals.
    Manages the processor.
    Includes utility programs.
    Ability to multitask.
316
Q

User Interface

A

How the user interact with the computer.
Includes desktop, icons, and menus.
OS Function

317
Q

Utility Program

A

A small program that performs many of the general housekeeping tasks such as system maintenance and file compression.
OS Function

318
Q

Multitasking

A

Provide the ability to perform more than one process at a time.
OS Function.

319
Q

Common Operating Systems, Developers

A
Windows, Microsoft
macOS, Apple
iOS, Apple
Android, Google
Linux, Open Source
320
Q

Operating Systems, Devices

A
Windows, laptop, tablet, desktop, all in one, smartphone.
macOS, laptop, desktop, all in one.
iOS, tablet, iphone, iPod touch.
Android, smart phone, tablet
Linux, laptop, desktop, tablet
321
Q

Top 3 Operating Systems

A

Windows
macOS
Linux

322
Q

Top 3 Mobile Operating Systems

A

Android
iOS
Window

323
Q

Top Web-Based OS

A

Google Chrome OS

Main functionality provided through browser and virtually no filed copied to computer

324
Q

OS for Machinery, Networks, Business

A

Real-Time OS (RTOS)

Multiuser Operating System

325
Q

Real-Time OS (RTOS)

A

Machine that performs repetitive series of specific tasks in precise time.
Cars, medical scanning equipment, robotic camera.
Require minimal user interaction.

326
Q

Multi-User Operating System

A

Network OS
Allows multiple users access to the computer at the same time.
Unix.

327
Q

Unix

A

A multiuser, multitasking OS that is used as a network OS.

328
Q

What the OS does

A

Enables user to interact with the computer.

329
Q

Types of Interfaces

A

Command driven interface.
Menu-driven interface.
Graphical user interface (GUI).

330
Q

Command Driven Interface

A

Enter commands to communicate with the computer system.

331
Q

Menu-Driven Interface

A

Choose commands from menus displayed on screen.

Eliminated need to know all commands.

332
Q

Graphical User Interface (GUI)

A

Current OS use UGI.

Display graphics and use the point and click technology of the mouse and cursor.

333
Q

Spooler

A

A program that helps coordinate all print jobs currently being sent to the printer.

334
Q

Preemptive Multitasking

A

The OS processes the task assigned a higher priority before those assigned a lower priority.

335
Q

Interrupt Handler

A

A special numerical code that prioritizes requests.

Every device has its own type.

336
Q

Hardware Coordination

A

Event created by all activity in each device.
Device interrupt establishes priority.
Event placed in interrupt table in computer’s RAM.
The OS performs preemptive multitasking.

337
Q

Hardware Coordination Flow

A
  1. CPU playing a movie.
  2. CPU receives an interrupt request from the printer.
  3. Memo about movie stored in stack (RAM).
  4. CPU executes printing.
  5. Memo about movie retrieved from stack.
  6. CPU resumes playing movie.
338
Q

Paging

A

The process of swapping.

339
Q

Thrashing

A

Excessive paging.

340
Q

Swap File

A

Data and instructions that haven’t been used recently are moved to a temporary storage area on hard drive.
When more RAM needed than is available.

341
Q

Virtual Memory

A

Borrowed space from hard drive.

Increasing RAM can avoid using virtual memory.

342
Q

Device Driver

A

A special program on each connected device that facilitates communication between that device and the OS.
Manage peripherals and hardware.

343
Q

Hardware and Peripheral Device Mgmt.

A
Device Driver (Seagate GoFlex Desk USB)
Plug and Play
344
Q

Plug and Play (PnP)

A

A hardware and software standard.
Facilitates the installation of new hardware in PCs by including in the OS the drivers the devices will need in order to run.

345
Q

Software Application Coordination

A

Application programming interfaces (API).

346
Q

Application Programming Interface (API)

A

Blocks of code in each program the CPU recognizes.
Used for the similar procedures in each program.
Microsoft Direct X

347
Q

Microsoft Direct X

A

A group of multimedia APIs built into the Windows OS.

Improves graphics and sounds.

348
Q

Boot Process (4 steps)

A
  1. CPU activates BIOS
  2. Power-On Self-Test (POST)
  3. Load OS from hard drive to RAM
  4. Checking registry for configurations and customizations.
349
Q

BIOS

A

Located in ROM.
Activated by CPU Basic input/output system
Responsible for loading the OS into RAM.
Manages the exchange of data between the OS and the input/output devices.
First task of BIOS is to activate POST.
Goes through preconfigured list of devices then loads OS into RAM from hard drive.
Step 1 of boot process.

350
Q

Power-On Self-Test

A

Ensures that essential peripheral devices are attached and operational.
Step 2 of boot process.
1. Tests the video card and video memory.
2. Identifies the BIOS.
3. Tests that the memory chips are working.
4. BIOS compares POST results with CMOS.

351
Q

Loading the OS

A

System files are loaded into RAM.
Loads Kernel.
Step 3 of boot process.

352
Q

Kernel

A

Supervisor program.
The essential component of the OS that manages the processor and all other components.
Memory Resident.
Loaded into RAM in step 3 of boot process.

353
Q

Checking Configurations/Customizations

A

OS checks registry for configurations used by the OS and applications.
Non resident copies to RAM as needed.
Step 4 of boot process.

354
Q

Registry

A

Contains configurations used by the OS and applications.

Display settings for monitor.

355
Q

The Main Features of the Windows Interface

A
Desktop
Taskbar
Start Menu
Pinning
Virtual Desktops
356
Q

How Does OS Keep Computer Organized

A
Hierarchical organizational/directory structure.
Root Directory (c://)
Drives
Libraries (music)
Folders
Subfolders
Files
357
Q

Utility Programs

A

Tools Used to Enhance Productivity, Back up Files, and Provide Accessibility.
Small applications that perform special functions.

358
Q

Desktop

A

Primary working area.
Shows task bar at the bottom.
Windows interface.

359
Q

Start Menu

A

Provides access to all applications and apps installed on your device.
Windows interface.

360
Q

Virtual Desktops

A

Allow you to organize groups of windows into different displays.
Windows interface.

361
Q

Linux

A

Most interfaces are based on Windows and mOS paradigms.
Ubuntu.
Using icons to launch programs and apps running in a window environment.

362
Q

Naming Conventions (Files)

A

Up to 255 characters.
Each OS has their own naming conventions.
Name followed by type extension (.doc)
No 2 files stored on the same device or folder can share both the same file name and extension.

363
Q

File Explorer

A

Main tool for finding, viewing, and managing the contents of the computer.
Divided into left and right sections.

364
Q

Large Icons

A

Good way to display contents of files and folders.
Preview pane shows first page of document.
Good way to view files and folders, especially images.

365
Q

File Management Actions

A
Open
Copy 
Cut
Rename
Delete
Recycle Bin
366
Q

File Compression

A

Compacts a large file making it easier/faster to e-mail, upload to web, or save to disc.
Windows has built in compression.
Free/share ware such as WinZip and Stuffit.

367
Q

How are Files Compressed?

A

Redundancies in a file are removed.
Right click on folder/file, Send to, Compressed (zipped) folder.
File Explorer, click Share tab, Zip.

368
Q

Utilities included in OS

A

The basic utilities designed to manage and tune the computer hardware.
Firewall and file compression utilities.

369
Q

Standalone Utilities

A

Offer more features or an easier user interface for backup, security, diagnostic, or recovery functions.
Antivirus and Security programs.

370
Q

Windows Administrative Utilities

A

System perfomance utilities.
File and system backup utilities.
Accessibility utilities.

371
Q

System Performance Utilities

A

Windows Administrative Utilities.
Disk Cleanup
Task Manager
Disk Degragmenter

372
Q

File/System Backup Utilities

A

Windows Administrative Utilities.
File History
System Restore

373
Q

Accessibility Utilities.

A

Ease of Access Center.

Windows Administrative Utilities.

374
Q

Disk Cleanup

A

Removes unnecessary files from hard drive.
References on FAT to files that no longer exist or have been moved (sys confusion.)
Windows Administrative/System Performance utility.

375
Q

Task Manager

A

Check on non-responsive program or use to exit the program.
Process tab shows if program isn’t responding.
Windows Administrative/System Performance utility.

376
Q

Disk Defragmenter

A

Rearranges fragmented data so that related file pieces are unified. Helps speed up performance.
Windows Administrative/System Performance utility.

377
Q

System Restore

A

Allows you to roll your system settings back to a specific date when everything was working properly.
Windows Administrative/File,System Backup Utilities.
When uninstall doesn’t work.

378
Q

Ease of Access Center

A

Centralized location for assistive technology and tools to adjust accessibility settings.
A questionnaire asks about routine tasks and provides a personalized settings recommendation.

379
Q

Ease of Access Tools

A
Magnifier (separate magnified window)
Narrator
Speech Recognition
On-Screen Keyboard
High Contrast color schemes
380
Q

If PC isn’t Booting Properly

A

Check to see if there have been recently installed hardware or software.
Uninstall new hard/software using Uninstall program in Control Panel, then try to reboot again. If system boots, then reinstall.

381
Q

Last Known Good Configuration

A

Windows Advanced Options menu.
Used by Windows if it detects a problem in the boot process.
Created each time you boot successfully.
Registration information saved during last shut down.

382
Q

Windows 10 Boot Errors

A

Reset PC attempts to diagnose and fix errors in system files causing the computer to behave improperly.
Start menu/Setting/Update and Securities/Recovery.

383
Q

CMOS

A

Stores hardware configuration.
Involved in boot process.
Results of POST compared to CMOS.
A special kind of memory that is never erased and uses virtually no power.

384
Q

Windows 10 Basics

A

Designed to run on multiple devices: desktops, laptops, tablets, and phones.
Use a mouse
Use a touch screen
Use keystrokes

385
Q

Start Menu Left Section

A

Provides access to all installed programs, including Most Used, Suggested, File Explorer, Settings, and Power buttons.

386
Q

Start Menu Right Section

A

Block tiles that launch applications, installed software, and files/folders.
Can be grouped together and resized.
You will find tiles representing your most used applications.

387
Q

To Position an Active Window

A

Press the Windows key and a directional key on keyboard.

388
Q

File Explorer Left Section

A

Navigation pane showing contents.
Quick Access - Commonly accessed files.
OneDrive - files stored in the cloud.
This PC - locally stored files.

389
Q

File Explorer Right Section

A

Displays contents of a selection from left section.

390
Q

Details View

A

Most interactive view.
Files and folders are displayed in list form with additional file information in columns.
Sort by name, date modified, type, size.

391
Q

Recycle Bin

A

Files deleted from hard drive, which can be restored until permanently deleted.
All files deleted from other drives are permanently deleted.

392
Q

File Extensions

A

Identifies what kind of file it is and what kind of application should use to read the file.

393
Q

Adding File Extensions

A

Windows adds the file extension for you.
Mac and Linux don’t need file extensions because the extension information is stored within the file itself.
Add extensions if you’ll send to Windows users.

394
Q

What Does Disk Cleanup Clean

A

Recycle Bin files
Temporary Internet files
Temporary files created by Windows to store data while a program is running, but couldn’t delete if it had a problem exiting a program.
Calculates amount of space freed.

395
Q

Accessing Task Manager

A

Right click on empty space on task bar.
Start menu, Windows System, Task Manager
Ctrl + Alt + Del

396
Q

Task Scheduler

A

Utility program.

Allows you to schedule and manage tasks to run automatically at predetermined times.

397
Q

How File Compression Works

A

Look for repeated patterns of letters and replaces with a shorter placeholder.
Repeated patterns and placeholder cataloged and stored in the ‘dictionary.’
Can reduce text files up to 50%.
“The rain in Spain falls mainly on the plain.”
Patterns: “ain”, “the”

398
Q

Unzipping Files

A

Usually use the same program used to zip it.

Restored to original state.

399
Q

System Restore Point

A

Created every time you start your computer or install an application or driver.
A snapshot.
Restore Point Wizard resets system.
Doesn’t affect personal data files.

400
Q

Task Manager Tabs (7)

A
Processes *
Performance *
Users *
App History
Startup
Details
Services
Understanding if you should upgrade your memory, your processor, or buy a new system.
401
Q

Action Center

A

Windows 10 shows major events and periodically checks the system for corrupt files or errors and displays in the Action Center.
Quick access to security settings.
Click on Notifications icon in the System Tray of the Taskbar.
Icon becomes opaque when there’s a new notification.

402
Q

Functions of Task Manager

A

Monitor CPU and Ram to gauge computer’s efficiency.

Quit programs not responding.

403
Q

Processes Tab of Task Manager

A

Lists apps and processes currently in use, status, impact on system.
Status shows “Not Responding”
Background process pieces belonging to OS.

404
Q

CPU Usage on Processes Tab of Task Manager

A

Display percentage of the CPU’s time each program is using.

Find out which programs are putting the biggest load on PC.

405
Q

Memory Usage on Processes Tab of Task Manager

A

Keep track of which programs are putting the biggest demands on memory.
Displays programs’ current memory usage.

406
Q

Performance Tab of Task Manager

A

Displays summary information for CPU, memory, disk, and wifi usage.
Level of 80% may indicate an upgrade is needed.

407
Q

Services Tab of Task Manager

A

Lists all services currently in use (many OS).
Provides status of current services.
Can start or stop service for any service program by right clicking.

408
Q

Weblinks

A

http: //www.informationweek.com - customizing and evaluating system performance.
http: //www.geek.com - All things computer related.

409
Q

Rotational Latency

A

A tiny delay after the read/write head is positioned over the correct track, while the head waits for the right sector to pass underneath.

410
Q

Writing Data

A

Everything written in binary code.
Read/write heads record each bit of information with lightning speed as the platter rotates underneath.
One ring on disk written to at a time.
Disk must be formatted first.

411
Q

Solid State Drives Pros

A

Greater reliability due to no moving parts.
High data transfer rates.
Energy efficient.
Becoming standard storage.

412
Q

Hard Drives

A

Mechanical parts enclosed in a sealed case.
Should always remain sealed.
Traditional storage means.

413
Q

Nonvolatile Storage

A
Hard Disk drives
Solid state drives
Solid state hybrid drives
-Data is remembered when power is off.
-Necessary if you want to save and access files and programs.
414
Q

Solid State Drives Cons

A

Less storage capacity than hard disk drives.

Expensive.

415
Q

Hard Drive Interior

A

Magnetically coated platter
DC Spindle Motor
Read/Write Head, Arm Actuator

416
Q

Platter

A

Platters sit on top of the DC spindle motor.

Platters spin at a precise, constant speed of thousands of revolutions per minute (rpm.)

417
Q

Read/Write Head, Arm Actuator

A

Actuators move the arm from the center to the outer edge of each platter at amazing speeds.

418
Q

Formatting a Disk

A

Formatting marks the disk into tracks, rings, sectors, and wedges.
System for locating each bit of data.

419
Q

Reading Data

A

Controller sends signal to the drive.
Drive looks at starting track and sector.
Moves arm to track and waits for the sector to spin under the read/write head.
As each block of data is located, the HD sends it along the BUS lines to the computer and seeks the next block of data.
Each block indicates whether to continue on or if it is the end of the data.
HD continues to spin awaiting next request.

420
Q

How a Disk Gets Fragmented

A

As old files are deleted, storage becomes distributed over the disk.
Pieces of each file are spread out all over the disk.
Speed impaired because it takes more time to search for and locate all a file’s parts.

421
Q

Access Time

A

The amount of time it takes for a computer to request and retrieve data.

422
Q

Stand Alone Utility Programs

A

Disk Cleanup - McAfee Total Protection
Degrag/Optimize - Norton Utilities, iDefrag
Task Manager/Resource Monitor-Process explorer
File History/Recovery-Acronis True Image, Norton Online Backup
System Restore - FarSone RestoreIT, Acronis True Image

423
Q

Distros

A

Different versions of Linux.

424
Q

Error Checking

A

Checks for lost files and fragments and physical errors on the hard drive.

425
Q

Threats to your Digital Assets

A

Identity theft and hackers.
Computer viruses.
Online annoyances and social engineering.

426
Q

Cybercrime

A

Any criminal action perpetrated primarily through the use of a computer.
Top 4 relate to fraud.
Others involve computer intrusions, child porn, and blackmail.

427
Q

Cybercriminals

A

Individuals who use computers, networks, and the Internet to perpetrate crime.

428
Q

Four Categories of Cybercrimes

A

FBI related scams.
Identity theft.
Non-auction/Non-delivery of merchandise.
Advance fee fraud.

429
Q

Identity Theft/Hacking

A

A thief steals personal information and poses as you.
Most financially damaging cybercrime for individuals.
Hacker is anyone who unlawfully breaks into a computer system.

430
Q

Types of Identity Theft Crime

A
Counterfeiting credit and debit cards.
Requesting changes of address.
Open new credit cards.
Obtaining medical services.
Buying a home.
431
Q

Types of Hackers

A

White-hat (ethical)
Black-hat
Grey-hat

432
Q

White-Hat Hackers

A

Break into systems for non malicious reasons.

Test system security vulnerabilities or to expose undisclosed weaknesses.

433
Q

Black-Hat Hackers

A

Break into systems to destroy information or for illegal gain.

434
Q

Grey-Hat Hackers

A

Break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.

435
Q

Packet Analyzer/Sniffer

A

Program deployed by hackers that looks at each packet as it travels on the Internet.

436
Q

Keylogger

A

Program that captures all keystrokes made on a computer.

437
Q

Hacking Tools

A
Packet Analyzers
Keyloggers
Trojan Horses
Backdoor Programs/rootkits
Zombies
Exploit kits
Logical ports
438
Q

Trojan Horse

A

A program that appears to be something useful but does something malicious in the background without your knowledge.

439
Q

Backdoor Programs/Rootkits

A

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge.
Access and delete files, send e-mail, run programs, making computer a zombie.

440
Q

Zombies

A

Computers under the control of a hacker.

Often used to launch denial-of-service attacks on other computers.

441
Q

Types of Hacking Attacks

A

Denial-of-Service
DDoS
Botnet

442
Q

Denial-of-Service (DoS)

A

Hacker flooding system with requests from a Zombie, causing it to shut down. Legitimate users thereafter cannot access.

443
Q

Distributed Denial of Service (DDoS)

A

Multiple zombies perpetrate attack simultaneously.

444
Q

Botnet

A

Large group of software running on zombie computers.

445
Q

Exploit Kits

A

Software programs that run on servers, and are searching for vulnerabilities.

446
Q

Logical Ports

A

Virtual, not physical, communication paths.
Firewalls screen data coming in to these ports. Like windows. Organize request for information from other networks or computers.

447
Q

Virus Basics

A

Program that attaches to a computer program to spread to other computers.
Main purpose is to replicate itself and copy its code into as many other host files as possible.
Secondary objectives can be destructive.
Smartphones, tablets, and other devices can be infected with viruses.

448
Q

Types of Viruses

A
Boot sector viruses
Logic bombs/Time bombs
Worms
Script and macro viruses
Email viruses
Encryption viruses
449
Q

Boot sector viruses

A

Executes when a computer boots up.
Found on infected media, replicate to the master boot record, such as booting with an infected flash drive in USB. Can erase your entire hard drive.

450
Q

Logic bombs/Time bombs

A

Execute when certain conditions or dates are reached, such as opening a file or opening a program a certain number of times. Time bombs triggered by passage of time or on a certain date.

451
Q

Worms

A

Virus-like and spread on their own with no host file or human interaction needed. Spread through network connections. Much more active in spreading themselves.

452
Q

Script and macro viruses

A

Series of commands with malicious intent.

Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.

453
Q

Email viruses

A

Spread as attachments to an e-mail, often using address books.

454
Q

Encryption viruses

A

Holds files hostage by encrypting them, and ask for ransom to unlock them. Program searches for common data files such as Word or Excel.

455
Q

Virus Classification by methods of avoiding Detection

A

Polymorphic
Multipartite
Stealth

456
Q

Polymorphic Virus Class

A

Change their code or periodically rewrites themselves to avoid detection.
Most infect a particular file type.

457
Q

Multipartite Virus Class

A

Designed to infect multiple file types to fool the antivirus software that is looking for it.

458
Q

Script and macro viruses

A

Series of commands executed without your knowledge with malicious intent.
Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.

459
Q

Online Annoyances-Malware

A
Adware
Spyware
Spam (junk email)
Social Engineering
Phishing
Pharming
Scareware
460
Q

Adware

A

A type of malware that displays unsponsored advertisements.

461
Q

Spyware

A

A type of malware that is a piggy-back program.
Transmits information about you.
Using tracking cookies.
Keystroke loggers.

462
Q

Spam

A
Unwanted or junk e-mail.
Minimize by:
Creating a free e-mail address
Spam filters
Third party programs
Reclassify emails misidentified as spam.
463
Q

Cookies

A

Small text files stored on your hard drive when you visit a website and are to help companies determine traffic on their website and evaluate the effectiveness of their marketing.
Don’t search hard drive, but may invade privacy.
No security threat.

464
Q

Social Engineering

A

Any technique using social skills to generate human interaction with the purpose of enticing individuals to reveal sensitive information.
Pretexting involves creating a scenario that sounds legitimate.
Scareware.

465
Q

Phishing

A

Lures internet users to reveal personal information.

466
Q

Pharming

A

Malicious code is planted on your computer.

467
Q

Avoiding Schemes

A

Never reply to any email asking for personal information.
Don’t click email links.
Check with the company asking for information.
Never give personal information on insecure sites.
Use phishing filters.
Use internet security software that’s frequently updated.

468
Q

Scareware

A

A type of malware that downloads onto your computer and tries to convince you that your computer is infected.
Then directs you to a site to purchase fake removal or antivirus tools.
Social engineering technique.

469
Q

Restricting Access to Digital Assets

A

Firewalls

  • Packet Filtering
  • Logical Port Blocking
470
Q

Firewall

A

Hardware or software designed to protect computers from hackers.
Included in OS of Mac and PC.
Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security suites include firewall software. Router.

471
Q

Packet Filtering

A

A firewall configured to filter out packets sent to specific logical ports.

472
Q

Logical Port Blocking

A

A firewall configured to refuse requests from the Internet asking for access to specific ports.

473
Q

Logical Ports

A

21 - FTP control (file transfer protocol)
23 - Telnet (unencrypted text communication)
25 - SMTP (simple mail transfer protocol)
53 - DNS (domain name system)
80 - HTTP (hypertext transfer protocol)
443 - HTTPS (HTTP with transport layer security encryption.)

474
Q

Antivirus Software

A

Specifically designed to detect viruses and protect your computer and files from harm. Should auto-schedule to run weekly. Scans when files when they’re opened or executed. Detects either a virus signature or a suspicious activity like a macro or script launching. It stops the execution of the file and notifies you.

475
Q

Popular Antivirus Software

A
Symantec
Kapersky
AVG
McAfee
Bitdefender
476
Q

Virus Signature

A

Portion of the virus code that’s unique to a particular computer virus.

477
Q

Quarantining

A

Placing a virus in a secure area so it won’t spread to other files.

478
Q

Inoculation

A

Records key attributes about your computer files and keep stats in a secure place.

479
Q

Authentication

A

Passwords

Biometrics

480
Q

Passwords

A
Difficult to guess.
Strong Password generator.
Password Meter to evaluate passwords.
Windows, macOS and others have built-in password protection for files as well as desktop.
Password Management tools available.
481
Q

Biometrics

A

Reads a unique personal characteristic (fingerprint or iris) and converts it to a digital code.
Voice authentication.
Facial recognition.
Provide a high level of security.

482
Q

Privacy Tools

A

In private
Private browsing
Incognito

483
Q

Portable Privacy Devices

A

IronKey Personal flash drives.

484
Q

Inoculation

A

Records key attributes about your computer files and keep stats in a secure place and checking to see if they change over time.

485
Q

Protecting your Personal Information

A
Identity thieves crave:
SSN
Full DOB
Phone Number
Street Address
486
Q

Other Sensitive Information

A
Full legal name
Email address
Zip code
Gender
School or workplace
487
Q

Backups

A

Copies of files used to replace the originals if they’re lost or damaged.

488
Q

Files to Backup

A

Data Files

Program Files

489
Q

Types of Backups

A

Full
Incremental
Image

490
Q

Backup Locations

A

Cloud
External Hard Drive
Network Attached Storage Device and Home Server

491
Q

Cloud Backup

A

Files stored at secure, remote location
Accessible anywhere through a browser.
Most free storage sites don’t provide enough space for image backups.

492
Q

External Hard Drive

A

Inexpensive, one-time cost.
Fast backups with USB 3.0
Could be destroyed or stolen with computer.
Difficult to back up multiple devices.

493
Q

Network Attached Storage (NAS)

A

Backing up multiple devices easier.
More expensive.
Could be destroyed or stolen with computer.

494
Q

Power Surges

A

An electrical current is supplied in excess of normal voltage.
Old or faulty wiring.
Downed power lines.
Lightning strikes.
Malfunctions at electric company substations.

495
Q

Surge Protector

A

Replace every 2-3 years.

Use with all devices that have solid-state components.

496
Q

Main Security Concerns with Mobil Devices

A

Keeping them from being stolen.
Keeping data secure in case they’re stolen.
Finding a device if its stolen.

497
Q

How do you test a firewall?

A

Go to sites such as grc.com and run the ShieldsUp or LeakTest.
ShieldsUp status column will show Closed or Stealth.

498
Q

Virus Attachment

A

A computer program that attaches itself to another computer program called the host program.

499
Q

Virus Symptoms

A

Existing program icons or files suddenly disappear.
Viruses often delete specific file types or programs.
Changes appear in browser; it may take you to an unusual home page or sprouted new toolbars.
Data files become corrupted.
Programs don’t work properly.
System slows down or is slow to boot up.

500
Q

How to get a Virus

A
  1. Booting up with an infected flash drive.
  2. Opening an infected email attachment.
  3. Enabling macros in Word or Excel.
501
Q

Viruses you can get from Internet

A

Hidden in program files you download.

Scripts can be hidden in websites.

502
Q

Scripts

A

Small programs executed when you enter a site.

503
Q

Avoiding Viruses

A

Update antivirus software and OS regularly for latest security patches.

504
Q

Windows Defender

A

And others, downloads a list of updates for virus signature files every time you go online.

505
Q

Defensive Computing

A

Making sure you have the correct computer setup and computing habits.

506
Q

Protection against your own mishaps.

A

Backups
Undelete
Security Updates
System Restore

507
Q

Protection Suite Features

A

E-mail scams
Parental controls
File shredding

508
Q

Security Updates

A

Pates published for Windows and Edge and Office.

Windows update automatically downloads updates and installs them.

509
Q

Backing Up Data

A

Copy personal data files to:
External hard drive
Clout backup service (Dropbox, Google Drive, MSOne Drive)
System and Security, File History, lets you designate a hard drive to back up to. Also saves different versions of files. Link to Use system Image to create backup of system.

510
Q

Windows Defender

A

Downloads a list of updates for virus signature files every time you go online.
Included in Windows and defends against pop-ups, malware, and hacking agents. Part of Windows updates. Disabled when other programs activated.

511
Q

Popup Blocker

A

Internet Options
Type website for which you want to allow popups.
Enabled by default.

512
Q

Popup Blocker

A

Internet Options
Type website for which you want to allow popups.
Enabled by default.

513
Q

Malware (Viruses, Adware, Spyware)

A
Data mining
Aggressive advertising
Tracking surfing habits.
Keystroke loggers.
Trojan horses.
Backdoor programs and zombies.
514
Q

Malware (Viruses, Adware, Spyware)

A
Data mining
Aggressive advertising
Tracking surfing habits.
Keystroke loggers.
Trojan horses.
Backdoor programs and zombies.
515
Q

Network Address Translation

A

The firewall sees the request from the computer with the internal IP. It then makes the same request to the Internet using its own public address, and returns the response from the Internet resource to the computer inside the private network. From the perspective of the resource on the Internet, it is sending information to the address of the firewall. From the perspective of the workstation, it appears that communication is directly with the site on the Internet.

516
Q

Virtual Private Network

A

Makes it just as secure to send information across a public network as it is on a secure private network.

517
Q

Virtual Private Network

A

Makes it just as secure to send information across a public network as it is on a secure private network.

518
Q

When you are surfing anonymously

A

The sites you visit are not stored in browser history;
You are using a browser that has privacy tools;
Temporary files created are immediately deleted.

519
Q

Full Backup

A

Create a copy of all you application and data files.

520
Q

Image Backup

A

All system files are backed up.

Complete snapshot of everything that makes your computer run.

521
Q

Incremental Backup

A

Partial backup; files changed or created since the last backup.

522
Q

When you are surfing anonymously

A

The sites you visit are not stored in browser history;
You are using a browser that has privacy tools;
Temporary files created are immediately deleted.

523
Q

Dvorak Keyboard

A

Alternative keyboard layout that puts the most commonly used letters on Home Keys - keys in the middle of the keyboard.

524
Q

Capacitive System

A

Basic touch screens detect touches and translate them into meaningful commands.

525
Q

Multitouch User Interface

A

Introduced by Apple.
Pinching the screen.
Coordinate based grid to arrange the capacitors.

526
Q

Input Devices for Images

A
Digital cameras
Camcorders
Mobile Device cameras
Flatbed scanners
Webcam
527
Q

Types of Microphones

A

Omnidirectional-conference calls
Unidirectional-1 voice; podcasts
Clip-on (Lavalier)-presentations
Close talk-headset-phone, speech recog.