Unit 1 Flashcards
Describe the difference between data and information
Computers process data (input) into information (output) and often store the data and resulting information for future use.
Data
A collection of unprocessed items, which can include text, numbers, images, audio and video
Information
conveys meaning to users
Memory vs storage
Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions. Although some forms of memory are permanent, most memory keeps data and instructions temporarily (contents are erased when the computer is shut off).
Storage holds data, instructions and information for future use.
Solid-State Drive (SSD)
Storage device that typically uses flash memory to store data, instructions and information. Flash memory contains no moving parts, making it more durable and shock resistent than other types of media.
Hard Drive
Use to collectively refer to hard disks and SSDs
Internet vs web
The internet is a worldwide collection of computer networks that connects millions of individuals and organizations.
The web consists of a worldwide collection of electronic documents. (One of the widely used services of the internet.)
virtual keyboard
keyboard that projects from a device to a flat surface
software
consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them (also called programs)
Who co-founded Apple?
Steve Jobs
Steve Wozniak
Ronald Wayne
mouse
a pointing device that fits under the palm of your hand comfortably
point
A mouse operation; move the mouse until the pointer is positioned on the item of choice
touchpad
a small, flat, rectangular pointing device that is sensitive to pressure and motion
How is a scanner similar to another output device?
A scanner converts printed text and images into a form the computer can process; a printer produces text and graphics on a physical medium
tap
Quickly touch & release
Used to activate a link, press a button
double tab
Quickly touch & release 1 finger 2 times
Used to run a program, zoom in
press & hold
Press 1 finger and hold until the action occurs
Used to display a shortcut menu, enable move icon mode
drag or slide
Press & hold 1 finger on an object and then move the finger to a new location
Used to move an item, scroll
swipe
Press & hold 1 finger then move horizontally or vertically
Used to scroll, display a bar from edge of screen
stretch
Move 2 fingers apart
Used to zoom in
pinch
Move 2 fingers together
Used to zoom out
Magnetic Media - For which of the following is the spelling, disk, used?
hard disk
If a slate tablet has no keyboard, how do you type on it?
You can you use your fingers to press keys on a keyboard that appears on the screen, called an on-screen keyboard, or you can purchase a separate physical keyboard that attaches to or wirelessly communicates with the tablet. You also may be able to speak into the tablet, and your spoken words will translate to typed text
malware
short for malicious software, is software that acts without a user’s knowledge and deliberately alters the computer’s or mobile device’s operations. Examples of malware include viruses, worms, trojan horses, rootkits, spyware, adware and zombies.
BTW: A leading maker of security software claims its software blocked more than 5 billion malware attacks in a single year.
VoIP
enables users to speak to other users over the Internet; Conversation that takes place over the Internet using a telephone connected to a computer, mobile device or other device
Microsoft co-founders
Paul Allen
Bill Gates
green computing
involves reducing the electricity consumed and environmental waste generated when using a computer. Strategies that support green computing include recycling, using energy efficient hardware and energy saving features, regulating manufacturing processes, extending the life of computers, and immediately donating or properly disposing of replaced computers.
What is the typical weight of a game console?
3-11 pounds
How much data usage would it take to upload or download photos?
50 photos – approx. 50 MB
How much data usage would it take to watch an HD streaming video
1 hour – approx. 5-20 GB
Fact or Fiction: Many browsers and websites do not require the http:// and www portions of a web address?
Fact
search engine operators
Space or +: results have both words in any order
OR: results have either word
(): order of operations – e.g. Kalamazoo Michigan (pizza or subs)
-: exclude a word from the search results
*: wildcard – e.g. writer* would look for words that start with writer
What is a subject directory?
classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories
What is a disadvantage of a subject directory?
users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented
What is the purpose of a bookmarking site?
a website that enables members to organize, tag and share links to media or other online content (e.g. pinterest)
examples of hot spot locations
shopping malls, coffee shops, restaurants, schools, airports, hotels and city parts
different types of websites
Search engines
Online social networks
Informational and research (dictionaries, directories and other types of reference, e.g. webMD)
Media sharing (photo, video and music sharing, e.g. YouTube)
Bookmarking (e.g. Pinterest)
News, weather, sports and other mass media
Educational (anything from tutorials for learning how to cook or fly to online college courses)
Business, governmental and organizational (increase brand awareness, provide company background)
Blogs (time-stamped articles or posts)
Wikis and collaboration (enable users to organize, edit and share information)
Health & Fitness (medical, health, fitness, nutrition, exercise)
Science (space exploration, astronomy, etc)
Entertainment (music, shows, games, etc in an interactive and engaging environment; typically streaming video)
Banking & Finance (online banking and trading)
Travel & tourism (research and make travel arrangements)
Mapping (e.g. google maps)
Retail & auctions (e.g. amazon)
Careers & employment
e-commerce (B2C, C2C or B2B) – not sure how this is different from retail
Portals (e.g. MSN)
Content aggregation (aggregates content based upon keyword)
Website creation and management
Fact or Fiction: No single person, company, institution, or government agency owns the Internet
Fact
The internet connects individuals, institutions, etc but it’s not owned by them. Each organization on the internet is responsible only for maintaining it’s own network
Fact or Fiction: If bandwidth is lower less data is transmitted, if higher more data can be transmitted
Fact
Fact or Fiction: A megabyte is one million characters
Fact
A megabyte is 1 million bytes (byte usually represents a character; a byte is a group of binary digits, usually 8, operated on as a unit)
bundle software
Purchasing software at the same time you purchase a desktop may be less expensive than purchasing the software at a later time
ports for audio devices
Display port, HDMI or mini HDMI (all audio / video)
USB ports
general purpose ports that allow connection to a wide variety of devices
peripheral devices
connects to a computer system to add functionality (e.g. external hard drive, digital camera, game console, mouse)
backward compatible
property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing
Fact or Fiction Is a Pixel the smallest element in an electronic image?
Fact
server farm
network of several serves together in a single location; make it possible to combine the power of multiple servers
form factor
refers to the size, shape and packaging of a hardware device
cybercrime
refers to online or Internet-based illegal acts such as distributing malicious software or committing identity theft. Software used by cybercriminals is sometimes called crimeware
common types of malware
- Malware (short for malicious software) consists of programs that act without the user’s knowledge and deliberately alter the operations of computers and mobile devices
- Virus: A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the device works without the user’s knowledge or permission
- Worm: Program that copies itself repeatedly, using up resources and possibly shutting down the computer, device or network
- Trojan horse: Program that hides within or looks like a legitimate program. Does not replicate itself to other computers or devices.
- Rootkit: Program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
- Spyware: Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates that information to some outside source while the user is online.
- Adware: Program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages or other Internet services.
PIN
numeric password; provide an additional level of security
EULA
End User License Agreement – most common type of license include with software purchase
information theft
occurs when someone steals personal or confidential information. Both business and home users can fall victim
encryption
process of converting data that is readable by humans into encoded characters to prevent unauthorized access
decryption
To read the encrypted data, the recipient must decrypt or decode it using the key
content filtering
restricting access to certain material
ECPA (Electronic Communication Privacy Act)
Provides the same right of privacy protection of the postal delivery service and phone companies to various forms of electronic communications, such as voice mail, email and mobile phones
employee monitoring
involves the use of computers, mobile devices or cameras to observe, record and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity) and websites visited
spoofing
technique intruders use to make their network or Internet transmissions appear legitimate to a victim computer or network. Common types are IP Spoofing & Email Spoofing
DDoS (Distributed Denial of Service attack)
a zombie army is used to attack computers or networks; the volume brings down the target server
IT Code of Conduct
Technology must not be used to harm other people
Employees must not meddle in others’ files
Employees may use technology only for purposes in which they have been authorized
Technology may not be used to steal
Technology may not be used to bear false witness
Employees may not copy or use software illegally
Employees may not use others’ technology resources without authorization
Employees may not use others’ intellectual property as their own
Employees shall consider the social impact of programs and systems they design
Employees always should use technology in a way that demonstrates consideration and respect for fellow humans
selective backup
- users choose which folders and files to include in the backup
- advantages: fast, provides great flexibility
- disadvantages: difficult to manage; least management of all options
3 Generations Backup
Preserve 3 copies of important files
- the grandparent is the oldest, parent is the second oldest and child is most recent
- When a new back up is made, the grandparent is deleted, the parent becomes the grandparent, etc
Fact or Fiction: You can connect to 127 peripheral to a USB port
Fact
Fact or Fiction: A blade server exists in the form of a single circuit board
Fact
Fact or Fiction: A major advantage of using word processing software is that users easily can change what they have written.
Fact
Fact or Fiction: Many of the more secure personal finance apps have dual passwords that involve typing a string of characters and also validating a picture.
Fact
Fact or Fiction: With a computerized database, the computer stores the data in an electronic format on a storage medium such as a hard disk.
Fact
Fact or Fiction: A blocked vent can prohibit heat from escaping, which ultimately can cause the computer or mobile device to overheat.
Fact
Fact or Fiction: A DC adapter converts the DC power from the wall outlet into the AC power that the peripheral requires.
Fiction
control unit
the component of the processor that directs and coordinates most of the operations of the computer – interprets instructions and then initiates the appropriate action
How many ticks per second is a gigahertz / megahertz
1 GHz (gigahertz) equals 1 billion ticks of the system clock per second
1 MHz = 1 million
How many characters in a byte?
8 characters (0 / 1) grouped together as a unit Unique bytes represent 256 different characters
coding scheme
the combination of 0s and 1s (e.g. the number 6 is 00110110)
SIMM (Single Inline Memory Module)
has pins on opposite sides of the circuit board that connect together to form a single set of contacts
DIMM (Dual Inline Memory Module)
has pins on the opposite side of the circuit board do not connect and thus form two sets of contacts
plug & play
computer automatically can recognize peripheral devices as you install them; plug it in and immediately being using it
USB adapter
dongle that plugs into a USB port, enhances functions of mobile computers and/or provides connects to peripheral devices
bus
electrical channel where bits travel; allows the various devices both inside and attached to the system to communicate with one another; just as vehicles travel on a highway to move from one destination to another, bits travel on a bus
What is the relationship between the micros USB and the International Electronics Commission?
The International Electronics Commission (IEC) is working with major technology providers to make micro USB the universal connector standard used to charge mobile devices
Fact or Fiction: Custom-built computers often do not include recovery media to restore the computer in the event it fails.
Fact?
types of apps
- Productivity – accounting, personal finance, tax prep
- Graphics & Media
- Personal Interest
- Communications
- Security
- File, Disk & System Management
software suite
collection of individual related applications available together as a unit
PC (personal computer)
fits on a desk; usually 1 user but more if networked, cost – several hundred to several thousand
Game console: small box or handheld, 1 to several users, several hundred dollars
embedded computers
miniature, 1 user, cost is embedded in the price of the product (e.g. inside DVD player)
JPEG
JPEG stands for “Joint Photographic Experts Group.” JPEG is a popular image file format. It is commonly used by digital cameras to store photos since it supports 224 or 16,777,216 colors. … Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.
media library
Place to store images, audio & video
inattentional blindness
psychological phenomenon that causes you to miss things that are right in front of your eyes
How many mobile phones are lost or stolen per day?
2,000?
user interface
means by which the user and a computer system interact, in particular the use of input devices and software