Unit 1 Flashcards

1
Q

Describe the difference between data and information

A

Computers process data (input) into information (output) and often store the data and resulting information for future use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

A collection of unprocessed items, which can include text, numbers, images, audio and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information

A

conveys meaning to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory vs storage

A

Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions. Although some forms of memory are permanent, most memory keeps data and instructions temporarily (contents are erased when the computer is shut off).

Storage holds data, instructions and information for future use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Solid-State Drive (SSD)

A

Storage device that typically uses flash memory to store data, instructions and information. Flash memory contains no moving parts, making it more durable and shock resistent than other types of media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hard Drive

A

Use to collectively refer to hard disks and SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet vs web

A

The internet is a worldwide collection of computer networks that connects millions of individuals and organizations.

The web consists of a worldwide collection of electronic documents. (One of the widely used services of the internet.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

virtual keyboard

A

keyboard that projects from a device to a flat surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software

A

consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them (also called programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who co-founded Apple?

A

Steve Jobs

Steve Wozniak

Ronald Wayne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mouse

A

a pointing device that fits under the palm of your hand comfortably

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

point

A

A mouse operation; move the mouse until the pointer is positioned on the item of choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

touchpad

A

a small, flat, rectangular pointing device that is sensitive to pressure and motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is a scanner similar to another output device?

A

A scanner converts printed text and images into a form the computer can process; a printer produces text and graphics on a physical medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tap

A

Quickly touch & release

Used to activate a link, press a button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

double tab

A

Quickly touch & release 1 finger 2 times

Used to run a program, zoom in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

press & hold

A

Press 1 finger and hold until the action occurs

Used to display a shortcut menu, enable move icon mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

drag or slide

A

Press & hold 1 finger on an object and then move the finger to a new location

Used to move an item, scroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

swipe

A

Press & hold 1 finger then move horizontally or vertically

Used to scroll, display a bar from edge of screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

stretch

A

Move 2 fingers apart

Used to zoom in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

pinch

A

Move 2 fingers together

Used to zoom out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Magnetic Media - For which of the following is the spelling, disk, used?

A

hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If a slate tablet has no keyboard, how do you type on it?

A

You can you use your fingers to press keys on a keyboard that appears on the screen, called an on-screen keyboard, or you can purchase a separate physical keyboard that attaches to or wirelessly communicates with the tablet. You also may be able to speak into the tablet, and your spoken words will translate to typed text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

malware

A

short for malicious software, is software that acts without a user’s knowledge and deliberately alters the computer’s or mobile device’s operations. Examples of malware include viruses, worms, trojan horses, rootkits, spyware, adware and zombies.

BTW: A leading maker of security software claims its software blocked more than 5 billion malware attacks in a single year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

VoIP

A

enables users to speak to other users over the Internet; Conversation that takes place over the Internet using a telephone connected to a computer, mobile device or other device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Microsoft co-founders

A

Paul Allen

Bill Gates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

green computing

A

involves reducing the electricity consumed and environmental waste generated when using a computer. Strategies that support green computing include recycling, using energy efficient hardware and energy saving features, regulating manufacturing processes, extending the life of computers, and immediately donating or properly disposing of replaced computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the typical weight of a game console?

A

3-11 pounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

How much data usage would it take to upload or download photos?

A

50 photos – approx. 50 MB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How much data usage would it take to watch an HD streaming video

A

1 hour – approx. 5-20 GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Fact or Fiction: Many browsers and websites do not require the http:// and www portions of a web address?

A

Fact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

search engine operators

A

Space or +: results have both words in any order
OR: results have either word
(): order of operations – e.g. Kalamazoo Michigan (pizza or subs)
-: exclude a word from the search results
*: wildcard – e.g. writer* would look for words that start with writer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a subject directory?

A

classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a disadvantage of a subject directory?

A

users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the purpose of a bookmarking site?

A

a website that enables members to organize, tag and share links to media or other online content (e.g. pinterest)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

examples of hot spot locations

A

shopping malls, coffee shops, restaurants, schools, airports, hotels and city parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

different types of websites

A

Search engines
Online social networks
Informational and research (dictionaries, directories and other types of reference, e.g. webMD)
Media sharing (photo, video and music sharing, e.g. YouTube)
Bookmarking (e.g. Pinterest)
News, weather, sports and other mass media
Educational (anything from tutorials for learning how to cook or fly to online college courses)
Business, governmental and organizational (increase brand awareness, provide company background)
Blogs (time-stamped articles or posts)
Wikis and collaboration (enable users to organize, edit and share information)
Health & Fitness (medical, health, fitness, nutrition, exercise)
Science (space exploration, astronomy, etc)
Entertainment (music, shows, games, etc in an interactive and engaging environment; typically streaming video)
Banking & Finance (online banking and trading)
Travel & tourism (research and make travel arrangements)
Mapping (e.g. google maps)
Retail & auctions (e.g. amazon)
Careers & employment
e-commerce (B2C, C2C or B2B) – not sure how this is different from retail
Portals (e.g. MSN)
Content aggregation (aggregates content based upon keyword)
Website creation and management

38
Q

Fact or Fiction: No single person, company, institution, or government agency owns the Internet

A

Fact

The internet connects individuals, institutions, etc but it’s not owned by them. Each organization on the internet is responsible only for maintaining it’s own network

39
Q

Fact or Fiction: If bandwidth is lower less data is transmitted, if higher more data can be transmitted

A

Fact

40
Q

Fact or Fiction: A megabyte is one million characters

A

Fact

A megabyte is 1 million bytes (byte usually represents a character; a byte is a group of binary digits, usually 8, operated on as a unit)

41
Q

bundle software

A

Purchasing software at the same time you purchase a desktop may be less expensive than purchasing the software at a later time

42
Q

ports for audio devices

A

Display port, HDMI or mini HDMI (all audio / video)

43
Q

USB ports

A

general purpose ports that allow connection to a wide variety of devices

44
Q

peripheral devices

A

connects to a computer system to add functionality (e.g. external hard drive, digital camera, game console, mouse)

45
Q

backward compatible

A

property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing

46
Q

Fact or Fiction Is a Pixel the smallest element in an electronic image?

A

Fact

47
Q

server farm

A

network of several serves together in a single location; make it possible to combine the power of multiple servers

48
Q

form factor

A

refers to the size, shape and packaging of a hardware device

49
Q

cybercrime

A

refers to online or Internet-based illegal acts such as distributing malicious software or committing identity theft. Software used by cybercriminals is sometimes called crimeware

50
Q

common types of malware

A
  1. Malware (short for malicious software) consists of programs that act without the user’s knowledge and deliberately alter the operations of computers and mobile devices
    1. Virus: A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the device works without the user’s knowledge or permission
    2. Worm: Program that copies itself repeatedly, using up resources and possibly shutting down the computer, device or network
    3. Trojan horse: Program that hides within or looks like a legitimate program. Does not replicate itself to other computers or devices.
    4. Rootkit: Program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
    5. Spyware: Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates that information to some outside source while the user is online.
    6. Adware: Program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages or other Internet services.
51
Q

PIN

A

numeric password; provide an additional level of security

52
Q

EULA

A

End User License Agreement – most common type of license include with software purchase

53
Q

information theft

A

occurs when someone steals personal or confidential information. Both business and home users can fall victim

54
Q

encryption

A

process of converting data that is readable by humans into encoded characters to prevent unauthorized access

55
Q

decryption

A

To read the encrypted data, the recipient must decrypt or decode it using the key

56
Q

content filtering

A

restricting access to certain material

57
Q

ECPA (Electronic Communication Privacy Act)

A

Provides the same right of privacy protection of the postal delivery service and phone companies to various forms of electronic communications, such as voice mail, email and mobile phones

58
Q

employee monitoring

A

involves the use of computers, mobile devices or cameras to observe, record and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity) and websites visited

59
Q

spoofing

A

technique intruders use to make their network or Internet transmissions appear legitimate to a victim computer or network. Common types are IP Spoofing & Email Spoofing

60
Q

DDoS (Distributed Denial of Service attack)

A

a zombie army is used to attack computers or networks; the volume brings down the target server

61
Q

IT Code of Conduct

A

Technology must not be used to harm other people
Employees must not meddle in others’ files
Employees may use technology only for purposes in which they have been authorized
Technology may not be used to steal
Technology may not be used to bear false witness
Employees may not copy or use software illegally
Employees may not use others’ technology resources without authorization
Employees may not use others’ intellectual property as their own
Employees shall consider the social impact of programs and systems they design
Employees always should use technology in a way that demonstrates consideration and respect for fellow humans

62
Q

selective backup

A
  1. users choose which folders and files to include in the backup
  2. advantages: fast, provides great flexibility
  3. disadvantages: difficult to manage; least management of all options
63
Q

3 Generations Backup

A

Preserve 3 copies of important files

  1. the grandparent is the oldest, parent is the second oldest and child is most recent
  2. When a new back up is made, the grandparent is deleted, the parent becomes the grandparent, etc
64
Q

Fact or Fiction: You can connect to 127 peripheral to a USB port

A

Fact

65
Q

Fact or Fiction: A blade server exists in the form of a single circuit board

A

Fact

66
Q

Fact or Fiction: A major advantage of using word processing software is that users easily can change what they have written.

A

Fact

67
Q

Fact or Fiction: Many of the more secure personal finance apps have dual passwords that involve typing a string of characters and also validating a picture.

A

Fact

68
Q

Fact or Fiction: With a computerized database, the computer stores the data in an electronic format on a storage medium such as a hard disk.

A

Fact

69
Q

Fact or Fiction: A blocked vent can prohibit heat from escaping, which ultimately can cause the computer or mobile device to overheat.

A

Fact

70
Q

Fact or Fiction: A DC adapter converts the DC power from the wall outlet into the AC power that the peripheral requires.

A

Fiction

71
Q

control unit

A

the component of the processor that directs and coordinates most of the operations of the computer – interprets instructions and then initiates the appropriate action

72
Q

How many ticks per second is a gigahertz / megahertz

A

1 GHz (gigahertz) equals 1 billion ticks of the system clock per second

1 MHz = 1 million

73
Q

How many characters in a byte?

A
8 characters (0 / 1) grouped together as a unit
Unique bytes represent 256 different characters
74
Q

coding scheme

A

the combination of 0s and 1s (e.g. the number 6 is 00110110)

75
Q

SIMM (Single Inline Memory Module)

A

has pins on opposite sides of the circuit board that connect together to form a single set of contacts

76
Q

DIMM (Dual Inline Memory Module)

A

has pins on the opposite side of the circuit board do not connect and thus form two sets of contacts

77
Q

plug & play

A

computer automatically can recognize peripheral devices as you install them; plug it in and immediately being using it

78
Q

USB adapter

A

dongle that plugs into a USB port, enhances functions of mobile computers and/or provides connects to peripheral devices

79
Q

bus

A

electrical channel where bits travel; allows the various devices both inside and attached to the system to communicate with one another; just as vehicles travel on a highway to move from one destination to another, bits travel on a bus

80
Q

What is the relationship between the micros USB and the International Electronics Commission?

A

The International Electronics Commission (IEC) is working with major technology providers to make micro USB the universal connector standard used to charge mobile devices

81
Q

Fact or Fiction: Custom-built computers often do not include recovery media to restore the computer in the event it fails.

A

Fact?

82
Q

types of apps

A
  1. Productivity – accounting, personal finance, tax prep
  2. Graphics & Media
  3. Personal Interest
  4. Communications
  5. Security
  6. File, Disk & System Management
83
Q

software suite

A

collection of individual related applications available together as a unit

84
Q

PC (personal computer)

A

fits on a desk; usually 1 user but more if networked, cost – several hundred to several thousand
Game console: small box or handheld, 1 to several users, several hundred dollars

85
Q

embedded computers

A

miniature, 1 user, cost is embedded in the price of the product (e.g. inside DVD player)

86
Q

JPEG

A

JPEG stands for “Joint Photographic Experts Group.” JPEG is a popular image file format. It is commonly used by digital cameras to store photos since it supports 224 or 16,777,216 colors. … Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.

87
Q

media library

A

Place to store images, audio & video

88
Q

inattentional blindness

A

psychological phenomenon that causes you to miss things that are right in front of your eyes

89
Q

How many mobile phones are lost or stolen per day?

A

2,000?

90
Q

user interface

A

means by which the user and a computer system interact, in particular the use of input devices and software