Unit 1 Flashcards

(90 cards)

1
Q

Describe the difference between data and information

A

Computers process data (input) into information (output) and often store the data and resulting information for future use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data

A

A collection of unprocessed items, which can include text, numbers, images, audio and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Information

A

conveys meaning to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Memory vs storage

A

Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions. Although some forms of memory are permanent, most memory keeps data and instructions temporarily (contents are erased when the computer is shut off).

Storage holds data, instructions and information for future use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Solid-State Drive (SSD)

A

Storage device that typically uses flash memory to store data, instructions and information. Flash memory contains no moving parts, making it more durable and shock resistent than other types of media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hard Drive

A

Use to collectively refer to hard disks and SSDs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet vs web

A

The internet is a worldwide collection of computer networks that connects millions of individuals and organizations.

The web consists of a worldwide collection of electronic documents. (One of the widely used services of the internet.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

virtual keyboard

A

keyboard that projects from a device to a flat surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software

A

consists of a series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them (also called programs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who co-founded Apple?

A

Steve Jobs

Steve Wozniak

Ronald Wayne

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

mouse

A

a pointing device that fits under the palm of your hand comfortably

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

point

A

A mouse operation; move the mouse until the pointer is positioned on the item of choice

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

touchpad

A

a small, flat, rectangular pointing device that is sensitive to pressure and motion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is a scanner similar to another output device?

A

A scanner converts printed text and images into a form the computer can process; a printer produces text and graphics on a physical medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tap

A

Quickly touch & release

Used to activate a link, press a button

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

double tab

A

Quickly touch & release 1 finger 2 times

Used to run a program, zoom in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

press & hold

A

Press 1 finger and hold until the action occurs

Used to display a shortcut menu, enable move icon mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

drag or slide

A

Press & hold 1 finger on an object and then move the finger to a new location

Used to move an item, scroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

swipe

A

Press & hold 1 finger then move horizontally or vertically

Used to scroll, display a bar from edge of screen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

stretch

A

Move 2 fingers apart

Used to zoom in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

pinch

A

Move 2 fingers together

Used to zoom out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Magnetic Media - For which of the following is the spelling, disk, used?

A

hard disk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

If a slate tablet has no keyboard, how do you type on it?

A

You can you use your fingers to press keys on a keyboard that appears on the screen, called an on-screen keyboard, or you can purchase a separate physical keyboard that attaches to or wirelessly communicates with the tablet. You also may be able to speak into the tablet, and your spoken words will translate to typed text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

malware

A

short for malicious software, is software that acts without a user’s knowledge and deliberately alters the computer’s or mobile device’s operations. Examples of malware include viruses, worms, trojan horses, rootkits, spyware, adware and zombies.

BTW: A leading maker of security software claims its software blocked more than 5 billion malware attacks in a single year.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
VoIP
enables users to speak to other users over the Internet; Conversation that takes place over the Internet using a telephone connected to a computer, mobile device or other device
26
Microsoft co-founders
Paul Allen Bill Gates
27
green computing
involves reducing the electricity consumed and environmental waste generated when using a computer. Strategies that support green computing include recycling, using energy efficient hardware and energy saving features, regulating manufacturing processes, extending the life of computers, and immediately donating or properly disposing of replaced computers.
28
What is the typical weight of a game console?
3-11 pounds
29
How much data usage would it take to upload or download photos?
50 photos – approx. 50 MB
30
How much data usage would it take to watch an HD streaming video
1 hour – approx. 5-20 GB
31
Fact or Fiction: Many browsers and websites do not require the http:// and www portions of a web address?
Fact
32
search engine operators
Space or +: results have both words in any order OR: results have either word (): order of operations – e.g. Kalamazoo Michigan (pizza or subs) -: exclude a word from the search results \*: wildcard – e.g. writer\* would look for words that start with writer
33
What is a subject directory?
classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories
34
What is a disadvantage of a subject directory?
users sometimes have difficulty deciding which categories to choose as they work through the menus of links presented
35
What is the purpose of a bookmarking site?
a website that enables members to organize, tag and share links to media or other online content (e.g. pinterest)
36
examples of hot spot locations
shopping malls, coffee shops, restaurants, schools, airports, hotels and city parts
37
different types of websites
Search engines Online social networks Informational and research (dictionaries, directories and other types of reference, e.g. webMD) Media sharing (photo, video and music sharing, e.g. YouTube) Bookmarking (e.g. Pinterest) News, weather, sports and other mass media Educational (anything from tutorials for learning how to cook or fly to online college courses) Business, governmental and organizational (increase brand awareness, provide company background) Blogs (time-stamped articles or posts) Wikis and collaboration (enable users to organize, edit and share information) Health & Fitness (medical, health, fitness, nutrition, exercise) Science (space exploration, astronomy, etc) Entertainment (music, shows, games, etc in an interactive and engaging environment; typically streaming video) Banking & Finance (online banking and trading) Travel & tourism (research and make travel arrangements) Mapping (e.g. google maps) Retail & auctions (e.g. amazon) Careers & employment e-commerce (B2C, C2C or B2B) – not sure how this is different from retail Portals (e.g. MSN) Content aggregation (aggregates content based upon keyword) Website creation and management
38
Fact or Fiction: No single person, company, institution, or government agency owns the Internet
Fact The internet connects individuals, institutions, etc but it’s not owned by them. Each organization on the internet is responsible only for maintaining it’s own network
39
Fact or Fiction: If bandwidth is lower less data is transmitted, if higher more data can be transmitted
Fact
40
Fact or Fiction: A megabyte is one million characters
Fact A megabyte is 1 million bytes (byte usually represents a character; a byte is a group of binary digits, usually 8, operated on as a unit)
41
bundle software
Purchasing software at the same time you purchase a desktop may be less expensive than purchasing the software at a later time
42
ports for audio devices
Display port, HDMI or mini HDMI (all audio / video)
43
USB ports
general purpose ports that allow connection to a wide variety of devices
44
peripheral devices
connects to a computer system to add functionality (e.g. external hard drive, digital camera, game console, mouse)
45
backward compatible
property of a system, product, or technology that allows for interoperability with an older legacy system, or with input designed for such a system, especially in telecommunications and computing
46
Fact or Fiction Is a Pixel the smallest element in an electronic image?
Fact
47
server farm
network of several serves together in a single location; make it possible to combine the power of multiple servers
48
form factor
refers to the size, shape and packaging of a hardware device
49
cybercrime
refers to online or Internet-based illegal acts such as distributing malicious software or committing identity theft. Software used by cybercriminals is sometimes called crimeware
50
common types of malware
1. Malware (short for malicious software) consists of programs that act without the user’s knowledge and deliberately alter the operations of computers and mobile devices 1. Virus: A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the device works without the user’s knowledge or permission 2. Worm: Program that copies itself repeatedly, using up resources and possibly shutting down the computer, device or network 3. Trojan horse: Program that hides within or looks like a legitimate program. Does not replicate itself to other computers or devices. 4. Rootkit: Program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device. 5. Spyware: Program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates that information to some outside source while the user is online. 6. Adware: Program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages or other Internet services.
51
PIN
numeric password; provide an additional level of security
52
EULA
End User License Agreement – most common type of license include with software purchase
53
information theft
occurs when someone steals personal or confidential information. Both business and home users can fall victim
54
encryption
process of converting data that is readable by humans into encoded characters to prevent unauthorized access
55
decryption
To read the encrypted data, the recipient must decrypt or decode it using the key
56
content filtering
restricting access to certain material
57
ECPA (Electronic Communication Privacy Act)
Provides the same right of privacy protection of the postal delivery service and phone companies to various forms of electronic communications, such as voice mail, email and mobile phones
58
employee monitoring
involves the use of computers, mobile devices or cameras to observe, record and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity) and websites visited
59
spoofing
technique intruders use to make their network or Internet transmissions appear legitimate to a victim computer or network. Common types are IP Spoofing & Email Spoofing
60
DDoS (Distributed Denial of Service attack)
a zombie army is used to attack computers or networks; the volume brings down the target server
61
IT Code of Conduct
Technology must not be used to harm other people Employees must not meddle in others’ files Employees may use technology only for purposes in which they have been authorized Technology may not be used to steal Technology may not be used to bear false witness Employees may not copy or use software illegally Employees may not use others’ technology resources without authorization Employees may not use others’ intellectual property as their own Employees shall consider the social impact of programs and systems they design Employees always should use technology in a way that demonstrates consideration and respect for fellow humans
62
selective backup
1. users choose which folders and files to include in the backup 2. advantages: fast, provides great flexibility 3. disadvantages: difficult to manage; least management of all options
63
3 Generations Backup
Preserve 3 copies of important files 1. the grandparent is the oldest, parent is the second oldest and child is most recent 2. When a new back up is made, the grandparent is deleted, the parent becomes the grandparent, etc
64
Fact or Fiction: You can connect to 127 peripheral to a USB port
Fact
65
Fact or Fiction: A blade server exists in the form of a single circuit board
Fact
66
Fact or Fiction: A major advantage of using word processing software is that users easily can change what they have written.
Fact
67
Fact or Fiction: Many of the more secure personal finance apps have dual passwords that involve typing a string of characters and also validating a picture.
Fact
68
Fact or Fiction: With a computerized database, the computer stores the data in an electronic format on a storage medium such as a hard disk.
Fact
69
Fact or Fiction: A blocked vent can prohibit heat from escaping, which ultimately can cause the computer or mobile device to overheat.
Fact
70
Fact or Fiction: A DC adapter converts the DC power from the wall outlet into the AC power that the peripheral requires.
Fiction
71
control unit
the component of the processor that directs and coordinates most of the operations of the computer – interprets instructions and then initiates the appropriate action
72
How many ticks per second is a gigahertz / megahertz
1 GHz (gigahertz) equals 1 billion ticks of the system clock per second 1 MHz = 1 million
73
How many characters in a byte?
``` 8 characters (0 / 1) grouped together as a unit Unique bytes represent 256 different characters ```
74
coding scheme
the combination of 0s and 1s (e.g. the number 6 is 00110110)
75
SIMM (Single Inline Memory Module)
has pins on opposite sides of the circuit board that connect together to form a single set of contacts
76
DIMM (Dual Inline Memory Module)
has pins on the opposite side of the circuit board do not connect and thus form two sets of contacts
77
plug & play
computer automatically can recognize peripheral devices as you install them; plug it in and immediately being using it
78
USB adapter
dongle that plugs into a USB port, enhances functions of mobile computers and/or provides connects to peripheral devices
79
bus
electrical channel where bits travel; allows the various devices both inside and attached to the system to communicate with one another; just as vehicles travel on a highway to move from one destination to another, bits travel on a bus
80
What is the relationship between the micros USB and the International Electronics Commission?
The International Electronics Commission (IEC) is working with major technology providers to make micro USB the universal connector standard used to charge mobile devices
81
Fact or Fiction: Custom-built computers often do not include recovery media to restore the computer in the event it fails.
Fact?
82
types of apps
1. Productivity – accounting, personal finance, tax prep 2. Graphics & Media 3. Personal Interest 4. Communications 5. Security 6. File, Disk & System Management
83
software suite
collection of individual related applications available together as a unit
84
PC (personal computer)
fits on a desk; usually 1 user but more if networked, cost – several hundred to several thousand Game console: small box or handheld, 1 to several users, several hundred dollars
85
embedded computers
miniature, 1 user, cost is embedded in the price of the product (e.g. inside DVD player)
86
JPEG
JPEG stands for "Joint Photographic Experts Group." JPEG is a popular image file format. It is commonly used by digital cameras to store photos since it supports 224 or 16,777,216 colors. ... Still, the compression algorithm is lossy, meaning some image quality is lost during the compression process.
87
media library
Place to store images, audio & video
88
inattentional blindness
psychological phenomenon that causes you to miss things that are right in front of your eyes
89
How many mobile phones are lost or stolen per day?
2,000?
90
user interface
means by which the user and a computer system interact, in particular the use of input devices and software