• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back
Drivers
used to communicate with peripheral devices such as monitors, printers and keyboards
MacOS
proprietary operating system for computers made by Apple Corporation - based on the UNIX operating system and originally set the standard for graphical user interfaces
UNIX
originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for
midrange servers

muiltiuser, multitasking operating system

FLEXIBLE
Search Tools
utility programs that search for documents and other files on a user's hard drives

integrated into file management programs and they are highly improved in recent versions of some operating systems
security patches
small program updates that correct known security problems
file management program
allows files to be opened, moved, copied, renamed, and deleted

Example: Windows Explorer
computer virus
making your computer function abnomally
record
more commonly called a row

collection of related fields

Example: the ID number, name, address, and major of Phyllis Hoffman
function
Used in EXCEL

a named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount
slide layout
containing placeholders for text and charts and other elements in a slide
Ribbon
a new feature in versions of Microsoft Office, starting with Office 2007

consists of tabs, which contain groups of related commands for the program being used

Example: Microsoft word - Home Tab
software suit
related software programs (such as a group of graphics programs, utility programs, or office-related software) are sold bundled together
public domain software
no copyrighted

ownership rights to the program have been donated to the public domain

free and can be used, copied, modified, and distributed to others without restrictions
relational database
most common type of database used with personal computers today

used to create, maintain, and organize data in a database, organized into fields, records, and files
Isochronous Transmission
dada is sent at the same time as other related data to support certain types of real-time applications that require the different types of data to be delivered at the proper speed for that application

when transmitting a video, audio must be transmitted at the same time
bluetooth
a networking standard for very short-range wireless connections

the devices are automatically connected once they get within the allowable range
collaboration software
software that enables a group of individuals to work together on a project
GPS
global positioning system

consists of 24 department of Defense satellites (in orbit approximately 12,000 miles above the earth) that are used for location and navigation purposes
coaxial cable
also known as a coax

originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service

consists of a relatively thick center wire surrounded by insulation and then covered with a shield of braided wire to block electromagnetic signals from entering the cable

commonly used today for computer networks
PAN
personal area network

network of personal devices for one individual (such as his or her portable computer, mobile phone, headset, digital camera, portable digital media player, and printer) that is designed to enable those devices to communicate and share data

limited range
Analog
a type of signal where the data is represented by continuous waves

such as those used by the conventional telephone system
blog
also called web log

a webpage that contains short, frequent updated entries in chronological order, typically as means of expression or communication

a blog is an online personal journal accessible to the public that is usually created and updated by the individual
Keyword Search
when you type the appropriate keywords (one or more key terms) describing what you are looking for into a search box

The site's search engine then uses those keywords to return a list of webpages that match your search criteria
ISP
internet service provider

a business or other organization that provides internet access to others, typically for a fee
ICANN
Internet Corporation for Assigned Names and Numbers

coordinates actives related to the Internet's naming system, such as IP address allocation and domain name management
ASP
Application Service Provider

A company that manages and distributes software-based services over the Internet

provides access to software applications via the Internet

rent access to software programs to companies or individuals - typically customers pay a monthly or yearly fee to use each application
P2P Networks
a central server is not used

all computers on the network work at the same functional level, and users have direct access to the computers and other devices attached to the network

shared devices
BoF
Broadband over Fiber

a new type of direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building

Also called FTTP: fiber-to-the-premises
ARPANET
1969, Advanced Research Projects Agency Net

a predecessor of the Internet, named after the Advanced Research Projects Agency (ARPA), which sponsored the development
Password
the most common type of possessed knowledge, are secret words or character combinations associated with an individual

typically used in conjunction with a username
cybercrime
expensive, inconvenient, and physically dangerous
cyberbullying
children or teenagers bullying other children or teenagers via the internet
Malware
generic term that refers to any type of malicious software

intentionally written to perform destructive acts, such as damaging programs, deleting files, erasing an entire hard drive, or slowing down the performance of a computer
Public Key encryption
called asymmetric key encryption, utilizes two encryption keys to encrypt and decrypt documents

uses a pair of keys (a privage key and a public key) that are related mathematically to each other and have been assigned to a particular indivdual

Not secret and available for everyone to see
Unauthorized Access
occurs whenever an individual gains access to a computer, network, file, or other resource without permission - typically by hacking into the resource
Digital Certificate
authenticate the identity of an indiviudal or organization

granted by Certificate Authorities and typically contain the name of the person, organization, or Web site being certified along with a certificate serial number and expiration date

includes public/private key pair
Wi-Fi piggybacking
accessing an unsecured Wi-Fi network from your current location without authorization
War Driving
typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to