Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
CPU
|
the “Brains” of the computer where the work is done.
|
|
Command-line Interface
|
type of user interface in which the user types commands or press special keys on the keyboard to enter data and instructions.
|
|
Graphical User Interface
|
a menu based interface known as icons (pictures that appear on the desktop environment).
|
|
Hard Copy
|
a printed page of text or graphics
|
|
Hardware
|
the physical equipment of a computer system that you can touch.
|
|
Impact Printers
|
a printer that strikes the paper in order to form images. Example: Dot Matrix Printer
|
|
Keyboard
|
an input device that enters data with letters, numbers, symbols, and special function keys.
|
|
Modem
|
computer hardware that allows information to be passed through the telephone lines
|
|
Monitor
|
the video screen of the computer.
|
|
Mouse
|
a pointing device used primarily with graphical interfaces
|
|
Non-impact Printer
|
a printer that forms images without striking the paper. Example: Laser or Inkjet Printers. (Laser printers are considered to be the Cadillac of all printers)
|
|
Output
|
the information that leaves the computer
|
|
Random Access Memory (RAM)
|
a type of memory that can be read from and written to by the processor and other devices. Ram memory is volatile.
|
|
Read Only Memory (ROM)
|
a type of memory that is used to store permanent data and instructions because it is nonvolatile.
|
|
Scanner
|
used like a copy machine to allow information to be input into the computer.
|
|
Softcopy
|
output viewed on the monitor.
|
|
Anti-virus Program
|
A computer program that detects viruses and repairs files
|
|
Bomb
|
A destructive computer code or virus designed to activate at a specific time
|
|
Commercial Software
|
Software whose copyright is owned by the author/software publisher
|
|
Copyright
|
Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work
|
|
Encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access
|
|
Ethics
|
The moral guidelines that govern the use of computers and information systems
|
|
Freeware
|
Software that is given away free of charge, but whose author still retains all rights
|
|
Hacker
|
A person who secretly gains access to computers and files without permission
|
|
Hoax
|
A program intended to scare users into thinking they have a virus
|
|
Password
|
A safeguard for access to a computer or computer program
|
|
Phage
|
A program that modifies other programs, operating systems, and database
|
|
Piracy
|
The illegal copying and distribution of software
|
|
Public Domain Software
|
Software that is not copyrighted and is free to copy and distribute
|
|
Shareware
|
Copyrighted software distributed free of charge on a trial basis with parment by the honor system
|
|
Trojan Horse
|
A virus that is disguised as a useful peice of software
|
|
Virus
|
A computer program designed to cause damage to a computer
|
|
Worm
|
A destructive computer program that bores its way through a computer's files or through a computer's network
|