Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
LAN
|
Local area network-uses local satelite
|
|
Worm
|
program that copies itself repeatedly in memory until there is no space left.
|
|
DL
|
Distance Learning
|
|
Name two storage mediums
|
Floppy drive
zip drive |
|
Intellectual Property
|
Work created by inventore, authors, and artists
|
|
Malware
|
types of program virus- act without users knowledge and alters computer programs
|
|
What is memory?
|
temporary holding place for data and instructions.
ex.) volatile (RAM) non-volatile (ROM) |
|
Emerging technology
|
ex.) virtual reality, and robots
|
|
Computer virus
|
potentially dangerous computer program that infects your computer negatively and withough you knowing it.
|
|
E-commerce is?
|
A financial business transaction that occurs over an electronic network
|
|
How does a floppy store data?
|
stores data on tracks called grooves broken into sectors broken into clusters
|
|
Another name for e-commerce
|
e-business
|
|
Health risks to computer users
|
1.) carpel tunnel
2.) eye strain 3.) ethics |
|
GPS
|
Global positioning system
|
|
disk controllers -2 types
|
EIDE
SCSI |
|
Modem
|
communication device:dials uo, sends 2 kinds of signals analog and digital
|
|
3 signs of a virus
|
1.) unusual message or image
2.) available memory id down 3.) program or file is missing |
|
Digital divide
|
problem of those who have access to the internet and those who don't
|
|
Telecommunicating
|
Working from home
|
|
CBT
|
Computer based training
|
|
Norton Utilities
|
A popular anti-virus software
|
|
Firewall
|
hardware that has software that restricts access to data and information on a network.
|
|
Ways to keep the computer secure and prevent from loss
|
1.) access control (passwords, id's, badge...)
2.) voice recognition 3.) face recognition 4.) signature |
|
WBT
|
Web based training
|
|
Encryption
|
Process of converting readable to unreadable to prevent unauthorized access
|
|
Name a type of home network
|
ethernet- requires each computer to have a powerline cable. Hook up through a computer.
|
|
Analog signal
|
continous electrical signal
|
|
5 things needed for a communication device
|
1. sending device
2. communication device 3. channel/path 4. communications device 5. receiving device |
|
SPAM
|
unsolicited e-mail messages
|
|
WAN
|
Wide area network-uses international satelites
|
|
Networks
|
Collection of computers and devices that share the same resources
|
|
Spyware
|
program put on computer that secretely collects info on user
|
|
Cyber crime
|
online or internet based illegal acts
|
|
Cookies
|
any info put into the computer about self
|
|
Digital Signal
|
electrical impulses
|
|
Hacker
|
someone who tries to access computer information illegally
|
|
Examples of home networks
|
1.) Phone line network
2.) PLC- power line cable 3.) Ethernet 4.) Home RF |
|
Time bomb
|
A computer virus that activates on a certain date/time
|
|
ISDN
|
Integrated services digital network
ex.) verizon, adelphia |
|
3 tips to prevent a virus
|
1.) install anti-virus program
2.) check security settings 3.) back up files |
|
Sending device examples
|
1.) pc
2.) handhelp 3.) cellphone |
|
2 controls to use to ensure your computer hardware's safety
|
1.) lock door
2.) bolt down computer |
|
Trsnsfer rate
|
speed in which you can access data
|
|
Macro Virus
|
uses the macro computer language to hide (usually in word or excel)
|
|
Power surge
|
causes system failure due to ireased amount of electricity
|