Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
38 Cards in this Set
- Front
- Back
Drivers
|
used to communicate with peripheral devices such as monitors, printers and keyboards
|
|
MacOS
|
proprietary operating system for computers made by Apple Corporation - based on the UNIX operating system and originally set the standard for graphical user interfaces
|
|
UNIX
|
originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for
midrange servers muiltiuser, multitasking operating system FLEXIBLE |
|
Search Tools
|
utility programs that search for documents and other files on a user's hard drives
integrated into file management programs and they are highly improved in recent versions of some operating systems |
|
security patches
|
small program updates that correct known security problems
|
|
file management program
|
allows files to be opened, moved, copied, renamed, and deleted
Example: Windows Explorer |
|
computer virus
|
making your computer function abnomally
|
|
record
|
more commonly called a row
collection of related fields Example: the ID number, name, address, and major of Phyllis Hoffman |
|
function
|
Used in EXCEL
a named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount |
|
slide layout
|
containing placeholders for text and charts and other elements in a slide
|
|
Ribbon
|
a new feature in versions of Microsoft Office, starting with Office 2007
consists of tabs, which contain groups of related commands for the program being used Example: Microsoft word - Home Tab |
|
software suit
|
related software programs (such as a group of graphics programs, utility programs, or office-related software) are sold bundled together
|
|
public domain software
|
no copyrighted
ownership rights to the program have been donated to the public domain free and can be used, copied, modified, and distributed to others without restrictions |
|
relational database
|
most common type of database used with personal computers today
used to create, maintain, and organize data in a database, organized into fields, records, and files |
|
Isochronous Transmission
|
dada is sent at the same time as other related data to support certain types of real-time applications that require the different types of data to be delivered at the proper speed for that application
when transmitting a video, audio must be transmitted at the same time |
|
bluetooth
|
a networking standard for very short-range wireless connections
the devices are automatically connected once they get within the allowable range |
|
collaboration software
|
software that enables a group of individuals to work together on a project
|
|
GPS
|
global positioning system
consists of 24 department of Defense satellites (in orbit approximately 12,000 miles above the earth) that are used for location and navigation purposes |
|
coaxial cable
|
also known as a coax
originally developed to carry a large number of high-speed video transmissions at one time, such as to deliver cable TV service consists of a relatively thick center wire surrounded by insulation and then covered with a shield of braided wire to block electromagnetic signals from entering the cable commonly used today for computer networks |
|
PAN
|
personal area network
network of personal devices for one individual (such as his or her portable computer, mobile phone, headset, digital camera, portable digital media player, and printer) that is designed to enable those devices to communicate and share data limited range |
|
Analog
|
a type of signal where the data is represented by continuous waves
such as those used by the conventional telephone system |
|
blog
|
also called web log
a webpage that contains short, frequent updated entries in chronological order, typically as means of expression or communication a blog is an online personal journal accessible to the public that is usually created and updated by the individual |
|
Keyword Search
|
when you type the appropriate keywords (one or more key terms) describing what you are looking for into a search box
The site's search engine then uses those keywords to return a list of webpages that match your search criteria |
|
ISP
|
internet service provider
a business or other organization that provides internet access to others, typically for a fee |
|
ICANN
|
Internet Corporation for Assigned Names and Numbers
coordinates actives related to the Internet's naming system, such as IP address allocation and domain name management |
|
ASP
|
Application Service Provider
A company that manages and distributes software-based services over the Internet provides access to software applications via the Internet rent access to software programs to companies or individuals - typically customers pay a monthly or yearly fee to use each application |
|
P2P Networks
|
a central server is not used
all computers on the network work at the same functional level, and users have direct access to the computers and other devices attached to the network shared devices |
|
BoF
|
Broadband over Fiber
a new type of direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building Also called FTTP: fiber-to-the-premises |
|
ARPANET
|
1969, Advanced Research Projects Agency Net
a predecessor of the Internet, named after the Advanced Research Projects Agency (ARPA), which sponsored the development |
|
Password
|
the most common type of possessed knowledge, are secret words or character combinations associated with an individual
typically used in conjunction with a username |
|
cybercrime
|
expensive, inconvenient, and physically dangerous
|
|
cyberbullying
|
children or teenagers bullying other children or teenagers via the internet
|
|
Malware
|
generic term that refers to any type of malicious software
intentionally written to perform destructive acts, such as damaging programs, deleting files, erasing an entire hard drive, or slowing down the performance of a computer |
|
Public Key encryption
|
called asymmetric key encryption, utilizes two encryption keys to encrypt and decrypt documents
uses a pair of keys (a privage key and a public key) that are related mathematically to each other and have been assigned to a particular indivdual Not secret and available for everyone to see |
|
Unauthorized Access
|
occurs whenever an individual gains access to a computer, network, file, or other resource without permission - typically by hacking into the resource
|
|
Digital Certificate
|
authenticate the identity of an indiviudal or organization
granted by Certificate Authorities and typically contain the name of the person, organization, or Web site being certified along with a certificate serial number and expiration date includes public/private key pair |
|
Wi-Fi piggybacking
|
accessing an unsecured Wi-Fi network from your current location without authorization
|
|
War Driving
|
typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to
|