Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
93 Cards in this Set
- Front
- Back
an ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet
|
digital revolution
|
|
The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers
|
ALU (Arithmetic Logic Unit)
|
|
Data that is measured or represented on a continuously varying scale, such as a dimmer switch or watch with a sweep second hand.
|
Analog data
|
|
Software and/or hardware that cloaks the origin of an e-mail or Web page request
|
Anonymizer tools
|
|
Computer programs that help you perform a specific task, such as word processing.
|
Application software (also called application programs, applications or programs)
|
|
Short for applications; popularly used to refer to applications available for iPhone, iPad and other mobile devices.
|
Apps
|
|
A code that represents characters as a series of 1s and 0s. Most computers use this to represent text, making it possible to transfer data between computers
|
ASCII (American Standard Code for Information Interchange)
|
|
Any type of electronic communication, such as e-mail, blogs, or Facebook wall postings, in which the sender and receiver are not required to be online at the same time.
|
Asynchronous communication
|
|
Passwords, user IDs, and biometric measures used to verify a person's identity.
|
Authentication protocol
|
|
A method for representing numbers using only two digits: 0 and 1.
|
Binary number system
|
|
The use of physical attributes, such as a fingerprint, to verify a person's identity.
|
Biometrics
|
|
The smallest unit of information handled by a computer. It is one of two values, either a 0 or a 1.
|
Bit
|
|
A method of breaking encryption code by trying all possible encryption keys
|
Brute force attack
|
|
An 8-bit unit of data that represents a single character
|
Byte
|
|
A condition in which uppercase letters are not equivalent to their lowercase counterparts
|
Case sensitive
|
|
The main processing circuitry within a computer or chip that contains the ALU, control unit, and registers.
|
Central processing unit (CPU)
|
|
Letters, symbols, or numerals that will not be used in arithmetic operations (name, Social Security number, etc).
|
Character data
|
|
A computer or software that requests information from another computer or server
|
Client
|
|
Software that translates a program within a high-level language into low-level instructions before the program is executed
|
Compiler
|
|
Refers to any task, problem, or product that is able to handle massive amounts of data and complex mathematical calculations.
|
Compute-intensive
|
|
A device that accepts input, processes data, stores data, and produces output according to a stored program.
|
Computer
|
|
A collection of computers and related devices, connected in a way that allows them to share data, hardware, and software.
|
Computer network
|
|
A detailed set of instructions that tells a computer how to solve a problem or carry out a task
|
computer program
|
|
The part of the microprocessor that directs and coordinates processing
|
Control unit
|
|
In the context of technology, the melding of digital devices into a single platform that handles a diverse array of digital content, such as cell phones, which also play digital music and display digital video.
|
Convergence
|
|
A term coined by William Gibson and now used to refer to information and other resources offered in virtual "worlds" based on computer networks and the Internet.
|
Cyberspace
|
|
Refers to the symbols that a computer uses to represent facts and ideas.
|
Data
|
|
The use of electronic signals, marks, or binary digits to represent character, numeric, visual, or audio data.
|
Data representation
|
|
A method of discovering a password by trying every word in an electronic dictionary.
|
Dictionary attack
|
|
Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.
|
Digital data
|
|
A gap between those who have access to digital technologies and those who do not.
|
Digital divide
|
|
To convert non-digital information to a digital format through the use of a scanner, sampler, or other input device.
|
Digitization
|
|
The process of transferring a copy of a file from a remote computer to a local computer's storage device
|
Download
|
|
A method by which digital computers, usually mainframes, represent character data.
|
EBCDIC (Extended Binary-Coded Decimal Interchange Code)
|
|
Messages that are transmitted between computers over a communications network.
|
E-mail
|
|
8-bit character representation instead of 7-bit, allowing for an additional 128 characters.
|
Extended ASCII
|
|
A named collection of data (such as a computer program, document, or graphic) that exists on a storage medium, such as a hard disk or CD.
|
File
|
|
Approximately 1 billion bits, exactly 1,024 megabits.
|
Gigabit (Gb or Gbit)
|
|
Approximately 1 billion bytes; exactly 1,024 megabytes.
|
Gigabyte
|
|
A group of social, economic, political, and technological interdependencies linking people and institutions from all areas of the world.
|
Globalization
|
|
An illegal practice in which a criminal obtains enough information to masquerade someone.
|
Identity theft
|
|
As a noun, the information that is conveyed to a computer. As a verb, to enter data into a computer.
|
Input
|
|
The steps followed by a computer to process a single instruction; fetch, interpret, execute, then increment the instruction pointer.
|
Instruction cycle
|
|
The collection of instructions that a CPU is designed to process
|
Instruction set
|
|
A thin slice of silicon crystal containing microscopic circuit elements, such as transistors wires, capacitors, and resistors.
|
Integrated circuit (IC). Also called chips and microchips.
|
|
A legal concept that refers to ownership of intangible information, such as ideas.
|
Intellectual property
|
|
The worldwide communication infrastructure that links computer networks using TCP/IP protocol.
|
Internet
|
|
A program that converts high-level instructions in a computer program into machine language instructions, one instruction at a time.
|
Interpreter
|
|
A program, sometimes part of a Trojan horse, that records a person's keystrokes, saves them, and then sends them to a system administrator or remote hacker.
|
Keylogger
|
|
1024 bits
|
Kilobit (Kbit or Kb)
|
|
1024 bytes
|
Kilobyte (KB or KByte)
|
|
Program instructions written in binary code that the computer can execute directly
|
Machine code
|
|
A low-level language written in binary code that the computer can execute directly.
|
Machine language
|
|
A large, fast, and expensive computer generally used by businesses or government agencies to provide centralized storage, processing, and management for large amounts of data.
|
Mainframe computer
|
|
1,048,576 bits
|
Megabit (Mb or Mbit)
|
|
1,048,576 bytes
|
Megabyte (MB or MByte)
|
|
The computer circuity that holds data waiting to be processed.
|
Memory
|
|
A special purpose microprocessor that is built into the device it controls
|
Microcontroller
|
|
An integrated circuit that contains the circuitry for processing data. It is a single-chip version of the central processing unit (CPU) found in all computers.
|
Microprocessor
|
|
Numbers that represent quantities and can be used in arithmetic operations
|
Numeric data
|
|
The low-level instructions that result from compiling source code
|
Object code
|
|
Web sites that provide ways for people to communicate and socialize
|
Online social networks
|
|
An assembly language command word that designates an operation such as add, compare, or jump.
|
Op code (operation code)
|
|
An approach to developing and licensing software in which source code remains public so it can be improved and freely distributed.
|
Open source
|
|
The part of an instruction that specifies the data, or the address of the data, on which the operation is to be performed.
|
Operand
|
|
The software that controls the computer's use of its hardware resources, such as memory and disk storage space.
|
Operating system
|
|
The results produced by a computer (for example, reports, graphs, and music)
|
Output
|
|
A special set of symbols used to restrict access to a user's computer or network
|
Password
|
|
Software that keeps track of sites at which a user has registered and the password that corresponds to each site
|
Password manager
|
|
A shirt-pocket sized computer originally designed to keep track of appointments
|
PDA (personal digital assistant)
|
|
A microcomputer designed for use by an individual user for applications, such as Web browsing and word processing
|
Personal computer
|
|
An e-mail based scam that's designed to fool users into revealing confidential information.
|
Phishing
|
|
Small, lightweight, battery-powered devices designated to store and play audio, video, or image files stored in such formats as MP3 and AAC.
|
Portable media players
|
|
The manipulation of data by a computer's microprocessor or central processing unit
|
Processing
|
|
A set of keywords and grammar that allows a programmer to write instructions that a computer can execute
|
Programming language
|
|
A sort of "scratch pad" area of the microprocessor into which data or instructions are moved so that they can be processed.
|
Registers
|
|
Substances, such as silicon or germanium, that can act either as a conductor or an insulator. Used in the manufacture of computer chips.
|
Semiconducting materials (Semiconductors)
|
|
A computer or software on a network that supplies the network with data and storage.
|
Server
|
|
A handheld device that integrates the functions of a mobile phone, PDA, portable music player, or other digital device.
|
Smartphone
|
|
In the context of computer hacking, a technique that uses packet sniffer software to capture packets as they are sent over a network.
|
Sniffing
|
|
The instructions that direct a computer to perform a task, interact with a user, or process data.
|
Software
|
|
Computer instructions written in high-level language
|
Source code
|
|
The area in a computer where data is retained on a permanent basis
|
Storage
|
|
A set of instructions that resides on a storage device, such as a hard drive, and can be loaded into computer memory and executed.
|
Stored program
|
|
The fastest and most expensive type of computer, capable of processing trillions of instructions per second.
|
Supercomputer
|
|
Any type of electronic communication, such as online discussions, Voice over IP, or video conferencing, in which the sender and receiver are communicating online at the same time.
|
Synchronous communication
|
|
The main circuit board in a computer that houses chips and other electronic components
|
System board
|
|
Computer programs, such as an operating system or utility software, that helps the computer carry out essential operating tasks
|
System software
|
|
A 16-bit character-representation code that can represent more than 65,000 characters.
|
Unicode
|
|
A combination of letters and numbers that serves as a user's "call sign" or identification.
|
User ID (username)
|
|
A computer specifically designed for playing games using a television screen or monitor, and game controllers.
|
Videogame console
|
|
An Internet service that links documents and information from computers located worldwide, using the HTTP protocol.
|
Web
|
|
1) A computer connected to a local area network
2) A powerful desktop computer designed for specific tasks |
workstation
|