• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

Plagarism

Taking credit for someone else's intellectual property, typically a written idea, by claiming it as your own.

DMCA

The Digital Millennium Copyright Act is a U.S. copyright law designed to reduce illegal digital media copying by criminalizing the production, distribution, and use of technologies designed to circumvent DRM technologies.

Piracy

The illegal copying, use, and distribution of digital intellectual property, such as software, music, and movies.

Security Threats

Data-entry errors, Errors in programming, Mishandling output, Uninformed dangerous activity, Improper installation/setup

Privacy

Being free from intrusion-the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself.

Security

The protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized users.

Intellectual Property

A product of the mind or intellect over which the owner holds legal entitlement.

Fair Use

The doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.

1992

The World Wide Web was commercialized

1969

The internet was founded

Domain Name System (DNS)

database of all domain names and IP addresses used on the internet

Peer 2 Peer (P2P)

a network architecture that does not utilize a central server but facilitates communication directly between clients with computers acting as both client and server.

Server

A powerful computer that often utilizes many processors to provide services to many users simultaneously over a network.

Client

a desktop computer or workstation that is capable of obtaining information and applications from a server.

ICANN

The Internet Corporation for Assigned Names and Numbers

Data Center

A climate-controlled building or set of buildings that house servers that store and deliver mission-critical information and services.

ISP

Internet Service Provider

Green Computing

utilize environmentally conscious practices in the manufacturing and use of digital technologies.

What runs on roughly 82% of all computers?

Microsoft

Difference between mobile and computer applications

None

Programming Language

Provides a set of symbols, commands, and rules (syntax) used to write program codes.

SSD

Solid-State Drive

ROM

Read-Only Memory

Operating System (OS)

A set of computer programs that runs or controls the computer hardware, and acts as a user interface.

World Wide Web

An application of the internet that uses a web browser.

RAM

Random Accessing Memory

CPU

Central Processing Unit

The Internet

The world's largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world.

Computers use __ to produce __.

Input; Output

The difference between MAC and Windows PC's

None

Types of PCs

Desktop, Notebook, Tablet, Smartphone, Custom

Personal Computer (PC)

Any general-purpose computer designed to meet the many computing needs of one individual.

Digital Convergence

Takes advantages of the fact that digitization standardizes all types of data to 1s and 0s to create devices that combine the functionality of several digital electronics devices.

Uses for Computer

Computation, Automation, Communication, Entertainment, Managing Info

Computer Literacy

A functional understanding of the fundamentals of computers and their uses.

Ethical Dilemma

The privacy concerns for the amount of data collected about individuals by businesses and governments; the risk of private data falling into the hands of hackers and criminals.

Digital Technology

With digital electronics allow us to manipulate all types of information as digits (1s and 0s) in order to store and manage the information more efficiently and effectively.

Cloud Computing

computing resources including storage, processing, applications, and network services that are remotely located and accessed using a network (often the internet)