Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
48 Cards in this Set
- Front
- Back
Antivirus
|
Software that finds and eliminates viruses
|
|
Application Software
|
Programs that perform a business function. Some are general purpose like Excel or word. Others have very specific functions.
|
|
Binary digit
|
Either a 0 or a1.
|
|
Bit
|
The way computers represent data
|
|
Bus
|
means by which the CPU reads instructions and data from main memory and writes data to main memory
|
|
Byte
|
A character of data or an 8-bit chunk.
|
|
Cache Memory
|
Small amount of very fast computer memory that holds the most frequently used data.
|
|
CD-R
|
Optical disk that can record data once
|
|
CD-ROM
|
Read-only optical disk
|
|
CD-RW
|
Rewritable optical disk
|
|
Central processing unit (CPU)
|
selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations.
|
|
Client
|
Person operating the machines.
|
|
Data channel
|
means by which the CPU reads instructions and data from main memory and writes data to main memory.
|
|
Dot pitch
|
distance between pixels on a CRT monitor
|
|
Dual processor
|
A computer with two CPU's
|
|
DVD-R
|
A digial versatile disk that can record data once
|
|
DVD-ROM
|
A read -one digital versatile disk
|
|
DVD-RW
|
A rewritable digital versatile disk
|
|
Firmware
|
Software installed onto devices like printers instead of computers
|
|
Hardware
|
Electronic components and related technology that input, process, output, store, and communicate
|
|
Horizonal-market application
|
Software that provides capabilities common across all organizations and industries; examples include word processors, graphics programs, spreadsheets, and presentation programs.
|
|
Input hardware
|
Hardware devices that connect to a computer. Keyboard, moue, document scanners, etc...
|
|
Instruction set
|
collection of instructions that a computer can process.
|
|
Linux- Client Side
|
Open source operating system that was developed off of Unix. Owed by the open source community.
|
|
Linux Server Side
|
Linux is very popular on the server side.
|
|
Mac OS
|
Alternative operating system for macs, newer systems can now also run windows parallels
|
|
Macro Virus
|
Attaches itself to common files and when file is opened places destructive code in start up of that application and spreads from there
|
|
Main Memory
|
Basic component of computer, code transferred from hard drive to memory to run
|
|
Nonvolatile memory
|
Magnetic and optical discs, when power is turned off data is still stored
|
|
Memory swapping
|
Main memory is too small to hold code for all apps and operating system so memory swapping is used to move instructions in and out of the main memory
|
|
Operating system
|
Controls computers resources, includes specific instruction set based on computers processor
|
|
output hardware
|
Includes video displays, printers, speakers, etc
|
|
patch
|
Modifications that fix problems in programs code
|
|
payload
|
A virus program code that can alter or delete data in a computer
|
|
pixel
|
small spots used to create a display- The basic unit of the composition of an image on a television screen, computer monitor, or similar display.
|
|
RAM
|
Random access memory- Computer's main memory
|
|
Rotational Delay
|
Time required for a disk to rotate into the position needed to access required data
|
|
Seek Time
|
time it takes the head of the disk drive to move to the correct location to access data
|
|
Server
|
Provides service to client
|
|
Site License
|
Company has to purchase for some software in order to run software on all computers
|
|
Thick client
|
Uses programs in addition to a web browser
|
|
Thin Client
|
Only uses web browser
|
|
Trojan Horse
|
Virus that looks like a normal program but may be damaging to computer's programs or data
|
|
Unix
|
Operating system, popular with engineers and computer scientists
|
|
Vertical-Market Application
|
Serve a specific industry
|
|
Virus
|
Programs that replicate themselves and may rob computers of useful data
|
|
Volatile Memory
|
Cache and main memory- lost when computer power is turned off
|
|
Worm
|
Virus that uses networks to spread from one computer to another.
|