Computer Literacy

Created by rimi2001 

Upgrade to
remove ads

60 terms

Adware

Spyware that tracks a user's Internet browsing and installs malicious cookies

Application Software

Programs w/ which you accomplish tasks such as word processing, photo editing, or sending email & use computer in a productive manner

Antivirus Software

program that protects a computer from malicious software designed to threaten privacy and confidentiality.

Bandwidth

the maximum amount of data that can travel over a given data transmission channel in a given amount of time. Bits per second bps

Binary

computer language-
Bit Binary digit 0 or 1
Byte- 8 bits basic storage in a computer
Each letter # - a string of 8 0's and 1's
256 combinations

Blog

an online diary that looks like a web page but is easier to create and update by posting text, photos, or links to other sites

Bluetooth

Wireless technology that uses radio waves to transmit data over short distances and often used with mobile devices. Low bandwith 720 kbps

Boolean

For columns containing data with two values such as true/false or yes/no.

Broadband

It refers to high-speed data transmission in which a single cable can carry a large amountof data at once.

Chat Room

a site on the internet where a number of users can communicate in real time (typically one dedicated to a particular topic)

Client Server Network

-A network in which one or more computers are servers and provide services to the other computers, which are called clients
-Servers have hardware, software, and/or information that the client computers can access
-Servers are usually powerful computers with large storage systems

Computer Literate

understanding the capabilities and limitations of computers and knows how to use computer technology to accomplish tasks.

Ctrl Key

Is pressed together with another key to control or command an action , used for selecting non-sequential items

Cookie

small text file containing info that identifies a visitor to a web site

CPU Central Processing Unit

part of the computer responsible for controlling all the commands and tasks the computer performs, acting as the brain of the computer.

Digital Divide

A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the internet, and people who do not have the resources and access to the technology.

Domain Name

strings of letters used to name organizations and computers and addresses on the internet

Favorite

area in internet explorer that lets you manage your favorites list, the history list, and the feeds list

Firewall

software program or hardware device designed to prevent unauthorized access to a computer

GUI Graphical User Interface

computer interface with which you interact with the computer through the use of graphics and point and click technology; GUIs show documents as they will look in their final form.

Hard disk

a magnetic medium used to store electronic data that can be read by a computer

Hotspots

A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

Identity Theft

the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge

information technology

the technical means that humans create to store and transmit information

Internet

a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

Internet backbone

a collection of high-speed data lines that connect major computer systems located around the world

IP address

a number that uniquely identifies each computer or device connected to the Internet

Keyword

A word or phrase used in a search

Hyperlink

text that you click to go to another location in a doc. , another doc, or a web site; the text is a different color (usually blue) than the surrounding text, and commonly underlined

Malware

software designed to infiltrate or damage a computer system without the user's informed consent

Motherboard

large printed circuit board located in the system unit ot which all other boards are connected; the motherboard contains, the CPU, the memory RAM, and expansion slots

Multimedia

transmission that combine media of communication (text and graphics and sound etc.)

Netiquette

The rules for good manners on the Internet

Network interface card

NIC, A Network Interface Card (NIC) is an interface fitted inside a personal computer or network terminal which allows it to communicate with other machines over a network. The card technology will vary according to the network used, but every card on a network must have some way of uniquely identifying itself and some means of converting the signals form the computer to a form which can be transmitted over the connection.

Path

?

Phishing

email that masquerades as an authentic entity such as a bank or credit card co. requesting confidential info.

Pixel

an abbreviated name for picture element

Plug-in

A hardware or software application that adds a specific feature to a computer.

Protocol

set of rules for transferring data over the Internet

Public Domain

Condition a product or original work enters when it is unprotected by copyright or patent, and could be used by anyone free of charge.

Random Access Memory RAM

a computer's temporary storage space or short - term memory and stored on chips located on the motherboard; measured in megabytes MB and gigabytes GB

Read Only Memory ROM

set of memory chips located on the motherboard that stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up.

Resolution

The measurement used to assess the clarity of an image on a monitor; determined by pixel density

Router

A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.

Search Engine

software programs that search for keywords in files and documents or other web sites found on the internet

Server

in a client service network, the computer that manages shared network resources and provides access to the client computer when requested

Social Networking site

a Web site where users list information about themselves and talk with friends online

software

programs and routines that control the functioning of a computer

spam

junk or unsolicited email

spyware

software designed to capture personal and confidential info that resides on a computer and then send it elsewhere.

system software

software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management

WiFi

a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet

URL example

http://www.nytimes.com/pages/cartoon

http is the protocol
www.nytimes.com is the domain name
.com is the TLD- top level domain
pages/cartoon is the path or subdirectory

How does Internet work?

step 1 client computer makes requests for info. through a web browser.
step 2 request travels from my computer to local and regional companies that provide access to intermediary Internet pathways.
step 3 the regional access co. routes that request to a national co. that provides access to the main Internet pathway, the Internet backbone.
step 4 the national co. routes the request along the internet backbone and through more local and regional Internet access companies to reach host server computer(destination)

Web browsers

# Internet Explorer
# Mozilla Firefox
# Opera
# Safari
# Google Chrome

Search Engine and Subdirectory Difference

Search engine Use computer programs to search the Web
Sub directories Selected and organized by people

popular search engines

google
ask jeeves
msn
yahoo search

Ways to evaluate content of a Web site

author, relevancy, bias, audience and links, currency

Primary indications of a secure online transaction

* Should never consist of user name.
* Should be minimum of eight characters long.
* Should compulsorily include both lower case and uppercase alphabets (minimum one from each group is suggested).
* Should consist of minimum one number (0 to 9).
Should consist of at least one symbol. (Eg: , ^, $, #)

Some virus symptoms

# The computer is running considerably slower than normal for no apparent reason.
# The machine is crashing and restarting by itself after every few minutes.
# The applications and the programs on the machine are not working correctly, or are not responding to any commands.
# The machine is not responding in general, and everything is simply frozen.
# There are error messages popping out on a regular basis.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

NEW! Voice Recording

Click the mic to start.

Create Set