Programs w/ which you accomplish tasks such as word processing, photo editing, or sending email & use computer in a productive manner
program that protects a computer from malicious software designed to threaten privacy and confidentiality.
the maximum amount of data that can travel over a given data transmission channel in a given amount of time. Bits per second bps
Bit Binary digit 0 or 1
Byte- 8 bits basic storage in a computer
Each letter # - a string of 8 0's and 1's
an online diary that looks like a web page but is easier to create and update by posting text, photos, or links to other sites
Wireless technology that uses radio waves to transmit data over short distances and often used with mobile devices. Low bandwith 720 kbps
It refers to high-speed data transmission in which a single cable can carry a large amountof data at once.
a site on the internet where a number of users can communicate in real time (typically one dedicated to a particular topic)
Client Server Network
-A network in which one or more computers are servers and provide services to the other computers, which are called clients
-Servers have hardware, software, and/or information that the client computers can access
-Servers are usually powerful computers with large storage systems
understanding the capabilities and limitations of computers and knows how to use computer technology to accomplish tasks.
Is pressed together with another key to control or command an action , used for selecting non-sequential items
CPU Central Processing Unit
part of the computer responsible for controlling all the commands and tasks the computer performs, acting as the brain of the computer.
A term used to describe the discrepancy between people who have access to and the resources to use new information and communication tools, such as the internet, and people who do not have the resources and access to the technology.
strings of letters used to name organizations and computers and addresses on the internet
area in internet explorer that lets you manage your favorites list, the history list, and the feeds list
GUI Graphical User Interface
computer interface with which you interact with the computer through the use of graphics and point and click technology; GUIs show documents as they will look in their final form.
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
a collection of high-speed data lines that connect major computer systems located around the world
text that you click to go to another location in a doc. , another doc, or a web site; the text is a different color (usually blue) than the surrounding text, and commonly underlined
software designed to infiltrate or damage a computer system without the user's informed consent
large printed circuit board located in the system unit ot which all other boards are connected; the motherboard contains, the CPU, the memory RAM, and expansion slots
Network interface card
NIC, A Network Interface Card (NIC) is an interface fitted inside a personal computer or network terminal which allows it to communicate with other machines over a network. The card technology will vary according to the network used, but every card on a network must have some way of uniquely identifying itself and some means of converting the signals form the computer to a form which can be transmitted over the connection.
email that masquerades as an authentic entity such as a bank or credit card co. requesting confidential info.
Condition a product or original work enters when it is unprotected by copyright or patent, and could be used by anyone free of charge.
Random Access Memory RAM
a computer's temporary storage space or short - term memory and stored on chips located on the motherboard; measured in megabytes MB and gigabytes GB
Read Only Memory ROM
set of memory chips located on the motherboard that stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up.
The measurement used to assess the clarity of an image on a monitor; determined by pixel density
A connecting device for a network that accepts messages and forwards them to the correct section of the network. Generally more intelligent than a hub and a switch.
software programs that search for keywords in files and documents or other web sites found on the internet
in a client service network, the computer that manages shared network resources and provides access to the client computer when requested
Social Networking site
a Web site where users list information about themselves and talk with friends online
software designed to capture personal and confidential info that resides on a computer and then send it elsewhere.
software responsible for the general operation of a computer system, including the operation of hardware, running application software, and file management
a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet
http is the protocol
www.nytimes.com is the domain name
.com is the TLD- top level domain
pages/cartoon is the path or subdirectory
How does Internet work?
step 1 client computer makes requests for info. through a web browser.
step 2 request travels from my computer to local and regional companies that provide access to intermediary Internet pathways.
step 3 the regional access co. routes that request to a national co. that provides access to the main Internet pathway, the Internet backbone.
step 4 the national co. routes the request along the internet backbone and through more local and regional Internet access companies to reach host server computer(destination)
Search Engine and Subdirectory Difference
Search engine Use computer programs to search the Web
Sub directories Selected and organized by people
Primary indications of a secure online transaction
* Should never consist of user name.
* Should be minimum of eight characters long.
* Should compulsorily include both lower case and uppercase alphabets (minimum one from each group is suggested).
* Should consist of minimum one number (0 to 9).
Should consist of at least one symbol. (Eg: , ^, $, #)
Some virus symptoms
# The computer is running considerably slower than normal for no apparent reason.
# The machine is crashing and restarting by itself after every few minutes.
# The applications and the programs on the machine are not working correctly, or are not responding to any commands.
# The machine is not responding in general, and everything is simply frozen.
# There are error messages popping out on a regular basis.