Upgrade to remove ads
Chapter 3 and 4 Computer Literacy
Terms in this set (98)
two or more computers sharing resources
software, hardware, files
each computer is considered equal
A peer-to-peer Microsoft network model that groups computers together for organizational purposes, often deployed in homes and small offices.
A feature of Windows 7 that quickly links creates a peer-to-peer network for sharing files and printers.Users that are on the computer.
A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.
a multiuser computer system that provides services such as internet access, email, or file and print services, to client systems
personal computers or devices that are hooked up to a server
servers taking control of the processors to run the server's software
Local Area Network (LAN)
Connects a group of computers in close proximity, such as in an office building, school, or home
allows to hook up computers to LAN
Personal Area Network (PAN)
provides communication for devices owned by a single user that work over a short distance (hooked up through bluetooth, and has a small range)
Wireless Local Area Network (WLAN)
a computer network in a limited geographical area that uses wireless transmission for communication
The standard network technology that connects computers to each other and to the Internet via cables
regulation that industrial items need to follow
A topology with one central node that has each computer or network device attached to the central node. Most efficient and can add or remove from network without disturbing the network)
The physical and logical design of a computer network; examples include mesh, bus, ring and star; the physical layout of the network devices and the cabling, and how all the components communicate with each other
Wide Area Network (WAN)
Spans a large geographic area such as a state, province, or country. Includes a bunch of local area networks hooked up by a router
A device that transfers data from one network to another in an intelligent way
Communications hardware device that facilitates the transmission of data.
Viral Private Network (VPN)
provides security in a local area network
an organization's network composed of interconnected multiple LANs and WANs
Metropolitan Network (MAN)
City wide network
3G and LTE
Storage Area Network (SAN)
a high-speed network with the sole purpose of providing storage to other attached servers
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol. Allows you to connect to the Internet
A series of network standards that specifies how two wireless devices communicate over the air with each other.
optical network terminal (ONT)
someway to get to the Internet
ad hoc network
A network created when two wireless devices connect to each other directly.
Infrastructure Wireless Network
A wireless network in which devices connect through a wireless access point. Use a plug or wireless to connect to network
Wireless Access Point (WAP)
enables devices to connect to a wireless network to communicate with each other
network operating system (NOS)
The operating system that runs a network, steering information between computers and managing security and users. Operates the system that the network uses.
center of clients and servers
main server that is in charge of everything/all domains
code of correct conduct
Transmission Control Protocol (TCP)
a part of the main protocol for the internet that allows for computers to easily communicate with each other over a network
Internet Protocol (IP)
A set of rules responsible for disassembling, delivering, and reassembling packets over the Internet.
a block on unauthorized access to a computer system while permitting outward communication
Service Set Identifier (SSID)
A network name that wireless routers use to identify themselves.
security for network to encrypt transmission data
WiFi Protective Setup
automatically configures devices to a network by using a pin or button
any criminal activity associated with a computer
an online con game used to attempt to gain access to personal information through email
An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.
A scam in which a button or link on a website contains a malicious program.
A social network attack in which copying and pasting some text into the address bar executes code that creates pages and events or sends spam out to your friends
any type of fraud that requires computer technology to perpetrate
Captures keystrokes on a compromised system
unauthorized access, modification, or use of an electronic device or some element of a computer system
politically motivated attacks on information systems
Hacking that is intended as political activism (towards government)
When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.
In Windows 2000/XP/Vista, an account that grants to the administrator(s) rights and permissions to all hardware and software resources, such as the right to add, delete, and change accounts and to change hardware configurations.
anyone can login in, and is deemed by administrator
A Windows account with few permissions and no password that allows a user to use a computer without requiring a unique user account.
User Account Control (UAC)
_____ is a feature that helps prevent a program making a change without you knowing about it.
stores passwords in one location
Mac OS X password management
scans a human physical attribute, like a fingerprint or iris, for security purposes
taking plain text and encrypting it
Encrypting File System (EFS)
encrypting a single file
a microsoft utility to encrypt a drive
A feature of Mac OS X that will encrypt all the files in the Home folder.
Acceptable Use Policy
a policy that a user must agree to follow in order to be provided access to a network or to the internet
Program and Device driver
files that are built in, they help the computer function
Data that is created by user
A tag of three or four letters, preceded by a period, which identifies a data file's format or the application used to create the file.
Characteristics that help you locate and organize files.
A process that reduces a file's size for storage or transmission purposes.
data compression techniques in which no data is lost.
data compression techniques in which some amount of data is lost. This technique attempts to eliminate redundant information.
The file management tool in Windows 8 used to organize files.
Mac function used to get to files and folders easier (search bar)
storage when connected to wifi. it takes away data on the hard drive
software that controls the execution of computer programs and may provide various services
software, hardware, peripheral devices, and attachments
provide instructions for the devices
additional stuff to program to maintain the program-antivirus; baking up information
User Interface (UI)
operating system of how to operate the computer
Graphical User Interface (GUI)
the UI for graphical organizer on the computer
NOT pointing and clicking- typing stuff into open software
The component of a computer that follows instructions
where info is held
computer looks like it is doing more than one thing but it is actually doing it in an order quickly
A small amount of memory located on the printer and used to hold print jobs.
connection between hard drive and RAM. memory is stored to memory, which is called pagging
Plug and play
technology that allows a hardware component to be attached to a computer so that it is automatically configured by the operating system, without user intervention
device that communicates the hard ware, or the peripheral device and the computer
A special diagnostic mode designed for troubleshooting errors that occur during the boot process.
stores instructions for the hard ware (stored on chip or ROM device)
Application Programming Interface (API)
A block of code in the operating system that software applications need to interact with.
network operating system (NOS)
The operating system that runs a network, steering information between computers and managing security and users
library computers hooked up to the network
A personal folder with subfolders inside it that windows created automatically for each username
Folder that all users can access and share with all other users on the
system or network.
what you do to get through folders
The file management tool in Windows 8 used to organize files.
a program that attempts to locate a file on your computer based on criteria you specify
In OS X, a folder that is created on a Mac computer for each user and which contains subfolders to store documents, downloads, movies, music, and pictures
This set is often in folders with...
CNT 140 Melvin CHAPTER 1/2 ---2018
CNT 140 Melvin CHAPTER 3/4 ---2018
CNT 140 Melvin CHAPTER 5/6 ---2018
CNT 140 Melvin CHAPTER 7 ---2018
You might also like...
Computer networking Networking Study Guide
CIS 100- CH12
IT Fundamentals - Networking
Other sets by this creator
Of Mice and Men
Chapter 23-Give Me Liberty
U.S. History Midterm Identifications
Other Quizlet sets
Week 10 - Lecture #16
Econ Vocab ch 1