Upgrade to remove ads
Terms in this set (82)
produced and used to prevent people sending and receiving unwanted emails, especially advertisements:
computing software designed to detect and destroy computer viruses.
An application, or application program, is a software program that runs on your computer. Web browsers, e-mail programs, word processors, games, and utilities are all applications.
network that was a basis for the internet today; precursor to the internet today
A backup is a copy of one or more files created as an alternate in case the original data is lost or becomes unusable.
A server responsible for backing up and restoring files, folders, databases and hard drives on a network in order to prevent the loss of data in the event of a hard drive failure, user error, disaster or accident.
A bot (short for "robot") is an automated program that runs over the Internet. Some bots run automatically, while others only execute commands when they receive specific input.
Real-time communication between two users via computer. Once a chat has been initiated, either user can enter text by typing on the keyboard and the entered text will appear on the other user's monitor. Most networks and online services offer a chat feature.
Clip art is a collection of pictures or images that can be imported into a document or another program.
The term "cloud" comes from early network diagrams, in which the image of a cloud was used to indicate a large network, such as a WAN. The cloud eventually became associated with the entire Internet, and the two terms are now used synonymously.
Technically, a computer is a programmable machine. This means it can execute a programmed list of instructions and respond to new instructions that it is given. Today, however, the term is most often used to refer to the desktop and laptop computers that most people use.
terms describing software designed to restrict or control the content a reader is authorised to access, especially when utilised to restrict material delivered over the Internet via the Web, e-mail, or other means.
A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information about you, similar to a preference file created by a software application.
cyberbullying takes place over cyberspace. This includes both Internet and cell phone communication. Like physical bullying, cyberbullying is aimed at younger people, such as children and teenagers. It may involve harassing, threatening, embarrassing, or humiliating young people online.
an individual or group who uses email as an offensive force. The group or individual usually sends a company a threatening email stating that they have received confidential information about their company and will exploit a security leak or launch an attack that will harm the company's network.
Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Computer data is information processed or stored by a computer. This information may be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be processed by the computer's CPU and is stored in files and folders on the computer's hard disk.
A database is a data structure that stores organized information. Most databases contain multiple tables, which may each include several different fields. For example, a company database may include tables for products, employees, and financial records. Each of these tables would have different fields that are relevant to the information stored in the table.
A desktop computer (or desktop PC) is a computer that is designed to stay in a single location. It may be a tower (also known as a system unit) or an all-in-one machine, such as an iMac.
Dial-up refers to an Internet connection that is established using a modem. The modem connects the computer to standard phone lines, which serve as the data transfer medium. When a user initiates a dial-up connection, the modem dials a phone number of an Internet Service Provider (ISP) that is designated to receive dial-up calls. The ISP then establishes the connection, which usually takes about ten seconds and is accompanied by several beeping an buzzing sounds.
branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing digital data.
knowledge, skills, and behaviors used in a broad range of digital devices such as smartphones, tablets, laptops and desktop PCs, all of which are seen as network rather than computing devices.
Digital Security risk
any event or action that could cause loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
Signatures are commonly used to authenticate documents. When you sign a physical document, you are authenticating its contents. Similarly, digital signatures are used to authenticate the contents of electronic documents. They can be used with PDF, e-mail messages, and word processing documents.
A domain name is a unique name that identifies a website. For example, the domain name of the Tech Terms Computer Dictionary is "techterms.com." Each website has a domain name that serves as an address, which is used to access the website.
Small speakers that rest inside each ear canal
Email, short for "electronic mail," is one of the most widely used features of the Internet, along with the web. It allows you to send and receive messages to and from anyone with an email address, anywhere in the world.
A specially designed computer chip that resides in another device, such as your car or the electronic thermostat in your home. Self-contained computer devices that have their own programming and typically do not receive input from you or interact with other systems.
The term emoticon comes from "emotion and icon" and refers to facial expressions represented by keyboard characters. For example, the emoticon :-) represents a happy face and :-( represents a sad face. By inserting an emoticon into a message, you can help the recipient better understand the feeling you want to get across.
File compression is used to reduce the file size of one or more files. When a file or a group of files is compressed, the resulting "archive" often takes up 50% to 90% less disk space than the original file(s).
Just like real world folders, folders on your hard drive store files. These files can be documents, programs, scripts, libraries, and any other kind of computer file you can think of. Folders can also store other folders, which may store more files or other folders, and so on.
A graphic is an image or visual representation of an object. Therefore, computer graphics are simply images displayed on a computer screen. Graphics are often contrasted with text, which is comprised of characters, such as numbers and letters, rather than images.
a program concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products
A hashtag is a number symbol (#) used to label keywords in a tweet. The name "hashtag" was coined by Twitter and combines the word "hash" (another name for the number symbol) and "tag," since it is used to tag certain words.
A hit is a metric used in website analytics. While "hits" and "visits" are sometimes used interchangeably, they are two different things. A visit is recorded when a user visits a webpage. A hit is recorded for each resource that is downloaded from a web server. Therefore, it is common for hits to outnumber visits, often by a ratio of more than 10 to 1.
This is a computer that acts as a server for other computers on a network. It can be a Web server, an e-mail server, an FTP server, etc. For example, a Web host is what provides the content of Web pages to the computers that access it.
public place with an available wireless signal for Internet access
Hypertext Transfer Protocol
This is the protocol used to transfer data over the World Wide Web. That's why all Web site addresses begin with "http://". Whenever you type a URL into your browser and hit Enter, your computer sends an HTTP request to the appropriate Web server. The Web server, which is designed to handle HTTP requests, then sends to you the requested HTML page.
processes of altering images, whether they are digital photographs, traditional photochemical photographs, or illustrations.
is a set of communication technologies used for text-based communication between two or more participants over the Internet
Today, the Internet spreads across the globe and consists of countless networks and computers, allowing millions of people to share information. Data that travels long distances on the Internet is transferred on huge lines known collectively as the Internet backbone.
a collection of high-speed data lines that connect major computer systems located around the world
Also known as an "IP number" or simply an "IP," this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet.
Short for "malicious software," malware refers to software programs designed to damage or do other unwanted actions on a computer system. In Spanish, "mal" is a prefix that means "bad," making the term "badware," which is a good way to remember it (even if you're not Spanish).
Just like humans, computers rely a lot on memory. They need to process and store data, just like we do. However, computers store data in digital format, which means the information can always be called up exactly the way it was stored. Also, unlike our memory, the computer's memory doesn't get worse over time.
A mobile app is a computer program designed to run on smartphones, tablet computers and other mobile devices.
Multimedia authoring involves collating, structuring and presenting information in the form of a digital multimedia, which can incorporate text, audio, and still and moving images.
Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. Three areas where good netiquette is highly stressed are e-mail, online chat, and newsgroups.
When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable the sharing of files and information between multiple systems. The Internet could be described as a global network of networks.
A password is a string of characters used for authenticating a user on a computer system. For example, you may have an account on your computer that requires you to log in.
Stands for "Portable Document Format." PDF is a multi-platform file format developed by Adobe Systems. A PDF file captures document text, fonts, images, and even formatting of documents from a variety of applications. You can e-mail a PDF document to your friend and it will look the same way on his screen as it looks on yours, even if he has a Mac and you have a PC. Since PDFs contain color-accurate information, they should also print the same way they look on your screen.
Phishing is similar to fishing in a lake, but instead of trying to capture fish, phishers attempt to steal your personal information. They send out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions.
The term "pixel" is actually short for "Picture Element." These small little dots are what make up the images on computer displays, whether they are flat-screen (LCD) or tube (CRT) monitors. The screen is divided up into a matrix of thousands or even millions of pixels. Typically, you cannot see the individual pixels, because they are so small.
A software plug-in is an add-on for a program that adds functionality to it. For example, a Photoshop plug-in (such as Eye Candy) may add extra filters that you can use to manipulate images. A browser plug-in (such as Macromedia Flash or Apple QuickTime) allows you to play certain multimedia files within your Web browser.
an attachment for a notebook computer that allows a number of devices such as a printer, large monitor, and keyboard to be simultaneously connected
an Internet portal is a Web site that acts as a starting point for browsing the Web. Portals typically include search engines and large directories of websites. Some popular portals are Yahoo, Excite, Lycos, Netscape, AltaVista, MSN, and AOL.com.
A processor, or "microprocessor," is a small chip that resides in computers and other electronic devices. Its basic job is to receive input and provide the appropriate output. While this may seem like a simple task, modern processors can handle trillions of calculations per second.
process and activity of planning, organizing, motivating, and controlling resources, procedures and protocols to achieve specific goals
Most large businesses, organizations, and universities these days use a proxy server. This is a server that all computers on the local network have to go through before accessing information on the Internet. By using a proxy server, an organization can improve the network performance and filter what users connected to the network can access.
an official responsible for keeping a register or official records:
The word "restore" means to return something to its former condition. Therefore, when you restore a computer or other electronic device, you return it to a previous state. This may be a previous system backup or the original factory settings.
an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites.
Computer facility equipped with secure servers to provide secure exchange of data or financial transactions over a network such as internet.
A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet.
A smartphone is a mobile phone that includes advanced functionality beyond making phone calls and sending text messages. Most smartphones have the capability to display photos, play videos, check and send e-mail, and surf the Web. Modern smartphones, such as the iPhone and Android based phones can run third-party applications, which provides limitless functionality.
Computer software is a general term that describes computer programs. Related terms such as software programs, applications, scripts, and instruction sets all fall under the category of computer software. Therefore, installing new programs or applications on your computer is synonymous with installing new software on your computer.
collection of computer programs —usually application software or programming software — of related functionality, often sharing a more-or-less common user interface and some ability to smoothly exchange data with each other.
The word "spoof" means to hoax, trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer systems or other computer users. This is typically done by hiding one's identity or faking the identity of another user on the Internet.
As the name implies, this is software that "spies" on your computer. Nobody likes to be spied on, and your computer doesn't like it either. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.
Data streaming, commonly seen in the forms of audio and video streaming, is when a multimedia file can be played back without being completely downloaded first.
The system unit, also known as a "tower" or "chassis," is the main part of a desktop computer. It includes the motherboard, CPU, RAM, and other components. The system unit also includes the case that houses the internal components of the computer.
a feature in Internet Explorer that enables you to open multiple websites in a single browser window
connecting one device to another.
devised so as to become operative when the voltage in a line drops below a definite value
A utility program to remove another application program from a computer's disks
Stands for "Universal Serial Bus." USB is the most common type of computer port used in today's computers. It can be used to connect keyboards, mice, game controllers, printers, scanners, digital cameras, and removable media drives, just to name a few.
being such in essence or effect though not formally recognized or admitted
An internet address of a website, file, or document in the general format http ://www.address/directories/filename Every computer connected to the internet has its unique web address, without which it cannot be reached by other computers.
Web pages are what make up the World Wide Web. These documents are written in HTML (hypertext markup language) and are translated by your Web browser.
A website, or Web site, is not the same thing as a Web page. Though the two terms are often used interchangeably, they should not be. So what's the difference? To put it simply, a Web site is a collection of Web pages. For example, Amazon.com is a Web site, but there are millions of Web pages that make up the site.
A category of software that enables the user to develop a Web site in a desktop publishing format
A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.
This set is often in folders with...
Learning, Chance Chapters 1-3
Abnormal Psychology Comer Chapter 4
Psychology of learning Chap 3&4
You might also like...
online computer terminology
Nursing Informatics Chapter 4
Other sets by this creator
Physics Ch. 1
Radiobiology Unit 1
Other Quizlet sets
COMM2900- Midterm Study Guide (part i and ii)
Sociology Test 1
water resource management