midterm Flashcards

(341 cards)

1
Q

Computer Literacy or Digital Literacy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

• Digital Literacy means having a current knowledge and

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

understanding of computers

A

mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

related technologies.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Computer?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

• A Computer is an electronic device that processes data into

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

• Main functions of a computer:

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

• Input

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

• Process

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

• Output

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

• Storage

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

• Communication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

• Data refers to raw facts

A

such as: text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

• Information is data that has been processed to become meaningful such

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

as: Invoice

A

Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

History of Computers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

First Generation: Used Vaccum Tubes

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Second Generation: Used Transistors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Third Generation: Used Integrated Circuits

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Fourth Generation: Used Microprocessors

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Internet of Things (IoT)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

• The IoT is a system of interrelated computing devices embedded

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

in many products (referred to as smart devices)

A

which

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
communicate via the Internet or wireless networks
26
• The IoT is an environment where processors are embedded in
27
objects that communicate with one another via the Internet or
28
wireless networks.
29
• The IoT enables you to manage devices remotely in your home
30
in order to: (for example)
31
• adjust the room temperature
32
• start the washing machine at a certain time
33
• view potential intruders via a webcam
34
Artificial Intelligence
35
• Artificial Intelligence is the simulation of human intelligence by
36
machines or computer systems
37
• Some applications of AI include:
38
• Speech recognition systems
39
• Navigation Apps
40
• Virtual assistants such as Siri
Cortana
41
• Virtual reality
42
Virtual Reality (VR)
43
• VR is the use of computers to simulate a real or imagined
44
environment that appears as a 3D (three-dimensional) space.
45
Assistive Technology
46
• Screen Readers:
47
• Technology that uses audio
48
output to describe the contents
49
of the screen
50
• Assist users that have a visual
51
disability
52
• Speech Recognition Software:
53
• Software that helps a user to input
54
data or information verbally
55
• Assistive Technology allows users with disabilities to use
56
many different devices and software that enable them to
57
access and use technology.
58
Technology in Transportation
59
• GPS - helps delivery truck drivers avoid traffic delays
60
• Code scanning - used to scan bar codes and track packages
61
Technology in Manufacturing
62
• Computer-Aided Manufacturing (CAM) is the use of software
63
to control machine/tools to automate a manufacturing process
64
• Robotics is the science that combines engineering and
65
technology to create and program robots.
66
• Ideal for repetitive tasks or tasks that are too dangerous
67
Impact of Technology in our environment
68
• E-waste: Electronic waste from discarded computers and digital
69
devices has a negative effect on the environment where it is
70
discarded.
71
• Often contains toxic metals such as lead and mercury
72
• To reduce the impact of technology in our environment
we should
73
practice Green Computing
74
• Green Computing is the use of computers and other computing
75
devices and equipment in energy-efficient and eco-friendly ways
76
such as:
77
• Reduce Electronic Trash
78
• Donate Computer Equipment
79
• Recycle paper
toner and ink cartridges
80
printers
81
• Use paperless communication
82
• Purchase energy efficient products with label such as Energy Star
83
The Internet
84
• The Internet is:
85
• a global collection of billions of computers connected to share
86
information
87
• a collection of interconnected networks
88
• the largest computer network in the world
89
The Web (World Wide Web)
90
• The Web is a collection of webpages located on computers around
91
the world
connected through the Internet
92
• The Web is just one of the resources available on the Internet
93
• Other resources available on the Internet include:
94
• Email
95
• SMS
96
• VoIP
97
Webpages
Websites
98
• A webpage is an electronic document that can contain text
99
graphics
sound
100
• A website is a collection of webpages
101
• A web browser is a software used to display webpages and
102
enter web addresses
or URLs.
103
URL (Uniform Resource Locator)
104
• a URL is a web address which identifies the location of
105
webpages on the Internet
106
• Domain name: the part of a URL or email address that identifies one or
107
more IP addresses. For example: cengage.com
108
• Top-level domain (TLD): In a domain name
the three-letter
109
extension after the period to identify the type of website
110
.com is for commercial enterprises
111
.edu is for educational institutions
112
.gov is for U.S. government agencies.
113
Web Servers
IP Addresses
114
• A web server is a computer on the internet that stores webpages
115
• Each web address or URL corresponds to an IP address
116
• An IP address (Internet Protocol address) is a unique number that
117
consists of four sets of numbers from 0 to 255
separated by periods
118
or dots such as: 69.32.132.255
119
• Cookies are small text files placed on your computer when you visit
120
a website.
121
• provide a way for sites to store information about your preferences
122
and
123
• to identify you as you navigate through a site.
124
Secure website/webpage
125
• A secure website is a website that uses encryption to
126
safeguard transmitted information.
127
• Encryption is a security method that codes data as it is
128
transmitted over a network
so it is not readable until it is
129
decrypted.
130
• Encryption “scrambles” information so that it cannot
131
be read unless the user has the “key.”
132
Computer Hardware Components
133
• Computer hardware refers to any physical component of a
134
computer
135
• Types of computer hardware include:
136
• Input Devices
137
• Output Devices
138
• The Central Processing Unit (CPU)
139
• Memories such as RAM
ROM
140
• Storage Devices such as Hard drives
141
Input Devices
142
• Input Devices allow to enter data into the computer
143
• Keyboard
144
• Touchpad
145
• Trackball
146
• Touchscreen
147
• Stylus
148
• Microphone
149
• Camera/webcam
150
• Scanner
151
Output Devices
152
• Output Devices convey information from the computer to the user
153
• Speakers
154
• Headphones
155
• Earbuds
156
• Projectors
157
• Printers
158
CPU (Central Processing Unit)
159
• The CPU is primarily responsible for converting input (data) into
160
meaningful output (information)
161
• The CPU is a complex integrated circuit consisting of millions of
162
electronic parts
163
RAM (Random Access Memory)
164
• RAM temporarily stores data needed by the operating system and
165
apps you use
166
• RAM is stored on one or more chips connected to motherboard
167
(the main circuit board of the computer)
168
• RAM is volatile (temporary): loses its contents when power is
169
removed
170
Buffer/Spooler
171
• The Buffer or Spooler is an area of memory that stores data
172
and information waiting to be sent to an input or output device
173
• For example:
174
• When multiple users send a document to the same
175
printer
documents are placed in a buffer so the printer
176
can only print one document at a time.
177
ROM (Read-Only Memory)
178
• ROM contains the BIOS which tells your computer how to start
179
• ROM is permanently installed on your computer and is attached
180
to the motherboard.
181
• ROM is non-Volatile (Permanent): does not lose its contents
182
when power is removed
183
Storage Devices
184
• Storage Devices are designed to store data for extended periods
185
of time
186
• Hard Drives
187
• Hard Disk Drive (HDD)
188
• Solid State Drive (SSD)
189
• Optical Discs
190
• CD
191
• DVD
192
• Blu-ray discs
193
• USB Flash Drives
194
• Memory cards
195
• Cloud Storage (storing electronic files on the Internet instead of a local
196
computer) ie. Google Drive
Microsoft OneDrive
197
Devices Drivers
198
• A device driver is a program that controls a device attached to
199
the computer.
200
• It is a program that enables a hardware device to communicate
201
with the computer’s operating system
202
• Without device drivers
devices like printers and video cards do
203
not work.
204
Binary System
205
• The Binary System is a system using a combination of
206
two digits 0 and 1
to represent data
207
• Computers use the Binary System to represent data
208
• Bit: (short for binary digit) is the smallest unit of data a
209
computer can process.
210
• Byte: 8 bits grouped together.
211
• A byte can represent a single character in the computer
212
or mobile device
213
• 1 KB ~ 1 Thousand Bytes
214
• 1 MB ~ 1 Million Bytes
215
• 1 GB ~ 1 Billion Bytes
216
• 16 GB is larger than 16 MB
217
Software (or Program)
218
• A Software is a set of instructions that tells a computer how to perform
219
tasks.
220
• Categories of Software:
221
• System Software - software that runs a computer and includes:
222
• Operating Systems
223
• Utility Programs
224
• Application Software – allow users to accomplish specific tasks
225
• Word processing programs
games
226
• Development Software – used to create software and apps
227
• Programming Languages
228
Operating Systems
229
• An OS is a program that manages the complete operation of
230
your computer or mobile device and lets you interact with it
231
• The OS coordinates the resources and activities on a computer
232
• The OS provides a Graphical User Interface (GUI)
233
• Examples of Operating Systems:
234
• Microsoft Windows
235
• macOS
236
• Chrome OS
237
• Unix
238
• Linux
239
• iOS
240
• Android
241
Types of Operating Systems
242
• There are different types of Operating Systems based on the
243
type of device:
244
• Desktop Operating Systems
245
• Windows 10
MacOS
246
• Mobile Operating Systems
247
• iOS
Android
248
• Embedded Operating Systems used in:
249
• appliances
cruise control system in cars
250
• smart thermostat
251
• Server Operating Systems
252
• Windows Server 2019
253
• Mac OS Server
254
Utility Programs
255
• Utility programs enable you to perform maintenance-type tasks
256
related to managing the computer or device.
257
• Utility programs are the tools that you use for:
258
• Managing files:
259
• in Windows: File Explorer
260
• on MacOS: Finder
261
• Compressing (Zip) /Decompressing (Unzip) files
262
• Data Backup
263
• copying files from a computer’s hard drive and storing them in a
264
remote location
265
• Installing/Uninstalling programs
266
User Accounts
267
• used to protect your computer against unauthorized access
268
• include permissions that control which files and folders the user
269
can access.
270
• identify the resources a user can access when working with the
271
computer
272
• Admin account has full access
273
• Standard Account has limited access
274
Type of Apps
275
• Local apps: apps that are installed on the computer’s hard drive
276
• Native Apps: Apps written for a specific operating system and is
277
installed on the user’s computer or mobile device
278
• Mobile Apps: apps that you access on a mobile device such as a
279
smartphone or tablet
280
• Web Apps: apps that are accessed through the internet
on a web
281
browser instead of being installed on your device.
282
• For example:
283
• Google docs
284
• social media sites
285
• Office 365
286
• Portable apps: apps that run from removable storage
such as an
287
external hard drive or from the cloud
288
File extension
289
• A suffix at the end of a filename
separated by a dot
290
identifies the file type and its intended use
291
• For instance
Graphic files are digital files that contain images
292
illustrations
or other visual data.
293
• Popular Graphics file extensions include:
294
.png
295
.bmp
296
.jpg
297
.tiff
298
.gif
299
.raw
300
Malware (Malicious Software)
301
• The term Malware refers to software programs that are harmful
302
to your computer
303
• Malware include:
304
• Virus: malicious program that reproduces itself on the same
305
computer
306
• Worm: Harmful program that spreads throughout a computer and
307
network without requiring user interaction.
308
• Trojan: malware that hides inside another program (often
309
downloaded from the web)
310
• Ransomware: Type of malware that prevents a user’s device
311
from properly and fully functioning until a fee is paid
312
Social Engineering Techniques
313
• Social Engineering is group of techniques used by attackers to
314
trick users into giving valuable information to the attacker.
315
• For example:
316
• Phishing emails: redirect users to fake websites as an attempt to
317
trick the user into giving private information
318
• Hoax: a false warning
often contained in an email message that
319
pretends to come from a valid source
320
• Spam: unwanted email messages sent from an unknown sender
321
to many email accounts
usually advertising a product or service.
322
Authentication Methods
323
• Methods used to prevent unauthorized access and include:
324
• Passwords - the most common type of authentication used today.
325
• Biometrics Systems - use the unique physical characteristics of
326
your face
hands
327
• Two factor authentication (2FA) - a method that combines multiple
328
types of authentication to increase security.
329
• Often requires something you know (such as a password) and
330
something no one else has (such as a security code sent to your
331
phone)
332
Carey/Pinard/Shaffer/Shellman/Vodnik
New Perspectives Collection
333
Reserved. May not be scanned
copied or duplicated
334
Equipment used to Protect Devices from Electrical
335
problems
336
• Surge protector: can protect computer equipment
337
from spikes
surges
338
• Uninterruptible Power Supply (UPS): can be used
339
to protect against blackouts and brownouts
340
o Also contains a battery to keep devices running
341
temporary