ITF

studied byStudied by 5 people
5.0(2)
Get a hint
Hint

Computer

1 / 88

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

89 Terms

1

Computer

a system that manipulates data according to a set of instructions

New cards
2

Hardware

devices and components that make up a computer system

New cards
3

Peripheral Devices

hardware allowing input and output into a computer

New cards
4

Operating System (OS)

A basic software environment

New cards
5

Software Applications

programs installed within the OS to extend the computer's capabilities

New cards
6

Software

an interface allowing the user to interact with the computer system

New cards
7

Steps of Basic Computing & Processing

  1. A command is selected

  2. The software application receives the command

  3. Using the OS, the application converts the command into a series of instructions

  4. The instructions are stored in system memory (RAM)

  5. The Central Processing Unit (CPU) retrieves and processes each instruction/data file

  6. The CPU writes the result back to memory and directs other components to perform actions

New cards
8

Input

the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones

New cards
9

Processing

the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software

New cards
10

Output

the processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system

New cards
11

Storage

the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on

New cards
12

IBM PC

developed in 1981 on a x86 architecture using a CPU designed my Intel

New cards
13

Internet of Things (IoT)

a world in which many different types of things are embedded with processing and networking functionality

New cards
14

Workstation/Desktop PCs/Desktops

a type of PC that is housed in a case that can sit on or under a desk that is operated by a single user

New cards
15

Speed

determined by the CPU's quality

New cards
16

System Memory

  • allows running more applications simultaneously and for larger amounts of data to be processed more quickly

  • this type of memory is volatile, meaning that it is only preserved while the system is powered up. System memory is provided by Random Access Memory (RAM) modules

New cards
17

Ergonomics

the quality of peripherals; the study of factors affecting the performance of people at work

New cards
18

Server

any computer providing services to other computers, but usually the term server implies a powerful computer that supports a number of users simultaneously in a computer network

New cards
19

Laptop

integrates the display, system components, and input/output devices within a single, portable case (or chassis)

New cards
20

Thermostats (Home Automation)

monitor and adjust your home or office Heating, Ventilation, and Air Conditioning (HVAC) controls from an app installed on your phone

New cards
21

Security Systems (Home Automation)

monitor and control alarms, locks, lighting, and videophone entry systems remotely

New cards
22

IP Cameras (Home Automation)

often used for security, these devices connect to Internet Protocol (IP)-based networks such as the Internet and support direct upload and sync to cloud storage for remote monitoring

New cards
23

Home Appliances (Home Automation)

check the contents of your refrigerator from your smartphone while out shopping or start the washing machine cycle so that it has finished just as you get back to your house

New cards
24

Streaming Media (Home Automation)

play content stored on a storage device through any smart speaker or TV connected to the home network

New cards
25

Repetitive Strain Injury (RSI)

a condition that occurs when the same task is carried out repeatedly for a long period, making use of the same muscles continuously

New cards
26

Power On Self-Test (POST)

the computer performs a self-check while booting up before prompting the user to sign in

New cards
27

Shell

a type of interface facilitated by the OS between the user and the computer; a shell will allow the user to configure the computer hardware, install and manage software applications, and access programs and files

New cards
28

Firmware

type of software that cannot be heavily modified for specific hardware

New cards
29

Virtualization

multiple operating systems can be installed and run simultaneously on a single computer

New cards
30

Management Interface

a graphical or command-line tool used to perform some aspect of system configuration

New cards
31

Service

a Windows process that does not require any sort of user interaction and thus runs in the background (without a window)

New cards
32

Mass Storage

to preserve data when the system is turned off, it is written as files to a mass storage device. Every PC comes with at least one such fixed disk. The fixed disk will either be a hard disk or a Solid-State Drive (SSD)

New cards
33

Access Control

a computing device (or any information stored on the device) can only be used by an authorized person, such as its owner

New cards
34

Asset

something of commercial value

New cards
35

Security Control

a mechanism designed to protect an asset

New cards
36

Latency

which is the delay in seconds that a packet of data takes to travel over a network

New cards
37

Bandwidth

the amount of data a connection can handle at any given time

New cards
38

Program

a sequence of instructions for the computer to follow

New cards
39

Schema

the structure of the database in terms of the fields defined in each table and the relations between primary and foreign keys

New cards
40

Volatile (Storage)

requires power to preserve data

New cards
41

Partitioning

dividing areas of a hard disk into logically separate ares

New cards
42

Network

two or more computer systems linked together by some form of transmission medium that enables them to share information

New cards
43

Network Clients

computers that can request network resources or services

New cards
44

Local Area Network (LAN)

connects a group of computers in a single location, such as in an office building, school, or home

New cards
45

Wide Area Network (WAN)

a network that connects devices in geographically separated areas

New cards
46

Transmission Control Protocol/Internet Protocol (TCP/IP)

a suite/set of network transportation protocols

New cards
47

Internet Protocol (IP)

a communication standard that enables computers to route (forward) packets from one network to another as needed

New cards
48

Transport Control Protocol (TCP)

a connection-oriented protocol that delivers data packets in the correct sequence

New cards
49

Frame

data at the Link/Network Interface Layer of TCP/IP

New cards
50

Address Resolution Protocol (ARP)

part of the TCP/IP protocol for determining the MAC address based on the IP address

New cards
51

User Datagram Protocol (UDP)

a connectionless alternative to TCP that achieves higher transmission speeds at the cost of reliability

New cards
52

Router

a device that forwards data packets between computer networks

New cards
53

Media Access Control Address (MAC Address)

a hardware identification number that uniquely identifies each device on a network

New cards
54

Subnet Mask

hides the part of the IP address that is unique to the host to determine the network part of the IP address

New cards
55

Confidentiality

information should be known only to authorized users

New cards
56

Integrity

any modification to information is authorized

New cards
57

Availability

authorized persons are able to access the confidential information when they need

New cards
58

Authentication

verifying the person's identity

New cards
59

Authorization

has permission to perform an action or access information

New cards
60

Accounting

recording when and by whom a resource was accessed

New cards
61

Hardening

policies that make mobile computers, workstation computers, and network appliances more secure

New cards
62

Phising

attempts to get your login credentials by having you enter them; usually done through counterfeit websites (pharming) or cross-site scripting

New cards
63

Pharming

redirecting website traffic to a spoofed website

New cards
64

Non-repudiation

security principle of providing proof that a transaction occurred between identified parties

New cards
65

Secure Sockets Layer (SSL)/Transport Layer Security (TLS)

protects data in transit

New cards
66

Modem

connects a LAN to the Internet (WAN)

New cards
67

Switch

connects parts of a LAN together

New cards
68

Access point

Your client wants to add a WAP to their network. Which of the following is what the client needs?

New cards
69

Preventing other companies from using the process

Your company has just patented a process it has no intention of producing. Which of the following describes what the company is doing?

New cards
70

Raid 0

Which type of RAID array does not provide protection against drive failure?

New cards
71

PIN and screen lock

What would BEST help to protect against unauthorized use of a mobile phone?

New cards
72

ASCII

The cent sign character is not available in which character set?

New cards
73

Truncation

If a string has a length of 11 characters and you attempt to enter more than 11 characters, the last characters will be left off. What is this called?

New cards
74

Subscription

Which software licensing type is MOST likely to require the renewal of terms/conditions agreements and has annual fees?

New cards
75

HTTPS

which protocol is used for secure web browsing?

New cards
76

Password must meet complexity requirements.

You have asked your users to stop using alphabetical passwords. Implementing which policy would help enforce this?

New cards
77

Use hexadecimal values for red, green, and blue.

You get a call from a novice web programmer who wants to know how to specify RGB colors on a web page. How does he do it?

New cards
78

Program Compatability Wizard

Your company depends on a proprietary app written for Windows XP to perform a vital task. To enable it to run properly in Windows 10, what should you use?

New cards
79

Clear Cache

Your web browser is still showing an old logo on a website you visit every day. What is a good solution?

New cards
80

Create bootable antivirus media on another computer.

If you are unable to connect to the Internet to update your antivirus, what actions can you take to remove malware?

New cards
81

a security policy

A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of:

New cards
82

Pulse and Rest

A processor clock cycle consists of what

New cards
83

Database software

The sales department needs to keep a customer list that contains names, contactĀ information, and sales records. This list will need to be edited by multiple people at theĀ same time. What application should be used to create this list?

New cards
84

Sp/Dif, Hdmi, Displayport

You are connecting a PC to an HDTV. What connection will provide digital audio?

New cards
85

output

You select three copies of the second page of a document for printing. You are preparing to perform which task?

New cards
86

ACL

How are the rules used in rule-based access enforced?

New cards
87

128

An IPv6 address contains how many bits?

New cards
88

It can connect using USB or SATA ports.

Nonvolatile storage is best described by what phrase

New cards
89
New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(1)
note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 52 people
... ago
4.7(3)
note Note
studied byStudied by 2 people
... ago
4.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 448 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (68)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (182)
studied byStudied by 28 people
... ago
5.0(3)
flashcards Flashcard (22)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (50)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 1 person
... ago
5.0(1)
robot