Looks like no one added any tags here yet for you.
Computer
a system that manipulates data according to a set of instructions
Hardware
devices and components that make up a computer system
Peripheral Devices
hardware allowing input and output into a computer
Operating System (OS)
A basic software environment
Software Applications
programs installed within the OS to extend the computer's capabilities
Software
an interface allowing the user to interact with the computer system
Steps of Basic Computing & Processing
A command is selected
The software application receives the command
Using the OS, the application converts the command into a series of instructions
The instructions are stored in system memory (RAM)
The Central Processing Unit (CPU) retrieves and processes each instruction/data file
The CPU writes the result back to memory and directs other components to perform actions
Input
the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones
Processing
the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software
Output
the processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system
Storage
the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on
IBM PC
developed in 1981 on a x86 architecture using a CPU designed my Intel
Internet of Things (IoT)
a world in which many different types of things are embedded with processing and networking functionality
Workstation/Desktop PCs/Desktops
a type of PC that is housed in a case that can sit on or under a desk that is operated by a single user
Speed
determined by the CPU's quality
System Memory
allows running more applications simultaneously and for larger amounts of data to be processed more quickly
this type of memory is volatile, meaning that it is only preserved while the system is powered up. System memory is provided by Random Access Memory (RAM) modules
Ergonomics
the quality of peripherals; the study of factors affecting the performance of people at work
Server
any computer providing services to other computers, but usually the term server implies a powerful computer that supports a number of users simultaneously in a computer network
Laptop
integrates the display, system components, and input/output devices within a single, portable case (or chassis)
Thermostats (Home Automation)
monitor and adjust your home or office Heating, Ventilation, and Air Conditioning (HVAC) controls from an app installed on your phone
Security Systems (Home Automation)
monitor and control alarms, locks, lighting, and videophone entry systems remotely
IP Cameras (Home Automation)
often used for security, these devices connect to Internet Protocol (IP)-based networks such as the Internet and support direct upload and sync to cloud storage for remote monitoring
Home Appliances (Home Automation)
check the contents of your refrigerator from your smartphone while out shopping or start the washing machine cycle so that it has finished just as you get back to your house
Streaming Media (Home Automation)
play content stored on a storage device through any smart speaker or TV connected to the home network
Repetitive Strain Injury (RSI)
a condition that occurs when the same task is carried out repeatedly for a long period, making use of the same muscles continuously
Power On Self-Test (POST)
the computer performs a self-check while booting up before prompting the user to sign in
Shell
a type of interface facilitated by the OS between the user and the computer; a shell will allow the user to configure the computer hardware, install and manage software applications, and access programs and files
Firmware
type of software that cannot be heavily modified for specific hardware
Virtualization
multiple operating systems can be installed and run simultaneously on a single computer
Management Interface
a graphical or command-line tool used to perform some aspect of system configuration
Service
a Windows process that does not require any sort of user interaction and thus runs in the background (without a window)
Mass Storage
to preserve data when the system is turned off, it is written as files to a mass storage device. Every PC comes with at least one such fixed disk. The fixed disk will either be a hard disk or a Solid-State Drive (SSD)
Access Control
a computing device (or any information stored on the device) can only be used by an authorized person, such as its owner
Asset
something of commercial value
Security Control
a mechanism designed to protect an asset
Latency
which is the delay in seconds that a packet of data takes to travel over a network
Bandwidth
the amount of data a connection can handle at any given time
Program
a sequence of instructions for the computer to follow
Schema
the structure of the database in terms of the fields defined in each table and the relations between primary and foreign keys
Volatile (Storage)
requires power to preserve data
Partitioning
dividing areas of a hard disk into logically separate ares
Network
two or more computer systems linked together by some form of transmission medium that enables them to share information
Network Clients
computers that can request network resources or services
Local Area Network (LAN)
connects a group of computers in a single location, such as in an office building, school, or home
Wide Area Network (WAN)
a network that connects devices in geographically separated areas
Transmission Control Protocol/Internet Protocol (TCP/IP)
a suite/set of network transportation protocols
Internet Protocol (IP)
a communication standard that enables computers to route (forward) packets from one network to another as needed
Transport Control Protocol (TCP)
a connection-oriented protocol that delivers data packets in the correct sequence
Frame
data at the Link/Network Interface Layer of TCP/IP
Address Resolution Protocol (ARP)
part of the TCP/IP protocol for determining the MAC address based on the IP address
User Datagram Protocol (UDP)
a connectionless alternative to TCP that achieves higher transmission speeds at the cost of reliability
Router
a device that forwards data packets between computer networks
Media Access Control Address (MAC Address)
a hardware identification number that uniquely identifies each device on a network
Subnet Mask
hides the part of the IP address that is unique to the host to determine the network part of the IP address
Confidentiality
information should be known only to authorized users
Integrity
any modification to information is authorized
Availability
authorized persons are able to access the confidential information when they need
Authentication
verifying the person's identity
Authorization
has permission to perform an action or access information
Accounting
recording when and by whom a resource was accessed
Hardening
policies that make mobile computers, workstation computers, and network appliances more secure
Phising
attempts to get your login credentials by having you enter them; usually done through counterfeit websites (pharming) or cross-site scripting
Pharming
redirecting website traffic to a spoofed website
Non-repudiation
security principle of providing proof that a transaction occurred between identified parties
Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
protects data in transit
Modem
connects a LAN to the Internet (WAN)
Switch
connects parts of a LAN together
Access point
Your client wants to add a WAP to their network. Which of the following is what the client needs?
Preventing other companies from using the process
Your company has just patented a process it has no intention of producing. Which of the following describes what the company is doing?
Raid 0
Which type of RAID array does not provide protection against drive failure?
PIN and screen lock
What would BEST help to protect against unauthorized use of a mobile phone?
ASCII
The cent sign character is not available in which character set?
Truncation
If a string has a length of 11 characters and you attempt to enter more than 11 characters, the last characters will be left off. What is this called?
Subscription
Which software licensing type is MOST likely to require the renewal of terms/conditions agreements and has annual fees?
HTTPS
which protocol is used for secure web browsing?
Password must meet complexity requirements.
You have asked your users to stop using alphabetical passwords. Implementing which policy would help enforce this?
Use hexadecimal values for red, green, and blue.
You get a call from a novice web programmer who wants to know how to specify RGB colors on a web page. How does he do it?
Program Compatability Wizard
Your company depends on a proprietary app written for Windows XP to perform a vital task. To enable it to run properly in Windows 10, what should you use?
Clear Cache
Your web browser is still showing an old logo on a website you visit every day. What is a good solution?
Create bootable antivirus media on another computer.
If you are unable to connect to the Internet to update your antivirus, what actions can you take to remove malware?
a security policy
A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of:
Pulse and Rest
A processor clock cycle consists of what
Database software
The sales department needs to keep a customer list that contains names, contactĀ information, and sales records. This list will need to be edited by multiple people at theĀ same time. What application should be used to create this list?
Sp/Dif, Hdmi, Displayport
You are connecting a PC to an HDTV. What connection will provide digital audio?
output
You select three copies of the second page of a document for printing. You are preparing to perform which task?
ACL
How are the rules used in rule-based access enforced?
128
An IPv6 address contains how many bits?
It can connect using USB or SATA ports.
Nonvolatile storage is best described by what phrase