a system that manipulates data according to a set of instructions
2
New cards
Hardware
devices and components that make up a computer system
3
New cards
Peripheral Devices
hardware allowing input and output into a computer
4
New cards
Operating System (OS)
A basic software environment
5
New cards
Software Applications
programs installed within the OS to extend the computer's capabilities
6
New cards
Software
an interface allowing the user to interact with the computer system
7
New cards
Steps of Basic Computing & Processing
1. A command is selected 2. The software application receives the command 3. Using the OS, the application converts the command into a series of instructions 4. The instructions are stored in system memory (RAM) 5. The Central Processing Unit (CPU) retrieves and processes each instruction/data file 6. The CPU writes the result back to memory and directs other components to perform actions
8
New cards
Input
the computer receives data entered by the user through peripheral devices, such as mice, keyboards, scanners, cameras, and microphones
9
New cards
Processing
the data is written to memory and manipulated by the CPU, acting on instructions from the operating system and applications software
10
New cards
Output
the processed data is shown or played to the user through an output device, such as a monitor or loudspeaker system
11
New cards
Storage
the data may be written to different types of storage devices, such as hard disks or optical discs, because data stored in most types of system memory is only preserved while the computer is powered on
12
New cards
IBM PC
developed in 1981 on a x86 architecture using a CPU designed my Intel
13
New cards
Internet of Things (IoT)
a world in which many different types of things are embedded with processing and networking functionality
14
New cards
Workstation/Desktop PCs/Desktops
a type of PC that is housed in a case that can sit on or under a desk that is operated by a single user
15
New cards
Speed
determined by the CPU's quality
16
New cards
System Memory
- allows running more applications simultaneously and for larger amounts of data to be processed more quickly - this type of memory is volatile, meaning that it is only preserved while the system is powered up. System memory is provided by Random Access Memory (RAM) modules
17
New cards
Ergonomics
the quality of peripherals; the study of factors affecting the performance of people at work
18
New cards
Server
any computer providing services to other computers, but usually the term server implies a powerful computer that supports a number of users simultaneously in a computer network
19
New cards
Laptop
integrates the display, system components, and input/output devices within a single, portable case (or chassis)
20
New cards
Thermostats (Home Automation)
monitor and adjust your home or office Heating, Ventilation, and Air Conditioning (HVAC) controls from an app installed on your phone
21
New cards
Security Systems (Home Automation)
monitor and control alarms, locks, lighting, and videophone entry systems remotely
22
New cards
IP Cameras (Home Automation)
often used for security, these devices connect to Internet Protocol (IP)-based networks such as the Internet and support direct upload and sync to cloud storage for remote monitoring
23
New cards
Home Appliances (Home Automation)
check the contents of your refrigerator from your smartphone while out shopping or start the washing machine cycle so that it has finished just as you get back to your house
24
New cards
Streaming Media (Home Automation)
play content stored on a storage device through any smart speaker or TV connected to the home network
25
New cards
Repetitive Strain Injury (RSI)
a condition that occurs when the same task is carried out repeatedly for a long period, making use of the same muscles continuously
26
New cards
Power On Self-Test (POST)
the computer performs a self-check while booting up before prompting the user to sign in
27
New cards
Shell
a type of interface facilitated by the OS between the user and the computer; a shell will allow the user to configure the computer hardware, install and manage software applications, and access programs and files
28
New cards
Firmware
type of software that cannot be heavily modified for specific hardware
29
New cards
Virtualization
multiple operating systems can be installed and run simultaneously on a single computer
30
New cards
Management Interface
a graphical or command-line tool used to perform some aspect of system configuration
31
New cards
Service
a Windows process that does not require any sort of user interaction and thus runs in the background (without a window)
32
New cards
Mass Storage
to preserve data when the system is turned off, it is written as files to a mass storage device. Every PC comes with at least one such fixed disk. The fixed disk will either be a hard disk or a Solid-State Drive (SSD)
33
New cards
Access Control
a computing device (or any information stored on the device) can only be used by an authorized person, such as its owner
34
New cards
Asset
something of commercial value
35
New cards
Security Control
a mechanism designed to protect an asset
36
New cards
Latency
which is the delay in seconds that a packet of data takes to travel over a network
37
New cards
Bandwidth
the amount of data a connection can handle at any given time
38
New cards
Program
a sequence of instructions for the computer to follow
39
New cards
Schema
the structure of the database in terms of the fields defined in each table and the relations between primary and foreign keys
40
New cards
Volatile (Storage)
requires power to preserve data
41
New cards
Partitioning
dividing areas of a hard disk into logically separate ares
42
New cards
Network
two or more computer systems linked together by some form of transmission medium that enables them to share information
43
New cards
Network Clients
computers that can request network resources or services
44
New cards
Local Area Network (LAN)
connects a group of computers in a single location, such as in an office building, school, or home
45
New cards
Wide Area Network (WAN)
a network that connects devices in geographically separated areas
46
New cards
Transmission Control Protocol/Internet Protocol (TCP/IP)
a suite/set of network transportation protocols
47
New cards
Internet Protocol (IP)
a communication standard that enables computers to route (forward) packets from one network to another as needed
48
New cards
Transport Control Protocol (TCP)
a connection-oriented protocol that delivers data packets in the correct sequence
49
New cards
Frame
data at the Link/Network Interface Layer of TCP/IP
50
New cards
Address Resolution Protocol (ARP)
part of the TCP/IP protocol for determining the MAC address based on the IP address
51
New cards
User Datagram Protocol (UDP)
a connectionless alternative to TCP that achieves higher transmission speeds at the cost of reliability
52
New cards
Router
a device that forwards data packets between computer networks
53
New cards
Media Access Control Address (MAC Address)
a hardware identification number that uniquely identifies each device on a network
54
New cards
Subnet Mask
hides the part of the IP address that is unique to the host to determine the network part of the IP address
55
New cards
Confidentiality
information should be known only to authorized users
56
New cards
Integrity
any modification to information is authorized
57
New cards
Availability
authorized persons are able to access the confidential information when they need
58
New cards
Authentication
verifying the person's identity
59
New cards
Authorization
has permission to perform an action or access information
60
New cards
Accounting
recording when and by whom a resource was accessed
61
New cards
Hardening
policies that make mobile computers, workstation computers, and network appliances more secure
62
New cards
Phising
attempts to get your login credentials by having you enter them; usually done through counterfeit websites (pharming) or cross-site scripting
63
New cards
Pharming
redirecting website traffic to a spoofed website
64
New cards
Non-repudiation
security principle of providing proof that a transaction occurred between identified parties
Your client wants to add a WAP to their network. Which of the following is what the client needs?
69
New cards
Preventing other companies from using the process
\ **Your company has just patented a process it has no intention of producing. Which of the following describes what the company is doing?**
70
New cards
Raid 0
Which type of RAID array does not provide protection against drive failure?
71
New cards
PIN and screen lock
What would BEST help to protect against unauthorized use of a mobile phone?
72
New cards
ASCII
The cent sign character is not available in which character set?
73
New cards
Truncation
If a string has a length of 11 characters and you attempt to enter more than 11 characters, the last characters will be left off. What is this called?
74
New cards
Subscription
Which software licensing type is MOST likely to require the renewal of terms/conditions agreements and has annual fees?
75
New cards
HTTPS
which protocol is used for secure web browsing?
76
New cards
Password must meet complexity requirements.
**You have asked your users to stop using alphabetical passwords. Implementing which policy would help enforce this?**
77
New cards
Use hexadecimal values for red, green, and blue.
**You get a call from a novice web programmer who wants to know how to specify RGB colors on a web page. How does he do it?**
78
New cards
Program Compatability Wizard
Your company depends on a proprietary app written for Windows XP to perform a vital task. To enable it to run properly in Windows 10, what should you use?
79
New cards
Clear Cache
Your web browser is still showing an old logo on a website you visit every day. What is a good solution?
80
New cards
Create bootable antivirus media on another computer.
If you are unable to connect to the Internet to update your antivirus, what actions can you take to remove malware?
81
New cards
a security policy
**A school has a sign posted in the computer lab that says, "Sharing passwords with others is prohibited." This is an example of:**
82
New cards
Pulse and Rest
A processor clock cycle consists of what
83
New cards
Database software
**The sales department needs to keep a customer list that contains names, contact information, and sales records. This list will need to be edited by multiple people at the same time. What application should be used to create this list?**
84
New cards
Sp/Dif, Hdmi, Displayport
You are connecting a PC to an HDTV. What connection will provide digital audio?
85
New cards
output
**You select three copies of the second page of a document for printing. You are preparing to perform which task?**
86
New cards
ACL
How are the rules used in rule-based access enforced?
87
New cards
128
An IPv6 address contains how many bits?
88
New cards
It can connect using USB or SATA ports.
Nonvolatile storage is best described by what phrase