1/46
Vocabulary flashcards covering key terms from the lecture notes.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber
Refers to computers or computer networks; the electronic medium used for online communication; has revolutionized interaction, communication, and business.
Cyberspace
The virtual world of computers, networks, and digital systems connected through the internet; the spaces between computers where people interact with information and with each other.
Computer
A machine that performs processes, calculations, and operations based on instructions from software or hardware; designed to run applications and integrate hardware and software.
Vulnerability
Weaknesses that make computers susceptible to harm, including data storage capacity, ease of access, and potential loss of evidence.
Supercomputer
The fastest, largest, and most powerful type of computer; extremely expensive; Frontier is an example used for climate modeling, AI, and more.
Mainframe
High-performance, large, and expensive computers used for critical applications, large databases, and high-security environments.
Personal Computer (PC)
A computer used in daily life; smaller and less powerful than supercomputers and mainframes.
Hardware
Physical components of a computer, including input devices, output devices, system unit, storage devices, and communication devices.
Input Device
Hardware that allows a user to enter information into the computer (e.g., keyboard, microphone, camera, mouse, touchpad).
Output Device
Hardware that provides information to the user (e.g., monitor, printer, speaker).
Storage Media
Physical devices that store data, information, and instructions for future use; can be internal or external and may be connected or housed inside a device.
Hard Drive
Internal storage device used to store data; can be internal or external via USB/other interfaces; essential component of a computer.
Floppy Disk
Portable storage medium; largely obsolete due to low capacity and fragility.
CD/DVD
Portable storage media that hold more data than a floppy; widely replaced by newer solutions but still used for certain purposes.
USB Flash Drive
Small, portable storage medium with higher capacity than floppy disks; convenient for backups and transfers.
Software
Instructions (programs) that tell a computer what to do; includes system software and application software.
System Software
Software that provides a platform for other software to run; includes the operating system.
Operating System (OS)
System software that controls hardware and software, manages memory and processes, and enables the computer to operate.
Application Software
Programs designed to perform specific tasks; installed after system software.
Word Processing
Application software used to create and edit text documents (e.g., Microsoft Word).
Spreadsheet
Application software used to organize, analyze, and calculate data (e.g., Microsoft Excel).
Application software used to send and receive electronic mail (e.g., Outlook Express).
Internet
Global network of interconnected computers and networks using standardized protocols to exchange data worldwide.
WAN
Wide Area Network; a network infrastructure that links computers over large geographic areas, including the Internet.
Intranet
A private network restricted to registered users within an organization, protecting sensitive information from external threats.
World Wide Web (WWW)
A service on the Internet that enables browsing of web pages.
Instant Messaging (IM)
Online service that allows real-time text, voice, or video communication (e.g., Skype, Google Talk, Windows Live Messenger).
Network
Collection of interconnected devices that communicate to share resources and information; ranges from LANs to the Internet.
Local Area Network (LAN)
A network within a building or campus for sharing resources and internet access.
Wireless Network
A network that uses wireless technologies (e.g., Wi‑Fi) to connect devices without physical cables.
Firewall
Security system that monitors and controls incoming/outgoing network traffic based on security rules; barrier between trusted and external networks.
Intrusion Detection System (IDS)
Security technology that monitors network traffic and system activities for signs of security breaches; alerts administrators.
Virtual Private Network (VPN)
Technology that creates a secure, encrypted connection over a less secure network (like the Internet), with IP masking.
Mobile Internet
Internet access provided via cellular networks on mobile devices.
Wi‑Fi Hotspot
Location offering Wi‑Fi access that allows devices to connect to the Internet wirelessly.
Broadband
High-speed Internet access delivered via cable or telephone lines; includes DSL.
DSL
Digital Subscriber Line; uses existing copper telephone lines to provide high-speed Internet.
Cable Internet
Broadband access via cable TV lines using a cable modem.
Satellite Internet
Broadband Internet access via satellite, used where other options are unavailable.
Uses of the Internet
Functions including communication, information sharing, and rapid access to information worldwide.
Social Media
Online platforms that enable users to generate, share, and interact with content across the Internet.
Social Media Vulnerability
Large user bases and user-generated content create opportunities for cybercrime, data mining, and manipulation.
Search engine used to find information online.
YouTube
Video sharing platform for watching and uploading videos.
Social networking platform for communication and content sharing.
Wikipedia
Free online encyclopedia.
Shopee/Lazada
Online shopping platforms.