Intro to IT Regionals 2025-2026

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/151

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

152 Terms

1
New cards

Mainframe Computer

A large, multi-user computer commonly used in large businesses and government agencies; more powerful than a minicomputer.

2
New cards

personal computer

a computer designed for use by one person at a time.

3
New cards

tablet computer

A small, portable computer with a touch-sensitive screen that can be used as a writing or drawing pad.

4
New cards

supercomputer

a mainframe computer that is one of the most powerful available at a given time

5
New cards

microcomputer

sometimes called a personal computer; used at home or at the office by one person; can fit on top of or under a desk (JUST A PERSONAL COMPUTER)

6
New cards

minicomputer

A midsize, multi-user computer; more powerful than a workstation or personal computer but less powerful than a mainframe computer. (for mid-sized businesses and workstations for specialized individual tasks.)

7
New cards

CPU

Central Processing Unit (CPU):

8
New cards

Also called a processor, this is the "brain" of the computer that performs calculations, executes instructions, and handles the flow of data.

9
New cards

RAM

Random Access Memory (RAM):

10
New cards

This is a form of fast, volatile (short-term) memory used to store data that the CPU is actively using, which allows for quicker operations.

11
New cards

HDD

Hard disk drive. A disk drive that has one or more platters and a spindle. In contrast, USB flash drives use flash memory.

12
New cards

SSD

The type of hard drive that has no moving part, so they are more efficient, run with no noise, emit little heat, and require little power. (Solid State Drive)

13
New cards

HDD VS SSD

SSDs offer superior speed, durability, and power efficiency

14
New cards
15
New cards

HDDs are more budget-friendly and provide significantly larger storage capacities.

16
New cards
17
New cards

SSDs are ideal for performance-critical tasks like operating systems and frequently accessed files

18
New cards
19
New cards

HDDs are a cost-effective solution for storing large amounts of data, such as backups or media libraries.

20
New cards

Motherboard

The main circuit board that connects all internal hardware components and allows them to communicate with each other.

21
New cards

Graphic Cards

Hardware for rendering images and video.

22
New cards

Sound Cards

Enhance audio output for better sound quality.

23
New cards

Network Adapters

devices that perform specific tasks to enable nodes to communicate on a network

24
New cards

GPU

A circuit for handling the processing of graphics and images

25
New cards

printers

Output device that produces text and graphics on a phsyical medium such as paper or transparency (laser, inkjet, thermal)

26
New cards

scanners

input devices that capture printed images or documents and convert them into electronic digital signals (i.e., into binary representations of the printed image or document) that can be stored on computer media

27
New cards

USB Devices

A portable data storage device that uses flash memory to store and transfer files

28
New cards

System Software

Software that manages and controls computer hardware, enabling other software to function. It acts as a bridge between hardware and user applications.

29
New cards

Application Software

Programs designed to perform specific tasks for users. It runs on top of system software.

30
New cards

Specialized Software

Tailor-made or industry-specific software designed for particular professional or business needs.

31
New cards

Antivirus

software that is specifically designed to detect viruses and protect a computer and files from harm

32
New cards

Disk Management

Tailor-made or industry-specific software designed for particular professional or business needs.

33
New cards

Backup Tools

Software for creating copies of data for recovery.

34
New cards

Mobile

A system designed to run on portable devices like smartphones and tablets, managing their hardware and software while prioritizing power efficiency and connectivity

35
New cards

Desktop

The main graphical user interface (GUI) screen that appears after you log in, serving as a virtual workspace to organize files, folders, and applications

36
New cards

Blue Screen of Death

An error condition in which a PC "freezes" and displays a black screen (blue screen prior to Windows Vista); usually turning the computer off and turning it on again clears the error

37
New cards

Crashing Boot Issues

A failure of the system to load or start up correctly, typically resulting in an abrupt halt or restart

38
New cards

Characteristics of Windows

User interface windows are typically rectangular, can be moved, resized, and have titles, and exist in a state of being active or inactive

39
New cards

Characteristics of MacOS

A user-friendly interface, strong security features like Gatekeeper and FileVault, and a wide range of built-in applications for productivity, creativity, and communication

40
New cards

Characteristics of Linux

Open-source, cost-free, and secure, with a strong emphasis on stability and reliability

41
New cards

Characteristics of Android

Open-source nature, extensive customization options like widgets and launchers, deep integration with Google services, and a vast app ecosystem through the Google Play Store

42
New cards

Characteristics of iOS

A user-friendly interface with home screen customization, robust security, and regular updates

43
New cards

Booting

the process of starting or restarting a computer

44
New cards

Partitioning

The division of a physical storage device (like a hard drive) into separate, logical sections called partitions

45
New cards

Caching

The local storage of frequently needed files that would otherwise be obtained from an external source.

46
New cards

Virtual Memory

process of optimizing RAM storage by borrowing hard drive space

47
New cards

File Systems

The overall structure of an operating system, in which files are named, organized, and stored. FAT and NTFS are types of file systems.

48
New cards

File Management

The process by which humans or computer software provide organizational structure to a computer's contents.

49
New cards

Process Monitoring

A way of monitoring what processes are happening during installation

50
New cards

Troubleshooting

The process of analyzing a design problem and finding a way to fix it

51
New cards

Account Setup and Management

The initial process of creating a client's profile and the ongoing activities that follow to maintain and grow the relationship with the client

52
New cards

Permissions

The authorization granted to a user or application to access a system, object, or data

53
New cards

Updates

The process of applying corrections, improvements, and new features to software and systems

54
New cards

Word Processing

the use of software application to create, edit, format, print and save text-based documents, such as letters, reports, and memos

55
New cards

Spreadsheet

a screen-oriented interactive program enabling a user to lay out financial data on the screen

56
New cards

Email

messages distributed by electronic means from one computer user to one or more recipients via a network.

57
New cards

Presentation

A set of slides or handouts that contains information you want to convey to an audience.

58
New cards

Word Processing Uses

Word processing software is essential for creating, editing, and formatting documents across various fields, enhancing productivity and communication.

59
New cards

Spreadsheet Uses

Spreadsheets are versatile tools used for data organization, analysis, calculations, and visualization across various fields, including business, finance, and personal management.

60
New cards

Email Uses

Email serves as a vital tool for communication, offering various uses in personal, professional, and educational contexts.

61
New cards

Collaboration

Collaboration is the joint effort of many individuals or groups of people working together to complete a job or achieve a common goal.

62
New cards

Functions of Team Collaboration Softwares

Team collaboration software serves as a central hub for communication, content, and collaboration, enabling teams to work together more efficiently.

63
New cards

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

64
New cards

Not Receiving Emails

Emails that are supposed to be sent to you are not being received by you

65
New cards

Fraud

wrongful or criminal deception intended to result in financial or personal gain

66
New cards

Phishing

a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail

67
New cards

LAN Networks

A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or campus

68
New cards

WAN Networks

A Wide Area Network (WAN) is a large computer network that connects multiple Local Area Networks (LANs) over extensive geographical distances

69
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

70
New cards

VPN

using the public internet to build a secure, private network connecting distant locations

71
New cards

Packet Sniffing

Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted

72
New cards

Authentication

A method for confirming users' identities

73
New cards

Viruses

A computer virus is a type of malicious software (malware) that spreads itself by infecting other programs and files on a computer

74
New cards

Phishing Threats

Phishing poses significant threats to individuals and organizations by exploiting social engineering tactics to steal sensitive information, leading to data breaches and financial loss.

75
New cards

Backdoors

Used in computer programs to bypass normal authentication and other security mechanisms in place.

76
New cards

Ethernet

a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.

77
New cards

Wi-Fi

Wireless local area network that uses radio signals to transmit data

78
New cards

Bluetooth

Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves

79
New cards

Modems

Allow users remote access to a network via analog phone lines

80
New cards

Routers

special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next

81
New cards

Switches

A layer 2 device that used to connect two or more network segments and regulate traffic.

82
New cards

Peer-to-Peer

A controller network that simply connects computers to each other or to a device such as a printer, but a server is not necessary

83
New cards

Client-Server

A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information.

84
New cards

Thin Client

a terminal that looks like a desktop but has limited capabilities and components

85
New cards

Servers

Computers that exist only to provide things to others.

86
New cards

Clients

Computers, such as users' personal computers, that use any of the services provided by servers.

87
New cards

Switches Relationship

Can be in network or electrical contexts

88
New cards

TCP/IP

The dominant set of protocols for the transfer of data over the Internet.

89
New cards

UDP

User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.

90
New cards

DHCP

UDP 67, 68 : used by the Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addresses and other network configuration settings to devices on a network

91
New cards

SMP

Symmetric Multiprocessing, a computer architecture where multiple processors share memory; SaaS Management Platform, a tool for managing cloud applications; and Switching Mode Power Supply, an efficient power converter.

92
New cards

star

in the portfolio matrix, a business unit that is a fast-growing market leader

93
New cards

Bus

The paths, or lines, on the motherboard on which data, instructions, and electrical power move from component to component.

94
New cards

Ring

A ring refers to a circular structure or arrangement in IT, used in different contexts:

  • Network topology: Devices connected in a circle; data travels around the ring.

  • CPU protection rings: Security levels controlling access (e.g., Ring 0 = kernel, Ring 3 = user).

  • Storage systems: Nodes or data organized in a circular (ring) structure for load distribution.

95
New cards

Ping

a DOS command that tests connectivity and isolates hardware problems and any mismatched configurations

96
New cards

Tracert

A command that determines the route data takes to get to a particular destination.

97
New cards

Checking Cable Connections

Ensuring that wires are securely and properly plugged into their corresponding ports to establish a working link between devices.

98
New cards

Local

a network with networking equipment or computers close to each other

99
New cards

Cloud

The practice of using computing services and resources over the internet, instead of on a local computer or server

100
New cards

Troubleshoot Common Hardware Problems

Dysfunctional USB Ports, Overheating etc.