1/151
Looks like no tags are added yet.
Name  | Mastery  | Learn  | Test  | Matching  | Spaced  | 
|---|
No study sessions yet.
Mainframe Computer
A large, multi-user computer commonly used in large businesses and government agencies; more powerful than a minicomputer.
personal computer
a computer designed for use by one person at a time.
tablet computer
A small, portable computer with a touch-sensitive screen that can be used as a writing or drawing pad.
supercomputer
a mainframe computer that is one of the most powerful available at a given time
microcomputer
sometimes called a personal computer; used at home or at the office by one person; can fit on top of or under a desk (JUST A PERSONAL COMPUTER)
minicomputer
A midsize, multi-user computer; more powerful than a workstation or personal computer but less powerful than a mainframe computer. (for mid-sized businesses and workstations for specialized individual tasks.)
CPU
Central Processing Unit (CPU):
Also called a processor, this is the "brain" of the computer that performs calculations, executes instructions, and handles the flow of data.
RAM
Random Access Memory (RAM):
This is a form of fast, volatile (short-term) memory used to store data that the CPU is actively using, which allows for quicker operations.
HDD
Hard disk drive. A disk drive that has one or more platters and a spindle. In contrast, USB flash drives use flash memory.
SSD
The type of hard drive that has no moving part, so they are more efficient, run with no noise, emit little heat, and require little power. (Solid State Drive)
HDD VS SSD
SSDs offer superior speed, durability, and power efficiency
HDDs are more budget-friendly and provide significantly larger storage capacities.
SSDs are ideal for performance-critical tasks like operating systems and frequently accessed files
HDDs are a cost-effective solution for storing large amounts of data, such as backups or media libraries.
Motherboard
The main circuit board that connects all internal hardware components and allows them to communicate with each other.
Graphic Cards
Hardware for rendering images and video.
Sound Cards
Enhance audio output for better sound quality.
Network Adapters
devices that perform specific tasks to enable nodes to communicate on a network
GPU
A circuit for handling the processing of graphics and images
printers
Output device that produces text and graphics on a phsyical medium such as paper or transparency (laser, inkjet, thermal)
scanners
input devices that capture printed images or documents and convert them into electronic digital signals (i.e., into binary representations of the printed image or document) that can be stored on computer media
USB Devices
A portable data storage device that uses flash memory to store and transfer files
System Software
Software that manages and controls computer hardware, enabling other software to function. It acts as a bridge between hardware and user applications.
Application Software
Programs designed to perform specific tasks for users. It runs on top of system software.
Specialized Software
Tailor-made or industry-specific software designed for particular professional or business needs.
Antivirus
software that is specifically designed to detect viruses and protect a computer and files from harm
Disk Management
Tailor-made or industry-specific software designed for particular professional or business needs.
Backup Tools
Software for creating copies of data for recovery.
Mobile
A system designed to run on portable devices like smartphones and tablets, managing their hardware and software while prioritizing power efficiency and connectivity
Desktop
The main graphical user interface (GUI) screen that appears after you log in, serving as a virtual workspace to organize files, folders, and applications
Blue Screen of Death
An error condition in which a PC "freezes" and displays a black screen (blue screen prior to Windows Vista); usually turning the computer off and turning it on again clears the error
Crashing Boot Issues
A failure of the system to load or start up correctly, typically resulting in an abrupt halt or restart
Characteristics of Windows
User interface windows are typically rectangular, can be moved, resized, and have titles, and exist in a state of being active or inactive
Characteristics of MacOS
A user-friendly interface, strong security features like Gatekeeper and FileVault, and a wide range of built-in applications for productivity, creativity, and communication
Characteristics of Linux
Open-source, cost-free, and secure, with a strong emphasis on stability and reliability
Characteristics of Android
Open-source nature, extensive customization options like widgets and launchers, deep integration with Google services, and a vast app ecosystem through the Google Play Store
Characteristics of iOS
A user-friendly interface with home screen customization, robust security, and regular updates
Booting
the process of starting or restarting a computer
Partitioning
The division of a physical storage device (like a hard drive) into separate, logical sections called partitions
Caching
The local storage of frequently needed files that would otherwise be obtained from an external source.
Virtual Memory
process of optimizing RAM storage by borrowing hard drive space
File Systems
The overall structure of an operating system, in which files are named, organized, and stored. FAT and NTFS are types of file systems.
File Management
The process by which humans or computer software provide organizational structure to a computer's contents.
Process Monitoring
A way of monitoring what processes are happening during installation
Troubleshooting
The process of analyzing a design problem and finding a way to fix it
Account Setup and Management
The initial process of creating a client's profile and the ongoing activities that follow to maintain and grow the relationship with the client
Permissions
The authorization granted to a user or application to access a system, object, or data
Updates
The process of applying corrections, improvements, and new features to software and systems
Word Processing
the use of software application to create, edit, format, print and save text-based documents, such as letters, reports, and memos
Spreadsheet
a screen-oriented interactive program enabling a user to lay out financial data on the screen
messages distributed by electronic means from one computer user to one or more recipients via a network.
Presentation
A set of slides or handouts that contains information you want to convey to an audience.
Word Processing Uses
Word processing software is essential for creating, editing, and formatting documents across various fields, enhancing productivity and communication.
Spreadsheet Uses
Spreadsheets are versatile tools used for data organization, analysis, calculations, and visualization across various fields, including business, finance, and personal management.
Email Uses
Email serves as a vital tool for communication, offering various uses in personal, professional, and educational contexts.
Collaboration
Collaboration is the joint effort of many individuals or groups of people working together to complete a job or achieve a common goal.
Functions of Team Collaboration Softwares
Team collaboration software serves as a central hub for communication, content, and collaboration, enabling teams to work together more efficiently.
Spam
unwanted e-mail (usually of a commercial nature sent out in bulk)
Not Receiving Emails
Emails that are supposed to be sent to you are not being received by you
Fraud
wrongful or criminal deception intended to result in financial or personal gain
Phishing
a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail
LAN Networks
A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or campus
WAN Networks
A Wide Area Network (WAN) is a large computer network that connects multiple Local Area Networks (LANs) over extensive geographical distances
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
VPN
using the public internet to build a secure, private network connecting distant locations
Packet Sniffing
Allows you to obtain anything being sent over a network if the data being transmitted isn't encrypted
Authentication
A method for confirming users' identities
Viruses
A computer virus is a type of malicious software (malware) that spreads itself by infecting other programs and files on a computer
Phishing Threats
Phishing poses significant threats to individuals and organizations by exploiting social engineering tactics to steal sensitive information, leading to data breaches and financial loss.
Backdoors
Used in computer programs to bypass normal authentication and other security mechanisms in place.
Ethernet
a system for connecting a number of computer systems to form a local area network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more systems.
Wi-Fi
Wireless local area network that uses radio signals to transmit data
Bluetooth
Allows electronic devices like cell phones and computers to exchange data over short distances using radio waves
Modems
Allow users remote access to a network via analog phone lines
Routers
special purpose devices that are designed to read the source and destination address fields in IP packet headers to decide where to send (route) the packet next
Switches
A layer 2 device that used to connect two or more network segments and regulate traffic.
Peer-to-Peer
A controller network that simply connects computers to each other or to a device such as a printer, but a server is not necessary
Client-Server
A network architecture in which a system is divided between server tasks performed on the instructions received from clients, requesting information.
Thin Client
a terminal that looks like a desktop but has limited capabilities and components
Servers
Computers that exist only to provide things to others.
Clients
Computers, such as users' personal computers, that use any of the services provided by servers.
Switches Relationship
Can be in network or electrical contexts
TCP/IP
The dominant set of protocols for the transfer of data over the Internet.
UDP
User Datagram Protocol. Used instead of TCP when guaranteed delivery of each packet is not necessary. UDP uses a best-effort delivery mechanism.
DHCP
UDP 67, 68 : used by the Dynamic Host Configuration Protocol (DHCP) to automatically assign IP addresses and other network configuration settings to devices on a network
SMP
Symmetric Multiprocessing, a computer architecture where multiple processors share memory; SaaS Management Platform, a tool for managing cloud applications; and Switching Mode Power Supply, an efficient power converter.
star
in the portfolio matrix, a business unit that is a fast-growing market leader
Bus
The paths, or lines, on the motherboard on which data, instructions, and electrical power move from component to component.
Ring
A ring refers to a circular structure or arrangement in IT, used in different contexts:
Network topology: Devices connected in a circle; data travels around the ring.
CPU protection rings: Security levels controlling access (e.g., Ring 0 = kernel, Ring 3 = user).
Storage systems: Nodes or data organized in a circular (ring) structure for load distribution.
Ping
a DOS command that tests connectivity and isolates hardware problems and any mismatched configurations
Tracert
A command that determines the route data takes to get to a particular destination.
Checking Cable Connections
Ensuring that wires are securely and properly plugged into their corresponding ports to establish a working link between devices.
Local
a network with networking equipment or computers close to each other
Cloud
The practice of using computing services and resources over the internet, instead of on a local computer or server
Troubleshoot Common Hardware Problems
Dysfunctional USB Ports, Overheating etc.