Comp Prog Ch. 1

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/79

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

80 Terms

1
New cards

Digital literacy

means acquiring current knowledge and understanding of computers, mobile devices, the web, and related technologies.

2
New cards

A digital citizen

is a person familiar with how to use technology to become an educated and productive member of the digital world.

3
New cards

A computer

is an electronic device that operates under the control of instructions stored in its memory and can accept and process data to produce information for future use.

4
New cards

Memory

consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data into information.

5
New cards

The Internet

is a global collection of millions of computers linked together to share information.

6
New cards

A network

is a collection of two or more computers connected to share resources.

7
New cards

Wi-Fi (wireless fidelity)

is a wireless data network technology that provides high-speed data connections and is not attached to any device. It is used for mobile devices.

8
New cards

A server

is a powerful, high-capacity computer you access using the Internet or other networks; it stores files and "serves” them, that is, makes the files available to users; usually grouped at a location called a data center.

9
New cards

An online social network

is an online community where users can share their interests, ideas, stories, photos, music, and videos with other registered users via a social networking website, such as Facebook, Google Plus, Twitter, Instagram, or Snapchat.

10
New cards

Big data

is a term that refers to the large and complex data sources that defy easy management with traditional data processing methods.

11
New cards

vacuum tubes, which are cylindrical glass tubes that control the flow of electrons.

The first generation of computers used _____

12
New cards

ENIAC

Electronic Numerical Integrator and Computer

13
New cards

UNIVAC

Universal Automatic Computer

14
New cards

Apple II

In 1978, Steve Jobs and Steve Wozniak of Apple Computer Corporation introduced the ____

15
New cards

Apple II

a preassembled computer with color graphics and popular spreadsheet software called VisiCalc.

16
New cards

The Internet of Things (IoT)

is an environment in which processors are embedded in every product imaginable (things), and these things, in turn, communicate with one another via the Internet or wireless networks.

17
New cards

Smart devices

IoT-enabled devices are often referred to as _____ because of their capability to communicate, locate, and predict. _____ often have associated apps that control and interact with them.

18
New cards

An embedded computer

is a computer that functions as one component in a larger product and has a specific purpose.

19
New cards

Automated teller machines (ATMs)

are one of the more familiar uses of the IoT.

are a type of kiosk, or freestanding booth, usually placed in a public area.

20
New cards

The digital divide

is the gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not.

Socioeconomic and demographic factors such as age, income, location, and education contribute to the _____, which can impact individuals, households, businesses, or geographic areas.

21
New cards

Privacy

is defined as the state or condition of being free from public attention to the degree that you determine.

22
New cards

Identity theft

involves using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.

The victim is charged for the purchases and suffers a damaged credit history that can lead to being denied loans for school, cars, and homes.

23
New cards

Dumpster diving

Personal information from discarded credit card statements, charge receipts, and bank statements can be retrieved after being discarded in the trash.

24
New cards

Phishing

attackers attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a website.

25
New cards

Change of address form

Using a standard change of address form, the attackers divert all mail to a post office box so that the victim never sees the charges made.

26
New cards

Pretexting

An attacker who pretends to be from a legitimate research firm asks for personal information.

27
New cards

Stealing

Stolen wallets and purses contain personal information that can be used in identity theft.

28
New cards

Data mining

Attackers attempt to guess your passwords or password security questions by soliciting a response to a query on an online social media site that prompts you to enter information such as a pet's name, home state, and more.

29
New cards

learning management system

A college or university might use a ______ to set up web-based training sites where students can check their progress in a course, take practice tests, and exchange messages with the instructor or other students.

30
New cards

The mobile health (mHealth) trend

refers to health care professionals using smartphones or tablets to access health records stored on the cloud, and patients using digital devices to monitor their conditions and treatments, thereby reducing the need for visits to the doctor's office.

31
New cards

3-D printers

Health care also uses ____ to manufacture skin for burn patients, as well as prosthetic devices and casts.

32
New cards

Telemedicine

is the use of telecommunications technology, including secure web-based videoconferencing, to diagnose and treat patients remotely, which provides rural or remote patients access to doctors when an in-person medical visit is not possible.

33
New cards

computer-aided manufacturing (CAM)

Manufacturers use __________ to streamline production and ship products more quickly.

With ____, robots perform tasks that are too dangerous, detailed, or monotonous for people.

A company's computers monitor assembly lines and equipment using machine-to-machine communications between machines, equipment, and devices to perform tasks.

34
New cards

LinkedIn

is a social networking site designed to provide business and employment-oriented services.

35
New cards

A computer

is an electronic device operating under the control of instructions stored in its memory.

36
New cards

software/ a program/ an app

A set of coded instructions that tell a computer or device what tasks to perform is referred to as ______.

37
New cards

Convergence

is the increasing integration of technological capabilities into a growing number of previously unrelated devices. For example, you can access some of the same email, social networking, and gaming apps and accounts on your laptop, tablet, and smartphone.

38
New cards

A laptop

is a thin, lightweight mobile computer with a screen on its lid and a keyboard on its base.

Notebook is another term for ____.

39
New cards

A tablet

is a thin, lightweight mobile device that has a touch screen and is often associated with eBook readers.

40
New cards

An eBook reader, or e-reader

is a mobile device that is used primarily for reading digital media.

41
New cards

A desktop, or desktop computer

is a personal computer designed to be in a stationary location where all its components fit on or under a desk or table.

42
New cards

an all-in-one

Another type of desktop, called _____, does not contain a tower and instead uses the same case to house the display and the processing circuitry

43
New cards

A mobile device

is a portable or handheld computing device.

44
New cards

A smartphone

is an Internet-capable phone that usually also includes a calendar, an address book, and games, in addition to apps.

45
New cards

earbuds

are small speakers that rest inside each ear canal, to listen to phone calls or media without disturbing those around them.

46
New cards

A digital camera

is a camera that creates a digital image of an object, person, or scene.

47
New cards

A digital media player

is an application that lets you play audio and video files; most tablets and smartphones include media players.

48
New cards

Streaming

is a way of receiving audio and video content on your device as it is being downloaded from the web.

49
New cards

A wearable device / wearable

is a small, mobile computing consumer device designed to be worn.

50
New cards

An activity tracker

is a device that monitors heart rate, measures pulse, counts steps, and tracks sleep patterns.

51
New cards

A smartwatch

can communicate with a smartphone to make and answer phone calls, read and send messages, access the web, play music, work with apps, such as activity trackers and GPS, and more.

52
New cards

A game console

is a hardware device that allows you to play video games, either single player or multiplayer.

53
New cards

A handheld game device

is small enough to fit in one hand, making it more portable than a game console.

54
New cards

Digitally literate people

know how to copy and paste information from one source into another.

55
New cards

Digital citizens

know when it is appropriate to copy and paste information, how to properly credit the source, and the ramifications of violating copyright restrictions.

56
New cards

Netiquette

is a term that describes the rules of Internet etiquette.

57
New cards

Netiquette

includes the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online. ____ includes rules for all aspects of the Internet, including the web, social media, Internet messaging, chat rooms, online discussions, and methods to transfer or store files.

58
New cards

Digital ethics

is the set of legal and moral guidelines that govern the use of technology, including computers, mobile devices, information systems, and databases.

59
New cards

Cyberbullying

is a form of bullying that involves digital devices and platforms such as social media sites, online forums, messaging apps, and email.

60
New cards

Missouri

is one state that has attempted to define and enact punishment for cyberbullying. _____ statute defines cyberbullying as bullying "through the transmission of a communication, including but not limited to, a message, text, sound, or image by means of an electronic device."

61
New cards

Distracted driving

means driving a vehicle while focusing on other activities, typically involving an electronic device such as a cell phone.

62
New cards

Acceptable Use Policies (AUPs)

Schools, businesses, and organizations have an obligation to protect themselves, their employees, their customers, and their information. One method organizations use to lay out their expectations and rules for digital citizenship is by enacting _____ .

63
New cards

An AUP

is a document that lists guidelines and repercussions of using the Internet and other digital company resources, including network storage and email servers. ____ is distributed in part to reduce an organization's liability and to clarify what is and is not a fireable offense.

64
New cards

green computing

The practice of ____ involves reducing electricity consumed and environmental waste generated when using computers, mobile devices, and related technologies.

65
New cards

ENERGY STAR

The U.S. Department of Energy and the U.S. Environmental Protection Agency developed the ____ program to help reduce the amount of electricity used by computers and related devices.

66
New cards

Accessibility

is the practice of removing barriers that may prevent individuals with disabilities from interacting with data, a website, or an app.

67
New cards

Assistive technology

is any device, software, or equipment that helps people work around their challenges.

68
New cards

A screen reader

is a technology that uses the audio output to describe the contents of the screen.

69
New cards

Visually impaired

people can change screen settings, such as increasing the size or changing the color of the text, to make the words easier to read.

70
New cards

color blindness

Changing the color of text also can address the needs of users with certain types of ____.

71
New cards

alternative text

A screen reader will read the_____ aloud so that the user understands the image and its purpose.

72
New cards

Hearing-impaired people

can instruct programs or apps to display words or other visual clues instead of sounds, such as for a notification from an app.

73
New cards

limited hand mobility

Users with ____ can use an on-screen keyboard, a keyboard with larger keys, or a hand-mounted pointer to control the pointer or insertion point. Alternatives to mouse buttons include a hand pad, a foot pedal, a receptor that detects facial motions, or a pneumatic instrument controlled by puffs of air.

74
New cards

intellectual disabilities

Users with _____ might struggle with reading words on a screen, handwriting, or retaining information.

75
New cards

Speech recognition

programs that the user can input data or information verbally

76
New cards

Graphic organizers

enable a user to create an outline or structure of information

77
New cards

Audio books

read information aloud to the user instead of reading it on a printed page or on the screen.

78
New cards

The Americans with Disabilities Act (ADA)

is a law that requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers.

79
New cards

The Individuals with Disabilities Education Act (IDEA)

is a law that requires that public schools purchase or acquire funding for adaptive technologies.

80
New cards

The Americans with Disabilities Act (ADA)

The Individuals with Disabilities Education Act (IDEA)

These laws were put in place to ensure that people with disabilities can access resources, information, and services using the appropriate technology.