1/27
Flashcards for Computer Basics Review
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Desktop PC
A type of computer used at desks; not portable but powerful for general use.
Laptop
A portable computer with a built-in battery, keyboard, and screen.
Tablet
A lightweight computer with a touchscreen, good for basic tasks.
Smartphone
A mobile device that combines phone and computing functions.
Mainframe
Large, powerful computer systems used by big organizations.
Supercomputer
Extremely fast computers used for simulations and weather forecasting.
Embedded Computer
Computers built into devices such as washing machines and microwaves.
Input Device
Hardware components such as keyboard, mouse, scanner, camera, and sensors.
Output Device
Hardware components such as monitor, printer, speakers, and actuators.
RAM
Random Access Memory; temporary and volatile primary storage.
ROM
Read Only Memory; permanent and non-volatile primary storage.
System Software
Software including operating systems, utility programs, and drivers.
Application Software
Software such as word processors, browsers, and spreadsheets.
Custom-made Software
Software designed for a specific user or task.
Off-the-shelf Software
Ready-made software for general use.
Eye Strain
Physical risk from staring at screens; prevent with breaks and screen filters.
Back Pain
Physical risk from poor posture; prevent with ergonomic chairs.
RSI
Repetitive Strain Injury; physical risk from typing; prevent with ergonomic keyboards.
Hacking
Unauthorized access to data; prevent with firewalls and strong passwords.
Phishing
Fake emails that trick users; prevent by being cautious and verifying emails.
Pharming
Redirects users to fake websites; prevent with anti-virus software and browser updates.
Malware
Includes viruses, worms, and Trojans; prevent by installing antivirus software.
Spyware/Keyloggers
Software that records keystrokes; prevent with anti-spyware tools.
Biometrics
Security method using fingerprint or face recognition.
Two-Factor Authentication (2FA)
An extra layer of security for login.
Encryption
Converts data into unreadable form without a key.
Firewall
Blocks unauthorized access to a network.
Audience
Content should be tailored depending on age, technical ability, language and culture, and disabilities.