1/65
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Microprocessor
The part of the computer that executes the instructions of a computer program, central processing unit
Green computing
involves reducing the environmental waste generated when using a computer
Supercomputers
largest and fastest computers, capable of storing and processing large volumes of data.
Embedded computers
special-purpose computer that performs specific tasks and can be found in a range of devices such as a digital watch or an MP3 player.
Convergence
the process of integrating different technologies, devices, and services into a single, unified system
Ubiquitous
present or existing everywhere
Spreadsheets
Computer programs that convert data into tables, charts, and graphs.
open source software
source code is made freely available and users can modify it
the internet
A group of computers and servers that are connected to each other.
Software as a service (Saas)
s a way to deliver software over the internet on a subscription basis
Paas
a cloud computing model that provides a pre-built environment for developers to build, run, and manage applications without worrying about the underlying hardware and software infrastructure.
Iaas
where a third-party provider rents out the core IT infrastructure—like servers, storage, and networking—to businesses
Algorithm
a step-by-step procedure for solving a problem
Bluetooth
wireless technology to transfer data
(Random acess memory )RAM
computers short term memory for temporary data storage
Read only memory (ROM)
permanently stores essential instructions, like the basic startup program for a device, and retains its data even when the power is off
3-d printer
a machine that builds a physical object from a digital design by adding material one layer at a time
firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
resolution
the number of pixels that make up an image, displayed on a screen or in a digital file
mobile applications
A software program that runs on mobile devices and gives users access to certain content
HTML
Hypertext Markup Language, a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on World Wide Web pages.
Domain name
the part of a network address that identifies it as belonging to a particular domain.
web browser
a software application that allows users to access and view content on the World Wide Web, such as webpages, images, and videos
IP address
The unique number assigned to each device on the Internet.
instant messaging
Online communication that allows two or more participants to communicate in real time
captcha
A distorted image of letters and numbers used to prevent automated use of websites
information processing cycle
series of steps that convert raw data into meaningful information, consisting of input, processing, output, and storage
properties
a characteristic or attribute of an object that defines its state, behavior, or settings.
coding/syntax
coding is the act of creating instructions,
Syntax is the set of rules governing how those instructions must be written.
B2C ecommerce
is the online sale of goods or services directly from a business to an individual consumer
LAN
local area network, a group of connected computers and devices in a small localized area like a home, office, or school
WAN
wide area network, a computer network that connects smaller networks, like LANS, over larger geographical areas
Buses
electronic pathways through which data can be transferred.
solid state/optical
opical storage uses a laser to read and write date on a spinning disc (cd/dvd), solid-state storage uses electronic chips with no moving parts, making it faster and more durable
hash
a function that converts an input of letters and numbers into an encrypted output of a fixed length
ethernet standards/protocols
router
a networking device that connects different computer networks by forwarding data packets between them
VPN
virtual private network, an. encrypted connection over a public network that protects your data and masks your ip address
phishing
attackers trick people into giving up sensitive information, such as passwords or credit card numbers, by pretending to be a legitimate or trusted source
boolean operators
using words such as "and", "but", and "or" when typing in search terms to focus the results
cyberterrorism
A form of terrorism that makes use of high technology, especially computers and the internet, in the planning and carrying out of terrorist attacks.
shareware
software distribution model where users receive a limited version of software product, either with a free trial period or restricted features, the core concept is "try before you buy"
freemium
a company offers a basic version of a product or service for free, with the option for users to pay for a premium, more advanced version
virus/worm
virus/worm
Both are types of malicious software (malware), but the key difference is the worm's ability to spread autonomously through vulnerabilities, while a virus relies on user action to activate and move.
primary key
a column or a set of columns in a database table that uniquely identifies each row (or record) in that table.
one-to-many relationship
a connection where one item can be linked to multiple other items, but each of those items can only be linked to one original item (single customer who can have many orders)
OSS
open source software, source code is made freely available to the public. Anyone can use, study, change, and distribute the software and its source code, typically for free, under certain licensing terms
SDLC Phases
a structured process for creating software, involving. planning, analysis, design, implementation (coding), testing, deployment, and maintenance
System Requirements
the specifications a computer or system must meet to run a specific software. or hardware. sucessfully
Machine Language
most basic, lowest-level programming language a computer can directly execute without translation, written in binary code (0s an 1s)
VR
virtual reality
AR
augmented reality, technology that overlays computer-generated images and information onto the users view. of the. real world
Project Management SW
designed to help businesses and individuals track projects, tasks, and schedules. T
Service pack
a collection of software product updates, bug fixes, and patches.
Utility software
a program or tool that performs specific tasks to enhance productivity, efficiency, functionality, or maintenance of a computer system
query
commands given to a computer program or a database system to retrieve or modify specific pieces of data.
binary/bits/bytes
binary: base 2 number system
bit: smallest unit of data, can hold one of two values (0 or 1)
byte: group of 8 bits
client/client server/peer to peer
client: comp or sw program that requests services of. resources from another comp known as a server
client server: server. (central powerful comp) provides services/resources to requesting computers (clients)
P2P: all connected computers (referred to as peers) have equal capabilities and can act as both clients and servers.