1/76
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Social media tools
Platforms for sharing content and communication.
Crisis mapping tools
Tools for visualizing and analyzing crisis data.
Digital Divide
Gap between those with and without internet access.
Web 2.0
Interactive web applications enabling user-generated content.
Cognitive Surplus
Leisure time available for collaborative projects online.
Sharing economy
Economic model based on sharing resources and services.
Computer literacy
Ability to use computers effectively and efficiently.
AI
Simulation of human intelligence by machines.
Four major functions of computer
Input, process, output, and storage of data.
Bits and Bytes
Basic units of digital information; 1 byte = 8 bits.
Types of computers
Categories include desktops, laptops, tablets, and servers.
Types of input devices
Devices like keyboards and mice for data entry.
Types of output devices
Devices like monitors and printers for displaying data.
Motherboard
Main circuit board connecting all computer components.
CPU
Central Processing Unit; processes instructions and data.
Types of storage devices
Includes HDDs, SSDs, USB drives, and CDs.
Types of memory
Includes RAM, ROM, and cache memory.
Power management
Techniques to reduce power consumption in devices.
Internet
Global network connecting millions of private, public networks.
Social media dos and don'ts
Guidelines for responsible and effective online behavior.
Online communication methods
Includes email, chat, video calls, and forums.
Business online
Conducting commercial activities via the internet.
IP address
Unique identifier for a device on a network.
URL parts
Components include protocol, domain, path, and query.
Domain names
Human-readable addresses for websites on the internet.
Cloud computing
Internet-based computing providing shared resources and services.
Types of Software
Application software for tasks; system software for management.
Ways software can be bought
Includes direct purchase, subscription, and free downloads.
Installing software
Process of adding software to a computer system.
Uninstalling software
Removing software from a computer system.
Software licenses
Legal agreements governing software usage rights.
Productivity software
Applications designed to improve work efficiency.
Business software
Applications tailored for business operations and management.
Multimedia software
Programs for creating and editing audio, video, and graphics.
System software
Software that manages hardware and system resources.
Process management
Techniques for managing computer processes and resources.
Device drivers
Software enabling communication between OS and hardware.
Plug and Play
Technology allowing automatic device recognition and configuration.
Application Programming Interface (API)
Set of protocols for building software applications.
Boot process
Sequence of events that starts a computer.
File management
Organizing and maintaining files on a computer.
File path
Location of a file in a file system.
File extensions
Suffix indicating file type and format.
Utility programs
Software designed for system maintenance and optimization.
File compression
Reducing file size for storage efficiency.
Moore's law
Observation that computing power doubles approximately every two years.
Machine cycle
Process of fetching, decoding, and executing instructions.
Types of Computer Networks
Includes LAN, WAN, MAN, and PAN.
Network Architecture
Design structure of a computer network.
WIFI standards
Protocols for wireless networking, e.g., 802.11.
Components of network
Includes routers, switches, and access points.
Transmission media
Physical pathways for data transmission in networks.
Broadband type
High-speed internet access via various technologies.
Digital convergence
Integration of multiple digital technologies and services.
Internet of Things (IoT)
Network of interconnected devices collecting and exchanging data.
Digital and Analog
Digital uses discrete values; analog uses continuous signals.
Digital publishing
Distributing content electronically via the internet.
Digital copyrights
Legal rights protecting digital content and media.
Cybersecurity
Protection of computer systems from theft and damage.
Types of hackers
Includes white hat, black hat, and gray hat hackers.
Viruses
Malicious software designed to damage or disrupt systems.
Securing your devices
Implementing measures to protect devices from threats.
Social engineering
Manipulating individuals to gain confidential information.
System Development Lifecycle
Phases for developing and managing information systems.
Program Development Lifecycle
Stages for creating and maintaining software programs.
Algorithms
Step-by-step procedures for solving problems.
Programming languages
Languages used to write software applications.
Compiler
Translates code from high-level to machine language.
Debugging
Process of identifying and fixing errors in code.
Testing
Evaluating software for functionality and performance.
Types of Databases
Includes relational, NoSQL, and distributed databases.
Data Warehouse
Central repository for integrated data from multiple sources.
Client Server Networks
Network architecture where clients request resources from servers.
Types of Network Security
Includes firewalls, encryption, and intrusion detection systems.
Internet protocols
Rules governing data transmission over the internet.
Private key encryption
Cryptography using a single key for encryption and decryption.
Public key encryption
Cryptography using a pair of keys for secure communication.