1/57
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer System
is a collection of interconnected devices that process, store, and input data and information.
Information Technology
The creation management, or use of systems, especially computer systems, applications, and networks for storing, retrieving, and transmitting information, is known as ______.
Computerization
Equipping something with or the usage of and associated automation by computers and software.
Computer Hardware
This is information-processing technology in physical form. Hardware may be as small as a pocket-sized smartphone or as big as a supercomputer that occupies an entire house.
Computer Software
The function of software is to inform the hardware as to what it can do.
device software and program software
There are two kinds of applications:
Operating System
is the most important piece of system software since it controls how the hardware works
Application Software
is created to do particular functions, such as working on a spreadsheet, writing a script, or constructing a website.
Telecommunications
This part forms a network by connecting the hardware together. Wired connections, such as Ethernet cables or fibre optic cables, or wireless connections, such as Wi-Fi, are available.
Local Area Network
also known as LAN.
Wide Area Network
also known as WAN.
Database
is a collection of information that can be accessed by querying it with one or more unique parameters
Data Warehouse
stores all of an organization's data in whatever format it is needed.
Human Resources and Procedures
part of information systems is the human element: the individuals who must operate the system and the processes they must obey in order for the facts stored in huge databases and data warehouses to be transformed into learning that can translate past events and direct future actions.
Computer
is an electronic device that can be programmed to take user input, process it, and output data.
Supercomputer
These are the most powerful and largest computers available. Huge companies employ these devices, which are unique high-capacity computers. Usually, they are used to process large volumes of data, such as in weather forecasts.
Mainframe Computer
These computers are big and powerful, but not quite as powerful as supercomputers. These can process and store large amounts of data at the same time.
Minicomputer
These machines are compact and can fit on a disk, but they lack the computing and data storage capacities of supercomputers and mainframes. Servers are used to store data in a single location and to exchange basic devices such as printers and scanners. Midrange computers and servers are another name for these.
Server Cluster
is a set of servers housed in a single location.
Microcomputer
It includes desktop machines, notebooks, personal digital assistants (PDAs), tablets, and smartphones. It is the most common and fastest-growing computers and designed specifically for general purposes such as entertainment, education, and function.
Computer System
Is a system that can process a collection of inputs and produce a set of outputs. A combination of hardware and software is used to do this.
Input
Components such as the keyboard and mouse that assist users in entering data into the screen.
Examples are: Keyboard, Computer mouse, Graphic tablet, Touchscreen, Barcode reader, Image scanner, Microphone, Webcam, Game controller, Light pen, Scanner and Digital camera
Processing
Within the device, components that transfer and process data. This includes the motherboard, as well as the processor and memory chips.
Output
Components that provide the production results to consumers, such as a monitor and printer. Examples are: Monitor, Printer, Projector, Speaker, Storage devices, Floppy disk drive, Flash drive, Disk drive, Smartphone or Tablet computer storage interface, and CD/DVD drive.
Storage
Components such as hard drives that hold software and data before they are required.
Input/Output
examples of these are Modem and Network interface controller (NIC)
Keyboard Entry
The keyboard allows the user to type details. The keyboard transforms human-readable data into electrical signals. The system unit receives and processes these signals.
Traditional Keyboard
On desktops and bigger computers, these are used. Function keys, navigation keys, and a numeric keypad are also used on these keyboards.
Laptop Keyboard
On laptop computers, these are commonly used. Laptop keyboards have fewer buttons, no numeric keypad, and the control and navigation keys are not all in the same place.
Virtual Keyboard
These keyboards are mainly used for mobile devices. The keys are displayed on a tablet, and they can be selected by touching their image.
Pointing Device
By accepting physical motions or expressions, these provide a natural interaction with the device object. The mouse, touch screen, game pad, and stylus are only a few examples of pointing instruments.
Mouse
This is used to guide a pointer on the board. One (1) or more buttons can be found on a cursor, and they are used to select command options and monitor the pointer on the keyboard.
Touch Screen
Touching the screen with a finger or a pen-like interface helps users to choose actions or commands. Touching a multi-touch screen with more than one (1) finger is possible. Tablets and smartphones, as well as some laptops and desktop computers, frequently use them.
Game Controller
These are devices that provide input to computer games.
Stylus
is a pen-like interface that is often used on tablets and smartphones. Handwriting recognition software interfaces with the device using a stylus; this software converts notes into a format that the machine unit can read.
Scanning Device
Translate scanned text and photographs into a format that can be processed by the machine unit.
Optical Scanner
These accept text and/or image-based documents and translate them to machine-readable format. Specific letters or pictures are not recognized by these instruments. Instead, they distinguish between the light, dark, and colored areas that make up individual letters or pictures.
Card Reader
These decode the data stored on credit cards, debit cards, entry cards, and other forms of identification.
Magnetic Card Reader
The most common form of card reader is the ____.
Barcode Reader
Handheld wand readers or platform scanners are the machines in question. Photo-electric cells are used to search or display barcodes.
RFID Reader
From several yards away, these will read radio-frequency identification (RFID) tags. RFID tags are small chips that can be inserted into almost any item. These chips store data in an electronic format. RFÍD tags are used on driver's licenses, visas, and other documents.
Radio-frequency Identification
also known as RFID
Character and Mark Recognition Device
Scanners that can distinguish unique characters and markings are known as these. These are specialized instruments that are used for specific tasks.
Magnetic-Ink Character Recognition
This technology is commonly used to search the odd numbers found on the bottom of checks and deposit slips.
Optical Character Recognition
This technology is used to scan typed characters such as those found on utility bills.
Optical Mark Recognition
This is a technique for scanning bubble pads.
Image Capturing Device
These devices are used to collect new information or material. A capture system can take still photographs or videos in motion. Digital cameras and webcams are examples of these devices.
Audio Input Device
These translate sounds into a format that the system device can understand.
Microphone
is the most popular audio input system
Monitor
Also known as display screens, it display text and icons in digital images.
Printer
These devices take the information that has been processed by the system unit and print it out. The hard copy is the term used to describe the recording of a printer.
Audio Output System
These devices convert audio data from a computer into audible signals that people can hear. Speakers and headphones are the most popular instruments.
Cybercrime Response
is the actual police interference in a cybercrime incident where inside the hardware, software, and network of the device the acquisition of evidentiary value issues is traceable.
Crime Scene Investigation
is a comprehensive inquiry of a crime by conducting systematic procedure of various investigative methodologies which involves recovery of physical and testimonial evidence for the purpose of identifying the witnesses, and arrest of perpetrator(s) for prosecution.
Warrant to Disclose Computer Data
authorizes law enforcers to disclose or submit subscriber’s information, traffic data, or relevant data in the possession or control of a person or service provider.
Warrant to Intercept Computer Data
authorizes law enforcers to listen, record, monitor, or survey the content of the communications through electronic eavesdropping or tapping devices, while the communication is occurring.
Warrant to Search, Seize, and Examine Computer Data
authorizes law enforcers to search the particular place for items to be seized and/or examined.
Warrant to Examine Computer Data
authorizes law enforcers to search a computer device or computer seized during a lawful warrantless arrest or by any other lawful method.