1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hardware
Tangible physical components of a computer system that can be touched, like the processor and keyboard.
Software
Programs that control computer systems, consisting of instructions that direct hardware operations.
Input Devices
Devices that provide data for processing, such as keyboards and mice.
Output Devices
Devices that display or produce the results of processing, like monitors and printers.
CPU (Central Processing Unit)
The primary component of a computer responsible for processing data and executing instructions.
RAM (Random Access Memory)
Temporary internal memory where data and programs in current use are stored; volatile.
ROM (Read-Only Memory)
Non-volatile memory used to store firmware and system instructions that do not change.
Operating System
System software that manages hardware resources and provides common services for application software.
CLI (Command Line Interface)
An interface allowing users to interact with a computer by typing commands.
GUI (Graphical User Interface)
An interface using graphics and icons, allowing users to interact with a computer through visual indicators.
Data Storage
The recording, retention, and retrieval of information, which can be done using various storage devices.
Cloud Storage
Remote storage of data on the internet that allows users to access and manage their files from anywhere.
Biometric Authentication
Security processes that rely on unique physical characteristics, such as fingerprints or retinal patterns.
Networking
Connecting computers and devices for communication and resource sharing.
Firewall
A security system that monitors and controls incoming and outgoing network traffic.
Phishing
A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
Data Integrity
The accuracy and consistency of stored data, ensuring it remains unchanged during storage and transmission.
Encryption
The process of converting information into a code to prevent unauthorized access.
User Interface (UI)
The means by which a user interacts with a computer or software, including displays and controls.
Database
An organized collection of data, generally stored and accessed electronically from a computer system.
Spreadsheet
An application used for calculating, organizing, analyzing, and storing data in tabular form.
Digital Communication
The electronic transmission of information that has been encoded digitally.
3D Printing
A process of creating three-dimensional objects from a digital file, often using additive manufacturing technologies.
Robotics
The branch of technology that deals with the design, construction, operation, and application of robots.
Artificial Intelligence (AI)
The simulation of human intelligence processes by machines, especially computer systems.
Cybersecurity
The practice of protecting systems, networks, and programs from digital attacks.
Website Authoring
The process of creating and editing web pages to publish on the internet.
E-commerce
Commercial transactions conducted electronically on the internet.
Data Protection Act
Legislation that governs the processing, storage, and sharing of personal information.
____ is a type of storage that allows for quick access and temporary data retention while a computer is running.
RAM (Random Access Memory)
The ____ is often referred to as the brain of the computer, executing instructions and processing data.
CPU (Central Processing Unit)
_____ are devices used to input information into a computer system, such as a keyboard or mouse.
Input Devices
An example of an ____ device is a monitor or printer, displaying or producing output from the computer.
Output Device
____ refers to the organized storage of data, which can be accessed electronically.
Database
The ____ acts as a manager for the computer's hardware and software resources.
Operating System
_____ provides a means for users to interact with a computer through visual indicators, such as icons.
GUI (Graphical User Interface)
____ is a type of persistent storage used to store system firmware and critical instructions.
ROM (Read-Only Memory)
The process of converting data into a code to prevent unauthorized access is called ____.
Encryption
____ are systems that protect computers and networks from digital attacks and threats.
Cybersecurity