Send a link to your students to track their progress
156 Terms
1
New cards
Computer Hardware
The physical components of a computer that can be touched and seen.
2
New cards
Augmented Reality (AR)
An interactive experience where real-world environments are enhanced by computer-generated perceptual information.
3
New cards
CPU (Central Processing Unit)
The primary component of a computer that performs most of the processing inside the computer.
4
New cards
Desktop vs Laptop Computer
Desktops are stationary computers, while laptops are portable, compact, and include integrated components.
5
New cards
Hardware Definition
The tangible components of a computer system that include the machine itself and peripheral devices.
6
New cards
Input vs Output
Input devices feed data into a computer (e.g., keyboard, mouse), while output devices present data from a computer (e.g., monitor, printer).
7
New cards
RAM (Random Access Memory)
Temporary storage that provides space for your computer to read and write data to be accessed quickly.
8
New cards
Screen Resolution
The number of pixels displayed on a screen, affecting visual clarity.
9
New cards
USB (Universal Serial Bus)
A standard for connecting peripherals to a computer and transferring data.
10
New cards
Virtual Reality (VR)
A simulated experience that can mimic or differ from the real world, often using special headsets.
11
New cards
Computer Storage
The components and devices that store data in a computer, such as hard drives and SSDs.
12
New cards
Cloud Storage
Storing data on remote servers accessed via the internet.
13
New cards
Hard Drive
A traditional storage device that uses spinning magnetic disks to read and write data.
14
New cards
Optical Drive
A hardware component used to read and write data from optical disks like CDs and DVDs.
15
New cards
SSD (Solid State Drive)
A storage device that uses flash memory to store data, offering faster performance than traditional hard drives.
16
New cards
Storage Units: Bit, Byte, KB, MB, GB, TB
Spectrums of data measurement ranging from a single binary digit (bit) to terabytes (TB), encompassing various sizes of data.
17
New cards
Computer Software
Programs and operating information used by a computer to perform tasks.
18
New cards
Algorithm
A step-by-step procedure or formula for solving a problem.
19
New cards
Common Programming Languages
Languages such as Python, Java, C++, and JavaScript used to write software and applications.
20
New cards
Compiler
A program that translates code written in a programming language into machine language.
21
New cards
Copyright
A legal right that grants the creator of original work exclusive rights to its use and distribution.
22
New cards
Creative Commons
A licensing system that allows creators to specify how their work can be used by others.
23
New cards
Debugging
The process of identifying and removing errors from computer software.
24
New cards
Open Source
Software for which the original source code is made freely available for anyone to use, modify, or distribute.
25
New cards
Operating System
Software that manages computer hardware and provides services for computer programs. Examples include Windows, macOS, Android, and Linux.
26
New cards
Programming Definition
The process of designing and building executable computer software to accomplish a specific task.
27
New cards
Software Definition
A set of instructions or programs that tell a computer how to perform specific tasks.
28
New cards
Software License
A legal instrument governing the use or redistribution of software.
29
New cards
Mobile Devices
Portable computing devices that often have multifunctional capabilities, including smartphones and tablets.
30
New cards
Android
An open-source operating system used primarily for mobile devices, developed by Google.
31
New cards
Crowdsourcing
The practice of obtaining services, ideas, or content by soliciting contributions from a large group of people.
32
New cards
Health and Safety: Best Practices
Recommended guidelines to maintain safety and well-being while using technology.
33
New cards
iOS
A mobile operating system created by Apple, used for its iPhone, iPad, and iPod devices.
34
New cards
Location-based Services
Services that use geographic information to provide information relevant to a user's location.
35
New cards
Lock Screen Security
Features on mobile devices that protect the user's data by requiring authentication to access the device.
36
New cards
Real-time Information
Data that is delivered immediately after collection.
37
New cards
SMS (Short Message Service)
A text messaging service component of mobile communication systems.
38
New cards
Smartphone Definition
A mobile phone that includes advanced features like internet access, applications, and high-resolution cameras.
39
New cards
Tablet Definition
A mobile device with a touchscreen display, larger than a smartphone and with capabilities similar to a computer.
40
New cards
Tethering
Connecting a mobile device to a computer or another device to share its internet connection.
41
New cards
Virtual / Digital Voice Assistant
A software agent that can interpret voice commands and perform tasks for users.
42
New cards
Bandwidth
The maximum rate of data transfer across a network.
43
New cards
Bluetooth
A wireless technology standard used for exchanging data between devices over short distances.
44
New cards
Broadband
High-speed internet access that is always on.
45
New cards
Client vs Server
A client is a device that requests services, while a server is a device that provides those services.
46
New cards
Cloud Computing - Definition
The delivery of various services over the internet, including data storage, servers, databases, networking, software, and analytics.
47
New cards
Cloud Computing - Benefits for Businesses
Cost efficiency, scalability, and flexibility.
48
New cards
IoT (Internet of Things)
The interconnection of everyday devices to the internet, allowing them to send and receive data.
49
New cards
Network Definition
A collection of computers and devices interconnected for sharing resources and data.
50
New cards
NFC (Near Field Communication)
A set of communication protocols used for communication between devices close to each other.
51
New cards
Router
A device that forwards data packets between computer networks.
52
New cards
Wi-Fi
A technology that allows devices to connect to a local area network using radio waves.
53
New cards
BitTorrent
A communication protocol for peer-to-peer file sharing.
54
New cards
Common Web Browsers
Software applications used to access information on the World Wide Web, such as Chrome, Firefox, Safari, and Edge.
55
New cards
Credible vs Noncredible Sources
Credible sources are reliable and trustworthy; noncredible sources often lack verification or authority.
56
New cards
E-Commerce
Buying and selling goods or services using the internet, including B2B, B2C, and C2C models.
57
New cards
Email Components: To, From, CC, BCC, Subject, Body, Attachment
Essential elements that make up an email message.
58
New cards
Gig Economy
A labor market characterized by short-term contracts and freelance work instead of permanent jobs.
59
New cards
Internet Definition
A global system of interconnected computer networks that use the TCP/IP protocol to link devices worldwide.
60
New cards
ISP (Internet Service Provider)
A company that provides individuals and organizations access to the internet.
61
New cards
Social Media Definition and Example Services
Websites and applications that enable users to create and share content or participate in social networking. Examples include Facebook, Twitter, and Instagram.
62
New cards
Streaming
The continuous transmission of audio and video files over the internet.
63
New cards
URL (Uniform Resource Locator)
The address used to access a resource on the internet, composed of protocol, domain, subdomain, TLD, and path.
64
New cards
Web Browser
Software for accessing the World Wide Web, which includes features like cache, cookies, and history.
65
New cards
World Wide Web
The system of interlinked hypertext documents accessed via the internet.
66
New cards
Acceptable Use Policy
Set of rules applied by the owner of a network to regulate the way in which the network may be used.
67
New cards
Authentication vs Authorization
Authentication is verifying who a user is, while authorization is determining what a user can do.
68
New cards
Biometrics
Technological measurement and statistical analysis of biological data, often used for identification.
69
New cards
Black Hat vs White Hat Hacker
Black hat hackers violate computer security for malicious reasons, whereas white hat hackers use their skills for defensive purposes.
70
New cards
Blockchain and Cryptocurrency
A distributed ledger technology that records transactions securely, often used in digital currencies.
71
New cards
DDoS (Distributed Denial of Service)
A malicious attempt to disrupt the normal functioning of a targeted server, service, or network.
72
New cards
Digital Footprints
The trail of data you leave online, including websites visited and interactions made.
73
New cards
Email Etiquette in Business
The set of conventions and practices that govern the professional use of email.
74
New cards
Encryption
The process of encoding information to prevent unauthorized access.
75
New cards
Ergonomics
The study of people's efficiency in their working environment, aimed at minimizing discomfort.
76
New cards
Firewall
A network security system that monitors and controls incoming and outgoing network traffic.
77
New cards
Information Security: Confidentiality, Integrity, and Availability
Principles ensuring that data is accessible only to authorized users, is accurate, and is available when needed.
78
New cards
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
79
New cards
Multi-factor Authentication (MFA)
A security system that requires more than one form of verification to gain access.
80
New cards
Netiquette
The correct or acceptable way of communicating on the internet.
81
New cards
Phishing
A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.
82
New cards
Piracy - Software / Internet
The unauthorized use or distribution of software.
83
New cards
Ransomware
A type of malware that encrypts files and demands payment for decryption.
84
New cards
Spam
Unwanted or irrelevant messages sent over the internet, typically to promote products or services.
85
New cards
Trojan
A type of malware that disguises itself as legitimate software.
86
New cards
UPS and Surge Protectors
Uninterruptible Power Supplies and surge protectors safeguard devices from power surges and outages.
87
New cards
Virus
A type of malicious software that, when executed, replicates by inserting copies into other computer programs.
88
New cards
VPN (Virtual Private Network)
A service that encrypts your internet connection for privacy and security.
89
New cards
Big Data
Large volumes of data that can be analyzed for insights and information.
90
New cards
DBMS (Database Management System)
Software that interacts with users, applications, and databases to capture and analyze data. Examples include MySQL, Oracle, Microsoft SQL Server, MongoDB, and PostgreSQL.
91
New cards
Database Definition
An organized collection of structured information or data.
92
New cards
Field vs Record
A field is a single piece of data; a record is a complete set of fields.
93
New cards
Primary Key
A unique identifier for a database record.
94
New cards
Query
A request for data or information from a database.
95
New cards
Table
A structured format of data organized in rows and columns.
96
New cards
Data Analytics
The science of analyzing raw data to make conclusions about that information.
97
New cards
Benefits of Data Analytics in Business
Improved decision-making, operational efficiency, and increased profitability.
98
New cards
Data Analytics Definition
The process of examining data sets to draw conclusions about the information they contain.
99
New cards
Data Visualization
The representation of data through visual elements like charts and graphs.
100
New cards
Data Anonymization and PII
The process of removing personally identifiable information from datasets to protect privacy.