1/70
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
system software
runs a computer or device, and includes other utilities
operating system (OS)
manages the operation of a device and lets you interact with it
platform
the type of OS
(windows, IOS, etc.)
user interface
the way you interact with a device
- Graphical user interface
- natural user interface
Graphical User Interface (GUI)
interacting with a device by typing text
Natural user interface
interacting with a device with movements, etc.
software types
closed or open source
closed software
hidden, controlled software
open source software
software free from restrictions
roles of an operating system
- file and folder management
- main memory and virtual memory
- booting
- customize the user environment
- customize the device's hardware components
- manage windows (maximize, minimize, close, restore...)
- manage resources
- provide utilities
- adjust power settings
- allow virtualization (multiple operating systems)
- security and file protection
- file compression
- manage file names/placement/properties
popular desktop operating systems
- Microsoft Windows
- Apple mac OS
- UNIX and Linux (open source software)
- Google Chrome OS
popular mobile operating systems
- android (from google, based on Linux)
- iOS (from apple, specifically for apple "i" devices only)
primary software categories
system software and application software (app)
installation/access type categories
- native app
- portable app
- web app
- mobile web app
- mobile app
native app
installed directly on a computer or device
portable app
runs from removable storage such as a USB drive or external hard drive
web app
accessed over the internet from a web browser
mobile web app
accessed over the internet from a web browser running on a phone or tablet
mobile app
installed and runs on a smart phone or tablet
platform specific
written for a specific operating system (native and mobile apps are platform specific)
responsive design
web app adjusts automatically to different sizes of screens/devices
some web app advantages
- created/updated quickly
- access your information on the go
- voice input and smart on-screen keyboard simplify interactions
some web app disadvantages
- not as fast & fewer features than native apps
- poor design can turn people away
- typing on small on-screen keyboard can be cumbersome
typical productivity apps
- word
- spreadsheet software
- presentation software
- database software
- email, calendar, note-taking, etc
word apps
processing for documents
spreadsheet software
for numbers and calculations
presentation software
for slideshows
database software
for managing files and records
productivity suite
a collection of apps packaged together
Microsoft productivity suite
office:
- word
- excel
- powerpoint
Apple productivity suite
iWork:
- pages
- numbers
- Apple Mail
Google productivity suite
G Suite:
- Google Docs
- Google Slides
- gmail
Apache productivity suite
Openoffice:
- writer
- calc
- impress
database
a collection of data organized for access, retrieval, and reporting
Databases provide capabilities to:
- add, update, and delete data
- filter, sort, and retrieve data
- create forms and reports
Relational database management system (RDBMS)
consists of a collection of tables that have columns and rows
RDBMS rows
hold records
RDBMS columns
hold fields which each have a name and data type
query
extracts data based on specified criteria or conditions
report
user-friendly layout of database content
form
screen used to view, enter, or update a record
digital image formats
bitmap images and vector graphics
bitmap images
based on pixels (picture elements, dots) and their color
vector graphics
use mathematical formulas to represent shapes and their colors (best for resizing)
graphics app categories
- paint apps
- photo and image editing apps
- video editing apps
- drawing apps (usually use vector graphics)
types of cyber attackers
- script kiddies
- hactivists
- cyberterrorists
- state actor
- brokers
script kiddies
use others software or instructions because they lack knowledge or skills
hactivists
motivated by principles or beliefs, or want to make a political statement
cyberterrorists
attack a nation's computers or networks to cause widespread disruption or panic
state actor
launch government-sponsored attacks against enemies
brokers
sell knowledge of uncovered vulnerabilities to other cybercriminals
malware
malicious software
types of malware
- virus
- trojan
- ransomware
- keylogger
virus
infects a computer program or file and then reproduces itself
trojan
hides inside or along with seemly safe software
ransomware
prevents access to a computer or scrambles data until money is paid
keylogger
captures a user's keystrokes to obtian private data, passwords, etc.
social engineering
attacks on people (phishing, hoaxes, or typo squatting)
risks of data collection
- data about you is gathered and kept in secret
- the accuracy of data about you cannot be verified
- identity theft can ruin the accuracy of data about you
- data about you is often used by others to make important decisions about you
physical health risks
Repetitive strain injury (RSI) and eyestrain
behavioral risks
- technology addiction
- sedentary lifestyle
- psychological or mental health issues
- hindered social interaction
- cyberbullying
environmental risks
electronic waste (e-waste) containing toxic chemicals and heavy metals
relationship between security and convenience
inverse relationship
security increases, convenience decreases
security decreases, convenience increases
making strong passwords
- long
- mix letters, numbers, and symbols
- don't use dictionary words, repeated characters or sequences, or birthdays, names, etc.
- Don't use the same password for multiple accounts
- use a password manager
multifactor authentication (MFA)
combo of something you know (password, pin, etc) and something you have (phone, token, etc) or biometrics aka something you are (fingerprint, face, eye characteristic)
software patches
fix a bug or security weakness
- install automatically or promptly
best thing to safeguard against data loss
make a backup copy
some things to help prevent social engineering attacks:
- think before you click
- don't open unexpected attachments
configure web browsers and antimalware
Things you can do to personally protect your privacy and personal data:
- limit subscriptions to mailing lists
- limit posting of personal information
- give only necessary info when completing an online form
ergononmics
The applied science of workspace design for efficiency and safety