1/49
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital Literacy
The ability to effectively and critically navigate, evaluate, and create information using a range of digital technologies.
Basic Computer Skills
The ability to use computers and other digital devices for everyday tasks.
Information Literacy
The skill to find, evaluate, and use information effectively.
Communication Skills
Understanding how to use digital tools for communication.
Media Literacy
The ability to understand, evaluate, and create media in various forms.
Academic Success
The benefit of digital literacy in utilizing educational resources and research tools online.
Career Advancement
The necessity of digital literacy in most modern jobs.
Personal Growth
The empowerment gained from digital literacy to stay informed and communicate effectively.
Hardware
Tangible and/or physical components related to technology.
Central Processing Unit (CPU)
The brain of the computer that performs instructions defined by software.
Memory (RAM)
Temporary storage that holds data and instructions currently being used by the CPU.
Motherboard
The main circuit board connecting all components, including CPU, memory, and peripherals.
Power Supply Unit (PSU)
Provides power to the computer’s components.
Display Screen
Shows the visual output from the computer.
Storage
Includes Hard Disk Drive (HDD), Solid State Drive (SSD), or flash storage.
Hard Disk Drive (HDD)
Can store, access, and retain data permanently.
Solid State Drive (SSD)
Accesses data faster than HDD during runtime.
Flash Storage
Uses non-volatile memory to store data electronically, commonly in USB drives and SSDs.
Input Devices
Allow users to interact with the computer.
Output Devices
Output information from the computer.
Non-volatile
Retaining data even when there is a break in the power supply.
Software
Intangible and/or virtual components like software applications and operating systems.
System Software
Software designed to control and manage the computer's hardware.
Application Software
Programs designed to perform specific tasks.
Device Drivers
Allow the operating system to communicate with hardware devices.
Utility Software
Provides maintenance and optimization tools.
Firmware
Low-level software embedded in hardware to control specific functions.
Productivity Software
Helps users create, edit, and manage documents and data.
Web Browsers
Allows users to access and interact with content on the web.
Media Players
Plays audio and video files.
Graphic and Design Software
Used for creating and editing images and designs.
Communication Software
Facilitates communication and collaboration.
Games and Entertainment Software
Provides entertainment through interactive experiences.
Development Tools
Helps developers write, debug, and manage code.
Desktop
The first screen seen when a computer starts up.
Taskbar
Located at the bottom of the screen, shows running programs and allows quick access.
Start Menu
Access point for all installed programs and system settings.
System Tray
Contains icons for system notifications and quick settings.
File Management
Crucial for staying organized and ensuring data safety.
Regular Maintenance
Vital for keeping a computer running smoothly and extending hardware lifespan.
Driver Updates
are special programs that allow your operating system to communicate with hardware components like your printer or graphics card.
Antivirus Protection
Essential for safeguarding data and ensuring system stability.
Internet Service Provider
A company that provides access to the internet.
Domain Name Server
Acts as a directory to find the server hosting a website.
Hypertext Transfer Protocol Secure
The primary protocol for sending data between a web browser and a website.
Uniform Resource Locator
A unique identifier used to locate a resource on the internet.
Phishing
Fake emails or messages that trick individuals into revealing sensitive information.
Malware
Software designed to harm a computer or steal data.
Ransomware
A type of malware that locks files and demands payment for access.
Two-Factor Authentication
Adds an extra layer of security by requiring two forms of verification.