1/62
module 1 dual credit comp sci 101 definition based on powerpoint
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
digital literacy
acquiring current knowledge and understanding of computers, mobile devices, the web, and related technology
digital citizen
person familiar with how to use technology to
become an educated and productive member of the digital world
computer
electronic device that operates under the control of instructions stored in its memory and can accept and process data to produce information for future use
memory
consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data into information.
internet
global collection of millions of computers linked together to share information. (Largest network)
wi-fi/wireless fidelity
a wireless data network technology that provides high-speed data connections and is
not attached to any device. It is used for mobile devices
server
powerful, high-capacity computer you access using the Internet or other networks; it stores files and “serves” them, that is, makes the files available to users; usually grouped at a location called a data center
online social network
an online community where users can share their interests, ideas, stories, photos, music, and videos with other registered users via a social networking website, such as Facebook, Google Plus, Twitter, Instagram, WhatsApp, or Snapchat
big data
large and complex data sources
that defy easy management with
traditional data processing methods
eniac
electronic numerical integrator and computer
univac
universal automatic computer
constraints of first computer
size (too large)
the amount of power they consume (a lot)
the heat they generated
how quickly they wore out
first apple computer
Steve Jobs & Wozniak - 1978
Internet of Things (IoT)
environment in which processors are
embedded in every product imaginable (things), and these things, in turn, communicate with one another via the Internet or wireless networks
IoT-enabled devices
smart devices because of their capability to communicate, locate, and predict; Smart devices often have associated apps that control and interact with them ex: Home automation, Air quality monitors, heart monitors, blood sugar sensors, Traffic monitoring
embedded computers
part of IoT; computer that functions as one component in a larger product and has a specific purpose; small and have limited hardware on their own but enhance capabilities of everyday devices; Embedded computers perform a specific function based on the requirements of the product in which they reside. (electronic stability control; car sensors))
automated teller machines (ATMs)
example of IoT; type of kiosk, or freestanding booth, usually placed in a public area
use of sensors
Manufacturing can use sensors to monitor processes and increase the quality of finished goods
robotic arms
help ensure precision during the manufacturing process
healthcare can use IoT to…
Connect to a patient’s wearable blood pressure or glucose
monitor.
Send prescription updates and changes to a pharmacy and alert
the patient of the prescription.
Track and store data provided by wearable monitors to determine
necessary follow-up care.
Send the patient reminders about upcoming appointments or
tests
digital divide
gap between those who have access to technology and its resources and information, especially on the Internet, and those who do not
privacy
the state or condition of being free from public
attention to the degree that you determine
identity theft
using someone’s personal information, such as their name, Social Security number, or credit card number, to commit financial fraud
dumpster diving
Personal information from discarded credit card statements, charge receipts, and bank statements can be retrieved after being discarded in the trash
phishing
attackers attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a website
Change of address form
Using a standard change of address form, the attackers divert all mail to a post office box so that the victim never sees the charges made
Pretexting
An attacker who pretends to be from a legitimate research firm asks for personal information
Stealing
Stolen wallets and purses contain personal information that can be used in identity theft
Data mining
Attackers attempt to guess your passwords or password security questions by soliciting a response to a query on an online social media site that prompts you to enter information such as a pet’s name, home state, and more
intelligent workplace
uses of technology to connect employees to the company's network, communicate with one another, use productivity software and apps, and meet via web conferencing, and more
Online productivity software
enables students to work
collaboratively on projects and send the finished assignment to the teacher using email, reducing the need for paper printouts.
learning management system (LMS)
software application used to plan, deliver, track, and manage educational or training programs; used by college or university ex: brightspace
telemedicine
web-based videoconferencing, to
diagnose and treat patients remotely
computer-aided manufacturing (CAM)
used by manufacturers to help produce and ship items
professional online presence
first thing a recruiter or interviewer will see ex: linkedin
input
accepting data (and process?)
output
produce information
Electronic components in computers
process data using instructions, which
are the steps that tell the computer how to perform a particular task
software, program, app
set of coded instructions that tell a computer or device what tasks to perform
convergence
increasing integration of technological capabilities into a growing number of previously unrelated devices
laptop
thin, lightweight mobile computer with a screen on its lid and a keyboard on its base (notebook)
tablet
thin, lightweight mobile device that has a touch screen and is often associated with eBook readers
eBook reader, or e-reader
a mobile device that is used primarily for reading digital media
desktop or desktop computer
personal computer designed to be in a stationary location where all its components fit
on or under a desk or table
all-in-one
type of desktop; does not contain a
tower and instead uses the same case to house the display and the processing circuitry
mobile device
a portable or handheld computing device
smartphone
an Internet-capable phone that usually also
includes a calendar, an address book, and games, in addition to apps
earbuds
small speakers that rest inside each ear canal, to listen to phone calls or media without disturbing those around them
digital camera
a camera that creates a digital image of an
object, person, or scene
digital media player
an application that lets you play audio
and video files; most tablets and smartphones include media players
streaming
a way of receiving audio and video content on your device as it is being downloaded from the web
wearable device or wearable
a small, mobile computing consumer device designed to be worn
activity tracker
a device that monitors heart rate, measures
pulse, counts steps, and tracks sleep patterns
smartwatch
communicate with a smartphone to make and answer phone calls, read and send messages, access the web, play music, work with apps, such as activity trackers and GPS, and more
game console
a hardware device that allows you to play video games, either single player or multiplayer
handheld game
small enough to fit in one hand, making it more portable than a game console.
netiquette
internet etiquette
digital ethics
the set of legal and moral guidelines that govern the use of technology, including computers, mobile devices, information systems, and databases
cyberbullying
a form of bullying that involves digital devices
and platforms such as social media sites, online forums, messaging apps, and email
Distracted driving
driving a vehicle while focusing on other activities, typically involving an electronic device such as a cell phone.
AUP
guidelines and rules that define the appropriate and acceptable behavior for using a network, system, or digital resource. These policies are commonly implemented by organizations, educational institutions, and service providers to ensure that users understand the limits and expectations of their use of technology and resources, including network storage and email servers
plagarize
copying or using someone else’s work and claiming it as your own
green computing
reducing electricity consumed and environmental waste generated when using computers, mobile devices, and related technologies