Term
|
Definition
CPU's actually do improve over time. |
|
|
Term
|
Definition
fastt transer port that makes it is easy to add an external hard drive for more storage space |
|
|
Term
|
Definition
add a solid state drive, eSATA, and FireWire ports, and other capabilities to your system. |
|
|
Term
|
Definition
process used to determine if a a computer system has the right hardware. To do this, you look at your computer's subsystems, see what they do, and check how they perform. |
|
|
Term
|
Definition
complete processing section from a CPU embedded into one physical chip. |
|
|
Term
|
Definition
How quickly the process can work. |
|
|
Term
|
Definition
provides quicker processing of information by enabling a new set of instructions to start executing before the previous set has finished. |
|
|
Term
|
Definition
a form of random access memory that is more accessible to the CPU than regular RAM. |
|
|
Term
|
Definition
connects the processsor (CPU) in your computer to the system memory. |
|
|
Term
|
Definition
measurement used to compare CPU performance between processors. |
|
|
Term
|
Definition
the percentage of time that your CPU is working. |
|
|
Term
Random access memory (RAM) |
|
Definition
your computer's temporary storage space. |
|
|
Term
|
Definition
information storage that is only available when the computer is turned on; it is lost when the computer is off. |
|
|
Term
|
Definition
permanent storage of instructions and data when the computer is powered off. |
|
|
Term
Memory Modules (Memory cards) |
|
Definition
small circuit boards that hold a series of RAM chips and fit into special slots on the motherboard. |
|
|
Term
|
Definition
the amount of RAM that is actually sitting on memory modules in your computer. |
|
|
Term
|
Definition
the memory that your operating system uses. |
|
|
Term
|
Definition
Has the largest storage capacity of any storage device with storage capacities exceeding 2 terabytes. |
|
|
Term
|
Definition
the time it takes a storage devide to locate its stored data and make it available for processing; hard drive has the fastest access time. |
|
|
Term
|
Definition
uses the same kind of memory that flash drives use, but whereas flash drives have access times of about 1 ms, SSD drives can reach data in only a tenth of that time. |
|
|
Term
|
Definition
the thin plates of metal stacked on a spindle; when data is saved to a hard drive platter, a pattern of magnetized spots is created on the iron oxide coating of each platter. |
|
|
Term
Serial Advanced Technology Attachment (Serial ATA) |
|
Definition
hard drives that use much thinner cables, and can transfer data more quickly than IDE drives. |
|
|
Term
|
Definition
type of optical drive inclusding CD's and DVD's. Saved on established tracks and sectors, just like on a hard drive. |
|
|
Term
|
Definition
read-only optical discs, meaning you can't save any data onto them. |
|
|
Term
|
Definition
third format of DVD that you can record, erase, and rewrite on. |
|
|
Term
|
Definition
moves from the outer edge of the spinning platter to the center, as frequently as 50 times per second, to retrieve(read) and record(write) the magnetic data to and from the hard drive platter. |
|
|
Term
|
Definition
the time it takes for the read/write heads to move over the surface of the disk, moving to the correct track. Access time is mostly the sum of two factors: seek time and latency. |
|
|
Term
|
Definition
waiting time for the correct sector to spit to the read/write head after the read/write head loactes the correct tract. |
|
|
Term
|
Definition
a stoppage of the hard drive that often results in data loss. |
|
|
Term
Video Card (video adapter) |
|
Definition
an expansion card that is installed inside your systen unit to translate binary data into the images you view on your monitor. |
|
|
Term
|
Definition
|
|
Term
Graphics Processing Unit (GPU) |
|
Definition
performs the same kind of computational work that a CPU performs except a GPU is specialized to handle 3-D graphics and image and video processing with incredible efficiency and speed. |
|
|
Term
|
Definition
defines the color quality of the image displayed. |
|
|
Term
|
Definition
an expansion card that attaches to the motherboard inside your system unit. |
|
|
Term
|
Definition
advances sound reproduction beyond traditional stereo sound(where the human ear perceives sounds as coming from the left or the right of the performance area) and is better at convincing the humar ear that sound is omnidirectional, meaning you can't tell from which direction the sound is coming. |
|
|
Term
|
Definition
a tyupe of audio processing that makes the listener experience sound as if it were coming from all directions. |
|
|
Term
|
Definition
simply two or more computers that are conected via software and hardware so that they can communicate with each other. |
|
|
Term
|
Definition
each device connected to a network; can be a computer, peripheral (printer), or a game console, a digital video record, or a communications device. |
|
|
Term
|
Definition
involves tasks such as: 1) installing new computers and devices, 2) monitoring the network to ensure it is performing efficiently, 3) updating and installing new software on the network, 4) configurings, or setting up proper security for a network. |
|
|
Term
|
Definition
contains two different types of networks: clients and servers. |
|
|
Term
|
Definition
a computer on which users accomplish specific tasks (such as construct spreadsheets) and make specific requests (such as printing a file). |
|
|
Term
|
Definition
the computer that provides information or resources to the client computers on the network. |
|
|
Term
|
Definition
designed to store media, share media across the network, and back up files on computers connected to the network. |
|
|
Term
|
Definition
a network in which the nodes are located within a small geographic area. |
|
|
Term
|
Definition
a network located in a home. |
|
|
Term
|
Definition
made up of LANs connected over long distances. |
|
|
Term
Metropolitan Area Network (MAN) |
|
Definition
when a network is designed to provide access to a specific geographic area, such an an entire city. |
|
|
Term
|
Definition
establishes a communications channel between the nodes on a network and can either be wireless or wired. |
|
|
Term
|
Definition
Made up of copper wires that are twisted around each other and surrounded by a plastic jacket. |
|
|
Term
|
Definition
consists of a single copper wire surrounded by layers of plastic. |
|
|
Term
|
Definition
made up of plastic or glass fibers that transmit data at extremely fast speeds. |
|
|
Term
Data Transfer Rate (bandwidth) |
|
Definition
the maximum speed at which data can be transmitted between two nodes on a network. |
|
|
Term
|
Definition
the actual speed of data transfer that is achieved. |
|
|
Term
|
Definition
devices connected to or installed in network nodes that enable the nodes to communicate with each other and to access the network. |
|
|
Term
Network Interface Card (NIC) |
|
Definition
network adapter inside the device; desktop and notebook computers and some peripherals |
|
|
Term
Network Navigation Devices |
|
Definition
facilitate and control the flow of data through a network. |
|
|
Term
|
Definition
data sent over transmission in bundles; a packet is the bundle |
|
|
Term
|
Definition
transfers packets of data between two or more networks. |
|
|
Term
|
Definition
a "traffic cop" on the network; Switches recieve data packets and send them to their intended nodes on the same network. |
|
|
Term
Network Operating System (NOS) |
|
Definition
software that handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes. |
|
|
Term
|
Definition
so named becuase it uses the Ethernet protocol as the means by which the nodes on the network communicate. |
|
|
Term
|
Definition
current standard that governs wireless networking for Ethernet networks. |
|
|
Term
|
Definition
what the 802.11 standard is also known as. |
|
|
Term
|
Definition
a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes. |
|
|
Term
Multiple Input Multiple Output (MIMO) |
|
Definition
devices that use this technology are designed to use multiple antennas for transmitting and receiving data. |
|
|
Term
Unshielded twisted-pair (UTP) cable |
|
Definition
most popular transmission media option for wired Ethernet networks. |
|
|
Term
|
Definition
designed to achieve data transfer rates that support a gigabit Ethernet network; it is probably the best choice for home networking cable. |
|
|
Term
Network-Ready Device (Internet Ready) |
|
Definition
can be connected directly to a router instead of to a computer on the network. |
|
|
Term
Network Attached Storage (NAS) devices |
|
Definition
specialized computing devices designed to store and manage your data. |
|
|
Term
|
Definition
main function is that it has easy access to the Internet, social networking sites, e-mail, video, news, and entertainment. An example is the iPad. |
|
|
Term
|
Definition
a hardware or software solution that helps shield your network from prying eyes. |
|
|
Term
|
Definition
someone who breaks into a computer systems to create mischief or steal valuable information. |
|
|
Term
|
Definition
connecting to a wireless network(other than your own) without the permissio of the owner. |
|
|
Term
Service Set Identifier (SSID) |
|
Definition
wireless network name to identify it. |
|
|
Term
Media Access Control (MAC) |
|
Definition
serial number assigned to a network by the manufacturer; number printed on the network adapter. |
|
|
Term
|
Definition
the read-only memory that has software written on it on your router. |
|
|
Term
|
Definition
a device that amplifies your wireless signal to get it out to parts of your home thatare experiencing poor connectivity. |
|
|
Term
Analog waves (continuous waves) |
|
Definition
the light waves that we percieve as images. |
|
|
Term
|
Definition
the use of equipment to provide voice communications over a distance; recently shifted from an analog science to a digital one. |
|
|
Term
|
Definition
has evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device. |
|
|
Term
|
Definition
cell phones that offer Internet access, text messaging, personal information management features, voice recording, GPS services, and digital image and video capture. |
|
|
Term
Analog-to-digital converter chip |
|
Definition
converts your voice's sound waves into digital signals. |
|
|
Term
|
Definition
included in the cell phone to handle the compression work. |
|
|
Term
|
Definition
a large communications tower with antennas, amplifiers, recievers, and transmitters. |
|
|
Term
|
Definition
process of updating your data so that the files on your cell phones and computer are the same. |
|
|
Term
Short Message Service (SMS) |
|
Definition
text messaging; a technology that allows you to send short text messages over mobile networks. |
|
|
Term
Multimedia Message Service (MMS) |
|
Definition
allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses. |
|
|
Term
Wireless Internet Service Provider (Wireless ISP) |
|
Definition
internet provider required to connect your smartphone to the internet. |
|
|
Term
|
Definition
software that provides a web browser that is optimized to display Web content effectively on the small screen. |
|
|
Term
Wireless Markup Language (WML) |
|
Definition
specially designed text for wireless devices. |
|
|
Term
Voice over Internet Protocol (VoIP) |
|
Definition
a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls. |
|
|
Term
|
Definition
specifies the number of times the analog wave is measured each second. |
|
|
Term
Portable media players (PMPs) |
|
Definition
small portable devices (such as an iPod) that enable you to carry your MP3 files around with you. |
|
|
Term
|
Definition
a type of nonvolatile memory |
|
|
Term
Peer-to Peer (P2P) sharing |
|
Definition
process of users transferring files between computers. |
|
|
Term
|
Definition
global positioning system devices that have dropped drammatically in price and size. |
|
|
Term
|
Definition
a term for various licensing plans that enables copyright holders to grant certain rights to the work while retaining other rights. |
|
|
Term
|
Definition
based on the original work(one of your photos) but is modified in some way. |
|
|
Term
|
Definition
runs a fully operating system but weighs in at 2 pounds or less. |
|
|
Term
|
Definition
another type of very light, very portable device. |
|
|
Term
|
Definition
belief that "computing will be woven into the fabric of everyday life until it is indistinguishable from it." |
|
|
Term
|
Definition
criminal action perpetrated primarily through the use of a computer. |
|
|
Term
|
Definition
individuals who use computers, networks, and the Internet to perpetrate crime. |
|
|
Term
|
Definition
a virus that is triggered when certain logical conditions are met-such as opening a file or starting a program a certain number of times. |
|
|
Term
|
Definition
a virus that is triggered when certain logical conditions are met-such as opening a file or starting a program a certain number of times. |
|
|
Term
|
Definition
slightly different from a virus in that a worm attempts to travel between systems through network connections to spread an infection. |
|
|
Term
|
Definition
software specifically designed to detect viruses and protect your computer and files from hard, is a good start. |
|
|
Term
|
Definition
a series of commands that is executed without your knowledge. |
|
|
Term
|
Definition
virus that attaches itself to a document (such as a Word or Excel file) that uses macros. |
|
|
Term
|
Definition
uses the address book in the victim's e-mail system to distribute the virus. |
|
|
Term
|
Definition
infect your computer, they run a program that searches for common types of data files and compresses them using a complex encryption key that rends your files unusable. |
|
|
Term
|
Definition
changes its own code (or periodically rewrites itself) to avoid detection. |
|
|
Term
|
Definition
designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. |
|
|
Term
|
Definition
temporarily erase their code from the files where they reside and then hide in the active memory of the computer. |
|
|
Term
|
Definition
portion of the virus code that is unique to a particular computer virus. |
|
|
Term
|
Definition
if a software detects a virus they stop the execution of the file and virus and notifies you that it has detected a virus. |
|
|
Term
|
Definition
the antivirus software records key attributes about files on your computer and keeps these statistics in a safe place on your hard drive. |
|
|
Term
|
Definition
attack your computer by downloading harmful software onto your computer; common and affects almost 1 in 1,000 Web pages. |
|
|
Term
|
Definition
a hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). |
|
|
Term
|
Definition
hackers who use their knowledge to destroy information or for illegal gain. |
|
|
Term
|
Definition
amateur hackers; they don't create the programs they use to hack into computer systems, instead they use tools created by skilled hackers that enable unskilled novices to wreak the sam havoc as professional hackers. |
|
|
Term
|
Definition
small pieces that travel through the internet |
|
|
Term
|
Definition
computer program deployed by hackers that looks at each packet as it travels on the internet-not just those that are addressed to a particular computer, but all packets. |
|
|
Term
|
Definition
characterized by someone using personal information about you to assume your identity for the purpose of defrauding others. |
|
|
Term
|
Definition
program that appears to be something useful or desirable(like a game or a screen saver), but while it runs does something malicious in the background without your knowledge. |
|
|
Term
|
Definition
allows hackers to take almost complete control of your computer without your knowledge. |
|
|
Term
|
Definition
a computer that a hacker controls through a backdoor program. |
|
|
Term
Denial-of-services (DoS) attack |
|
Definition
legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. |
|
|
Term
Distributed Denial-of-service (DDoS) attack |
|
Definition
launces DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time. |
|
|
Term
|
Definition
large group of software programs that runs autonomously on zombie computers. |
|
|
Term
|
Definition
virtual communications gateways or paths that allow a computer to organize requests for information from other networks or computers. |
|
|
Term
|
Definition
program or hardware device designed to protect computers from hackers. |
|
|
Term
|
Definition
firewall specifically designed for hom networks. |
|
|
Term
|
Definition
firewalls can be configured so that they filter out packets sent to specific logical ports. |
|
|
Term
Internet Protocol Address (IP address) |
|
Definition
every computer connected to the Internet has a unique address |
|
|
Term
|
Definition
unwanted piggyback program that usually downloads with other software you want to install from the Internet. |
|
|
Term
|
Definition
monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information. |
|
|
Term
Cyberloafing or Cyberslacking |
|
Definition
doing anything with a computer, while you are being paid to do your job, that is not an approved function of your job. |
|
|
Term
|
Definition
an option you can select in your e-mail account that places known suspected spam messages into a folder other than your inbox. |
|
|
Term
|
Definition
small text files that some Web sites automatically store on your computer's hard drive when you visit them. |
|
|
Term
|
Definition
copies of files that you acn use to replace the originals if they are lost or damaged. |
|
|
Term
|
Definition
used to install software and usually comes on CDs or DVDs or is downloaded from the Web. |
|
|
Term
|
Definition
file you have created or purchased. |
|
|
Term
incremental backup (partial backup) |
|
Definition
involved backing up only files that have changed or been created since the last backup was performed. |
|
|
Term
Image Backup (system backup) |
|
Definition
means that all system, application, and data files are backed up, not just the files that changed. |
|
|
Term
|
Definition
any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
|
|
Term
|
Definition
involves creating a scenario that sounds ligitimate enough that someone will trust you. |
|
|
Term
|
Definition
lures Internet users to reveal personal information such as credit card number, Social Security numbers, or other sensitive information that could lead to identity theft. |
|
|
Term
|
Definition
when malicious code is planted on your computer that alters your browser's ability to find Web addresses. |
|
|
Term
|
Definition
an attempt to make someone believe something that is untrue. |
|
|
Term
|
Definition
hoaxes that become so well known that they are accepted by society as true events even though they are false. |
|
|
Term
|
Definition
device that protects your copmuter against power surges. |
|
|
Term
Whole-house surge protector |
|
Definition
function like other surge protectors, but they protect all electrical devices in the house. |
|
|
Term
Uniterruptible Power Supply (UPS) |
|
Definition
device that contains surge protection equipment and a large battery. |
|
|
Term
|
Definition
optional data self-destruct modes that destroy data on both internal memory and external data cards if repeated attempts are made to crack passwords. |
|
|