Term
The temporary memory area used by the CPU |
|
Definition
|
|
Term
Where the cache memory resides |
|
Definition
|
|
Term
Your computer's performance is largely determined by these 3 items |
|
Definition
Processor, amount of memory, available cache |
|
|
Term
3 components of the microprocessor that affects your computers speed |
|
Definition
Clock speed, cache size, core count |
|
|
Term
Group that lets you use their technology (servers and software)to connect to the Internet for a fee |
|
Definition
Internet Service Provider |
|
|
Term
In the URL, the top level domain is this component |
|
Definition
|
|
Term
In the TCP/IP protocol, data are broken into small pieces, transmitted, and then reassembled in this process |
|
Definition
|
|
Term
A collection of data that has been organized so that the data can be easily stored, sorted, extracted, and reported |
|
Definition
|
|
Term
A computer network consists of two or more computing or other devices connected by one of these |
|
Definition
|
|
Term
UNIX is a(n) known as this type of operating system |
|
Definition
|
|
Term
This part of your system software that is useful but not essential |
|
Definition
|
|
Term
A file stored on your computer by a web server to track information about you and your activities |
|
Definition
|
|
Term
You must install these in order to experience some multimedia components of a web page |
|
Definition
|
|
Term
Provides the instructions the OS needs to communicate with the devices connected to the computer |
|
Definition
|
|
Term
3 components typically included in a desktop computer setup |
|
Definition
|
|
Term
The name of the primary circuit board in your computer |
|
Definition
|
|
Term
Type of memory that is permanent and nonvolatile and is hardwired into a microprocessor chip |
|
Definition
|
|
Term
In addition to updating your antivirus software, you should keep your computer secure by regularly updating these |
|
Definition
OS, bank account number, passwords |
|
|
Term
Cyber attacks are perpetrated by these 3 groups |
|
Definition
Hackers, corporate spies, organized crime |
|
|
Term
Peripherals such as a scanner are considered this type of device |
|
Definition
|
|
Term
Each device connected to a network is called a |
|
Definition
|
|
Term
This type of software allows you to create, edit, or manipulate images |
|
Definition
|
|
Term
Purpose of software suite |
|
Definition
Bundles several different software together |
|
|
Term
How a worm different from a virus |
|
Definition
It does not require the user to do anything |
|
|
Term
Problems or malfunctions in a software program are referred to as |
|
Definition
|
|
Term
Another name for web-based software |
|
Definition
|
|
Term
Firewalls are created by using Software, hardware, or |
|
Definition
a combination of software and hardware |
|
|
Term
The “bus” in a bus topology is |
|
Definition
The cable that connects all the nodes on the computer network |
|
|
Term
Name of CPUs that are made up of integrated electronic circuits |
|
Definition
|
|
Term
Binary digits (bits) are assembled into 8-bit collections called |
|
Definition
|
|
Term
The text-based address for a web page is referred to as |
|
Definition
|
|
Term
|
Definition
|
|
Term
This device provides backup power in the case of an electrical outage |
|
Definition
|
|
Term
Name for starting your computer when the power is turned off |
|
Definition
|
|
Term
When a signal is modulated, it is transformed from |
|
Definition
|
|
Term
Operating system packages typically offer these two security features |
|
Definition
Firewall and password protection |
|
|
Term
Web pages are typically created using some variation of this language |
|
Definition
|
|
Term
During the computer's boot-up sequence, this checks devices such as the memory, monitor, keyboard, and disc drives |
|
Definition
|
|
Term
The name for the type of software that helps you create (among other things) documents, charts, and presentations? |
|
Definition
|
|
Term
Refers to the number of bits per second that can be transmitted over a communications medium |
|
Definition
|
|
Term
Type of application software designed to help you manage large quantities of data |
|
Definition
|
|
Term
External hard drives connect to a computer via these type of cables |
|
Definition
|
|
Term
Process that includes 1- power sent to motherboard, 2- processor looks for ROM chip with BIOS, 3- BIOS checks connectivity, 4-BIOS searche for OS files, 5-OS loads system files, 6-OS displays on monitor |
|
Definition
|
|
Term
When the operating system instructs the computer to ____, this action puts the computer into a lower power mode without losing unsaved work |
|
Definition
|
|
Term
Allows you to organize and control your computer hardware and software by translating your commands and performing appropriate actions |
|
Definition
|
|
Term
A device containing a high-quality antenna that allows devices to transmit data to each other or to exchange data with a wired network |
|
Definition
|
|
Term
The first step in the software development life cycle |
|
Definition
Performing market research to determine whether there is a need or demand for the product |
|
|
Term
Organize photos, producing business documents, performing computer maintenance and other tasks are example of |
|
Definition
|
|
Term
The programming code used to build a piece of software |
|
Definition
|
|
Term
The subsystem responsible for moving data and instructions between components (for example, between RAM and the processor) is known as the |
|
Definition
|
|
Term
The concept of Web ____ is associated with user involvement and collaboration |
|
Definition
|
|
Term
Wireless networking standard based on the 802.11 standard. |
|
Definition
|
|
Term
The content on social sites is almost entirely driven by |
|
Definition
|
|
Term
Software products that are shared at no cost are called |
|
Definition
|
|
Term
Type of network covers the largest geographic area |
|
Definition
|
|
Term
Device that allows you to connect two or more networks in either a wired or wireless connection |
|
Definition
|
|
Term
A website that allows you to share contacts and build a collection of “friends” is referred to as |
|
Definition
|
|