Term
|
Definition
A sound card better at convincing the human ear that the sound is omnidirectional. Produces a fuller, richer sound than stereo sound. Not to be confused with surround sound. |
|
|
Term
|
Definition
A new technology that produces a 3D model by adding plastic layer by layer. Can use plastics with different colour, transparency, and flexibility. |
|
|
Term
|
Definition
A form of mobile broadband. Fourth generation "WiFi everywhere". Provides internet access to mobile devices the same way voice service is provided to cell phones. The latest service standard, offering the fastest data access speeds. You need to have a plan with a mobile data provider such as Verizon or AT&T. |
|
|
Term
|
Definition
An Ethernet protocol. Provides the maximum data transfer rate of 10 Gbps. Primarily used in businesses with large data throughput needs. |
|
|
Term
|
Definition
99-bottles-of-beer.net
A website that displays the lyrics to the song "99 Bottles of Beer on the Wall". |
|
|
Term
|
Definition
The time it takes a storage device to locate stored data and make it available for processing. On a hard drive it is faster than with an optical drive. A sum of two factors: seek time and latency. |
|
|
Term
Active Server Pages (ASP) |
|
Definition
Used to build websites with interactive capabilities. Adapts HTMP pages to a user's selections. The user supplies information that is translated into a request to the server. Scripting code controls automatic writign of the custom HTML page that is returned to the user's computer. |
|
|
Term
|
Definition
adafruit.com
A developer and supplier website that follows open source hardware. |
|
|
Term
|
Definition
.flv
A file format for digital video. From Adobe Flash. May be embedded in Shockwave files. |
|
|
Term
Adobe Photoshop Elements 12 |
|
Definition
A program. Recommended to have 2 GB of RAM. Uses 4 GB of hard drive space. |
|
|
Term
|
Definition
Uses 10 GB of hard drive space. |
|
|
Term
|
Definition
adrive.com
A free storage option for online backups. Image backups probably won't fit the storage limits for free. |
|
|
Term
|
Definition
A type of cybercrime. Convincing victims to send money on "good faith" to enable them to receive larger payments in return. |
|
|
Term
|
Definition
Software that displays sponsored advertisments in a section of your browser window, or as a pop-up box. Considered a legitimate means of generating revenue for developers. Occurrence of adware is reduced lately due to built-in pop-up blockers in many browsers. |
|
|
Term
|
Definition
Helps solve the problem of strange behaviour of browsers and other programs, and slowing of the system. |
|
|
Term
|
Definition
Sequential steps that describe exactly what the computer program must do to complete the task. It is written in ordinary language before it is translated into programming code. |
|
|
Term
|
Definition
A website that may store your credit card number and address information. |
|
|
Term
American Standard Code for Information Interchange (ASCII) |
|
Definition
Pronounced "AS-kay"
Created by ANSI. A standard code to represent each letter or character as an 8-bit binary code. There are 256 different codes for unique characters; this is enough to represent English and many other characters. |
|
|
Term
|
Definition
A type of speaker. Uses external power. Generally produces better sound and quality. |
|
|
Term
|
Definition
Sound and light waves that are continuous. Illustrate loudness of a sound or brightness of colours in an image at any given moment of time. |
|
|
Term
Analog-to-digital converter chip |
|
Definition
Converts sounds into digital information as you speak into a cellphone. |
|
|
Term
|
Definition
An operating system used in smartphones. Used by HTC and Samsung. |
|
|
Term
|
Definition
developer.android.com
Have information on the latest version of the Android SDK, as well as tutorials, guides, and other resources. |
|
|
Term
Anita Borg Institute for Women and Technology |
|
Definition
anitaborg.org
A resource for women in IT. An organization whose aim is to increase the impact of women on all aspects of technology. |
|
|
Term
|
Definition
A website where you can request a free credit repoar from a credit agency, to review reports for suspicious activity. |
|
|
Term
|
Definition
Designed to detect viruses and protect the computer and files from harm. Helps solve the problem of strange behaviour of broswers and other programs, and slowing of the system. May also include internet security packages, helping to protect from threats other than computer viruses. Detects virus signatures, stops virus execution by quarantining it, and prevents future infection by inoculation. Offered by companies including Sympantec, Kaspersky, AVG, and McAfee. |
|
|
Term
|
Definition
Stores and distributes application software for each system on a network. Upgrades of new software installs are made once on this server rather than deploying programs throughout the whole network. |
|
|
Term
|
Definition
A programming language that needs to be compiled only once, after which it can run on many CPUs. Java is architecture neutral. |
|
|
Term
Arduino microcontroller project |
|
Definition
A project fueling an abundance of DIY electronics projects. A small printed circuit board based on a microcontroller. The LilyPad variation is used to create wearable products, such as a turning-signal biking jacket. |
|
|
Term
Arithmetic logic unit (ALU) |
|
Definition
A component of the CPU. Performs arithmetic calculations, and makes logic decisions and comparison of values. Performs operations flawlessly with incredible speed. It is fed data from the CPU's registers. |
|
|
Term
|
Definition
A language easier for humans to work with than binary language. The instruction set is written in this language. |
|
|
Term
Association for Computing Machinery (ACM) |
|
Definition
acm.org
A professional organization. The oldest scientific computing society, maintaining a strong focus on programing and systems development. Encourages educators to teach a core set of mathematical and programming skills and concepts. |
|
|
Term
Association for Information Systems (AIS) |
|
Definition
aisnet.org
An organization for professionals working in academia and specialize in information systems. |
|
|
Term
Association for Information Technology Professionals (AITP) |
|
Definition
aitp.org
A professional organization. Heavy focus on IT education and development of seminars and learning materials. |
|
|
Term
Association for Women in Computing (AWC) |
|
Definition
awc-hq.org
A resource for women in IT. A not-for-profit organization dedicated to promoting the advancement of women in computing professions. |
|
|
Term
Asynchronous JavaScript and XML (AJAX) |
|
Definition
A web technology. The collection of technologies including JavaScript, CSS, and XML, that allow web applications to update information on a page without requiring the user to refresh the page. Can produce elaborate animations; produces a more responsive experience. |
|
|
Term
|
Definition
Connect MIDI instruments, high-quality microphones, and recording equipment to the computer. An electronics standard that allows different types of electronic instruments to communicate with each other and with computers. Connects to the computer through a USB port, and adds jacks for connecting instruments and microphones. |
|
|
Term
|
Definition
Keeps track of who is logging onto the network, and which services on the network are available to each user. Acts as overseers for the network. Manages and coordinates the services provided by any other dedicated servers located on the server. |
|
|
Term
|
Definition
A program or set of programs that allows hackers to gain access to your computer and take almost complete control of it without your knowledge, making the computer a zombie. Gives hackers access to all files on teh computer; they can delete files, send emails, run programs, and do anything else they want on the computer. |
|
|
Term
|
Definition
A copy of a file that you use to replace originals if they are lost or damaged. |
|
|
Term
|
Definition
The ability of current devices to use earlier standards, in addition to current standards. |
|
|
Term
|
Definition
Decimal notation
A number system used to represent the numeric values used each day. Uses 10 digits, 0 - 9, to represent any value. |
|
|
Term
|
Definition
The original class in inheritance of object-oriented analysis. |
|
|
Term
|
Definition
A large communications tower with antennas, amplifiers, receivers, and transmitters. Recieves requests from cell phones in its geographic area, and passes requests to the mobile switching centre. The cell phone company builds these stations to create overlapping "cells", so that there is cellphone coverage everywhere. |
|
|
Term
|
Definition
A free or reduced cost version of software. Released to test sites or interested users before the final commercial release. Programmers can collect information on remaining errors in code. |
|
|
Term
|
Definition
A type of decision point. Can be answered with a yes (true), or no (false). |
|
|
Term
|
Definition
Base-2 number system
The number system used by computers. Two digits: 0 and 1. Used to represent every piece of data stored in a computer. |
|
|
Term
|
Definition
Consists of 0s and 1s. Everything a computer does is broken down into binary language. |
|
|
Term
Biometric authentication device |
|
Definition
A device that reads a unique personal characteristic, such as a fingerprint or an iris pattern in the eye. Your pattern is read and compared to the one stored in the computer. Only users with the exact same pattern are allowed to access the computer. May read vein patterns inside the finger, which are unique, and an improvement to fingerprint scanning, which could leave residues on the scanner, and can be duplicated. |
|
|
Term
|
Definition
Binary digit
A 0 or a 1. The smallest piece of data that computers can understand. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A type of hacker. Breaks into systems to destroy information, or for illegal gain. |
|
|
Term
|
Definition
An operating system used in smartphones. Manufactured by BlackBerry. |
|
|
Term
|
Definition
Uses radio waves to transmit data signals over distances up to 300 feet. |
|
|
Term
|
Definition
boingo.com
A service where you can pay for a single session or monthly membership to over 1 million WiFi hotspots worldwide, including airports, hotels, and restaurants. |
|
|
Term
|
Definition
A type of virus. Replicates itself onto a hard drive's master boot record. Often transmitted by a flash drive left in the USB port, when the computer boots up with the USB port connected. |
|
|
Term
|
Definition
A large group of software programs that run autonomously on zombie comptuers. Coordinates DDoS attacks. Some have been known to spam millions of computers. |
|
|
Term
Brian Kernighan and Dennis Ritchie |
|
Definition
From AT&T Bell Laboratories. Created C in 1978. |
|
|
Term
|
Definition
High-speed internet. A type of connection that offers a means to connect to the internet with faster throughput. Has transmission rates from 1 to 500 Mbps. Includes cable, DSL, fibre-optic service, satellite broadband, mobile broadband, and Wireless Internet. |
|
|
Term
|
Definition
A website that tests the speed of your internet connection. You can see how your results compare with others, as well as determine whether you're getting the results promised by your ISP. |
|
|
Term
|
Definition
Network topoloty that uses a single cable, or "bus" to handle transmission of signals between computers. Most often used in P2P networks. Each computer can communicate with every other computer directly. All computers and peripheral devices see all packets on the network, but only process packets with their address. Data collisions occur easily if two computers transmit data at the same time. An access method establishes control of which computer is allowed to use the transmission media at a certain time. Computers "listen" to network data traffic, and transmit data when no other computer is transmitting data. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A programming language. Created by Brian Kernighan and Dennis Ritchie. Originally developed for system programmers. A high-level and low-level general-purpose language. Allows programmers to manipulate the system memory and CPU registers directly. Most modern operating systems, Windows, OS X, and Linux, are written in C. Can create compact code that executes quickly. Used in industrial applications, such as banking and engineering. An imperative computer programming language. |
|
|
Term
|
Definition
Pronounced "see sharp"
A programming language. A language that competes with Java. |
|
|
Term
|
Definition
A programming language. Created by Bjarne Stroustrup. Takes C to an object-oriented level. Uses all the same symbols and keywords as C, but has additional keywords, better security, and more support for reuse of existing code through object-oriented design. |
|
|
Term
|
Definition
A form of broadband. Transmission media is coaxial cable. Cable connections are shared, so speed can drop during high-usage periods. Average speed is 10 Mbps, with maximum of 30 Mbp. Cable TV and cable internet are separate services. Cable TV is a one-way service; the cable company feeds programming signals into your television. To bring two-cable interent connections to homes, cable companies had to upgrade their networks. |
|
|
Term
|
Definition
"Hide"
A form of RAM that gets to the CPU for processing faster than bringing it from the RAM. Consists of small blocks of memory located on and next to the CPU chip. Holding places for recently or frequently used instructions or data that the CPU needs the most. Three levels. |
|
|
Term
|
Definition
Completely Automated Public Turing test to tel Computers and Humans Apart
google.com/recaptcha
Distorted text, which comptuers are unable to read. Prevents bots from posting spam or committing cybercrime. Google offers free CAPTCHA tools for websites. |
|
|
Term
|
Definition
carbonite.com
A company that provides large online storage capacity for backups. Not free. |
|
|
Term
|
Definition
careerbuilder.com
A resource for IT employment. |
|
|
Term
|
Definition
A type of UTP cable. The cheapest type of UTP, sufficient for many home networking tasks. Designed for 100 Mbps-wired Ethernet networks, popular before gigabit Ethernet arose. Do not install this if there are other options. |
|
|
Term
|
Definition
A type of UTP cable. Designed to achieve data transfer rates that support gigabit Ethernet networks. Probably the best choice for home networking cable, but more expensive and difficult to work with than cat 5E cable. |
|
|
Term
|
Definition
A type of UTP cable. Designed for ultrafast Ethernet networks at speeds up to 10 Gbps. Installing a 10 gigabit Ethernet network in a home is unnecessary for home applications, even gaming and streaming media. |
|
|
Term
|
Definition
A type of computer user. Uses the computer primarily for internet access, and some software applications locally, such as Microsoft Office. Uses videos and software but does not create them. Don't need a fast clock speed or cache memory, and fewer cores are acceptable. |
|
|
Term
|
Definition
Cellphone
A phone that uses mobile, cellular technology. Many cellphones are also smart phones. |
|
|
Term
Center for Women in Technology (CWIT) |
|
Definition
cwit.umbc.edu
A resource for women in IT. An organization dedicated to providing global leadership in achieving women's full participation in all aspects of IT. |
|
|
Term
|
Definition
A form of network administration. Tasks performed on one computer can affect the other computers on the network. Includes client/server networks. |
|
|
Term
Central processing unit (CPU) |
|
Definition
Attached to the motherboard. Ensures that all computer instructions, calcualtions, and flow of information work seamlessly. Responsible for processing data input information. Quality is measured by clock speed, and number of cores. Incldues the control unit and ALU. |
|
|
Term
|
Definition
challengepost.com
A website where you can find coding events, and join in competitions. |
|
|
Term
|
Definition
chillifire.net
A WiFi sharing service that provides hardware and software to let you configure your WiFi hotspot so that your network remains secure. |
|
|
Term
|
Definition
Categories of inputs in object-oriented analysis. Identified by information within the class and actions associated with the class. |
|
|
Term
|
Definition
A type of central administration network. The client is a computer on which users accomlish tasks and make requests, and the server provides information or resources to the client as well as central administration for network function, such as printing. Can respond to a large number of clients simultaneously. Most networks with 10 or more nodes are client/server networks. Have specialized NOS software installed. Data flows more efficiently than in a P2P network. Configured to perform specific tasks, such as database requests. Scalable: additional users can be added easily without affecting the performance of other nodes. Includes the internet; when your computer is connected to the internet, it is acting as a client computer, and your ISP maintains the server computer. |
|
|
Term
|
Definition
Steady beats, or "ticks" of the system clock. Sets the pace by which the computer moves from process to process. |
|
|
Term
|
Definition
The pace of the system clock. Dictates how many instructions the CPU can process in a second. Measured in gigahertz (GHz), billions of steps per second. Current CPUs have clock speeds between 2.1 and 4.0 GHz. |
|
|
Term
|
Definition
A type of cable used in wired networks. A single copper wire surrounded by layers of plastic. The cable runnign from a cable TV is likely coaxial cable. |
|
|
Term
|
Definition
A programmer physiclaly types the code into the computer. |
|
|
Term
|
Definition
codeforamerica.org
Hackers working to develop solutions to local and global needs. |
|
|
Term
|
Definition
Compression/decompression
A rule, implemented in either software or hardware, that compresses audio and video information into less space. |
|
|
Term
|
Definition
Translating an algorithm into a programming language. |
|
|
Term
|
Definition
Inserted into a program to explain the purpose of a section of code, to indicate when the program was written or to include other important information for other programmers to more easily understand and update the code. Written in plain English. |
|
|
Term
|
Definition
Handles all communications between the network and other networks, including managing internet connectivity. Requests for internet information and messages are sent through the internet pass through the communications server. Often it is the only device in the network connected to the internet. Providing this single point of contact makes it easier to secure a network from hackers. |
|
|
Term
|
Definition
A form of flash memory. The size of a matchbook, and can hold 64 Mb to 8 GB of data. |
|
|
Term
|
Definition
The process by which code is converted into machin language which can be understood by the CPU. |
|
|
Term
|
Definition
A program that understands the syntax of programming language and the exact structure of the CPU and its machine language. It can read the source code, and translates it into machine language, binary patterns that will execute commands on the CPU. Every programming language has a compiler. |
|
|
Term
|
Definition
Identifying, extracting, preserving, and documenting computer evidence which can be used in court cases. Performed by computer forensic scientists, who rely on specialized software to collect evidence. |
|
|
Term
Computer network architect |
|
Definition
A high growth IT job. Median pay is $91,000. Ten year growth rate is 15%. Total new jobs are 17,900. |
|
|
Term
|
Definition
A high growth IT job. Median pay is $74,280. Ten year growth rate is 8%. Total new jobs are 28,400. |
|
|
Term
Computer support specialist |
|
Definition
A high growth IT job. Median pay is $48,900. Ten year growth rate is 17%. Total new jobs are 123,000. |
|
|
Term
Computer support technician |
|
Definition
A job in support services. Go to a user's location to fix software and hardware problems. May have to chase down and repair faults in network infrastructure. |
|
|
Term
|
Definition
A high growth IT job. Median pay is $79,680. Ten year growth rate is 25%. Total new jobs are 127,000. |
|
|
Term
|
Definition
computerswithcauses.org
Organizes donations of working and nonworking computers, printers, and mice. |
|
|
Term
|
Definition
computerjobs.com
A resource fo IT employment. Can use this resource to identify programming languages in demand in your area. |
|
|
Term
|
Definition
computerwork.com
A resource for IT employment. |
|
|
Term
|
Definition
Keywords in a programming language that allow a programmer to direct the flow of the program based on a decision. |
|
|
Term
|
Definition
A component of the CPU. Coordinates activities of other computer components. Manages switches inside the CPU. Programmed by the designers to remember the sequence of the machine cycle, and how each switch in the CPU should be set for each stage. Moves each switch to the correct on or off setting, then performs the work of that stage. |
|
|
Term
|
Definition
Smal text files that some websites automatically store on your harddrive when you visit them. Assigns an ID number to your computer. Intended to make any return visits to the website more efficient and better geared toward your interests. They can remember data that you've input on online forms. Can provide companies with information on your browsing habits, products you've looked at, and the time and duration of your visits to the website. Used for marketing purposes. Information collected by cookies may be sold to advertisers, which could be considered a privacy violation. Cookies pose no security threat. |
|
|
Term
|
Definition
Various licensing plans, enabling copyright holders to grant certain rights to the work, while retaining other rights. |
|
|
Term
|
Definition
Contains parts of the CPU required for processing. There may be two or more complete processors on the same chip, enabling independent execution of muleiple sets of instructions at the same time. |
|
|
Term
|
Definition
A website that allows you to design an electronic scrapbook. |
|
|
Term
|
Definition
cpubenchmark.net
Measurements used to compare the performance of processors. Generated by running software programs designed to push the limits of the CPU. |
|
|
Term
|
Definition
The percentage of time that the CPU is working. Measured by the OS. Useful for considering whether to upgrade. If usage is over 90% for most of the work session, you may benefit from a faster CPU. |
|
|
Term
|
Definition
Records CPU usage over the past minute. |
|
|
Term
|
Definition
creativecommons.org
A non-profit organization that has developed various licenses that can be used based on the rights you wish to grant. |
|
|
Term
|
Definition
A type of job that will likely remain onshore. Jobs that require direct input from customers, or involve systems that customers interface with. Includes web application developers, web interface designers, database and data warehouse designers and developers, customer relationship management (CRM) analysts, and enterprise resource planning (ERP) implementation specialists. |
|
|
Term
Customer interaction technician |
|
Definition
A job in web development. Deal with feedback from the website's customers. Answer email, send requested information, and funnel questions to appropriate personnel. |
|
|
Term
|
Definition
A trend in technology. REcent revelations of widespread cyber spying is leading to demand for IT security professionals. |
|
|
Term
|
Definition
Any criminal action perpetrated primarily through a computer. Computer users must take precautions to protect themselves from cybercrimes. Includes FBI-related scams, identity theft, non-auction, and advance fee fraud. |
|
|
Term
|
Definition
Individuals who use computers, networks, and/or the internet to perpetrate cybercrimes. Anyone with a computer and the appropriate knowledge can be a cybercriminal. |
|
|
Term
|
Definition
Cyberslacking
Using your computer for non-work related activities while you are being paid to do your job. Includes playing games and using social networks. Estimated to cost businesses $50 billion annually. |
|
|
Term
|
Definition
Needed to create a useful program. Raw input that users have at the start of the job. |
|
|
Term
|
Definition
When sensitive or confidential information is copied, transmitted, or viewed by an unauthorized individual. Can be intentional or unintentional. Unfortunately a common occurrence. |
|
|
Term
|
Definition
A file you should back up. Files you created or purchased, such as papers, spreadsheets, music, photos, or contacts. |
|
|
Term
|
Definition
Traces all data in an information system from the point at which data enters the system, to its storage or output. |
|
|
Term
|
Definition
An internet connectivity plan. You pay one monthly price, and are allowed data transfers up to a fixed limit. If you exceed the limit, the fee can be expensive. |
|
|
Term
|
Definition
Bandwidth
The maximum speed at which data can be transmitted between two nodes on a network. Measured in megabits per second (Mbps). |
|
|
Term
|
Definition
The kind of data being stored in a memory location. Each programming language has its own data types. |
|
|
Term
Database administrator (DBA) |
|
Definition
A high growth IT job. Median pay is $77,080. Ten year growth rate is 15%. Total new jobs are 17,900. A job in information systems. Install and configure database servers, ensuring servers provide adequate level of access to all users. |
|
|
Term
|
Definition
A job in systems development. Design and build databases to support software systems being developed. |
|
|
Term
|
Definition
Dedicated to an organization's database storage, queries, and retrievals. |
|
|
Term
|
Definition
Helps programmers dissect a program as it runs. Pauses the program while it's executing and allows the programmer to examine the value of all variables. Runs the program in slow motion, allowing the programmer to see the exact sequence of steps being executed. |
|
|
Term
|
Definition
The process of running the program over and over to find and repair errors and to make sure the program behaves the way it should. |
|
|
Term
|
Definition
Places in an algorithm where the program must choose from a list of actions, based on the value of a certain input. Two types of decision points: binary decisions and loops. |
|
|
Term
|
Definition
The second step of the machine cycle. The code is decoded into commands the CPU must understand. |
|
|
Term
Denial-of-service attack (DoS) |
|
Definition
Legitimate users are denied access to a computer because a hacker is repeatedly making requests on the system from zombie computers. The computer can handle only a certain number of requests for information at one time, when it is flooded with requests from the hacker, it shuts down and refuses all requests. |
|
|
Term
|
Definition
The new, modified class in inheritance of object-oriented analysis. |
|
|
Term
|
Definition
A type of computing device. Have more computing power, larger screens, and are more reliable. Have longer lifespans than laptops. |
|
|
Term
|
Definition
dice.com
A resource for IT employment. |
|
|
Term
|
Definition
The use of a single unifying device to handle media, internet, entertainment, and telephony. Smartphones are an example of digital convergence. |
|
|
Term
Digital Photography Review |
|
Definition
dpreview.com
A website that compares cameras, and provides feedback from owners. |
|
|
Term
Digital Living Network Alliance |
|
Definition
dlna.org
An organization working to standardize different appliances and networking devices in homes. |
|
|
Term
Digital rights management (DRM) |
|
Definition
A system of access control, allowing limited use of material that has been legally purchased. The song may only run on certain devices, or only viewed a certain number of times. |
|
|
Term
|
Definition
A specialized chip that compresses digital sound data in a cellphone, to allow data to be transmitted quickly. |
|
|
Term
Digital subscriber line (DSL) |
|
Definition
A form of broadband. Transmission media is twisted-pair cable. Speed drops as distance from the main signal soruce increases. Average speed is 3.7 Mbps, with maximum of 15 Mbps. The bandwidth of the wires is split into three sections: voice data, sending data, and receiving data. The latter two are at much higher frequencies than vioce data. |
|
|
Term
|
Definition
Helps solve the problem of low space on the hard drive, causing it to run slower. |
|
|
Term
Disk Defragmenter utility |
|
Definition
Helps solve the problem of files spread across many sites on the hard drive, causing it to run slower. |
|
|
Term
|
Definition
A port found on a video card. A newer port that connects to digital monitors or projectors. |
|
|
Term
Distributed denial-of-service attack (DDoS) |
|
Definition
Launching a DoS attack from more than one zombie, sometimes thousands, at a time. Most hackers use this type of attack, to avoid the attack being traced to their own computer. |
|
|
Term
Diversity/Careers in Engineering and Information Technology |
|
Definition
diversitycareers.com
A resource for women in IT. An online magazine whose articles cover career issues of technical professionals who are members of minority groups, women, or people with disabilities. |
|
|
Term
|
Definition
Technical writers create internal documentation for the program, describing development and technical details, how the code works, and how the user interacts with the program. Produces all necessary used documentation that will be distributed to the program's users. |
|
|
Term
|
Definition
dosomething.org
A website which opened a Crisis Text Line, to organize responses to crisis text messages. |
|
|
Term
|
Definition
A website that provides anti-spyware programs including Anti-Malware, Ad-Aware, and Spybot-Search & Destroy. Also provides spam filtering inclduign SPAMfigher, and cookie-monitoring software includign Powerful Cookies. |
|
|
Term
|
Definition
Malicious websites that attack your computer by downloading harmful software onto your computer. Affects almost 1 in 1,000 web pages on the internet. To avoid, make sure your OS is up to date and has security patches. |
|
|
Term
|
Definition
A trend in technology. Artificial intelligence systems for vehicles and business equipment. |
|
|
Term
|
Definition
A trend in technology. Being used by businesses and households. |
|
|
Term
Dual inline memory module (DIMM) |
|
Definition
Small circuit boards that hold several memory modules. Most memory modules are packaged this way. |
|
|
Term
|
Definition
A port found on a video card. For digital LCD monitors. |
|
|
Term
|
Definition
The page can decide how to display itself based on the choices the reader makes. VBScript is used to add dynamic decision making to web pages. |
|
|
Term
|
Definition
A device that can display e-text, and have supporting tools such as note-taking bookmarks, and integrated dictionaries. Includes the Amazon Kindle and Fire, Barnes and Noble NOOK, and Sony Reader. |
|
|
Term
|
Definition
A tool in IDE that helps programmers as they enter code, highlighting keywords and alerting programmers to typos. |
|
|
Term
|
Definition
A device inside a computer that is flipped between "off" and "on", signifying 0 and 1. Computers are built from a huge collection of electrical switches. As computers evolved, switches became smaller and faster. |
|
|
Term
|
Definition
E ink
A popular technology used to display e-text. Produces a very crips, sharp greyscale representation of text. The "page" is composed of millions of microcapsules with black and white particles in clear fluid. Electric signals make each spot appear black or white. Easy to read in direct sunlight. Amazon Kindle Paperwhite and Barnes and Noble NOOK use this technology. |
|
|
Term
|
Definition
E-text
Textual information captured digitally so it may be stored, manipulated, and transmitted by electronic devices. |
|
|
Term
|
Definition
Handles the large volume of incoming, outgoing, and internal email in large organizations. Connected to the communications server for internet access. |
|
|
Term
|
Definition
A type of virus. Uses the address book in the victim's email system to distribute a virus. |
|
|
Term
|
Definition
A type of job that will likely remain onshore. Jobs that involve getting key business projects accomplished. Requires IT and people skills. Includes business process analysts, application developers (where customer interaction is critical), and project managers. |
|
|
Term
|
Definition
Ransomware
A type of virus. Runs a program that searches for common types of data files, and compresses them with a complex encryption key, rendering files unusable. You then are asked to spend payment to an account to receive the program to decrypt your own files. Law enforcement officials can often trace payments to catch perpetrators. |
|
|
Term
|
Definition
A website that supplies recipies to the computers built into refrigerators. |
|
|
Term
|
Definition
Description of what the program should do if input data is invalid or gibberish. Included in the program statement. |
|
|
Term
|
Definition
Networks that use Ethernet protocol as the standard by which nodes communicate. The standard is 802.3. Most home and corporate networks are Ethernet networks. |
|
|
Term
|
Definition
The binary sequence htat instructs the CPU to run code. It is written in binary language. |
|
|
Term
|
Definition
The third step of the machine cycle. The CPU performs the work described in the commands. Specialized hardware performs addition, subtraction, multiplication, division, and other mathematical logical operations. |
|
|
Term
Extensible markup language (XML) |
|
Definition
Enables designers to define their own data-based tags, making it much easier for a program running on a server computer to transfer key information on its page to another site. Enables users to define their own tags. Facilitates exchange of information from web services. |
|
|
Term
|
Definition
A place where you could store backups. Inexpensive, and fast backups with USB connected directly to your computer. Could be destroyed in a catastrophe, and can be stolen. It is slightly more difficult to backup multiple computers with one device. |
|
|
Term
|
Definition
www.fbi.gov/about-us/investigate/cyber
Has a website that informs the public about types of cybercrimes and methods of protecting yourself. |
|
|
Term
|
Definition
A type of cybercrime. People pretend to represent official organizations, to defraud victims. |
|
|
Term
|
Definition
Determines whether a project should go forward. Looks at the needs and resources available to determine whether the project can be completed. |
|
|
Term
|
Definition
A less powerful cellphone than a smartphone. Less expensive, with modest processors, simpler interface, and often no touch screen. |
|
|
Term
|
Definition
ftc.gov
Has identified methods other than a computer that a theif might steal your personal information: stealing purses or wallets, stealing mail or trash, posing as a bank or credit card company representative, or installing skimming devices on ATM machines that record information. |
|
|
Term
|
Definition
The first step of the machine cycle. 0s and 1s that make up the program's code are fetched from the RAM, and move to the CPU. |
|
|
Term
|
Definition
A type of cable used in wired networks. Made of optically pure plastic or glass fibres as thin as a human hair that transmit data at extremely fast speeds. Transmits data with light signals, which do not degrade over long distances. |
|
|
Term
|
Definition
A form of broadband. Transmission media is fibre-optic cable. Because light is very fast, enormous amounts of data can be delivered at superfast speeds. When data is delivered, it is converted into electrical pulses that the computer can read. Average speed is 50 Mbps, with maximum of 500 Mbps. Not usually used inside the home; a twisted pair-or coaxial cable is used inside the home to transport the network signals. |
|
|
Term
Fifth-generation language (5GL) |
|
Definition
A category of programming language. The most "natural" programming languages. A problem is presented as a series of facts or constraints instead of as a specific algorithm. Programmers can build applications without specifying an algorithm. Includes PROLOG. |
|
|
Term
|
Definition
A type of IT job. Travel from place to place as needed, performing short-term jobs at each location. Need to be able to work independently. |
|
|
Term
|
Definition
Store and manage files for network users. On corporate networks, employees are provided with a space on the file server to store files they create. |
|
|
Term
|
Definition
A software program or hardware device that protects computers from hackers. May be configured to packet filter and/or block logical ports. An item on the computer security checklist; all computers and tablets should have firewall, activated before connecting to the internet. The router is able to function as a hardware firewall. Firewall security is tested with free software at grc.com. Includes personal firewalls. Popular firewall software includes Norton Personal Firewall, McAfee Firewall, ZoneAlarm, and BlackICE PC Protection. |
|
|
Term
|
Definition
Read-only memory software on the router. Hackers may exploit bugs in the firmware. |
|
|
Term
First-generation language (1GL) |
|
Definition
Machine language
A category of programming language. The machine language of the CPU. The sequence of bits that the CPU understands. Bits describe commands to the CPU. |
|
|
Term
|
Definition
flickr.com
An online service that stores images, and allows you to create prints, albums, mugs, T-shirts, and calendars. |
|
|
Term
|
Definition
Memory cards which are portable. Used in MP3 players and other portable devices. Includes compact flash cards, multimedia cards, SmartMedia cards, and memory sticks. |
|
|
Term
|
Definition
Crated by IEEE. Describes how numbers with fractional parts should be represented in the binary number system. Uses a 32 bit system. |
|
|
Term
|
Definition
Visual representation of patterns an algorithm comprises. Diamonds indicate yes/no decisiosn. Rectangles indicate instructions to follow. Parallelograms indicuate input/output. Ovals are seen at the end of the program. Directed lines indicate the direction of flow. |
|
|
Term
|
Definition
corp.fon.com
A WiFi sharing service that provides hardware and software to let you configure your WiFi hotspot so that your network remains secure. |
|
|
Term
|
Definition
A keyword used in Visual Basic. An input or output item is given a starting value. |
|
|
Term
Fourth-generation langauge (4GL) |
|
Definition
A category of programming language. Includes database query languages and report generators. More powerful commands allow complex words to be done in a single sentence. Includes SQL. |
|
|
Term
|
Definition
gamasutra.com
A resource for IT employment. |
|
|
Term
|
Definition
gamecareerguide.com
A website with information on gaming careers. |
|
|
Term
|
Definition
A job in game development. Create 2D and 3D art, game interfaces, video sequences, special effects, game levels, and scenarios. |
|
|
Term
|
Definition
A job in game development. Code scenarios developed by game designers, and ensure the game plays accurately. |
|
|
Term
|
Definition
The point in the release cycle when the product can be purchased by the public. |
|
|
Term
|
Definition
A piece of data ttached to a photo, indicating your latitude and longitude when you took the photo. Useful for some applications. Cybercriminals and cyberstalkers could use them to track your movements. |
|
|
Term
Gibson Research Corporation |
|
Definition
grc.com
A company that offers free, and easy to run programs that pinpoint security vulnerabilities in a system connected to the internet. |
|
|
Term
|
Definition
An Ethernet protocol. The most commonly used wired Ethernet standard for home networks. Data transfer is up to 1 Gbps. Computers generally have a gigabit Ethernet card installed in them. |
|
|
Term
|
Definition
gigabiter.com
Eliminates security and environmental risks with electronic destruction by first delaminating the hard drive and breaking down computer e-waste into recyclable products. Produces a sand-like substance that is 100% recyclable. |
|
|
Term
Global positioning system (GPS) |
|
Definition
A network of 21 satellites constantly orbiting the Earth, built and operated by the US Department of Defense. GPS devices pick up signals from these satellites, and use the information to determine its geographical location anywhere on Earth, to within 3 feet. |
|
|
Term
|
Definition
gogoai.com
A wireless broadband network that provides coverage on participating airlines for in-flight internet access. |
|
|
Term
|
Definition
A trend in technology. Virtual technology. Ongoing development of heads-up displays and transparent screens. |
|
|
Term
|
Definition
google.com/voice
Automatically transcribes your voice messages to texts so you can check your voice mail by reading it. |
|
|
Term
|
Definition
Cofounder of the CPU chip manufacturer Intel. Cam up with Moore's Law. Predicted that by year 2020, CPU chips will be manufactured in a different way, changing or eliminating the effects of Moore's Law. |
|
|
Term
Graphics double data rate 5 (GDDR5) |
|
Definition
A newer standard for video memory. |
|
|
Term
Graphics procesing unit (GPU) |
|
Definition
A separate processing chip specialized to handle 3D graphics and image and video processing with efficiency and speed. The CPU redirects tasks to the GPU to speed up graphics processing. |
|
|
Term
|
Definition
A type of hacker. A cross betwen white-hat and black-hat hackers. Often illegally break into systems to flaunt their expertise to administrators, in attempt to sell services in repairing security breaches. |
|
|
Term
|
Definition
Anyone who unlawfully breaks into a computer system. May be an individual or a computer network. Creates mischief or steals information. They may be using your wireless network without your knowledge. Includes white-hat, black-hat, and grey-hat hackers. |
|
|
Term
|
Definition
Mechanical hard drive
Has storage capacities exceeding 4 TB. Offers the most storage per dollar. The most-used storage device. Composed of platters. |
|
|
Term
|
Definition
A port found on a video card. For high-definition TVs, Blu-ray players, or gaming consoles. |
|
|
Term
|
Definition
Stoppage of the hard drive due to a piece of dust becoming trapped between the read/write head and the platter. Often results in data loss. |
|
|
Term
|
Definition
A job in support services. Staff phones and respond to internet live chats or emails, to help solve problems for customers and employees, remotely or in person. May train users on new software and hardware. |
|
|
Term
|
Definition
A base-16 number system used by programmers. Reduces the size of number representations. |
|
|
Term
|
Definition
A standard of digital television signal that guarantees a specific level of resolution, and a specific aspect ratio. Over six times as many pixels as a standard definition TV, with an aspect ratio of 16:9. |
|
|
Term
|
Definition
Establishing a catalog the computer uses to keep track of files locations on the hard drive. |
|
|
Term
|
Definition
A type of network. Located in a home. Used to connect all the home's digital devices, such as computers, peripheral devices, phones, gaming devices, digital video recorders, and televisions. |
|
|
Term
|
Definition
Telecommuting
A type of IT job. Working from home. Involves little day-to-day supervision, and requires an individual with good self-discipline. |
|
|
Term
|
Definition
A more sophisticated type of NAS device. Designed to store files, share files across the network, and back up files on computers connected to the network. All computers connected to the network can access the server. Configured with operating systems such as Windows Server 2012. Automatically backs up all computers on the network, acts as a repository for files to be shared across the network, and functions as an access gateway to allow any computer on the network to be accessed from a remote location via the internet. |
|
|
Term
|
Definition
Software included in Windows 7 and 8 that makes it easier for computers on a network to share peripherals and information. |
|
|
Term
|
Definition
A web technology. The latest version of HTML. Introduced tags like <video> and supports drag and drop. |
|
|
Term
|
Definition
hulu.com
A website that rebroadcasts many current television shows, movies, and trailers. |
|
|
Term
|
Definition
Network topology that combines multiple topologies into one network. |
|
|
Term
Hypertect markup language (HTML) |
|
Definition
Used for content on the web. Uses special symbols called tags, which control how a web browser will display text, images, and other content. Not a programming language, it is a series of tags that modify the display of text. |
|
|
Term
Hypertext Preprocessor (PHP) |
|
Definition
A common programming language. Used to build websites with interactive capabilities. Adapts HTML pages to a user's selections. The user supplies information that is translated into a request to the server. Scripting code controls automatic writing of the custom HTML page that is returned to the user's computer. |
|
|
Term
|
Definition
Introduced in 2002. Provides quicker processing of information, by enabling a new set of instructions to start before the previous set has finished. Allows two programs to be processed at the same time, sharing computing resources on the chip. |
|
|
Term
|
Definition
ibackup.com
A company that provides large online storage capacity for backups. Not free. |
|
|
Term
|
Definition
A type of cybercrime. Theft of personal data such as bank account, credit card, or debit card numbers, your name, address, social security number, and/or birth date. The cybercriminal then runs up debts in your name. |
|
|
Term
|
Definition
A keyword used in C++ to indicate a binary decision. |
|
|
Term
|
Definition
System backup
A type of backup. Takes a snapshot of the entire computer, including system software. All systems, applications, and data files are backed up, not just those which have changed. Not as efficient, but ensures that you capture changes to application files that an incremental backup might not capture. |
|
|
Term
|
Definition
Partial backup
A type of backup. Only backs up files that have changed or have been created since the last time the backup was performed. Saves time because backing up files that haven't changed is redundant. |
|
|
Term
|
Definition
indiegogo.com
A crowd-funding website specializing in creative projects and causes, such as getting money for a band to get a recording session or tour. |
|
|
Term
|
Definition
Needed to create a useful program. The result or output that users require at the end of the job. |
|
|
Term
Information security analyst |
|
Definition
A high growth IT job. Median pay is $86,170. Ten year growth rate is 27%. Total new jobs are 27,400. |
|
|
Term
|
Definition
A system that includes data, people, procedures, hardware, and software that help in planning and decision making. |
|
|
Term
Information Systems Security Association (ISSA) |
|
Definition
issa.org
A not-for-profit, international organization of information security professionals and practitioners. |
|
|
Term
|
Definition
A type of job that will likely remain onshore. Jobs that are fundamental to moving and storing information US-based employees need to do their jobs. Incldues network security, network installation techniques, network administators (engineers), wireless infrastructure managers and technicians, and disaster recovery planners and responders. |
|
|
Term
|
Definition
An aspect of object-oriented design. A new class can automatically pick up all the data and methods of an existing class, then can extend and customise those to fit its specific needs. There is a base class and a derived class. |
|
|
Term
|
Definition
An important feature in a loop. The beginning point. |
|
|
Term
|
Definition
Antivirus software records key attributes about your computer files, and keeps statistics in a safe place on the hard drive. The software can then compare file attributes to help detect virus programs. |
|
|
Term
Institute of Electrical and Electronics Engineers (IEEE) |
|
Definition
ieee.org
A professional organization. Provides leadership and sets engineering standards for all types of network computing devices and protocols. |
|
|
Term
|
Definition
instructables.com
A tutorial headquarters. Follows open source hardware. |
|
|
Term
|
Definition
The collection of commands that a specific CPU can execute. Each CPU has its own unique instruction set. |
|
|
Term
|
Definition
Chips
Tiny regions of semiconductor material that support a huge number of transistors. Most are no more than a quarter inch in size, and can hold billions of transistors. Includes microprocessors. |
|
|
Term
Integrated development environment (IDE) |
|
Definition
A developmental tool that helps programmers write and test programs. Can be configured to support many languages. Includes an editor. |
|
|
Term
|
Definition
A job in web development. Work with graphic designers and animators to create a look and feel for websites that is easy to navigate. |
|
|
Term
International Game Developers Association |
|
Definition
igda.org
A website with information on gaming careers. |
|
|
Term
|
Definition
A program. Recommended to have 2 GB of RAM for this program. |
|
|
Term
|
Definition
Has been around since 2000. The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human interaction. Includes machines, appliances, buildings, vehicles, smoke detectors, pacemakers, et cetera. Connects companies, people, and technology in real-time via an extension of the internet into the physical world. By 2020, there will be about 50 billion connected devices. |
|
|
Term
Internet service provider (ISP) |
|
Definition
Broadband service is preferred, but in some cases cellular or dial-up acecss may be necessary. May be specialized like Juno, or provide additional services such as phone or cable TV. |
|
|
Term
|
Definition
Translates the source code into an intermediate form. Each line is executed as it is translated. Faster than a compiler, but compiled programs run faster than interpreted programs. |
|
|
Term
|
Definition
A private corporate network used exclusively by company employees to facilitate information sharing, database access, group scheduling, videoconferencing, or other employee collaboration. Not accessible to non-employees; a firewall protects it from unauthorized access through the internet. |
|
|
Term
|
Definition
An operating system used in smartphones. Manufactured by Apple. |
|
|
Term
|
Definition
ipvanish.com
A comprehensive software suite that offers features such as government-grade encryption data, enhanced email security, and anonymous web surfing for tablets. |
|
|
Term
Ironkey Personal Flash Drive |
|
Definition
ironkey.com
A portable privacy device that provides a high level of surfing privacy. Plugs into a device by a USB port, and all sensitive internet files such as cookies, passwords, internet history, and browser caches are stored on the device, not on the computer. Has software that shields your IP address from hackers. Has password management tools that store all login information, and encrypts it. |
|
|
Term
|
Definition
A program. Recommended to have 1 GB of RAM for this program. |
|
|
Term
|
Definition
izzyvideo.com
An online tutorial resource for making large impact with editing and affects you can apply to raw video footage. |
|
|
Term
|
Definition
From Sun Microsystems. Created Java in the early 1990s. |
|
|
Term
|
Definition
A programming language. Created by James Gosling. Good for applications that need to collect information from networked computers. Object-oriented, class-based model. Popular because it enables programmers to benefit from its large set of existing classes. It is architecture neutral. Used to create applets that can be delivered over the web. General-purpose and concurrent. |
|
|
Term
|
Definition
A small Java-based program. |
|
|
Term
|
Definition
A scripting language that is customized to work with the elements of a web page, and is often used to add interactivity to web pages. Syntax, keywords, data types, and operations are subsets of Java. Has a set of classes that represents hte objects often used on web pages. |
|
|
Term
JavaScript Object Notation (JSON) |
|
Definition
A standard for exchanging information between a server computer processor and a client. Information is delivered as a series of names and their values, making programs easy to read. Format defined with name/value pairs. Very common format for exchange of information from web services. |
|
|
Term
|
Definition
Used to build websites with interactive capabilities. Adapts HTML pages to a user's selections. The user supplies information that is translated into a request to the server. Scripting code controls automatic writing of the custom HTML page that is returned to the user's computer. |
|
|
Term
|
Definition
A website that lets you quickly broadcast videos as they are captured to a live internet audience. |
|
|
Term
|
Definition
justtechjobs.com
A resource for IT employment. |
|
|
Term
|
Definition
A portable WiFi hotspot device. The first 1 GB of data is free. |
|
|
Term
|
Definition
Key logger
A type of spyware. Monitors keystrokes. Used to steal passwords, login IDs, and/or credit card information. |
|
|
Term
|
Definition
A set of words that have a predefined meaning for a particular language. Includes "if else", "for", and "next". |
|
|
Term
|
Definition
xbmc.org
A program that lets your computer select shows to record, and you can watch them from anywhere with internet access. |
|
|
Term
|
Definition
lalarm.com
Free motion alarm software that can work for laptops. |
|
|
Term
|
Definition
Notebook
A type of computing device. A protable computer with a large display, and all the computing power of a full desktop system. Most have integrated support for wireless connectivity. |
|
|
Term
|
Definition
Rotational delay
A factor in access time. The time it takes for the correct sector to spin to the read/write head. |
|
|
Term
|
Definition
learnthenet.com
A website that has a good HTML tutorial, and includes the major tags that can be used to create HTML and XHTML documents. |
|
|
Term
|
Definition
A block of memory build on the CPU chip. Stores data or commands that have just been used. Very fast. If the next command isnt' already located on a CPU register, the CPU then searches this level. |
|
|
Term
|
Definition
Built on the CPU chip, but slightly farther away from the CPU than level 1 cache. Takes somewhat longer to access than level 1. Has more storage area than level 1. If the CPU does not find the next command on the level 1 cache, it searches this level. |
|
|
Term
|
Definition
An additional level of cache memory found in large multilevel CPU cache structures. Slower, but is larger in size than level 1 or 2 cache. The CPU checks this area for commands after it searches levels 1 and 2, before it makes the longer trip to RAM. Holds between 2 and 12 MB of data; it can store entire programs. |
|
|
Term
|
Definition
linkedin.com
A resource for IT employment. |
|
|
Term
|
Definition
A form of network administration. The configuration and maintenance of the network must be performed on each individual computer and attached to the network. Includes P2P networks. |
|
|
Term
|
Definition
A type of network. A network in which nodes are located within a small geographic area, such as a computer lab at a school, or a restaurant. |
|
|
Term
|
Definition
A type of virus. It is triggered when a certain logical condition is met, such as opening a file or starting a program a certain number of times. Effects range from display of annoying messages, to the reformatting of the hard drive causing complete data loss. |
|
|
Term
|
Definition
Errors in programming that only humans can detect. The compiler does not detect these problems. |
|
|
Term
|
Definition
Virtual communications gateways that allow a computer to organize requests for information, such as webpage downloads or email routing, from other networks or computers. Part of the computer's internal organization. Numbered and assigned to specific serviecs. Hackers may be able to access your computer through logical ports. Common logical ports include ports 21, 23, 25, 53, 80, and 443. |
|
|
Term
|
Definition
A common logical port. File Transfer Protocol (FTP) uses this port. |
|
|
Term
|
Definition
A common logical port. Telnet (unencrypted text communications) uses this port. |
|
|
Term
|
Definition
A common logical port. Simple Mail Transfer Protocol (SMTP) uses this port. |
|
|
Term
|
Definition
A common logical port. Domain Name System (DNS) uses this port. |
|
|
Term
|
Definition
A common logical port. Hypertext Transfer Protocol (HTTP) uses this port. |
|
|
Term
|
Definition
A common logical port. HTTP with Transport Layer Security (HTTPS) encryption uses this port. |
|
|
Term
|
Definition
Ignoring requests from the internet asking for access to certain logical ports. Firewalls may be configured to block logical ports. |
|
|
Term
|
Definition
A type of decision point. A question is asked, and if the answer is yes, a set of actions are performed. After the actions are performed, the question is asked again, creating a loop. The algorithm will repeat as long as the answer is yes. There are three important features of a loop: initial value, set of actions performed, and test conditions. |
|
|
Term
|
Definition
Preparation of hard drive platters. Tracks and sectors are made with magnetized surfaces, to create a grid-like pattern. |
|
|
Term
|
Definition
lulu.com
A website that does social marketing for your book to promote it. Offers services from editors, designers, and marketers. |
|
|
Term
|
Definition
Processing cycle.
1. Fetches required pieces of data or instructions from RAM
2. Decodes instruction into something the computer can understand
3. Executes the instructions
4. Stores result onto the RAM
Â
 |
|
|
Term
|
Definition
Long strips of binary code used by the control unit to set up the hardware in the CPU for the rest of operations it needs to perform. A binary code for computer instructions. There is a table of codes consisting of combinations of 0s and 1s for each of its commands. |
|
|
Term
|
Definition
A type of virus. Attaches itself to a document that uses macros, a short series of commands that automates repetitive tasks. The virus is written into the macro language. |
|
|
Term
|
Definition
magmito.com
A web-based product that supports developing a simple app with text and graphics, without any programming knowledge. |
|
|
Term
|
Definition
makezine.com
An e-zine that follows open source hardware. |
|
|
Term
|
Definition
Software that has a malicious intent. Includes adware, spyware, and viruses. Most are intrusive, annoying, or objectionable programs that are downloaded onto your computer when you install or use other online content such as a free programs, games, or utilities. |
|
|
Term
|
Definition
A program that executes whenever a compute boots up, ensuring that the OS will be loaded into memory immediately, even before some virus programs can load. Boot-sector viruses are loaded onto the master boot record. |
|
|
Term
|
Definition
Memory card
Small circuit boards that hold a series of RAM chips. Fit into special slots on the motherboard. |
|
|
Term
|
Definition
A form of flash memory. A special format of flash memory used by Sony. |
|
|
Term
|
Definition
An emerging technology using small radio transmitters instead of wireless routers. Only one node needs to be physically connected to a network connection, and all nodes share wireless with each other. Can be extended almost endlessly. Helps provide internet access in a much more timely and inexpensive matter, useful in developing nations and disaster zones. |
|
|
Term
|
Definition
Needed to create a useful program. The process of how the program converts input into correct outputs. |
|
|
Term
Metropolitan area network (MAN) |
|
Definition
A type of network. A large network providing access to a specific geographic area, such as a city. Many US cities have MANs to provide internet access to residents and tourists. Some use WiMAX, which extends local WiFi networks across greater distances. |
|
|
Term
|
Definition
A small, powerful integrated circuit that contains a CPU. |
|
|
Term
|
Definition
support.microsoft.com
An online resource that helps users resolve problems with Microsoft products. Determines what error codes indicate. |
|
|
Term
Microsoft Office Professional 2013 |
|
Definition
A program. Recommended to have 2 GB of RAM for this program. Uses 3.5 GB of hard drive space. |
|
|
Term
|
Definition
onedrive.com
A free storage option for online backups. Image backups probably won't fit the storage limits for free. |
|
|
Term
Microsoft Video for Windows |
|
Definition
.avi
A file format for digital video. A Microsoft file format, recognized by Windows Media Player, included with the Windows OS. |
|
|
Term
|
Definition
A form of broadband. A wireless option offered by many cellphone service providers through 3G and 4G internet access. Can be used when you are not in a WiFi hotspot. |
|
|
Term
|
Definition
Using technology while moving. Includes cellphones, PDAs, PMPs, smartphones, flash memory, tablet PCs, notebook computers, and netbooks. |
|
|
Term
|
Definition
Lets you connect more than one device to the internet WiFi via mobile broadband by creating a WiFi hotspot. Requires a data plan, but the monthly  fee may be less than paying for individual plans on multiple devices while you are on the road. |
|
|
Term
|
Definition
Receives requests from base transceiver stations. In a central location. |
|
|
Term
|
Definition
A type of computer user. Needs a lightweight device with long battery life. Happy to sacrifice some capabilities for less weight. Don't need fast clock speed or cache memory, and lower power draw is more important than the number of cores. |
|
|
Term
|
Definition
monster.com
A resource for IT employment. |
|
|
Term
|
Definition
There is never a perfect time to buy a computer; computers will always be getting faster and cheaper. The number of transistors inside a CPU will increase so fast that CPU capacity will double every two years. Once a computer is two years old, it is already obsolete. |
|
|
Term
Movign Picture Experts Group (MPEG) |
|
Definition
.mpg
.mpeg
.mp4
A file format for digital video. MPEG-4 video standard was adopted internationally in 2000. Recognized by most video player software. |
|
|
Term
|
Definition
A website which originally stored its song files on a public server, with permission of original artists or recording companies. |
|
|
Term
|
Definition
A way manufacturers can increase CPU performance. Used in personal computers. Often used when intensive computational programs need to be solved, such as comptuer simulations, video production, and graphics processing. Includes parallel processing. |
|
|
Term
Multi-factor authorization |
|
Definition
Requires two of the three authentication factors: knowledge (password, PIN), possession (ATM card, mobile phone), and inherence (biometric characteristic). Safer than single-factor authentication. |
|
|
Term
|
Definition
A form of flash memory. The same size as a compact flash card, but thinner. |
|
|
Term
Multimedia message service (MMS) |
|
Definition
Lets you send messages that include text, sound, images, and video clips. Arrive as a series of messages. |
|
|
Term
|
Definition
A class of virus. Infects multiple file types in an effort to fool antivirus software. |
|
|
Term
|
Definition
Analog versions are vinyl records and cassette tapes. Digital versions are CDs, MP3 files, and streaming music stations. Musicians are having issues with people downloading and sharing MP3 files without paying for them. |
|
|
Term
National Day of Civic Hacking |
|
Definition
hackforchange.org
Hackers working to develop solutions to local and global needs. |
|
|
Term
|
Definition
There is no differentiation by type of user, content being uploaded, or mode of communication on the internet. Large internet servers such as Comcast, Verizon, and Time Warner Cable, want to change that so that larger users get faster access. This would promote competition and innovation. |
|
|
Term
|
Definition
A type of computing device. Similar to a notebook computer, but it is designed for wireless communication and acecss to the internet. Includes Chromebook. |
|
|
Term
|
Definition
Two or more computers connected via software and hardware so they can communicate. Benefits of networks are sharing internet connection, sharing printers and other peripherals, sharing files, and common communications. A network must include a means of connecting nodes, hardware that allows communication between nodes, and software that allows the network to run. |
|
|
Term
|
Definition
Found in all nodes of a network. |
|
|
Term
Network address translation (NAT) |
|
Definition
Assigning internal IP addresses on a network. Internal IP addresses are used only in the internal network, and can't be detected by hackers. |
|
|
Term
|
Definition
Installing new computers and devices, monitoring the network to ensure it's performing efficiently, updating and installing new software on the network, and configuring, or setting up, proper security for the network. Two methods: central administration and local administration. |
|
|
Term
|
Definition
Network engineer
A job in systems development and information systems. Help programmers and analysts design compatible systems. Work in conjunction with other programs. Involved in every stage of network planning and deployment. Determine equipment and media, network topology, and help install networks and new updates. Plan disaster-recovery strategies, and fix problem when they arise. Develop policies regarding network usage, security, and hardware and software standards. |
|
|
Term
Network and computer systems administrator |
|
Definition
A high growth IT job. Median pay is $72,560. Ten year growth rate is 12%. Total new jobs are 42,900. |
|
|
Term
|
Definition
Network design
Size, structure, and cost of the network. Based on distance between nodes, the way in which the network is managed, rules used to exchange data between nodes, and the communications medium used to transport the data. |
|
|
Term
Network-attached storage devices (NAS) |
|
Definition
Home server
Specialized devices designed to store and manage all network data. Provide centralized data storage and access. Popular for business networks, and now being marketed for home networks. Specialized external hard drives. Special software is installed on computers so that all data saved to the computer is backed up on the NAS. Makes backups for multiple computing devices. More expensive than an external hard drive. Could be destroyed in a catastrophe, and can be stolen. |
|
|
Term
Network interface card (NIC) |
|
Definition
A network adapter that is already installed onto a desktop, laptop, smartphone, tablet, and peripheral devices. Different NICs are used for idfferent types of transmission media. Most are fore wireless media, but can use wired media as well. |
|
|
Term
Network navigation device |
|
Definition
Facilitate and control flow of data through a network. Includes routers and switches. |
|
|
Term
Network operating system (NOS) |
|
Definition
Installed on client/server networks. Handles requests for information, internet access, and use of peripherals for the rest of the network nodes. Includes Windows Server, and SUSE Linux Enterprise Server. |
|
|
Term
|
Definition
Internet-ready device
Can be connected directly to a network, either through a wired or wireless connection. Most game consoles, Blue-ray players, DVRs, and many televisions and home theatre systems are network ready. Devices that are not network ready require to be connected indirectly through another computer via a cable. |
|
|
Term
|
Definition
The physical or logical arrangement of computers, transmission media, and other network components. Includes bus, ring, star, and hybrid topology. |
|
|
Term
|
Definition
A keyword used in Visual Basic. Causes the program to return to the "for" statement, and increment the value of the input or output item by 1. |
|
|
Term
|
Definition
ninthdecimal.com
A free hotspot service to which you can register your home network, allowing anyone to find and use it. |
|
|
Term
|
Definition
Each device connected to a network. Can be a computer, peripheral device, or network device. |
|
|
Term
|
Definition
A tyep of cybercrime. Non-delivery of merchandise. Running auctions of merchandise that does not exist, and collecting funds without delivering goods. |
|
|
Term
|
Definition
When the computer is powered off, the data is saved. For permanent storage of instructions and data. Includes ROM and the hard drive. |
|
|
Term
|
Definition
An example of a class in object-oriented analysis. Each object from a given class is described by the same pieces of data, and has the same methods. |
|
|
Term
|
Definition
A method for creating an algorithm. Programmers first identify all classes of inputs that are part of the problem. The majority of design is spent identifying classes required to solve the problem. The algorithm is developed by enabling objects to interact. Has reusability and inheritance. |
|
|
Term
|
Definition
An organized plan for representing a number. |
|
|
Term
|
Definition
A programming language. Used most often to program applications to run under OS X. Object-oriented, with a superset of C. Includes all the keywords of C, and has additional keywords and features. Has a framework for writing iOS applications. Used to create applications for OS X and Apple mobile devices. |
|
|
Term
|
Definition
A type of IT job. Report to work to the same location each day, interacting with the same people on a regular basis. Requires regular hours of attendance, and may require working beyond normal working hours. You may be on-call. |
|
|
Term
|
Definition
When an outsourcing firm is located outside of the country that the business is located. It is cheaper for the company due to lower salaries in other countries. Countries to which offshoring is targeted includes India, China, Romania, and former eastern Bloc countries. |
|
|
Term
|
Definition
A place where you could store backups; in the cloud. Files are stored at a secure, remote location and are accessible anywhere through a browser. Most free storage sites don't provide enough space for image backups. Includes Microsoft OneDrive, ADrive, Carbonite, and IBackup. |
|
|
Term
|
Definition
Government commitment to make data they use to governm open and transparent. May be used to make programs. |
|
|
Term
|
Definition
Coding symbols that represent the fundamental actions of the language. Each programming language has its own set of operators. |
|
|
Term
|
Definition
Disk drives that use a laser to store and read data. Data is stored as tiny pits burned onto the disk by a high-speed laser. Pits are less than 1 micron in size. |
|
|
Term
|
Definition
Storage forms using optical drives. Includes CDs, DVDs, and BDs. Formats are ROM, R, and RW. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A business hires a third party firm to provide business services such as customer support call centres. |
|
|
Term
|
Definition
Running the CPU at a faster speed than the manufacturer recommends. Produces more heat, and reduces the lifespan of the CPU. Usually voids the warranty. Done often in gaming systems. |
|
|
Term
|
Definition
overdrive.com
A product that lets you search to find which area library has a book that you want. You can download e-books at any time. |
|
|
Term
|
Definition
A bundle of data sent through a network. Must be able to flow between nodes. |
|
|
Term
|
Definition
Sniffer
A program deployed by a hacker that looks at packets as they travel on the internet. Looks at all packets coming across a particular network. Wireless networks are particularly vulnerable to packet analysers, if encryption data isn't enabled when networks are set up. |
|
|
Term
|
Definition
Filtering out packets sent to specific logical ports. Firewalls may be configured to packet filter. |
|
|
Term
|
Definition
A form of multi-core processing. A large network of computers, with each computer working on a portion of the same problem simultaneously. Certain problems are well suited to this type of processing: divided into a set of tasks that can be run simultaneously. |
|
|
Term
Peer-to-peer network (P2P) |
|
Definition
A type of local administration network. Each node can communicate directly with every other node. To print, a node can communicate directly with the printer. Simple to set up, costs less than a client/server network, and are easier to configure and maintain. The most common type of home network, and may be found in some schools and offices. Windows, OS X, and Linux can support P2P networking. Includes wired Ethernet, wireless Ethernet, and power-line networks. |
|
|
Term
Peer-to-peer sharing (P2P) |
|
Definition
Users transferring files between users. Napster used P2P sharing to distribute music. It is illegal in some jurisdictions. |
|
|
Term
|
Definition
pendrivelinux.com
A resource that offers many different versions of Linux for download, and step-by-step instructions on how to install it onto a flash drive, to use on public computers, providing safe and private use. |
|
|
Term
Personal area network (PAN) |
|
Definition
A type of network. Used for communication among devices close to one person: smartphones, notebooks, and tablets using wireless technologies such as Bluetooth or WiFi. |
|
|
Term
Personal digital assistant (PDA) |
|
Definition
Palm computer
Handheld
A small device that allows you to carry digital information, such as calendars, contact lists, files, songs, photos, and games. Weighs less than 5 ounces. Can be syncrhonized with a computer by placing it in a cradle, or connecting it with a cable. May have touch-screen and/or keyboard interface. Has varying processor speeds. May include an IrDA port that transmits signals using infrared light. Many have Bluetooth technology. |
|
|
Term
|
Definition
A firewall designed for home networks. You can close logical ports to invaders, and potentially make your computer invisible to other computers on the internet. May implement packet filtering, and logical port blocking. Some firewalls have NAT capabilities. |
|
|
Term
|
Definition
More insidious than phishing. A malicious code is planted on your computer by a virus, or by visiting malicious websites, which alters your browser's ability to find web addresses. Users are directed to fake websites when they try to find legitimate websites. The user then gives data to cybercriminals under false pretenses. Most internet security packages detect and prevent pharming. |
|
|
Term
|
Definition
Pronounced "fishing". Luring internet users to reveal personal information such as credit card numbers, social security numbers, or information that could lead to identity theft. May be in the form of a legitimate-looking email from what claims to be your bank, which has a link to a fake bank website that asks for personal information. Never follow the link, and if you do, do not enter any information. Never reply to these types of emails. Many internet security packages have phishing protection tools. |
|
|
Term
|
Definition
For PC: absolute.com
For Mac: brigadoonsoftware.com
Tracking software that enables your computer to alert authorities to the computer's location if it is stolen. Contacts a server at the software manufacturer each time the device connects to the internet, and the manufacturer instructs the device to transmit tracking information that assists authorities in locating the device. |
|
|
Term
|
Definition
Analog versions are 35-mm single-lens cameras, with photos stored on film. Digital versions are digital cameras, including digital SLRs, with photos stored as digital files. |
|
|
Term
|
Definition
The amount of RAM on the memory modules of the computer. |
|
|
Term
|
Definition
Connecting to a wireless network without the permission of the owner. Illegal in many jurisdictions, but may happen inadvertently between neighbors. It can slow down your network connection. Any illegal behaviour a hacker initiates on your network can cause you to get in trouble. |
|
|
Term
|
Definition
A way that a manufacturer can increase CPU performance. Allows the CPU to work on more than one instruction or stage of processing at the same time. The CPU must be designed so that each stage is independent; must be able to run at the same time that other three stages are running, requiring more transistors and more complicated hardware design. |
|
|
Term
|
Definition
Comprises the hard drive. Coated, round, thin plates of metal stacked on a spindle. Patterns of magnetized spots are created on the iron oxide coating to save data. Spots arranged in one direction symbolized a 0, and in the other direction they symbolize a 1. |
|
|
Term
|
Definition
An essential part of game development; assists developers in determining aspects of the game that are most intriguing to players, and which parts need to be repaired or enhanced. |
|
|
Term
|
Definition
A class of virus. Changes its own code, or periodically rewrites itself to avoid detection. Most infect particular file types. |
|
|
Term
Portable media player (PMP) |
|
Definition
A small portable device that plays MP3 files. Can hold video, audio, and images. The number of songs it can store depends on the amount of storage space. Most use built-in flash memory. Some use hard disk drives, and can store much larger amounts of music. |
|
|
Term
|
Definition
Capability to move a completed solution easily from one type of computer to another. Higher level programming languages have higher portability. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A type of computer user. Needs fast, powerful processing, fast storage and lots of it. Creates video and software. Need fast clock speed, more cache memory, and as many cores as possible. |
|
|
Term
|
Definition
A format of optical media. Discs are read-only. Cannot save data onto them. |
|
|
Term
|
Definition
Creating a scenario that sounds legitimate to that someone will trust you. Used in social engineering. In cyberspace the most common type of pretexting is phishing. |
|
|
Term
|
Definition
Routes print jobs to appropriate devices and prioritizes printing according to order of requests, unless overridden by special needs. Found in networks with centralized printing service. |
|
|
Term
|
Definition
The starting point of a programming project. A clear description of what tasks the computer program must accomplish, and how the program will execute those tasks and respond to unusual situations. Includes a program goal, input, output, process, error handling, and a testing plan. |
|
|
Term
|
Definition
A programming language that is used to teach students of the arts. |
|
|
Term
Program development life cycle (PDLC) |
|
Definition
The process of a programming project.Â
1. Describing the problem
2. Making a plan
3. Coding
4. Debugging
5. Testing and documentation |
|
|
Term
|
Definition
A file you should back up. Installation files for productivity software. Usually found on DVDs or downloaded from the internet. |
|
|
Term
|
Definition
A clear statement of goals and objectives of a project. |
|
|
Term
|
Definition
A job in systems development. Attend meetings to document user needs, and work cloesly with system analysts. |
|
|
Term
|
Definition
The process of translating a task into a series of commands that a computer will use to perform the task. Involves identifying which parts of a task a computer can perform, describing the task in a highly specific and complete manner, and translating this description into the language of the computer's CPU. |
|
|
Term
|
Definition
A kind of "code" for the set of instructions the CPU knows how to perform. Use special words and strict rules, so that programmers can control the CPU without having to know all its hardware details. There are five generations of programming languages. |
|
|
Term
|
Definition
A type of IT job. Work at client sites on specific projects for extended periods of time. Can be attractive to individuals who like workplace situations that vary on a regular basis. |
|
|
Term
|
Definition
gutenberg.org
A source of free e-books. Has over 42,000 free books; books which are free in the US because their copyrights have expired. |
|
|
Term
|
Definition
A job in systems development. Manage the system development process: assign staff, budget, report to management, coach, and ensure dedlines are met. |
|
|
Term
|
Definition
An item on the computer security checklist. All computing devices should be protected from electrical surges, and mobile devices should have alarms or tracking software installed on them. |
|
|
Term
|
Definition
https://proto.io
A browser-based tool that lets you construct a working simulation of an application. |
|
|
Term
|
Definition
A small model of the pgroam at the beginning of a large project. |
|
|
Term
|
Definition
A visual tool for documenting an algorithm. Text-based representation of an algorithm. Words describe actions. Organized as an outline, with different levels of identification to indicate flow of actions. |
|
|
Term
|
Definition
Analog versions are magazines and book. Digital versions are e-books and e-zines. |
|
|
Term
|
Definition
A general-purpose, high-level programming language. Enables you to do things you cannot do in PHP or C. |
|
|
Term
|
Definition
Placing a virus in a secure area on the hard drive so that it won't spread to other files. |
|
|
Term
|
Definition
apple.com/quicktime
.qt
.mov
A file format for digital video. You can download the QuickTime player for free online. The Pro version allows you to own QuickTime files. |
|
|
Term
|
Definition
Analog versions are AM/FM radio. Digital versions are HD Radio, and SiriusXM satellite radio. |
|
|
Term
|
Definition
A form of RAID. Takes half the time to write a file; every time data is written onto the hard drive, it is spread across two physical drives. Used when disc performance is important, such as video editing or sound recording. If either disc fails, you lose all the data. |
|
|
Term
|
Definition
A form of RAID. All data is written twice onto two drives. Produces a backup drive. |
|
|
Term
Random access memory (RAM) |
|
Definition
The computer's temporary storage space. Remembers everything the computer needs to process data into information. A form of volatile storage; works only when the computer is on. A million times faster access than the hard drive. |
|
|
Term
Rapid application development (RAD) |
|
Definition
An alternative to the waterfall approach of systems development. Developing detailed system documents before they produce the system. Developers create a prototype first, then generate system documents as they use and remodel the product. |
|
|
Term
|
Definition
Moves from the outer edge of the platter to the centre as frequently as 50 times per second to retrieve and/or record magnetic data to/from the hard drive platter. Does not touch the platter; it hovers 0.5 microinches above it. |
|
|
Term
|
Definition
real.com
.rm
A file format for digital video. A format from RealNetworks. Popular for streaming video. Available for free online. |
|
|
Term
|
Definition
A format of optical media. Allows you to write data onto the disk, but only once. |
|
|
Term
Redundant array of independent discs (RAID) |
|
Definition
A set of strategies for using more than one drive in a system. RAID 0 and 1 are the most popular for consumer machines. |
|
|
Term
|
Definition
A special memory storage area in the CPU where results are stored. The most expensive, fastest memory on the computer. |
|
|
Term
Release to manufacturers (RTM) |
|
Definition
The point in the release cycle when software is released to manufacturers, who may make changes to the program before releasing the product. |
|
|
Term
|
Definition
The number of data points a camera records for each image captured. Determines the image quality of a digital camera. |
|
|
Term
|
Definition
Should be considered when choosing a programming language. The existing pool of programmers must be proficient in the language chosen. |
|
|
Term
|
Definition
An aspect of object-oriented design. Forces programmers to think in general terms, which tends to lead to more general and reusable solutions. |
|
|
Term
|
Definition
reverbnation.com
A website where you can post songs, and build a fan-base for your band. Will send you reports detailing who's listening to the music, and what they are saying about it, and can connect you to independent recording labels. |
|
|
Term
|
Definition
A format of optical media. Lets you write and rewrite data many times. |
|
|
Term
|
Definition
Network topology where computers and peripheral devices are arranged in a circle. Data flows around the circle from device to device in one direction. Token-ring technology is used. |
|
|
Term
|
Definition
naygames.com
A 14-year old who created the popular app Bubble Ball using Corona. |
|
|
Term
|
Definition
A website that conducted a review of 32 million passwords used for their accounts, and found that many people were using weak passwords. |
|
|
Term
|
Definition
A program or set of programs that allows hackers to gain access to your computer and take almost complete control of it without your knowledge, making the computer a zombie. |
|
|
Term
|
Definition
A network navigation device. Transfers packets between two or more networks. In a home network, the router transfers data between the home network and the internet. Some routers feature wireless capabilities to produce a WiFi home network. |
|
|
Term
|
Definition
Errors in problem logic, caught only when the program executes. Includes forbidden operations in programming, such as dividing by zero. |
|
|
Term
|
Definition
A website that provides accurate information on salaries of jobs in various areas, with various degrees, and at various companies. |
|
|
Term
|
Definition
The number of times an analog sound wave is measured each second. The accuracy of the digital information depends on the sampling rate. |
|
|
Term
|
Definition
Satellite internet
A form of broadband. Used mostly in rural or mountain areas that do not have access to DSL, cable, or fibre-optic service. A satellite dish is placed outside the home, and connected to the computer with coaxial cable. Data is transmitted between the computer and a satellite that sites in geosynchronous orbit thousands of miles above the Earth. It is faster than dial-up connection. |
|
|
Term
|
Definition
A type of malware that downloads onto your computer and tries to convince you that your computer has been infected with a virus. Pop-ups may appear, saying you have a virus, and direct you to a website where you can pay for fake removal or antivirus software. Often scareware is downloaded from infected websites or Trojan horse files. Scareware scams are estimated to generate over $34 million/month. Most internet security, anti-virus, and anti-malware software can detect and prevent installation of scareware. |
|
|
Term
|
Definition
A type of virus. Viruses hidden on websites. A miniprogram is executed without your knowledge. Often used to perform useful, legitimate functions on websites, such as collecting name and address information from customers. Some scripts are malicious, and can infect your computer with a virus. |
|
|
Term
|
Definition
An amateur hacker. Can't create their own programs to hack into computer systems. They use tools created by more skilled hackers. |
|
|
Term
|
Definition
A simple programming language that is limited to performing a set of specialized tasks. Used to add more power and flexibility to HTML code. Includes Java Script, PHP, and VBScript. |
|
|
Term
|
Definition
An ever-changing set of requests from clients for additional features as they wait longer and longer to see a working prototype. |
|
|
Term
Second-generation langauge (2GL) |
|
Definition
Assembly language
A category of programming language. Allow programmers to write programs using short, English-like commands that speak to the CPU, giving the programmer direct control of hardware resources. Words describe commands to the CPU. |
|
|
Term
|
Definition
A wedge-shaped section of a platter. |
|
|
Term
|
Definition
A factor in access time. The time it takes for the read/write head to move over the surface disk. |
|
|
Term
|
Definition
A special material that can be controlled to either conduct electricity or act as an insulator. Silicon is a semiconductor. |
|
|
Term
|
Definition
Software updates that address problems in a program discovered after its commercial release. |
|
|
Term
Service set identifier (SSID) |
|
Definition
The name and identity of a wireless network. Unless you change it, the router uses a default name such as "Wireless" or "Netgear". |
|
|
Term
Short message service (SMS) |
|
Definition
Text messaging
A technology which allows you to send short text messages over cellular networks. Studies show that texts reach teenage populations over 11 times more efficiently than emails. |
|
|
Term
|
Definition
shutterfly.com
An online service that stores images, and allows you to create prints, albums, mugs, T-shirts, and calendars. |
|
|
Term
|
Definition
skype.com
A well-known VoIP provider. You must download special software. You can place phone calls, HD-video calls, and share screen between users. Calls to other skyp users are free. |
|
|
Term
|
Definition
A form of flash memory. The same size as a compact flash card, but thinner. |
|
|
Term
|
Definition
A convergence of an PMP, PDA, and a cellphone. Provides a single solution for portable computing needs. |
|
|
Term
|
Definition
smashwords.com
A company that accepts a Microsoft Word document, and makes you book available through e-book vendors. |
|
|
Term
|
Definition
sneakemail.com
An email forwarding service that screens email messages, and forwards you only those you designate to be okay to accept. |
|
|
Term
|
Definition
Any technique that uses social skills to generate human interaction and entices individuals to reveal sensitive information. Includes telephone scams. Most social engineering schemes use pretexting. |
|
|
Term
|
Definition
A job in web development. Direct strategies for the company on social media sites where the company has a presence, such as Facebook, Twitter, and Yelp. May respond to commends, develop promotional strategies, and design functionality of social media sites. |
|
|
Term
|
Definition
A high growth IT job. Median pay is $93,350. Ten year growth rate is 22%. Total new jobs are 222,600. |
|
|
Term
|
Definition
An item on the computer security checklist. The operating system and other software should be configured to install new software patches automatically, and the web browser should be the latest version. |
|
|
Term
|
Definition
Uses electronic memory; no mechanical monitors or moving parts. Has very fast access time, about 100 times faster than a hard drive. Start up time is faster. Most desktops and laptops have the option to use SSD. Found in ultrabooks. Run with no noise, generate little heat, and require little power. Can store up to 2 TB, but can be expensive. |
|
|
Term
|
Definition
AN expansion card that attaches to the motherboard inside the system unit. Enables the computer to drive the speaker system. |
|
|
Term
|
Definition
soundcloud.com
A website where you can post songs, and build a fan-base for your band. |
|
|
Term
|
Definition
Comprises the instructions programmers have written in the higher-level language. |
|
|
Term
|
Definition
Should be considered when choosing a programming language. How much RAM and how many registers are in the CPU? Some languages use more space than others. |
|
|
Term
|
Definition
Unwanted or junk email or instant messages. Companies may spam your email with advertisements, if you've used your email address to purchase online goods, or in an online account, or social networks. You can create a free email address to use for these purposes. You can also create a spam filter. |
|
|
Term
|
Definition
You can select emails from certain senders or with certain phrases to be sent to a special folder. Most onlin email services provide spam filtering. |
|
|
Term
|
Definition
Phishing using information collected on individuals. Emails are sent to people known to be customers of the company the phisher is posing as, and may include the victim's full name. Has a much higher chance of successfully gathering information. |
|
|
Term
|
Definition
A way that manufacturers can increase CPU performance. For handling multimedia and graphics. |
|
|
Term
|
Definition
Should be considered when choosing a programming language. Some languages produce faster machine code than others. |
|
|
Term
|
Definition
A website that tests the speed of your internet connection. You can see how your results compare with others, as well as determine whether you're getting the results promised by your ISP. |
|
|
Term
|
Definition
An unwanted piggyback program that downloads other software installed from the internet. Runs in the background of your system, and transmits information about you without your knowledge, such as internet surfing habits. The information can be used for marketing purposes. Many use tracking cookies to collect information. Includes keystroke loggers. |
|
|
Term
|
Definition
Helps solve the problem of strange behaviour of browsers and other programs, and slowing of the system. |
|
|
Term
|
Definition
Network topology most widely used in client/server networks in businesses. Offers the most flexibility. Nodes connect to a central communications device switch, forming a star. The switch can send and receive data to/from any node on the network. An active topology. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A class of virus. Temporarily erases its code from files where they reside, and hides in the active memory of the computer. Helps avoid detection if only the hard drive is searched for viruses. |
|
|
Term
|
Definition
The fourth step of the machine cycle. The result is stored in a register. |
|
|
Term
Strong Password Generator |
|
Definition
strongpasswordgenerator.com
A website that will generate a good password for free. |
|
|
Term
Structured Query Language (SQL) |
|
Definition
A fourth-generation language. A database programming language. |
|
|
Term
|
Definition
A type of speaker. Produces a better bass sound for richer and fuller sound. |
|
|
Term
|
Definition
A memory-management technique. Monitors the most used applications and preloads them into system memory so they will be ready when you want them. Speeds up response of applications. |
|
|
Term
|
Definition
A device that protects your computer from power surges. Should be replaced every two to three years, or after a major surge. |
|
|
Term
|
Definition
A type of audio processing that makes the listener experience sound as if it were coming from all directions. Uses multiple speakers. Includse Dolby Digital EX, Dolby Digital Plus, and Dolby TrueHD. |
|
|
Term
|
Definition
A programming language. A newer language introduced by Apple for developing for iOS and OS X. Easier to read and maintain. Uses a "playground" area where you can quickly write and test ideas before moving code into the main project. |
|
|
Term
|
Definition
A network navigation device. Acts like a traffic signal; receives packets and sends them to intended nodes of the network. If data packets suffer collisions, data can be damaged or lost. The switch prevents this. All routers for home use have integrated switches. |
|
|
Term
|
Definition
symantec.com
An antivirus software comapny. The website has archives of information on viruses, and provides step-by-step solutions for removing them. |
|
|
Term
|
Definition
A synchronization feature in Windows Vista. |
|
|
Term
|
Definition
Syncing
Updating data so that files on your cellphone and computer are the same. You could use a micro SD card, USB cord, or wireless connection. |
|
|
Term
|
Definition
An agreen-on set of rules defining how a language must be structured. |
|
|
Term
|
Definition
Violations of syntax rules of a programming language. A misplaced comma or a lower case letter can cause a syntax error. |
|
|
Term
|
Definition
An internal clock built into the motherboard. A special crystal acts as a metronome, keeping a steady beat and controlling when the CPU moves to the next stage of processing. Produces the clock cycle. |
|
|
Term
System development life cycle (SDLC) |
|
Definition
Waterfall system
A process for developing systems. Each step is dependent on the previous step.
1. Problem/opportunity identification
2. Analysis. Develop a program specification
3. Design
4. Devleopment
5. Testing and installation
6. Maintenance and evaluation |
|
|
Term
|
Definition
Looking at the computer's subsystem to see what they do, and to check on how they perform duringa  typical workday. Comparing this with what is available on the market. |
|
|
Term
|
Definition
A jobin systems development. Gather information from users about problems in existing information systems. Propose solutions to problems. Works closely with programmers. |
|
|
Term
|
Definition
A type of computing device. Has a touch-sensitive screen and full keyboard. The screen is 7 - 10 inches. Has a mobile OS such as iOS, Android, or Windows, and a mobile processor. Less than 128 GB of storage. There are specialized applications designed for touchscreen interface. Includes the iPad and Galaxy. |
|
|
Term
|
Definition
A portable computer that has a touch-screen and can by rotated clipboard style, so that it may be used as a notebook or as a tablet. Can be connected to a full-size keyboard and monitor. |
|
|
Term
|
Definition
Should be considered when choosing a programming language. Certain languages are customized for particular user environments. |
|
|
Term
|
Definition
techcareers.com
A resource for IT employment. |
|
|
Term
|
Definition
A job in systems development. Generate systems documentation for end users and programmers who may make modifications to the system in the future. |
|
|
Term
Telecommunications Industry Association |
|
Definition
ecyclingcentral.com
Provides an e-cycling information site, to help find a local e-cycling centre. |
|
|
Term
Telecommunications technician |
|
Definition
A job in information systems. Oversee communications infrastructure, including training employees. |
|
|
Term
|
Definition
The use of equipment to provide voice communications. Has shifted from analog to digital. |
|
|
Term
|
Definition
Analog versions are analog TV broadcast. Digital versionare high-definition digital television. |
|
|
Term
|
Definition
tossabledigits.com
A company that will sell you a virtual phone number, which can be assigned on existing phone numbers. Allows you to filter calls. |
|
|
Term
|
Definition
An important feature in a loop. A check to see whether the loop is completed. |
|
|
Term
|
Definition
Lists specific input numbers that programmers would typically expect a user to enter, and the perfect oupput values for those inputs. Included in the problem statement. |
|
|
Term
|
Definition
Makes sure that as long as you have 3G or 4G signal, your computer can access the internet, even if there is no WiFi. Several phones offer this capability. You connect your phone to the computer by Bluetooth, and it provides internet to the computer. Some wireless ISPs will charge extra for tethering. |
|
|
Term
Third-generation language (3GL) |
|
Definition
A category of programming language. Uses symbols and commands to help programmers tell the computer what to do. Easier for humans to read and remember. Includes BASIC, FORTAN, COBOL, C/C++, and Java. Symbols describe commands to the CPU. |
|
|
Term
|
Definition
The speed of data transfer that is achieved. Always less than or equal to the data transfer rate. Measured in megabits per second (Mbps). |
|
|
Term
|
Definition
A type of virus. Triggered by the passage of time, or on a certain date. Effects range from display of annoying messages, to the reformatting of the hard drive causing complete data loss. |
|
|
Term
|
Definition
tivo.com
Software that lets you transfer shows recorded on TiVo to your computer or portable devices. |
|
|
Term
|
Definition
Used in ring topology. Data is passed using a special data packet called a token. Originally had transfer rates of either 4 Mbps or 15 Mbps, more recently up to 100 Mbps. |
|
|
Term
|
Definition
A method for creating an algorithm. A systematic approach in which a problem is broken into a series of high-level tasks. The same strategy is used repeatedly, breaking each task into successively more detailed subtasks. |
|
|
Term
|
Definition
A website where you can keep up with the rankings of supercomputers, as models are deployed or upgraded. |
|
|
Term
|
Definition
Concentric circular sections of a platter. |
|
|
Term
|
Definition
Electrical switches built on layers of silicon. Smaller than vacuum tubes, produce little heat, and can be quickly switched on and off. Less expensive than vacuum tubes. |
|
|
Term
|
Definition
A component of the network adapters of a wireless Ethernet network. Translates electronic data into radio waves, and broadcasts them to other network nodes, and receives signals from other networks. |
|
|
Term
|
Definition
Establishes communication channels between nodes. The media used depends on the requirements of the network, and its users. Wired or wireless. |
|
|
Term
|
Definition
A program that appears to be something useful or desireable, such as a game or screensaver. While it runs it does something malicious in the background without your knowledge. Enables hackers to use many computers at the same time. Often runs a backdoor program or rootkit. |
|
|
Term
|
Definition
A type of cable in a wired network. Made of copper wires twisted around each other, surrounded by a plastic jacket. Normal telephone cable is twisted-pair cable. Includes UTP. |
|
|
Term
|
Definition
A type of computing device. Has a traditional OS, such as Windows or OS X. Some have non-touch screens, and all have full-sized keyboards, and have a full quad-core Intel i5 or k7. The screen is 13 - 15 inches. There is 125 - 500 GB of storage. Standard version of software may run, such as Microsoft Office. Includes the MacBook Air. |
|
|
Term
|
Definition
A type of speaker. Uses internal power. |
|
|
Term
|
Definition
An encoding scheme created for languages that require more than 256 characters. Uses 16 bits for each character. Represents over 96,000 unique character symbols. Has symbols from English, Tibetan, Tagalog, Canadian Aboriginal syllabics, and other languages. It is anticipated that it will replace ASCII as the standard for character formatting code. |
|
|
Term
|
Definition
unity3d.com
A free program that enables you to create video games. |
|
|
Term
Unshielded twisted-pair cable (UTP) |
|
Definition
A type of twisted-pair cable used for networks. Composed of four pairs of wires twisted around each other, to reduce electrical interference. The most popular transmission media for wired Ethernet networks. Can be bought in varying lengths with Ethernet connectors attached. Includes cat 5E, cat 6, and cat 6A cable. |
|
|
Term
|
Definition
A website that lets you quickly broadcast videos as they are captured to a live internet audience. |
|
|
Term
|
Definition
Fits into a USB port on a device, allowing you to access 3D or 4G networks for mobile broadband. Requires a service plan. Used for devices such as iPad, Kindle Fire, Chromebook, and some laptops. |
|
|
Term
|
Definition
ustream.tv
A webcasting site that delivers digital videos. |
|
|
Term
|
Definition
The earliest generation of electronic computers. Act as electrical switches by allowing or blocking the flow of electrical current. Take up a lot of space, produce a lot of heat, and burn out frequently. |
|
|
Term
|
Definition
Each input and output item that the program manipulates. Needs to be announced early in the program so that memory space can be set aside. |
|
|
Term
|
Definition
Tells the operating system that the program needs to allow storage space on the RAM. |
|
|
Term
|
Definition
A subset of Visual Basic. Used to introduce dynamic decision making into web pages. A web technology. Similar in syntax to Visual Basic. Has classes that represent buttons, drop-down lists, and other web page components. Creates code that lives on the client machine and adds interaction to web pages. |
|
|
Term
|
Definition
versaforward.com
An email forwarding service that screens email messages, and forwards you only those you designate to be okay to accept. |
|
|
Term
|
Definition
Analog versions are 8-mm, VHS, and Hi8 camcorders, with video stored on film tapes. Digital versions are HD digital video cameras, with video stored as digital files, distributed on DVD, Blue-ray disks, or streamed. |
|
|
Term
|
Definition
Video adapter
An expansion card that is installed inside the system unit. Translates binary data into images viewed on the monitor. Has video memory. Ports include DVI, HDMI, and DisplayPort. |
|
|
Term
|
Definition
The RAM on a video card. The amount of memory affects resolution and how smoothly the system can render video. Most laptops have 1 GB of video memory, but can be as high as 3 GB. Includes GDDR5. Without it, the computer would run out of memory, and the system would crash. |
|
|
Term
|
Definition
vimeo.com
An internet community that delivers digital videos. |
|
|
Term
|
Definition
A computer program that attaches itself to another program, and attempts to spread to other computers when files are exchanged. Creating and disseminating computer viruses is a type of cybercrime. Some viruses cause minor annoyances, and others cause destruction or theft of data. Many are designed to gather sensitive information such as credit card numbers. Includes boot-sector viruses, logic bombs, time bombs, worms, scripts, macro viruses, email viruses, and encryption viruses. Classified into polymorphic, multipartite, and stealth viruses. |
|
|
Term
Virus and spyware protection |
|
Definition
An item on the computer security checklist. Antivirus and anti-spyware software should be installed on all deviecs, configured to update itself automatically and regularly, and set to scan your device on a regular basis. |
|
|
Term
|
Definition
A portion of virus code that is unique to particular viruses. Detected by antivirus software scans when they are opened or executed. |
|
|
Term
|
Definition
The programming language used to build a wide range of Windows applications. Simple, quick interface, and easy to learn and use. Has drag-and-drop interface. designed to build object-oriented applications for Windows, the web, and mobile devices. Used in prototype development and for designing graphical user interfaces. |
|
|
Term
Visual programming languages |
|
Definition
Use graphical blocks to represent control elements and variables. Programming consists of clicking together these blocks to define program behaviour. Includes Scratch and App Inventor. |
|
|
Term
Voice over internet protocol (VoIP) |
|
Definition
A fully digital phone service that uses standard internet connections. Capable of making long-distance calls. |
|
|
Term
|
Definition
When the computer is powered off, the data is lost. Incldues RAM. |
|
|
Term
|
Definition
A job in web development. Generate words and images that appear on the web. Includes journalists, writers, editors, marketing personnel, video producers, graphic designers, and animators. |
|
|
Term
|
Definition
A high growth IT job. Median pay is $62,500. Ten year growth rate is 20%. Total new jobs are 28,500. |
|
|
Term
|
Definition
A job in web development. Build web pages to deploy materials web content creators develop. |
|
|
Term
|
Definition
Hosts a website available through the internet. Runs specialized software that enables them to host web pages. Connected to the communications server for internet access. |
|
|
Term
|
Definition
A job in information systems. Install, configure, and maintain web servers, ensuring the company has internet connectivity at all times. |
|
|
Term
|
Definition
Programs that websites use to make information available from other websites. Provide a standard way for software to interact. |
|
|
Term
|
Definition
webmonkey.com
A website that has a good HTML tutorial, and includes the major tags that can be used to create HTML and XHTML documents. |
|
|
Term
|
Definition
Ethical hacker
A type of hacker. Breaks into systems for non-malicious reasons, such as to test system security vulnerabilities, or expose undisclosed weaknesses. |
|
|
Term
Whole-house surge protector |
|
Definition
Functions like a surge protector, but protects all electrical outlets in a house. An electrician is needed to install it, and it can cost up to $500. |
|
|
Term
|
Definition
A type of network. Spans large physical distances. The internet is the largest WAN, covering the globe. A collection of LANs, each connected by telecommunication lines. |
|
|
Term
|
Definition
wififreespot.com
A website that can help you locate free WiFi hotspots wherever you are planning to go. |
|
|
Term
|
Definition
A 64-bit program. Recommended to have 2 GB of RAM to run this program. Uses 20 GB of hard drive space. |
|
|
Term
|
Definition
.wmv
A file format for digital video. A Microsoft file format, recognized by Windows Media Player, included with the Windows OS. |
|
|
Term
|
Definition
An operating system used in smartphones. Manufactured by Microsoft. |
|
|
Term
|
Definition
Helps solve the problem of the system not responding. |
|
|
Term
Windows Service Pack Center |
|
Definition
windows.microsoft.com/en-US/windows/downloads/service-packs
A website where you can make sure you have the latest service packs for your Windows OS. |
|
|
Term
|
Definition
A form of P2P network. Uses Ethernet protocol as the means by which nodes on the network communicate. Transmission media is cable. Secure because they can be accessed only from within the network. |
|
|
Term
Wireless Ethernet network |
|
Definition
A form of P2P network. Transmission media is radio waves. In Canada they are mostly WiFi networks. The network adapter contains a transceiver. Possible to encrypt information so that it will be useless to hackers if stolen. |
|
|
Term
|
Definition
The standard for wireless Ethernet networks. The standard is 802.11. Uses radio waves to connect computing devices to wireless networks and the internet. Used in businesses and in most homes. Generally have decreased throughput compared to wired networks. To secure a wireless network, change the SSID, disable SSID broadcast, change the default password on the router, turn on security protocols, create a passphrase, implement media access control, limit the signal range, and apply firmware upgrades. |
|
|
Term
|
Definition
A form of broadband. Available via WiFi radio waves. |
|
|
Term
Wireless internet service provider |
|
Definition
Wireles ISP
Provides internet connection to smartphones outside of WiFi hotspots, through 3G or 4G technology. Phone companies often double as wireless ISPs. |
|
|
Term
|
Definition
A device that amplifies wireless signals to extend to parts of the home experiencing poor connectivity. |
|
|
Term
Women in Technology International (WITI) |
|
Definition
witi.com
A resource for women in IT. A global trade association for tech-savvy, professional women. |
|
|
Term
|
Definition
The number of bits a computer can work with at a time. A 64-bit proecssor can process more information faster than a 32-bit processor. |
|
|
Term
World Wide Web Consortium |
|
Definition
w3.org
A website that has a good HTML tutorial, and includes the major tags that can be used to create HTML and XHTML documents. |
|
|
Term
|
Definition
A type of virus, but not technically a virus. Worms take advantage of file transport methods, such as email or network connections. A worm works independently of the host file execution, and is more active in spreading itself. May attack peripheral devices such as routers. Can generate a lot of data traffic as it tries to spread, which can slow the internet. |
|
|
Term
|
Definition
A computer that is being controlled by a hacker through a backdoor program or rootkit. Often used to launch denial-of-service attacks on computers. |
|
|