Discovering Computers Final Exam

Only available on StudyMode
  • Download(s) : 325
  • Published : November 21, 2012
Open Document
Text Preview
Computer Concepts – Final Exam Study Guide
Smart Card| Stores data on a thin microprocessor embedded in the card| | Protocol | http:// | | |
Virus | a potentially damaging computer program affects a computer negatively by altering the way the computer works | | | Database | a collection of data organized in a manner which allows access, retrieval, and use of data | | | Wiki | a collaborative Web site which allows users to add to modify, or delete the Web site content via their Web browser | | | software suite | a collection of individual programs available together as a unit , eg. MS Office 2010 | | | Plug and Play | automatically configures new devices as you install them | | | Memory Cache | speeds the processes of the computer because it stores frequently used instructions and data | | | Domain Name | the text version of an IP address | | |

Non-Impact (Printer) | forms characters and graphics on a piece of paper without actually striking the paper | | | Internet | a worldwide collection of networks linking millions of businesses, government agencies, educational institutions, and individuals | | | Voice Input | the process of entering input by speaking into a microphone | | | Memory Module | where RAM chips usually reside | | |

Router | connects multiple computers or other routers together and transmits data to its correct destination on a network | | | Computer Security Plan | should Identify all information assets of an organization, Identify all security risks may cause an information asset loss, For each risk, identify the safeguards exist to detect, prevent, and recover from a loss | | | Terabyte | (TB), # bytes: 1T, 500, 000, 000 | | |

Nanoseconds | 1 Billionth of a second | | |
Format a Document | Change appearance; font , font size | | | Graphical User Interface (GUI) | you interact with menus and visual images | | | Java | is an object-oriented programming language developed by Sun Microsystems | | | Programmers write scripts, applets, servlets, or ActiveX controls using a variety of languages | JavaScript, Perl, PHP, Rexx, Tcl, VBScript | | | Cold Boot | Turning on a computer has been powered off completely | | | Firmware Chips | permanently written data, instructions, or information | | | Proxy Server | a server outside a company’s network which controls the communications into the company’s network | | | Operating System | a set of programs which coordinates all the activities among computer hardware devices. | | | Developing a document | Create a document, Edit a document, Format a document | | | Microfilm | store microscopic images of documents on a roll or sheet film | | | Spyware | is a program placed on a computer without the user’s knowledge secretly collects information about the user | | | Embedded Computer | is a special-purpose computer which functions as a component in a larger product | | | Web pages | worldwide collection of electronic documents | | | System software | consists of the programs which control or maintain the operations of the computer and its devices | | | Transmitted Information | Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises | | | Read-only memory (ROM) | refers to memory chips storing permanent data and instructions | | | Disk Defragmenter | reorganizes files and unused space on a computer’s hard disk so the operating system accesses data more quickly and programs run faster | | | Operating systems often provide users with the capability of | managing files, searching for files, viewing images, securing a computer, uninstalling programs, cleaning up disks, defragmenting disks, diagnosing problems, backing up files and disks, setting up screen savers | | | Social Engineering | is defined as gaining unauthorized access or...
tracking img