Term
|
Definition
| CPU's actually do improve over time. |
|
|
Term
|
Definition
| fastt transer port that makes it is easy to add an external hard drive for more storage space |
|
|
Term
|
Definition
| add a solid state drive, eSATA, and FireWire ports, and other capabilities to your system. |
|
|
Term
|
Definition
| process used to determine if a a computer system has the right hardware. To do this, you look at your computer's subsystems, see what they do, and check how they perform. |
|
|
Term
|
Definition
| complete processing section from a CPU embedded into one physical chip. |
|
|
Term
|
Definition
| How quickly the process can work. |
|
|
Term
|
Definition
| provides quicker processing of information by enabling a new set of instructions to start executing before the previous set has finished. |
|
|
Term
|
Definition
| a form of random access memory that is more accessible to the CPU than regular RAM. |
|
|
Term
|
Definition
| connects the processsor (CPU) in your computer to the system memory. |
|
|
Term
|
Definition
| measurement used to compare CPU performance between processors. |
|
|
Term
|
Definition
| the percentage of time that your CPU is working. |
|
|
Term
| Random access memory (RAM) |
|
Definition
| your computer's temporary storage space. |
|
|
Term
|
Definition
| information storage that is only available when the computer is turned on; it is lost when the computer is off. |
|
|
Term
|
Definition
| permanent storage of instructions and data when the computer is powered off. |
|
|
Term
| Memory Modules (Memory cards) |
|
Definition
| small circuit boards that hold a series of RAM chips and fit into special slots on the motherboard. |
|
|
Term
|
Definition
| the amount of RAM that is actually sitting on memory modules in your computer. |
|
|
Term
|
Definition
| the memory that your operating system uses. |
|
|
Term
|
Definition
| Has the largest storage capacity of any storage device with storage capacities exceeding 2 terabytes. |
|
|
Term
|
Definition
| the time it takes a storage devide to locate its stored data and make it available for processing; hard drive has the fastest access time. |
|
|
Term
|
Definition
| uses the same kind of memory that flash drives use, but whereas flash drives have access times of about 1 ms, SSD drives can reach data in only a tenth of that time. |
|
|
Term
|
Definition
| the thin plates of metal stacked on a spindle; when data is saved to a hard drive platter, a pattern of magnetized spots is created on the iron oxide coating of each platter. |
|
|
Term
| Serial Advanced Technology Attachment (Serial ATA) |
|
Definition
| hard drives that use much thinner cables, and can transfer data more quickly than IDE drives. |
|
|
Term
|
Definition
| type of optical drive inclusding CD's and DVD's. Saved on established tracks and sectors, just like on a hard drive. |
|
|
Term
|
Definition
| read-only optical discs, meaning you can't save any data onto them. |
|
|
Term
|
Definition
| third format of DVD that you can record, erase, and rewrite on. |
|
|
Term
|
Definition
| moves from the outer edge of the spinning platter to the center, as frequently as 50 times per second, to retrieve(read) and record(write) the magnetic data to and from the hard drive platter. |
|
|
Term
|
Definition
| the time it takes for the read/write heads to move over the surface of the disk, moving to the correct track. Access time is mostly the sum of two factors: seek time and latency. |
|
|
Term
|
Definition
| waiting time for the correct sector to spit to the read/write head after the read/write head loactes the correct tract. |
|
|
Term
|
Definition
| a stoppage of the hard drive that often results in data loss. |
|
|
Term
| Video Card (video adapter) |
|
Definition
| an expansion card that is installed inside your systen unit to translate binary data into the images you view on your monitor. |
|
|
Term
|
Definition
|
|
Term
| Graphics Processing Unit (GPU) |
|
Definition
| performs the same kind of computational work that a CPU performs except a GPU is specialized to handle 3-D graphics and image and video processing with incredible efficiency and speed. |
|
|
Term
|
Definition
| defines the color quality of the image displayed. |
|
|
Term
|
Definition
| an expansion card that attaches to the motherboard inside your system unit. |
|
|
Term
|
Definition
| advances sound reproduction beyond traditional stereo sound(where the human ear perceives sounds as coming from the left or the right of the performance area) and is better at convincing the humar ear that sound is omnidirectional, meaning you can't tell from which direction the sound is coming. |
|
|
Term
|
Definition
| a tyupe of audio processing that makes the listener experience sound as if it were coming from all directions. |
|
|
Term
|
Definition
| simply two or more computers that are conected via software and hardware so that they can communicate with each other. |
|
|
Term
|
Definition
| each device connected to a network; can be a computer, peripheral (printer), or a game console, a digital video record, or a communications device. |
|
|
Term
|
Definition
| involves tasks such as: 1) installing new computers and devices, 2) monitoring the network to ensure it is performing efficiently, 3) updating and installing new software on the network, 4) configurings, or setting up proper security for a network. |
|
|
Term
|
Definition
| contains two different types of networks: clients and servers. |
|
|
Term
|
Definition
| a computer on which users accomplish specific tasks (such as construct spreadsheets) and make specific requests (such as printing a file). |
|
|
Term
|
Definition
| the computer that provides information or resources to the client computers on the network. |
|
|
Term
|
Definition
| designed to store media, share media across the network, and back up files on computers connected to the network. |
|
|
Term
|
Definition
| a network in which the nodes are located within a small geographic area. |
|
|
Term
|
Definition
| a network located in a home. |
|
|
Term
|
Definition
| made up of LANs connected over long distances. |
|
|
Term
| Metropolitan Area Network (MAN) |
|
Definition
| when a network is designed to provide access to a specific geographic area, such an an entire city. |
|
|
Term
|
Definition
| establishes a communications channel between the nodes on a network and can either be wireless or wired. |
|
|
Term
|
Definition
| Made up of copper wires that are twisted around each other and surrounded by a plastic jacket. |
|
|
Term
|
Definition
| consists of a single copper wire surrounded by layers of plastic. |
|
|
Term
|
Definition
| made up of plastic or glass fibers that transmit data at extremely fast speeds. |
|
|
Term
| Data Transfer Rate (bandwidth) |
|
Definition
| the maximum speed at which data can be transmitted between two nodes on a network. |
|
|
Term
|
Definition
| the actual speed of data transfer that is achieved. |
|
|
Term
|
Definition
| devices connected to or installed in network nodes that enable the nodes to communicate with each other and to access the network. |
|
|
Term
| Network Interface Card (NIC) |
|
Definition
| network adapter inside the device; desktop and notebook computers and some peripherals |
|
|
Term
| Network Navigation Devices |
|
Definition
| facilitate and control the flow of data through a network. |
|
|
Term
|
Definition
| data sent over transmission in bundles; a packet is the bundle |
|
|
Term
|
Definition
| transfers packets of data between two or more networks. |
|
|
Term
|
Definition
| a "traffic cop" on the network; Switches recieve data packets and send them to their intended nodes on the same network. |
|
|
Term
| Network Operating System (NOS) |
|
Definition
| software that handles requests for information, Internet access, and the use of peripherals for the rest of the network nodes. |
|
|
Term
|
Definition
| so named becuase it uses the Ethernet protocol as the means by which the nodes on the network communicate. |
|
|
Term
|
Definition
| current standard that governs wireless networking for Ethernet networks. |
|
|
Term
|
Definition
| what the 802.11 standard is also known as. |
|
|
Term
|
Definition
| a device that translates the electronic data that needs to be sent along the network into radio waves and then broadcasts these radio waves to other network nodes. |
|
|
Term
| Multiple Input Multiple Output (MIMO) |
|
Definition
| devices that use this technology are designed to use multiple antennas for transmitting and receiving data. |
|
|
Term
| Unshielded twisted-pair (UTP) cable |
|
Definition
| most popular transmission media option for wired Ethernet networks. |
|
|
Term
|
Definition
| designed to achieve data transfer rates that support a gigabit Ethernet network; it is probably the best choice for home networking cable. |
|
|
Term
| Network-Ready Device (Internet Ready) |
|
Definition
| can be connected directly to a router instead of to a computer on the network. |
|
|
Term
| Network Attached Storage (NAS) devices |
|
Definition
| specialized computing devices designed to store and manage your data. |
|
|
Term
|
Definition
| main function is that it has easy access to the Internet, social networking sites, e-mail, video, news, and entertainment. An example is the iPad. |
|
|
Term
|
Definition
| a hardware or software solution that helps shield your network from prying eyes. |
|
|
Term
|
Definition
| someone who breaks into a computer systems to create mischief or steal valuable information. |
|
|
Term
|
Definition
| connecting to a wireless network(other than your own) without the permissio of the owner. |
|
|
Term
| Service Set Identifier (SSID) |
|
Definition
| wireless network name to identify it. |
|
|
Term
| Media Access Control (MAC) |
|
Definition
| serial number assigned to a network by the manufacturer; number printed on the network adapter. |
|
|
Term
|
Definition
| the read-only memory that has software written on it on your router. |
|
|
Term
|
Definition
| a device that amplifies your wireless signal to get it out to parts of your home thatare experiencing poor connectivity. |
|
|
Term
| Analog waves (continuous waves) |
|
Definition
| the light waves that we percieve as images. |
|
|
Term
|
Definition
| the use of equipment to provide voice communications over a distance; recently shifted from an analog science to a digital one. |
|
|
Term
|
Definition
| has evolved from a clunky, boxlike device to a compact, fully featured communication and information storage device. |
|
|
Term
|
Definition
| cell phones that offer Internet access, text messaging, personal information management features, voice recording, GPS services, and digital image and video capture. |
|
|
Term
| Analog-to-digital converter chip |
|
Definition
| converts your voice's sound waves into digital signals. |
|
|
Term
|
Definition
| included in the cell phone to handle the compression work. |
|
|
Term
|
Definition
| a large communications tower with antennas, amplifiers, recievers, and transmitters. |
|
|
Term
|
Definition
| process of updating your data so that the files on your cell phones and computer are the same. |
|
|
Term
| Short Message Service (SMS) |
|
Definition
| text messaging; a technology that allows you to send short text messages over mobile networks. |
|
|
Term
| Multimedia Message Service (MMS) |
|
Definition
| allows you to send messages that include text, sound, images, and video clips to other phones or e-mail addresses. |
|
|
Term
| Wireless Internet Service Provider (Wireless ISP) |
|
Definition
| internet provider required to connect your smartphone to the internet. |
|
|
Term
|
Definition
| software that provides a web browser that is optimized to display Web content effectively on the small screen. |
|
|
Term
| Wireless Markup Language (WML) |
|
Definition
| specially designed text for wireless devices. |
|
|
Term
| Voice over Internet Protocol (VoIP) |
|
Definition
| a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls. |
|
|
Term
|
Definition
| specifies the number of times the analog wave is measured each second. |
|
|
Term
| Portable media players (PMPs) |
|
Definition
| small portable devices (such as an iPod) that enable you to carry your MP3 files around with you. |
|
|
Term
|
Definition
| a type of nonvolatile memory |
|
|
Term
| Peer-to Peer (P2P) sharing |
|
Definition
| process of users transferring files between computers. |
|
|
Term
|
Definition
| global positioning system devices that have dropped drammatically in price and size. |
|
|
Term
|
Definition
| a term for various licensing plans that enables copyright holders to grant certain rights to the work while retaining other rights. |
|
|
Term
|
Definition
| based on the original work(one of your photos) but is modified in some way. |
|
|
Term
|
Definition
| runs a fully operating system but weighs in at 2 pounds or less. |
|
|
Term
|
Definition
| another type of very light, very portable device. |
|
|
Term
|
Definition
| belief that "computing will be woven into the fabric of everyday life until it is indistinguishable from it." |
|
|
Term
|
Definition
| criminal action perpetrated primarily through the use of a computer. |
|
|
Term
|
Definition
| individuals who use computers, networks, and the Internet to perpetrate crime. |
|
|
Term
|
Definition
| a virus that is triggered when certain logical conditions are met-such as opening a file or starting a program a certain number of times. |
|
|
Term
|
Definition
| a virus that is triggered when certain logical conditions are met-such as opening a file or starting a program a certain number of times. |
|
|
Term
|
Definition
| slightly different from a virus in that a worm attempts to travel between systems through network connections to spread an infection. |
|
|
Term
|
Definition
| software specifically designed to detect viruses and protect your computer and files from hard, is a good start. |
|
|
Term
|
Definition
| a series of commands that is executed without your knowledge. |
|
|
Term
|
Definition
| virus that attaches itself to a document (such as a Word or Excel file) that uses macros. |
|
|
Term
|
Definition
| uses the address book in the victim's e-mail system to distribute the virus. |
|
|
Term
|
Definition
| infect your computer, they run a program that searches for common types of data files and compresses them using a complex encryption key that rends your files unusable. |
|
|
Term
|
Definition
| changes its own code (or periodically rewrites itself) to avoid detection. |
|
|
Term
|
Definition
| designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. |
|
|
Term
|
Definition
| temporarily erase their code from the files where they reside and then hide in the active memory of the computer. |
|
|
Term
|
Definition
| portion of the virus code that is unique to a particular computer virus. |
|
|
Term
|
Definition
| if a software detects a virus they stop the execution of the file and virus and notifies you that it has detected a virus. |
|
|
Term
|
Definition
| the antivirus software records key attributes about files on your computer and keeps these statistics in a safe place on your hard drive. |
|
|
Term
|
Definition
| attack your computer by downloading harmful software onto your computer; common and affects almost 1 in 1,000 Web pages. |
|
|
Term
|
Definition
| a hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). |
|
|
Term
|
Definition
| hackers who use their knowledge to destroy information or for illegal gain. |
|
|
Term
|
Definition
| amateur hackers; they don't create the programs they use to hack into computer systems, instead they use tools created by skilled hackers that enable unskilled novices to wreak the sam havoc as professional hackers. |
|
|
Term
|
Definition
| small pieces that travel through the internet |
|
|
Term
|
Definition
| computer program deployed by hackers that looks at each packet as it travels on the internet-not just those that are addressed to a particular computer, but all packets. |
|
|
Term
|
Definition
| characterized by someone using personal information about you to assume your identity for the purpose of defrauding others. |
|
|
Term
|
Definition
| program that appears to be something useful or desirable(like a game or a screen saver), but while it runs does something malicious in the background without your knowledge. |
|
|
Term
|
Definition
| allows hackers to take almost complete control of your computer without your knowledge. |
|
|
Term
|
Definition
| a computer that a hacker controls through a backdoor program. |
|
|
Term
| Denial-of-services (DoS) attack |
|
Definition
| legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. |
|
|
Term
| Distributed Denial-of-service (DDoS) attack |
|
Definition
| launces DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time. |
|
|
Term
|
Definition
| large group of software programs that runs autonomously on zombie computers. |
|
|
Term
|
Definition
| virtual communications gateways or paths that allow a computer to organize requests for information from other networks or computers. |
|
|
Term
|
Definition
| program or hardware device designed to protect computers from hackers. |
|
|
Term
|
Definition
| firewall specifically designed for hom networks. |
|
|
Term
|
Definition
| firewalls can be configured so that they filter out packets sent to specific logical ports. |
|
|
Term
| Internet Protocol Address (IP address) |
|
Definition
| every computer connected to the Internet has a unique address |
|
|
Term
|
Definition
| unwanted piggyback program that usually downloads with other software you want to install from the Internet. |
|
|
Term
|
Definition
| monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information. |
|
|
Term
| Cyberloafing or Cyberslacking |
|
Definition
| doing anything with a computer, while you are being paid to do your job, that is not an approved function of your job. |
|
|
Term
|
Definition
| an option you can select in your e-mail account that places known suspected spam messages into a folder other than your inbox. |
|
|
Term
|
Definition
| small text files that some Web sites automatically store on your computer's hard drive when you visit them. |
|
|
Term
|
Definition
| copies of files that you acn use to replace the originals if they are lost or damaged. |
|
|
Term
|
Definition
| used to install software and usually comes on CDs or DVDs or is downloaded from the Web. |
|
|
Term
|
Definition
| file you have created or purchased. |
|
|
Term
| incremental backup (partial backup) |
|
Definition
| involved backing up only files that have changed or been created since the last backup was performed. |
|
|
Term
| Image Backup (system backup) |
|
Definition
| means that all system, application, and data files are backed up, not just the files that changed. |
|
|
Term
|
Definition
| any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
|
|
Term
|
Definition
| involves creating a scenario that sounds ligitimate enough that someone will trust you. |
|
|
Term
|
Definition
| lures Internet users to reveal personal information such as credit card number, Social Security numbers, or other sensitive information that could lead to identity theft. |
|
|
Term
|
Definition
| when malicious code is planted on your computer that alters your browser's ability to find Web addresses. |
|
|
Term
|
Definition
| an attempt to make someone believe something that is untrue. |
|
|
Term
|
Definition
| hoaxes that become so well known that they are accepted by society as true events even though they are false. |
|
|
Term
|
Definition
| device that protects your copmuter against power surges. |
|
|
Term
| Whole-house surge protector |
|
Definition
| function like other surge protectors, but they protect all electrical devices in the house. |
|
|
Term
| Uniterruptible Power Supply (UPS) |
|
Definition
| device that contains surge protection equipment and a large battery. |
|
|
Term
|
Definition
| optional data self-destruct modes that destroy data on both internal memory and external data cards if repeated attempts are made to crack passwords. |
|
|