You are on page 1of 6

Copy of Copy of Table1

ID

58 A computer is an electronic device that: ___________


59 TYPES OF COMPUTERS & EXAMPLES
60 A notebook is: _______
61 allows the PC to communicate with a mainframe or a supercomputer
62 processes little or no data on its own
63 Physical Components
64 Programs or lists of instructions
65 COMPONENTS OF COMPUTER SYSTEM (DAPSMIOPM)
66 Microprocessors speed is determined by:___________________
67 Factors that influence a monitors quality:__________________
68 manipulation of data into a more useful form.
69 a named collection of stored data.
70 contains the instructions that tell a computer how to perform a specific task
71 is created by a user, usually with software.
72 _____bits is 1 byte
73 ANSI: ____________________________
74 ASCII: ____________________________
75 set of storage locations on the motherboard.
76 5 TYPES OF MEMORY
77 volatile memory and temporary memory
78 Special high-speed memory chip on the motherboard or CPU
79 Stores frequently and recently accessed data and commands.
80 an extra memory that simulates RAM if more is needed.
81 the permanent storage location for a set of instructions the computer uses.
82 semi-permanent information about where essential software is stored.
83 Store data as magnetized particles on mylar, which is then coated on both sides
with a magnetic oxide coating
84 flat circles of magnetic oxide-coated mylarenclosed in a hard plastic case;
almost obsolete
85 several magnetic oxide covered metal platters usually sealed in a case inside
the computer
86 inexpensive, slow, archival storage for large companies who need to back up
large quantities of data.
87 polycarbonate discs coated with a reflective metal on which data is recorded
using laser technology as a trail of tiny pits or dark spots in the surface of the
disc

Copy of Copy of Table1


ID

88 TYPES OF OPTICAL STORAGE DEVICES AND MEANING


89 small, portable cards encased in hard plastic to which data can be written and
rewritten
90 popular type of flash memory
91 is the transmission of text, numeric, voice, or video data from one computer to
another.
92 4 components of essential communications
93 are the rules that establish the transfer of data between sender and receiver.
94 handles the transmission protocol between a computer and its peripheral
devices
95 data path between the microprocessor, RAM, and the peripherals along which
communication travels
96 transmits data eight bits at a time
97 provides an interface for one or more peripheral devices at the same port
98 a high-speed serial port which allows multiple connections at the same port
99 usually includes jacks for speakers and a microphone, which are designed to
work with a MIDI (Musical Instrument Digital Interface, pronounced middy)
card
10 used to connect to another computer, a LAN, a modem, or sometimes directly
0 to the Internet; allows data to be transmitted at high speeds.
10 establishes the communications protocols that will be observed on the network
1
10 creates a communications channel between the computer and the network
2
10 connects one computer to other computers and peripheral devices
3
10 a network without a server
4
10 a network with a server that acts as the central storage location
5
10 acts as the central storage location for programs
6
10 computers on a network that are dependent on a server
7
10 a personal computer that is connected to a network
8
10 a personal computer that is not connected to a network
9
11 any device connected to the network

Copy of Copy of Table1


ID

0
11 computers and peripherals that use high-frequency radio waves instead of wires
1 to communicate and connect in a network
11 computers and peripherals located close to each other
2
11 one or more than one LAN connected together
3
11 WIFI is established by?
4
11 a network that allows two or more devices located close to each other to
5 communicate or to connect a device to the Internet
11 allows computers to connect over many miles to a LAN
6
11 refers to the steps a computer owner takes to prevent unauthorized use of or
7 damage to the computer
11 harmful programs that instruct your computer to perform destructive activities,
8 such as erasing a disk drive
11 describes any program that is intended to cause harm or convey information to
9 others without the owners permission
12 programs contained with other programs that track a computer users Internet
0 usage and send this data back to the company or person that created it
12 software installed with another program usually with the users permission
1
12 prevents other computers on the Internet from accessing a computer and
2 prevents programs on a computer from accessing the Internet without the
computer users permission
12 a device that controls traffic between network components
3
12 the practice of sending e-mails to customers or potential customers of a
4 legitimate Web site asking them to click a link in the e-mail
12 a Web site set up to look like another Web site, but which does not belong to the
5 organization portrayed in the site
12 handle the transmission protocol between a computer and its peripherals
6
12 a category of system software that augment the operating system by taking
7 over some of its responsibility for allocating hardware resources
12 used by a programmer to write computer instructions
8
12 is a software program that controls and runs just about everything on your
9 computer

Copy of Copy of Table1


ID

13 Controls your Computers Hardware


0
13 Runs your Computers Programs
1
13 Allows you to store your information in files and folders in your local disk, just
2 like you store files and folders in a filing cabinet.
13 Takes the headache out of sharing files and printers on a home network
3
13 Speedy access to your favorite picture, songs, websites, and documents.
4
13 A quick (and fun!) new way to resize and compare windows on your desktop
5
13 A suite of great programs in one free download mail, movie maker, photo
6 gallery, etc.
13 Find virtually anything on your PC instantly.
7
13 Better thumbnail previews, easier-to-see icons, and more ways to customize.
8
13 Default user account
9
14 takes up most of the screen
0
14 in the lower-left area, which opens the Start menu.
1
14 across the bottom, which identifies programs that are running or pinned to it.
2
14 which holds icons of running system programs.
3
14 where ad-on desktop applications, slideshow & desktop gadgets are placed
4
14 shows where the mouse is pointing.
5
14 by moving the mouse until the tip of the pointer is on top of the object.
6
14 to point an object you want to select and quickly press and release the mouse
7 button.
14 to point at an object you want to select and press an release the mouse button
8 twice in rapid succession.
14 Open a context menu, which allows you to do things specific to an object, by
9 right-clicking it.

Copy of Copy of Table1


ID

15 to point at an object you want to move, then press and hold the mouse button
0 while moving the mouse. You will drag object as you move the mouse.
15 the thing that looks like a typewriter
1
15 Examples of Navigation keys
2
15 shows two opposing arrows pointing left and right.
3
15 located where the carriage return key is on a standard typewriter.
4
15 the wide key centered at the bottom of the keyboard.
5
15 It often allows you to escape from an unfamiliar territory.
6
15 Its near the lower-left corner of the keyboard. It also shows the word Start.
7
15 Shortcut of Help
8
15 Examples of Modifier Keys
9
16 contains the active tasks, which are icons and titles of the programs that are
0 available or running on the computer or folders that are open.
16 contains the icons of special programs and system features, as well as the time
1 and date.
16 may contain the name of the program or folder in the window.
2
16 displays the complete address (minus the file name) of what is being displayed
3 in the subject pane.
16 contains tools related to the contents of the window.
4
16 decreases the size of the window so that you see it only as a task in the task
5 bar.
16 increases the size of the window so that it fills the screen.
6
16 shuts down and closes the program, folder, or file in the window.
7
16 separates the window from the desktop.
8
16 displays the detailed information about the object that is selected in the subject
9 pane

Copy of Copy of Table1


ID

17 allows the window to be sized diagonally by dragging with the mouse,


0 increasing and decreasing the windows height and width.
17 displays the object selected in the subject pane.
1
17 displays the principal subject of the window, such as files, folders, programs,
2 documents, or images.
17 contains the scroll arrows and scroll button and allows you to move the contents
3 of the pane within the window.
17 provides links to the most commonly used folders related to the user who is
4 logged on, as well as an optional hierarchical list of disks and folders on the
computer.
17 move the window contents in small increments in the direction of the arrow.
5
17 shows whats hidden on the desktop
6
17 display recent files and program options.
7
17 shows what is open in a program.
8
17 minimizes other open windows.
9
18 resizes and positions windows.
0
18 closes all active programs and network connections and logs off all users so that
1 information is lost.
18 leaves all active programs, network connections, and your user account active
2 but displays the Welcome screen, but will ask you a password to resume.
18 leaves all active programs, network connections, and your user account active
3 and in memory but also saves the state of everything on disk.
18 closes all active programs and network connections and logs off all users so that
4 no information is lost, and turns off the computer.
18 closes all active programs, network connections, and your user account but
5 leaves Windows 7 and the computer running so another person can log on.
18 leaves all active programs, network connections, and your user account active
6 but hidden while you let another person use the computer.

You might also like