You are on page 1of 23

MODULE 1

 A computer is an electronic device, operating under the control of instructions stored in its own memory
 laptop is a widely used type of computer.
 server provides services to other computers or devices on a network.
 A keyboard contains keys you press to enter data and instructions into a computer or mobile device
 A pointing device is an input device that allows a user to control a small symbol on a screen, called the pointer
 A scanner is a light-sensing input device that converts printed text and images into a form the computer can
process
 An output device is any hardware component that conveys information from a computer or mobile device to
one or more people
 A printer is an output device that produces text and graphics on a physical medium, such as paper or other
material
 A display is an output device that visually conveys text, graphics, and video information
 Speakers allow you to hear audio such as music, voice, and other sounds
 Memory consists of electronic components that store instructions waiting to be executed and the data needed
by those instructions
 A computer keeps data, instructions, and information on storage media
 A storage device records (writes) and/or retrieves (reads) items to and from storage media
 The Internet is a worldwide collection of computer networks that connects millions of businesses, government
agencies, educational institutions, and individual
 The World Wide Web (or web, for short) is a global library of information available to anyone connected to the
Internet
 The web consists of a worldwide collection of electronic documents, each of which is called a webpage
 A website is a collection of related webpages
 A web server is a computer that delivers requested webpages to your computer or mobile device
 search engine is software that finds websites, webpages, images, videos, news, maps, and other information
related to a specific topic
 An online social network, also called a social networking site, is a website that encourages members in its online
community to share their interests, ideas, stories, photos, music, and videos with other registered users
 Green computing involves reducing the electricity consumed and environmental waste generated when using a
computer
 Software, also called a program, tells the computer what tasks to perform and how to perform them
 A software developer, sometimes called a developer or programmer, is someone who develops programs and
apps or writes the instructions that direct the computer or mobile device to process data into information
 A communications device is hardware capable of transferring items from computers and devices to
transmission media and vice versa
 A network is a collection of computers and devices connected together, often wirelessly, via communications
devices and transmission media

MODULE 2

 The Internet originated as ARPANET (Advanced Research Projects Agency Network) in September 1969
 DSL (digital subscriber line)
 FTTP (Fiber to the Premises)
 A hot spot is a wireless network that provides Internet connections to mobile computers and devices
 An Internet service provider (ISP) is a business that provides individuals and organizations access to the Internet
free or for a fee
 Bandwidth is a measure of the capability of a network to send and receive data
 An IP address is a sequence of numbers that uniquely identifies the location of each computer or device
connected to the Internet or any other network
 A domain name is a text-based name that corresponds to the IP address of a server
 A DNS (Domain Name System) server translates the domain name into its associated IP address
 HTML (Hypertext Markup Language) is a set of symbols that developers use to specify the headings, paragraphs,
images, links, and other content elements that a webpage contains
 A browser is an application that enables users with an Internet connection to access and view webpages on a
computer or mobile device
 Internet-capable mobile devices such as smartphones use a special type of browser, called a mobile browser
 A home page is the first page that a website displays
 Current browsers typically support tabbed browsing
 A webpage has a unique address, called a web address or URL (Uniform Resource Locator)
 A web app is an application stored on a web server that you access through a browser
 A web search engine is software that finds websites, webpages, images, videos, news, maps, and other
information related to a specific topic
 Web publishing is the creation and maintenance of websites
 A graphic is a visual representation of nontext information
 An infographic is a visual representation of data and information, designed to communicate quickly, simplify
complex concepts, or present patterns or trends
 Animation is the appearance of motion created by displaying a series of still images in sequence
 Virtual reality (VR) is the use of computers to simulate a real or imagined environment that appears as a three-
dimensional (3-D) space
 A plug-in, or add-on, is a program that extends the capability of a browser
 Email is the transmission of messages and files via a computer network
 An email program allows you to create, send, receive, forward, store, print, and delete email messages
 An email list is a group of email addresses used for mass distribution of a message
 Internet messaging services, which often occur in real-time, are communications services that notify you when
one or more of your established contacts are online and then allows you to exchange messages or files or join a
private chat room with them
 A chat is a real-time typed conversation that takes place on a computer or mobile device with many other online
users
 A chat room is a website or application that permits users to chat with others who are online at the same time
 An online discussion is an online area in which users have written discussions about a particular subject
 VoIP (Voice over IP) enables users to speak to other users via their Internet connection
 FTP (File Transfer Protocol) is an Internet standard that permits file uploading and downloading to and from
other computers on the Internet
 Netiquette is the code of acceptable Internet behavior users should follow while on the Internet

MODULE 3

 A mobile computer is a portable personal computer, designed so that a user easily can carry it from place to
place
 A personal computer (PC) is a mobile computer or desktop that can perform all of its input, processing, output,
and storage activities by itself and is intended to be used by one person at a time
 A laptop, also called a notebook computer, is a thin, lightweight mobile computer with a screen in its lid and a
keyboard in its base
 A tablet is a thin, lighter-weight mobile computer that has a touch screen
 A handheld computer is a computer small enough to fit in one hand
 A stick computer is a small computer which usually is the same size as, or a little larger than, a USB flash drive
 A desktop, or desktop computer, is a personal computer designed to be in a stationary location, where all of its
components fit on or under a desk or table
 A server is a computer dedicated to providing one or more services to other computers or devices on a network
 Virtualization is the practice of sharing or pooling computing resources, such as servers and storage devices
 Server virtualization uses software to enable a physical server to emulate the hardware and computing
capabilities of one or more servers, known as virtual servers
 A server farm is a network of several servers together in a single location
 A mainframe is a large, expensive, powerful server that can handle hundreds or thousands of connected users
simultaneously
 A terminal is a computer, usually with limited processing power, that enables users to send data to and/or
receive information from a server, or host computer
 A thin client is a terminal that looks like a desktop but has limited capabilities and components
 An ATM (automated teller machine) is a self-service banking terminal that connects to a host computer through
a network
 A self-service kiosk is a freestanding terminal that usually has a touch screen for user interaction
 A supercomputer is the fastest, most powerful computer – and the most expensive
 Cloud computing refers to an environment that provides resources and services accessed via the Internet
 A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator,
a notepad, games, browser, and numerous other apps
 Short Message Service (SMS)
 Multimedia Message Service (MMS)
 A digital camera is a mobile device that allows users to take photos and store the photographed images digitally
 Resolution is the number of horizontal and vertical pixels in a display
 A portable media player is a mobile device on which you can store, organize, and play or view digital media
 A digital media player or streaming media player is a device, typically used in a home, that streams digital media
from a computer or network to a television, projector, or some other entertainment device
 An e-book reader (short for electronic book reader), or e-reader, is a mobile device that is used primarily for
reading e-books and other digital publications
 A wearable device or wearable is a small, mobile computing device designed to be worn by a consumer
 A game console is a mobile computing device designed for single-player or multiplayer video games
 A handheld game device is a small mobile device that contains a screen, speakers, controls, and game console
all in one unit
 Game controllers include gamepads, joysticks and wheels, dance pads, and a variety of motion-sensing
controllers
 An embedded computer is a special-purpose computer that functions as a component in a larger product
 A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device
so that the peripheral device can send data to or receive information from the computer or mobile device
 A connector joins a cable to a port
 USB port, short for universal serial bus port, can connect up to 127 different peripheral devices together with a
single connector
 A surge protector, also called a surge suppressor, uses electrical components to provide a stable current flow
and minimize the chances of an overvoltage reaching the computer and other electronic equipment
 An uninterruptible power supply (UPS) is a device that contains surge protection circuits and one or more
batteries that can provide power during a temporary or permanent loss of power
 A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
 Computer vision syndrome (CVS) is a technology-related health condition that affects eyesight
 Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of
items in the workplace
 Technology addiction occurs when the technology consumes someone’s entire social life

MODULE 4

 An application, or app, sometimes called application software, consists of programs designed to make users
more productive and/or assist them with personal tasks
 An operating system is a set of programs that coordinates all the activities among computer or mobile device
hardware
 Productivity applications can assist you in becoming more effective and efficient while performing daily
activities at work, school, and home
 Word processing software allows users to create and manipulate documents
 Presentation software allows users to create visual aids for presentations to communicate ideas, messages, and
other information to a group
 Spreadsheet software allows users to organize data in columns and rows and perform calculations on the data
 A database is a collection of data organized in a manner that allows access, retrieval, and use of that data
 Database software allows users to create, access, and manage a database
 Note taking software is an application that enables users to enter typed text, handwritten comments, drawings,
sketches, photos, and links anywhere on a page
 Calendar and contact management software helps you organize your calendar, keep track of contacts, and
share this information with other users
 A software suite is a collection of individual related applications available together as a unit
 Project management software is an application that allows a user to plan, schedule, track, and analyze the
events, resources, and costs of a project
 Accounting software is an application that helps businesses of all sizes record and report their financial
transactions
 Personal finance software is a simplified accounting application that helps home users and small/home office
users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer
funds, track investments, and evaluate financial plans
 Legal software is an application that assists in the preparation of legal documents and provides legal
information to individuals, families, and small businesses
 Tax preparation software is an application that can guide individuals, families, or small businesses through the
process of filing federal and state taxes
 Document conversion software saves documents created in any application into a common format that has the
same appearance as the original document
 A large organization, commonly referred to as an enterprise, requires special computing solutions because of its
size and geographic distribution
 Computer-aided design (CAD)
 Multimedia authoring software allows users to combine text, graphics, audio, video, and animation in an
interactive application
 Website authoring software helps users create business websites for a variety of purposes
 A media player is a program that allows you to view images and animations, listen to audio, and watch video
files on your computer or mobile device
 An augmented reality app overlays information and digital content on top of physical objects or locations
 A virtual reality app provides an immersive user experience
 A personal firewall is a security tool that detects and protects a personal computer and its data from
unauthorized intrusions
 An antivirus program protects a computer against viruses by identifying and removing any computer viruses
found in memory, on storage media, or on incoming files
 A spyware remover is a type of program that detects and deletes spyware and similar programs
 An adware remover is a program that detects and deletes adware
 A file manager is a tool that performs functions related to file management
 A search tool is a program, usually included with an operating system, that attempts to locate a file, contact,
calendar event, app, or any other item stored on your computer or mobile device based on criteria you specify
 An image viewer is a tool that allows users to display, copy, and print the contents of a graphics file, such as a
photo
 An uninstaller is a tool that removes a program, as well as any associated entries in the system files
 A disk cleanup tool searches for and removes unnecessary files
 A disk defragmenter is a tool that reorganizes the files and unused space on a computer’s hard disk so that the
operating system accesses data more quickly and programs run faster
 A screen saver is a tool that causes a display device’s screen to show a moving image or blank screen if no
keyboard or mouse activity occurs for a specified time
 A file compression tool shrinks the size of a file(s)
 A PC maintenance tool is a program that identifies and fixes operating system problems, detects and repairs
drive problems, and includes the capability of improving a computer’s performance
 A backup tool allows users to copy, or back up, selected files or the contents of an entire storage medium to
another storage location
 A restore tool reverses the process and returns backed up files to their original form
 A power management tool monitors a laptop or mobile device’s battery usage, showing apps that consume the
most battery power, displaying battery usage since the device was last charged, and estimating usage time
remaining

MODULE 5

• A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing capability

• Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime

• A cybercrime is an online or Internet-based illegal act

• Malware, short for malicious software, consists of programs that act without a user’s knowledge and
deliberately alter the operations of computers and mobile devices

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on w
Adware
messages, or other Internet services.

Ransomware A program that blocks or limits access to a computer, phone, or file until the user pays a specified amoun

A program that hides in a computer or mobile device and allows someone from a remote location to take
Rootkit
the computer or device.

A program placed on a computer or mobile device without the user’s knowledge that secretly collects inf

Spyware the user and then communicates the information it collects to

some outside source while the user is online.


A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse doe
Trojan horse
itself to other computers or devices.

A potentially damaging program that affects, or infects, a computer or mobile device negatively by alterin
Virus
computer or device works without the user’s knowledge or permission.

A program that copies itself repeatedly, for example in memory or on a network, using up resources and
Worm
down the computer, device, or network.

• A botnet is a group of compromised computers or mobile devices connected to a network

– A compromised computer or device is known as a zombie

• A denial of service attack (DoS attack) disrupts computer access to an Internet service

– Distributed DoS attack (DDoS attack)

• A back door is a program or set of instructions in a program that allow users to bypass security controls

• Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate

• A firewall is hardware and/or software that protects a network’s resources from intrusion

• A passphrase is a private combination of words, often containing mixed capitalization and punctuation,
associated with a user name that allows access to certain computer resources

• A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by
a company or selected by a user+

• A possessed object is any item that you must possess, or carry with you, in order to gain access to a computer or
computer facility

• A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code
that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral
characteristic

• Two-step verification uses two separate methods, one after the next, to verify the identity of a user

• Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks

• Software theft occurs when someone:

– Steals software media


– Intentionally erases programs

– Illegally registers and/or activates a program

– Illegally copies a program

• During the product activation, which is conducted either online or by phone, users provide the software
product’s identification number to associate the software with the computer or mobile device on which the
software is installed

• A license agreement is the right to use software

• Information theft occurs when someone steals personal or confidential information

• Encryption is a process of converting data that is readable by humans into encoded characters to prevent
unauthorized access

• A digital signature is an encrypted code that a person, website, or organization attaches to an electronic
message to verify the identity of the message sender

• A digital certificate is a notice that guarantees a user or a website is legitimate

• A website that uses encryption techniques to secure its data is known as a secure site

• Hardware theft is the act of stealing digital equipment

• Hardware vandalism involves defacing or destroying digital equipment

• A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed

• To back up a file means to make a copy of it

• Off-site backups are stored in a location separate from the computer or mobile device site

 Technology ethics are the moral guidelines that govern the use of computers, mobile devices, information
systems, and related technologies

 Intellectual property (IP) refers to unique and original works such as ideas, inventions, art, writings, processes,
company and product names, and logos

 Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and
other digital content
 A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or
allowed/not allowed

 Green computing involves reducing the electricity and environmental waste while using computers, mobile
devices, and related technologies

 Information privacy refers to the right of individuals and companies to deny or restrict the collection, use, and
dissemination of information about them

 A cookie is a small text file that a web server stores on your computer

 Phishing is a scam in which a perpetrator sends an official looking message that attempts to obtain your
personal and/or financial information

 With clickjacking, an object that can be tapped or clicked on a website contains a malicious program

 Social engineering is defined as gaining unauthorized access to or obtaining confidential information by taking
advantage of the trusting human nature of some victims and the naivety of others

Protects minors from inappropriate content when accessin


Children's Internet Protection Act
and libraries

Children's Online Privacy Protection Act (COPPA) Requires websites to protect personal information of childr

Computer Abuse Amendments Act Outlaws transmission of harmful computer code, such as vi

Makes it illegal to circumvent antipiracy schemes in comme


Digital Millennium Copyright Act (DMCA)
sale of devices that copy software illegally

Provides the same right of privacy protection of the postal


Electronic Communications Privacy Act (ECPA) phone companies to various forms of electronic communic
mail, email, and mobile phones

Protects consumers from disclosure of their personal financ


Financial Modernization Act
requin-± institutions to alert customers of information discl
Freedom of Information Act (F01A) Enables public access to most government records

HIPAA (Health Insurance Portability and Accountability Act) Protects individuals against the wrongful disclosure of their

PATRIOT (Provide Appropriate Tools Required to Intercept and Gives law enforcement the right to monitor people's activit
Obstruct Terrorism) email habits

Forbids federal agencies from allowing information to be u


Privacy Act
than that for which it was collected

• Content filtering is the process of restricting access to certain material

• Web filtering software restricts access to specified websites

• Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record, and review
an employee’s use of a technology, including communications such as email messages, keyboard activity (used
to measure productivity), and websites visited

• Digital communications describes a process in which two or more computers or devices transfer data,
instructions, and information

MODULE 6

 The motherboard is the main circuit board of the computer


 A computer chip is a small piece of semiconducting material, usually silicon, on which integrated circuits are
etched
 The processor, also called the central processing unit (CPU), interprets and carries out the basic instructions
that operate a computer
 A multi-core processor is a single chip with two or more separate processor cores
 Processors contain a control unit and an arithmetic logic unit (ALU)
 The control unit is the component of the processor that directs and coordinates most of the operations in the
computer
 The arithmetic logic unit (ALU), another component of the processor, performs arithmetic, comparison, and
other operations
 The system clock controls the timing of all computer operations
 The pace of the system clock is called the clock speed, and is usually measured in gigahertz (GHz)
 The leading manufacturers of personal computer processor chips are Intel and AMD
 Analog signals are continuous and vary in strength and quality
 Digital signals are in one of two states: on or off
 The binary system uses two unique digits (0 and 1)
 Bits and bytes
 Each byte resides temporarily in a location in memory that has an address
 Memory size commonly is measured in gigabytes (GB)
 Memory cache speeds the processes of the computer because it stores frequently used instructions and data
 Read-only memory (ROM) refers to memory chips storing permanent data and instructions
 Flash memory can be erased electronically and rewritten
 Access time is the amount of time it takes the processor to read from memory
 An adapter card enhances functions of a component of a desktop or server system unit and/or provides
connections to peripheral devices
 An expansion slot is a socket on a desktop or server motherboard that can hold an adapter card
 With Plug and Play technology, the computer automatically can recognize peripheral devices as you install them
 A USB adapter enhances functions of a mobile computer and/or provides connections to peripheral devices
 A bus allows the various devices both inside and attached to the system unit to communicate with one another
 Word size is the number of bits the processor can interpret and execute at a given time
 The power supply or laptop AC adapter converts the wall outlet AC power into DC power

Module 7

 Input- any data and instructions entered into the memory of a computer
 Keyboard- is an input device that contains keys you press to enter data and instructions into a computer or
mobile device
 RSI- repetitive strain injuries
 Pointer-is a small symbole on the screen whose location and shape change as a user moves a pointing device
 Mouse-is a pointing device that fits under the palm of your hand comfortably
 Touchpad- small, flat, rectangular pointing device that is sensitive to pressure and motion
 Trackball- stationary pointing device with a ball on its top or side
 Touch screen- touch sensitive display
 Graphics tablet/digitizer- electronic plastic board that detects and converts movements of a style or a digital
pen into signals that are sent to the computer
 Voice input- is the process of entering input by speaking into a microphone
 Voice recognition- the computer or mobile device’s capability of distinguishing spoken words
 Audio input- is the process of entering any sound into the computer such as speech, music and sound
 Music production software- allows users to record compose, mix and edit music and sounds
 Video conference- a meeting between two or more geographically separated people
 Scanner- light-sensing input device that reads printed text and graphics and then translates the results into a
form the computer can process
 Optical reader- a device that uses light source to read characters, marks and codes and then converts them into
digital data that a computer can process
 Bar code reader- uses laser beams to read bar codes
 QR code- stores information in both vertical and horizontal direction
 RFID(Radio Frequency Identification)- uses radio signals to communicate with a tag placed in or attached to an
object
 RFID reader- reads information on the tag via radio waves
 Magstripe readers- read magnetic stripe on the back of cards (Credit card, Bank cards, ID, etc.)
 MICR(Magnetic Ink Character Recognition)-device read text printed with magnetic ink
 MICR reader- converts MICR characters into a form that computer can process
 Data collection- device obtains data directly at the location where the transaction or event takes place
 Output- data that has been processed into a useful form
 Display- visually conveys text, graphics and video information
 Monitor- display that is packaged as a separate peripheral device
 DVI- Digital Visual Interface
 HDMI- High-Definition Multimedia Interface
 Printer- an output device that produces text and graphics on a physical medium
 Nonimpact printer- forms characters and graphics on a piece of paper without actually contacting the paper
 Ink-jet printer –forms characters and graphics by spraying tiny drops of liquid onto a piece of paper
 Photo printer- a color printer that produces lab-quality photos
 All-in-one printer- a single device that prints, scans, copies and in some cases, faxes
 3-D printer - uses a process called additive manufacturing to create an object by adding material to a three-
dimensional object, one horizontal at a time
 Thermal printer- generates images by pushing electrically heated pins against the heat-sensitive paper
 Mobile printer- a small, lightweight, battery-powered printer that allows a mobile user to print from a mobile
device
 Label printer- a small printer that prints on a adhesive-type material that can be placed on a variety of items
 Plotter- are used to produce high-quality drawings
 Large-format printers- create photo-realistic quality color prints
 Impact printers- forms characters and graphics on a piece of paper by striking a mechanism against an inked
ribbon that physically contacts the paper
 Headphones- are speakers that cover or are placed outside of the ear
 Earbud(earphones)- rest inside the ear canal
 Data projector- a device that projects the text and images displaying on a computer or mobile device screen on
a larger screen so that an audience can see the image clearly
 Interactive whiteboards- a touch sensitive device, resembling a dry-erase board

Module 8

 Storage- medium is the physical material on which a computer keeps, data, information, programs and
applications
 Cloud storage- keeps information on servers on the Internet, and the actual media on which the files are stored
are transparent to the user.
 Storage device- is the hardware that records and/or retrieves items to and from storage media
 Capacity- is the number of bytes a storage medium can hold
 Hard disk/Hard disk drive (HDD)- contains one or more flexible, circular platters that use magnetic particles to
store data, instructions and information
 Formatting- is the process of dividing the disk into tracks and sectors
 Head crash- occurs when a read/write head touches the surface of a platter
 SSD (solid state drive)- is a flash memory storage device that contains its own processor to manage its storage.
 External hard drive- is a separate freestanding storage device that connects with a cable to a USB port or other
port on a computer or mobile device
 RAID (redundant array of independent disks)- is a group of two or more integrated hard drives
 Memory card- a removable flash memory storage device that you insert and remove from a slot in a computer,
mobile device or card reader/writer
 USB flash drives- plug into a USB port on a computer or mobile device
 Cloud storage- is an internet service that provides storage to computer or mobile device users
 Optical disc- consists of a flat, round, portable disc made of metal, plastic and lacquer that is written and read by
a laser
 CD-ROM- can be read from but not written to
 CD-R- is an optical disc on which users can write once, but not erase
 CD-RW- is an erasable multisession disc
 DVD-ROM- is a high-capacity optical disc on which users can read but not write on or erase
 DVD-R/DVD+R- are competing DVD- recordable WORM formats, on which users can write once but not erase
 DVD-RW, DVD+RW and DVD+RAM- are competing DVD-rewritable formats that users can write on multiple
items
 Enterprise hardware- allows large organizations to manage and store data and information using devices
intended for heavy use, maximum efficiency and maximum availability.
 Network attached storage (NAS)- is a server that is placed on a network with the sole purpose of providing
storage to users, computers and devices attached to the network.
 Storage area network (SAN)- is a high-speed network with the sole purpose of providing storage to other
attached servers
 Tape- is a magnetically coated ribbon of plastic capable of storing large amounts of data and information
 Magnetic stripe card- has magnetic stripe that contains information
 Smart card- stores data on an integrated circuit embedded in the card
 RFID tag- consists of an antenna and a memory chip that contains the information to be transmitted via radio
waves

MODULE 9

 Sleep mode- saves any open documents and running programs or apps to RAM, turns off all unneeded functions
and then places the computer in a low-power state.
 Hibernate mode- saves any open documents and running programs or apps to an internal hard drive before
removing power from the computer or device
 User interface (UI)- controls how you enter data and instructions and how information is displayed on the
screen
 Graphical user interface (GUI)- you interact with menus and visual images
 Command-line interface- a user types commands represented by short keywords or abbreviations or presser
special keys on the keyboard to enter data and instructions
 Memory management- optimizes the use o9f the computer or device’s internal memory
 Virtual memory- is a portion of a storage medium functioning as additional RAM
 Driver- a small program that tells the operating system how to communicate with a specific device
 Plug and Play- automatically configures new devices as you install or connect them
 Performance monitor- is a program that assesses and reports information about various computer resources
and devices
 Desktop operating system- is a complete operating system that works on desktops, laptops and some tablets.
 UNIX- is a multitasking operating system developed in the early 1970s
 Linux- is a popular, multitasking UNIX-based operating system
 Chrome OS- is a Linux-based operating system designed to work primarily with web apps
 Android is an open source, Linux-based mobile operating system designed by Google for smartphones and
tablets
 IOS- developed by Apple, is a proprietary mobile operating system specifically made for Apple’s mobile devices
• Windows (Mobile edition) developesd by Microsoft, is a proprietary mobile operating system that runs on some
smartphones

MODULE 10

• A network is a collection of computers and devices connected together via communications devices and
transmission media

• A local area network (LAN) is a network that connects computers and devices in a limited geographical area

• A wireless LAN (WLAN) is a LAN that uses no physical wires

• A metropolitan area network (MAN) connects LANs in a metropolitan area

• A wide area network (WAN) is a network that covers a large geographic area

• A personal area network (PAN) is a network that connects computers and devices in an individual’s workspace
using wired and wireless technology

• The configuration of computers, devices, and media on a network is sometimes called the network architecture

• Communications software consists of programs and apps that:

-Help users establish a connection to another computer, mobile device, or network

-Manage the transmission of data, instructions, and information

-Provide an interface for users to communicate with one another

• Ethernet is a network standard that specifies no central computer or device on the network (nodes) should
control when data can be transmitted
• The token ring standard specifies that computers and devices on the network share or pass a special signal
(token)

• TCP/IP is a network protocol that defines how messages (data) are routed from one end of a network to another

• Wi-Fi identifies any network based on the 802.11 standard that specifies how two wireless devices communicate
over the air with each other

• LTE is a network standard that defines how high-speed cellular transmissions use broadcast radio to transmit
data for mobile communications

• Bluetooth is a network protocol that defines how two Bluetooth devices use short-range radio waves to
transmit data

• UWB (ultra-wideband) is a network standard that specifies how two UWB devices use short-range radio waves
to communicate at high speeds with each other

• IrDA transmits data wirelessly via infrared (IR) light waves

• RFID is a protocol that defines how a network uses radio signals to communicate with a tag placed in or attached
to an object, an animal, or a person

• NFC (near field communication) is a protocol, based on RFID, that defines how a network uses close-range radio
signals to communicate between two devices or objects equipped with NFC technology

• ADSL is a type of DSL that supports faster downstream rates than upstream rates

• A communications device is any type of hardware capable of transmitting data, instructions, and information
between a sending device and a receiving device

• A broadband modem sends and receives data and information to and from a digital line

• A wireless access point (WAP) is a central communications device that allows computers and devices to transfer
data wirelessly among themselves or to a wired network

• A router connects multiple computers or other routers together and transmits data to its correct destination on
a network

• A network card enables a computer or device that does not have built-in networking capability to access a
network

• A hub or switch is a device that provides a central point for cables in a network

• Many home users connect multiple computers and devices together in a home network

• Transmission media carries one or more communications signals


• Broadband media transmit multiple signals simultaneously

• The amount of data, instructions, and information that can travel over transmission media sometimes is called
the bandwidth

• Latency is the time it takes a signal to travel from one location to another on a network

• Coaxial cables, data travels through a copper wire.

• A fiber-optic cable consists of hair-thin strands of glass or plastic that carry data as pulses of light

• Broadcast radio is a wireless transmission medium that distributes radio signals through the air over long
distances
• Cellular radio is a form of broadcast radio that is in wide use for mobile communications
• Microwaves are radio waves that provide a high-speed signal transmission
• A communications satellite is a space station that receives microwave signals from an earth-based station,
amplifies it, and broadcasts the signal over a wide area to any number of earth-based stations
• A GPS (global positioning system) is a navigation system that consists of one or more earth-based receivers that
accept and analyze signals sent by satellites in order to determine the receiver’s geographical location

MODULE 11

• Database - Collection of data organized in a manner that allows access, retrieval, and use of that data

• Data - Collection of unprocessed items

• Information - Processed data

• Database software, often called a database management system (DBMS), allows users to:

– Create a computerized database

– Add, modify, and delete data

– Sort and retrieve data

– Create forms and reports from the data

 A character is one byte


 A field is a combination of one or more related characters
 A record is a group of related fields
 A primary key is a field that uniquely identifies each record
 A data file is a collection of related records
 File maintenance refers to the procedures that keep data current
 Validation compares data with a set of rules or values to determine if the data meets certain criteria
 data model defines how users view the organization of the data
 A data dictionary contains data about each file in the database and each field in those files
 A query is a request for specific data from the database
 A query language consists of simple, English-like statements that allow users to specify the data to display, print,
store, update, or delete
 Structured Query Language (SQL) is a popular query language that allows users to manage, update, and retrieve
data
 A form is a window on the screen that provides areas for entering or modifying data in a database
 A report writer allows users to design a report on the screen, retrieve data into the report design, and then
display or print the report
 An information system is a collection of hardware, software, data, people, and procedures that work together
to produce information
 System development is a set of activities used to build an information system
 System development is a set of activities used to build an information system
 System development activities are grouped into phases, and is called the system development life cycle (SDLC)
 systems analyst is responsible for designing and developing an information system
 Project management is the process of planning, scheduling, and then controlling the activities during system
development
 Feasibility is a measure of how suitable the development of a system will be to the organization
 Documentation is the collection and summarization of data, information, and deliverables
 The planning phase for a project begins when the steering committee receives a project request
 A prototype (proof of concept) is a working model of the proposed system’s essential functionality
 The purpose of the implementation phase is to construct the new or modified system and then deliver it to
users
 Unit test - Verifies that each individual program or object works by itself
 Systems test - Verifies that all programs in an application work together properly
 Integration test - Verifies that an application works with other applications
 Acceptance test - Checks the new system to ensure that it works with actual data
 Training involves showing users exactly how they will use the new hardware and software in the system
 The purpose of the support and security phase is to provide ongoing assistance for an information system and
its users after the system is implemented
 A programming language is a set of words, abbreviations, and symbols that enable a software developer to
communicate instructions to a computer or mobile device
 An application development tool provides a means for creating, designing, editing, testing, and distributing
programs and apps
 With a procedural language, the programmer writes instructions using English-like words that tell the computer
what to accomplish and how to do it
 The C programming language is used to write many of today’s programs
 A compiler converts the entire source program to machine language before executing it
 An interpreter translates and executes one instruction at a time
 An object-oriented programming (OOP) language allows system developers to implement objects in a program
 C++ is an extension of the C programming language
 Visual Studio is Microsoft’s suite of object-oriented application development tools that assists software
developers in building programs and apps for Windows or any operating system that supports the Microsoft
.NET Framework
 A
 4G (fourth-generation language) is a nonprocedural language that enables users and software developers to
access data in a database
 An 5z is a program that creates source code or machine code from a specification of the required functionality
 Often bundled as part of a DBMS
 A macro is a series of statements that instructs a program or app how to complete a task
 HTML is a special formatting language that software developers use to format documents for display on the web
 XML (eXtensible Markup Language) allows web developers to create tags that describe the structure of
information

MODULE 12

• An information system is a set of hardware, software, data, people, and procedures that work together to
produce information
• Enterprise Resource Planning (ERP) integrates MRP II with the information flow across an organization to
manage and coordinate the ongoing activities of the enterprise
• Document Management System (DMS)
• Allows for storage and management of a company’s documents
• Supports access control, security, version tracking, and search
• Content Management System (CMS)
• Enables and manages the publishing, modification, organization, and access of various forms of
documents and other files
• Provides security controls
• Content added through a graphical user interface or webpage
• A transaction processing system (TPS) is an information system that captures and processes data from day-to-
day business activities
• Online transaction processing (OLTP)
• A management information system (MIS) is an Information system that generates accurate, timely, and
organized information, so that managers and other users can make decisions, solve problems, supervise
activities, and track progress

• A decision support system (DSS) helps users analyze information and make decisions
• Online analytical processing (OLAP)
• An expert system is an information system that captures and stores the knowledge of human experts
and then imitates human reasoning and decision making
• The technology equipment field consists of manufacturers and distributors of computers, mobile
devices, and other hardware, such as magnetic and optical drives, monitors, printers, and
communications and networking devices
• The software and apps field consists of companies that develop, manufacture, and support a wide
range of software and apps for computers, the web, and mobile devices
• The technology service and repair field provides preventive maintenance, component installation, and
repair services to customers
• Technology salespeople must possess a general understanding of technology and a specific knowledge
of the product they are selling
• Corporate trainers teach employees how to use software and apps, design and develop systems, write
programs, integrate and sync data from apps used on multiple devices, and perform other technology-
related activities

• A help desk specialist answers hardware, software, and networking questions in person, over the phone, or
electronically via email or a chat room
• An IT consultant, typically hired based on expertise, provides technology services to his or her clients
• A certification demonstrates your knowledge in a specific area to employers or potential employers
• CCNA - Cisco Certified Network Associative

You might also like