Final Flashcards

(199 cards)

1
Q

Your operating system and your __________ combine to form a complete system that determines what your computer can do.

A

Computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The two most common operating systems are

A

Microsoft Windows and Mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What part of the computer is the primary data processing component?

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of cable connects peripheral devices to a computer through a universal serial bus port?

A

USB Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which device receives signals from a computer and displays them onto a screen?

A

Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term describes the use of web applications that allow you to create, save and play games online?

A

Cloud computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is a free, cloud-based word processor that allows you to create, edit and collaborate in real-time with other users?

A

Google docs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an input device that produces a digital image file to be saved onto a computer called?

A

Scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the most important software on the computer? Why?

A

Operating system. It keeps everything in place and makes sure everything runs smoothly. An operating system not only runs the computer, but it also manages both hardware and software as well as the memory and processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Open source

A

refers to any software whose source code is made available free for any third party to review and modify. Free!!! So much public collaboration. Bugs fixed quickly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Most operating systems we use are known as what?

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

. What is an application?

A

Software that allows you to complete certain tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This is known as the most important software that runs on a computer. Without it the computer is useless.

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the language of computers?

A

Ones and zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the software that communicates with your computer’s hardware and executes all software programs on your computer?

A

Operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CPU stand for…

A

Computer processing unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a program called when it secretly attaches to a document or program and then executes when the document or program is opened?

A

Computer virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are output devices that produce audio from your computer called?

A

speakers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company that provides internet service for a monthly fee is called a(n) _____?

A

Internet service provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What lets you use the mouse to click icons, buttons, menus, and much more?

A

Graphical User Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the two most common mobile operating systems?

A

Google Android and Apple IOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every operating system has a GUI and they all look different from each other. True or false?

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three most common operating systems?

A

Linux, Mac OS X, Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The operating system does not manage computer memory, processes, hardware, and software. T or F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When you are multitasking on a computer, what does that mean?
You have more than one application open and running.
26
Mobile operating systems have fewer features than a normal computer operating system. T or F
True
27
File extension
A file extension is the three or four letters that can be found at the end of a file name following a period. They identify not only the characteristics of the file but also its use. Ex) .jpg This is typically used when dealing with images .docx This extension is used with Word documents .xlsx This extension is used with Excel Spreadsheets
28
What is one of the most common tricks that malware developers use?
to include the file extension of .exe, which means the program is executable.
29
Select examples of software. (Select all that apply.) 1. Mouse 2. Computer Programs 3. Applications Monitor 4. Photo Editing Program
2,3,5
30
Hardware and software need each other to function. T or F?
True
31
When working on a computer, what software would allow you to complete tasks such as creating a document, designing a flyer, and writing a letter?
Word processor
32
What software tool allows you to access the Internet?
Web browser
33
Which of the following are common types of desktop applications? (Select all that apply.) 1. Word Processor 2. Web Browser 3. Media Player 4. Games
1,2,3,4
34
A three or four-letter identifier found at the end of a file name that follows a period.
File extension
35
The software that allows you to perform specific tasks is known as what.
applications
36
Closed/commercial source
source code that is highly protected and only available to trusted employees and carefully vetted contractors. Ex) Microsoft Office. More access to customer support. Costly!!! Any bugs have to wait for next update.
37
An image usually has what file extension?
.jpeg
38
If you were working in Microsoft Word and saved your file, what would the file extension be?
.docx
39
If you were working on a personal computer and downloaded a type of application software, that file extension would it be saved to your computer as?
.exe
40
When you download something to a PC, after you double click the .exe file (typically located in the downloads folder) what step comes next?
The dialogue box appears, follow instructions to complete installation of software.
41
. When installing an application on a Mac, what is the format it is saved to your computer?
.dmg
42
Emails sometimes contain attachments that could include malware. What do those extensions typically end in?
.exe
43
What is a malicious computer virus designed to damage a computer called?
malware
44
What is the most widely used operating system for personal computers?
Microsoft Windows
45
Which of the following refers to a small, portable plug-n-play storage device used for storing files that plugs into a USB port?
USB Drive
46
What kind of software program allows you to create, edit, and print text documents?
A word processor
47
Which of the following is a network cable that allows information to travel between wired devices?
Ethernet Cable
48
What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?
Hard Drive
49
What is the latest Mac operating system?
OSX
50
What is a hand-controlled electronic device used to manipulate the cursor on your computer screen called?
Mouse
51
Which of the following is a type of software that stores an organized collection of data on a computer?
Database
52
Which of the following is defined as a set of instructions executed by a computer?
Computer software
53
What is the output device that usually produces text and graphics onto paper called?
Printer
54
Which of the following refers to a portable plug-n-play device used as a backup storage device?
External hard drive
55
Which of the following refers to input or output devices that are used to communicate with a computer?
Peripheral devices
56
What does the abbreviation USB stand for?
Universal serial bus
57
Why did the HDMI connection grow in popularity?
It can handle both video and sound
58
Everything appears to be normal, and your monitor is working, but you cannot seem to type on your keyboard. What should you check first?
Make sure your keyboard cord is securely in place
59
What does RAM actually stand for?
Random Access Memory
60
If you try to run several programs at once and they are sluggish, what is something that you may consider adding to your device to make it run faster?
Extra RAM memory
61
Video card
A circuit board used to manage the display on the monitor. (Ex. Nvidia, Geforce)
62
Sound card
A circuit board that receives sound in digital form and reproduces it through speakers.
63
Router
A device that sends packets of data from one LAN (local area network) to another network.
64
Modem
A device that is used to transmit data from a computer through phone lines or a cable.
65
Hard drive
A device that stores all software and files on your computer; reads and writes data onto a spinning magnetic or optical disk
66
CD ROM Drive
A device that writes data onto or reads data from a CD.
67
Floppy Drive
A disk drive that can read and write to floppy disks.
68
USB port
A place on a computer where a USB cable is plugged.
69
inkjet printer
A common type of printer that sprays ionized drops of ink onto paper
70
Expansion slots
Places on the motherboard where additional cards can be plugged in; mostly used to expand RAM
71
LAN
Also known as a Local Area Network, this is a network of computers in a single location
72
WAN
Also known as a Wide Area Network, this is a collection of LANs across a large area
73
Software
The set of instructions executed by a computer. (Ex. MS Word and Windows 10.)
74
Power supply
Provides electricity to turn on and operate your computer.
75
Hardware
The physical components that make up a computer system. (Ex. motherboard, hard drive, etc.)
76
The main circuit board of your computer; holds the RAM, CPU, video card, etc.
motherboard
77
The computer that manages access to resources on a network
server
78
A type of printer uses laser beams to print high-resolution images onto paper.
laser printer
79
This device is used to capture your live movements in real time to broadcast online
webcam
80
The primary data processing component of a computer; also known as the Central Processing Unit
CPU
81
This is used to cool the CPU (processor).
computer fan
82
If your current computer does not have enough USB ports to support your devices there is nothing you can do about it. True or false
False
83
What is AC power source
AC actually stands for alternating current. When plugged into your laptop or desktop, the AC adapter is used to convert the AC (alternating current) into DC (or direct current) that is used to power your computer. You may have heard the term AC adapter which is a device that converts the power source from one current to another.
84
When plugged into your computer the AC adapter is used to convert the _____ current into the _____ current that will power your device.
Alternating, direct
85
Microphones and Speakers were not originally built into computers. This is why there were separate ports for them.
True
86
What year did the HDMI cable make its appearance?
2003
87
Why would a business choose to have their systems use ethernet connections versus wireless connections?
Ethernet connections are more secure
88
My computer won't turn on. First...
Check the power source
89
You went to lunch and came back, but now your computer monitor is completely black. What do you need to do?
Try moving around and clicking the mouse a few times.
90
You have just sat down to complete your homework and now your computer won't turn on at all. Since you are working on a desktop, you will need to check a couple of things. Where should you start?
Make sure that all power cords are plugged in securely and that your power outlet is working.
91
If you try to run several programs at once and they are sluggish, you may consider adding what to your device?
Extra RAM memory
92
ergonomics
Ergonomics encompasses the study of the efficiency of working conditions and then using that information to design a work place that is more effective for workers. For example, if you worked in an office where you had to retrieve printed documents, would it make more sense for you to have a printer in your own office or in a break room on a different floor? Now take that same set of thinking and apply it to your current workstation set up. Is the mouse within reach? Is the keyboard at a comfortable height? All of these things are important factors to consider when designing your computer setup.
93
Electrostatic Discharge
Think about the times you may have shuffled your feet across the carpet, only to touch something and experience a small shock. Electrostatic discharge is similar, except you may not feel the shock because you are the one discharging the static electricity. However, if you are working inside of your computer, you may cause permanent damage if you touch an important component and short it out with an electrostatic discharge from your fingers.
94
airplane mode.
disables all wireless transmission functions. helps save battery, helps charge faster.
95
To put it simply the modem...
connects to the internet and the router allows you to connect devices to wifi.
96
Starting and loading programs quickly is impacted more by the _____ than other components that also relate to the speed of your computer.
hard drive
97
The Hard Drive is where short term information is stored.
False (RAM is short term, hard drive is long term) (Hard drive does not reset after turned off) (RAM and hard drive work together whenever you open a program)
98
Everything appears to be normal, and your monitor is working fine. However, you can't seem to type on your keyboard. What should you check first?
Make sure the keyboard cables are securely in place in the ports.
99
RAM
Also known as random-access memory, this temporarily stores information while you work on your computer. RAM stands for random access memory and it represents the short term memory in your computer. Every time you turn your computer off your RAM is cleared. This is why you need to store anything you are working on to your hard drive so that you don't lose any of your work.
100
Starting and loading programs quickly is most impacted by the ____________.
Hard drive speed and capacity
101
What is a peripheral device?
An external device that your computer can run without.
102
``` Which of the following devices are considered peripheral? Select all that apply. a. Printer b. Speakers c. CPU d. Mouse ```
A,B,D
103
What is the main function of the motherboard?
It is the main circuit board that connects essentially every part of the computer in some capacity.
104
Your friend just bought a brand new computer but he is having trouble getting his machine to turn on. He's called you for help. What are some of things he should double check? Select all that apply. A. Try plugging in another device into the surge protector to be sure that it's working properly. B. Throw hands up in frustration and try again later. C. Ensure the monitor is plugged into the surge protector. D. Make sure all plugs are secure that connect the machine to the powersource.
A,C,D
105
What is built into computers that help keep internal components cool?
Fan
106
Put the steps in setting up a workstation in the proper order.
1. Choose the proper location 2. Connect the monitor 3. Connect the keyboard and mouse 4. Plug in the entire system
107
What does it mean if you say something has "Bluetooth capabilities"?
The device can use radio technology to wirelessly connect to other devices.
108
What happens when you enable the Airplane Mode on your device?
This action disables all wireless transmission functions.
109
What connects directly to the internet source and is usually set up by the service provider?
Modem
110
What is the first step in pairing a new Bluetooth device?
Using the settings on your device, turn on the Bluetooth capabilities.
111
What device allows you to set up your home WiFi connections?
Router
112
What is known as the most important software that runs on a computer? Without this software, the computer would not be able to do anything.
Operating system
113
What feature lets you use the mouse to click icons, buttons, menus, and much more?
Graphical User Interface (GUI)
114
The operating system does not manage computer memory, processes, hardware, and software.
False
115
What is the most common way to obtain new software?
Internet download
116
What is an open source operating system?
A free source, open to the public, that can be accessed and modified to suit an individual's needs.
117
What is an application?
Software that allows you to perform specific tasks.
118
What is a closed source operating system?
A closed source, not open to the public that cannot be accessed or modified to suit an individual's needs.
119
What is the official name of an application on a desktop or a laptop?
Desktop application
120
Why is it important to ensure that your software is updated? Select all that apply. 1. It adds new features 2. It removes old features 3. It corrupts data 4. It fixes and/or removes computer bugs 5. It repairs security holes
1,2,4,5
121
What do security patches do?
Covers security holes so that hackers can not access your data.
122
Put the six steps of the troubleshooting process in order.
1. Identify the problem. 2. Establish a theory on why the problem occurred. 3. Test the theory. 4. Establish a plan of action and implement a solution. 5. Verify your solution worked and put preventative measures in place. 6. Document your findings, actions, and outcome.
123
What does GUI stand for?
Graphical User Interface
124
What is running more than one application at a time called?
Multi-tasking
125
What are the three most common operating systems? Select all that apply. 1) HP 2) Ubuntu 3) Linux 4) Mac OSX 5) Microsoft Windows
3,4,5
126
If an application freezes while running on your PC, what keys would you use to access the task manager?
CTRL + Alt + Delete
127
If an application freezes while running on your Mac, what keys would you use to access the task manager?
Command + Option + ESC
128
When an application is running slowly, what is the first thing you should check for?
Whether your application has been updated recently.
129
If you notice that your entire computer seems to be running extremely slow, what is the first step you should take to diagnose the issue?
Run a virus scanner. You may have malware running in the background that is slowing things down.
130
Why is it important to document the steps you took during the troubleshooting process?
So you will be able to remember what you have done and can avoid repeating mistakes
131
What is the first step in the troubleshooting process?
Identify the problem.
132
What is software?
Anything that tells hardware what to do and how to do it.
133
Email is delivered electronically across the _________.
Internet
134
Which of the following are examples of software. 1. Computer programs 2. Monitor 3. Photo Editing program 4. Applications 5. Mouse
1,3,4
135
How long does it take on average for email to be delivered?
minutes
136
Why are free web based providers so popular?
You can access your email account from anywhere as long as you have internet connection.
137
What is the three or four letter identifier found at the end of a file name that follows a period called?
File extension
138
What is the first step in creating an email address?
Choosing a webmail provider
139
Where do you view and manage emails?
Inbox
140
What do you call the software that allows you to perform specific tasks?
Applications
141
What computer software would allow you to complete tasks such as creating a document, designing a flyer, and writing a letter.?
Word processing software
142
What does a file extension tell you about the file?
It's characteristics and its use
143
When you want to collaborate with someone using a Google Doc, what do you need in order to share the document?
The person's email address
144
If you are the creator of a Google Doc and need your partner to add or change information to the document, what permission setting do you need to give them?
person can edit
145
What term is used for two or more PCs that are connected and share resources?
Peer to peer
146
What is the correct term for files copied to a secondary location for preservation purposes?
backup
147
If there is a secure socket layer in place, what will you need in addition to a user ID in order to access the shared files?
a password
148
What does the "S" at the end of FTPS indicate?
secure
149
What does the abbreviation SOHO stand for?
Small Office Home Office Router. This is the smallest of businesses and typically will have under 10 employees.
150
What additional authentication method does SFTP use to ensure that data is secure?
SSH Keys
151
What things should you consider when choosing a cellular connection? Select all that apply. 1. Upgrades that come with your device 2. Location 3. Amount of data you have available on your plan. 4. Number of devices that will have to use this connection method.
2,3,4
152
The amount of data that can be sent from one point to another in a certain period of time is known as ________.
Bandwidth. The technical way to explain bandwidth is the volume of information per unit that a transmission medium (your internet connection) can handle. Basically the larger the bandwidth mans that more data can be moved in relation to speed. Think of it this way. Compare a garden hose and a fire hose. The garden hose is going to move water but it will be a smaller amount and it will take a lot longer to move a large amount. The fire hose has more volume (think bandwidth) and will move a lot of water much more quickly than a garden hose. In the same way, the greater bandwidth a device has, the more data will be transmitted and the amount of time for this data to travel will therefore be much quicker.
153
What does FTP stand for?
File transfer protocol
154
What is the slowest type of internet connection?
Dial up
155
Place the following steps to configure your router in order.
During this process you will need to create a unique username and password for your router. Naming your router makes it easier for you to distinguish from others that you may pick up when searching for wireless networks. Strong passwords are important so that you can protect your data as well as keep others from using your network without your permission. 1. After your router has been plugged in and you have power you will need to enter the router's default IP address into the address bar and press enter. 2. The router's sign-in page will appear. 3. The settings page will appear. 4. Locate and select the save button to save your settings.
156
While a wired connection provides the maximum amount of speed for an internet connection, there are several drawbacks. Choose all of the drawbacks of having a wired connection. 1. Lack of mobility 2. Wired connection require additional network sockets. 3. Wired connections have greater security 4. Wired connections provide greater speed than wireless ones.
1,2
157
What are some of the advantages of cloud storage? Select all the correct answers. 1. Control of resources 2. Speed of connection 3. Amount of storage space 4. Less cost than other forms of storage
3,4
158
When using SFTP to share files, what is encrypted in addition to the authentification information?
The data files
159
What does HTTP stand for?
Hypertext Transfer Protocol
160
What are some of the advantages of using a local storage method? Select all correct answers. 1. Less cost than cloud storage 2. Greater speed than cloud storage 3. Greater space than cloud storage for the money 4. Greater access to files and control of data
2,4
161
What is the correct order for setting up a router?
1. Connect your router to your Internet modem using an Ethernet cable. 2. Plug in the power cable for the wireless router. 3. Wait a few seconds to ensure power is on.
162
Before "cloud storage" was a popular way to share information between people, what was used to transfer large files?
FTP
163
What are some of the risks of using Peer to Peer (P2P) sharing networks? Select all the answers that apply. 1. Hidden download of Trojan horses 2. Hidden download of spyware 3. Hidden download of computer viruses 4. Identity theft
1,2,3,4
164
What works in conjunction with a secure sockets layer (SSL) to ensure that data is transported safely?
HTTPs
165
When browsing using certain browsers, if a page is known to be malicious or using phishing techniques in the past a browser may display a _________ before allowing you to move forward.
Warning page
166
What service allows people to send text messages with pictures and sounds from their device to other devices?
Electronic mail
167
What allows browsers to retain the information from the pages you previously visited which will help make your web browsing experience even faster?
Cache
168
Clicking on ads that appear on your screen is always a safe option. (T OR F)
False
169
What search option can you use that does not track cookies or history?
Incognito
170
What can self replicate without a host program and will spread without human interaction or directives from malware authors?
Worm. A worm will find the vulnerability in your system and infiltrate it. More advanced worms will encrypt data. Ransomware, which we will learn about shortly, is a great example of a worm at work.
171
What symbol typically appears to the left of a secure site?
Padlock
172
When using electronic mail (email), what is one thing you can do to help prevent potentially malicious emails from making their way into your inbox?
Set up a junk folder
173
What is made to collect information and data and observe a user's activity without their knowledge?
spyware. Spyware is a form of malware that often goes undetected. Spyware is one of the most common threats on the internet. It is specifically made to collect information and data, as well as observe a user's activity without their knowledge. Spyware is related to adware, and once spyware is on your computer it can use your browsing history to create those fake ads we learned about earlier. It can capture Internet data, credit card numbers, and bank information. People using spyware can even steal your identity. When spyware is on your computer, no data is safe and your login and password information is considered compromised.
174
What is usually present in the address bar If a site is not secure?
Red X through padlock and red line through https symbol.
175
What is designed to look like a legitimate e-mail but contains malicious links that will deliver malware to your computer?
Phishing
176
What should you make sure the web address begins with to ensure that you are browsing a secure site?
HTTPs
177
What is something you may download unknowingly through free software that will then use cookies to track what you are searching for and is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase?
adware
178
What are certain things you can do to protect your personal data when using a public workstation? Please check all that apply. 1. Clear Cookies. 2. Clear Cache. 3. Run a virus protection program before using the computer. 4. Sign out of accounts completely. 5. Clear history.
1,2,4,5
179
What is designed to infect a user's system and encrypt their data so that your device will be locked up?
Ransomware. Sometimes the ransomware messages come across as though they are law enforcement and the user of the device has participated in illegal activity and now has to pay a fine to have their data released. Sometimes the cyber criminal is not subtle at all and demands a ransom, often in computer coin, before they release the lock on a person's computer. So, how does ransomware even get on your device? Most of the time it is unknowingly installed by the user themselves. This can happen by clicking ads, downloading images or files attached to emails, or clicking on pop-up links.
180
What is VolP
VoIP stands for voice over internet protocol. VoIP is used to describe any kind of online phone service. To use a VoIP, you will need the proper hardware and a device that has enough processing power. In addition to those things, you must also have a broadband internet connection. VoIPs are a powerful form of communication because they allow you to use the internet to make phone calls linked with video so you can see the person you are talking to in real time even if they are halfway across the world
181
DSL
also uses a phone line but it does not require a traditional landline like the dial-up connection, so it can be more dependable. The typical phone line has extra wires that are used for the internet connection in a DSL setup. DSL used to be more common, but with the newer types of connections, it is used less often now.
182
Cable
connection has become more widespread and works by connecting the Internet using a broadband connection provided by a cable company. It can be faster than both dial-up and DSL service, but it is only available where cable TV is accessible.
183
Cellular
connections, also referred to as 3G and 4G, are connected wirelessly through your ISP’s network. These cellular connections are not always as fast as DSL or cable, but they are convenient since they can be accessed by your phone. There also may be a limit of data that you can utilize each month.
184
WEP
stands for wired equivalent privacy and it was introduced in the late 1990s. WEP is considered to be the weakest of the three wireless encryption protocols because it is so easily hacked.
185
WPA and WPA2
WPA replaced WEP and WPA2 replaced WPA as the most current security protocol. As of 2006, all Wi-Fi certified products must use WPA2 security. WPA2 ensures there is government-grade data encryption in place to help protect your personal data. When searching for a new device, make sure that is labeled as Wi-Fi certified so that you know it meets all of the latest security standards.
186
SSL
(secure sockets layer) is typically used on things like shopping or banking sites, or any site that needs to keep financial data secure.
187
Typically cellular connections tend to have a _____ bandwidth.
High. This means that you will be able to transfer data in a short amount of time.
188
Cellular, wired, wireless
``` Cellular = anywhere, less secure, slower Wired = must be plugged in, fast, very secure Wireless = must stay in range of router, not as secure, not fast ```
189
What is FTP used for?
FTP is typically used for moving information from the computer you are working on to the server where a website is hosted. Before the “cloud” was a popular method of sharing and storing data, people typically used FTP. While many Internet users will never have a use for FTP, it is actually an essential tool for those building a website
190
Peer to peer sharing
Peer-to-peer sharing, sometimes called P2P, is the sharing of digital media such as videos, music, e-books, etc from one computer to another. This type of network allows files from one computer to be shared to another computer without the need of a server. The individuals who utilize this network are referred to as peers --thus the name Peer-to-Peer sharing.
191
Disadvantages of cloud storage
Not secure, slow internet connection speed, don't have as much control over storage process
192
Cookies are ____
Harmless
193
Autofill
This feature will store the information you use, such as your username, mailing address, phone number, and so on. If you choose to use this feature, the next time you log on to a site your information will be auto-populated. While this sounds like a great time saver, the reality is that you are opening yourself up to the possibility of having your information taken, especially if you are using a computer workstation that other people may also use.
194
Alternative technology
are the manufacturing or production methods that are less polluting and more resource-efficient than using traditional methods.
195
Cloud computing
Cloud computing simply refers to all of the things you can remotely access over the internet. When something is stored in the cloud, it is stored on internet servers instead of directly onto your hard drive. There are two major reasons for doing this: convenience and reliability.
196
Difference between web application and desktop application.
As mentioned previously, we know that desktop applications are installed directly on your device. On the other hand, web applications are different since they reside on servers in the cloud and do not require you to install them directly on your desktop. Some examples of online web applications include social media, photo editing, and some office suites. Web applications allow us to work efficiently while not taking up space on our devices. These web applications, like Google Docs, Microsoft Office 365, and most email, are becoming more popular, especially since you can access these services from any device at any time.
197
Gesture interaction
Anytime you use a device with a touch screen that allows you to zoom in or out with just a pinch of two fingers or swipe left or right to change screens utilizes what is called a gesture interaction. As the demand for these types of devices grew, so did the idea of using gesture-based interaction to immerse a person into a virtual environment. Some gaming systems even tried to develop this idea with technology that would follow your gestures and mimic your movements on the screen.
198
Difference between cloud computing and virtualization
The main difference between virtualization and cloud computing is that virtualization uses software to create multiple “separated” images of the hardware and software on the same computer. Cloud computing enables you to access a shared pool of computing resources (networks, servers, storage, applications, and services) through the internet that can provide for your individual needs without interrupting access for other people using the same resources. Thus, virtualization is software-based and the cloud is server-based.
199
virtualization
Virtualization refers to creating a virtual computer system by simulating the functionality of hardware, such as a regular computer system. A virtual computer, known as a “virtual machine” (VM), is basically a software package that simulates what a regular computer can do. This software enables one computer, or one server, to host one or more virtual machines so that you can run different apps or even different operating systems on a single computer.