Introduction to Computer Fundamentals Flashcards

1
Q

analyze and transform data in a wide range of forms

A

computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

provide the foundation for comprehending and utilizing the potential of current computing technologies

A

Computer basics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

capable of transforming data into valuable information

A

computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Emerging Technologies

A

Artificial Intelligence, quantum computing, Internet of Things (IoT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Computer

A

Super Computer, Mainframe Computers, Minicomputers (Midrange Computers), Workstations, Personal Computers (PCs), Tablet Computers, Smartphone, Embedded Computer, Quantum Computers (Emerging Technology)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

strongest and fastest computers in use; designed to analyze vast volumes of data quickly and efficiently while carrying out sophisticated computations

A

Super Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

uses includes scientific research, weather forecasting, nuclear simulations, molecular and climate modeling

A

Super Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enormous, potent computers with several processors and large amounts of storage; have a reputation for dependability, security, and capacity to manage huge amounts of data and transactions at once

A

Mainframe Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

uses include management of databases, processing of financial transactions, operation of enterprise-level applications

A

Mainframe Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

also known as Midrange Computers

A

Minicomputers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

can process large amounts of data; multi-user settings frequently employ them

A

Minicomputers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

uses include serving small to medium sized organizations, engineering, scientific research

A

Minicomputers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

less costly than supercomputers but more powerful than PCs

A

Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

designed for specific activities such as 3D rendering, CAD, scientific simulations

A

Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses include graphic design, architecture, engineering, jobs that demand a lot of computer power

A

Workstations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

most popular sort of computer

A

Personal Computers (PCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

may be found in both desktop and laptop configurations; general-purpose operating systems; meant for personal usage

A

Personal Computers (PCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

uses include office work, internet surfing, gaming, multimedia entertainment

A

Personal Computers (PCs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

small, portable, touchscreen tablets without physical keyboard; made to be mobile and simple to use

A

Tablet Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

uses include online browsing, email, reading e-books, running mobile apps, healthcare, education

A

Tablet Computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

compact, pocket-sized gadgets with strong processing capabilities; integrate functions for computer, multimedia, and communication

A

Smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

uses include making calls, sending messages, email, social networking, navigation, gaming, photography, other mobile apps

A

Smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

specialized systems incorporated into other machines or equipment; made to carry particular tasks

A

Embedded Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

uses include home appliances, vehicle systems, medical equipment, industrial gear

A

Embedded Computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
building blocks for calculations of quantum computers
Quantum bits (qubits)
26
might be exponentially more efficient than traditional computers in solving complicated issues
Quantum Computers
27
uses include resolving challenging scientific, cryptography, and optimization issues
Quantum Computers
28
Components of a computer
Central Processing Unit (CPU), Memory (RAM), Storage Devices, Input Devices, Output Devices, Motherboard
29
known as the "brain" of the computer
CPU
30
responsible for carrying out computations and executing commands
CPU
31
short-term storage area where the computer keeps active data and instructions
Memory (RAM)
32
primary circuit board; links and enables communication between all parts
motherboard
33
made up of programs, applications, and operating system
Software
34
controls hardware resources
Operating System (OS)
35
three most popular operating system
Windows, macOS, Linux
36
Types of Mobile Operating System
iOS, Android, Blackberry OS, Windows Phone OS, Symbian, WebOS, Windows Mobile
37
open source OS created by Google
Android
38
proprietary, closed-source OS created by Microsoft
Windows Phone OS
39
Nokia devices on the original smartphone OS
Symbian
40
originally intended for cellphones, now utilized with smart TVs
WebOS
41
mobile and pocket PC version created by Microsoft
Windows Mobile
42
serves as the raw material from which information is derived and may require processing to become useful information
data
43
end result of processing data; purpose is to provide knowledge or facilitate decision-making
information
44
created by programmers to train computers to do specified tasks; teaches the computer what to do
algorithms
45
used to create code that implements these techniques
programming languages
46
programming languages (according sa module lang!!)
Python, Java, C++
47
enable computers to exchange information, resources, and services over long distance
Computer Networks
48
Types of Connectivity and Network
Wired Networking, Wireless Networking, Cellular Networking, Satellite Networking, Peer-to-Peer (P2P) Networking, Virtual Private Networks (VPNs), Cloud Networking, Software-Defined Networking (SDN), Industrial Networking, Intranet and Extranet
49
Types of Wired Networking
Ethernet, Fiber Optic, Coaxial Cable
50
provides dependable, fast connectivity; one of the most popular forms of wired networking, connecting devices to a local area network (LAN) or the internet using cables (often CAT5e or CAT6)
Ethernet
51
convey data via light; provide incredibly high capacity and long-distance communication
Fiber Optic
52
frequently used in data centers and for high-speed internet backbones
Fiber Optic
53
bandwidth and signal quality are good; frequently employed in cable television and high-speed internet connections
Coaxial Cable
54
Types of Wireless Networking
Wi-Fi, Bluetooth, NFC (Near Field Communication), Zigbee and Z-Wave
55
permits wireless short-range communication between devices; frequently used for data transmission and contactless payments
NFC (Near Field Communication)
56
intended for low-power, low-data-rate uses (such as IoT and smart homes)
Zigbee and Z-Wave
57
gives mobile devices wireless internet connection; include 3G, 4G, LTE, 5G
Cellular Networking
58
internet connection in remote or rural locations where wired or cellular networks would not be accessible is made possible; makes use of satellites circling the Earth
Satellite Networking
59
devices connect without the need of a central server; frequently utilized for decentralized apps and file sharing
Peer-to-Peer (P2P) Networking
60
establish private, secure connections across a public network, often the internet
Virtual Private Networks (VPNs)
61
frequently utilized to provide remote access to private networks and safeguard the privacy of data
Virtual Private Networks (VPNs)
62
enables remote access to data and apps for both organizations and people
Cloud Networking
63
sends data packets
data plane
64
controls network traffic
control plane
65
networking strategy that divides the data plane from the control plane; more flexibility and control over network resources
Software-Defined Networking (SDN)
66
connects machines, sensors, and control systems in manufacturing and automation environments
Industrial Networking
67
Examples of Industrial Networking
Profibus, Modbus, Ethernet/IP
68
serve as a platform for cooperation and internal communication
Intranet and Extranet
69
provide limited access to the public
Extranets
70
internal networks that are only accessible by members of the company
Intranets
71
integral aspect of the digital age
Security and Privacy
72
Types of Security
Cybersecurity, Physical Security, Information Security, Network Security
73
policies and procedures used to guard against unwanted access, assaults, and damage to computer networks, systems, and data
Cybersecurity
74
Cybersecurity includes:
Firewalls, Antivirus Software, Encryption, Access Controls, Incident Response
75
filter network traffic and prevent malicious access
Firewalls
76
detect and remove malware
Antivirus Software
77
make it unreadable to unauthorized users
Encryption
78
implementing strong user authentication and authorization systems
Access Controls
79
having plans in place to address and recover from security breaches
Incident Response
80
includes defending physical asserts, data centers, and equipment from damage or theft in addition to protecting against digital threats
Physical Security
81
protecting the confidentiality, integrity, and availability of information; includes trade secrets, customer data, and proprietary information
Information Security
82
ensures safety of data transmission across networks, preventing eavesdropping or data interception
Network Security
83
Types of Privacy
Data Privacy, Online Privacy, Surveillance and Government Privacy
84
individuals’ control over their personal information and how it is collected, used, shared, and stored by organizations and institutions
Data Privacy
85
key aspects of data privacy
consent, data minimization, transparency, access and correction, data protection
86
collecting only the necessary data and nothing more
data minimization
87
concerns related to online activities; tools like VPNs and browser privacy settings help protect this
Online Privacy
88
significance of surveillance and government privacy
individual rights, trust, legal and regulatory compliance, business competitiveness, national security, ethical considerations
89
computer's actual hardware
hardware
90
hardware is comprised of:
CPU, memory, storage devices, input/output devices
91
comprises of OS, programs, applications
software
92
software is comprised of:
OS, programs, applications