Microcomputer Basics Flashcards

1
Q

Motherboard

A

Central Processing Unit - on motherboard
Arithmetic and logical calculations
Controls all internal and external devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Motherboard - Memory

A

On motherboard

RAM-volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cache stores

A

Near CPU-instructions and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ROM

A

Non-volatile

Start up instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Motherboard - Expansion Cards

A

Sound and video cards
Laptops use integrated components
Provides extra functionality
Fits into slots on motherboard and most have ports on back of computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Video Card

A

Translates binary data into images
Includes HDMI ports
Usually have their own video RAM and processors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sound Card

A

Cable connects to DVD/Blue Ray

Ports for audio, line, mice and joystick inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Motherboard - Network Interface Card (NIC)

A

Enables computer to connect to other computers and the internet.
Attaches to or is integrated into the motherboard.
Access to ethernet for wired networking or wireless network cards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Major Component - Power Supply

A

Provides power for all components and peripherals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Major Component - Hard Drive

A

Largest storage component of computer system.
In sealed case.
SSD or Platters
Connects to Motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Major Component - DVD/Blue Ray Drive

A

Not normally available on laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Literacy

A

Understanding the capability and limitations of computers, and knowing how to use them safely and efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Elements of Computer Literacy

A
  1. Avoiding hackers and viruses.
  2. Protecting your privacy.
  3. Understanding the real risks.
  4. Using the web wisely.
  5. Avoiding online annoyances
  6. Being able to maintain, upgrade, and troubleshoot your computer.
  7. Knowing which technologies are on horizon and how to integrate them into your life.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

LCD Monitors

A

Flat panel monitors are popular on new computers and as replacements or upgrades.
Most common
Light and energy efficient.
Fixed grid of pixels.
Cold Cathode Fluorescent Lamps (CCFL) to provide the backlight.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pixel

A

Each is comprised of three sub pixels of red, blue, and green.
Blocking or passing of light causes images to form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

LED Monitors

A

Newer, and use light emitting diode technology.

More energy efficient, better color accuracy, and thinner panels than LCD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

OLED Monitors

A

Organic light emitting diode display.
Uses organic compounds that produce light when exposed to an electric current.
Do not require a backlight to function, so draw less power and have thinner displays than LCD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Choosing a Monitor

A

Two of the most important factors are:
Aspect ratio
Resolution
Consider size, resolution, and brightness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Aspect Ratio

A

One of most important factor.
The width to height proportion of a monitor.
Older were 4:3, newer are 16:9 (HD format)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Resolution (monitor)

A

Dictated by the screen size and aspect ratio.
Clearness/sharpness of the image, reflects the number of pixels on the screen.
Max resolution of 1600x1200=1,600 vertical columns, with 1,200 pixels in each column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Contrast Ratio

A

Difference in light intensity between brightest white and darkest black a monitor can produce.
Ratios between 400:1 and 1,000:1 are good
Too low ratios results in fading colors when brightness is adjusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Viewing Angle

A

Measured in degrees; 150 degrees or more preferable.
Too low means you need to sit directly in front to get a good image.
Distance in degrees from which you can move to the side/above/below before the image degrades.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Brightness

A

300 cd/m2 or greater (candelas per sq meter/nits)
Greatest amount of light showing when the monitor is displaying pure white.
Image hard to see in a bright room.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Response Time

A

Lowest if viewing live action sports.
High results in jerky images.
Time in milliseconds it takes for a pixel to change color.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Monitors: Bigger always better?
No. | You can display more with a bigger screen, but using two smaller monitors may work.
26
Monitors - Size Does Matter
HD-DVD-Blu Ray > 1920 x 1080 resolution | Larger monitors can create the effect of 2 separate monitors.
27
LCD Monitor Sizes
Wide Screen-work with multiple windows or watch a lot of movies. 4:3=H is 3/4 of width (4units w x 3 units h)
28
Ink Jet Printers
Spray tiny drops of ink onto paper. Advantages: high-quality color printouts; good quality printers are affordable; images on the right paper look professional.
29
Laser Printers
Static electricy signals where to print ink. Faster than inkjet and higher quality printouts. Price competitive, but more economical than inkjet long term when factoring in ink/toner. Use toner.
30
Choosing a Printer
Speed Resolution Color Cost of consumables
31
Printer Speed
Measured in pages per minute | Black/white faster, esp. laser
32
Printer Resolution
``` A printer's image clarity measured in dpi Recommended dpi: 300 Black and white text 1,200 General purpose images 4,800 Photos ```
33
Printer Color v. B and W
Best have separate cartridges for each color. Inkjet and laser generally have 4: black, cyan, magenta, yellow - standard add light cyan and light magenta to high quality
34
Printer Costs of Consumables
Printer cartridges and paper. Research in consumer magazines. Some printer cartridges can exceed the cost of some printers.
35
How a LCD Monitor Works
A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals mov around, blocking light waves generated or letting them shine through.
36
Binary Numbers
Based on 0 and 1, off or on. Each binary digit is called a bit. Everything storable is encoded into binary. Computer reads and outputs alpha-numeric characters, graphics.
37
Base Systems
Place value gives meaning to the digits in a number. - Decimal - Base 10 - Hexadecimal - Base 16
38
Decimal System
A 3-digit decimal number has a: - 100's place (10 2) - 10's place (10 1) - 1's place (10 0)
39
Hexadecimal System
A 3 digit hexadecimal number has a: - 256's place (16 2) - 16's place (16 1) - 1's place (16 0)
40
Base Conversion
Humans use decimal (base 10) numbers. Computers use binary (base 2). Hexadecimal (base 16) is compromise. -Represents larger numbers with fewer digits.
41
Comparison of Decimal/Hexadecimal/Binary
Decimal - 256 Hexadecimal - 100 Binary - 000100000000
42
RGB Systems
Represent color on monitor. Each of 3 colors has value between 0-255. The number scale represents how bright the light for that color shines.
43
Color Values
White: Red-255 / FF Green-255 / FF Blue-255 / FF
44
Smartphones are Computers
``` Hardware (CPU and storage) Input/Output devices Ports Software Sensors ```
45
Smartphone Input/Output Devices
Touch sensitive screen Microphone Keypad Camera
46
Smartphone Storage
ROM - OS RAM - Data and application programs Size dictates use of special processors and OS's
47
Smartphone Display
OLED displays Resolution up to 1920 x 1080 Up to 6 inches
48
Smartphone Sensors
``` Accelerometers GPS Chips Light sensors Proximity sensors Barometers Digital Compases Biometric security (fingerprint/iris) Magnetometer ```
49
Accelerometers
Detect shaking or rotation
50
GPS Sensor
Location aware software. System of satellites built by US Department of Defense. Antenna to pick up signal from satellites and translate to latitude and longitude to within 10 feet. Airplanes/Cars/Boats Geotriggers
51
Smartphone Connectivity
Internet - wireless and cellular Bluetooth NFC - car or bill paying.
52
Smartphone Memory and Storage
Up to 256 GB internal memory Internal or external micro SD cards-memory expansion iPhone doesn't allow addition of any memory
53
Mobile Operating Systems
iPhone iOS Google Android - most popular Windows Based - less than 1% of mobile market
54
Cloud Storage
Backup - easy and safe Photos - instant and synced (Google photos available for iOS and Android for free, and is unlimited.)
55
Main Artificial Intelligence Assistants
iOS - Siri | Android - Google Assistant
56
AI Assistants
Support voice commands. Gather information you need based on your location or task lists. Works in background w/no specific requests.
57
Google Assistant
What package being delivered by FedEx today Learns from e-mail and web searches. Remind you to leave for the airport based upon time. Locate your frequent flyer number.
58
Google Assistant
What package being delivered by FedEx today Learns from e-mail and web searches. Remind you to leave for the airport based upon time. Locate your frequent flyer number.
59
Phone Gadgets
``` Flir - window leaks Kardia - EKG BacTrac - breathalyzer Ravensburger Smartscope Skulpt Scanner - muscle scanner/analyzer Automatic Pro - car's ODB-II port Hidrate Spark - smart water bottle Photomath - scan and get help solving math problems Wilson X - basketball coach iBobber - Fish finder ```
60
Each ___ can represent one letter, number, or symbol?
Byte
61
What is a laptop that can convert into a tablet-like device?
A 2-in-1 PC
62
Touch-screen devices usually feature _____ keyboards.
Virtual
63
The fastest computer port is the:
Thunderbolt. | 10 gigabits per second
64
Which computer component drains the battery the fastest?
Display screen
65
Ergonomics
Important consideration for all computing devices.
66
The most common output device for soft output is:
The display screen.
67
Display Monitor
Can be both an input and output device.
68
Optical Storage Media
CD-ROM DVD-ROM DVD-RAM Blu-Ray
69
Types of Ports
Thunderbolt HDMI USB
70
A power control option that performs a warm boot:
Restart
71
Byte
8 bits of data | Can hold a number between 0-255
72
Bits
Short for binary digit
73
Kilobyte
KB | 1,024 bytes
74
Bytes
``` Kilobyte - one thousand (1,024) Megabyte - one million (1,048,576) Gigabyte - one billion (1,073,741,824) (786,432 pages of text) Terabyte - one trillion Petabyte - one quadrillion (1k terabytes) ```
75
Hertz
Machine Cycles per second
76
Terabyte
More than 1 trillion bytes
77
System Unit
``` Hard drive unit Optical drive unit Motherboard Fan Expansion Slots Connectors Power supply and fan ```
78
Expansion Hub
An expansion hub is a powered hub that is 2.0 and USB. It simply allows you to connect to devices that you were not able to connect to with a regular hub.
79
Flash Memory
Can store 256 GB of data Often used in smartphones PCMCIA Type I and Type II memory cards (used as solid-state disks in laptops) Can be plugged directly into a USB port
80
Ethernet Port
Connects a computer to a cable modem or a network.
81
USB Port
Commonly used for connecting input and output devices
82
DVI Port
Not generally for audio Same capability as HDMI Used to connect projectors to a computer system
83
HDMI Port
Used for home theater systems
84
VGA Port
Used to connect CRT monitors
85
Fastest Data Transfer Rate
USB 3.0
86
What kind of numbering system is ordinarily used by people?
Decimal
87
Hexadecimal represents numbers by using which base?
Sixteen
88
In the RGB system, when all three component colors are set to zero, the result is?
Black
89
How many colors are used by the RGB system?
Three
90
A single hexadecimal number is represented by how many digits in the binary numbering system?
Four
91
What numbering system uses base 2?
Binary
92
When storing information in a computer, the binary system uses what to represent an on switch?
1
93
When storing information in a computer, the binary system uses what to represent an off switch?
0
94
For each numbering base system, the far right always has a place value of what?
1
95
For each numbering base system, as you move to the left, the value of each digit becomes how much greater?
Exponentially
96
What numbering system is used in place of binary numbers because binary numbers are difficult to read?
Hexadecimal
97
In the RGB system, each color can have a value from what to what?
0-255
98
In the hexadecimal numbering system, each place value digit is how many times greater than the digit to its right?
16
99
In the binary numbering system, each digit can have how many possible values?
2
100
In what numbering system does each place value digit have ten times greater than the digit to its right?
Decimal
101
Computers store information in which numbering system, which is difficult, if not impossible for humans to read?
Binary, base two
102
The Internet
A network of networks connecting billions of computers globally. Evolved from a U.S. Government funded project called the Advanced Research Projects Agency Network (ARPANET). Needed a computer network that wouldn't be disrupted in case of attack. Established a secure form of communications. Created a means of communication for all computers.
103
Client/Server Network
Client asks for data. | Server receives request and returns data.
104
Internet Protocol (IP) Address
How computers identify each other. Websites have unique IP addresses. Text versions of IP addresses because IP addresses too hard to remember.
105
IP Address
Set of four groups of numbers separated by periods. Dotted quad or dotted decimal. Identifies a website. Identifies a computer connecting to the internet.
106
Web 2.0
Social Web. Collaboration tools. Social Media. Includes social networking, wikis, blogs, podcasts, and webcasts.
107
Social Networking
Facebook Twitter Many precautions for using social networking sites.
108
Project Collaboration and File Sharing Tools
Wikis Project management tools Blogs
109
Blogs
Blog - weblog Video log - vlog A personal log or journal posted on the web.
110
Wikipedia
A wiki, a web application that allows users to add, remove, or edit its content.
111
Google Drive
Has wiki-like features to promote online collaboration. | Specific wiki software, such as Wikispaces and MediaWiki
112
Wikipedia Foundation
Hosts other collaborative projects such as Wikibooks, Wikiversity, and Wikisource.
113
Project Management Tools
Incorporate tasks and calendars so the individual components and project can stay on schedule.
114
Microblog
Blogs with limits on how much text can be used.
115
Problems with Blogs
Spam blogs - splogs
116
Podcast
A form of digital media composed of a series of audio or video files that are distributed over the internet. Delivered via RSS
117
RSS
Really Simple Syndication | Delivers podcast automatically to an aggregator.
118
Aggregator
Receives RSS podcast feeds. | Locates all the RSS series to which you've subscribed and automatically downloads the new content.
119
Webcast
Broadcast of audio or video over the internet.
120
Media Sharing Platforms
YouTube, Flickr, Instagram, Sound Cloud
121
Communicating over the Web
E-mail Instant Messaging Texting VOIP
122
E-Mail
Primary means of communication over the internet. Fast and convenient means of exchanging and collaborating on documents via attachments. Two types are web based and using e-mail client Asynchronous More private than social media
123
Asynchronous
e-mail | Users don't need to be communicating at the same time.
124
Instant Messaging
Real time AIM, Google Chat, Windows Messenger are proprietary IM services Synchronous
125
Proprietary IM Services
Chat with only those who share the same IM service and are on buddy list.
126
Universal Chat Services
Allow you to chat with users of all popular IMs
127
Texting
Sending of messages between devices.
128
Voice over Internet Protocol (VOIP)
Uses the internet to make phone calls.
129
e-Commerce Business Models
Business to Consumer (B2C) Business to Business (B2B) Consumer to Consumer (C2C)
130
Business to Consumer (B2C)
Business sells to consumers | Amazon.com
131
Business to Business (B2B)
Business sells to other businesses Paper company that distributes paper to other companies. Omahapaper.com
132
Consumer to Consumer (C2C)
Consumers sell to other consumers | ebay.com, craigslist.com
133
Electric Commerce (e-commerce) Safeguards
Use secure websites - secure sockets layer protocol. Well-known, reputable sites Pay by Credit, not Debit card. Copy order, confirmation number and return policy Avoid shopping on public computers.Bro
134
Secure Website
SSL protocol | URL is "https://"
135
Browser
``` Software that lets you locate, view, and navigate the web. Most are graphical. Google Chrome Microsoft Edge Firefox Safari ```
136
Graphical Browsers
Can display pictures in addition to text, sound, and video.
137
Google Chrome
Most popular browser Can run on any device and with any OS Sync between devices open tabs, bookmarks recent search results.
138
Microsoft Edge
Available only on Windows 10 | Requires Microsoft Account
139
Firefox
Open source Mozilla Lets you keep only the features you want.
140
Safari
Developed by Apple for Mac | Has a Windows version for PCs
141
Universal Resource Locator (URL)
Use to access a website. | Identify the web document it stands for.
142
Protocol
Set of rules used to retrieve a document. 1. Hypertext Transfer Protocol 2. File Transfer Protocol 3. BitTorrent
143
Domain Name
Main domain name is a site's home page. | http://newyorktimes.com
144
URL
``` http://www.nytimes.com/pages/technology Protocol: http: Domain: www.nytimes Top Level: .com Path/sub-directory: pages/technology ```
145
Hyperlinks
Specially coded elements that let you jump from one web page to another within the same website or to another website.
146
Breadcrumb Trail
Help navigate more quickly through a website. | A navigation aid that shows users the path they have taken to get to a web page.
147
History
List that shows all the websites and pages you've visited over a certain period of time. Organized by day, up to 3 weeks.
148
Bookmarks
Allows you to return to a specific web page without having to remember the address.
149
Live Bookmark
A feature in Firefox that adds the technology of RSS feeds to bookmarking.
150
Tagging/Social Bookmarking
Saves your favorite website to a social bookmarking site so you can share it with others. Delicious.com
151
Search Engine
A set of programs that searches for keywords and returns a list of websites on which those keywords are found. Search only sites that are relevant. Metasearch searches other search engines.
152
Metasearch Engine
Searches other search engines rather than individual websites.
153
Spider
Search
154
Obtaining Better Search Results
Boolean Operators Search for a phrase Search within a website Search with a wild card
155
Evaluating Websites
``` Authority Bias Relevance Audience Links ```
156
Digital Activism
``` Raise awareness about specific issues. #IceBucketChallenge #BringBackOurGirls Question if effective or fosters a false sense of involvement. ```
157
Geolocation
``` GPS chip that can calculate exact position Targets consumers by their location Used by 3rd party advertising networks Can be a violation of privacy rights No specific laws yet ```
158
Using the Web Effectively
Accessing and moving around the web Searching the web effectively Using the web ethically
159
Tools used to Navigate the Web
``` Hyperlinks Breadcrumb trail Bookmarks History Tagging ```
160
Visual Indications of Secure Website
https:// Closed padlock and green-colored address bar Consider the validity of the site. TRUSTe and Better Business Bureau
161
Safe on-line Shopping
Investigate unknown sites with bbb.org or bizrate.com Check return policy, save copy of order, make sure you receive a confirmation number. Make sure company has phone number and address. Pay with credit, rather than debit card. Use common sense.
162
Credit Cards
U.S. federal consumer credit card protection laws protect credit card purchases, not debit card purchases.
163
Click and Brick business
Business with both a traditional and on-line store. | Barnes and Nobles
164
Social Commerce
A subset of e-commerce that uses social networks to assist in marketing and purchasing products. "Liking" a company. Ordering a latte and paying w/Starbucks app.
165
Avoid Shopping on Public Computers
May have spyware installed that can track and log keystrokes. Also avoid wireless transactions in public hotspots.
166
HTTP
Hyper Text Transfer Protocol Start most URLs Enables files to be transferred from a web server so you can see them on your browser.
167
FTP
File Transfer Protocol | Used to upload and download files from one computer to another.
168
TLD
Top Level Domain Indicates the kind of organization the host is. The three-letter suffix .com - originally commercial, but now all .biz - Businesses .edu - Degree granting institutions .gov - Local, state, and federal .info - Information service providers .mil - U.S. military .net - originally for networking, but now all .org - organizations such as not-for-profits
169
Blogs
One of the most popular ways of sharing content on web. Web log A journal posted on the web. Usually written by a single author, arranged as a list, and are public, and can be created by anyone.
170
Setting up a Blog
Blogger.com Sign up and create a blog name. Accessible with a google account. New blog, create a name, pick a design template, create URL.
171
Posting Content to a Blog
Click on new post icon next to heading. Type title for entry in post title box, then content. Click Link to create a URL for your post. Insert Image to add a photo. Click preview to preview blog.
172
Reader Comments on Blogs
Feedback helps shape future entries and direct you to other blogs you may find interesting.
173
Mobile Blogging
Install blogger app on smart phone. | Add, edit content, send links or location.
174
Set up a Blogger Profile
Don't provide personal information and let others know your personal interests. Click the icon near your name and click blogger profile link, add photo, link to home page, save profile button.
175
Searching for Blogs
Many directories Blogs.botw.org blogsearchengine.com blogcatalog.com
176
Differentiate between Keyword and Metasearch Engines
Google vs. dogpile/info.com
177
Keyword Search Engines
Google or Bing | Not sorted, returns a list of websites.
178
Metasearch Engines
Dogpile or info.com Search engine that searches other search engines. Combine and compare results from multiple search engines to make search the web more efficient. Eliminates duplicates and searches for relevancy for more complete listing in less time.
179
Different Search Engines
``` ChaCha - Human search engine Technorati - Blog search engine Monster - Job search engine Blinkx - multimedia metasearch engine TheSearchEngineList - Comprehensive list of search engines. ```
180
Alternative Search Engines
ChaCha - Human search engine Technorati - Blog search engine Monster - Job search engine Blinkx - multimedia metasearch engine (YouTube) TheSearchEngineList - Comprehensive list of search engines.
181
Effective Searches
Ensure terms are not too broad. Use a minus sign to exclude some results. Find synonyms ~ Specific file types: Info:, Define:, Numrange ".." Quotes for exact search terms Google has modifiers under search box (video, Images) Google, click settings, Advanced Search for search form LearnTheNet.com
182
Networking Sites
``` Media Sharing Business Networking and Collaboration Information Sharing e-Commerce and Payment Social Travel Health and Fitness Wiki ```
183
Media Sharing Sites
``` Instagram YouTube Pinterest Flickr Periscope Vine Bandcamp Spotify ```
184
Business Networking and Collaboration
LinkedIn Slack Kickstarter StartupNation
185
Information Sharing
``` Delicious SlideShare StumbleUpon Reddit Digg ```
186
ASCII Code
Developed as the standard for computers from different manufacturers to exchange data. Character to binary. 1963
187
Advanced Research Projects Agency (ARPA)
1958 Established for the US Department of Defense. | Created ARPANET, the beginnings of the internet.
188
First Internet Message
1969 by UCLA sent first internet message to Stanford University. Beginning of network communication.
189
Ray Tomlinson
1972 wrote program to send e-mail over ARPANET Develops "User@host" e-mail convention. 1978 there were 111 Internet domains on ARPANET.
190
Vincent Cerf and Robert Kahn
1973 developed a set of communication rules - the TCP/IP protocol that allows different types of computers to communicate.
191
Tim Berners-Lee
Developed and made public HTTP protocol and WWW. | Developed the first web browser.
192
WWW
1991 A subset of the Internet that is connected via hypertext (text containing hyperlinks to other documents and media. 1997 1million internet domains on ARPANET
193
Client Server Network
1. User enters www.amazon.com in browser (client.) 2. Request sent to servicer via data pathways. 3. Data flows along backbone and on to smaller pathways until it reaches server for Amazon. 4. Server returns requested data using fastest pathway (which may be different than arrival path.) 5. Web browser interprets the data and displays it on your monitor.
194
IP Address
Identifies your computer. | A set of 4 numbers separated by periods.
195
e-Commerce and Payment
Venmo Paypal SquareCash Groupon
196
Social Travel
Uber Airbnb TripAdvisor Wase
197
Health and Fitness
MapMyFitness Fitocracy MyFitnessPal Happier
198
Wiki
Project collaboration and file sharing. | Screen sharing, project management
199
Social Media Sharing
``` Blogs Podcasts Webcasts (realtime) e-mail (most common) Instant Messaging Texting VoIP ```
200
Podcast Directories and Aggregators
iTunes (itunes.com) Podfeed (podfeed.net) Stitcher (stitcher.com) YouTube (youtube.com)
201
Web Based email vs. e-mail Client
Accessible from any computer with internet. | Software installed on your computer.
202
Instant Messaging
Real time exchange. Used by multiple persons simultaneously, Video/audio chats available.
203
Text Messaging
Uses short messaging service (SMS) to send asynchronous messages between multiple mobile devices. Can include images or video.
204
VoIP
Voice communication via Internet Free or low cost calls Some reliability issues.
205
OnLine Shopping Precautions
``` Use a firewall and antivirus Don't shop on public wifi (spyware) Check for visual indicators (https, padlock, green) Third party verification (BBB) Use credit, not debit card. Create a strong password. Deals too good to be true usually are. Read the fine print. ```
206
Common Browser Features
Privacy browsing Tabbed browsing Address bar/search box Pin tabs of favorite sites
207
Google Specialized Search
``` Custom Search Finance Trends Shopping Scholar ```
208
Boolean Operators in Searchers
Use AND, NOT, OR between keywords in a search
209
Cloud Storage
OneDrive Dropbox and GoogleDrive alternatives No more flash drives needed Share File or Folder
210
Letter K
01001011
211
What factors should you consider processor speed?
Processor speed is a measure of how many tasks the main chip can perform in 1 second. Other factors such as the number of cores, cache memory, and FSB, how fast data is exchanged between the CPU and RAM.
212
Machine Cycle (hertz Hz)
Machine cycles per second. The process of the CPU getting the data or information from RAM and decoding the instructions into something the computer can understand. The CPU executes and stores the results back into system memory.
213
What size hard drive do I need?
Consider storage needs as well as any external forms of storage you may use. Today's internal drives have capacities of 8Tb or more.
214
External Hard Drives
Internal hard drives that have been made portable by enclosing them in a protective case and making them small and lightweight. Used to backup internal hard drive.
215
Flash/Jump/USB/Thumb Drives
Significant storage capacity, up to 256 Gb.
216
Cloud Storage
Keeps your files on the Internet. Requires that you install software on device. Dropbox, OneDrive, iCloud, Google Drive.
217
Flash Memory
Your computer will need a slot into which you can insert the flash memory card. Also memory card readers that plug into a USB port. Digital cameras, smartphones, video cameras, and printers. Use Solid State Flash memory, and have capacities that exceed DVD's.
218
Ports
Places which peripheral devices attach to the computer to exchange data.
219
Adding Ports to your System
``` Expansion cards (clip into expansion slot on motherboard.) Expansion hub. ```
220
Expansion Hub
A device that connects to one port to provide additional new ports.
221
Thunderbolt Port
Newest input/output technology. Uses fiber optic technology and can achieve extremely fast transfer speeds. Apple the first to integrate.
222
USB (Universal serial bus) Ports
Most common to connect input/output devices to the computer. | USB 3.1 up to 10 Gbps and charges devices faster.
223
Ethernet Ports
Connect to a DSL or cable modem, or network. | Transfer speeds up to 10,000 Mbps.
224
HDMI Port
High definition multimedia interface. High definition video and uncompressed digital audio in one cable. All monitors, DVD payers, TVs and game consoles have at least one.
225
Types of Ports
USB Ethernet HDMI Thunderbolt
226
Which browser feature enables you to secure a tab permanently?
Pinned tabs
227
What is a Specialty Search Engine?
Searches only sites deemed appropriate to an interest or industry.
228
Two Basic Types of Software
Application software | System software
229
Software
A set of instructions that tells the computer what to do.
230
Application Software
Is used to do tasks at home, school, and work.
231
System Software
Helps run the computer and coordinate instructions between application software and the computer's hardware devices.
232
Ways to Distribute Software
Local installation Software as a service (SaaS) Subscription
233
Ways to Purchase Software
``` DVD from brick and mortar store Download from internet Student discounts Freeware Beta Versions ```
234
Installing Software
System requirements Create a restore point Full installation vs. custo installation Recovering from a computer crash using a recovery drive
235
Uninstalling Software
Removes the software from your hard drive.
236
Upgrading Software
Upgrades and updates are not required if you have a subscription to the software or are using software as a service. You don't need to rush to get every upgrade Many software is backward compatible.
237
Backwards Compatibility
Vendors make new versions backward compatible, meaning that the new versions can recognize and open files created with older versions.
238
Software Licenses
``` End User License Agreement (EULA) Ultimate owner of the software; Whether copies can be made; Number of installations allowed; Warranties. ```
239
Two Categories of Software
Productivity and Business Software | Multimedia and Educational Software
240
Productivity and Business Software | Installed-Proprietary
Microsoft Office | Apple iWork
241
Productivity and Business Software | Installed-Open Source
LibreOffice
242
Productivity and Business Software | Web-Based
Microsoft Office Online Google Docs Zoho ThinkFree
243
Microsoft Office
``` Word Excel PowerPoint Access OneNote Outlook ```
244
Apple iWork
Pages Numbers Keynote
245
LibreOffice
Writer Calc Impress Base
246
Microsoft Office Online
``` Word Excel PowerPoint OneNote Outlook ```
247
Google Docs
Docs Sheets Slides Gmail
248
Zoho
``` Writer Sheet, Books Show Creator Notebook ```
249
ThinkFree
Write Calc Show Note
250
Word Processing Software
``` Create and edit documents for: Research papers; Class notes; Resumes. Microsoft Word (most popular) or Zoho Writer ```
251
Spreadsheet Software
``` Performs calculations and numerical analyses. Text; Values and dates; Formulas; Functions. Microsoft Excel; Apache OpenOffice Calc ```
252
Presentation Software Tips
Use images; Be careful with color; Use bullets for key points, limit 4-6 per slide; Consider font size and style; Keep animation and background audio to a minimum.
253
Database Software
``` Store and organize data in: Fields-a data category Records-related fields Tables-related records Oracle, MySQL, Access ```
254
Note Taking Software
Research, brainstorming, and collaboration. Organize notes into tabbed sections. Access from other office applications. OneNote Evernote
255
Personal Information Manager Software
Manage e-mail, contacts, calendars, tasks. Outlook is most widely used PIM. Web-based PIMs-Google, Yahoo!-similar to Outlook Other Options-Toodledo-coordinates well with Outlook, OmniFocus for Mac.
256
Productivity Software Features
A wizard walks through the steps necessary to complete a task. A template is a predesigned form. A macro is a small program that groups a series of commands.
257
Personal Financial Software
Manage daily finances; Electronic checkbook registers; Automatic bill payment tools Intuit Turbo Tax and HandR Block at Home for tax preparation.
258
Software for Large and Specialized Businesses
Vertical market software is designed for a specific industry. Computer-aided design (CAD) creates automated designs, technical drawings, and 3D model visualizations. SketchUp Make for home/landscape planning.
259
Small Business Software
Accounting software to track accounts receivable and payable, inventory, payroll, and billing. Desktop Publishing software (DTP) Web Authoring software
260
Desktop Publishing Software
Newsletters, catalogs, annual reports or other large complicated publications.
261
Multimedia Software
Required to produce computer games, animations, and movies. Photo and image editing; Digital audio and video-editing.
262
Drawing Software
``` Two dimensional, line based drawings. Technical diagrams. Animations Adobe Illustrator Home and landscape with Broderbund. ```
263
Digital Audio Software
``` Digital audio files Downloaded music files, audiobooks, or podcasts. Compressed: MP3 (most common), ACC, WMA Uncompressed: WAV, AIFF Digital audio workstation software. Audio-Editing software. ```
264
App Creation Software
Create characters to extend a game: EverQuest, Oblivion, Unreal Tournament Create your own games: Unity, Adobe Flash, RPG Maker VX, GameMaker
265
Educational and Reference Software
``` Test Preparation; Simulation; Instructional; Trip Planning; Home Design/Improvement; Course Management; Brain Training; Genealogy; Typing, languages, cooking. ```
266
Freeware
Copyrighted software that certain program developers distribute for free. Filehippo.com and majorgeeks.com
267
Open Source Software
Free software that is available with few licensing and copyright restrictions. Offer little or no formal support except by community of users. Community of users keep it current.
268
Beta Versions
Free of charge. | Still under development, but developers hope users will report errors or bugs.
269
Installing Beta, Open Source and Freeware
Always set a restore point before downloading any kind of software. Only use programs designed to work with your operating system. Wait until last version is released. Stick with reliable developers. Make sure virus protection is up to date.
270
Software for Students
Students may be able to buy regular software at discount prices from a campus computer store or bookstore, on-line or mail-order. Some software developers offer discounts to students.
271
How do I know if the software I buy will work on my computer?
Every software has a set of minimum requirements for the operating system, processor, primary memory (RAM) and hard drive, video card, and peripherals.
272
Do you have to do anything special if you're downloading software from the internet?
For the most part software is downloaded in a zipped format and automatically, without special interaction.
273
Installing Software
Must be installed on hard drive. May differ between DVD or from the web. Both usually offer installation wizards.
274
Full or Custom Installation
Full copies all program files to computer while Custom you decide what features to install.
275
Installing Downloaded Software
Locate the setup.exe file, and take recommended actions to complete the installation.
276
Uninstalling Software
Go to the Programs and Features in the Control Panel and choose the application you want to delete.
277
Uninstalling Software in Windows 8-10
Right click the program tile on the Start Screen and then select Uninstall.
278
Uninstalling Software using the Programs and Features Icon in the Control Panel
Choose Uninstall, Change or Repair. | Uninstall will run the proper cleanup routine to clear all files and restore settings that have been changed.
279
Productivity Software Suites
Includes word processing, spreadsheet, presentation, database, and PIM programs. For Microsoft (proprietary) software its cheaper to buy the suite than individually. Include installed as well as web-based.
280
What sort of software would I use to create a website?
Squarespace and Adobe Dreamweaver are two programs that both professionals and casual web page designers use to create web pages. MSOffice also lets users convert to a web-compatible format. Also web-page authoring software
281
Web Page Authoring Software
Allows the novice to design interesting and interactive web pages without knowing any HTML code. Often include wizards, templates, and reference materials. Squarespace and Adobe Dreamweaver.
282
What software do I need for designing a newsletter?
Many word processing programs have features that are hallmarks of desktop publishing. For professional projects use QuarkXPress and Adobe InDesign.
283
Desktop Publishing Software
Tools you can use to format and arrange text and graphics. Also import files from other sources, manipulate graphics, and publish files to web. QuarkXPress and Adobe InDesign.
284
Adobe Photoshop Elements
A good basic program for casual users. | Correct red eye, improve color balance, touch up, and add creative effects.
285
Full-Featured Image Editing Software
Adobe Photoshop and Corel PaintShop Pro. Layering images and masking images. Create enhanced digital images used commercially in logos, advertisements, and on book and CD covers.
286
Digital Video Editing Software
Edit and manipulate digital video. Most moderately priced software have enough features for the casual user. Microsoft Movie Maker is free. Adobe Premiere Pro is premium software.
287
Adobe Illustrator
Tools to create professional quality creative and technical illustrations. Pencils, pens, and paintbrushes. Drag geometric images and use paint bucket, eye-dropper, and spray can tools.
288
Computer Aided Design Software
3D modeling engineers use to create automated designs, technical drawings, and model visualizations. Can be rotated.
289
CAD Projects
Medical engineering-solid models of human anatomy for medical implants.
290
Simulation Software
Educational software that allow you to experience or control the software as if it were an actual event, such as flying a plane.
291
Course Management Software
Blackboard. | Provide traditional classroom tools such as calendars, and grade books over the internet.
292
Windows Calculator
Converts between decimal, binary, and hexadecimal.
293
How each system represents values:
Decimal 0 1 2 3 4 5 6 7 8 9 Hexadecimal 0 1 2 3 4 5 6 7 8 9 A B C D E F Binary 0 1
294
Binary Digits Converted to Hex
A 16 digit binary pattern converts to a 4 digit hexadecimal value. 1110-0011-1000-1011 = E38B
295
Hex Codes
www.psyclops.com/tools/rgb
296
Binary to Hex Conversion
``` 0 0000 8 1000 1 0001 9 1001 2 0010 A 1010 3 0011 B 1011 4 0100 C 1100 5 0101 D 1101 6 0110 E 1110 7 0111 F 1111 ```
297
HTML Proramming Colors
FFFFFF White 000000 Black Red/green/blue: 153, 51, 255 Hex Code: 9933FF
298
Programming for End Users
Macros
299
Macro
Small program that groups series of commands so they run as a single command. Used to automate routine tasks or complex series of commands that must be run frequently. MSOffice includes Visual Basic (VBA) to provide functionality for recording macros (procedures.)
300
Advantages of Macros
Simplify complex tasks. Reusable. Can be edited and changed.
301
Creating a Macro in Word
Add the Developer tab to the ribbon. Record a macro in Word to insert a table. Run the macro. No blank spaces.
302
Insert Developer Tab in Word
File tab, Word Options, Customize Ribbon, Commands, Click Developer Box
303
The easiest way to automate a task in Word is to:
Perform the task while recording a macro.
304
Software as a Service
When a vendor hosts software on a website and you don't need to install the software on your device.
305
Copyleft
The practice of offering people the right to freely distribute copies and modified versions of open source software with the stipulation that the same rights be preserved in derivative works down the line.[1] Copyleft software licenses are considered protective or reciprocal, as contrasted with permissive free software licenses.
306
App Inventor
Software package that can be used to create mobile applications.
307
Benefits of Simulation Programs
Help prevent costly errors. Allow users to experience or control the software as if it were an actual event. Allow users to experience potentially dangerous situations without risk.
308
Bloatware
Pre-installed software that is best to delete if not used.
309
Moodle
Course management software.
310
How many binary digits are represented by one hexadecimal digit?
4
311
Each digit in a hexadecimal number represents how many bits?
4
312
The decimal number 12 is represented in hexadecimal as:
C
313
Expressed in base systems the RGB range is:
00000000-11111111 Binary 00-FF Hexadecimal 0-255 Decimal
314
Operating System Consists of what 2 primary types of programs:
Operating system | Utility programs
315
Operating System Functions
1. Manages computer's memory and storage. 2. Consistent means for application software to work with CPU. 3. Manage, schedule and coordinate tasks. An orchestra's conductor. Other: Provide a user interface. Manages computer hardware and peripherals. Manages the processor. Includes utility programs. Ability to multitask.
316
User Interface
How the user interact with the computer. Includes desktop, icons, and menus. OS Function
317
Utility Program
A small program that performs many of the general housekeeping tasks such as system maintenance and file compression. OS Function
318
Multitasking
Provide the ability to perform more than one process at a time. OS Function.
319
Common Operating Systems, Developers
``` Windows, Microsoft macOS, Apple iOS, Apple Android, Google Linux, Open Source ```
320
Operating Systems, Devices
``` Windows, laptop, tablet, desktop, all in one, smartphone. macOS, laptop, desktop, all in one. iOS, tablet, iphone, iPod touch. Android, smart phone, tablet Linux, laptop, desktop, tablet ```
321
Top 3 Operating Systems
Windows macOS Linux
322
Top 3 Mobile Operating Systems
Android iOS Window
323
Top Web-Based OS
Google Chrome OS | Main functionality provided through browser and virtually no filed copied to computer
324
OS for Machinery, Networks, Business
Real-Time OS (RTOS) | Multiuser Operating System
325
Real-Time OS (RTOS)
Machine that performs repetitive series of specific tasks in precise time. Cars, medical scanning equipment, robotic camera. Require minimal user interaction.
326
Multi-User Operating System
Network OS Allows multiple users access to the computer at the same time. Unix.
327
Unix
A multiuser, multitasking OS that is used as a network OS.
328
What the OS does
Enables user to interact with the computer.
329
Types of Interfaces
Command driven interface. Menu-driven interface. Graphical user interface (GUI).
330
Command Driven Interface
Enter commands to communicate with the computer system.
331
Menu-Driven Interface
Choose commands from menus displayed on screen. | Eliminated need to know all commands.
332
Graphical User Interface (GUI)
Current OS use UGI. | Display graphics and use the point and click technology of the mouse and cursor.
333
Spooler
A program that helps coordinate all print jobs currently being sent to the printer.
334
Preemptive Multitasking
The OS processes the task assigned a higher priority before those assigned a lower priority.
335
Interrupt Handler
A special numerical code that prioritizes requests. | Every device has its own type.
336
Hardware Coordination
Event created by all activity in each device. Device interrupt establishes priority. Event placed in interrupt table in computer's RAM. The OS performs preemptive multitasking.
337
Hardware Coordination Flow
1. CPU playing a movie. 2. CPU receives an interrupt request from the printer. 3. Memo about movie stored in stack (RAM). 4. CPU executes printing. 5. Memo about movie retrieved from stack. 6. CPU resumes playing movie.
338
Paging
The process of swapping.
339
Thrashing
Excessive paging.
340
Swap File
Data and instructions that haven't been used recently are moved to a temporary storage area on hard drive. When more RAM needed than is available.
341
Virtual Memory
Borrowed space from hard drive. | Increasing RAM can avoid using virtual memory.
342
Device Driver
A special program on each connected device that facilitates communication between that device and the OS. Manage peripherals and hardware.
343
Hardware and Peripheral Device Mgmt.
``` Device Driver (Seagate GoFlex Desk USB) Plug and Play ```
344
Plug and Play (PnP)
A hardware and software standard. Facilitates the installation of new hardware in PCs by including in the OS the drivers the devices will need in order to run.
345
Software Application Coordination
Application programming interfaces (API).
346
Application Programming Interface (API)
Blocks of code in each program the CPU recognizes. Used for the similar procedures in each program. Microsoft Direct X
347
Microsoft Direct X
A group of multimedia APIs built into the Windows OS. | Improves graphics and sounds.
348
Boot Process (4 steps)
1. CPU activates BIOS 2. Power-On Self-Test (POST) 3. Load OS from hard drive to RAM 4. Checking registry for configurations and customizations.
349
BIOS
Located in ROM. Activated by CPU Basic input/output system Responsible for loading the OS into RAM. Manages the exchange of data between the OS and the input/output devices. First task of BIOS is to activate POST. Goes through preconfigured list of devices then loads OS into RAM from hard drive. Step 1 of boot process.
350
Power-On Self-Test
Ensures that essential peripheral devices are attached and operational. Step 2 of boot process. 1. Tests the video card and video memory. 2. Identifies the BIOS. 3. Tests that the memory chips are working. 4. BIOS compares POST results with CMOS.
351
Loading the OS
System files are loaded into RAM. Loads Kernel. Step 3 of boot process.
352
Kernel
Supervisor program. The essential component of the OS that manages the processor and all other components. Memory Resident. Loaded into RAM in step 3 of boot process.
353
Checking Configurations/Customizations
OS checks registry for configurations used by the OS and applications. Non resident copies to RAM as needed. Step 4 of boot process.
354
Registry
Contains configurations used by the OS and applications. | Display settings for monitor.
355
The Main Features of the Windows Interface
``` Desktop Taskbar Start Menu Pinning Virtual Desktops ```
356
How Does OS Keep Computer Organized
``` Hierarchical organizational/directory structure. Root Directory (c://) Drives Libraries (music) Folders Subfolders Files ```
357
Utility Programs
Tools Used to Enhance Productivity, Back up Files, and Provide Accessibility. Small applications that perform special functions.
358
Desktop
Primary working area. Shows task bar at the bottom. Windows interface.
359
Start Menu
Provides access to all applications and apps installed on your device. Windows interface.
360
Virtual Desktops
Allow you to organize groups of windows into different displays. Windows interface.
361
Linux
Most interfaces are based on Windows and mOS paradigms. Ubuntu. Using icons to launch programs and apps running in a window environment.
362
Naming Conventions (Files)
Up to 255 characters. Each OS has their own naming conventions. Name followed by type extension (.doc) No 2 files stored on the same device or folder can share both the same file name and extension.
363
File Explorer
Main tool for finding, viewing, and managing the contents of the computer. Divided into left and right sections.
364
Large Icons
Good way to display contents of files and folders. Preview pane shows first page of document. Good way to view files and folders, especially images.
365
File Management Actions
``` Open Copy Cut Rename Delete Recycle Bin ```
366
File Compression
Compacts a large file making it easier/faster to e-mail, upload to web, or save to disc. Windows has built in compression. Free/share ware such as WinZip and Stuffit.
367
How are Files Compressed?
Redundancies in a file are removed. Right click on folder/file, Send to, Compressed (zipped) folder. File Explorer, click Share tab, Zip.
368
Utilities included in OS
The basic utilities designed to manage and tune the computer hardware. Firewall and file compression utilities.
369
Standalone Utilities
Offer more features or an easier user interface for backup, security, diagnostic, or recovery functions. Antivirus and Security programs.
370
Windows Administrative Utilities
System perfomance utilities. File and system backup utilities. Accessibility utilities.
371
System Performance Utilities
Windows Administrative Utilities. Disk Cleanup Task Manager Disk Degragmenter
372
File/System Backup Utilities
Windows Administrative Utilities. File History System Restore
373
Accessibility Utilities.
Ease of Access Center. | Windows Administrative Utilities.
374
Disk Cleanup
Removes unnecessary files from hard drive. References on FAT to files that no longer exist or have been moved (sys confusion.) Windows Administrative/System Performance utility.
375
Task Manager
Check on non-responsive program or use to exit the program. Process tab shows if program isn't responding. Windows Administrative/System Performance utility.
376
Disk Defragmenter
Rearranges fragmented data so that related file pieces are unified. Helps speed up performance. Windows Administrative/System Performance utility.
377
System Restore
Allows you to roll your system settings back to a specific date when everything was working properly. Windows Administrative/File,System Backup Utilities. When uninstall doesn't work.
378
Ease of Access Center
Centralized location for assistive technology and tools to adjust accessibility settings. A questionnaire asks about routine tasks and provides a personalized settings recommendation.
379
Ease of Access Tools
``` Magnifier (separate magnified window) Narrator Speech Recognition On-Screen Keyboard High Contrast color schemes ```
380
If PC isn't Booting Properly
Check to see if there have been recently installed hardware or software. Uninstall new hard/software using Uninstall program in Control Panel, then try to reboot again. If system boots, then reinstall.
381
Last Known Good Configuration
Windows Advanced Options menu. Used by Windows if it detects a problem in the boot process. Created each time you boot successfully. Registration information saved during last shut down.
382
Windows 10 Boot Errors
Reset PC attempts to diagnose and fix errors in system files causing the computer to behave improperly. Start menu/Setting/Update and Securities/Recovery.
383
CMOS
Stores hardware configuration. Involved in boot process. Results of POST compared to CMOS. A special kind of memory that is never erased and uses virtually no power.
384
Windows 10 Basics
Designed to run on multiple devices: desktops, laptops, tablets, and phones. Use a mouse Use a touch screen Use keystrokes
385
Start Menu Left Section
Provides access to all installed programs, including Most Used, Suggested, File Explorer, Settings, and Power buttons.
386
Start Menu Right Section
Block tiles that launch applications, installed software, and files/folders. Can be grouped together and resized. You will find tiles representing your most used applications.
387
To Position an Active Window
Press the Windows key and a directional key on keyboard.
388
File Explorer Left Section
Navigation pane showing contents. Quick Access - Commonly accessed files. OneDrive - files stored in the cloud. This PC - locally stored files.
389
File Explorer Right Section
Displays contents of a selection from left section.
390
Details View
Most interactive view. Files and folders are displayed in list form with additional file information in columns. Sort by name, date modified, type, size.
391
Recycle Bin
Files deleted from hard drive, which can be restored until permanently deleted. All files deleted from other drives are permanently deleted.
392
File Extensions
Identifies what kind of file it is and what kind of application should use to read the file.
393
Adding File Extensions
Windows adds the file extension for you. Mac and Linux don't need file extensions because the extension information is stored within the file itself. Add extensions if you'll send to Windows users.
394
What Does Disk Cleanup Clean
Recycle Bin files Temporary Internet files Temporary files created by Windows to store data while a program is running, but couldn't delete if it had a problem exiting a program. Calculates amount of space freed.
395
Accessing Task Manager
Right click on empty space on task bar. Start menu, Windows System, Task Manager Ctrl + Alt + Del
396
Task Scheduler
Utility program. | Allows you to schedule and manage tasks to run automatically at predetermined times.
397
How File Compression Works
Look for repeated patterns of letters and replaces with a shorter placeholder. Repeated patterns and placeholder cataloged and stored in the 'dictionary.' Can reduce text files up to 50%. "The rain in Spain falls mainly on the plain." Patterns: "ain", "the"
398
Unzipping Files
Usually use the same program used to zip it. | Restored to original state.
399
System Restore Point
Created every time you start your computer or install an application or driver. A snapshot. Restore Point Wizard resets system. Doesn't affect personal data files.
400
Task Manager Tabs (7)
``` Processes * Performance * Users * App History Startup Details Services Understanding if you should upgrade your memory, your processor, or buy a new system. ```
401
Action Center
Windows 10 shows major events and periodically checks the system for corrupt files or errors and displays in the Action Center. Quick access to security settings. Click on Notifications icon in the System Tray of the Taskbar. Icon becomes opaque when there's a new notification.
402
Functions of Task Manager
Monitor CPU and Ram to gauge computer's efficiency. | Quit programs not responding.
403
Processes Tab of Task Manager
Lists apps and processes currently in use, status, impact on system. Status shows "Not Responding" Background process pieces belonging to OS.
404
CPU Usage on Processes Tab of Task Manager
Display percentage of the CPU's time each program is using. | Find out which programs are putting the biggest load on PC.
405
Memory Usage on Processes Tab of Task Manager
Keep track of which programs are putting the biggest demands on memory. Displays programs' current memory usage.
406
Performance Tab of Task Manager
Displays summary information for CPU, memory, disk, and wifi usage. Level of 80% may indicate an upgrade is needed.
407
Services Tab of Task Manager
Lists all services currently in use (many OS). Provides status of current services. Can start or stop service for any service program by right clicking.
408
Weblinks
http: //www.informationweek.com - customizing and evaluating system performance. http: //www.geek.com - All things computer related.
409
Rotational Latency
A tiny delay after the read/write head is positioned over the correct track, while the head waits for the right sector to pass underneath.
410
Writing Data
Everything written in binary code. Read/write heads record each bit of information with lightning speed as the platter rotates underneath. One ring on disk written to at a time. Disk must be formatted first.
411
Solid State Drives Pros
Greater reliability due to no moving parts. High data transfer rates. Energy efficient. Becoming standard storage.
412
Hard Drives
Mechanical parts enclosed in a sealed case. Should always remain sealed. Traditional storage means.
413
Nonvolatile Storage
``` Hard Disk drives Solid state drives Solid state hybrid drives -Data is remembered when power is off. -Necessary if you want to save and access files and programs. ```
414
Solid State Drives Cons
Less storage capacity than hard disk drives. | Expensive.
415
Hard Drive Interior
Magnetically coated platter DC Spindle Motor Read/Write Head, Arm Actuator
416
Platter
Platters sit on top of the DC spindle motor. | Platters spin at a precise, constant speed of thousands of revolutions per minute (rpm.)
417
Read/Write Head, Arm Actuator
Actuators move the arm from the center to the outer edge of each platter at amazing speeds.
418
Formatting a Disk
Formatting marks the disk into tracks, rings, sectors, and wedges. System for locating each bit of data.
419
Reading Data
Controller sends signal to the drive. Drive looks at starting track and sector. Moves arm to track and waits for the sector to spin under the read/write head. As each block of data is located, the HD sends it along the BUS lines to the computer and seeks the next block of data. Each block indicates whether to continue on or if it is the end of the data. HD continues to spin awaiting next request.
420
How a Disk Gets Fragmented
As old files are deleted, storage becomes distributed over the disk. Pieces of each file are spread out all over the disk. Speed impaired because it takes more time to search for and locate all a file's parts.
421
Access Time
The amount of time it takes for a computer to request and retrieve data.
422
Stand Alone Utility Programs
Disk Cleanup - McAfee Total Protection Degrag/Optimize - Norton Utilities, iDefrag Task Manager/Resource Monitor-Process explorer File History/Recovery-Acronis True Image, Norton Online Backup System Restore - FarSone RestoreIT, Acronis True Image
423
Distros
Different versions of Linux.
424
Error Checking
Checks for lost files and fragments and physical errors on the hard drive.
425
Threats to your Digital Assets
Identity theft and hackers. Computer viruses. Online annoyances and social engineering.
426
Cybercrime
Any criminal action perpetrated primarily through the use of a computer. Top 4 relate to fraud. Others involve computer intrusions, child porn, and blackmail.
427
Cybercriminals
Individuals who use computers, networks, and the Internet to perpetrate crime.
428
Four Categories of Cybercrimes
FBI related scams. Identity theft. Non-auction/Non-delivery of merchandise. Advance fee fraud.
429
Identity Theft/Hacking
A thief steals personal information and poses as you. Most financially damaging cybercrime for individuals. Hacker is anyone who unlawfully breaks into a computer system.
430
Types of Identity Theft Crime
``` Counterfeiting credit and debit cards. Requesting changes of address. Open new credit cards. Obtaining medical services. Buying a home. ```
431
Types of Hackers
White-hat (ethical) Black-hat Grey-hat
432
White-Hat Hackers
Break into systems for non malicious reasons. | Test system security vulnerabilities or to expose undisclosed weaknesses.
433
Black-Hat Hackers
Break into systems to destroy information or for illegal gain.
434
Grey-Hat Hackers
Break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches.
435
Packet Analyzer/Sniffer
Program deployed by hackers that looks at each packet as it travels on the Internet.
436
Keylogger
Program that captures all keystrokes made on a computer.
437
Hacking Tools
``` Packet Analyzers Keyloggers Trojan Horses Backdoor Programs/rootkits Zombies Exploit kits Logical ports ```
438
Trojan Horse
A program that appears to be something useful but does something malicious in the background without your knowledge.
439
Backdoor Programs/Rootkits
Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. Access and delete files, send e-mail, run programs, making computer a zombie.
440
Zombies
Computers under the control of a hacker. | Often used to launch denial-of-service attacks on other computers.
441
Types of Hacking Attacks
Denial-of-Service DDoS Botnet
442
Denial-of-Service (DoS)
Hacker flooding system with requests from a Zombie, causing it to shut down. Legitimate users thereafter cannot access.
443
Distributed Denial of Service (DDoS)
Multiple zombies perpetrate attack simultaneously.
444
Botnet
Large group of software running on zombie computers.
445
Exploit Kits
Software programs that run on servers, and are searching for vulnerabilities.
446
Logical Ports
Virtual, not physical, communication paths. Firewalls screen data coming in to these ports. Like windows. Organize request for information from other networks or computers.
447
Virus Basics
Program that attaches to a computer program to spread to other computers. Main purpose is to replicate itself and copy its code into as many other host files as possible. Secondary objectives can be destructive. Smartphones, tablets, and other devices can be infected with viruses.
448
Types of Viruses
``` Boot sector viruses Logic bombs/Time bombs Worms Script and macro viruses Email viruses Encryption viruses ```
449
Boot sector viruses
Executes when a computer boots up. Found on infected media, replicate to the master boot record, such as booting with an infected flash drive in USB. Can erase your entire hard drive.
450
Logic bombs/Time bombs
Execute when certain conditions or dates are reached, such as opening a file or opening a program a certain number of times. Time bombs triggered by passage of time or on a certain date.
451
Worms
Virus-like and spread on their own with no host file or human interaction needed. Spread through network connections. Much more active in spreading themselves.
452
Script and macro viruses
Series of commands with malicious intent. | Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.
453
Email viruses
Spread as attachments to an e-mail, often using address books.
454
Encryption viruses
Holds files hostage by encrypting them, and ask for ransom to unlock them. Program searches for common data files such as Word or Excel.
455
Virus Classification by methods of avoiding Detection
Polymorphic Multipartite Stealth
456
Polymorphic Virus Class
Change their code or periodically rewrites themselves to avoid detection. Most infect a particular file type.
457
Multipartite Virus Class
Designed to infect multiple file types to fool the antivirus software that is looking for it.
458
Script and macro viruses
Series of commands executed without your knowledge with malicious intent. Triggered if you enable macros in infected document when it triggers and infects other documents on your computer.
459
Online Annoyances-Malware
``` Adware Spyware Spam (junk email) Social Engineering Phishing Pharming Scareware ```
460
Adware
A type of malware that displays unsponsored advertisements.
461
Spyware
A type of malware that is a piggy-back program. Transmits information about you. Using tracking cookies. Keystroke loggers.
462
Spam
``` Unwanted or junk e-mail. Minimize by: Creating a free e-mail address Spam filters Third party programs Reclassify emails misidentified as spam. ```
463
Cookies
Small text files stored on your hard drive when you visit a website and are to help companies determine traffic on their website and evaluate the effectiveness of their marketing. Don't search hard drive, but may invade privacy. No security threat.
464
Social Engineering
Any technique using social skills to generate human interaction with the purpose of enticing individuals to reveal sensitive information. Pretexting involves creating a scenario that sounds legitimate. Scareware.
465
Phishing
Lures internet users to reveal personal information.
466
Pharming
Malicious code is planted on your computer.
467
Avoiding Schemes
Never reply to any email asking for personal information. Don't click email links. Check with the company asking for information. Never give personal information on insecure sites. Use phishing filters. Use internet security software that's frequently updated.
468
Scareware
A type of malware that downloads onto your computer and tries to convince you that your computer is infected. Then directs you to a site to purchase fake removal or antivirus tools. Social engineering technique.
469
Restricting Access to Digital Assets
Firewalls - Packet Filtering - Logical Port Blocking
470
Firewall
Hardware or software designed to protect computers from hackers. Included in OS of Mac and PC. Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security suites include firewall software. Router.
471
Packet Filtering
A firewall configured to filter out packets sent to specific logical ports.
472
Logical Port Blocking
A firewall configured to refuse requests from the Internet asking for access to specific ports.
473
Logical Ports
21 - FTP control (file transfer protocol) 23 - Telnet (unencrypted text communication) 25 - SMTP (simple mail transfer protocol) 53 - DNS (domain name system) 80 - HTTP (hypertext transfer protocol) 443 - HTTPS (HTTP with transport layer security encryption.)
474
Antivirus Software
Specifically designed to detect viruses and protect your computer and files from harm. Should auto-schedule to run weekly. Scans when files when they're opened or executed. Detects either a virus signature or a suspicious activity like a macro or script launching. It stops the execution of the file and notifies you.
475
Popular Antivirus Software
``` Symantec Kapersky AVG McAfee Bitdefender ```
476
Virus Signature
Portion of the virus code that's unique to a particular computer virus.
477
Quarantining
Placing a virus in a secure area so it won't spread to other files.
478
Inoculation
Records key attributes about your computer files and keep stats in a secure place.
479
Authentication
Passwords | Biometrics
480
Passwords
``` Difficult to guess. Strong Password generator. Password Meter to evaluate passwords. Windows, macOS and others have built-in password protection for files as well as desktop. Password Management tools available. ```
481
Biometrics
Reads a unique personal characteristic (fingerprint or iris) and converts it to a digital code. Voice authentication. Facial recognition. Provide a high level of security.
482
Privacy Tools
In private Private browsing Incognito
483
Portable Privacy Devices
IronKey Personal flash drives.
484
Inoculation
Records key attributes about your computer files and keep stats in a secure place and checking to see if they change over time.
485
Protecting your Personal Information
``` Identity thieves crave: SSN Full DOB Phone Number Street Address ```
486
Other Sensitive Information
``` Full legal name Email address Zip code Gender School or workplace ```
487
Backups
Copies of files used to replace the originals if they're lost or damaged.
488
Files to Backup
Data Files | Program Files
489
Types of Backups
Full Incremental Image
490
Backup Locations
Cloud External Hard Drive Network Attached Storage Device and Home Server
491
Cloud Backup
Files stored at secure, remote location Accessible anywhere through a browser. Most free storage sites don't provide enough space for image backups.
492
External Hard Drive
Inexpensive, one-time cost. Fast backups with USB 3.0 Could be destroyed or stolen with computer. Difficult to back up multiple devices.
493
Network Attached Storage (NAS)
Backing up multiple devices easier. More expensive. Could be destroyed or stolen with computer.
494
Power Surges
An electrical current is supplied in excess of normal voltage. Old or faulty wiring. Downed power lines. Lightning strikes. Malfunctions at electric company substations.
495
Surge Protector
Replace every 2-3 years. | Use with all devices that have solid-state components.
496
Main Security Concerns with Mobil Devices
Keeping them from being stolen. Keeping data secure in case they're stolen. Finding a device if its stolen.
497
How do you test a firewall?
Go to sites such as grc.com and run the ShieldsUp or LeakTest. ShieldsUp status column will show Closed or Stealth.
498
Virus Attachment
A computer program that attaches itself to another computer program called the host program.
499
Virus Symptoms
Existing program icons or files suddenly disappear. Viruses often delete specific file types or programs. Changes appear in browser; it may take you to an unusual home page or sprouted new toolbars. Data files become corrupted. Programs don't work properly. System slows down or is slow to boot up.
500
How to get a Virus
1. Booting up with an infected flash drive. 2. Opening an infected email attachment. 3. Enabling macros in Word or Excel.
501
Viruses you can get from Internet
Hidden in program files you download. | Scripts can be hidden in websites.
502
Scripts
Small programs executed when you enter a site.
503
Avoiding Viruses
Update antivirus software and OS regularly for latest security patches.
504
Windows Defender
And others, downloads a list of updates for virus signature files every time you go online.
505
Defensive Computing
Making sure you have the correct computer setup and computing habits.
506
Protection against your own mishaps.
Backups Undelete Security Updates System Restore
507
Protection Suite Features
E-mail scams Parental controls File shredding
508
Security Updates
Pates published for Windows and Edge and Office. | Windows update automatically downloads updates and installs them.
509
Backing Up Data
Copy personal data files to: External hard drive Clout backup service (Dropbox, Google Drive, MSOne Drive) System and Security, File History, lets you designate a hard drive to back up to. Also saves different versions of files. Link to Use system Image to create backup of system.
510
Windows Defender
Downloads a list of updates for virus signature files every time you go online. Included in Windows and defends against pop-ups, malware, and hacking agents. Part of Windows updates. Disabled when other programs activated.
511
Popup Blocker
Internet Options Type website for which you want to allow popups. Enabled by default.
512
Popup Blocker
Internet Options Type website for which you want to allow popups. Enabled by default.
513
Malware (Viruses, Adware, Spyware)
``` Data mining Aggressive advertising Tracking surfing habits. Keystroke loggers. Trojan horses. Backdoor programs and zombies. ```
514
Malware (Viruses, Adware, Spyware)
``` Data mining Aggressive advertising Tracking surfing habits. Keystroke loggers. Trojan horses. Backdoor programs and zombies. ```
515
Network Address Translation
The firewall sees the request from the computer with the internal IP. It then makes the same request to the Internet using its own public address, and returns the response from the Internet resource to the computer inside the private network. From the perspective of the resource on the Internet, it is sending information to the address of the firewall. From the perspective of the workstation, it appears that communication is directly with the site on the Internet.
516
Virtual Private Network
Makes it just as secure to send information across a public network as it is on a secure private network.
517
Virtual Private Network
Makes it just as secure to send information across a public network as it is on a secure private network.
518
When you are surfing anonymously
The sites you visit are not stored in browser history; You are using a browser that has privacy tools; Temporary files created are immediately deleted.
519
Full Backup
Create a copy of all you application and data files.
520
Image Backup
All system files are backed up. | Complete snapshot of everything that makes your computer run.
521
Incremental Backup
Partial backup; files changed or created since the last backup.
522
When you are surfing anonymously
The sites you visit are not stored in browser history; You are using a browser that has privacy tools; Temporary files created are immediately deleted.
523
Dvorak Keyboard
Alternative keyboard layout that puts the most commonly used letters on Home Keys - keys in the middle of the keyboard.
524
Capacitive System
Basic touch screens detect touches and translate them into meaningful commands.
525
Multitouch User Interface
Introduced by Apple. Pinching the screen. Coordinate based grid to arrange the capacitors.
526
Input Devices for Images
``` Digital cameras Camcorders Mobile Device cameras Flatbed scanners Webcam ```
527
Types of Microphones
Omnidirectional-conference calls Unidirectional-1 voice; podcasts Clip-on (Lavalier)-presentations Close talk-headset-phone, speech recog.