Download Chapter 7

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Disk formatting wikipedia , lookup

Transcript
Chapter 2
The Internet is the actual physical network. It is made up of wires, cables, and satellites.
The most common way to access the Internet is through , an Internet service provider (ISP)
) Applets are written in which programming language? (Java)..
Java applets can be downloaded quickly and run by most browsers.
Social networking is one of the fastest-growing uses of the Internet.
)
Facebook is an example of what type of social networking site? (Reuniting site)
A microblog, like Twitter, publishes short sentences that only take a few seconds to write, rather
than long stories or posts like a traditional blog.
In a directory search, you select a category or topics that fits the information you want, and
then narrow your search by selecting subtopics until a list of Web sites appears.
Dogpile is one of the best known metasearch engines.
Consumer-to-consumer (C2C) involves individuals selling to individuals. This often takes the
form of an electronic version of the classified ads or an auction.
Online banking is one of the most widely used Business-to-Consumer (B2C) e-commerce
applications.
Cloud computing consists of three components: clients, service providers, and the Internet.
File transfer protocol (FTP) has been used for decades and still remains one of the most popular
methods of file transfer.
BitTorrent distributes file transfers across many different computers for more efficient
downloads.
It is easy to get the Internet and the Web confused, but they are not the same thing. The
Internet is the actual network made up of wires, cables, and satellites. The Web is a multimedia
interface to the resources available on the Internet.
Popular types of Internet communications include e-mail, instant messaging, social networking,
blogs, and wikis.
E-mail headers usually contain the addresses, subject, and attachments.
While reuniting sites such as Classmates Online and Facebook are designed to reconnect people
who know each other but have lost touch, other friend-of-a-friend sites like Friendster and
MySpace and common interest sites like Flikr and Meetup are designed to bring together people
who may not have known each other previously.
A keyword search results in a list of hits
To evaluate the usefulness of information you find on the Web, you must consider the site's
authority, accuracy, objectivity, and currency.
RealPlayer and Acrobat Reader are classified as plug-in programs.
Downloading is the process of copying a file from a Web site to your computer. Uploading is the
process of copying a file from your computer to another computer on the Internet.
)
Google Chrome is an example of a Web __ browser ___.
The __ http ___ protocol is used for Web traffic and is the most widely used Internet protocol.
)
A _ hyperlink is a link on a Web page that leads to another Web page.
The typical e-mail has three basic elements: __ header_, message, and signature.
)
A _ directory search provides a list of categories or topics as a starting point for your search.
Infomat.com is an example of a ___ specialized __ search engine.
A _ Internet security suite _ is a collection of utility programs designed to maintain your security
and privacy while you are on the Web.
)
Knowledge of HTML is considered essential for the job of a _ Webmaster __.
Describe the three basic parts of an e-mail message. The header appears first and typically
includes the e-mail address of the person the message is being sent to, the email address of the
person sending the message, a subject line briefly describing the topic of the message, and the
names of any file attachments. The second part of the e-mail message is the letter or message
itself. Finally, the signature provides additional information about the sender such as name,
address, and telephone number.
Briefly explain how instant messaging works.
Instant messaging (IM) is an extension of e-mail that allows two or more people to contact each
other via direct, live communication. To use instant messaging, you specify a list of friends and
register with an instant messaging server. Whenever you connect to the Internet, special
software informs your messaging server that you are online. In response, the server will notify
you if any of your contacts are online. At the same time, it notifies your friends that you are
online. You can then send messages directly back and forth to one another.
Describe the three types of social networking sites and give an example of each.
Three basic categories of social networking sites are reuniting, friend-of-a-friend, and common
interest. Reuniting sites are designed to connect people who have known one another but have
lost touch. Classmates Online is an example of a reuniting site. Friend-of-a-friend sites are
designed to bring together people who do not know one another but share a common friend.
MySpace is an example of a friend-to-a-friend site. Finally, common interest sites, like Meet up,
bring together individuals who share common interests or hobbies.
Chapter 3
Most applications use a graphic user interface (GUI) that displays graphical elements called
icons to represent familiar objects and a mouse
Speech recognition is the ability to accept voice input to select menu options and dictate text.
Color is a character-effect.
Spreadsheet programs create workbook files.
1) Search Engines, and give 2 examples
………software that helps finding data on the internet , google, alta vista
2) Plugins…an extension of a software, that add new features to the same software
Microsoft Access is an example of basic application software.
Each table in a database is made up of rows called records.
A(n) __ window ___ is a rectangular area that can contain a document, program, or message.
The _ relational _ database is the most widely used database structure.
An electronic presentation consists of a series of __ slides ___ or pages.
The most widely used integrated software package is __ Microsoft Works ___.
Office suites are also known as __ productivity ___ suites.
What is the difference between system software and application software?
System software works with end users, application software, and computer hardware to handle
the majority of technical details. Application software can be described as end user software
designed to accomplish a variety of different tasks.
List the four types of basic applications, what each application is used for, and an example of
each.
The four basic applications are word processors, spreadsheets, database management systems,
and presentation graphics. Word Processors are used to create text-based documents such as
letters, memos, faxes, and reports. Microsoft Word is the most widely used word processor.
Spreadsheet programs organize, analyze, and graph numeric data such as budgets and financial
reports. The most widely used spreadsheet program is Microsoft Excel. A database management
system is a program that sets up, or structures, a database. It also provides tools to enter, edit,
and retrieve data from the database. Microsoft Access is one of the most widely used database
management systems designed for PCs. Presentation graphics are programs that combine a
variety of visual objects to create attractive, visually interesting presentations. Microsoft
PowerPoint is an example of a widely used presentation graphics program.
Chapter 5
Operating systems coordinate all the computer's resources.
Dialog boxes are used to provide information or request input.
In a computer system, data and programs are stored as a files
The network server coordinates all communication between the other computers.
The OS is often referred to as the software environment or platform.
Spotlight can rapidly locate files, folders, e-mail messages, addresses, and much more.
Some versions of Mac OS X include Boot Camp, which allows Macintosh computers to run both
the Mac OS and the Windows operating system.
Google Android is one of the fastest growing mobile phone operating systems.
The operating system of the physical machine is known as the host operating system.
Some of the best known mobile OSes include Symbian, BlackBerry OS, iPhone OS, Android, and
Windows Phone 7.
To safely remove a program from your computer, you might want to use this type of utility
. Uninstall program
After a period of time, a hard disk becomes highly fragmented
Icons are graphic representations for a program, type of file, or function.
Mobile phone operating systems are a type of __ embedded operating system.
Utility programs are specialized programs designed to make computing easier.
)
This utility program eliminates unneeded files on your hard disk. Disk Cleanup
What are the three basic functions of an operating system?
The purpose of an operating system is to coordinate a computer's resources, provide a user
interface, and load and run applications.
Describe the three categories of operating systems.
Embedded operating systems are used for handheld devices such as smart phones, cable and
satellite television tuner boxes, video game systems, and other small electronics. Network
operating systems are used to control and coordinate computers that are networked or linked
together. Stand-alone operating systems, also called desktop operation systems, control a single
desktop or laptop computer.
What are the five basic types of utility programs?
The five basic types of utility programs are troubleshooting or diagnostic programs, antivirus
programs, uninstall programs, backup programs, and file compression programs.
Describe the five best-known embedded mobile phone operating systems.
The Symbian was introduced in 2009 and controls more smartphones worldwide than any other
mobile OS. The BlackBerry OS was introduced in 1999 by a Canadian company and is a very
popular mobile OS amongst corporate clients. Based on the MAC OS, the iPhone OS was
developed in 2007 by Apple and is one of the fastest growing mobile OSes. Google Android was
introduced in 2007 and is a popular smartphone OS. Windows Phone 7 was introduced in 2010
and was designed for users actively involved in social networking and instant messaging.
Chapter 6
Handheld computer (palm computers or PDA’s) are the smallest units.
: A bit is the smallest unit in a digital system
The binary system has only two digits – 0 and 1.
The most widely used binary code for microcomputers is ASCII
: Unicode binary system is a 16-bit coding system ana it’s also designed to support international
languages like Chinese and Japanese.
The central processing unit is the “brains” of the computer.
The most common type of microprocessor is the CISC chip.
Memory is the holding area for data, instructions, and information.
ROM chips are not volatile and cannot be changed by the user.
Open architecture systems allow users to expand their systems.
To communicate with another computer over telephone lines, you need a _modem_ card
: The system unit is also known as the system cabinet or chassis.
Virtual memory is stored on a secondary device such as a hard disk.
Firmware is burnt onto a ROM chip, and cannot be changed by the user.
To communicate over a telephone line you need a modem.
Chapter 7
: Input is any data or instructions that are used by a computer
The input device most commonly used to enter text would be the keyboard
Most keyboards use an arrangement of keys given the name QWERTY
This type of keyboard is designed specifically to alleviate wrist strain associated with the
repetitive movements of typing ergonomic keyboard
A flatbed scanner is much like a copy machine
Thermal printers use heat elements to produce images on heat-sensitive paper.
Plotters would produce the largest printouts
A network terminal is also known as a thin client or network computer.
Light pens are used to edit digital images
Most common type of monitor currently being used is the CRT.
A Web terminal can display Web pages on a standard television.
Chapter 8
RAM is temporary or volatile storage.
Secondary storage is nonvolatile storage as it does not lose the data when the
power is turned off.
The process of saving information onto secondary storage devices is referred to aswriting
Data on floppy disks are recorded in rings called tracks.
HiFD disks have a capacity of 200 MB or 720 MB.
An internal hard disk is also known as a fixed disk.
An internal hard disk is located inside the system unit
WinZip and PKZip are both popular compression and decompression utility programs.
Flat areas on an optical disk are called lands.
A compact disc is the most widely used optical disk and is standard on most PCs.
CD-R stands for CD-recordable
CD-ROM cannot be written on or erased.
A CD-RW disk can be erased and rewritten
An emerging disk technology that makes disks about the same size as CDs but with faster
access and much greater storage capacity is called digital versatile disk DVD
DVDs can store over two hours of high quality sound and video.
The DVD-ROM has had a major impact on the video market.
DVD-RAM is rewritable.
Solid state storage has no moving parts.
Solid-state storage devices require less power than the rest.
Flash memory is solid-state storage devices that are widely used in notebook computers.
Floppy disks, hard disks, optical disks and magnetic tapes are all forms of secondary
storage.
Floppy disks are not high capacity disks.
The traditional disk is 1.44 MB.
Hard-disk cartridges are removable.
In most computers the internal hard disk drive is designated as the C drive.
Today’s optical disks can hold over 17 gigabytes of data.
DataPlay format is used with music and digital photos.
Optical disks are an example of direct access devices.
Volatile storage devices lose their data when power is removed.
Tracks are rings of concentric circles.
The label __2HD_ on a floppy disk means that the disk is “two-sided, high-density”.
Describe DVD technology.
Answer: A DVD device, or digital versatile disk, can store more data than several CDROMs. DVD drives can store data on both sides of the disk, thereby doubling its
capacity. A DVD is about the same size as a CD-ROM, stores more data than a CDROM, and provides much faster access to the data.
What are flash memory cards used for?
Answer: Flash memory cards are solid-state storage devices widely used in notebook
computers. Flash memory is also used in a variety of specialized input devices to
capture and transfer data to desktop computers. Examples are storing images from a
digital camera and recording MP3 music files for transfer.
Chapter 10
The essential element that controls how computers are used today is ethics.
Privacy concerns the collection and use of data about individuals.
Identity theft is the impersonation by a thief of someone’s identity for the purpose of economic
gain
: Businesses search employees’ electronic mail and computer files using snoopware.
Privacy is primarily an ethical matter.
Employees are the largest category of computer criminals.
A virus is software written with malicious intent to cause annoyance or damage.
White-collar crime involves the theft of data.
Copying software and distributing it without the consent of the owner is software piracy
A hard disk crash is an example of a technological failure.
Green PC uses less energy than older PCs.
Traditional cookies monitor your activities at a single site.
Adware cookies monitor your activities across all sites you visit.
The majority of computer criminals come from within the organization.
Hackers do it for the challenge – not to do damage or steal information.
Crackers break into computers with the intent to do damage or steal information.
A surge protector is a device designed to protect a computer from voltage spikes
express card:
in note book computer
expanchins card:
plug out of port on system board
pc card:
in smart phone
graphics card:
high-quality3D
smart card:
a cridet-card sized of plastic
USB:
connect keyboard,mice and printer
keybards:
Traditional :
ergonomic:
wireless:
rectengular keyboard
similar traditional but has a rest
without cable
pointing
mice:
toch secreen:
styluch:
joystick:
scanning
to pointer and choces
controlled by fingers
draw images
controlled by speed
optical scanner _ bar-code readers_ card readers.
printer:
translate information processor
fax machine:
send images and text
connictivity:
releted to useing computer networks
wireless revolution:
communications:
used for computer,telephones commenications
transmit data from one location to another
various physical:
use a solide medium to connect sending
wireless communication channels:
past network:
carry data from one computer to another
bus network_ ring network
present network: star network _ tree network_ mesh network.