Term
|
Definition
| two bytes or 16 bits of data |
|
|
Term
|
Definition
| format for computer data. It is always a 0 or a 1. |
|
|
Term
|
Definition
| computer data is used to do this as well as store program info and info the user needs. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| the act of sending data from one place to another. |
|
|
Term
|
Definition
| the two fundamental methods of data transmission |
|
|
Term
|
Definition
| the hard drive, CD ROM drive or DVD |
|
|
Term
|
Definition
|
|
Term
|
Definition
| main computer box, monitor, keyboard, mouse, speakers, and printer. |
|
|
Term
|
Definition
| programs that run on your computer--includes operating system and other programs. |
|
|
Term
|
Definition
| software is written by them in a computer language. |
|
|
Term
|
Definition
| one of the three main parts of an organizational network. Cables and workstations are the other parts. |
|
|
Term
|
Definition
| the main services used on the Internet |
|
|
Term
|
Definition
| Internet Service Provider |
|
|
Term
|
Definition
| protects all computers in the network from attacks. |
|
|
Term
|
Definition
| holds the memory, microprocessor, video card and sound card. |
|
|
Term
|
Definition
| Basic Input/Output System |
|
|
Term
|
Definition
|
|
Term
|
Definition
| BIOS is described as firmware because of its permanent state as a program. |
|
|
Term
|
Definition
| Hypertext Markup Language |
|
|
Term
|
Definition
| programs that give users the ability to do specific tasks. ex. Microsoft Word |
|
|
Term
|
Definition
| comes with programs that may be purchased or downloaded for free on the Internet. It will cause advertising popups to appear on your computer. |
|
|
Term
|
Definition
| the most important file types to be aware of when opening email attachments. They are executable files. |
|
|
Term
|
Definition
| used to access web pages on the Internet. the most comon are Microsoft Internet Explorer, Mozilla and others. |
|
|
Term
|
Definition
| usually comes with some free programs and it will monitor your Internet activity and send information to some corporation. |
|
|
Term
|
Definition
| unwanted email/junk email |
|
|
Term
|
Definition
| Uniform Resource Locator (web address) |
|
|
Term
| How to secure your system from a virus |
|
Definition
| firewall, anti-virus software, system updates, do not download suspicious applications, take care opening email attachments. |
|
|