0% found this document useful (0 votes)
23 views14 pages

CISC1000 Key Terms of Module 01-Topic04 by KamVat 2018AUG01

The document provides key terms and definitions related to information technology fundamentals and practices. It covers topics such as different types of computers, software, hardware, networks, and other IT concepts. The document aims to define important terminology for reviewing the fundamentals of information technology.

Uploaded by

I Tin Chao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views14 pages

CISC1000 Key Terms of Module 01-Topic04 by KamVat 2018AUG01

The document provides key terms and definitions related to information technology fundamentals and practices. It covers topics such as different types of computers, software, hardware, networks, and other IT concepts. The document aims to define important terminology for reviewing the fundamentals of information technology.

Uploaded by

I Tin Chao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

CISC1000 INFORMATION TECHNOLOGY FUNDAMENTALS AND PRACTICES

KEY TERMS FOR YOUR REVIEW

MODULE 01 – Fundamentals of Information Technology

TOPIC 04 Information Technology and You

The key terms for Topic 04 is the combination of the key terms from
Topic 01, Topic 02, and Topic 03.

From Topic 01 Introduction to Information Technology

Key Term Definition


application software End user software
apps Small programs designed for mobile devices
Blu-ray disc (BD) Type of optical disc using laser technology to store
data and programs
cloud computing Uses the Internet and the Web to shift many
computer activities from a user’s computer to
computers on the Internet.
communication device Computer equipment that allows a computer to
connect to other computer systems to share data
and information.
compact disc (CD) A type of optical disc that has the least storage
capacity.
connectivity Allows computers to connect and share information
with other computers.
data Unprocessed facts.
database file Typically created by database management
programs to contain highly structured and
organized data.
desktop computer A type of microcomputer that is small enough to fit
on top of or alongside a desk yet is too big to carry
around.
digital versatile disc (DVD) A type of optical device that gives great capacity
and can be used to store many different types of
data. (See also digital video disc)
digital video disc (DVD) A type of optical device that gives great capacity
and can be used to store many different types of
data. (See also digital versatile disc.)
display A monitor used to display information.
document file Data files created by word processors to save
documents such as memos, term papers, and
letters.
Key Term Definition
Embedded operating Embedded operating system known as real-time
systems (RTOS) operating system used in Smartphones, tablets and
other mobile devices
end user The most important part of an information system.
(See also people)
general purpose application Application software that is used in nearly all
careers.
hard disk A secondary storage device that uses magnetized
dust to store the information.
hardware The equipment that processes the data to create
information.
information Processed facts.
information technology (IT) Relating to computer software and hardware, and
data.
input device Translate data and programs that humans can
understand into a form the computer can process.
Internet The largest computer network in the world.
IoT (Internet of Things) The continuing development of the Internet that
allows everyday objects embedded with electronic
devices to send and receive data over the Internet.
keyboard A type of input device that allows the user to input
character data into the computer.
Laptop computer Also known as a notebook computer is lightweight
and portable
mainframe computer A type of computer that is capable of great
processing speeds and data storage.
memory Holds data and program instructions for processing
the data. (See also primary storage, random access
memory)
microprocessor Controls and manipulates data to produce
information.
midrange computer Also referred to as servers, most widely used to
support end users for specific needs such as
retrieving data from a database or supplying access
to application software.
Mobile app (application) Known as apps ae small programs primarily
designed for mobile devices such as smartphones
and tablet computers.
modem Modifies telephone communications into a form
that can be processed by a computer.
monitor A common output device that allows the user to
see what the computer is doing.
mouse A type of input device that allows the user to point
and click on items for easier operation.
network A communications system connecting two or more
Key Term Definition
computers.
notebook computer A type of microcomputer that is portable,
lightweight, and fits into most briefcases.
operating system Program that coordinates computer resources,
provides an interface between users and the
computer, and runs applications.
optical disc A secondary storage device that uses laser
technology and has the greatest capacity.
output device Translates the processed information from the
computer into a form that humans can understand.
PC Personal computer
people The most important part of an information system.
(See also end users)
Personal computer PC
presentation file Created by presentation graphics programs to save
presentation materials.
procedures The rules or guidelines for people to follow when
using software, hardware, and data.
program Consists of the step-by-step instructions that tell
the computer how to do its work. (See also
software)
random access memory Holds data and program instructions for processing
(RAM) the data. (See also primary storage, memory)
secondary storage Holds data and programs even after electrical
power to the computer system has been turned off.
server Most widely used to support end users for specific
needs such as retrieving data from a database or
supplying access to application software.
smartphone Mobile phone offering advanced capabilities
beyond a typical mobile phone, often with PC-like
functionality.
software Consists of the step-by-step instructions that tell
the computer how to do its work. (See also
program)
solid-state storage A secondary storage device that has no moving
parts. Data is stored and retrieved electronically
directly from these devices, much as they would be
from conventional computer memory.
specialized application Computer programs that are narrowly focused on
specific disciplines and occupations. (See also
special-purpose application)
stand-alone operating Used in desktop computers and include Windows
system 10 and Mac OS
supercomputer The most powerful type of computer that is a
special high-capacity computer used by very large
Key Term Definition
organizations.
system software Enables the application software to interact with
the computer hardware and helps the computer
manage its own internal resources.
system unit A container that houses most of the electronic
components that makes up a computer system.
tablet Also known as a tablet computer is smaller and
lighter and generally less powerful than a laptop.
Usually has a flat screen but and a virtual keyboard.
tablet computer Also known as a tablet is smaller and lighter and
generally less powerful than a laptop. Usually has a
flat screen but and a virtual keyboard.
utility A part of the system software that performs specific
tasks related to managing computer resources.
virus Malicious programs that can damage software,
hardware, and compromise the security and privacy
of your personal data.
wearable Mobile computer that can be worn.
web Provides a multimedia interface to the numerous
resources available on the Internet.
wireless communication Communication between wireless communication
devices such as Smartphones and tablets
wireless revolution A revolution that is expected to dramatically affect
the way we communicate and use computer
technology.
worksheet file Created by electronic spreadsheets to analyze
things like budgets and to predict sales.

From Topic 02 The Internet, the Web, and Electronic Commerce

Key Term Definition


address The location or name of a Web site.
Launched in 1969 when the United States
Advanced Research Project
funded a project that developed a national
Agency Network(ARPANET)
computer network.
An advanced use of JavaScript that can be
AJAX
found on many interactive sites.
Special programs on Web sites that provide
applets animation, interactivity, and display
graphics.
Files, such as documents and worksheets
attachment that can be sent along with an e-mail
message.
BitTorrent A type of file transfer that distributes files
Key Term Definition
across many different computers for more
efficient downloads.
Web logs that contain time stamped
blog
postings.
Software programs that provide a user
browser
interface to Web resources.
Involves the sale of a product or service
business-to-business (B2B) from one business to another over the
Internet
The sale of a product or service to the
business-to-consumer (B2C) general public or end users over the
Internet
Modems that provide Internet high-speed
cable access using unused bandwidth on a cable
television network.
Files inserted into an HTML document that
cascading style sheets (CSS) control the appearance of Web pages
including layout, colors, and fonts.
A service offered through Google+, for
Circles grouping individuals according to interests
or other criteria
Special program known as an e-mail client
that needs to be installed and running in
client based e-mail system order to enable a computer to
communicate with the e-mail service
provider.
Uses the Internet and the Web to shift
cloud computing many computer activities from a user’s
computer to computers on the Internet.
Involves individuals selling to individuals
consumer-to-consumer (C2C)
over the Internet.
Internet’s equivalent to traditional cash.
Buyers purchase digital cash from a third
digital cash
party by transferring funds from their
banks.
It is part of an URL that signifies the name
domain name of a Web server where the resource is
located.
Copying a file from a server to a local
downloading
computer.
Digital Subscriber Line, provides a digital
DSL connection over unused frequencies of
standard telephone lines.
Buying and selling of goods over the
e-commerce
Internet. (See also electronic commerce)
Key Term Definition
Being able to take classes on almost any
e-learning subject from educational institutions that
offer courses online.
Buying and selling of goods over the
electronic commerce
Internet. (See also e-commerce)
Electronic mail, the transmissions of
electronic mail electronic messages over the Internet. (See
also e-mail)
Electronic mail, the transmissions of
e-mail electronic messages over the Internet. (See
also electronic mail)
Special program required to communicate
e-mail client with the e-mail service provider in client-
based e-mail accounts.
Social networking site that provides an
array of features and applications including
Facebook
instant messaging, photo and video
sharing, games, and more.
Share information that is typically
Facebook groups
organized around topics, events, ideas.
Created by businesses to promote products
Facebook Pages
and services.
Created by individuals who may include
photos, lists of personal interest, contact
Facebook Profile
information, and other personal
information.
file transfer protocol (FTP) An Internet standard for transferring files.
filter Blocks access to selected web sites.
A person that you specify in a list to use
friend
instant messaging.
A combination of some of Google Inc.'s
previously existing services with some new
Google+
services, many of which are similar to
Facebook's
A combination of some of Google Inc.'s
previously existing services with some new
Google Plus
services, many of which are similar to
Facebook's
Hangouts A service offered through Google Plus, for
communicating with up to 10 people at a
time.
header The first element of an e-mail message.
A list of sites that contain the keywords
hit
from a search.
Connect to other documents, which can be
hyperlink
video files, text, graphics, audio files, etc.
Key Term Definition
Hypertext Markup Language Text based programming language used to
(HTML) create Web pages.
instant messaging (IM) An extension of e-mail that allows two or
more people to contact each other via
direct, live communication.
Launched in 1969 with ARPANET, the
Internet (Net) consists of the actual
Internet
physical network made up of wires, cables,
and satellites.
Internet of Things Allows everyday objects embedded with
electronic devices to send and receive data
over the Internet.
Internet security suite A collection of utility programs designed to
maintain security and privacy while on the
Web.
Provides a path or connection for
Internet service provider (ISP)
individuals to access the Internet.
A scripting language that adds basic
JavaScript
interactivity to Web pages.
link Nickname for a Hyperlink.
Social networking site focusing on business
LinkedIn
professionals.
location The name of a Web site.
The second element of an e-mail that
message
consists of the body of the e-mail.
microblog A Web site that publishes short sentences
that only take a few seconds to write.
Twitter is a microblog.
MMS (multimedia messaging Sends images, videos and sounds
service)
A special browser designed to run on
mobile browser
portable device.
online Being connected to the Internet.
Program that automatically start and
operate as a part of a Web browser in order
plug-in
to enable a full experience of the content
of a Web site.
podcast Deliver media content widely used to
download music and movies over the
Internet.
Rules for exchanging data between
protocol
computers.
search engine An organization helps individuals locate
information on the Web. (See also search
service).
Key Term Definition
An organization helps individuals locate
search service
information on the Web. (See also search
engine)
Allows the copying of files to and from a
secure file transfer protocol computer across the Internet and are
(SFTP) frequently for uploading changes to a Web
site hosted by an Internet service provider.
The third element of an e-mail message
signature that provides additional information about
the sender.
Using the Internet to connect individuals to
social networking
one another
spam Unwanted or unsolicited e-mail.
spam blocker Software programs that are installed to
work with e-mail programs to filter
unwanted e-mail messages.
Programs used to identify and eliminate
spam filter
spam.
specialized search engine Focus on subject-specific Web sites.
spider Special programs that continually look for
new information on the Internet and
update the search services’ databases.
Technology in which audio and video files
are continuously downloaded to a
streaming
computer while the computer user is
listening to and/or viewing the file content.
subject Part of the header element in an e-mail,
usually a one line description of the
message.
Sending a short electronic message
typically less than 160 characters using a
texting wireless network to another person who
views the message on a mobile device,
such as a smartphone.
Sending a short electronic message
typically less than 160 characters using a
text messaging wireless network to another person who
views the message on a mobile device,
such as a smartphone.
top-level domain (TLD) Another name for a domain name.
tweet Twitter messages
Twitter A microblog that publishes short sentences.
uniform resource locator (URL) The name, or address, of a Web site.
To copy a file from a local machine to a
uploading
server.
Key Term Definition
Destructive program often attached to
virus
unsolicited e-mail.
Introduced in 1992 at CERN, the Web
web (WWW and World Wide Web) provides a
multimedia interface to Internet resources.
Web 1.0 Focused on linking existing information.
Evolved to support more dynamic content
Web 2.0
creation and social interaction.
Focuses on computer-generated
information requiring less human
Web 3.0
interaction to locate and to integrate
information.
Sellers post descriptions of products at a
web auction Web site and buyers submit bids
electronically.
Use Webmail clients located on the e-mail
web-based e-mail system
providers computer.
Services that make use of a Web browser
web-based file transfer services
to upload and download files: i.e.: drop.io
Use streaming technology in which audio
and video files are continuously
webcasts downloaded to the user’s computer while
they are listening to and/or viewing the file
content.
Personal Web sites that contain time
web log
stamped postings.
Once a computer connects to an e-mail
service provider, a special program called a
webmail Webmail client runs on the e-mail
provider’s computer and e-mailing can take
place.
Program that runs on an e-mail provider’s
webmail client computer and enables Web mailing to take
place.
Develops and maintains Web sites and Web
webmaster
resources.
web page A document on the Web.
Identifies the type of organization, for
web suffix
example .com indicates a commercial site.
Specialized programs that make using the
web utility
Internet and the Web easier and safer.
A Web site specially designed to allow
wiki visitors to fill in missing information or
correct inaccuracies.
Wikipedia An online ‘wiki’ encyclopedia written and
Key Term Definition
edited by anyone who wants to contribute.
They transmit information that is
modulated onto a carrier frequency to
wireless modem allow many simultaneous wireless
communication links to work simultaneous
on different frequencies.
Also known as WWW provided a
World Wide Web multimedia interface to resources available
on the Internet.
Provide a multimedia interface to resources
WWW
available on the Internet

From Topic 3 Privacy, Security, and Ethics

Key Term Definition


Relates to the responsibility of those who have
access
data to control who is able to use that data.
Relates to the responsibility of those who collect
accuracy
data to ensure that the data is correct.
Programs designed to detect and remove
antispyware cookies, web bugs, and monitoring software.
(see also spy removal program)
Using devices such as fingerprint and iris (eye)
biometric scanning
scanners to verify the identity of users.
botnet A collection of zombie computers.
A collection of temporary internet files that
browser cache contain web page content and instructions for
displaying this content.
An illegal action in which the perpetrator uses
computer crime
special knowledge of computer technology.
Guidelines for the morally acceptable use of
computer ethics
computers in our society.
A law that makes creating and knowingly
Computer Fraud and Abuse Act
spreading a virus a crime.
The most invasive and dangerous type of
spyware. They record every activity and
computer monitoring software
keystroke made on a computer system. (see also
keystroke logger)
Specialized programs that are deposited on a
cookies
hard disk from websites.
A legal concept that gives content creators the
copyright right to control use and distribution of their
work.
cracker People who gain unauthorized access to a
computer system for malicious purposes.
Use of the Internet, cell phones, or other devices
cyberbullying to send or post content intended to hurt or
embarrass another person.
Includes the creation of malicious programs such
as viruses, worms, Trojan horses, zombies,
cybercrime denial of service attacks, Internet scams,
cyberbullying, rogue Wi-Fi hotspots, and data
manipulation
Concerned with protecting software and data
data security
from unauthorized tampering or damage.
A type of worm floods a computer or network
with requests for information and data which
denial of service (DoS) attack
overwhelms the system making it unable to
respond to legitimate users.
A computer attack that uses software to try
thousands of common words, sequentially in an
dictionary attack
attempt to gain unauthorized access to a user’s
account.
States that it is legal for a program owner to
Digital Millennium Copyright make only their own backup copies of that
Act program.
In order to prevent copyright violations, DRM
digital rights management
encompasses various technologies that control
(DRM)
access to electronic media and files.
A set of procedures that setups ways to continue
disaster recovery plan operating until normal computer operations can
be restored.
Highly detailed and personalized descriptions of
electronic profile
individuals.
Software that record everything including
employee-monitoring software employees’ electronic mail and computer files
on an employee’s computer.
The process of coding information to make it
encryption unreadable except to those who have a special
key.
A key or special piece of information used to
encryption key
gain access to data that has been encrypted.
ethics Standards of moral conduct.
Family Educational Rights and A federal law that restricts disclosure of
Privacy Act (FERPA) educational records.
A security buffer between an organization’s
firewall
private network and all external networks.
A cookie that is generated and then read only by
first-party cookie
the web site you are currently visiting.
Freedom of Information Act A law that entitles people to look at records held
by government agencies.
A federal law that protects personal financial
Gramm-Leach-Bliley Act
information.
People who gain unauthorized access to a
hacker
computer system for the fun and challenge of it.
Health Insurance Portability
A federal law that protects personal medical
and Accountability Act
information.
(HIPAA)
A file that includes the locations of websites
history file
visited.
HTTP (Hyper Text Transfer
Is a widely used protocol used for web traffic
Protocol)
Is a widely used protocol used for web traffic
HTTPS (Hyper Text Transfer
and is used to protect the transfer of sensitive
Protocol Secure)
information.
The illegal assumption of someone’s identity for
identity theft
the purposes of economic gain.
The feeling that if you are selective about
disclosing personal information on the Internet,
illusion of anonymity
then little can be done to invade your personal
privacy.
Google Chrome provides to ensure browsing
Incognito Mode activity is not recorded on a computer’s hard
disk
Data gatherers that collect and sell personal
information broker
data. (see also information reseller)
Data gatherers that collect and sell personal
information reseller
data. (see also information broker)
Internet scam A scam that uses the Internet.
Responsible for maintaining the security of a
company's network, systems, and data.
Employers look for candidates with a bachelor's
IT security analyst
or advanced specialized associate's degree in
information systems or computer science and
network experience.
An encryption key; special information for
key
making encrypted information readable.
The most invasive and dangerous type of
spyware. They record every activity and
keystroke logger
keystroke made on a computer system. (see also
computer monitoring software)
malware Short for malicious software.
It is when an electronic profile of one person is
mistaken identity
switched with another.
The information that people voluntarily post
online identity
about themselves online.
password Secret words or numbers that must be keyed
into a computer system to gain access.
Helps create strong passwords and will save all
passwords in one location to automatically
password managers provide password when requested from
website; use one master password to access list
of passwords
A technique employed by scammers attempting
phishing to trick Internet users to think a fake but official
looking site is legitimate.
Procedures and devices that deal with
physical security protecting hardware from possible human and
natural disasters.
An ethical issue which means representing some
plagiarism other person’s work and ideas as your own
without giving credit to the original source.
A person who uses another’s work and ideas as
plagiarist
their own without crediting the original source.
privacy The collection and use of data about individuals.
Many browsers offer a privacy mode that
privacy mode eliminates history files as well as blocks most
cookies.
A tool in Safari that controls many types of
Privacy Browsing
cookies.
Relating to who owns data and rights to
property
software.
robot network A botnet; a collection of zombie computers.
Free wireless hotspot where users information
rogue Wi-Fi hotspot are captured when connecting to legitimate
sites.
A fraudulent or deceptive act or operation
scam designed to trick individuals into spending their
time and money for little or no return.
Controlling access to sensitive information,
security
hardware, and software.
A collection of utility programs designed to
security suites protect your privacy and security while you are
on the web.
Unauthorized copying of programs for personal
software piracy
gain is a form of theft.
Programs designed to detect and remove
spy removal program cookies, web bugs, and monitoring software.
(see also anti-spyware)
A wide range of programs that are designed to
spyware secretly record and report an individual’s
activities on the Internet.
temporary Internet file Contain Web page content and instructions for
displaying this content.
Generated by an advertising company that is
affiliated with the website you are currently
third-party cookie
visiting. Often also referred to as a tracking
cookie.
Generated by an advertising company that is
tracking cookies affiliated with the website you are currently
visiting.
A program that comes into a computer system
Trojan horse disguised as something else, but contains a
virus.
A secure private connection between a remote
virtual private network (VPN)
user and an organization’s internal network.
Programs that migrate through networks and
virus operating systems, and most attach themselves
to different programs and databases.
A type of spyware that is typically hidden within
web bugs the HTML code for a web page or e-mail
message as a graphical image.
Restricts access to authorized users on wireless
wireless network encryption
networks.
A special program fills a computer system with
worm self-replicating information, clogging the system
so that its operations are slowed or stopped.
Wi-Fi Protected Access; replacing WEP in
WPA2
wireless encryption.
Computers infected by a virus, worm, or Trojan
zombie house that allows them to be remotely
controlled for malicious purposes.

You might also like