We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14
MODULE 01 – Fundamentals of Information Technology
From Topic 01 Introduction to Information Technology
Key Term Definition application software End user software apps Small programs designed for mobile devices Blu-ray disc (BD) Type of optical disc using laser technology to store data and programs cloud computing Uses the Internet and the Web to shift many computer activities from a user’s computer to computers on the Internet. communication device Computer equipment that allows a computer to connect to other computer systems to share data and information. compact disc (CD) A type of optical disc that has the least storage capacity. connectivity Allows computers to connect and share information with other computers. data Unprocessed facts. database file Typically created by database management programs to contain highly structured and organized data. desktop computer A type of microcomputer that is small enough to fit on top of or alongside a desk yet is too big to carry around. digital versatile disc (DVD) A type of optical device that gives great capacity and can be used to store many different types of data. (See also digital video disc) digital video disc (DVD) A type of optical device that gives great capacity and can be used to store many different types of data. (See also digital versatile disc.) display A monitor used to display information. document file Data files created by word processors to save documents such as memos, term papers, and letters. Embedded operating Embedded operating system known as real-time systems (RTOS) operating system used in Smartphones, tablets and other mobile devices end user The most important part of an information system. (See also people) general purpose application Application software that is used in nearly all careers. hard disk A secondary storage device that uses magnetized dust to store the information. hardware The equipment that processes the data to create information. Key Term Definition information Processed facts. information technology (IT) Relating to computer software and hardware, and data. input device Translate data and programs that humans can understand into a form the computer can process. Internet The largest computer network in the world. IoT (Internet of Things) The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. keyboard A type of input device that allows the user to input character data into the computer. Laptop computer Also known as a notebook computer is lightweight and portable mainframe computer A type of computer that is capable of great processing speeds and data storage. memory Holds data and program instructions for processing the data. (See also primary storage, random access memory) microprocessor Controls and manipulates data to produce information. midrange computer Also referred to as servers, most widely used to support end users for specific needs such as retrieving data from a database or supplying access to application software. Mobile app (application) Known as apps ae small programs primarily designed for mobile devices such as smartphones and tablet computers. modem Modifies telephone communications into a form that can be processed by a computer. monitor A common output device that allows the user to see what the computer is doing. mouse A type of input device that allows the user to point and click on items for easier operation. network A communications system connecting two or more computers. notebook computer A type of microcomputer that is portable, lightweight, and fits into most briefcases. operating system Program that coordinates computer resources, provides an interface between users and the computer, and runs applications. optical disc A secondary storage device that uses laser technology and has the greatest capacity. output device Translates the processed information from the computer into a form that humans can understand. PC Personal computer Key Term Definition people The most important part of an information system. (See also end users) Personal computer PC presentation file Created by presentation graphics programs to save presentation materials. procedures The rules or guidelines for people to follow when using software, hardware, and data. program Consists of the step-by-step instructions that tell the computer how to do its work. (See also software) random access memory Holds data and program instructions for processing (RAM) the data. (See also primary storage, memory) secondary storage Holds data and programs even after electrical power to the computer system has been turned off. server Most widely used to support end users for specific needs such as retrieving data from a database or supplying access to application software. smartphone Mobile phone offering advanced capabilities beyond a typical mobile phone, often with PC-like functionality. software Consists of the step-by-step instructions that tell the computer how to do its work. (See also program) solid-state storage A secondary storage device that has no moving parts. Data is stored and retrieved electronically directly from these devices, much as they would be from conventional computer memory. specialized application Computer programs that are narrowly focused on specific disciplines and occupations. (See also special-purpose application) stand-alone operating Used in desktop computers and include Windows system 10 and Mac OS supercomputer The most powerful type of computer that is a special high-capacity computer used by very large organizations. system software Enables the application software to interact with the computer hardware and helps the computer manage its own internal resources. system unit A container that houses most of the electronic components that makes up a computer system. tablet Also known as a tablet computer is smaller and lighter and generally less powerful than a laptop. Usually has a flat screen but and a virtual keyboard. tablet computer Also known as a tablet is smaller and lighter and generally less powerful than a laptop. Usually has a Key Term Definition flat screen but and a virtual keyboard. utility A part of the system software that performs specific tasks related to managing computer resources. virus Malicious programs that can damage software, hardware, and compromise the security and privacy of your personal data. wearable Mobile computer that can be worn. web Provides a multimedia interface to the numerous resources available on the Internet. wireless communication Communication between wireless communication devices such as Smartphones and tablets wireless revolution A revolution that is expected to dramatically affect the way we communicate and use computer technology. worksheet file Created by electronic spreadsheets to analyze things like budgets and to predict sales.
From Topic 02 The Internet, the Web, and Electronic Commerce
Key Term Definition address The location or name of a Web site. Launched in 1969 when the United States Advanced Research Project funded a project that developed a national Agency Network (ARPANET) computer network. An advanced use of JavaScript that can be AJAX found on many interactive sites. Special programs on Web sites that provide applets animation, interactivity, and display graphics. Files, such as documents and worksheets attachment that can be sent along with an e-mail message. A type of file transfer that distributes files BitTorrent across many different computers for more efficient downloads. Web logs that contain time stamped blog postings. Software programs that provide a user browser interface to Web resources. Involves the sale of a product or service business-to-business (B2B) from one business to another over the Internet The sale of a product or service to the business-to-consumer (B2C) general public or end users over the Internet Modems that provide Internet high-speed cable access using unused bandwidth on a cable Key Term Definition television network. Files inserted into an HTML document that cascading style sheets (CSS) control the appearance of Web pages including layout, colors, and fonts. A service offered through Google+, for Circles grouping individuals according to interests or other criteria Special program known as an e-mail client that needs to be installed and running in client based e-mail system order to enable a computer to communicate with the e-mail service provider. Uses the Internet and the Web to shift many cloud computing computer activities from a user’s computer to computers on the Internet. Involves individuals selling to individuals consumer-to-consumer (C2C) over the Internet. Internet’s equivalent to traditional cash. digital cash Buyers purchase digital cash from a third party by transferring funds from their banks. It is part of an URL that signifies the name of domain name a Web server where the resource is located. Copying a file from a server to a local downloading computer. Digital Subscriber Line, provides a digital DSL connection over unused frequencies of standard telephone lines. Buying and selling of goods over the e-commerce Internet. (See also electronic commerce) Being able to take classes on almost any e-learning subject from educational institutions that offer courses online. Buying and selling of goods over the electronic commerce Internet. (See also e-commerce) Electronic mail, the transmissions of electronic mail electronic messages over the Internet. (See also e-mail) Electronic mail, the transmissions of e-mail electronic messages over the Internet. (See also electronic mail) Special program required to communicate e-mail client with the e-mail service provider in client- based e-mail accounts. Social networking site that provides an array Facebook of features and applications including instant messaging, photo and video sharing, Key Term Definition games, and more. Share information that is typically organized Facebook groups around topics, events, ideas. Created by businesses to promote products Facebook Pages and services. Created by individuals who may include photos, lists of personal interest, contact Facebook Profile information, and other personal information. file transfer protocol (FTP) An Internet standard for transferring files. filter Blocks access to selected web sites. A person that you specify in a list to use friend instant messaging. A combination of some of Google Inc.'s previously existing services with some new Google+ services, many of which are similar to Facebook's A combination of some of Google Inc.'s previously existing services with some new Google Plus services, many of which are similar to Facebook's A service offered through Google Plus, for Hangouts communicating with up to 10 people at a time. header The first element of an e-mail message. A list of sites that contain the keywords from hit a search. Connect to other documents, which can be hyperlink video files, text, graphics, audio files, etc. Hypertext Markup Language Text based programming language used to (HTML) create Web pages. An extension of e-mail that allows two or instant messaging (IM) more people to contact each other via direct, live communication. Launched in 1969 with ARPANET, the Internet (Net) consists of the actual physical Internet network made up of wires, cables, and satellites. Allows everyday objects embedded with Internet of Things electronic devices to send and receive data over the Internet. A collection of utility programs designed to Internet security suite maintain security and privacy while on the Web. Internet service provider (ISP) Provides a path or connection for individuals Key Term Definition to access the Internet. A scripting language that adds basic JavaScript interactivity to Web pages. link Nickname for a Hyperlink. Social networking site focusing on business LinkedIn professionals. location The name of a Web site. The second element of an e-mail that message consists of the body of the e-mail. A Web site that publishes short sentences microblog that only take a few seconds to write. Twitter is a microblog. MMS (multimedia messaging Sends images, videos and sounds service) A special browser designed to run on mobile browser portable device. online Being connected to the Internet. Program that automatically start and operate as a part of a Web browser in order plug-in to enable a full experience of the content of a Web site. Deliver media content widely used to podcast download music and movies over the Internet. Rules for exchanging data between protocol computers. An organization helps individuals locate search engine information on the Web. (See also search service). An organization helps individuals locate search service information on the Web. (See also search engine) Allows the copying of files to and from a secure file transfer protocol computer across the Internet and are (SFTP) frequently for uploading changes to a Web site hosted by an Internet service provider. The third element of an e-mail message that signature provides additional information about the sender. Using the Internet to connect individuals to social networking one another spam Unwanted or unsolicited e-mail. Software programs that are installed to spam blocker work with e-mail programs to filter unwanted e-mail messages. Key Term Definition Programs used to identify and eliminate spam filter spam. specialized search engine Focus on subject-specific Web sites. Special programs that continually look for spider new information on the Internet and update the search services’ databases. Technology in which audio and video files are continuously downloaded to a computer streaming while the computer user is listening to and/or viewing the file content. Part of the header element in an e-mail, subject usually a one-line description of the message. Sending a short electronic message typically less than 160 characters using a wireless texting network to another person who views the message on a mobile device, such as a smartphone. Sending a short electronic message typically less than 160 characters using a wireless text messaging network to another person who views the message on a mobile device, such as a smartphone. top-level domain (TLD) Another name for a domain name. tweet Twitter messages Twitter A microblog that publishes short sentences. uniform resource locator (URL) The name, or address, of a Web site. To copy a file from a local machine to a uploading server. Destructive program often attached to virus unsolicited e-mail. Introduced in 1992 at CERN, the Web web (WWW and World Wide Web) provides a multimedia interface to Internet resources. Web 1.0 Focused on linking existing information. Evolved to support more dynamic content Web 2.0 creation and social interaction. Focuses on computer-generated information Web 3.0 requiring less human interaction to locate and to integrate information. Sellers post descriptions of products at a web auction Web site and buyers submit bids electronically. Use Webmail clients located on the e-mail web-based e-mail system providers computer. Key Term Definition Services that make use of a Web browser to web-based file transfer services upload and download files: i.e.: drop.io Use streaming technology in which audio and video files are continuously webcasts downloaded to the user’s computer while they are listening to and/or viewing the file content. Personal Web sites that contain time web log stamped postings. Once a computer connects to an e-mail service provider, a special program called a webmail Webmail client runs on the e-mail provider’s computer and e-mailing can take place. Program that runs on an e-mail provider’s webmail client computer and enables Web mailing to take place. Develops and maintains Web sites and Web webmaster resources. web page A document on the Web. Identifies the type of organization, for web suffix example .com indicates a commercial site. Specialized programs that make using the web utility Internet and the Web easier and safer. A Web site specially designed to allow wiki visitors to fill in missing information or correct inaccuracies. An online ‘wiki’ encyclopedia written and Wikipedia edited by anyone who wants to contribute. They transmit information that is modulated onto a carrier frequency to allow many wireless modem simultaneous wireless communication links to work simultaneous on different frequencies. Also known as WWW provided a World Wide Web multimedia interface to resources available on the Internet. Provide a multimedia interface to resources WWW available on the Internet From Topic 3 Privacy, Security, and Ethics Key Term Definition Relates to the responsibility of those who have access data to control who is able to use that data. Relates to the responsibility of those who collect accuracy data to ensure that the data is correct. Programs designed to detect and remove antispyware cookies, web bugs, and monitoring software. (see also spy removal program) Using devices such as fingerprint and iris (eye) biometric scanning scanners to verify the identity of users. botnet A collection of zombie computers. A collection of temporary internet files that browser cache contain web page content and instructions for displaying this content. An illegal action in which the perpetrator uses computer crime special knowledge of computer technology. Guidelines for the morally acceptable use of computer ethics computers in our society. A law that makes creating and knowingly Computer Fraud and Abuse Act spreading a virus a crime. The most invasive and dangerous type of spyware. They record every activity and computer monitoring software keystroke made on a computer system. (see also keystroke logger) Specialized programs that are deposited on a cookies hard disk from websites. A legal concept that gives content creators the copyright right to control use and distribution of their work. People who gain unauthorized access to a cracker computer system for malicious purposes. Use of the Internet, cell phones, or other devices cyberbullying to send or post content intended to hurt or embarrass another person. Includes the creation of malicious programs such as viruses, worms, Trojan horses, zombies, cybercrime denial of service attacks, Internet scams, cyberbullying, rogue Wi-Fi hotspots, and data manipulation Concerned with protecting software and data data security from unauthorized tampering or damage. A type of worm floods a computer or network with requests for information and data which denial of service (DoS) attack overwhelms the system making it unable to respond to legitimate users. A computer attack that uses software to try thousands of common words, sequentially in an dictionary attack attempt to gain unauthorized access to a user’s account. States that it is legal for a program owner to Digital Millennium Copyright make only their own backup copies of that Act program. In order to prevent copyright violations, DRM digital rights management encompasses various technologies that control (DRM) access to electronic media and files. A set of procedures that setups ways to continue disaster recovery plan operating until normal computer operations can be restored. Highly detailed and personalized descriptions of electronic profile individuals. Software that record everything including employee-monitoring software employees’ electronic mail and computer files on an employee’s computer. The process of coding information to make it encryption unreadable except to those who have a special key. A key or special piece of information used to encryption key gain access to data that has been encrypted. ethics Standards of moral conduct. Family Educational Rights and A federal law that restricts disclosure of Privacy Act (FERPA) educational records. A security buffer between an organization’s firewall private network and all external networks. A cookie that is generated and then read only by first-party cookie the web site you are currently visiting. A law that entitles people to look at records held Freedom of Information Act by government agencies. A federal law that protects personal financial Gramm-Leach-Bliley Act information. People who gain unauthorized access to a hacker computer system for the fun and challenge of it. Health Insurance Portability A federal law that protects personal medical and Accountability Act (HIPAA) information. A file that includes the locations of websites history file visited. HTTP (Hyper Text Transfer Is a widely used protocol used for web traffic Protocol) Is a widely used protocol used for web traffic HTTPS (Hyper Text Transfer and is used to protect the transfer of sensitive Protocol Secure) information. identity theft The illegal assumption of someone’s identity for the purposes of economic gain. The feeling that if you are selective about disclosing personal information on the Internet, illusion of anonymity then little can be done to invade your personal privacy. Google Chrome provides to ensure browsing Incognito Mode activity is not recorded on a computer’s hard disk Data gatherers that collect and sell personal information broker data. (see also information reseller) Data gatherers that collect and sell personal information reseller data. (see also information broker) Internet scam A scam that uses the Internet. Responsible for maintaining the security of a company's network, systems, and data. Employers look for candidates with a bachelor's IT security analyst or advanced specialized associate's degree in information systems or computer science and network experience. An encryption key; special information for key making encrypted information readable. The most invasive and dangerous type of spyware. They record every activity and keystroke logger keystroke made on a computer system. (see also computer monitoring software) malware Short for malicious software. It is when an electronic profile of one person is mistaken identity switched with another. The information that people voluntarily post online identity about themselves online. Secret words or numbers that must be keyed password into a computer system to gain access. Helps create strong passwords and will save all passwords in one location to automatically password managers provide password when requested from website; use one master password to access list of passwords A technique employed by scammers attempting phishing to trick Internet users to think a fake but official looking site is legitimate. Procedures and devices that deal with physical security protecting hardware from possible human and natural disasters. An ethical issue which means representing some plagiarism other person’s work and ideas as your own without giving credit to the original source. A person who uses another’s work and ideas as plagiarist their own without crediting the original source. privacy The collection and use of data about individuals. Many browsers offer a privacy mode that privacy mode eliminates history files as well as blocks most cookies. A tool in Safari that controls many types of Privacy Browsing cookies. Relating to who owns data and rights to property software. robot network A botnet; a collection of zombie computers. Free wireless hotspot where users information rogue Wi-Fi hotspot are captured when connecting to legitimate sites. A fraudulent or deceptive act or operation scam designed to trick individuals into spending their time and money for little or no return. Controlling access to sensitive information, security hardware, and software. A collection of utility programs designed to security suites protect your privacy and security while you are on the web. Unauthorized copying of programs for personal software piracy gain is a form of theft. Programs designed to detect and remove spy removal program cookies, web bugs, and monitoring software. (see also anti-spyware) A wide range of programs that are designed to spyware secretly record and report an individual’s activities on the Internet. Contain Web page content and instructions for temporary Internet file displaying this content. Generated by an advertising company that is affiliated with the website you are currently third-party cookie visiting. Often also referred to as a tracking cookie. Generated by an advertising company that is tracking cookies affiliated with the website you are currently visiting. A program that comes into a computer system Trojan horse disguised as something else, but contains a virus. A secure private connection between a remote virtual private network (VPN) user and an organization’s internal network. Programs that migrate through networks and virus operating systems, and most attach themselves to different programs and databases. A type of spyware that is typically hidden within web bugs the HTML code for a web page or e-mail message as a graphical image. Restricts access to authorized users on wireless wireless network encryption networks. A special program fills a computer system with worm self-replicating information, clogging the system so that its operations are slowed or stopped. Wi-Fi Protected Access; replacing WEP in WPA2 wireless encryption. Computers infected by a virus, worm, or Trojan zombie house that allows them to be remotely controlled for malicious purposes.
The key terms for Topic 04 is the combination of the key terms from Topic 01, Topic 02, and Topic 03.