Premium Essay

Introduction to Computers - Key Terms

In:

Submitted By haonguyen
Words 1585
Pages 7
Chapter 1 - Introduction to Computers - Key Terms (pages 1-15)
Barcode - (p. 7, 294) used to index documents scanned within a document management systems.
Bit - (p. 294) the level of voltage (low or high) in a computer that provides the binary states of 0 and 1 that computers use to represent characters.
Bluetooth port - (p. 294) technology that uses radio waves to provide hands-free cellular phone communications.
Blu-Ray disc - (p. 294) storage device, similar to CDs and DVDs, but are able to store even larger amounts of data.
Bus network - (p. 294) computers networked together that are lined up on a single cable.
Byte - (p. 294) eight bits treated as a single unit by a computer to represent a character.
Cache memory - (p. 294) a type of memory located on the central processing unit (CPU) that can also be on a part of the processor.
Central processing unit (CPU) - (p. 295) the brain of the computer, or the circuits that make the electrical parts function.
Client/server network - (p. 295) large networks that could run hundreds of computers in various counties or states.
Compact disc (CD) - (p. 296) discs that use a finely focused laser beam to write and read data.
Computers on wheels (COWs) - (p. 296) term used to refer to notebook computers mounted on carts and moved with the user.
Daisy chain network - (p. 296) the easiest way to add more computers into a network by connecting each computer to the next in a series.
Device driver - (p. 297) a specific type of software that is made to interact with hardware devices, such as the printer driver that ensures that the computer directs printing instructions appropriate to the type of printer to which it is connected.
Digital camera - (p. 298) used to take still pictures or video that are then converted to a digital format.
Digital video disc (DVD) - (p. 298) storage device, similar to a CD, that is

Similar Documents

Premium Essay

Introduction to Computer Security

...Introduction to Computer Security CSE 3482 Introduction to Information/Computer Security Instructor: N. Vlajic, Winter 2014 Learning Objectives Upon completion of this material, you should be able to: • Describe the key security requirements of confidentiality, integrity and availability (CIA). • Describe the CNSS security model (McCumber Cube). • Identify today’s most common threats and attacks against information. • Distinguish between different main categories of malware. Required Reading Computer Security, Stallings: Chapter 1 Computer Security, Stallings: Chapter 6 Introduction • Information Technology – technology involving development & use of computer systems & networks for the purpose of processing & distribution of data  in many organizations, information/data is seen as the most valuable asset categories of IT jobs:  IT administrator - installs, maintains, repairs IT equipment  IT architect - draws up plans for IT systems and how they will be implemented  IT engineer - develops new or upgrades existing IT equipment (software or hardware)  IT manager - oversees other IT employees, has authority to buy technology and plan budgets  Introduction (cont.) • Information System – entire set of data, software, hardware, networks, people, procedures and policies that deal with processing & distribution of information in an organization  each component has its own strengths, weaknesses, and its own security requirements information...

Words: 1194 - Pages: 5

Free Essay

Termpaper

...Introduction to PC Components Here you will learn computer hardware tutorials introduction, basic pc components, networking devices, ram, vga, monitor and printer etc. Computer hardware is the physical part of the computer including the digital circuits inside the computer as opposed to the software that carry out the computing instructions. The hardware of a computer is unlikely to change frequently unless due to the crash or for upgrading them. The devices that is capable of storing, executing system instructions and controlling other logical outputs.  Hardware comprises all of the physical part of the computer such as Monitor, CPU, motherboard, ram, CD-Rom, printer, scanner, hard disk, flash drive (AKA pen drive), processor, pci buses, floppy disk, power supply, VGA card, sound card, network interface card, peripherals, joystick, mouse, keyboard, foot pedal, computer fan, camera, headset and others. On the other hard software is a logical part of a computer and is used to carry out the instructions, storing, executing and developing other software programs. A typical PC consists of a case or chassis in the desktop or tower case and these components. Motherboard • CPU • Computer Fan • RAM • BIOS • Digital Circuitry • Computer Fan • PCI Slots PC Buses • PCI • USB • Hyper-transport • AGP • ISA • EISA • VLB Media • CD-Rom • DVD-Rom • Combo box • Joystick • BD-Rom drive Internal storage • Hard disk (ATA & SATA) • Data array controller • Floppy disk ...

Words: 1889 - Pages: 8

Premium Essay

Asdsada

...CAPITOL UNIVERSITY College of Computer Studies Introduction to Programming Activity Book Compiled by: Mark Godfrey D. Torres 2012 Introduction to Programming ii Table of Contents Weeks 1 to 3 – Creating Your First Java Classes ....................................................................................... 1 Objectives ........................................................................................................................................... 1 Summary ............................................................................................................................................ 1 The Don’ts........................................................................................................................................... 2 Key Terms ........................................................................................................................................... 3 Seatwork............................................................................................................................................. 6 Where to Save Your Files ................................................................................................................. 6 Configuring Windows to Work with the Java SE Development Kit................................................... 6 Your First Application ........................................................................................................................

Words: 4647 - Pages: 19

Free Essay

Asdasd

... | |Introduction to the University and work area |Mission, Vision, Objectives of work area | |Person Responsible – Line Manager |How the work area fits in to the wider University | | |All key operational and social areas to be visited. (e.g. Offices, Labs, Catering | | |Facilities, Bank, Library) | |Introduction to other members of staff |Go through organisation chart | |Person Responsible – Line Manager |Discuss roles and responsibilities of staff in general terms. | | |May also want to extend time to allow visits to key contacts outwith work area. | |Introduction to the other teams within the Work area|Purpose/Activities of the other teams/work areas | |(if appropriate) |How the team fits in to the work area | |Person Responsible – Line Manager |How the work area fits into the University | |Terms and Conditions...

Words: 485 - Pages: 2

Free Essay

Tech

...Main article: History of laptops Alan Kay with "Dynabook" prototype The Epson HX-20As the personal computer became feasible in the early 1970s, the idea of a portable personal computer followed. A "personal, portable information manipulator" was imagined by Alan Kay at Xerox PARC in 1968,[6] and described in his 1972 paper as the "Dynabook".[7] The IBM SCAMP project (Special Computer APL Machine Portable), was demonstrated in 1973. This prototype was based on the PALM processor (Put All Logic In Microcode). The IBM 5100, the first commercially available portable computer, appeared in September 1975, and was based on the SCAMP prototype.[8] As 8-bit CPU machines became widely accepted, the number of portables increased rapidly. The Osborne 1, released in 1981, used the Zilog Z80 and weighed 23.6 pounds (10.7 kg). It had no battery, a 5 in (13 cm) CRT screen, and dual 5.25 in (13.3 cm) single-density floppy drives. In the same year the first laptop-sized portable computer, the Epson HX-20, was announced.[9] The Epson had a LCD screen, a rechargeable battery, and a calculator-size printer in a 1.6 kg (3.5 lb) chassis. Both Tandy/RadioShack and HP also produced portable computers of varying designs during this period.[10][11] The first laptops using the flip form factor appeared in the early 1980s. The Dulmont Magnum was released in Australia in 1981–82, but was not marketed internationally until 1984–85. The $8,150 ($18,540 today) GRiD Compass 1100, released in...

Words: 1726 - Pages: 7

Premium Essay

Introduction to Hris

...Michael J. Kavanagh, and RichaRd d. Johnson EDITORS’ NOTE The purpose of this chapter is to provide an introduction to the fields of human resource management (HRM) and information technology (IT) and to the combination of these two fields into human resource information systems (HRIS). The history of the field of HRM and the impact of computer technology on HRM will be covered, as well as the advent of using a human resource information system and the subsequent effects on both HR and IT professionals. The different types of HR activities will be discussed as well as the different types of information systems used in HRIS. A central focus of this chapter is the use in managerial decision making of results and reports from an HRIS. The development of the HRIS field has been seen to have a significant impact on the emergence of strategic human resource management (Strategic HRM), as is discussed in this chapter. This first chapter will lay the groundwork for the remainder of this book, and, consequently, it is important to understand thoroughly the concepts and ideas it presents. This chapter contains definitions for a number of terms in common use in the HRM, IT, and HRIS fields. (Note that a glossary defining these terms is also provided at the back of this book.) The central themes 2 Chapter 1 Evolution of Human Resource Management and HRIS 3 of this book in terms of the development, implementation, and use of an HRIS will also be discussed. A model of organizational...

Words: 12986 - Pages: 52

Free Essay

Menace Ii Society

...Introduction to Sociology Prof. Camelot Paper 1 Instructions Topic: Deviance and Menace II Society Specific assignment:  The assignment is to apply the course material on deviance and social control (online lecture and text) to the film, Menace II Society (film will need to be rented or viewed online or at movie rental location (check: Netflix, xfinity, hulu, www.onlinewatchmovies.net , or youtube; if you are unable to locate the film please contact me via email).  The assignment is to choose and apply THREE of the following theories of deviance presented in the online lecture and the textbook to the film and the specific examples from the film: differential association theory, control-bond theory, labeling theory, or strain theory. o Important: Students are not permitted to apply rational-choice/exchange theory for this assignment (presented in the online lecture) as I find that many students have difficulty applying this theory therefore we will cover this in the discussion board. However, you should think critically think about how you can apply this theory to the film (i.e. how the individuals presented in the film made decisions and behaved in ways that were rational/logical to them given their environment and socialization).  Apply the key terms/concepts and research/study data that were presented in online lecture and in the textbook to the specific examples from the film. It is required that you apply the key terms and research data...

Words: 1445 - Pages: 6

Free Essay

Master of Business Administration

...study for Employee Orientation 1. What are the key Differences regarding the first day of work for these two employees? The key differences regarding the first day of work between Jill and Ben is the good introduction of the manager for Jill, which it was very professional how the meeting was, she was introduced to her office, provided with computer, stock, and supplies, later was introduced to her colleagues, Jill was fully understand her task and proper Schedule for next coming weeks, followed by series of online Orientation courses and making her known about company's values, mission and consulting methodologies. While Ben his manager didn’t come to meet him on his first day, he was not introduced to his office and colleagues, Ben's office were missing of supplies and computer. He was given a huge paper work, and then large binders, later a list of 20 online orientation courses and tasks that he should complete them within the first two weeks. 2. Are these differences really important elements for recruitment and retention of employees? Explain Yes these differences are very important elements for recruitment and retention of employees, proper introduction to the company are the key essential for the employee for making him or her feel comfortable in the first day of the job, the employee should get familiar with his colleagues, company's mission and values, these elements are potential for determine long term relation in the company. 3. What are the human...

Words: 379 - Pages: 2

Premium Essay

Introduction to Information Security Student

...IT414 - Principles of Information Security Sherwin R. Pineda Introduction to Information Security Do not figure on opponents not attacking; worry about your own lack of preparation. Learning Outcomes 嗗Define information security 嗗Recount the history of computer security, and explain how it evolved into information security 嗗Define key terms and critical concepts of information security Introduction 嗗The History of Information Security –The 1960 –The 1970 to 80 –The 1990 –2000 to present The History of Information Security The need for computer security — that is, the need to secure physical locations, hardware, and software from threats arose during World War II when the first mainframes, developed to aid computations for communication code breaking were put to use The History of Information Security 嗗 Multiple levels of security were implemented to protect these mainframes and maintain the integrity of their data. 嗗 Access to sensitive military locations was controlled by means of badges, keys, and the facial recognition of authorized personnel by security guards. 嗗 The growing need to maintain national security eventually led to more complex and more technologically sophisticated computer security safeguards. The History of Information Security During these early years, information security was a straightforward process composed predominantly of physical security and simple document classification schemes. The primary threats to security were physical...

Words: 1230 - Pages: 5

Premium Essay

Paper

...OIM 310 Intro to Management Science - The most frequently used methods in modeling and analyzing business and economic problems. The process of abstracting and model building, and the role of various types of models in description and decision making. OIM 320 Quality Management - Quality control concepts including: fundamental computer and statistical concepts: Statistical Process Control (SPC) using control charts; methods for quality improvement; acceptance sampling; industrial experimentation and reliability. OIM 321 Business Process Simulation - Computer simulation presented for carrying out trial-and-error experiments on computer approximations of real, management systems. The goal is to 1) validate a new idea quickly, 2) diagnose potential product design problems, 3) optimize performance of complex systems, and 4) learn about something complex. The Arena environment, based on the SIMAN language, used to build models and video game-like animations. Prerequisites: (FINOPMGT 347 or OIM 301) and (FINOPMGT 353 or OIM 310) OIM 322 Business Forecasting - Introduction to the uses, limitations, and shortcomings of various short-term and long-term forecasting techniques. Problems selected from accounting, finance, management and marketing. Prerequisite: upper-level Isenberg School of Management standing. OIM 410 Business Process Optimization OIM 412 Supply Chain Management - Integrated supply chain constitutes a core firm competency, spanning most business functions...

Words: 709 - Pages: 3

Premium Essay

Algorithms In Computer Science

...Abstract—Algorithms are commonly perceived as a difficult subject, which is quite an irony as they have a fundamental role in computer science. Failure to master this subject will inhibit students’ capabilities as they advance to higher levels. Algorithm visualization, as an effort to overcome the problem, has been growing towards gameful visualization recently that is presumed to be able to engage learners longer and more intensely. However, integrating algorithm visualization, game elements, and instructional design is not a trivial task as it requires a careful design. Hence, a conceptual model of how algorithm learning instructions, algorithm visualization, and gamification improve learning outcomes was developed. While instructional design...

Words: 753 - Pages: 4

Premium Essay

It140 Introduction to Operating Systems Key Assignment

...IT140 Introduction to Operating Systems and Client/Server Environments Key Assignment David Anderson Instructor: Mohammed Majid 02/24/2014 Table of Contents Week 1: Introduction to Operating Systems Week 2: Components of a Computer System Week 3: Managing Client Server Environments Week 4: Securing Operating Systems Week 5: System Administrators Week 1 Introduction to Operating Systems For this assignment I have chosen Microsoft because I am most familiar with them and their affiliates. Microsoft is a multibillion dollar organization and without them we would not be where we are today in the world of computers and technology. They have Cloud Computing, Bing search engine, and even Microsoft Dynamics, Lync systems, and even windows server which is used by IT specialists to increase the reliability of their server infrastructures. Each of these services is separately installed and you can buy them real cheap off their website at http://www.microsoft.com/government/ww/safety-defense/products/Pages/index.aspx. I chose Windows 8 because I am currently using it on my computer and I wanted to learn more about this specific operating system. I chose Ubuntu as my choice for Linux distributor because it was number one on the list and the first one I saw and I like the name. The name Ubuntu comes from African culture and it means “I am what I am because of who we all are”. Ubuntu on the other hand comes from...

Words: 377 - Pages: 2

Free Essay

Programming

...this book, the publisher and author assume no responsibility for errors or omissions. Neither is any liability assumed for damages resulting from the use of the information contained herein. International Standard Book Number: 0-672-31633-1 Library of Congress Catalog Card Number: 98-83221 Printed in the United States of America First Printing: May 1999 01 00 99 4 3 2 1 EXECUTIVE EDITOR Brian Gill DEVELOPMENT EDITOR Jeff Durham MANAGING EDITOR Jodi Jensen PROJECT EDITOR Tonya Simpson COPY EDITOR Mike Henry INDEXER Larry Sweazy PROOFREADERS Mona Brown Jill Mazurczyk TECHNICAL EDITOR Richard Wright Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Sams Publishing cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. SOFTWARE DEVELOPMENT SPECIALIST Dan Scherf INTERIOR DESIGN Gary Adair Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. The authors and the...

Words: 10065 - Pages: 41

Free Essay

Test

...Human Computer Interaction HUMAN COMPUTER INTERACTION PREPARED BY DHIREN PARMAR 04IT6005 M.Tech I.T. SIT IIT KGP -1- Human Computer Interaction Contents 1. Abstract……………………………………………………………………………...3 2. Introduction………………………………………………………………………….4 3. Cognition…………………………………………………………………………....9 4. User Interaction Design……………………………………………………….....12 5. Interaction Styles………………………………………………………………….15 6. Interaction Devices…………………………………………………………….....18 7. Future of Human Computer Interaction………………………………..……….19 8. Conclusion………………………………………………………………………....19 9. Reference……………………………………………………………………….....20 -2- Human Computer Interaction Abstract Human-computer interaction (HCI) is the study of how people design, implement, and use interactive computer systems and how computers affect individuals, organizations, and society. This encompasses not only ease of use but also new interaction techniques for supporting user tasks, providing better access to information, and creating more powerful forms of communication. It involves input and output devices and the interaction techniques that use them; how information is presented and requested; how the computer’s actions are controlled and monitored; all forms of help, documentation, and training; the tools used to design, build, test, and evaluate user interfaces; and the processes that developers follow when creating Interfaces. HCI in the large is an interdisciplinary area. It is emerging as a specialty concern...

Words: 4044 - Pages: 17

Free Essay

Masters Student

...Business Solution Assessment and Validation TouchPoint Packaging Jan Morrison Capella University TS5343 September 23, 2011 Table of Contents 1 Introduction 3 1.1 Introduction to the Case Study – TouchPoint Packaging 3 1.2 Case Study Background 3 2 Proposed Solution Compliance with Functional Requirements – TouchPoint Packaging 3 2.1 Identify Functional Requirements 3 2.2 Evaluate current solution with Functional Requirements 3 3 Evaluate Compliance of Security Requirements 4 4.1 Compliance with Security Issues 4 4 Develop Assessment Approach for the Measuring the Usability of the Implementation 4 4.1 Determine Assessment for Measuring Usability 4 4.2 What are Measurements for Usability 4 5 Assessment Approach for Measuring Business Impact 4 5.1 Determine Assessment for Measuring for Business Impact 4 5.2 Measure the Business Impact for Implementation 4 6 Methods to Validate the Impact against Requirements 4 6.1 Determine Methods to Validate the Requirements 4 6.2 Compare Validation to Expected Outcome 4 7 Evaluate Quality Processes and Standards that Impact System Development 5 7.1 Review several Quality Processes and Standards 5 7.2 Select a Quality Process and Standards 5 8 Evaluate Strategies to Test the Solution Under Development 5 8.1 Review Several Strategies for the Test Process 5 8.2 Determine How to Validate and Measure the Test Results 5 9 Evaluate the Quality of the Solution Using Defect Tracking 5 9.1 Assess the Quality of...

Words: 1139 - Pages: 5