Top Banner
ESSENTIAL COMPUTER CONCEPTS Computer Applications Page 1 of 3 EXPLORING DATA COMMUNICATIONS – page 16 1. Allow data to be transmitted at high speeds a. Card (controller/interface/expansion) 2. Allows multiple connections at the same port b. Channel 3. Computer or peripheral at the message’s destination c. Data bus 4. Computer that originates the message d. Data communication 5. Credit card sized cards that plug directly into the PC card slot and contain additional RAM, a fax modem or a hard disk drive e. Device driver f. Ethernet port g. MIDI card 6. Data path between the microprocessor, RAM, and the peripherals along which communication travels h. Parallel port i. Port/cable 7. Each port connects to … j. Portable computer (PC) card 8. External peripheral device must have a corresponding ____ and ____ that connect it to the computer k. Protocols l. Receiver 9. Message is sent over some type of telephone or coaxial cable m. SCSI n. Sender 10. Port for a sound card usually includes jacks for speakers and a microphone, designed to work with a … o. Serial port p. USB connector 11. Provides an interface for one or more peripheral devices at the same port q. USB port 12. Rules that establish an orderly transfer of data between the sender and the receiver 13. Small rectangular plug 14. Transmission of data from one computer to another or to a peripheral device 15. Transmission protocol between a computer and its peripheral device is handled by … 16. Transmits data eight bits at a time 17. Transmits data one bit at a time LEARNING ABOUT NETWORKS – page 18 1. Act as the central storage location for programs and provide mass storage for most of the data used on the network a. Bluetooth b. Client/server network 2. Allows computer users to connect over many miles to a LAN c. Clients 3. Any device connected to a network d. Infrared technology 4. Computers and peripheral devices are located relatively close to each other, generally in the same building e. Local area network (LAN) f. Network interface card 5. Computers and peripherals use high-frequency radio waves instead of wires to communicate and connect in a network g. Network software h. Node 6. Creates a communication channel between the computer and the network i. Peer-to-peer network j. Personal area network (PAN) 7. Dependent computers k. Server 8. Establishes the communication protocols that will be observed on the network and controlling the “traffic flow” as data travels through the network l. Standalone computer m. Wi-Fi n. Wide area network (WAN) 9. Infrared light waves to beam data from one device to another o. WiMAX 10. More than one LAN connected together p. Wireless local area network (WLAN) 11. Network that allows two or more devices located close to each other to communicate or to connect a device to the Internet q. Workstation 12. Network with a server and computers dependent on the server is called this 13. Networks connected using a standard radio frequency established by the IEEE 14. Personal computer that is connected to a network 15. Personal computer that is not connected to a network 16. Uses short range radio waves to connect a device wirelessly to another device or to the Internet 17. When a network does not have a server, all the computers essentially are equal; programs and data are distributed among them
3

EXPLORING DATA COMMUNICATIONS – page 16 · 2/7/2011  · ESSENTIAL COMPUTER CONCEPTS Computer Applications Page 2 of 3 LEARNING ABOUT SECURITY THREATS – page 20 1. Address on

Aug 20, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: EXPLORING DATA COMMUNICATIONS – page 16 · 2/7/2011  · ESSENTIAL COMPUTER CONCEPTS Computer Applications Page 2 of 3 LEARNING ABOUT SECURITY THREATS – page 20 1. Address on

ESSENTIAL COMPUTER CONCEPTS Computer Applications

Page 1 of 3

EXPLORING DATA COMMUNICATIONS – page 16

1. Allow data to be transmitted at high speeds a. Card (controller/interface/expansion) 2. Allows multiple connections at the same port b. Channel 3. Computer or peripheral at the message’s destination c. Data bus 4. Computer that originates the message d. Data communication

5. Credit card sized cards that plug directly into the PC card

slot and contain additional RAM, a fax modem or a hard disk drive

e. Device driver f. Ethernet port g. MIDI card

6. Data path between the microprocessor, RAM, and the

peripherals along which communication travels h. Parallel port

i. Port/cable 7. Each port connects to … j. Portable computer (PC) card

8. External peripheral device must have a corresponding

____ and ____ that connect it to the computer k. Protocols

l. Receiver

9. Message is sent over some type of telephone or coaxial

cable m. SCSI

n. Sender

10. Port for a sound card usually includes jacks for speakers

and a microphone, designed to work with a … o. Serial port

p. USB connector

11. Provides an interface for one or more peripheral devices

at the same port q. USB port

12. Rules that establish an orderly transfer of data between

the sender and the receiver

13. Small rectangular plug

14. Transmission of data from one computer to another or to

a peripheral device

15. Transmission protocol between a computer and its

peripheral device is handled by …

16. Transmits data eight bits at a time 17. Transmits data one bit at a time

LEARNING ABOUT NETWORKS – page 18

1. Act as the central storage location for programs and provide

mass storage for most of the data used on the network a. Bluetooth

b. Client/server network 2. Allows computer users to connect over many miles to a LAN c. Clients 3. Any device connected to a network d. Infrared technology

4. Computers and peripheral devices are located relatively close to

each other, generally in the same building e. Local area network (LAN)

f. Network interface card

5. Computers and peripherals use high-frequency radio waves

instead of wires to communicate and connect in a network g. Network software

h. Node

6. Creates a communication channel between the computer and

the network i. Peer-to-peer network

j. Personal area network (PAN) 7. Dependent computers k. Server

8. Establishes the communication protocols that will be observed

on the network and controlling the “traffic flow” as data travels through the network

l. Standalone computer m. Wi-Fi n. Wide area network (WAN)

9. Infrared light waves to beam data from one device to another o. WiMAX 10. More than one LAN connected together p. Wireless local area network (WLAN)

11. Network that allows two or more devices located close to each

other to communicate or to connect a device to the Internet q. Workstation

12. Network with a server and computers dependent on the server

is called this

13. Networks connected using a standard radio frequency

established by the IEEE

14. Personal computer that is connected to a network 15. Personal computer that is not connected to a network

16. Uses short range radio waves to connect a device wirelessly to

another device or to the Internet

17. When a network does not have a server, all the computers

essentially are equal; programs and data are distributed among them

Page 2: EXPLORING DATA COMMUNICATIONS – page 16 · 2/7/2011  · ESSENTIAL COMPUTER CONCEPTS Computer Applications Page 2 of 3 LEARNING ABOUT SECURITY THREATS – page 20 1. Address on

ESSENTIAL COMPUTER CONCEPTS Computer Applications

Page 2 of 3

LEARNING ABOUT SECURITY THREATS – page 20

1. Address on the web a. Anti-spyware software

2. Breaks into a server and redirect any attempts to access

a particular web site to the criminal’s spoofed site b. Antivirus software

c. DNS server

3. Broad term that describes any program that is intended

to cause harm or convey information to others without the owner’s permission

d. Firewall e. Malware f. Pharming

4. Computer responsible for directing Internet traffic g. Phishing

5. Detect programs that track a computer user’s Internet

use h. Router

i. Security

6. Device that controls traffic between network

components, usually has a built-in firewall j. Spoofed

k. Spyware

7. Instruct computer to perform destructive activities, such

as erasing a disk drive l. URL

m. Virus

8. Locked door on a computer; prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user’s permission

9. Practice of sending emails to customers or potential

customers of a legitimate web site asking them to click a link in the email

10. Searches executable files for the sequences of characters

that may cause harm and disinfects the files by erasing or disabling those commands

11. Steps a computer owner takes to prevent unauthorized

use of or damage to the computer

12. Track a computer user’s Internet use and send this data

back to the company or person that created it

13. Web site set up to look exactly like another web site but

which does not actually belong to the organization portrayed in the site

UNDERSTANDING SYSTEM SOFTWARE – page 22

1. Helps the computer carry out its basic operating tasks a. Graphical user interface (GUI)

2. Allocates system resources, manages storage space,

maintains security, detects equipment failure, and controls basic input and output

b. Input and output (I/O) c. Operating environments d. Operating system

3. Flow of data from the microprocessor to memory to

peripherals and back again e. Programming languages

f. System software 4. Microsoft Windows and MAC OS are referred to as … g. Utilities

5. Acts as a liaison between the user and all of the

computer’s hardware and software

6. Another category of system software that augment the

operating system by taking over some of its responsibility for allocating hardware resources

7. Used to write computer instructions; also part of the

system software

Page 3: EXPLORING DATA COMMUNICATIONS – page 16 · 2/7/2011  · ESSENTIAL COMPUTER CONCEPTS Computer Applications Page 2 of 3 LEARNING ABOUT SECURITY THREATS – page 20 1. Address on

ESSENTIAL COMPUTER CONCEPTS Computer Applications

Page 3 of 3

UNDERSTANDING APPLICATION SOFTWARE – page 24

1. Allows you to create and manage web sites a. Application software 2. Allows you to manipulate digital photos b. Clip art

3. Allows you to record digital sound files, video files and

animations that can be included in presentations and other documents

c. Database d. Database management software e. Document production software

4. Collection of data items stored in a database f. Field 5. Composed of a grid of columns and rows g. Graphics/presentation software

6. Collection of information stored on one or more

computers organized in a uniform format of records and fields

h. Information management software i. Multimedia authoring software j. Photo editing software

7. Creates illustrations, diagrams, graphs, and charts that

can be projected before a group, printed out for quick reference, or transmitted to remote computers

k. Record l. Spell checking m. Spreadsheet software

8. Enables you to perform specific computer tasks n. Web site creation and management software 9. Helps avoid typographical and spelling errors

10. Keeps track of schedules, appointments, contacts, and

“to do” lists o. Worksheet

11. Lets you collect and manage data

12. Numerical analysis tool

13. One piece of information in a record

14. Simple drawings that are included as collections with

many software packages

15. Word processing software, desktop publishing software,

email editors, and web authoring software; assist in writing and formatting documents