Wednesday, April 6, 2011

Do Now April 6, 2011

It is important for a header or footer to keep documents intact

Digital Camera


A camera that records and stores digital images.

Data


The statements in a computer program that specify the physical attributes of the data to be processed, such as location and quantity of data.



Control unit


n electronic device containing data buffers and logical circuitry, situated between the computer channel and the input/output device, and controlling data transfers and such operations as tape rewind.


Sunday, March 20, 2011

Computer


A device that computes, especially a programmable electronic machine that performs high-speed mathematical or logical operations or that assembles, stores, correlates, or otherwise processes information.

Circuit board


An insulated board on which interconnected circuits and components such as microchips are mounted or etched.

Centrl Procesing Unit (CPU)


is the brains of the computer. Sometimes referred to simply as the central processor, but more commonly called processor, the CPU is where most calculations take place. In terms of computing power, the CPU is the most important element of a computer system.

Biometrics


The science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements.

Audio input


is a computer sound card driver

Arithmetic /Logic Unit (ALU)


ne of the many components within a computer processor. The ALU performs mathematical, logical and decision operations in a computer and is the final processing performed by the processor. After the information has been processed by the ALU, it is sent to the computer memory.

HW#1 Parents interview

my mom :OK so the late 70's & early 1980's
there were NO COMPUTERS, NO INTERNET, NO MOBILE PHONES, NO ELECTRONIC HANDHELD GAMES, NO SUPERMARKET HOME DELIVERY.
There was darts though & people actually talked to each other.
we had walkmen instead of Ipods, we had mobile phones but they were big things that looked like bricks not the small things we have today. We had computers in our homes but they were much less powerful text only machines with what we thought was ahirty years ago life was very similar to what it is today except no computers in the home, no internet and no online roll playing games, twitter facebook or any of that stuff, people communicated with each other mainly by telephone (landline) as not everyone had mobile phones, only the more successful businessmen. It would be a while before everyone got a mobile phone and a while longer before text messaging and even longer still before every home had more than one computer.

Monday, February 21, 2011

Trojan horse


Allows a hacker remote access to a target computer system.

Time bomb


professionally manufactured, either separately or as part of the device.


Teleconference


A conference held among people in different locations by means of telecommunications equipment, such as closed-circuit television.

Tagging


To identify images or text within their site as a categories or topic. Web pages and blogs with identical tags can then be linked together allowing users to search for similar or related content.

RDF summary


An XML format used to syndicate news, blog posts, forum threads, and other content among different web sites. Many newer browsers contain features that allow you to retrieve and view RSS feeds.

pyramid scheme


a message containing a list of names. You're expected to send money to the first person on the list, cross the first name off, add your name at the bottom, and distribute copies of the message.

Phishing


an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.

Netiquette


Conferencing between two or more users on an online service or the Internet.

Logic Bomb


an unauthorized program that is inserted into a computer system; when activated it interferes with the operation of the computer.

Hoax


Phony virus warnings delivered via e-mail just to upset as many people as possible. Considering the speed with which messages can be copied and sent electronically.

Fraud


committed with the aid of, or directly involving, a data processing system and networks.

Filtering


is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.

Windows Mail


The e-mail and newsgroup in Windows Vista. Windows Mail replaced Outlook Express, which has been the light version of the Outlook mail client in previous versions of Windows.

User agent


The application which a request to a Web server or other Internet application.

Text message


A short message that contains only text.

Spam


electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages

signature


Extra data appended to a message which identifies and authenticates the sender and message data using public-key encryption.

Packet


Unit of data that is routed between an origin and a destination on the Internet or any other packet switching network. When any file ( e-mail message, Resource Locator request, and so forth) is sent from one place to another on the Internet.

Mailing list


for Internet users to keep up with topics they're interested in. Many software producers and other vendors are now using them as a way to keep in touch with customers.

instant messaging


  1. The transmission of an electronic message over a computer network using software that immediately displays the message in a window on the screen of the recipient.

e-mail address


the address to which the email is sent. For a sender each (outgoing) email should identify the sender's email address (to allow for replies).

e-mail


A system for sending and receiving messages electronically over a computer network, as between personal computers.


Distribution List


a database containing an ordered array of items ; names or topics.

Attachment


A file attached to an email message as an enclosure. It sends as a duplicate of the original file, and is a superior alternative to faxing.

Archiving


A file containing one or more files in compressed format for more efficient storage and transfer.

Address Book


A feature of e-mail systems is the ability to create personal and corporate address books, perhaps importing them from other applications, for use in addressing outgoing mail.

Sunday, February 13, 2011

Wireless LAN


links two or more devices using some wireless distribution method as well as providing a connection through an access point to the wider internet.

Wireless Internet Service Providers (WISPs)


networks built around wireless networking

Wimax


A communications technology that uses radio spectrum to transmit tens of megabits per second in bandwidth between digital devices such as laptop computers.

wide area network (WAN)


is a computer network that covers a broad area.

T-1 line


High-speed digital connection that transmits data at 1.5 million bits per second through the telephone-switching network.


server operating systems


networking features such as Internet Connection Sharing (ICS). Some operating system software (such as Windows 98, Second Edition, and later versions)

Server


a computer that provides services used by other computers. For example a web server serves up web pages.

Router


a device that connects two networks - frequently over large distances. It understands one or more network protocols. A Router accepts packets on at least two network interfaces, and forwards packets from one interface to another.

public switched telephone network (PSTN)


It consists of telephone lines, microwave transmission links, cellular networks, and undersea telephone cables all inter-connected by switching centers which allows any telephone in the world to communicate with any other.

Proxy Server


a computer network service which allows clients to make indirect network connections to other network services. A client connects to the proxy server, then requests a connection, file, or other resource available on a different server.

peer-peer network


computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server.

Node


an be a computer or some other device, such as a printer. Every node has a unique network address.

local area conector


A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office or building.


Intranet


computer network that can be accessed only by authorized persons, especially members or employees of the organization that owns it.


Saturday, February 12, 2011

internet


the single worldwide computer network that interconnects other computer networks, on which end-user services, such as World Wide Web sites or data archives, are located, enabling data and other information to be exchanged.