click below
click below
Normal Size Small Size show me how
IT Fundamentals
| Question | Answer |
|---|---|
| video card | A circuit board used to manage the display on the monitor. (Ex. Nvidia, Geforce) |
| sound card | A circuit board that receives sound in digital form and reproduces it through speakers. |
| peripheral devices | The external input or output devices that are used to communicate with a computer. (Ex. mouse, keyboard, scanner, monitor, printer) |
| router | A device that sends packets of data from one LAN (local area network) to another network. |
| modem | A device that is used to transmit data from a computer through phone lines or a cable. |
| hard drive | A device that stores all software and files on your computer; reads and writes data onto a spinning magnetic or optical disk. |
| CD ROM drive | A device that writes data onto or reads data from a CD |
| Floppy Drive | A disk drive that can read and write to floppy disks. |
| USB Port | A place on a computer where a USB cable is plugged |
| inkjet printer | A common type of printer that sprays ionized drops of ink onto paper |
| expansion slots | Places on the motherboard where additional cards can be plugged in; mostly used to expand RAM |
| LAN | Also known as a Local Area Network, this is a network of computers in a single location |
| WAN | Also known as a Wide Area Network, this is a collection of LANs across a large area |
| software | The set of instructions executed by a computer. (Ex. MS Word and Windows 10.) |
| power supply | Provides electricity to turn on and operate your computer. |
| Wi-Fi | Also known as wireless fidelity, this technology allows a wireless card to send a signal to a wireless router without physical cables |
| hardware | The physical components that make up a computer system. (Ex. motherboard, hard drive, etc.) |
| motherboard | The main circuit board of your computer; holds the RAM, CPU, video card, etc. |
| server | The computer that manages access to resources on a network |
| laser printer | This device is used to capture your live movements in real time to broadcast online |
| CPU | The primary data processing component of a computer; also known as the Central Processing Unit |
| computer fan | This is used to cool the CPU (processor). |
| RAM | Also known as random-access memory, this temporarily stores information while you work on your computer |
| monitor | A device that receives signals from a computer and displays them onto a screen |
| mouse | A hand-controlled electronic device used to manipulate the cursor on your computer screen; used for pointing, clicking and dragging |
| USB cable | The cable that connects peripheral devices to a computer through a universal serial bus port. |
| ethernet cable | A network cable that allows information to travel between wired devices. |
| USB drive, flash drive or thumb drive | A small, portable plug-n-play storage device used for storing files; plugs into a USB port; not large enough for hard drive backup |
| external hard drive | A portable plug-n-play device used for storage; used as hard drive backup; easily added/removed from a computer |
| printer | An output device that physically produces text and graphics; usually onto paper; (Ex. laser, inkjet) |
| scanner | An input device that produces a digital image file to be saved onto a computer |
| speakers | The output devices that produce audio from your computer. (Ex. voice, music) |
| computer software | The set of instructions executed by a computer. (Ex. MS Word, Windows 10) |
| word processor | The software used to create, edit and print text documents. (Ex. letters, tables, reports) |
| database | A software program that stores an organized collection of data on a computer. |
| operating system | Also known as an OS, this software communicates with your computer's hardware and executes all software programs on your computer |
| OSX | The latest Mac operating system |
| Microsoft Windows | The most widely used operating system for personal computers; provides a graphical user interface in which applications are displayed in resizable, movable windows on a screen. |
| computer virus | A computer program that secretly attaches to a document or program then executes when the document or program is opened. |
| malware | A malicious computer virus designed to damage a computer |
| Internet Service Provider | A company that provides internet service for a monthly fee. (Ex. Spectrum, DirectTV) |
| cloud computing | The use of web applications that allow you to create, save and play games online. No storage space is required on your computer. (Ex. Google Docs, Flickr and Xbox Live.) |
| Google Docs | A free, cloud-based word processor run by Google; allows you to create, edit and collaborate in real-time with other users |
| file server | deliver files to other computers |
| email server | sends and receives messages to email clients on a person's computer |
| print server | can manage one or more printers |
| network server | a computer that manages network traffic |
| USB stands for what | Universal Serial Bus |
| AC stands for | Alternating Current |
| DC stands for | Direct current |
| AC Adapter | a device that converts the power source from one current to another |
| When dd the HDMI cable make its appearance | 2003 |
| Why did the HDMI connection grow in popularity | It can handle both video and sound |
| motherboard | the computer's main circuit board made up of thin layers of copper and fiberglass and upon which everything else is connected. |
| What does RAM stand for | random access memory |
| What does the RAM do | it represents the short term memory in your computer. |
| What is the difference between the RAM and the Hard drive | the hard drive stores information for the long term, while the RAM is where short term information is held |
| ergonomics | encompasses the study of the efficiency of working conditions and then using that information to design a work place that is more effective for workers |
| ESD stands for what | Electrostatic Discharge |
| Bluetooth | a high speed, low-powered wireless link that is designed to connect phones and other wireless devices within a 30 foot radius |
| What does GUI stand for | graphical user interface |
| what is a graphical user interface (GUI) | lets you use your mouse to click icons, buttons, and menus, and everything is clearly displayed on the screen using a combination of graphics and text. |
| what is the most popular operating system in the world | Microsoft Windows |
| what does a closed source software do | does not allow the public to see or modify the code in any way |
| What is an example of closed source software | Microsoft Office |
| what does an Open-source software do | open to the public and programmers can read and change the code at any time if they choose to do so |
| what is a source code | the technical blueprint that tells a program how to function |
| Most operating systems we use are known as what? | A GUI |
| What is an application | software that allows you to complete certain tasks |
| This is known as the most important software that runs on a computer. Without it the computer is useless. | operating system |
| What lets you use the mouse to click icons, buttons, menus, and much more | Graphical User Interface |
| What are the two most common mobile operating systems? | Apple IOS and google android |
| What are the three most common operating systems | Windows, Mac OS X, and Linux |
| The operating system does not manage computer memory, processes, hardware, and software- true or false | False |
| When you are multitasking on a computer, what does that mean? | You have more than one application open and running |
| Mobile operating systems have fewer features than a normal computer operating system.- true or false | true |
| On a PC, if you are having application issues, what should you press | Ctrl + alt + delete |
| No matter what is causing the issue, troubleshooting will always be a process of trial and error.- true or false | True |
| If you are using the process of elimination to troubleshoot a printer, what is the first thing you should do? | Make sure the printer is plugged in and turned on. |
| What should you do if the power button will not start the computer? | Check the power cord to make sure you have power to the computer, Make sure the outlet is working or the surge protector is on, and If you have a laptop, check to make sure the battery has power |
| When an application is running slowly, what are some things you should do? | Close and open the application again and Check for updates |
| image application | .jpg |
| word processing application | .doc |
| audio application | .mp3 |
| video application | .mp4 |
| What does SOHO stand for | small office home office router |
| what is Bandwidth | the volume of information per unit that a transmission medium (your internet connection) can handle. |
| Dial-Up | the slowest type of Internet connection. this Internet connection uses your phone line |
| DSL | also uses a phone line but it does not require a traditional landline like the dial-up connection, so it can be more dependable. |
| Cable | connection has become more widespread and works by connecting the Internet using a broadband connection provided by a cable company. It can be faster than both dial-up and DSL service, but it is only available where cable TV is accessible. |
| Cellular | connections, also referred to as 3G and 4G, are connected wirelessly through your ISP’s network. These cellular connections are not always as fast as DSL or cable, but they are convenient since they can be accessed by your phone. |
| Step 1 for how to set up a router | Connect your router to your Internet modem using an Ethernet cable. |
| Step 2 for how to set up a router | Plug in the power cable for the wireless router |
| Step 3 for how to start a router | Wait a few seconds to ensure power is on. Usually, the router will have lights that come on when the power is working correctly. |
| Step 1 for how to configure a router | after your router has been plugged in and you have the power, you will need to enter the router’s default IP address into the address bar and press enter. |
| Step 2 for how to configure a router | Next, the router’s sign-in page will appear. Most routers will use some sort of standard user name and password combination. |
| Step 3 for how to configure a router | The settings page will appear. This is where you will select your unique network name and password. |
| Step 4 for how to configure a router | Locate and select the save button to save your settings. |
| Step 1 for how to connect a router | In your computer’s settings, locate the Wi-Fi connections section. Next, choose the "search" feature to locate a nearby Wi-Fi signal |
| Step 2 for how to connect a router | Choose your network and enter your unique password |
| Step 3 for how to connect a router | If your connection was successful, you will be able to open the web browser of your choice and begin surfing the net. |
| WEP | wired equivalent privacy |
| Why is WEP considered the weakest wireless encryption protocols | It is easily hackable |
| WPA | 2nd version of WEP and replaced it with better and strong networking |
| WPA2 | Replaced WPA and now is the most current in security protocol. |
| HTTP stands for what | HyperText Transfer Protocol |
| HTTPs stands for what | HyperText Transfer Protocol with secure sockets layer |
| What works in conjunction with a secure sockets layer to ensure that data is transported safely | HTTPs |
| hotspot | refers to using your cellular device and data to connect to the internet. |
| network socket | (an endpoint of a two-way communication link in a network) |
| FTP stands for what | File Transfer Protocol |
| what is FTP generally used for | moving information from the computer you are working on to the server where a website is hosted |
| FTPS | the s makes it so that it prioritizes security |
| SSL means | secure sockets layer |
| SSH means | Secure Shell |
| SFTP means | SSH File Transfer Protocol |
| What does SFTP do | uses one connection which will authenticate information and encrypt the data files at the same time. |
| P2P | Peer to Peer sharing |
| Why is P2P dangerous | IT is a lot easier to get hacked or open your computer up to potential viruses and malware |
| Local Storage | Refers to anything that is "onpremise" Ex: hard drive, flash drive, |
| Advantages of local storage | Speed, availability, cost per Gb, |
| Cons of local storage | Overall cost, risk of data loss |
| Cloud storage | when you access files and programs over an internet connection instead of on your computer’s hard drive. |
| Pros of Cloud storage | no risk of losing data, overall price, |
| Cons of Cloud storage | required connectivity, Bandwidth limitation |
| Hosted services | general term for technology services using infrastructure located outside the service receiver's physical location. This can be at the vendor's physical location or can be hosted on the cloud. |
| local printing setup | means that the printer is directly connected to a specific computer via a USB cable. |
| Pros of local printing setup | reliability, convenient location |
| Cons of local printing setup | cost |
| Networking printing setup | printing wirelessly |
| Pros to networking printer setup | flexibility |
| Cons to networking setup | if the internet goes down, so does your access to printing |
| email stands for what | electronic mail |
| Phishing | used to make an email look legitimate, but in fact it contains malicious links that will deliver malware to your computer |
| What is malware | any program or file that is harmful to a computer user |
| Adware | used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase. |
| Cookies | small files downloaded by some websites to store information such as login information, user preferences, and shopping cart information |
| Spyware | a form of malware that often goes undetected |
| how can you ed up with spyware | clicking on unsecured links, opening emails from unknown users, clicking on ads that contained malware |
| worm | a standalone malware computer programs that do not require a host program and will spread without any human interaction or directives from malware authors. |
| Ransomware | designed to infect a user’s system and encrypt their data. It can come across as emails from local "authorities" saying things like they had broken the law. |
| why is auto-fill so dangerous | of someone were to log into your account or you left your computer open, a person can use the auto-fill to get your information |
| cache | a space on your computer's hard drive or RAM where your browser saves copies of web pages you previously visited. |
| incognito search option | When using this type of search option, neither your cookies or history will be recorded. |
| real vs. fake websites | make sure that the page you go to has HTTPS. the S means there is an extra socket security layer |
| VoIp stands for what? | Voice over internet protocol |
| What VoIp used for | describing any kind of online phone service |
| What does it mean when something is stored in the cloud | it is stored on internet servers instead of directly onto your hard drive. |
| what is a web app | any cloud based application |
| gesture interaction | Anytime you use a device with a touch screen that allows you to zoom in or out with just a pinch of two fingers or swipe left or right to change screens |
| virtualization | uses software to create multiple “separated” images of the hardware and software on the same computer. |
| cloud computing | enables you to access a shared pool of computing resources (networks, servers, storage, applications, and services) through the internet that can provide for your individual needs without interrupting access for other people using the same resources |
| What is the main difference between cloud computing and virtualization | virtualization is software-based and the cloud is server-based. |