click below
click below
Normal Size Small Size show me how
MTH Assessment 1
MTH Tier 1 Assessment
Question | Answer |
---|---|
What are the physical pieces of the computer and the peripherals connected to it called? | Hardware |
Portable computer that you can take with you and use in different environments | Laptop |
A computer that is designed to stay in a single location; powered from an internal battery and therefore must remain connected to a wall outlet. | Desktop Computer |
A programmable machine; it can execute a programmed list of instructions and respond to new instructions that it is given. | Computer |
A mobile phone that includes advanced functionality beyond making phone calls and sending text messages; they have the capability to display photos, play videos, check and send e-mail, and surf the Web. | Smartphone |
A portable computer that uses a touchscreen as its primary input device; slightly smaller and weigh less than the average laptop; most only offer touchscreen input | Tablet |
A.K.A. computer programs or applications, scripts, and instruction sets all fall under the category of computer software | Software |
Turn the computer on | Boot |
They write codes for software programs. | Programmers |
Central Processing Unit; Stands for "Central Processing Unit;" the brain of your computer; processes basic instructions to complex functions; can be referred to simply as the "processor." | C.P.U. |
The main circuit board of your computer and is also known as the mainboard or logic board | Motherboard |
Random Access Memory; like short-term memory in the human brain; for storing active programs and system processes | R.A.M. |
One of the primary input devices used with a computer; design comes from the original typewriter QWERTY design keyboards | Keyboard |
one of the primary input devices used with a computer; have at least one button, though most mice have two or three | Mouse |
Modulator/Demodulator; A modem is a communications device that can be either internal or external to your computer. It allows one computer to connect another computer and transfer data over telephone lines. | Modem |
A hardware device that routes data from a local area network (LAN) to another network connection. | Router |
Small programs or scripts that can negatively affect the health of your computer. These malicious little programs can create files, move files, erase files, consume your computer's memory, and cause your computer not to function correctly | Virus |
A computer that provides data to other computers on a local area network (LAN) or a wide area network (WAN) over the Internet; including web servers, mail servers, and file servers | Server |
Software that you can use on a trial basis before paying for it; often has limited functionality or may only be used for a limited time before requiring payment and registration | Shareware |
Software you can download, pass around, and distribute without any initial payment. However, the great part about freeware is that you never have to pay for it. No 30 day limit, no demo versions, no disabled features -- it's totally free. | Freeware |
The desktop is the primary user interface of a computer. When you boot up your computer, the desktop is displayed once the startup process is complete. | Desktop |
Represents an object or a program on your hard drive | Icon |
An"OS," is software that communicates with the hardware and allows other programs to run; comprised of system software, or the fundamental files your computer needs to boot up and function. | Operating System |
A.K.A. device driver; enables a specific hardware device to work with a computer's operating system. Drivers may be required for internal components, such as printers | Driver |
A Web browser, often just called a "browser," is a program people use to access the World Wide Web. It interprets HTML code including text, images, hypertext links, Javascript, and Java applets; then displays a nicely formatted page | Browser |
A type of utility used for scanning and removing viruses from your computer | Antivirus |
"Graphical User Interface," and is pronounced "gooey." It refers to the graphical interface of a computer that allows users to click and drag objects with a mouse instead of entering text at a command line. | G.U.I. |
Limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users. | Firewall |
software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer | Trojan Horse |
A series of operating systems developed by Microsoft. Each version of Windows includes a graphical user interface, with a desktop that allows users to view files and folders in windows; most widely used operating system for personal computers PCs | Windows |
Tunnels through your computer's memory and hard drive; type of virus that replicates itself, but does not alter any files on your machine. worms can still cause havoc by multiplying so many times that they take up all memory. | Worm |
A any external device that provides input and output for the computer | Peripheral |
A display that also serves as an input device; a proprietary pen is used for input but most touchscreens detect human touch | Touchscreen |
Radio-frequency identification; the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. | RFID |
Portable Document Format is a file format used to represent documents in a manner independent of application software, hardware, and operating systems | |
Software that allows remote control and it is often used when it is difficult or impractical to be physically near a system in order to use it. | Remote Login |
overriding the software limitations on the iPhone, iPod Touch, or iPad designed to preclude the use of applications beyond control from the device's manufacturer | Jailbreaking |
is a process allowing users of smartphones, tablets, and other devices running the Android operating system to attain privileged control (known as "root access"); often performed with the goal of overcoming limitations that carriers and hardware | Rooting |