Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
38 Cards in this Set
- Front
- Back
Plagarism |
Taking credit for someone else's intellectual property, typically a written idea, by claiming it as your own.
|
|
DMCA |
The Digital Millennium Copyright Act is a U.S. copyright law designed to reduce illegal digital media copying by criminalizing the production, distribution, and use of technologies designed to circumvent DRM technologies.
|
|
Piracy |
The illegal copying, use, and distribution of digital intellectual property, such as software, music, and movies.
|
|
Security Threats |
Data-entry errors, Errors in programming, Mishandling output, Uninformed dangerous activity, Improper installation/setup |
|
Privacy |
Being free from intrusion-the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself.
|
|
Security |
The protection of information systems and the information they manage against unauthorized access, use, manipulation, or destruction, and against the denial of service to authorized users.
|
|
Intellectual Property |
A product of the mind or intellect over which the owner holds legal entitlement.
|
|
Fair Use |
The doctrine that brief excerpts of copyright material may, under certain circumstances, be quoted verbatim for purposes such as criticism news reporting, teaching, and research, without the need for permission from or payment to the copyright holder.
|
|
1992 |
The World Wide Web was commercialized |
|
1969 |
The internet was founded |
|
Domain Name System (DNS) |
database of all domain names and IP addresses used on the internet |
|
Peer 2 Peer (P2P) |
a network architecture that does not utilize a central server but facilitates communication directly between clients with computers acting as both client and server.
|
|
Server |
A powerful computer that often utilizes many processors to provide services to many users simultaneously over a network.
|
|
Client |
a desktop computer or workstation that is capable of obtaining information and applications from a server.
|
|
ICANN |
The Internet Corporation for Assigned Names and Numbers
|
|
Data Center |
A climate-controlled building or set of buildings that house servers that store and deliver mission-critical information and services.
|
|
ISP |
Internet Service Provider |
|
Green Computing |
utilize environmentally conscious practices in the manufacturing and use of digital technologies.
|
|
What runs on roughly 82% of all computers? |
Microsoft |
|
Difference between mobile and computer applications |
None |
|
Programming Language |
Provides a set of symbols, commands, and rules (syntax) used to write program codes.
|
|
SSD |
Solid-State Drive |
|
ROM |
Read-Only Memory |
|
Operating System (OS) |
A set of computer programs that runs or controls the computer hardware, and acts as a user interface.
|
|
World Wide Web |
An application of the internet that uses a web browser.
|
|
RAM |
Random Accessing Memory |
|
CPU |
Central Processing Unit |
|
The Internet |
The world's largest public computer network, a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world.
|
|
Computers use __ to produce __. |
Input; Output |
|
The difference between MAC and Windows PC's |
None |
|
Types of PCs |
Desktop, Notebook, Tablet, Smartphone, Custom |
|
Personal Computer (PC) |
Any general-purpose computer designed to meet the many computing needs of one individual.
|
|
Digital Convergence |
Takes advantages of the fact that digitization standardizes all types of data to 1s and 0s to create devices that combine the functionality of several digital electronics devices.
|
|
Uses for Computer |
Computation, Automation, Communication, Entertainment, Managing Info |
|
Computer Literacy |
A functional understanding of the fundamentals of computers and their uses.
|
|
Ethical Dilemma |
The privacy concerns for the amount of data collected about individuals by businesses and governments; the risk of private data falling into the hands of hackers and criminals.
|
|
Digital Technology |
With digital electronics allow us to manipulate all types of information as digits (1s and 0s) in order to store and manage the information more efficiently and effectively.
|
|
Cloud Computing |
computing resources including storage, processing, applications, and network services that are remotely located and accessed using a network (often the internet)
|