Professional Documents
Culture Documents
Review Sheet
Sources:
NJIT
Keyboard an input device that converts human typing into electrical signals readable
by the processor
Case, or System Unit holds the CPU, the memory chips, and the motherboard, along
CPU processor chip a tiny piece of silicon that contains millions of mini electrical
circuits
Expansion slots for expanding the PC’s capabilities; gives you places to plug in
Output hardware provides the user with the information they need
A peripheral device is any component that expands a computer’s input, storage, or output
capabilities.
Video card contains the processor’s output info into a video signal
Monitor display device that takes electrical signals from the video card and forms an
Modem device that sends and receives data over telephone lines, or wirelessly via a
Application software enables you to perform specific tasks – solve problems, perform
The bandwidth will determine the speed of your connection no matter how you connect
Bandwidth, or channel capacity, is an expression of how much data can be sent through a
Dial up modems usually used in rural areas, where broadband connections are not
always available
Narrowband low band width
Modem device that sends and receives data over telephone lines to and from
computers
High speed connections are prevalent; dial-up connections are becoming obsolete
DSL digital subscriber line uses regular phone lines, a DSL modem, and special
Cable connections can be faster than DSL and are more popular in the US
Protocol a set of rules that computers must follow to transmit data electronically.
The protocol that enables all computers to use data transmitted on the internet is called
TCP/IP
IP Address uniquely identifies every computer and device connected to the internet
Sampling rate the number of times that a song is measured (sampled) and converted to
a digital value
5 types of computers
o Supercomputers
o Mainframe Computers
o Workstations
o Microcomputers
COMPUTERS.
Progression:
Recent trend in computing using more parallel processing rather than shrinking things
o Spatial locality instructions closely following the current instruction will likely
be performed soon
o Data and instructions likely to be used again soon kept in the cache, rather than
Binary
o Base of 2
Decimal
o Base of 10
Hexadecimal
o Base 16
Character Codes
o ASCII each character is represented by one byte and the first bit is always 0
o ANSI (or extended ASCII) Each character is represented by one byte, first bit
may be either 0 or 1
Error Checking
bit is odd
Application Software comprises the programs that do the work that users are directly
interested in
Software License you sign a contract in which you agree not to make copies of the software to
Site Licenses allow the software to be used on all computers at a specific location
Multiple-user license specifies the number of people who may use the software
anyone at will
Color Depth aka bit depth, the number of bits stored in a dot
1. Machine Language
2. Assembly Language
5. Natural Languages
SOME LANGUAGES AND FACTS ABOUT EACH:
C++ enhancement of C
1. In OOP, data and instructions for processing that data that are combined into a self-
Application Software
Types of Data
Documents
Worksheets
Databases
Advantages
Disadvantages
Layer 5 Application
Layer 4 Transport
Layer 3 Network
Layer 2 Data Link
Layer 1 Physical
Sending
Lower Layer
1. ISP
2. A means of connection
3. An access device
Fault tolerance the ability to continue in operation after a fault has occurred
2 Principal Structures of Networks
1. Client/Sever
2. Peer-to-Peer all computers are equal; they directly communicate with one another
Request reply
Time
3 Tier Architecture
Client
Mid-tier service
Back-end service
Application Data
Processing Management
Dumb terminal or Video Display Terminal has a display screen and a keyboard and
and keyboard
Keyboard + Mouse
Breaking codes
Forecasting weather
1. Web Protocol
T1
Which protocol is used to retrieve email messages from the server to your computer?
ISPs that don’t run their own backbones connect to an Internet backbone through a(n):
The sending of a phony email that pretends to be from a credit-card company or bank, luring you
Phishing
OES
Which of the following refers to the execution of two or more programs by one user almost at the
Multitasking
Which type of software can you download and duplicate without any restrictions whatsoever and
Shareware
ASCII
Mouse
Which of the following display standards has the highest screen resolution?
QXGA
A device with a microchip that contains code numbers that can be read by a radio scanner’s radio
waves is a(n)
RFID Tag
Which of these best describes the regular telephone line that is used in most homes today?
Star network
How do fiber-optic cables transmit data?
NOT XML
Smartphones have:
a) A microprocessor
b) A display screen
c) Memory
d) A modem
e) All of these
Loud conversations and ringtones can irritate people in the user’s vicinity
The operating system is part of the system software.
SMTP is used for sending email, POP3 is used for retrieving email.
Radio buttons are NOT used for listening to radio stations on the internet.
text from images (pics of text) to an editable text format (usually ASCII) that can be
Trojan horse – a subclass of virus program that pretends to be a useful program, such
Using encryption to alter readable data into unreadable form can prevent
o If you shoot mainly 4 * 6’s and rarely crop pictures, most cameras that have 7
Programming errors caused by incorrect use of control structures are called LOGIC
ERRORS
o Preliminary investigation
o Systems analysis
o Systems designs
o Systems development
o Systems implementation
o Systems maintenance