Presentation is loading. Please wait.

Presentation is loading. Please wait.

Section II Terms Emily Stepp.

Similar presentations


Presentation on theme: "Section II Terms Emily Stepp."— Presentation transcript:

1 Section II Terms Emily Stepp

2 Software System software- helps the computer carry out its basic operating tasks. It manages the fundamental operations of your computer, such as loading programs and data into memory, executing programs, saving data to disks, displaying information on the monitor, and transmitting data through a port to a peripheral device. Graphics software- allows you create illustrations, diagrams, graphs, and charts. Examples of these would be Microsoft Paint and Adobe Illustrator CS6. Spreadsheet software- a numerical analysis tool that both businesses and individuals use extensively. The spreadsheet software creates the worksheet composed of grids and columns. Cell- the intersection of a column and a row on a spreadsheet.

3 Software Information management software- allow people to keep track of their schedules, appointments, contacts, and to-do lists. Some information software allow you to synchronize information between a handheld device such as a smartphone and a desktop or notebook computer. Spyware- some software programs contain this. This tracks a computer user’s Internet usage and sends the data back to the company or person who created it.

4 Security Threats Firewall- can be either a hardware or software that prevents another computer’s malware from accessing. Spoofed site- a website set up to look exactly like another website, such as a bank’s website. This site attempts to convince customers of the real site to enter personal information, such as credit card numbers, social security numbers, and passwords, so that the thief collecting the information can use it to steal the customer’s money or identity. Phishing- is the practice of sending messages to customers or potential customers of a legitimate website asking them to click a link in the message. The link leads to a spoofed site where the user is asked to verify personal information. Strong password- consists of at least eight characters of upper and lowercase letters and numbers. Avoid using common personal information, such as birthdays and addresses.

5 Internet World Wide Web (web)- a huge collection of information stored on the network servers around the world. Broadband connection- high-speed connection to the Internet. DSL (digital subscriber line)- to use a high-speed connection over phone lines to connect to the Internet.

6 Storage Optical storage device- polycarbonate discs coated with a reflective metal on which data is recorded as a trial of tiny pits or dark spots on the surface of the disc. Examples; CDs and DVDs DVD+R, DVD-R – the two formats that recordable DVDs come in. DVD+RW, DVD-RW – the format that re- recordable DVDs come in.

7 Storage Flash memory- is similar to ROM except that it can be written to more than once. USB flash storage device- flash memory. Example; flash drive. functions as a portable hard drive. USB flash drives are touted as being easy-to-use as they are small enough to be carried in a pocket and can plug into any computer with a USB drive. USB flash drives have less storage capacity than an external hard drive, but they are smaller and more durable because they do not contain any internal moving parts.

8 Memory Read-only memory (ROM)- a chip on the motherboard prerecorded with instructions the computer uses to check its components to ensure they are working, and to activate the software that provides the computer’s basic functionality when you turn it on. Computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read.

9 Data Communications Bluetooth- use short-range radio waves to connect one device to another.


Download ppt "Section II Terms Emily Stepp."

Similar presentations


Ads by Google