Download presentation
Presentation is loading. Please wait.
Published byMargaretMargaret Boyd Modified over 8 years ago
1
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen Monday 5/23 – 1 st, 3 rd Tuesday 5/24 – 2 nd
2
Hardware/Software CPU: the “brains” of the computer I/O ports: connect input and output devices to the computer Motherboard: a printed circuit board that is the foundation of a computer; the main circuit board
3
Hardware/Software Hard drive: a device used to permanently store and also retrieve information Monitor: a display screen for video images and the case that holds it Peripheral: Hardware that allows a computer to perform additional functions but is not necessary for the computer to work
4
Hardware/Software Operating system: Enables the computer hardware to communicate with the computer software Application software: programs that run on your computer – some examples are web browsers, email, games
5
Hardware/Software Hardware: any physical device used in or with your machine Software: collection of code installed on your computer’s hard drive
6
Hardware/Software Input: receiving information Processing: handling and managing data Storage: saving data and info for later use Output: providing user with information
7
Hardware/Software Crash: when a program or the entire operating system unexpectedly stops working Boot: to power up a computer and load the system software Reboot: the process of a computer system restarting
8
Hardware/Software File: stores data, information, settings or commands Browser: software created to present and explore content on the Internet
9
Hardware/Software Cookies: information that a website puts on your hard drive so it can remember something about you at a later date provides a way for the website to recognize you and keep track of your preferences
10
Hardware/Software Bandwidth: the amount of digital data that can be transmitted over a computer network, or another communication device, at any given time Backup: to copy data as a security measure
11
Hardware/Software Firewall A security gate for your computer Analyzes incoming data and allows certain information to pass through if that information is safe
12
Hardware/Software Captcha: technology used to insure that a human is making an online transaction rather than a computer Keyword: a word used in a text search on a browser Network: a system that transmits any combination of voice, video or data between users
13
Hardware/Software Server: a computer or device on a network that manages network resources Flash drive: small data storage device that connects to a computer’s I/O port Mobile device: portable electronic product that performs computer-like tasks
14
Hardware/Software Cloud computing: storing and accessing data and programs over the Internet instead of your computer’s hard drive Laptop: portable computer you can take with you and use in different environments; includes a screen, keyboard and trackpad
15
Hardware/Software Tablet: wireless, portable personal computer with a touchscreen surface; typically smaller than a notebook but larger than a smartphone Google drive: example of cloud-based computing
16
Cybersecurity Malware: software designed specifically to damage or disrupt a system Virus: a program or piece of code that attacks a computer or network through contaminated data Trojan: a destructive program that masquerades as a harmless application
17
Cybersecurity Spyware: software that secretly gathers user information through the user’s Internet connection without his or her knowledge Adware: software that is given to the user with advertisements hidden in the application Identity theft: the act of a person obtaining information illegally about someone else
18
Cybersecurity Antivirus software: computer programs that can block, detect, and remove viruses and other malware Encryption: the process of using codes to make readable information unreadable Spam: unsolicited emails sent to many addresses
19
Cybersecurity Ways to avoid becoming a victim of identity theft Shopping only secure sites Protecting PINs and passwords Using an alternate identity for web surfing
20
Cybersecurity Downloading apps can compromise your computer or electronic device’s security. It’s important to update your security automatically because ways to attack your computer are constantly being developed.
21
Cybersecurity Ways to keep a “clean machine”: Installing the latest Security software Web browser Operating system
22
Cybersecurity No system is completely secure. In order to protect your files the most important step would be to back up files to an external location.
23
Communication Stores and restaurants are NOT the main places where customer service is important. You CAN learn to give good customer service even if you’re not a “people person”.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.