Virtual SC IT Fundamentals Final
Exam Study Guide
CPU - -part of computer that is the primary data processing component -Microsoft Windows - -most widely used operating system for personal computers -Hard Drive - -stores all software and files on the computer -Database - -software that stores organized data -Software - -tells hardware what to do -file extension - -3 or 4 letters at the end of a file name after a period; tells characteristics and use of the file -Bandwidth - -amount of data that can be sent over a certain time period -Peer to peer - -2 or more PC's connected that share resources -"S" at the end of the web address - -website is secure -backup files - -copying files so they don't get erased or deleted -Types of Internet Connection - -Cellular
DSL
Cable
Dial Up (slowest) -Computer Virus - -a harmful computer program; installed without your permission -worm - -can replicate and spread without the user doing anything -Phishing - -done through email; looks like a real email; has malicious links to malware -Telepresence - -two way communication and collaboration tool that allows users to feel like they are in the same room -Virtualization - -makes cloud computing work -Cloud Computing - -delivery of shared resources through the Internet
Exam Study Guide
CPU - -part of computer that is the primary data processing component -Microsoft Windows - -most widely used operating system for personal computers -Hard Drive - -stores all software and files on the computer -Database - -software that stores organized data -Software - -tells hardware what to do -file extension - -3 or 4 letters at the end of a file name after a period; tells characteristics and use of the file -Bandwidth - -amount of data that can be sent over a certain time period -Peer to peer - -2 or more PC's connected that share resources -"S" at the end of the web address - -website is secure -backup files - -copying files so they don't get erased or deleted -Types of Internet Connection - -Cellular
DSL
Cable
Dial Up (slowest) -Computer Virus - -a harmful computer program; installed without your permission -worm - -can replicate and spread without the user doing anything -Phishing - -done through email; looks like a real email; has malicious links to malware -Telepresence - -two way communication and collaboration tool that allows users to feel like they are in the same room -Virtualization - -makes cloud computing work -Cloud Computing - -delivery of shared resources through the Internet