CT Competency Definitions
Download
Report
Transcript CT Competency Definitions
Computer Technology
Competency Terms
and Definitions
M. Guymon – Pleasant Grove High – Spring 2004
Acceptable Use
Policies
Used to protect a network and the users on that network and
provide guidelines to how a network can and should be used
Application Software
Set of computer programs that help a person carry out a task.
Binary Numbers
A method for representing numbers using only two digits, 0
and 1.
Bit
Byte
Each 0 or 1.
8 bits
Boot Process
Sequence of events that occurs between the time you turn on
a computer and the time that it becomes ready to accept
commands.
Boot Sector Virus
Infects the system files that your computer uses every time it
is turned on
Boolean Connector
Tell a computer how concepts relate to each other. By using
them you can broaden or narrow your search
(and, or, not, etc.).
M. Guymon – Pleasant Grove High – Spring 2004
CD-Rom
Storage device that uses laser technology to read data that is
permanently stored on compact disks, cannot be used to write
data to a disk.
Circuits
The path from one component of a computer to another that
data uses to travel.
Client
Refers to the software on a computer that allows the user to
access the server
Computer
A device that accepts input, processes data, stores data, and
produces output, all according to a series of stored
instructions.
Computer Virus
Set of program instructions that attaches itself to a file,
reproduces itself, and/or spreads to other files
Copyrights
A form of legal protection that grants certain exclusive rights
to the author of a program
CPU
Where the processing in a computer takes place, often called
the brain of the computer.
M. Guymon – Pleasant Grove High – Spring 2004
Data
Refers to the symbols that represent facts, objects, or ideas.
Desktop Computer
Microcomputer that fits on a desk and runs on power from a
wall outlet
Digital Audio Tape
Method of storing large amounts of data on tape using helical
scan technology to write data at high densities across the tape
at an angle.
E-Mail
Sending an electronic message to another person or to a group
of people
Ethics
The rules or standards governing the conduct of a person or
the members of a profession
File
A named collection of data that exists on a storage medium.
File Virus
Virus that attaches to an application program
M. Guymon – Pleasant Grove High – Spring 2004
Floppy Disk
Round piece of flexible Mylar plastic covered with a thin
layer of magnetic oxide and sealed inside a protective
covering.
Folders
The subdirectory or subdivision, of a directory that can
contain files or other folders.
Gigabyte
Approximately 1 billion bytes.
GUI
A type of user interface that features on-screen objects, such
as menus and icons, manipulated by a mouse.
Handheld
A computer that fits into a pocket, runs on batteries, and is
used while holding the unit in your hand.
Hard Disk
Usually mounted inside the computer’s system unit and can
store billions of characters of data.
Hardware
Includes the electronic and mechanical devices that process
the data; refers to the computer as well as peripheral devices.
M. Guymon – Pleasant Grove High – Spring 2004
Information
The results of the computer storing data as bits and bytes; the
words, numbers, sounds, and graphics.
Input
Whatever is put into a computer system.
Input Devices
Units that gather information and transform that information
it into a series of electronic signals for the computer.
IP Address
A unique identifying number assigned to each computer
connected to the internet
Keyboard
An arrangement of letters, numbers, and special function keys
that act as the primary input device to the computer.
Kilobyte
Approximately 1,000 bytes.
LAN
Computer network that is located within a limited
geographical area, such as a school or small business
M. Guymon – Pleasant Grove High – Spring 2004
Laptop Computer
A portable, compact computer that can run on an electrical
wall outlet or a battery unit.
Logic Bomb
Watches for a specific set of input to activate the virus
Macro Virus
A virus that affects a miniature program that usually contains
legitimate instructions to automate a document or task
Magnetic Storage
Recording of data onto disks or tape by magnetizing particles
of an oxide based surface coating.
Mainframe
Large expensive computer capable of simultaneously
processing data for hundreds or thousands of users.
Megabyte
Approximately 1 million bytes.
Megahertz
A measurement used to describe the speed of the system
clock.
M. Guymon – Pleasant Grove High – Spring 2004
Memory
Area of the computer that temporarily holds data waiting to
be processed, stored, or output.
Microcomputer
A personal computer; designed to meet the computer needs of
an individual
Modem
Device that sends and receives data to and from computers
over telephone lines.
Monitor
Display device that forms an image by converting electrical
signals from the computer into points of colored light on the
screen.
Mouse
An input device that allows the user to manipulate objects on
the screen by moving the mouse along the surface of a desk.
Multi-tasking
Running more than one program at a time or making sure that the
instructions and data from one area of memory don’t interfere with
memory allocated for other programs.
Network
Two or more computers and other devices that are connected,
for the purpose of sharing data and programs.
M. Guymon – Pleasant Grove High – Spring 2004
Operating System
Master controller for all activities that take place within a
computer; primary purpose is to help the computer system
monitor itself in order to function efficiently.
Optical Storage
Means of recording data as light and dark spots on CD or
DVD with the use of a low-power laser light.
Output devices
Devices that display, print, or transmit the results of
processing from the computer’s memory.
Pentium
Name of the CPU; 5th generation of the Intel processor.
Peripheral devices
Used to expand the computer’s input, output and storage
capabilities.
Platform
Underlying hardware and software of the computer system.
Printer
Output device that produces text or graphical images on
paper.
M. Guymon – Pleasant Grove High – Spring 2004
Processing
Manipulation of the data in many ways.
Program
Set of detailed, step-by-step instructions that tell a computer
how to solve a problem or carry out a task.
RAM
The ability of a storage device to go directly to a specific
storage location without having to search sequentially from a
beginning location.
Resolution
The density of the grid used to display or print text and
graphics; the greater the horizontal and vertical density,
the higher the resolution.
ROM
Drives can read data from disks, but cannot store new data on
them.
Server
A computer that has the purpose of supplying its users with
data; usually through the use of a LAN (local area network).
Silicon Chips
Melted sand; what the circuits are embedded into to keep
them together.
M. Guymon – Pleasant Grove High – Spring 2004
Software
A computer program that tells the computer how to perform
particular tasks.
Software Licenses
A legal contract that defines the ways in which you may use a
computer program
Sound Card
A circuit board that gives the computer the ability to accept
audio input, play sound files, and produce audio output
through speakers or headphones.
Storage
Area of the computer that holds data on a permanent
basis when it is not immediately needed for processing.
Storage devices
Used to keep data when the power to the computer is turned
off.
Supercomputer
A computer that was the fastest in the world at the time it was
constructed.
System Unit
Case that holds the power supply, storage devices, and the
circuit boards (including the motherboard).
M. Guymon – Pleasant Grove High – Spring 2004
Terabyte
Approximately 1 trillion bytes.
Time Bomb
Watches for the PC clock to reach a certain date to activate
the virus
Trojan Horse
Computer program that seems to perform one function while
actually doing something else
WAN
Interconnected group of computers and peripherals that cover
a large geographical area, such as multiple buildings
Workstation
Powerful desktop computer designed for specialized tasks.
Worm
Software program designed to enter a computer system
usually through a network, through security holes and then
replicate itself
M. Guymon – Pleasant Grove High – Spring 2004