Digital vs. Analog - Answersdigital reads a series of ones and zeros, while analog reads a continuous
flow of data.
Lossy - AnswersDescribes a method of compression in which data is lost in a way that cannot be
recovered from the compressed data.
Lossless Compression - Answersa data compression algorithm that allows the original data to be
perfectly reconstructed from the compressed data.
pixel interpolation - AnswersA process that is used by graphics software to average the color of
adjacent pixels in an image, usually when the image is enlarged.
Data vs. Information - AnswersData = raw facts and figures. Information = meaningful interpretation
of data.
Bitmap vs. Vector Graphics - AnswersBitmap Graphics: an image, such as a digital photo, that is stored
as a grid work of colored dots.
Vector Graphics: an image generated from descriptions that specify the position, length, and direction
in which lines and shapes are drawn
3D graphics - AnswersA digital graphics format that displays a three-dimensional image in a two-
dimensional space.
Vectors - AnswersLines and curves that form simple shapes
rendering - AnswersIn graphics software, the process of creating a 3D solid image by covering a
wireframe drawing and applying computer-generated highlights and shadows
Ray tracing - AnswersThe technique for adding light and shadows to a 3-D image
Application - AnswersComputer programs that help users perform a specific task such as word
processing. Also called application programs, applications, or programs.
Operating System - AnswersThe software that controls the computer's use of its hardware resources,
such as memory and disk storage space. Also called an OS.
Magnetic Storage - AnswersA technology for recording data onto disks or tape by magnetizing
particles of an oxide-based surface coating.
Optical Storage - AnswersA technology that records data as light and dark spots on a CD, DVD, or
other optical media
Solid state storage - AnswersA technology that records data and stores it in a microscopic grid of cells
on a nonvolatile, erasable, low-power chip
Cloud Storage - AnswersA storage area that is located on a remote server, usually on the Internet,
rather than on a local storage device
ALU - Answers(Arithmetic Logic Unit) The part of the CPU that performs arithmetic and logical
operations on the numbers stored in its registers
Control Unit - AnswersThe part of the microprocessor that directs and coordinates processing.
RAM vs ROM - AnswersRAM - RANDOM ACCESS MEMORY
-is volatile; lose power, it forgets
-stores programs from the HD for the CPU to work w/in the present
-comes in many sizes, types, speeds
-a mobo can have only 1 size/type but many speeds
ROM - READ ONLY MEMORY
-stores info about how the computer works
-It is not volatile; does not forget w/o power
serial processing - AnswersProcessing data one instruction at a time, completing one instruction
before beginning another
pipelining processing - AnswersA technology that allows a processor to begin executing an instruction
before completing the previous instruction.
parallel processing - AnswersThe simultaneous use of more than one processor to execute a program.
TCP - AnswersThe protocol within TCP/IP that is responsible for establishing a data connection
between two hosts and breaking data into packets.
IP - AnswersOne of the main protocols of TCP/IP; responsible for addressing packets so that they can
be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.
HTML Tags - AnswersA set of instructions, such as <B>, inserted into an HTML document to provide
formatting and display information to a Web browser.
, HTML5 - AnswersIt is the fifth and current version of the HTML standard, can be used as an
alternative to Flash media
Circuit Switching - AnswersThe method used by the telephone network to temporarily connect one
telephone with another for the duration of a call.
LAN - AnswersLocal area networks are often referred to as LANs. They are designed to provide
connectivity for devices within a limited area, typically within the premises of a home, office building,
business, or school.
Packet Switching - AnswersOccurs when the sending computer divides a message into a number of
efficiently sized units called packets, each of which contains the address of the destination computer
HTTP - AnswersThe communications protocol used to transmit Web pages
HTTPS - Answers(Hypertext Transfer Protocol Secure) The protocol used to create secure connections
for ecommerce by adding a layer of encryption
Client-side scripting - AnswersProgram code that is executed by a client's browser, as opposed to
being executed by the server
Server-side scripting - AnswersA Web page response approach in which programs running on the Web
server create Web pages before sending them back to the requesting Web clients as parts of response
messages.
Hypertext links - AnswersAlso referred to simply as links; words, phrases, or images on a Web page
that, when clicked, take you to designated URLs.
Web crawler - AnswersCombs the Web to gather data that's representative of the contents of Web
pages
Indexer - AnswersProcesses the information gathered by the crawler into a list of keywords and URLs
stored in a database
Database - AnswersStores billions of index references to Web pages
Query Processor - Answers• Allows you to access the database by entering search terms, and then
produces a list of Web pages that contain content relevant to your query
SMPT - Answersa communications protocol used to send e-mail across a network or the Internet
POP3 - Answersa standard for retrieving e-mail messages from an email server; deletes messages
from the server after they are downloaded
Copyright - Answersa form of legal protection that grants the author of an original work an exclusive
right to copy, distribute, and sell
Trademark - Answersany word, name, symbol, or design used in commerce to identify and distinguish
the goods of one company from those of another
Metadata tag - Answersa keyword that describes information, such as the content of a media element
Buffer - AnswersMemory that is temporarily used to store input or other data until the processor is
ready to use it.
memory leak - AnswersAn undesirable state in which a program requests memory but never releases
it, which can eventually prevent other programs from running
File Shredder - AnswersSoftware designed to overwrite sectors of a disk with a random series of 1s
and 0s to ensure deletion of data.
Database software - AnswersSoftware designed for entering, finding, organizing, updating, and
reporting information stored in a database.
Spyware - AnswersAny software that covertly gathers user information without the user's knowledge,
usually for advertising purposes.
Botnet - AnswersA group of bots under the remote control of a botmaster, used to distribute spam
and denial-of-service attacks.
Worm - Answerscomputer worm -A software program designed to enter a computer system, usually a
network, through security "holes" and then replicate itself and spread to other devices.
Virus - AnswersA program designed to attach itself to a file, reproduce, destroy data, display an
irritating message, or otherwise disrupt computer operations.
Port Scan - AnswersAn exploit used by hackers to locate computer ports that can be used for
surreptitious access; also called a port probe.
Trojan - AnswersA computer program that appears to perform one function while actually doing
something else, such as inserting a virus into a computer system or stealing a password.
Firewall - AnswersSoftware or hardware designed to analyze and control incoming and outgoing
packets on a network; used to enhance security by filtering out potential intrusion attempts.