1,135
24
Essay, 4 pages (900 words)

Intro to computer science chapter 5&6

The . mobi TLD used by sites that are optimized for mobile devices. True

The world-wide database of domain names corresponding IP addresses is called the Doman Name System. True

Servers that host part of the Domain Name System are called domain name servers, or DNS servers. True

File-sharing sites like Youtube and Flickr let you post and share photos, music, and other media. True

Sites that let you access your email account from public computers like the ones in the library are called file-sharing sites. False

Some sites on the internet have the same IP address. False

banner adAn advertisement that is typically embedded at the top of a Web page.

animationDisplaying a sequence of still images to create illusion of motion

helper applicationSoftware that you need to download , such as an add-on, a plug-in , or a player.

vectorGraphics that uses mathematical formulas instead of pixels and maintain the same quality on all screens.

scriptA series of program instructions embedded directly into HTML code for a web page , used to make a Web page interactive.

Web MasterThis person can manually submit a URL to a search engine.

meta keywordsThese are descriptive data and words entered into the header section of a Web page when it’s created.

hitsA search engine returns a list of these, which are links to Web Pages that match your search criteria.

search sitesA Web site like www. google. com that is designed specifically to help you find information on the Web.

search engineA Web crawler, an indexer, a database, and a query processor are all componets of this.

Dictionary. comExample of Web app referred to as online reference software.

cloud, onlineWords that refer to storage on the Internet.

One DriveA host site that provides Microsoft Office Web apps and cloud storage.

productivity appsWeb apps help you accomplish specific tasks such as creating a document or prsnetation.

Google EarthA mapping application that might require you to download additional software.

Private browsingMode for surfing the Web without leaving history, temporary Internet files, or cookies.

pharmingHacking a server to re-route traffic to a fake Web site to obtain your personal information.

historyThe list of Web pages your browser maintains of Web visits during a specific period of time.

microbrowserUsed to access Web pages on your mobile computing device, and specially designed for small screens.

cookieSmall text file that a Web page stores on your computer to iindentify you.

World Wide WebA collection of millions of Websites.

Web siteA collection of related Web pages connected by hyperlinks.

MosiacThe first graphical Web Browser released in 1993.

Web PageA Hypertext Markup language (HTML) document.

Text messagingAnother term for Short Message Service(SMS), messages less than 160 charcters sent via cellular network.

virus protectionSoftware that scans incoming messages and programs to protect your computer.

disk defragmenterReorganizes the data on a magnetic hard drive so that you can access files more quickly.

adwareDisplays unsolicited advertisements in banners or pop-up windows.

Recycle BinNot emptying this lets files remain on your computer and take up space.

disk cleanup utilityRemoves unused files like temporary internet files from your hard drive.

sleevesUsed to store DVD backup discs to protect from scratches and dirt.

paperStore this in a dry area, humidity can cause it to stick and then jam during printing.

solid stateDrivers that have no moving parts and are less likely to be damaged by dirt and impact, but still cared for.

alcohol and waterCleaning product specifically meant for computer screens.

memory cardsStored in their cases when not in digital cameras.

airKeep a can of compressed ___ near your work area, and use it to clean dust off your keyboard or pointing device.

powerYou can avoid data loss by installing an uninterruptible______ supply (UPS) to prevent power loss to your computer in the event of a power outage.

surge suppressorTo prevent power fluctuations from damaging electronic componets, you should always use a _______ with your computer.

magnets_______will affect the data on older storage technology such as floppy disks, but are no danger to newer systems that yse solid- state technology.

coolBecause electronics need to stay _______ computers have built-in systems to keep computers from overheating.

Desktop ComputerComputing hardware that is not very portable, but highly functional, perhaps used by a graphic designer creating a logo using complex graphics software, printer, and digital camera add-ons.

Operating systemPlatform that coordinates the functions of various hardware components and determines the types and brands of application software you can use.

PeripheralDevices that can be attached to a computer to extend the computer’s functionality, such as adding printing or video capabilities.

LaptopComputing devices that is highly functional and portable, likely to be used by a traveling salesperson who constantly needs to update a database after client visits.

Convertible computersDevice with a detachable keyboard that can convert to a tablet for mobility.

Your computer should be password protected. True

With cloud storage, you can retrieve your data anytime from anywhere in the world. True

Firewalls inspect data transmitted between a computer and external recipients to prevent unsolicited data exchanges. True

There is no way to track your smartphone once it is lost. False

A thief must physically steal your computer to gain access to its files and data. False

Your best protection aginst losing your data is to backup your files to your hard drive. False

Make sure the paper tray has paper before sending documents to print. DO

Use compressed air to remove dust and other particles from your keyboard. DO

Check to see that your computer and devices are plugged in. DO

Run the Optimize Drivers feature to maximize free space on your hard drive. DO

Call a technician right away if your computer doesn’t start. DON’T

Turn off your router or modem before connecting to the Internet. DON’T

ONINTRO TO COMPUTER SCIENCE CHAPTER 5& 6 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • Digital Camera
  • Microsoft Office
  • Smartphone

Thank's for Your Vote!
Intro to computer science chapter 5&6. Page 1
Intro to computer science chapter 5&6. Page 2
Intro to computer science chapter 5&6. Page 3
Intro to computer science chapter 5&6. Page 4
Intro to computer science chapter 5&6. Page 5
Intro to computer science chapter 5&6. Page 6
Intro to computer science chapter 5&6. Page 7

This work, titled "Intro to computer science chapter 5&6" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Intro to computer science chapter 5&6'. 3 January.

Reference

AssignBuster. (2022, January 3). Intro to computer science chapter 5&6. Retrieved from https://assignbuster.com/intro-to-computer-science-chapter-56/

References

AssignBuster. 2022. "Intro to computer science chapter 5&6." January 3, 2022. https://assignbuster.com/intro-to-computer-science-chapter-56/.

1. AssignBuster. "Intro to computer science chapter 5&6." January 3, 2022. https://assignbuster.com/intro-to-computer-science-chapter-56/.


Bibliography


AssignBuster. "Intro to computer science chapter 5&6." January 3, 2022. https://assignbuster.com/intro-to-computer-science-chapter-56/.

Work Cited

"Intro to computer science chapter 5&6." AssignBuster, 3 Jan. 2022, assignbuster.com/intro-to-computer-science-chapter-56/.

Get in Touch

Please, let us know if you have any ideas on improving Intro to computer science chapter 5&6, or our service. We will be happy to hear what you think: [email protected]