Vocabulary Bank organized by module

Size: px
Start display at page:

Download "Vocabulary Bank organized by module"

Transcription

1 Vocabulary Bank organized by module

2 Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Central Processing Unit (CPU): the central processing unit carries out the functions in a computer Cloud computing: a computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer; some examples include word processing documents, e- mail, and music files Downloading: receiving data, such as a music or video file, from a server or another computer system Hard disk drive: a computer device that reads, writes, and stores digital data Hardware: the physical parts of a computer Hosting service: a service, such as web hosting, that is usually operated by a company in order to provide access to the Internet through servers Internet: a vast global computer network, which links smaller computer networks together Memory: any data or information in a computer; it is commonly used to refer to read- access memory (RAM) which is temporary and used to operate software; at times, it can also refer the amount of disk space available on a computer Moore s Law: suggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making computer speeds increase exponentially; this law is related to other trends in digital technology, like how much memory can go on a hard drive Open source: a way in which software is developed that allows access to the source code of an application or software and is free to update and use Operating system: a group of software programs that provide instructions to a computer so that it may operate Plug- in: something you can add to a software application to enhance its abilities Presentation: a computer program used to display information, normally in the form of a slide show 2

3 Processor: another term for the CPU of a computer the central processing unit that runs computer programs Programming: the process of designing, writing, testing, debugging, and maintaining the source code of computer programs QR code: Quick Response code; a type of two- dimensional bar code, consisting of black modules in a square pattern on a white background, that can hold a large amount of any kind of data RAM: computer memory that is temporarily used to allow programs to operate, which would be quicker than if they accessed ROM Software: a group of computer programs that give instructions to a computer so that it functions Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spreadsheet: a computer application that simulates a paper accounting worksheet Tablet: a highly portable computer shaped like slate or pad of paper, featuring a touchscreen Uploading: sending data, such as a music or video file, from a local computer system to another computer system or server Wi- Fi: networking technology that allows computer devices such as personal computers, laptops, and cell phones to communicate over a wireless signal Word processing: a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material 3

4 Module 2: Wireless Communication Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Cell tower: a site containing antennas and other electronic communications equipment, usually in a high place, that makes up a cell in a cellular network Coverage area: refers to the area in which a service provider offers its communication service Data package: what the cell phone company charges for use of the internet of your smartphone Dead zone: an area where a cell phone does not receive a signal E- mail: electronic mail sent between computer networks Interference: refers to any disruption or alteration of a signal in cell phones Location- based service: a service provided through cell phone networks and accessed by cell phones which uses location to provide information on various places like restaurants, offices, museums, schools, etc. MMS: an abbreviation for multimedia messaging service, which allows for sending video, audio, pictures, ringtones, and any other media through a cell phone Roaming: the extension of service or coverage in a wireless telecommunications system SMS: also known as short message service; it is a text messaging service for cell phones Service Provider: a company or organization that offers a service, such as web, cable television, or phone access Signal strength: refers to the strength of a connection over a wireless (radio) telecommunication system Smartphone: a cell phone that is designed to perform various computer applications including, but not limited to e- mail, browsing the web, playing video games, playing music, and watching videos 4

5 Module 3: The Viral World Adware: computer software that displays advertisements Cookie: a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server Database: a computer system that stores enormous amounts of data Digital addiction: a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers HTTP: a protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL and is indicated by /" HTTPS: the same as HTTP a protocol or group of rules and functions that is used to transfer data over the World Wide Web and is secure; it is used for websites that handle sensitive information that would require greater security, such as payments and bank account information Hacked: getting hacked means that your computer or computer network has been broken into without your permission Identity theft: a form of fraud where one person assumes the identity of another person Malware: computer software designed to harm a computer SSL: an abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet Server farm: a cluster of computer servers used when there is the need for large server capacity and capability Server: a computer or series of computers that link other computers together and often store important information Sexting: the act of sending inappropriate sexual material, usually text or images, between cell phones Social media: media that use Internet and cell phone applications to interact, collaborate, and create content 5

6 Social network: a website designed for groups of people who publish their own information and share it with others such as friends, family, co- workers, etc. Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spyware: a type of malware that unknowingly collects information from a computer URL: the address of a website Viral: an object or pattern that is quickly replicated and shared Virus: a type of malware that replicates itself and spreads to other computers WWW: called "World Wide Web" or simply, "the web," it is a portion of the Internet that can be used through a web browser Web browser: software that allows for navigating the web; it is different from a search engine in that it provides a window in which to search, but does not search itself Module 4: Internet Resources and Credibility Bias: a personal and sometimes unreasoned judgment or prejudice Citation: an act of quoting providing the specific source of the material Credible: offering reason to be believed Domain name: a type of Internet address such as.gov for government,.edu for educational institutions,.com for commercial sites, etc. Digital security certificate: a certificate given to websites that verifies whether a website is secure or not Search engine: a computer program that locates information on the web Wiki: a website that allows users to add and edit interlinking web pages 6

7 Module 5: Creating Multimedia Products Blog: a website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it Copyright: exclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death Emoticon: the use of letters and punctuation in a message that indicates the emotion of the text (e.g., :) to mean happy) Fair use: a limitation and exception to the exclusive right granted by copyright law to the author of a creative work Intellectual property: property created from an original thought or idea MP3: a common audio format for playback and storage of music on digital audio players Multimedia: content and media that combines different content forms, such as text, audio, animation, and still images Piracy: the unauthorized reproduction or copying of music, video, or literature without proper compensation or permission Plagiarism: representing the language or thoughts of an author as your own, without indicating where the information is from Template: a standard display design used in blogs to provide a structure for information to be viewed Textspeak: abbreviations and slang commonly used to shorten a text or instant message, like using "?s" for "questions" Web 2.0: refers to applications on the web that allow users to interact through user- generated content, design, and collaboration; includes the functions of social media websites Webcam: a video camera for computers typically used to provide real- time video footage 7

8 Module 6: Digital Relationships and Respect Cyberbullying: using technology to harm others through deliberate, repeated, and hostile attacks IP address: a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL Module 7: The Future of Technology and You E- reader: a device or computer program used for reading electronic books STEM: refers to careers in science, technology, engineering, and mathematics 8

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should

More information

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called

More information

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS

THINGS TO REMEMBER INTRODUCTION TO COMPUTERS PREMIER CURRICULUM SERIES Based on the Sunshine State Standards for Secondary Education, established by the State of Florida, Department of Education THINGS TO REMEMBER INTRODUCTION TO COMPUTERS Copyright

More information

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process

More information

Glossary

Glossary Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009

More information

GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2

GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2 Province of the EASTERN CAPE EDUCATION NATIONAL SENIOR CERTIFICATE GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2 MARKS: 150 TIME: 3 hours *CATDM2* This question paper consists of 11 pages.

More information

4.03 IT PowerPoint. Objective 4.03 Understand Information Technology activities and careers.

4.03 IT PowerPoint. Objective 4.03 Understand Information Technology activities and careers. 4.03 IT PowerPoint Objective 4.03 Understand Information Technology activities and careers. What Is A Computer? An electronic device that receives data, processes data, stores data, and produces a result

More information

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti

SECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external

More information

Definitions Know What I Mean?

Definitions Know What I Mean? Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their

More information

IT JARGON BUSTERS NETWORKING TERMS

IT JARGON BUSTERS NETWORKING TERMS IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or

More information

Key Stage 1: Computing

Key Stage 1: Computing Weaving Computing Knowledge, Skills and Understanding into the new National Curriculum Key Stage 1: Computing 1 National Curriculum Requirements of Computing at Key Stage 1 Pupils should be taught to:

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific

More information

STUDIO 7.0 USER MANUAL

STUDIO 7.0 USER MANUAL STUDIO 7.0 USER MANUAL 1 Table of Contents Safety Information... 3 Appearance and Key Functions... 4 Introduction... 5 Call Functions... 6 Notifications Bar... 7 Contacts... 8 Messaging... 9 Internet Browser...

More information

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas. Tú Teacher de Inglés 1 0B This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas. Anti-virus software = - A program that finds

More information

Class IX FIT Notes for Short Answer Questions

Class IX FIT Notes for Short Answer Questions 1. Differentiate between OCR and OMR. Class IX FIT Notes for Short Answer Questions Ans. OCR stands for Optical Character Recognition which is used to read characters of special type font that are printed

More information

Module 1 Concepts of Information and Communication Technology (ICT)

Module 1 Concepts of Information and Communication Technology (ICT) Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for

More information

A1 ASSIGNMENT TERMINOLOGY.

A1 ASSIGNMENT TERMINOLOGY. A1 ASSIGNMENT TERMINOLOGY. Emma Ziolkowski Term Definition Image blog a web page or site that speaks to an audience of readers informally about opinionated topics. a blog is a website on which the author

More information

Unit A: Computer and Internet Basics

Unit A: Computer and Internet Basics Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.

More information

Using the Internet and the World Wide Web

Using the Internet and the World Wide Web Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify

More information

Contents at a Glance

Contents at a Glance Contents at a Glance Introduction... 1 Part I: First Steps with Your Laptop... 5 Chapter 1: Discovering the Laptop Advantage...7 Chapter 2: Buying a Laptop...19 Chapter 3: Setting Up Your Laptop...37 Chapter

More information

Computing Key Skills

Computing Key Skills Expected Year 1 Can they create a simple series of instructions - left and right? Can they record their routes? Do they understand forwards, backwards, up and down? Can they put two instructions together

More information

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?

Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are

More information

Computer Concepts - Illustrated Introductory, Ninth Edition

Computer Concepts - Illustrated Introductory, Ninth Edition Computer Concepts - Illustrated Introductory, Ninth Edition Page 1 of 11 Computer Concepts - Illustrated Introductory, Ninth Edition Unit A: Computer and Internet Basics 1. Make sure that you can define

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

UMD: Using mobile IT devices

UMD: Using mobile IT devices UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange

More information

NEO 4.5. User Manual

NEO 4.5. User Manual 1 NEO 4.5 User Manual Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth & Wi-Fi...

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Communication Technology/Technicians & Support Services CIP Task Grid

Communication Technology/Technicians & Support Services CIP Task Grid Unit/Standard Number High School Graduation Years 2015, 2016, and 2017 Communication Technology/Technicians & Support Services CIP 10.9999 Task Grid Secondary Competency Task List 100 COMMUNICATION TECHNOLOGY

More information

Chapter 1 Introduction to Computers

Chapter 1 Introduction to Computers Discovering Computers 2008 Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer Discuss

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.

More information

Utah CTE/Business Education Core Computer Technology I

Utah CTE/Business Education Core Computer Technology I A Correlation of Pearson 2011 To the Utah CTE/Business Education Core Resource Title: Introduction to Computers & Publisher: Pearson Education, Inc. ISBN (13 digit unique identifier is required): 9781256362098

More information

Resource:http://whatis.techtarget.com/

Resource:http://whatis.techtarget.com/ A1 Terminology Urichuck Resource:http://whatis.techtarget.com/ Term Definition Image Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.

More information

FAQ: Privacy, Security, and Data Protection at Libraries

FAQ: Privacy, Security, and Data Protection at Libraries FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library

More information

Information & Communications Technology (ICT) Essentials 2 (2017/2018)

Information & Communications Technology (ICT) Essentials 2 (2017/2018) Information & Communications Technology (ICT) Essentials 2 (2017/2018) Florida 9009120.2017 This document provides the correlation between interactive e-learning curriculum, and the Information & Communications

More information

Total Mark out of 35

Total Mark out of 35 University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established

More information

Introduce using desktop icons to open programs and menus. Introduce using a keyboard. Students should be able to locate keys with both hands

Introduce using desktop icons to open programs and menus. Introduce using a keyboard. Students should be able to locate keys with both hands Technology Operations and Concepts, Basic Operations Introduce turning on a computer and logging on Introduce using a mouse to click on icons and buttons Introduce using desktop icons to open programs

More information

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,

More information

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 5 Host, Application, and Data Security Objectives List the steps for securing a host computer Define application security Explain

More information

IMO S User Manual

IMO S User Manual IMO S User Manual Description of the specification This manual describes how to use the phone's concise information, such as the desire to quickly grasp the basic practical methods of this phone, please

More information

Available Instructor Resources Resource File Name Found

Available Instructor Resources Resource File Name Found Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

USER'S MANUAL MY9308P/844522/844523

USER'S MANUAL MY9308P/844522/844523 USER'S MANUAL MY9308P/844522/844523 Table of Contents Table of Contents...P1 Features...P2 Unit at a Glance...P3 Getting Started...P4-P5 About Applications...P5-P6 Preinstalled Applications...P6 Connect

More information

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Data Communication. Chapter # 5: Networking Threats. By: William Stalling Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals

More information

Computer and Online Basics.

Computer and Online Basics. Computer and Online Basics www.bcs.org/onlinebasics E Published under Licence from the ECDL Foundation Ltd. All rights reserved, no part of this book may be reproduced without permission of the copyright

More information

National Digital Literacy Mission Module 1: Power in Your Hands

National Digital Literacy Mission Module 1: Power in Your Hands National Digital Literacy Mission Module 1: Power in Your Hands 2 Lesson Plan Lesson Plan of Module 1 1. Overview and introduction to digital devices 2. Know the computer (Components, Functions and Applications)

More information

WELCOME Mobile Applications Testing. Copyright

WELCOME Mobile Applications Testing. Copyright WELCOME Mobile Applications Testing 1 NETWORK: WiFi ( Hotspots) A HOTSPOT is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope

Jacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville

More information

Communication Technology/Technicians & Support Services CIP Task Grid

Communication Technology/Technicians & Support Services CIP Task Grid 1 Secondary Task List 100 COMMUNICATION TECHNOLOGY AND SAFETY PROCEDURES 101 Explain Communication Technology and why it is important. 102 Demonstrate safety procedures in the field of communications technology

More information

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

DCSZ Student AUP Policy

DCSZ Student AUP Policy Dulwich College Suzhou DCSZ Student AUP Policy This Policy is underpinned by our School Guiding Statement (No.2) The College provides a safe, secure and stimulating environment Policy Code G1.1.2 Effective

More information

Emerging Technologies

Emerging Technologies Western Technical College 10154123 Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 The learner will explore

More information

Practice Examination 3

Practice Examination 3 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable

More information

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)

Computer Systems. Communication (networks, radio links) Meatware (people, users don t forget them) Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication

More information

7. Proofread and edit writing using appropriate resources (e.g., dictionary, spell checker, grammar resources).

7. Proofread and edit writing using appropriate resources (e.g., dictionary, spell checker, grammar resources). Preliminary priciency in the use hardware, stware, and connectivity. Online Assessment Basic Operations Word Processing & Desktop Publishing beginning steps in using available hardware and applications

More information

Topic Course Activities

Topic Course Activities The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge

More information

G, William James. The smartphone & tablet have changed the course of real estate

G, William James.   The smartphone & tablet have changed the course of real estate Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer

More information

Training UNIFIED SECURITY. Signature based packet analysis

Training UNIFIED SECURITY. Signature based packet analysis Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that

More information

elc International School

elc International School Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section

More information

Instructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<<

Instructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<< Instructions On How To Use Nokia Lumia 710 Bluetooth Files Select Copy content to Nokia Lumia, and follow the instructions shown on your computer. Your the files straight to the OneDrive folder for automatic

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

The ICT4me Curriculum

The ICT4me Curriculum The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,

More information

Chapter 1 Introduction to Computers

Chapter 1 Introduction to Computers Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Discuss the uses of the Internet and World Wide Web Define the term, computer Describe the categories

More information

MS-CIT Day Wise Breakup Batch : 2 months

MS-CIT Day Wise Breakup Batch : 2 months Batch : 2 months Day 1 MS-CIT Course Demo What is ERA? How to create outputs? How to solve Take a Challenge? How to solve Take a Bigger Challenge? Day 2 Windows 7 Keyboard and Mouse Activity Games Keyboard

More information

Computer Applications I Vocabulary (Frameworks)

Computer Applications I Vocabulary (Frameworks) Computer Applications I Vocabulary (Frameworks) Unit 1: Introduction to the Operating System, Computer Systems, and Networks 1. Access keys shortcut keys; keys used in combination to create actions or

More information

Fundamentals of Digital Media Lesson Objectives

Fundamentals of Digital Media Lesson Objectives Fundamentals of Digital Media Lesson Unit 1: INTRODUCTION TO DIGITAL AND ONLINE MEDIA TYPES Digital Camera Basics Discuss mode, compression, and storage in a camera. Explain the basic components and functionality

More information

Airplane mode Android app application Back key bandwidth

Airplane mode Android app application Back key bandwidth 1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet

More information

Presenter Name. Date

Presenter Name. Date Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration

More information

Managing Information and Technology: Finding New Ways to Learn and Link

Managing Information and Technology: Finding New Ways to Learn and Link Managing Information and Technology: Finding New Ways to Learn and Link What are the basic elements and key trends of computer technology? What is cloud computing and why is it popular? How does data become

More information

Portage Township Schools K-12 Technology Skills Scope and Sequence. Technology Categories. IDOE Standard K

Portage Township Schools K-12 Technology Skills Scope and Sequence. Technology Categories. IDOE Standard K K-12 Scope and Sequence 1 DOE K-2.D.3 3-5.CD.2,3 K-2.D.1 K-2.D.1 K-2.D.1 K-2.D.1 K-2.D.1 Demonstrate proficiency in the use of computers and applications as well as an understanding of the concepts underlying

More information

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.

Internet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions. Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Wi-Fi Name and Password..................................................... 4 Why Change

More information

Brooklyn City School District Technology Learning Targets Checklist

Brooklyn City School District Technology Learning Targets Checklist Operations K 1 2 3 4 5 6 7 8 Names and identifies parts of the computer & desktop elements (menus, icons, etc) Uses proper procedures for turning computer on/off & waking from sleep mode Uses mouse fluently

More information

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages

VISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages Rev.Confirming Pages VISUAL SUMMARY Information Technology, the Internet, and You INFORMATION SYSTEMS The way to think about a microcomputer is to realize that it is one part of an information system.

More information

ESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices

ESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices Overview This is the ability to set up and use mobile or handheld devices such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange and

More information

Office 365. Quick Start User Guide

Office 365. Quick Start User Guide Office 365 Quick Start User Guide Contents What is Office 365?... 5 How to Sign In to Office 365... 5 To Sign Out when you are done... 5 Why Use Office 365?... 5 Office 365 Home Page... 6 Top right-hand

More information

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3

Contents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3 Contents 1. Hardware... 2 2. Software... 4 3. Networks... 5 St Ignatius Girls JL - Form 3 1. Hardware RAM - The RAM (Random Access Memory) within your computer is where the operating system is loaded to

More information

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available

More information

Bowie Senior Center Surfing the Web

Bowie Senior Center Surfing the Web Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful

More information

Bring Your Own Device (BYOD) Information for Parents and Carers

Bring Your Own Device (BYOD) Information for Parents and Carers Bring Your Own Device (BYOD) Information for Parents and Carers Overview Students attending North Lakes State College will bring their own portable computing device to the College as a tool to enhance

More information

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11 SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11 Copyright School Curriculum and Standards Authority, 2014 This document apart from any third party copyright material contained in it may

More information

Working with Google Tools

Working with Google Tools Working with Google Tools CREATING A GOOGLE ACCOUNT 1. Open your web browser (preferably Chrome) and go to www.google.com 2. Click Sign In and then click Create Account on the next screen 3. Fill in the

More information

POS Perkins Statewide Articulation Agreement Documentation Coversheet

POS Perkins Statewide Articulation Agreement Documentation Coversheet POS Perkins Statewide Articulation Agreement Documentation Coversheet Student Name: Secondary School Name: Secondary School Address: CTE Program of Study: CIP # CIP Program Name Grade 9 1. CAREER AND TECHNICAL

More information

Which one of the following terms describes the physical components of a computer system?

Which one of the following terms describes the physical components of a computer system? Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. Which one of the following can slow down the computers performance?

More information

MIS 300 Exam 2 Spring 2011

MIS 300 Exam 2 Spring 2011 MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.

More information

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University

Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better

More information

Technology, E-Textbooks and BYOD Initiative at The Webb School

Technology, E-Textbooks and BYOD Initiative at The Webb School Technology, E-Textbooks and BYOD Initiative at The Webb School Does a student need his/her own email account? Yes, each student needs his/her own email account. Many digital text books are delivered to

More information

Base Module - Computer Essentials

Base Module - Computer Essentials Base Module - Computer Essentials This module sets out essential concepts and skills relating to the use of devices, file creation and management, networks, and data security. Understand key concepts relating

More information

Set up in 6 easy steps

Set up in 6 easy steps Step 1: Unpack MyKi Junior Charge it in case of low battery. Use the power cable in the package. Step 2: Install SIM card into the device (Nano SIM) SIM card must be without PIN and active mobile data

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech

More information

COMPUTER MERIT BADGE TROOP 301 HUTCHINSON

COMPUTER MERIT BADGE TROOP 301 HUTCHINSON COMPUTER MERIT BADGE TROOP 301 HUTCHINSON SEARCH ENGINES ONLINE SAFETY 1. Follow your family s rules for going online 2. Protect your privacy 3. Do not open emails or files you receive from people you

More information

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation

Main area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]

More information

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1

The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1 The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1 1 Orientation Know why they are in class Display an understanding of the subject Display knowledge of basic IT components

More information

What computer? Or how do I choose the right computer

What computer? Or how do I choose the right computer What computer? Or how do I choose the right computer First question: what do you want to use a computer for? Read books Browse the internet Online shopping Send / receive emails. Access to government sites

More information