Vocabulary Bank organized by module
|
|
- Fay Stevens
- 6 years ago
- Views:
Transcription
1 Vocabulary Bank organized by module
2 Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Central Processing Unit (CPU): the central processing unit carries out the functions in a computer Cloud computing: a computer network that allows for software and hardware to be placed on it, thereby removing the need to have them stored on your computer; some examples include word processing documents, e- mail, and music files Downloading: receiving data, such as a music or video file, from a server or another computer system Hard disk drive: a computer device that reads, writes, and stores digital data Hardware: the physical parts of a computer Hosting service: a service, such as web hosting, that is usually operated by a company in order to provide access to the Internet through servers Internet: a vast global computer network, which links smaller computer networks together Memory: any data or information in a computer; it is commonly used to refer to read- access memory (RAM) which is temporary and used to operate software; at times, it can also refer the amount of disk space available on a computer Moore s Law: suggests that the number of transistors that can be placed in an integrated circuit will double every 18 months, making computer speeds increase exponentially; this law is related to other trends in digital technology, like how much memory can go on a hard drive Open source: a way in which software is developed that allows access to the source code of an application or software and is free to update and use Operating system: a group of software programs that provide instructions to a computer so that it may operate Plug- in: something you can add to a software application to enhance its abilities Presentation: a computer program used to display information, normally in the form of a slide show 2
3 Processor: another term for the CPU of a computer the central processing unit that runs computer programs Programming: the process of designing, writing, testing, debugging, and maintaining the source code of computer programs QR code: Quick Response code; a type of two- dimensional bar code, consisting of black modules in a square pattern on a white background, that can hold a large amount of any kind of data RAM: computer memory that is temporarily used to allow programs to operate, which would be quicker than if they accessed ROM Software: a group of computer programs that give instructions to a computer so that it functions Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spreadsheet: a computer application that simulates a paper accounting worksheet Tablet: a highly portable computer shaped like slate or pad of paper, featuring a touchscreen Uploading: sending data, such as a music or video file, from a local computer system to another computer system or server Wi- Fi: networking technology that allows computer devices such as personal computers, laptops, and cell phones to communicate over a wireless signal Word processing: a computer application used for the production (including composition, editing, formatting, and possibly printing) of any sort of printable material 3
4 Module 2: Wireless Communication Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software that is downloaded for use on cell phones Cell tower: a site containing antennas and other electronic communications equipment, usually in a high place, that makes up a cell in a cellular network Coverage area: refers to the area in which a service provider offers its communication service Data package: what the cell phone company charges for use of the internet of your smartphone Dead zone: an area where a cell phone does not receive a signal E- mail: electronic mail sent between computer networks Interference: refers to any disruption or alteration of a signal in cell phones Location- based service: a service provided through cell phone networks and accessed by cell phones which uses location to provide information on various places like restaurants, offices, museums, schools, etc. MMS: an abbreviation for multimedia messaging service, which allows for sending video, audio, pictures, ringtones, and any other media through a cell phone Roaming: the extension of service or coverage in a wireless telecommunications system SMS: also known as short message service; it is a text messaging service for cell phones Service Provider: a company or organization that offers a service, such as web, cable television, or phone access Signal strength: refers to the strength of a connection over a wireless (radio) telecommunication system Smartphone: a cell phone that is designed to perform various computer applications including, but not limited to e- mail, browsing the web, playing video games, playing music, and watching videos 4
5 Module 3: The Viral World Adware: computer software that displays advertisements Cookie: a packet of data sent by an Internet server to a browser, which is returned by the browser each time it subsequently accesses the same server, used to identify the user or track their access to the server Database: a computer system that stores enormous amounts of data Digital addiction: a type of addiction characterized by a dependence on the use of digital technologies such as cell phones and computers HTTP: a protocol or group of rules and functions that is used to transfer data over the World Wide Web; it is required before a web address in a URL and is indicated by /" HTTPS: the same as HTTP a protocol or group of rules and functions that is used to transfer data over the World Wide Web and is secure; it is used for websites that handle sensitive information that would require greater security, such as payments and bank account information Hacked: getting hacked means that your computer or computer network has been broken into without your permission Identity theft: a form of fraud where one person assumes the identity of another person Malware: computer software designed to harm a computer SSL: an abbreviation for Secure Sockets Layer; it is a protocol that provides security when communicating on the Internet Server farm: a cluster of computer servers used when there is the need for large server capacity and capability Server: a computer or series of computers that link other computers together and often store important information Sexting: the act of sending inappropriate sexual material, usually text or images, between cell phones Social media: media that use Internet and cell phone applications to interact, collaborate, and create content 5
6 Social network: a website designed for groups of people who publish their own information and share it with others such as friends, family, co- workers, etc. Spam: e- mail that s sent to large group of people who didn't sign up to receive it; spam often requests information or money or may contain viruses Spyware: a type of malware that unknowingly collects information from a computer URL: the address of a website Viral: an object or pattern that is quickly replicated and shared Virus: a type of malware that replicates itself and spreads to other computers WWW: called "World Wide Web" or simply, "the web," it is a portion of the Internet that can be used through a web browser Web browser: software that allows for navigating the web; it is different from a search engine in that it provides a window in which to search, but does not search itself Module 4: Internet Resources and Credibility Bias: a personal and sometimes unreasoned judgment or prejudice Citation: an act of quoting providing the specific source of the material Credible: offering reason to be believed Domain name: a type of Internet address such as.gov for government,.edu for educational institutions,.com for commercial sites, etc. Digital security certificate: a certificate given to websites that verifies whether a website is secure or not Search engine: a computer program that locates information on the web Wiki: a website that allows users to add and edit interlinking web pages 6
7 Module 5: Creating Multimedia Products Blog: a website that is regularly updated and operates like a journal with writing, opinions, experiences, photos, videos, and links to other information on it Copyright: exclusive rights given to someone who creates original work; the individual is protected for his or her lifetime and 50 years after his or her death Emoticon: the use of letters and punctuation in a message that indicates the emotion of the text (e.g., :) to mean happy) Fair use: a limitation and exception to the exclusive right granted by copyright law to the author of a creative work Intellectual property: property created from an original thought or idea MP3: a common audio format for playback and storage of music on digital audio players Multimedia: content and media that combines different content forms, such as text, audio, animation, and still images Piracy: the unauthorized reproduction or copying of music, video, or literature without proper compensation or permission Plagiarism: representing the language or thoughts of an author as your own, without indicating where the information is from Template: a standard display design used in blogs to provide a structure for information to be viewed Textspeak: abbreviations and slang commonly used to shorten a text or instant message, like using "?s" for "questions" Web 2.0: refers to applications on the web that allow users to interact through user- generated content, design, and collaboration; includes the functions of social media websites Webcam: a video camera for computers typically used to provide real- time video footage 7
8 Module 6: Digital Relationships and Respect Cyberbullying: using technology to harm others through deliberate, repeated, and hostile attacks IP address: a string of numbers that indicates the location of a computer or server; commonly referred to as a web address or URL Module 7: The Future of Technology and You E- reader: a device or computer program used for reading electronic books STEM: refers to careers in science, technology, engineering, and mathematics 8
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informationTHINGS TO REMEMBER INTRODUCTION TO COMPUTERS
PREMIER CURRICULUM SERIES Based on the Sunshine State Standards for Secondary Education, established by the State of Florida, Department of Education THINGS TO REMEMBER INTRODUCTION TO COMPUTERS Copyright
More informationA Comprehensive Guide. IC3 - Module 1: Computing Fundamentals
Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process
More informationGlossary
Glossary www.cybersmart.gov.au/cyberquoll CyberQuoll Internet Safety Education for Primary School Students, Parents Guide Website: www.cybersmart.gov.au/cyberquoll Source: Commonwealth of Australia 2009
More informationGRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2
Province of the EASTERN CAPE EDUCATION NATIONAL SENIOR CERTIFICATE GRADE 11 NOVEMBER 2012 COMPUTER APPLICATIONS TECHNOLOGY P2 MARKS: 150 TIME: 3 hours *CATDM2* This question paper consists of 11 pages.
More information4.03 IT PowerPoint. Objective 4.03 Understand Information Technology activities and careers.
4.03 IT PowerPoint Objective 4.03 Understand Information Technology activities and careers. What Is A Computer? An electronic device that receives data, processes data, stores data, and produces a result
More informationSECTION 2 (Part B) Types And Components Of Computer Systems. Sophia Pratzioti
SECTION 2 (Part B) Types And Components Of Computer Systems 2 Hardware & Software Hardware: is the physical parts of the computer system the part that you can touch and see. Hardware can be either external
More informationDefinitions Know What I Mean?
Definitions Know What I Mean? The list below contains words you will read about in this resource and that your children probably use regularly as they are a normal part of their school world (if not their
More informationIT JARGON BUSTERS NETWORKING TERMS
IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or
More informationKey Stage 1: Computing
Weaving Computing Knowledge, Skills and Understanding into the new National Curriculum Key Stage 1: Computing 1 National Curriculum Requirements of Computing at Key Stage 1 Pupils should be taught to:
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationA B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Glossary A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A App See Application Application An application (sometimes known as an app ) is a computer program which allows the user to perform a specific
More informationSTUDIO 7.0 USER MANUAL
STUDIO 7.0 USER MANUAL 1 Table of Contents Safety Information... 3 Appearance and Key Functions... 4 Introduction... 5 Call Functions... 6 Notifications Bar... 7 Contacts... 8 Messaging... 9 Internet Browser...
More informationThis is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.
Tú Teacher de Inglés 1 0B This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas. Anti-virus software = - A program that finds
More informationClass IX FIT Notes for Short Answer Questions
1. Differentiate between OCR and OMR. Class IX FIT Notes for Short Answer Questions Ans. OCR stands for Optical Character Recognition which is used to read characters of special type font that are printed
More informationModule 1 Concepts of Information and Communication Technology (ICT)
Module 1 Concepts of Information and Communication Technology (ICT) The following is the Syllabus for Module 1, Concepts of Information and Communication Technology (ICT), which provides the basis for
More informationA1 ASSIGNMENT TERMINOLOGY.
A1 ASSIGNMENT TERMINOLOGY. Emma Ziolkowski Term Definition Image blog a web page or site that speaks to an audience of readers informally about opinionated topics. a blog is a website on which the author
More informationUnit A: Computer and Internet Basics
Unit A: Computer and Internet Basics TRUE/FALSE 1. Cars and appliances include digital electronics. ANS: T PTS: 1 REF: Concepts 2 2. Usually when people talk about computers, they are talking about a PC.
More informationUsing the Internet and the World Wide Web
Using the Internet and the World Wide Web Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Understand the difference between the Internet and the World Wide Web. Identify
More informationContents at a Glance
Contents at a Glance Introduction... 1 Part I: First Steps with Your Laptop... 5 Chapter 1: Discovering the Laptop Advantage...7 Chapter 2: Buying a Laptop...19 Chapter 3: Setting Up Your Laptop...37 Chapter
More informationComputing Key Skills
Expected Year 1 Can they create a simple series of instructions - left and right? Can they record their routes? Do they understand forwards, backwards, up and down? Can they put two instructions together
More informationFrequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web?
Frequently Asked Questions- Communication, the Internet, Presentations Question 1: What is the difference between the Internet and the World Wide Web? Answer 1: The Internet and the World Wide Web are
More informationComputer Concepts - Illustrated Introductory, Ninth Edition
Computer Concepts - Illustrated Introductory, Ninth Edition Page 1 of 11 Computer Concepts - Illustrated Introductory, Ninth Edition Unit A: Computer and Internet Basics 1. Make sure that you can define
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationUMD: Using mobile IT devices
UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange
More informationNEO 4.5. User Manual
1 NEO 4.5 User Manual Table of Contents Safety Information... 3 Appearance and Key Function... 4 Introduction... 5 Call Functions... 6 Contacts... 7 Messaging... 8 Internet Browser... 9 Bluetooth & Wi-Fi...
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationCommunication Technology/Technicians & Support Services CIP Task Grid
Unit/Standard Number High School Graduation Years 2015, 2016, and 2017 Communication Technology/Technicians & Support Services CIP 10.9999 Task Grid Secondary Competency Task List 100 COMMUNICATION TECHNOLOGY
More informationChapter 1 Introduction to Computers
Discovering Computers 2008 Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Define the term, computer Identify the components of a computer Discuss
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview ONS IT s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to ONS established culture of openness, trust and integrity.
More informationUtah CTE/Business Education Core Computer Technology I
A Correlation of Pearson 2011 To the Utah CTE/Business Education Core Resource Title: Introduction to Computers & Publisher: Pearson Education, Inc. ISBN (13 digit unique identifier is required): 9781256362098
More informationResource:http://whatis.techtarget.com/
A1 Terminology Urichuck Resource:http://whatis.techtarget.com/ Term Definition Image Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationInformation & Communications Technology (ICT) Essentials 2 (2017/2018)
Information & Communications Technology (ICT) Essentials 2 (2017/2018) Florida 9009120.2017 This document provides the correlation between interactive e-learning curriculum, and the Information & Communications
More informationTotal Mark out of 35
University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:
More informationAcceptable Use Policy
Acceptable Use Policy 1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established
More informationIntroduce using desktop icons to open programs and menus. Introduce using a keyboard. Students should be able to locate keys with both hands
Technology Operations and Concepts, Basic Operations Introduce turning on a computer and logging on Introduce using a mouse to click on icons and buttons Introduce using desktop icons to open programs
More informationVISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce
VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 5 Host, Application, and Data Security Objectives List the steps for securing a host computer Define application security Explain
More informationIMO S User Manual
IMO S User Manual Description of the specification This manual describes how to use the phone's concise information, such as the desire to quickly grasp the basic practical methods of this phone, please
More informationAvailable Instructor Resources Resource File Name Found
Instructor s Manual Exploring Computing Concepts 2016, Chapter 1: Getting Started with Computer Concepts Student Data Files Solution Files Answer Keys Matching Multiple Choice Concepts Checks Scorecards
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationUSER'S MANUAL MY9308P/844522/844523
USER'S MANUAL MY9308P/844522/844523 Table of Contents Table of Contents...P1 Features...P2 Unit at a Glance...P3 Getting Started...P4-P5 About Applications...P5-P6 Preinstalled Applications...P6 Connect
More informationData Communication. Chapter # 5: Networking Threats. By: William Stalling
Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals
More informationComputer and Online Basics.
Computer and Online Basics www.bcs.org/onlinebasics E Published under Licence from the ECDL Foundation Ltd. All rights reserved, no part of this book may be reproduced without permission of the copyright
More informationNational Digital Literacy Mission Module 1: Power in Your Hands
National Digital Literacy Mission Module 1: Power in Your Hands 2 Lesson Plan Lesson Plan of Module 1 1. Overview and introduction to digital devices 2. Know the computer (Components, Functions and Applications)
More informationWELCOME Mobile Applications Testing. Copyright
WELCOME Mobile Applications Testing 1 NETWORK: WiFi ( Hotspots) A HOTSPOT is a physical location where people may obtain Internet access, typically using Wi-Fi technology, via a wireless local area network
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationJacksonville State University Acceptable Use Policy 1. Overview 2. Purpose 3. Scope
Jacksonville State University Acceptable Use Policy 1. Overview Information Technology s (IT) intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Jacksonville
More informationCommunication Technology/Technicians & Support Services CIP Task Grid
1 Secondary Task List 100 COMMUNICATION TECHNOLOGY AND SAFETY PROCEDURES 101 Explain Communication Technology and why it is important. 102 Demonstrate safety procedures in the field of communications technology
More informationDiscount Kaspersky PURE 3.0 internet download software for windows 8 ]
Discount Kaspersky PURE 3.0 internet download software for windows 8 ] Description: Extended benefits Award-winning protection against all types of Internet threats Online shopping, banking and social
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationDCSZ Student AUP Policy
Dulwich College Suzhou DCSZ Student AUP Policy This Policy is underpinned by our School Guiding Statement (No.2) The College provides a safe, secure and stimulating environment Policy Code G1.1.2 Effective
More informationEmerging Technologies
Western Technical College 10154123 Emerging Technologies Course Outcome Summary Course Information Description Career Cluster Instructional Level Total Credits 3.00 Total Hours 72.00 The learner will explore
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationAcceptable Use Policy
Acceptable Use Policy. August 2016 1. Overview Kalamazoo College provides and maintains information technology resources to support its academic programs and administrative operations. This Acceptable
More informationComputer Systems. Communication (networks, radio links) Meatware (people, users don t forget them)
Computers are useful machines, but they are generally useless by themselves. Computers are usually part of a system a computer system includes: Hardware (machines) Software (programs, applications) Communication
More information7. Proofread and edit writing using appropriate resources (e.g., dictionary, spell checker, grammar resources).
Preliminary priciency in the use hardware, stware, and connectivity. Online Assessment Basic Operations Word Processing & Desktop Publishing beginning steps in using available hardware and applications
More informationTopic Course Activities
The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge
More informationG, William James. The smartphone & tablet have changed the course of real estate
Mobile Office Solutions For REALTORS : Must-Have Tools For The Agent s Mobile Office A mobile professional s guide to knowing Which wireless technologies work for you G. William James Handheld Computer
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationelc International School
Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section
More informationInstructions On How To Use Nokia Lumia 710 Bluetooth Files >>>CLICK HERE<<<
Instructions On How To Use Nokia Lumia 710 Bluetooth Files Select Copy content to Nokia Lumia, and follow the instructions shown on your computer. Your the files straight to the OneDrive folder for automatic
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationThe ICT4me Curriculum
The ICT4me Curriculum About ICT4me ICT4me is an after school and summer curriculum for middle school youth to develop ICT fluency, interest in mathematics, and knowledge of information, communication,
More informationChapter 1 Introduction to Computers
Chapter 1 Introduction to Computers Chapter 1 Objectives Recognize the importance of computer literacy Discuss the uses of the Internet and World Wide Web Define the term, computer Describe the categories
More informationMS-CIT Day Wise Breakup Batch : 2 months
Batch : 2 months Day 1 MS-CIT Course Demo What is ERA? How to create outputs? How to solve Take a Challenge? How to solve Take a Bigger Challenge? Day 2 Windows 7 Keyboard and Mouse Activity Games Keyboard
More informationComputer Applications I Vocabulary (Frameworks)
Computer Applications I Vocabulary (Frameworks) Unit 1: Introduction to the Operating System, Computer Systems, and Networks 1. Access keys shortcut keys; keys used in combination to create actions or
More informationFundamentals of Digital Media Lesson Objectives
Fundamentals of Digital Media Lesson Unit 1: INTRODUCTION TO DIGITAL AND ONLINE MEDIA TYPES Digital Camera Basics Discuss mode, compression, and storage in a camera. Explain the basic components and functionality
More informationAirplane mode Android app application Back key bandwidth
1G First-generation analog wireless telephone technology. 2G Second-generation wireless technology, the first digital generation and the first to include data services. 3G Third-generation wireless telephone
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet
More informationPresenter Name. Date
Presenter Name Date Smartphone Forensics! Henry E. Saint-Fleur Antenna NFC microchip Presenter Name Date Smartphone Forensics Background Henry Saint-Fleur! Background! Computer Science / Network Administration
More informationManaging Information and Technology: Finding New Ways to Learn and Link
Managing Information and Technology: Finding New Ways to Learn and Link What are the basic elements and key trends of computer technology? What is cloud computing and why is it popular? How does data become
More informationPortage Township Schools K-12 Technology Skills Scope and Sequence. Technology Categories. IDOE Standard K
K-12 Scope and Sequence 1 DOE K-2.D.3 3-5.CD.2,3 K-2.D.1 K-2.D.1 K-2.D.1 K-2.D.1 K-2.D.1 Demonstrate proficiency in the use of computers and applications as well as an understanding of the concepts underlying
More informationInternet Quick Start Guide. Get the most out of your Midco internet service with these handy instructions.
Internet Quick Start Guide Get the most out of your Midco internet service with these handy instructions. 1 Contents Wi-Fi Name and Password..................................................... 4 Why Change
More informationBrooklyn City School District Technology Learning Targets Checklist
Operations K 1 2 3 4 5 6 7 8 Names and identifies parts of the computer & desktop elements (menus, icons, etc) Uses proper procedures for turning computer on/off & waking from sleep mode Uses mouse fluently
More informationVISUAL SUMMARY PEOPLE INFORMATION SYSTEMS. Information Technology, the Internet, and You. Rev.Confirming Pages
Rev.Confirming Pages VISUAL SUMMARY Information Technology, the Internet, and You INFORMATION SYSTEMS The way to think about a microcomputer is to realize that it is one part of an information system.
More informationESKIUMD2 (SQA Unit Code - F9AA 04) Using mobile IT devices
Overview This is the ability to set up and use mobile or handheld devices such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange and
More informationOffice 365. Quick Start User Guide
Office 365 Quick Start User Guide Contents What is Office 365?... 5 How to Sign In to Office 365... 5 To Sign Out when you are done... 5 Why Use Office 365?... 5 Office 365 Home Page... 6 Top right-hand
More informationContents. 1. Hardware Software Networks St Ignatius Girls JL - Form 3
Contents 1. Hardware... 2 2. Software... 4 3. Networks... 5 St Ignatius Girls JL - Form 3 1. Hardware RAM - The RAM (Random Access Memory) within your computer is where the operating system is loaded to
More informationEmerging Technology in Business (CIW) Course Review (1 semester class) Course Number:
Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available
More informationBowie Senior Center Surfing the Web
Bowie Senior Center Surfing the Web (Without a wetsuit) Introduction Surfing the web is just another term for the activity of searching the Internet for web sites of interest. The Internet is a very powerful
More informationBring Your Own Device (BYOD) Information for Parents and Carers
Bring Your Own Device (BYOD) Information for Parents and Carers Overview Students attending North Lakes State College will bring their own portable computing device to the College as a tool to enhance
More informationSAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11
SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 11 Copyright School Curriculum and Standards Authority, 2014 This document apart from any third party copyright material contained in it may
More informationWorking with Google Tools
Working with Google Tools CREATING A GOOGLE ACCOUNT 1. Open your web browser (preferably Chrome) and go to www.google.com 2. Click Sign In and then click Create Account on the next screen 3. Fill in the
More informationPOS Perkins Statewide Articulation Agreement Documentation Coversheet
POS Perkins Statewide Articulation Agreement Documentation Coversheet Student Name: Secondary School Name: Secondary School Address: CTE Program of Study: CIP # CIP Program Name Grade 9 1. CAREER AND TECHNICAL
More informationWhich one of the following terms describes the physical components of a computer system?
Which one of the following terms describes the physical components of a computer system? a. Hardware. b. Freeware. c. Software. d. Courseware. Which one of the following can slow down the computers performance?
More informationMIS 300 Exam 2 Spring 2011
MIS 300 Exam 2 Spring 2011 Name: Instructions Turn off your cell phone. Close your notes and book. Answer each question by selecting the best response. For True/False questions, select A for and B for.
More informationTechnology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University
Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better
More informationTechnology, E-Textbooks and BYOD Initiative at The Webb School
Technology, E-Textbooks and BYOD Initiative at The Webb School Does a student need his/her own email account? Yes, each student needs his/her own email account. Many digital text books are delivered to
More informationBase Module - Computer Essentials
Base Module - Computer Essentials This module sets out essential concepts and skills relating to the use of devices, file creation and management, networks, and data security. Understand key concepts relating
More informationSet up in 6 easy steps
Step 1: Unpack MyKi Junior Charge it in case of low battery. Use the power cable in the package. Step 2: Install SIM card into the device (Nano SIM) SIM card must be without PIN and active mobile data
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2008 Chapter 2 The Internet and World Wide Web Just remember It took 38 years for radio to reach 50 million users 13 years for television to reach 50 million users Less than 4 years
More informationAcceptable Use Policy
Acceptable Use Policy 1. Purpose The purpose of this policy is to outline the acceptable use of computer equipment at Robotech CAD Solutions. These rules are in place to protect the employee and Robotech
More informationCOMPUTER MERIT BADGE TROOP 301 HUTCHINSON
COMPUTER MERIT BADGE TROOP 301 HUTCHINSON SEARCH ENGINES ONLINE SAFETY 1. Follow your family s rules for going online 2. Protect your privacy 3. Do not open emails or files you receive from people you
More informationMain area: Security Additional areas: Digital Access, Information Literacy, Privacy and Reputation
Public Wi Fi Created: March 2016 Last Updated: July 2018 Estimated time: Group or individual activity: Ages: 60 minutes [10 minutes] Activity #1 [15 minutes] Activity #2 [10 minutes] Activity #3 [10 minutes]
More informationThe Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1
The Lester Vaughan School Information Technology (Theory) Unit Plans Year 1 Term 1 1 Orientation Know why they are in class Display an understanding of the subject Display knowledge of basic IT components
More informationWhat computer? Or how do I choose the right computer
What computer? Or how do I choose the right computer First question: what do you want to use a computer for? Read books Browse the internet Online shopping Send / receive emails. Access to government sites
More information