Zebra0.com

computer-conceptsGlossary

Glossary

Learn Computer Concepts in FREE step-by-step lessons.

3D: 3D Modeling (three-dimensional) (Lesson: Digital Media)
   also called ray tracing, utilizes sophisticated software graphics tools to create realistic 3D models that can be rotated and viewed from any angle in a virtual environment
Access points: Access points (Lesson: Data Security)
   Access points are essentially routers with the capability of wirelessly connecting to Wi-Fi equipped devices. The access point sends and receives signals to and from computers on the wireless local area network or WLAN(pronounced W-lan).
accessible computing: Accessible Computing (Lesson: Ethics)
   the provision of equal access to computers and information technology for individuals with disabilities
ad wars: Ad Wars (Lesson: Ecommerce)
   Ad blockers block online ads, but companies use techniques to get ads past the blockers, but shortly thereafter updates come out to counter those actions
addictions, computer: Computer addictions (Lesson: Digital Life)
   the compulsive use of digital technologies such as the Internet, video games, online gambling, and pornography
AI: AI: Artificial intelligence (Lesson: Artificial Intelligence)
   refers to the art and science of creating computer systems that simulate human thought and behavior
AI methods: Artificial intelligence methodologies (Lesson: Artificial Intelligence)
   consist of the various approaches to AI research that generally fall under one of two categories: conventional AI or computational intelligence
AI questions: Self Study Questions(Lesson: Artificial Intelligence)
   What have you learned?
AJAX: AJAX (Lesson: Software)
   Based on JavaScript, used mostly for client-side web programming
alice: Alice: Introduction to Programming(Lesson: Software)
   Alice programs creates 3D Animation
ALU: ALU: Arithmetic/Logic Unit (Lesson: Hardware)
   Contains the circuits that carry out instructions, such as mathematical and logical operations.
animation: Animation (Lesson: Digital Media)
   involves displaying digital images in rapid succession to create the illusion of motion
antivirus software: Antivirus software (Lesson: Data Security)
   Antivirus software, also known as virus protection software, uses several techniques to find malware on a computer system; remove it if possible; and keep additional malware from infecting the system.
API: API: Application Programming Interface (Lesson: Software)
   a set of programming tools specifically designed for developing apps for a particular platform
app: App, Application (Lesson: Software)
   software goes by many names, including applications, apps, and programs
architecture: Architecture (Network) (Lesson: The Internet)
   defines the manner in which devices connect and communicate with each other over a network
arithmetic operation: Arithmetic Operation (Lesson: Software)
   The ability to carry out math equations with variables
array: Array (Lesson: Software)
   A collection, or list of variables
Artificial intelligence: AI: Artificial intelligence (Lesson: Artificial Intelligence)
   refers to the art and science of creating computer systems that simulate human thought and behavior
ASCII: ASCII (Lesson: Digital Technology)
   American Standard Code for Information Interchange is digital representation for of all the characters on a computer keyboard
attribute: Attribute (Lesson: Big Data)
   a characteristic of an entity, such as ID number. The specific value of an attribute, called a data item – such as R2D2, can be found in the fields of the record describing an entity.
augmented reality: Augmented Reality (Lesson: Digital Media)
   displays computer-generated images or information over objects viewed in real time and space
autonomous vehicles: Autonomous Vehicles (Lesson: Artificial Intelligence)
   any vehicle that operates autonomously, without the aid of a human
B2B: B2B: Business-to-Business (Lesson: Ecommerce)
   supports transactions between businesses across private networks, the Internet, and the web
B2C: B2C: Business-to-Consumer (etail) (Lesson: Ecommerce)
   uses the web or mobile apps to connect individual consumers directly with commercial sellers
backbone: Backbone (internet) (Lesson: The Internet)
   consists of mostly fiber-optic cables that span the globe over land and undersea to provide connections between individuals, companies, organizations, and governments
base: Base in number systems (Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   The base is the set of digits to represent a number. Base 10 (the usual human number system) has 10 digits: 0,1,2,3,4,5,6,7,8,9. The place values are powers of 10: 1, 10, 100, 1000 etc.
Bayesian network: Bayesian network (Lesson: Artificial Intelligence)
   sometimes called a belief network, is a form of conventional AI that uses a graphical model to represent a set of variables and their relationships and dependencies
behavior based: Behavior-based AI (Lesson: Artificial Intelligence)
   a form of conventional AI that is popular in programming robots
behavioral targeting: Behavioral Targeting (Lesson: Privacy)
   uses information about a person’s behavior to inform businesses and marketers so that they can offer products that are likely to be of interest to that person
Berners Lee system: Berners-Lee’s System (Lesson: Web Technologies)
   linked together documents to allow navigation from one document to related documents
big data: Big Data (Lesson: Big Data)
   refers to the huge amount of data being collected and stored and to the process of drawing useful information from that data
binary: Binary (Lesson: Digital Technology)
   base 2 has digits 0 and 1
binary system: Binary Numbers: 0 and 1(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   The binary system is base 2
binary system, drill: Drill: Convert binary to decimal(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Practice converting binary numbers to decimal
binary to decimal: Convert binary to decimal: Video(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   This video demonstrates converting decimal to binary. 5 minutes
binary to hexadecimal, convert: Converting Binary to Hexadecimal(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   This video demonstrates converting binary to hex.
binary to hexadecimal, drill: Drill: Convert binary to hexadecimal(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Practice converting binary to hexadecimal
Biometrics: Biometrics authentication method (Lesson: Data Security)
   Biometrics is the science and technology of authentication by scanning and measuring a person’s unique physical features (“something about you”). Fingerprints, facial characteristics, retinal patterns, and voice patterns are commonly used in biometrics.
BIOS: BIOS: Basic Input/Output System (Lesson: Hardware)
   The BIOS stores information about your hardware configuration along with the boot program.
bit: Bit (Lesson: Digital Technology)
   A Bit: Binary Digit can have one of two values, usually represented as 0 or 1.
bitcoin: Bitcoin (Lesson: Ecommerce)
   Bitcoin is a digital currency introduced in 2008 to replace the common currencies of the world
bitmap: Bitmap (Lesson: Digital Media)
   a bitmap image contains a grid of information about the color of each pixel
blog: Blog (Web Log) (Lesson: Freedom of Speech)
   a website created to express one (or more) individual’s views on a given topic
bluetooth: Bluetooth (Lesson: Telecommunications)
   enables a wide assortment of digital devices to communicate directly with each other wirelessly over short distances
bot: Bot (Lesson: Web Technologies)
   automated program
botnet: botnet, or botnet army (Lesson: Data Security)
   A botnet, or botnet army, refers to a collection of computers autonomously or automatically working together toward some goal; these are often zombie computers that are synchronized to perform illegal activities on the Internet.
bridge: Bridge (Network Control Device) (Lesson: Telecommunications)
   Connects two or more network segments, as a repeater does; a bridge also helps to regulate network traffic
broadband: Broadband / High-Speed Internet (Lesson: Telecommunications)
   a connection providing download speeds of 6 Mbps (megabits per second) up to over 100 Mbps
browser: Browser (Web Browser) (Lesson: Web Technologies)
   requests webpages from web servers, interprets the HTML code in the webpage that is delivered, and displays the content as defined by the HTML
bus: bus (Lesson: Hardware)
   electrical pathways on the motherboard that connect the components.
business: Some necessary software(Lesson: Software)
business intelligence: Business Intelligence and Analytics (Lesson: Ecommerce)
   technologies that are used to gather and report information that supports business decision making
business systems: Business Systems (Lesson: Ecommerce)
   computer-based information systems that provide organizations with valuable information in a timely and effective manner
BYOD: BYOD: Bring Your Own Device (Lesson: Hardware)
   A trend where employees are bringing devices to work and pressuring employers to support them.
byte: Byte (Lesson: Digital Technology)
   a group of eight bits. One byte can represent any key on a keyboard.
C: C (Lesson: Software)
   General-purpose language popular on UNIX and Linux platforms
C++: C++ (Lesson: Software)
   General-purpose language that uses objects
C2C: C2C: Consumer-to-Consumer (Lesson: Ecommerce)
   also called peer-to-peer, C2C ecommerce uses the web to connect individuals who wish to sell to other individuals
cable: Cable Modem (Lesson: Telecommunications)
   Provides Internet access to PCs and computer networks over a cable television network
cache: Cache (Lesson: Hardware)
   A temporary storage area for frequently accessed or recently accessed data; speeds up the operation of the computer; size measured in megabytes (MB)
careers questions: Self Study Questions(Lesson: Careers in Computing and Technology)
   What have you learned?
case based: Case-based reasoning (Lesson: Artificial Intelligence)
   an area of conventional AI in which the AI software maintains a library of problem cases and solutions
cellular carrier: Cellular Carrier (Lesson: Telecommunications)
   a company that builds and maintains a cellular network and provides cell phone service to the public
cellular device: Cellular Device (Lesson: Telecommunications)
   Cellular network carriers provide several options for connecting computers to the Internet
cellular network: Cellular Network (Lesson: Telecommunications)
   a wide area network in which a geographic area is divided into cells, with a transceiver antenna (tower) and station at the center of each cell, to support wireless mobile communications
cellular plan: Cellular Plan (Lesson: Telecommunications)
   defines the terms of service provided by a cellular carrier to which a cellular user subscribes
children internet protection: Children’s Internet Protection Act (2000) (Lesson: Freedom of Speech)
   requires schools and libraries that receive federal funding for technology to implement content filtering
chip: Chip, short for microchip (Lesson: Hardware)
   Developed in 1950s, it integrated multiple transistors into a single module called an integrated circuit.
circuit: Circuit (Lesson: Hardware)
   A circuit is created by combining transistors, and sometimes other components, in a manner that accomplishes a specific task
client server: Client/Server (Lesson: The Internet)
   a network architecture in which one computer or program (the client) makes a service request from another computer or program (the server) that provides the service
clock: Clock Speed (Lesson: Hardware)
   Speed of the processor’s internal clock, which dictates how fast the processor can process data; usually measured in GHz (gigahertz, or billions of pulses per second)
cloud: Cloud Computing (Lesson: The Internet)
   migration of storage, software, and services from user devices—including corporate servers, personal computers, and mobile devices—to Internet servers
cloud computing: Cloud Computing (Lesson: Web Technologies)
   delivers a variety of computing resources from the Internet as a service for free or for a fee, to relieve users from the burden of installing, maintaining, and securing those resources themselves
cloud models: Cloud Models (Lesson: Web Technologies)
   There are several cloud models that serve various environments, including private clouds, community clouds, public clouds, and hybrid clouds
cloud services: Cloud Services (Lesson: Web Technologies)
   include computing services provided over the Internet in three categories: infrastructure, platform, and application.
CMYK: CMYK: Cyan, Magenta, Yellow, Black (Lesson: Digital Media)
   printed color uses the CMYK color model to define colors
coaxial: Coaxial (Cable) (Lesson: Telecommunications)
   An inner conductor wire surrounded by insulation, a conductive shield, and a cover used for cable TV and other applications
coder: programmer (Lesson: Careers in Computing and Technology)
   develops code used to create software programs designed to tell computers how to process information and perform specific tasks
coding: Coding (Lesson: Software)
   same as computer programming, or programming
color: Color(Lesson: Digital Media)
   Experiment with RGB Colors
communication app: Communication App (Lesson: Software)
   support communication between people and groups through text, voice, and video
comparison operation: Comparison Operation (Lesson: Software)
   the ability to compare data using comparison operators such as <
computational intelligence: Computational intelligence (Lesson: Artificial Intelligence)
   an offshoot of AI that employs methodologies such as neural networks, fuzzy systems, and evolutionary computation to set up a system whereby the software can develop intelligence through an iterative learning process
computer: Computer (Lesson: Digital Technology)
   A digital electronics device that combines hardware and software to accept the input of data and then process and store the data to produce some useful output.
computer addictions: Computer addictions (Lesson: Digital Life)
   the compulsive use of digital technologies such as the Internet, video games, online gambling, and pornography
computer based violence: Computer-based violence (Lesson: Digital Life)
   acts of interactive simulated violence provided by computer games
computer ethics: Computer Ethics (Lesson: Ethics)
   the responsible use of computers in all contexts and applications, by individuals, organizations, and governments
computer network architect: Computer network architect (Lesson: Careers in Computing and Technology)
   designs, builds, and maintains complex computer data networks
computer programmer: programmer (Lesson: Careers in Computing and Technology)
   develops code used to create software programs designed to tell computers how to process information and perform specific tasks
computer research scientist: Computer and information research scientist (Lesson: Careers in Computing and Technology)
   develops new ways to use computer technology and improve existing computing technology
computer vision: Computer vision (Lesson: Artificial Intelligence)
   combines hardware and AI software that permit computers to capture, store, and interpret visual images and pictures
conditional: Conditional Statement (Lesson: Software)
   the ability to choose different operations depending on a condition
content filtering: Content Filtering (Lesson: Freedom of Speech)
   use to set rules and define what is allowable, such as parental controls, or to block child pornography
context aware: Context-Aware Computing (Lesson: Artificial Intelligence)
   software that uses artificial intelligence to provide services based on environmental context
conventional AI: Conventional AI (Lesson: Artificial Intelligence)
   also called symbolic AI, logical AI, or neat AI—uses programming that emphasizes statistical analysis to calculate the probability of various outcomes
cookie: Cookie (Lesson: Web Technologies)
   small text file placed on a user’s computer by a web server in order to identify the user whenever he or she returns to visit a website
copyright: Copyright (Lesson: Intellectual Property)
   Protects the words, music, and other expressions for the life of the copyright holder plus 70 years
CPU: CPU (Lesson: Digital Technology)
   Central Processing Unit: sometimes refered to as the heart of the computer.
CPU: : CPU: Central Processing Unit (Lesson: Hardware)
   a group of circuits that perform the processing in a computer, typically in one integrated circuit called a microprocessor
CPU: components: CPU Components (Lesson: Hardware)
   The CPU is made up of many components. The main ones are Control unit, Arithmetic/logic unit (ALU), Registers, Cache, Clock speed
creativity app: Creativity App (Lesson: Software)
   any software that assists people in creating items of value like art, music, video, or software
CRM: CRM: Customer Relationship Management (Lesson: Ecommerce)
   use of information systems to store detailed information on prospective, current, and past customers to improve customer service and support targeted marketing
CSS: CSS: Cascading Style Sheets (Lesson: Web Technologies)
   allows easy application of visual styles for fonts, colors, layouts, and other page attributes to create visual themes for webpages and sites
cyberwarfare: Cyberwarfare (Lesson: Data Security)
   Cyberwarfare extends traditional forms of warfare to the Internet and the web, including espionage, psychological warfare, and attacks.
Data backup: Data backup (Lesson: Data Security)
   Data backup is a process in which copies of important computer files are stored in a safe place to guard against data loss.
data center: Data Center (Lesson: Big Data)
   a climate-controlled room, building, or buildings that houses servers storing and delivering information and services
data dictionary: Data Dictionary (Lesson: Big Data)
   provides a detailed description of each field and table in a database
data hierarchy: Data Hierarchy (Lesson: Big Data)
   refers to the manner in which data in a database is organized into sequential levels of detail
data integrity: Data Integrity (Lesson: Big Data)
   refers to the quality of data: the degree to which it is accurate and up to date
data mining: Data Mining (Lesson: Big Data)
   the process of extracting information from a data warehouse
data questions: Self Study Questions(Lesson: Big Data)
   What have you learned?
data warehouse: Data Warehouse (Lesson: Big Data)
   a very large database that holds information from a variety of sources
database: Database (Lesson: Big Data)
   a collection of organized data, of integrated and related files or tables
database tools: Database Tools (Lesson: Big Data)
   include software and techniques for analyzing, maintaining, and manipulating data in a database
DBMS: DBMS: Database Management System (Lesson: Big Data)
   consists of a group of programs that manipulate the data within a database, providing an interface between the database and the user or between the database and application programs
decimal: Decimal (Lesson: Digital Technology)
   The number system used by humans: base 10 has digits 0 1 2 3 4 5 6 7 8 9
decimal, binary, hexadecimal table: Decimal, Binary and Hexadecimal(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Conversion table
decimal system: Decimal system(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   The decimal system is base 10.
decimal to binary, drill: Drill: Convert decimal to binary(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Practice converting binary numbers to decimal
device driver: Device Driver (Lesson: Software)
   software that is installed for each device connected to a PC, which allows the OS to communicate with that device
dial up: Dial-Up Modem (Lesson: Telecommunications)
   Provides narrowband Internet connections over phone lines
digital assistant: Digital Assistant (Lesson: Hardware)
   Streamlined interfaces like Apple’s Siri, Google Now, Amazon’s Alexa, and Microsoft’s Cortana
digital audio: Digital Audio (Lesson: Digital Media)
   any type of sound, including voice, music, and sound effects, recorded and stored digitally as a series of 1s and 0s
digital camera: Digital Camera (Lesson: Digital Media)
   a camera that captures photographs, and sometimes video, and stores them digitally rather than on film
digital certificate: digital certificate (Lesson: Data Security)
   A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
digital divide: Digital Divide (Lesson: Ethics)
   the social and economic gap between those who have access to computers and the Internet and those who do not
digital etiquette: Digital Etiquette/Netiquette (Lesson: Digital Life)
   using digital technologies in a manner that is respectful to others
digital graphics: Digital Graphics (Lesson: Digital Media)
   digital media applications that support creating, editing, and viewing 2D and 3D images and animation
digital life: Digital Life (Lesson: Digital Life)
   the influence of digital technologies on the manner in which people live their lives
digital literacy: Digital literacy (Lesson: Digital Technology)
   Digital literacy refers to an understanding of how computers represent different types of data with digits and how the usefulness of that representation assists people in leading productive lives.
digital media: Digital Media (Lesson: Digital Media)
   refers to digital technologies of all kinds that serve and support digital publishing and broadcasting, and digital audio, video, and graphics
digital music player: Digital Music Player (Lesson: Digital Media)
   a mobile or desktop device that plays digital music that is stored on the device or streamed from a computer or the Internet
digital photography: Digital Photography (Lesson: Digital Media)
   a form of photography that captures, stores, and manipulates photographs digitally as a series of 1s and 0s
digital publications: Digital Publications (Lesson: Digital Media)
   include eBooks, electronic magazines, online newspapers, blogs, and other forms of traditional publishing that have moved online
digital signal: Digital Signal (Lesson: Telecommunications)
   designed to carry computer data, which is digitally represented as bits
digital technology questions: Self Study Questions(Lesson: Digital Technology)
   What have you learned?
digital video: Digital Video (Lesson: Digital Media)
   stores a progression of digital photographs and displays them at 24 to 30 photos, or frames, per second (fps) to give the illusion of a smoothly flowing scene
digitize: Digitize (Lesson: Digital Technology)
   transform information into a digital representation.
distracted driving: Distracted Driving (Lesson: Digital Life)
   when drivers focus on their cell phones or other distractions rather than on the road
distributed workforce: Distributed Workforce (Lesson: Ecommerce)
DMCA: DMCA: Digital Millennium Copyright Act (Lesson: Intellectual Property)
   a U.S. copyright law designed to reduce illegal digital media copying by criminalizing the production, distribution, and use of technologies designed to circumvent DRM technologies
domain name system: DNS: Domain Name System (Lesson: The Internet)
   maintains a database of all domain names and IP addresses used on the Internet and acts like a phonebook
DRCS: DRCS: Distributed Revision Control Systems (Lesson: Software)
   important tools for groups of developers working together to create and improve software
DRM: DRM: Digital Rights Management (Lesson: Intellectual Property)
   technology that protects digital forms of intellectual property by restricting the number of devices and applications on which a file can be opened and the number of times that the file can be copied
DSL: DSL: Digital Subscriber Line (Lesson: Telecommunications)
   Similar to a cable modem but provides high-speed Internet service over telephone lines
e-notation, drill: Drill: Value of e notation(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Practice writing e notation in normal format.
e-waste: E-waste (Lesson: Ethics)
   E-waste refers to discarded digital electronics devices and components.
eBooks: eBooks (Lesson: Digital Media)
   books published in a digital format and viewed online or with special eBook software on a reading device—an eReader, smartphone, tablet, or PC
ecommerce: Ecommerce: electronic commerce (Lesson: Ecommerce)
   refers to systems that support electronically executed business transactions
eCommerce questions: Self Study Questions(Lesson: Ecommerce)
   What have you learned?
ecosystem: Technology Ecosystems (Lesson: Digital Technology)
   Different types of devices are designed to work together.
education: Education, Online (Lesson: Web Technologies)
   refers to websites designed to educate or support education and training
electronic communication: Electronic Communication (Lesson: Web Technologies)
   Includes asynchronous such as email and text messaging as well as synchronous such video or phone
embedded systems: Embedded Systems (Lesson: Software)
   hardwired into a computer component, such as ROM or flash memory, to control a special-purpose computer
emoji: Emoji (Lesson: Web Technologies)
   pictures from punctuation, like (-;
Encryption: Encryption is a security technique (Lesson: Data Security)
   Encryption is a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the sender and recipient.
energy star: Energy Star (Lesson: Ethics)
   The Energy Star program was created in 1992 by the U.S. Environmental Protection Agency (EPA) to inspire energy conservation in electronics products.
enterprise systems: Enterprise Systems (Lesson: Ecommerce)
   information systems designed to support all or most of the functions of an enterprise
entertainment app: Entertainment App (Lesson: Software)
   any apps that are used for enjoyable leisure time activities, including listening to music; watching TV, videos, and movies; reading books and magazines; and playing games
entity: Entity (Lesson: Big Data)
   a generalized class of people, places, or things (objects) for which data is collected, stored, and maintained. Entities are represented as tables in a database.
ePayment: ePayment: electronic payment (Lesson: Ecommerce)
   electronic payment systems based on new technologies designed to do away with cash, credit cards, and wallets
ERD: ERD: Entity Relationship Diagram (Lesson: Big Data)
   illustrates relationships between tables in a database
ergonomics: Ergonomics (Lesson: Digital Life)
   the study of designing the work environment and positioning computer equipment in a healthy manner
ERP: ERP: Enterprise Resource Planning System (Lesson: Ecommerce)
   integrates all data processing in a corporation (enterprise) into one unified system
ethics: Ethics (Lesson: Ethics)
   a branch of philosophy that deals with issues of morality
ethics questions: Self Study Questions(Lesson: Ethics)
   What have you learned?
excel1: Introduction to Excel(Lesson: Software)
excel2: Excel: Adding Equations(Lesson: Software)
excel3: Excel: Adding Graphs(Lesson: Software)
expert system: ES: expert system (Lesson: Artificial Intelligence)
   a form of conventional AI that is programmed to function like a human expert in a particular field or area
FCC: FCC: Federal Communications Commission (Lesson: Telecommunications)
   assigns different frequencies of the electromagnetic spectrum for different uses in the United States
fiber optic: Fiber-Optic (Cable) (Lesson: Telecommunications)
   Consists of thousands of strands of glass or plastic bound together in a sheathing; transmits signals with light beams
field: Field (Lesson: Big Data)
   the smallest practical unit in most databases: typically a name, number, or combination of characters that in some way describes an aspect of an object
file management: File Management (Lesson: Software)
   the physical and logical storage system and practices provided for managing data on a computer
file system permissions: Permissions, or file system permissions (Lesson: Data Security)
   Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
financial services: Financial Services, Online (Lesson: Web Technologies)
   support money management, loans, investments, and transactions for individuals, businesses, and organizations
firewall: firewall (Lesson: Data Security)
   A firewall is network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous.
firmware: Firmware (Lesson: Hardware)
   programs and data from the computer manufacturer, including the boot process used to start the computer.
format-pictures: Format pictures in Word(Lesson: Software)
   Video on wrapping text around picture
free speech: Freedom of speech (Lesson: Freedom of Speech)
   the ability of a person to publicly speak or publish any thought without legal constraints or repercussions
free speech questions: Self Study Questions(Lesson: Freedom of Speech)
   What have you learned?
FSB: FSB: front front-side bus (Lesson: Hardware)
   The most important bus on a PC motherboard is the front front-side bus, or FSB. FSB speed is important and is typically listed with the specifications of a computer.
gateway: Gateway (Network Control Device) (Lesson: Telecommunications)
   A network point that acts as an entrance to another network
geographic information: GIS: Geographic Information System (Lesson: Ecommerce)
   captures, manages, analyzes, and displays geographically referenced information, often utilizing maps
Github: Github (Lesson: Software)
   One popular DRCS: Distributed Revision Control Systems
globalization: Globalization (Lesson: Ecommerce)
   refers to changes in societies and the world economy, resulting from dramatically increased international trade and cultural exchange
governmental computer ethics: Governmental Computer Ethics (Lesson: Ethics)
   a government’s responsibility to create laws to protect citizens from unethical computer use and provide citizens with equal access to computers and information technologies as well as their benefits
GPS: GPS: Global Positioning System (Lesson: Telecommunications)
   uses satellites to pinpoint the location of objects on earth
green computing: Green Computing (Lesson: Ethics)
   efforts to utilize environmentally conscious practices in the manufacturing and use of digital technologies
GUI: GUI: Graphical User Interface (Lesson: Software)
   uses a keyboard and mouse, touch screen, joystick, or other pointing device to manipulate graphics images on the display to issue commands to the computer system (pronounced "gooey")
hacker: hacker (Lesson: Data Security)
   A hacker is an individual who subverts computer security without authorization.
hacktivists: Hacker activists, or hacktivists (Lesson: Ethics)
   hack computer networks for a perceived righteous cause
hardware: Hardware, computer (Lesson: Hardware)
   the tangible parts of a computer or digital device and typically includes support for processing, storage, input, and output.
hardware internet: Hardware (Internet) (Lesson: The Internet)
   Hardware, such as cables, satellites, and routers, transfers the packets of data that travel over the Internet
hexadecimal: Hexadecimal Numbers: Base 16(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   4 binary digits can be represented by 1 hex digit.
hexadecimal to binary, convert: Converting Hexadecimal to Binary(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   This video show how to convert binary to hexadecimal.
hexadecimal to binary, drill: Drill: Convert hexadecimal to binary(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Practice converting hexadecimal to binary.
history internet: History (Internet) (Lesson: The Internet)
   In 1969, Advanced Research Projects Agency (ARPA) commissioned ARPANET for research into networking
host: Host (Lesson: Ecommerce)
   An ecommerce host is a company that takes on some or all of the responsibility of setting up and maintaining an ecommerce website and system for a business
html: HTML (Lesson: Web Technologies)
   Basics of html to create a webpage
HTML: HTML: Hypertext Markup Language (Lesson: Web Technologies)
   the primary markup language used to specify the formatting of a webpage, it is NOT a programming language.
HTTP: HTTP: HyperText Transfer Protocol (Lesson: Web Technologies)
   controls communication between web clients and servers
hub: Hub (Network Control Device) (Lesson: Telecommunications)
   A small electronic box used as a central point for connecting a series of computers
hyperlink: Hyperlink (Lesson: Web Technologies)
   an element in an online document—a word, phrase, or image—that, when clicked, opens a related online document
IANA: IANA: Internet Assigned Numbers Authority (Lesson: Web Technologies)
   responsible for managing URLs and IP addresses
ICANN: ICANN: Internet Corporation for Assigned Names and Numbers (Lesson: The Internet)
   manages Domain names and IP addresses, was under the control of the U.S. federal government until recently when it was released from U.S. control to operate as an international partnership
ICT: Information and Communications Technology (Lesson: Ethics)
   (including the Internet and web)
identity theft: Identity theft (Lesson: Data Security)
   Identity theft is the criminal act of stealing information about a person to assume that person’s identity in order to commit fraud or other crimes.
immersive media: Immersive Media (Lesson: Digital Media)
   digital media that involve user interaction for education, training, or entertainment
impacts: Impacts: Social and environmental (Lesson: Ethics)
   refer to the consequences of computer use on society and the world
info app: Information Apps (Lesson: Software)
   provide useful information on a variety of topics
informatics: Informatics (Lesson: Ecommerce)
   applies computer-based information system technologies to support traditional disciplines such as science and medicine
information management: Information Management (Lesson: Ecommerce)
   software and computer-based systems dedicated to collecting, storing, and manipulating data in a manner that produces useful information on which to base decisions
information overload: Information Overload (Lesson: Digital Life)
   inability to cope with the huge amount of information
infrastructure: Infrastructure (Lesson: Telecommunications)
   In telecommunications, infrastructure refers to the hardware, software, and protocols that support telecommunications
input: Input (Lesson: Digital Technology)
   anything that a computer can collect and store.
intellectual property: Intellectual Property (Lesson: Intellectual Property)
   a product of the mind or intellect, includes the design of physical software, music, movies, designs, written stories, and ideas
intellectual property questions: Self Study Questions(Lesson: Intellectual Property)
   What have you learned?
intellectual property rights: Intellectual Property Rights (Lesson: Intellectual Property)
   concern the legal ownership and use of intellectual property
Interior threats: Interior threats (Lesson: Data Security)
   Interior threats are network security threats that originate from within a network, typically from registered users.
international business model: International Business Model (Lesson: Ecommerce)
   include methods of engaging in international business ranging from basic import/export to fully transnational businesses
internet: The Internet (Lesson: The Internet)
   the world’s largest public computer network—a network of networks that provides a vast array of services to individuals, businesses, and organizations around the world
internet censorship: Internet Censorship (Lesson: Freedom of Speech)
   refers to the control of speech and other forms of expression over the Internet and web by a government or authority
internet communications: Internet Communications (Lesson: Web Technologies)
   include text-based communications, voice, video, and others such as forums
internet decency: Internet Decency (Lesson: Freedom of Speech)
   refers to efforts by governments and others to rid the Internet and web of content that they consider indecent
internet fraud: Internet fraud (Lesson: Data Security)
   Internet fraud is the crime of deliberately deceiving a person over the Internet in order to damage them or to obtain property or services unlawfully.
internet questions: Self Study Questions(Lesson: The Internet)
   What have you learned?
Internet security: Internet security (Lesson: Data Security)
   Internet security refers to the unique threats and defenses associated with computers connected to the Internet.
IoT: IoT: The Internet of Things (Lesson: The Internet)
   refers to the ability of physical objects to communicate over the Internet using embedded computing devices
IP address: IP Address (Lesson: The Internet)
   The Internet Protocol requires that all devices connected to the Internet have a unique IP address. An IP address is a unique 32- or 128-bit identifier for Internet users and hosts
ISP: ISP: Internet Service Provider (Lesson: The Internet)
   A company that provides individuals and organizations with access to the Internet
iteration: Iteration (Lesson: Software)
   the ability to repeat an operation as long as a condition remains true; also called looping
Java: Java (Lesson: Software)
   General-purpose language that uses objects, used for developing Android apps
javascript: javascript (Lesson: Software)
   Used mostly for client-side web programming
jquery: Jquery (Lesson: Software)
   Based on JavaScript, used mostly for client-side web programming
key: Key, database (Lesson: Big Data)
   A database key is a field in a table used to identify a record
knowledge management: KM: Knowledge Management (Lesson: Ecommerce)
   assists an organization in capturing, storing, and distributing knowledge for use and reuse by the organization and sometimes others
LAN: LAN: Local Area Network (Lesson: Telecommunications)
   a privately-owned computer network that connects computers and devices within the same building or local geographic area
life, digital: Digital Life (Lesson: Digital Life)
   the influence of digital technologies on the manner in which people live their lives
Linux: Linux (Lesson: Software)
   a free, open-source operating system for PCs, servers, and other types of computers
Machine-level security: Machine-level security (Lesson: Data Security)
   Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
magic trick: A Magic Trick using binary numbers (PDF file to download)(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Just for fun, print on heavy paper, cut out and enjoy!
malware: Malware is short for "malicious software" (Lesson: Data Security)
   includes any software designed to damage, corrupt, or illegally manipulate computer resources. Common forms include viruses, worms, and spyware.
mCommerce: mCommerce (Lesson: Ecommerce)
   eCommerce carried out over mobile devices
media: Media (storage) (Lesson: Digital Technology)
   hard drives, DVDs, magnetic tape are slower but are not volatile.
media questions: Self Study Questions(Lesson: Digital Media)
   What have you learned?
microwaves: Microwaves (Lesson: Telecommunications)
   Waves sent at the high end of the radio spectrum, between 1 and 300 GHz
mobile phone: Mobile Phone (Lesson: Telecommunications)
   the handset used by the subscriber to communicate on a cellular network
Moore's law: Moore's Law (Lesson: Hardware)
   states that the number of transistors on a chip will double about every two years.
motherboard: Motherboard (Lesson: Hardware)
   the primary circuit board of a computer to which all components are connected, including the CPU.
multiprocessing: Multiprocessing (Lesson: Hardware)
   also called parallel processing, is processing that occurs using more than one processing unit to increase productivity and performance.
Natural Language Processing: NLP: Natural Language Processing (Lesson: Artificial Intelligence)
   uses AI techniques to enable computers to generate and understand human languages
net neutrality: Net Neutrality (Lesson: Freedom of Speech)
   a principle applied to high-speed Internet services, whereby all data is delivered to all users with equal priority
network adapter: Network Adapter (Lesson: Telecommunications)
   A computer circuit board, PC card, or USB device installed in a computer so that the computer can be connected to a network
network administrators: network administrators (Lesson: Careers in Computing and Technology)
   makes sure that users on various platforms are able to access the network
Network security: Network security (Lesson: Data Security)
   Network security is concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the Internet.
Network usage policy: Network usage policy (Lesson: Data Security)
   A network usage policy is a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization.
neural network: Neural Network/ Neural Net (Lesson: Artificial Intelligence)
   uses software to simulate the functioning of the neurons in a human brain
NIC: NIC: Network Interface Card (Lesson: Telecommunications)
   A circuit board or PC card that provides a port for the device to connect to a wired network with traditional network cables
NLP: NLP: Natural Language Processing (Lesson: Artificial Intelligence)
   uses AI techniques to enable computers to generate and understand human languages
normalization: Normalization (Lesson: Big Data)
   the process of correcting data problems or anomalies, ensuring that the database contains good data
number systems, grouping: Number systems: grouping(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Quantities can be grouped in different ways.
number systems quiz: Self Study Questions(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   What do you know about the number systems used in Computer Science?
OCR: OCR: Optical Character Recognition (Lesson: Digital Technology)
   identifies the text in an image and transforms it to ASCII representation.
octal: Octal (Lesson: Digital Technology)
   A number system: base 8 has digits 0 1 2 3 4 5 6 7
office suites: Office Suites (Lesson: Software)
   software collections that include a word processor, a spreadsheet app, presentation software, and sometime database and other useful software
offshoring: Offshoring (Lesson: Ecommerce)
   business practice that relocates an entire production line to another location, typically in another country
online information: Online Information (Lesson: Web Technologies)
   information of all kinds that is delivered over the Internet
online marketing: Online Marketing (Lesson: Ecommerce)
   employs many strategies to make consumers aware of goods and services available for purchase online
online publications: Online Publications (Lesson: Digital Media)
   Online newspapers and magazines include electronic versions of print newspapers and magazines as well as online-only publications
OOP: OOP: Object-Oriented Programming (Lesson: Software)
   data, instructions, and other programming procedures are grouped together in reusable objects
OS: OS: Operating System (Lesson: Software)
   set of computer programs that runs or controls the computer hardware and acts as a user interface
output: Output (Lesson: Digital Technology)
   the results of the processing
outsourcing: Outsourcing (Lesson: Ecommerce)
   refers to a business’ use of an outside company to take over portions of its workload
patent: Patent (Lesson: Intellectual Property)
   Protects an invention by giving the patent holder a monopoly on the use of the invention for 20 years
PC: PC: Personal Computer (Lesson: Digital Technology)
   General-purpose computer designed to meet the many computing needs of one individual.
PDA: PDA: Personal Digital Assistant (Lesson: Artificial Intelligence)
   a program that draws from a knowledge base in order to answer questions and perform tasks for a person
Perl: Perl (Lesson: Software)
   Popular web server-side programming language
Permissions: Permissions, or file system permissions (Lesson: Data Security)
   Permissions, or file system permissions, refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute.
personal digital assistant: PDA: Personal Digital Assistant (Lesson: Artificial Intelligence)
   a program that draws from a knowledge base in order to answer questions and perform tasks for a person
pervasive computing: Pervasive Computing (Lesson: Digital Life)
   the ability to access computing and information technologies at any time, in any place
phishing: phishing scam (Lesson: Data Security)
   A phishing scam combines fraudulent email with faked websites in order to trick a person into providing private information that can be used for identity theft.
photo editing: Photo Editing (Lesson: Digital Media)
   the process of altering digital photographs, using software tools
PHP: PHP (Lesson: Software)
   Popular web server-side programming language
PI: Personal Information App (Lesson: Software)
   assist people in managing their personal lives, including their contacts, calendar, to-do list, health, and money
PIN: PIN: personal identification number (Lesson: Data Security)
   Machine-level security refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet.
piracy: Piracy (Lesson: Intellectual Property)
   the illegal copying, use, and distribution of digital intellectual property, such as software, music, and movies
pixel: Pixel (picture element) (Lesson: Digital Media)
   Digital images are made up of a grid of small points called pixels
plagiarism: Plagiarism (Lesson: Intellectual Property)
   taking credit for someone else’s intellectual property, typically a written idea, by claiming it as your own
platform: Platform (computing) (Lesson: Digital Technology)
   Describes a computer’s architecture in terms of hardware and software
plug in: Plug-In (Extension or Add-On) (Lesson: Web Technologies)
   works with a web browser to offer extended services such as audio players, video, animation, 3D graphics viewers, and interactive media
podcast: Podcast (Lesson: Digital Media)
   an audio file that contains a recorded broadcast distributed over the Internet
primary key: Primary Key (Lesson: Big Data)
   A primary key is a field (or combination of fields) within a database table that uniquely identifies each record
privacy: Privacy (Lesson: Privacy)
   refers to being free from intrusion; it is the right to be left alone, to be free from surveillance, and to have control over the information collected and stored about yourself
privacy protective laws: Privacy Protective Laws (U.S.) (Lesson: Privacy)
   refer to legislation designed to protect the private information of U.S. citizens
Privacy questions: Self Study Questions(Lesson: Privacy)
   What have you learned?
processing: Processing (Lesson: Hardware)
   carries out the instructions provided by software. Digital devices process bits of data into useful information and services.
productivity software: Download free productivity software(Lesson: Software)
professional app: Professional App (Lesson: Software)
   general-purpose, custom apps required for use at work
programmer: programmer (Lesson: Careers in Computing and Technology)
   develops code used to create software programs designed to tell computers how to process information and perform specific tasks
programming: Programming, Coding, or Computer Programming (Lesson: Software)
   the process of creating software through the use of logic, algorithms, and programming languages
programming language: Programming Language (Lesson: Software)
   provide a set of symbols, commands, and rules (syntax) used to write program code
protocols: Protocols (Lesson: The Internet)
   allow different types of networks to communicate
Python: Python (Lesson: Software)
   popular beginner’s language that is easy to learn
questions: Self Study Questions(Lesson: Digital Life)
   What have you learned?
radio spectrum: Radio Spectrum (Lesson: Telecommunications)
   part of the electromagnetic spectrum, refers to all of the frequencies available for radio waves from about 10 kHz to 300 GHz and their assigned uses
RAM: RAM (Lesson: Digital Technology)
   Random Access Memory: volatile memory optimized for speed.
raspberry: Raspberry Pi (Lesson: Hardware)
   Small, inexpensive motherboard containing entire computer systems used to build all kinds of electronic gadgets
record: Record (Lesson: Big Data)
   A collection of related fields that describe some object or activity. A record is an instance of an entity.
register: Register (Lesson: Digital Technology)
   temporary storage (memory) for data that is directly accessible to the central processing unit
registers: Registers (Lesson: Hardware)
   Hold the bytes currently being processed
relational database: Relational Database (Lesson: Big Data)
   A relational database organizes data into multiple tables that are related by common fields called keys
repeater: Repeater (Network Control Device) (Lesson: Telecommunications)
   Connects multiple network segments
reputation: Reputation (Lesson: Ecommerce)
   Online reputation has become an important consideration when purchaseing online
resolution: Resolution (Lesson: Digital Media)
   relates to number of pixels that make up an image: An image with a lot of pixels is called high resolution
resource: Resources(Lesson: Careers in Computing and Technology)
   Additional links
RFID: RFID: Radio Frequency Identification (Lesson: Telecommunications)
   uses tiny transponders in devices or tags that can be attached to merchandise or other objects and read wirelessly using an RFID reader
RGB: RGB: Red, Green, Blue (Lesson: Digital Media)
   colors are expressed using numbers that represent combinations of intensities of red, green, and blue
robotics: Robotics (Lesson: Artificial Intelligence)
   developing mechanical or computer devices to perform tasks that require a high degree of precision or are tedious or hazardous for humans
ROM: ROM: Read-only memory (Lesson: Hardware)
   Read-only memory (ROM) provides permanent storage for data and instructions that do not change, such as firmware.
router: Router (Network Control Device) (Lesson: Telecommunications)
   Determines the best path for passing a data packet between networks to its destination
RSI: RSI: Repetitive Stress Injury (Lesson: Digital Life)
   occurs when a particular physical motion is repeated frequently, to the point of injur
RSS: RSS: Really Simple Syndication (Lesson: Web Technologies)
   a web technology used to automatically deliver frequently updated web content
Ruby: Ruby (Lesson: Software)
   Popular web server-side programming language
sampling: Sampling (Lesson: Digital Media)
   the process of capturing the value of a sound wave at regular intervals, typically thousands of times per second, to store sound and music digitally
schema: Schema, Database (Lesson: Big Data)
   A database schema is a graphical representation of the structure of a database
scientific notation: Scientific notation(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Very large or small numbers are often displayed in this format.
scientific notation video: How to Write Decimals in Scientific Notation(Lesson: Number Systems: Decimal, Binary, Hexadecimal, RGB Colors)
   Video 2.33 minutes
SDK: SDK: Software Development Kit (Lesson: Software)
   a programming environment designed to write software for a particular computing platform
SDLC: SDLC: Systems Development Life Cycle (Lesson: Ecommerce)
   has six common phases: investigation, analysis, design, implementation, maintenance, and review
search engine: Search Engine (Lesson: Web Technologies)
   a software tool that enables users to find information on the web by specifying keywords
security patch: software update (Lesson: Data Security)
   A software update, sometimes called a security patch, fixes software bugs and flaws and is typically distributed to software users through online software updates.
security questions: Self Study Questions(Lesson: Data Security)
   What have you learned?
self driving cars: Autonomous Vehicles (Lesson: Artificial Intelligence)
   any vehicle that operates autonomously, without the aid of a human
server: Server (Lesson: Digital Technology)
   A powerful computer that often utilizes many processors to provide services to many users simultaneously over a network.
server OS: Server Operating Systems (Lesson: Software)
   control large networked systems and servers
shipping: Shipping (Lesson: Ecommerce)
   Shipping has become a major concern for ecommerce companies
signal: Signal (Lesson: Telecommunications)
   Telecommunications signals are analog or digital electronic transmissions for the purpose of communication
signal frequency: Signal Frequency (Lesson: Telecommunications)
   the speed at which an electronic communications signal can change from high to low
singularity: Singularity (Lesson: Artificial Intelligence)
   the point in time at which computers exceed humans in intelligence
social media: Social Media (Social Networks) (Lesson: Web Technologies)
   websites that allow people to share information, ideas, photos, and other forms of media in virtual communities and to comment on items shared
software: Software (Lesson: Software)
   Software refers to the electronic instructions that govern a computer’s actions in order to provide a computing service.
software development: Software Development (Lesson: Software)
   the systematic process of transforming a software idea into functional software
software development lifecycle: Software Development Life Cycle (Lesson: Software)
   a five-stage process that begins with requirements analysis, proceeds to the design stage, and is followed by implementation, verification (testing), and maintenance
software engineer: Software Engineer (Lesson: Software)
   use programming languages to encode the logic of the software in a manner that a processor can execute
software internet: Software (Internet) (Lesson: The Internet)
   Software transforms data into a form that can travel over the Internet and guides it to its destination
software license: Software License (Lesson: Software)
   defines the permissions, rights, and restrictions assigned to the person who purchases a copy of software
software questions: Self Study Questions(Lesson: Software)
   What have you learned?
software update: software update (Lesson: Data Security)
   A software update, sometimes called a security patch, fixes software bugs and flaws and is typically distributed to software users through online software updates.
SQL: SQL: Structured Query Language (Lesson: Big Data)
   a popular data manipulation language used by the vast majority of database programmers and administrators for manipulating data to meet the needs of the users
SSD: SSD: Solid-State Drives (Lesson: Ethics)
   Solid-State Drives (SSD) are replacing hard disk drives, providing faster data access and dramatic energy savings
SSL certificate: digital certificate (Lesson: Data Security)
   A digital certificate, also called an SSL certificate, is a type of electronic business card that is attached to Internet transaction data to verify the sender of the data.
stateless: Stateless (Lesson: Web Technologies)
   HTTP is classified as a stateless protocol: it does not retain information (a particular state) regarding a user between visits
supercomputer: Supercomputer (Lesson: Digital Technology)
   the most powerful type of computer, often utilizing thousands or even tens of thousands of processors to solve the world’s most difficult problems.
surveillance: Surveillance (Lesson: Privacy)
   the close monitoring of behavior through electronic technologies such as wiretapping, data mining, remote video and audio monitoring, GPS, and RFID
switch: Switch (Network Control Device) (Lesson: Telecommunications)
   makes it possible for several users to send information over a network at the same time
system software: System Software (Lesson: Software)
   any software that coordinates the activities of the hardware and assists the computer in functioning safely, effectively, and efficiently
table: Table (File) (Lesson: Big Data)
   A collection of related records is a table, also called a file in some databases
tag: Tag (Lesson: Web Technologies)
   In a markup language describe the formatting of a page. An HTML tag is a specific command inside angle brackets < and />
TCP-IP: TCP/IP: Transmission Control Protocol/Internet Protocol (Lesson: The Internet)
   The protocols on which the Internet is based
telecommunication devices: Telecommunication Devices (Lesson: Telecommunications)
   include the wide variety of computer hardware designed to support telecommunications
telecommunication media: Telecommunication Media (Lesson: Telecommunications)
   anything that carries a signal and creates an interface between a sending device and a receiving device
telecommunication network: Telecommunication Network (Lesson: Telecommunications)
   include computing and/or communications devices connected together for communications, information, and resource sharing
telecommunication software: Telecommunication Software (Lesson: Telecommunications)
   software based on telecommunications protocols used to control, monitor, and troubleshoot data traveling over a telecommunications network
telecommunications: Telecommunications (Lesson: Telecommunications)
   the electronic transmission and reception of signals for voice and data communications
Telecommunications questions: Self Study Questions(Lesson: Telecommunications)
   What have you learned?
threats, interior: Interior threats (Lesson: Data Security)
   Interior threats are network security threats that originate from within a network, typically from registered users.
TLD: TLD: Top-Level Domain (Lesson: Web Technologies)
   The final portion of the domain name—.com, .co, .edu, .biz, and so on
TPS: TPS: Transaction Processing System (Lesson: Ecommerce)
   an information system used to support and record transactions such as paying for products or paying an employee
trade secret: Trade Secret (Lesson: Intellectual Property)
   Protects secrets or proprietary information of individuals and organizations as long as the trade secret is adequately guarded by those individuals and organizations
trademark: Trademark (Lesson: Intellectual Property)
   Protects a unique symbol or word used by a business to identify a product or service
transparency: Transparency (Lesson: Privacy)
   when a person, business, organization, or government keeps little or nothing secret from the world
Turing test: Turing Test (Lesson: Artificial Intelligence)
   devised by Alan Turing as a method of determining if a machine exhibits human intelligence
twisted pair: Twisted Pair (Cable) (Lesson: Telecommunications)
   Pairs of twisted wires covered with an insulating layer, used for telephone and computer networks
ubiquitous computing: Ubiquitous Computing (Lesson: Digital Life)
   a culture where digital technologies are embedded in the environment, making interaction with the technologies second nature
UI: UI: User Interface (Lesson: Software)
   allows one or more people to have access to and command of a computer system or computer software
uninstalling: Uninstalling Software (Lesson: Software)
   the process of completely removing software from a computer
URL: URL: Uniform Resource Locator (Lesson: Web Technologies)
   acts as a webpage address, incorporating the domain name of the web server and the location of the webpage file on the server
utility software: Utility Software (Lesson: Software)
   any system software besides the OS that assists in maintaining, managing, and protecting computer system resources
variable: Variable (Lesson: Software)
   Named storage for specific types of data
vector graphic: Vector Graphic (Lesson: Digital Media)
   graphic consists of shapes, curves, lines, and text which together make a picture, Vector graphics can be combined in a series to create an animation
video editing: Video Editing (Lesson: Digital Media)
   makes use of special software that allows professionals and amateurs to edit video footage by deleting scenes, combining scenes, and adding transitions and other effects to create a professional-style video production
video game: Video Game (Lesson: Digital Media)
   uses 2D or 3D interactive digital media to provide gaming entertainment for individuals or groups using handheld devices, game consoles, computers, and the Internet
virtual reality: Virtual Reality (Lesson: Digital Media)
   a computer-simulated, three-dimensional environment that can be explored and manipulated by a user
visualization: Visualization (Lesson: Digital Media)
   general term that refers to the use of imagery to communicate an idea. However, in the area of digital graphics, it typically refers to using imagery to experience information in a manner difficult to experience through any other medium
VM: Virtual Machine Software (Lesson: Software)
   also referred to as virtualization software, allows one operating system to run on top of another by creating a virtual machine on which the guest operating system can run
VoIP: VoIP: Voice over Internet Protocol (Lesson: The Internet)
   refers to technologies that support voice communications using the Internet protocol over data networks
W3C: W3C: World Wide Web Consortium (Lesson: Ethics)
   World Wide Web Consortium
WAN: WAN: Wide Area Network (Lesson: Telecommunications)
   connects LANs between cities, across countries, and around the world using microwave and satellite transmission or telephone lines
wearables: Wearables (Lesson: Digital Technology)
   clothing and accessories that incorporate digital technologies. They include smartwatches, bracelets, and glasses.
web: Web: World Wide Web (Lesson: Web Technologies)
   an Internet service that provides convenient access to information and services through hyperlinks
web development software: Web Development Software (Lesson: Web Technologies)
   allows developers to create webpages more easily using a word-processing-style environment and automating complex coding activities
web empowerment: Web Empowerment (Lesson: Freedom of Speech)
   the power that the web provides for individuals to express themselves, influence others, and affect the course of society
web programming: Web Programming (Lesson: Web Technologies)
   the development of software written to run either in a web browser or on a web server, using web-based input and output
web server: Web Server (Lesson: Web Technologies)
   software that fulfills webpage requests from web clients and to the computers that run such software
web technologies: Web Technologies (Lesson: Web Technologies)
   the hardware, software, and protocols that allow the web to exist
web technologies questions: Self Study Questions(Lesson: Web Technologies)
   What have you learned?
Wi Fi: Wi-Fi: Wireless Fidelity (Lesson: Telecommunications)
   wireless networking technology that uses access points to wirelessly connect users to networks within a range of 250–1,000 feet
wireless access point: Wireless Access Point (Network Control Device) (Lesson: Telecommunications)
   a Wi-Fi device, connected to a wired or cellular network to send and receive data to wirelessly
wireless adapter: Wireless adapter (Lesson: Telecommunications)
   A circuit board, PC card, or an external device that connects through an antenna-equipped USB port that is able to send and receive network radio signals
wireless data communication: Wireless Data Communication (Lesson: Telecommunications)
   telecommunications that take place over the air to provide data and Internet accessy
wireless security: Wireless security (Lesson: Data Security)
   Wireless security refers to the unique threats and defenses associated with wireless computer networks.
www: WWW: World Wide Web (Lesson: The Internet)
   introduced in the early 1990s by Tim Berners-Lee, provided a graphical user interface to the Internet that launched the digital information revolution
zettabyte: Zetabyte (2 to the 70th power) (Lesson: Digital Life)
   1,000,000,000,000,000,000,000 bytes