click below
click below
Normal Size Small Size show me how
Today's Technology
Introducing Today's Technology
| Term | Definition |
|---|---|
| Laptop | Also called a notebook computer, is a thin, light-weight mobile computer with a screen in its lid and a keyboard in its base. |
| Computer | An electronic device operating under the control of instructions stored in its own memory. |
| Tablet | A thin lighter weight mobile computer that has a touch screen. |
| Desktop | A personal computer designed to be in a stationary location. |
| All in One | Does not use a tower and instead uses the same case to house the display and the processing circuitry. |
| Server | A computer dedicated to providing one or more services to other computers or devices on a network. |
| Smartphone | An internet capable phone that usually includes a calendar, address book, notepad, games and other apps. |
| Digital Camera | A device that allows you to take photos and store the photographed images digitally. |
| Portable Media Player | A mobile device on which you can store, organize and play or view digital media. |
| E-Book Reader | A mobile device that is used primarily for reading e-books. |
| Wearable Device | A small, mobile computing consumer device designed to be worn. (Fit bit, smart watch) |
| Game Console | A mobile computing device designed for single-player or multi-player video games. |
| Digital Device Convergence | Consumers may need fewer devices for the functionality that they require. |
| Input Device | Any hardware component that allows you to enter data and instructions into a computer or mobile device. |
| Output Device | Any hardware component that conveys information from a computer or mobile device to one or more people. |
| Printer | An output device that produces text and graphics on a physical medium such as paper. |
| Memory | Electronic components that store instructions waiting to be executed and the data needed by those instructions. |
| Storage Media | Examples of storage media include hard disks, sold-state drives, USB flash drives, memory cards and optical disks. |
| Storage Device | Records and/or retrieves items to and from storage media (DVD Drive) |
| Cloud Storage | Internet service that provides remote storage to computer users. |
| Back up | A duplicate of content on a storage medium that you can use in case the original is lost, damaged or destroyed. |
| Internet | A worldwide collection of computer networks that connects millions of businesses, government agencies, educational institutions, and individual. |
| Web | A worldwide collection of electronic documents. |
| Web page | An electronic document on the internet. |
| Web site | A collection of related web pages. |
| Web server | A computer that delivers requested web pages to your computer or mobile device. |
| Browser | Software that enables users with an Internet connection to access and view web pages on a computer or mobile device. |
| Search Engine | Software that finds web sites, web pages, images, music and videos. |
| Online Social Network | A web site that encourages members in its online community to share their interests, ideas, stories, photos, music and videos with other registered users. |
| Green computing | Reducing the electricity consumed and environmental waste generated when using a computer. |
| Software | A series of related instructions, organized for a common purpose that tells the computer what tasks to perform and how to perform them. |
| Application | Programs to designed to make users more productive and/or assist them with personal tasks. |
| Communication Device | Hardware capable of transferring items from computers and devices to transmission media and vice versa. |
| Bluetooth | Uses short-wave radio signals to enable Bluetooth-enabled computers and devices to communicate with each other. |
| Cell phones | All phones that use mobile, cellular technology. |
| Telephony | The use of equipment to provide voice communications over a distance |
| Feature phones | Inexpensive phones that have modest processors, simpler interfaces, and often no touch screen. |
| Base Transceiver Station | A large communications tower with antennae, amplifiers, receivers and transmitters. |
| Mobile Switching Center | Monitors the strength of the signal between your cell phone and the closest base station. |
| Analog to digital converter chip | Converts the sound wave of your voice into digital signals. |
| Digital Signal Processor | Compresses the digital signal of your voice so that it will transnit more quickly to another phone. |
| Voice Over Internet Protocol (VOIP) | A voice based internet communication that turns a standard internet connection into a means to make phone calls. |
| GPS | A network of 21 satellites that constantly orbit earth. |
| Synchronizing | Updating your data so that your information on your cell phone and computer are the same. |
| SMS (Short Messaging Service) | A technology that lets you send short text messages, up to160 characters, over cellular networks. |
| MMS (Multi-Media Messaging Service) | A technology that lets you send messages that include text, sound, images and video clips to other phones or e-mail addresses |
| Cloud Computing | An environment that provides resources and services accessed via the Internet |
| Computer Vision Syndrome | A technology-related health condition that affects eyesight. |
| Connector | Joins a cable to a port |
| Digital Media Player | A device, typically used in a home, that streams digital media from a computer or network to a television, projector or some other entertainment device. |
| Embedded Computer | A special-purpose computer that functions as a component in a larger product. |
| Ergonomics | An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. |
| Handheld game device | A small mobile device that contains a screen, speakers, controls, and game console all in one unit. |
| Mobile Computer | A portable, personal computer, such as a laptop or tablet, designed so that a user can carry it from place to place. |
| Mobile Device | A computing device small enough to hold in your hand. |
| NFC | Near Field Communication used close-range radio signals to transmit data between to NFC-enabled devices. |
| Overvoltage | aka Power Surge, occurs when the incoming electrical supply or voltage increases, often defined as more than 5%, above normal volts. |
| Port | The point at which a peripheral device attaches to or communicates with a computer or mobile device. |
| Power Surge | aka Overvoltage, occurs when the incoming electrical supply or voltage increases, often defined as more than 5%, above normal volts. |
| Resolution | The number of horizontal and vertical pixels in a display. |
| Surge Protector | Uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment. |
| Technology Addiction | When technology use consumes someone's entire social life. |
| Undervoltage | Occurs when the electrical supply or voltage drops, often defined as more than 5%, below the normal volts. |
| Uninterruptible power supply | A device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. |
| USB port | Universal serial bus port, can connect up to 127 different peripheral devices together with a single connector. |
| Wi-Fi | Wireless Fidelity - uses radio signals that conform to 802.11 standards |
| Adware | A program that displays an online advertisement in a banner, a pop up window or pop-under window. |
| Back door | A program or set of instructions in a program that allows users to bypass security controls when accessing a program. |
| Biometric Device | Authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into digital code. |
| Botnet | A group of compromised computers or mobile devices connected to a network that are used to attack other networks. |
| Code of Conduct | A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed. |
| Computer Crime | Any illegal act involving the use of a computer or related devices |
| Content filtering | The process of restricting access to certain material. |
| Cookie | A small text file that a web server stores on your computer. |
| Cracker | Someone who accesses a computer or network illegally with the intent of destroying data, stealing information or other malicious action. |
| Cybercrime | Online or internet-based illegal acts such as distributing malicious software or committing identity theft. |
| Cyberextortionist | Someone who demands payment to stop an attack on an organization's technology infrastructure. |
| Cyberterrorist | Someone who uses the Internet or network to destroy or damage computers for political reasons. |
| Decrypt | The process of decoding data. |
| Denial of Service Attack | An assault whose purpose is to disrupt computer access to an internet service, such as the web or email. |
| Digital Certificate | A notice that guarantees a user or a website is legitimate. |
| Digital Forensics | The discovery, collection and analysis of evidence found on computers and networks. |
| Digital Security Risk | Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information or processing capability. |
| Digital Signature | An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender. |
| Disaster Recovery Plan | A written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster. |
| Employee Monitoring | The use of computers, mobile devices or cameras to observe, record and review an employees use of a technology. |
| Encryption | The process of converting data that is readable by humans into encoded characters to prevent unauthorized access. |
| Fingerprint reader | Captures curves and indentations of a fingerprint. |
| Firewall | Hardware and/or software that protects a network's resources from intrusion by users on another network, such as the Internet. |
| Hacker | Someone who accesses a computer or network illegally |
| Information Privacy | The right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them. |
| Information Theft | When someone steals personal or confidential information. |
| License Agreement | The right to use software. |
| Malware | Programs that act without a user's knowledge and deliberately alter the operation of computers and mobile devices. |
| Online security service | A web app that evaluates your computer or mobile device to check for Internet and email vulnerabilities. |
| Password | A private combination of characters associated with the user name that allows access to certain computer resources. |
| Personal firewall | A software firewall that detects and protects a personal computer and its data from unauthorized intrusions. |
| Phishing | A scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information. |
| Pin | Sometimes called a passcode, is a numeric password. |
| Piracy | The unauthorized and illegal duplication of copyrighted software |
| Product Activation | A process to ensure the software is not installed on more computers than legally licensed. |
| Restore | Copying the backed up files to their original location on the computer or mobile device. |
| Script kiddie | Someone who has the same intent as a cracker but does not have the technical skills and knowledge. |
| Secure site | A website that uses encryption techniques to secure its data |
| Social engineering | Gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims. |
| Software piracy | The unauthorized and illegal duplication of copyrighted software. |
| Software theft | Occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program. |
| Spoofing | A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. |
| Spyware | A program placed on a computer or mobile device without the user's knowledge that secretly collects information about the users and sends it to an outside source. |
| Technology ethics | The moral guidelines that govern the use of computers, mobile devices, information systems and related technologies. |
| Two-step verification | A computer or mobile device uses two separate methods, one after the next, to verify the identity of a user. |
| User name | A unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. |
| Web filtering software | A program that restricts access to specified websites. |
| Zombie | A compromised computer whose owner is unaware the device is being controlled remotely by an outsider. |
| Accounting software | An application that helps businesses of all sizes record and report their financial transactions. |
| Adware remover | A program that detects and deletes adware. |
| Anti-spam program | A filtering program that attempts to remove spam before it reaches your inbox or forum. |
| Antivirus program | Protects a computer against viruses by identifying and removing any computer viruses found in memory. |
| App | Short for application. |
| Application | Programs designed to make users more productive and/or assist them with personal tasks. |
| Audio editing software | An application that enables users to modify audio clips, produce studio-quality soundtracks and add audio to video clips. |
| Backup tool | Allows users to copy or back up selected files or the contents of an entire storage medium to another storage location. |
| Calendar and contact management software | An application that helps you organize your calendar, keep track of your contacts and share this information with other users, who can share this information with other users. |
| Clip art/image gallery | A collection of clip art and photos. |
| Computer-aided design | An application that assists professionals and designers in creating engineering, architectural and scientific designs and models. |
| Database | A collection of data organized in a manner that allows access, retrieval and use of that data. |
| Database software | An application that allows users to create, access, and manage a database. |
| Desktop publishing software | An application that enables designers to create sophisticated publications that contain text, graphics and many colors. |
| Disc burning software | Writes text, graphics, audio, and video files on a recordable or rewritable disc |
| Disk cleanup | A tool that searches for and removes unnecessary files. |
| Disk defragmenter | A tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster. |
| Document management software | An application that provides a means for sharing, distributing and searching through documents by converting them into a format that can be viewed by any user. |
| File compression tool | Shrinks the size of a file. |
| File manager | A tool that performs functions related to file management. |
| Folder | A specific named location on a storage medium that contains related files. |
| Image editing software | An application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images. |
| Image viewer | A tool that allows users to display, copy, and print the contents of a graphics file, such as a photo. |
| Legal software | An application that assists in the preparation of legal documents. |
| Media player | A program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device. |
| Multimedia authoring software | Allows user to combine text, graphics, audio, video and animation in an interactive application. |
| Note taking software | An application that enables users to enter typed text, handwritten comments, drawings, sketches, photos and links anywhere on a page and then save the page as part of a notebook. |
| Paint software | An application that allows users to draw pictures, shapes and other graphics with various on-screen tools. |
| PC maintenance tool | A program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance. |
| Portable Document Format | |
| Personal Finance software | A simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and evaluate financial plans. |
| Personal firewall | A security tool that detects and protects a pc and its data from unauthorized intrusions. |
| Photo editing software | A type of image editing software that allows users to edit and customize digital photos. |
| Photo management software | Allows you to view, organize, sort, catalog, print and share digital photos. |
| Pop under blocker | A filtering program that stops pop unders from displaying on web pages. |
| Pop up blocker | A filtering program that stops pop ups from displaying on web pages. |
| Presentation software | An application that allows users to create visual aids for presentations to communicate ideas, messages and other information to a group. |
| Program | A series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. |
| Project management software | An application that allows a user to plan, schedule, track and analyze the events, resources and costs of a project. |
| QR code | A square-shaped graphic that represents a web address or other information. |
| restore tool | Reverses the back up process and returns backed up files to their original form. |
| screen saver | A tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time. |
| search tool | A program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app or any other item stored on your computer or mobile device. |
| software | A series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them. |
| software suite | A collection of individual related applications available together as a unit. |
| spam | Unsolicited email message. |
| spreadsheet software | An application that allows users to organize data in columns and rows and perform calculations on the data. |
| spyware remover | A program that detects and deletes spyware and similar programs. |
| tax preparation software | An application that can guide individuals, families or small businesses through the process of filing taxes |
| uncompress | Restoring a compressed file to its original form. |
| uninstaller | A tool that removes a program, as well as any associated entries in the system files. |
| video editing software | An application that enables users to modify audio clips, produce studio-quality soundtracks and add audio to video clips. |
| virus | A potentially damaging program that affects a computer or device negatively by altering the way it works. |
| web filtering software | A program that restricts access to certain material on the web. |
| website authoring software | Helps users of all skill levels create related webpages that include graphics, video, audio, animation, special effects with interactive content and blog posts. |
| word processing software | An application that allows users to create and manipulate documents containing mostly text and sometimes graphics. |
| worksheet | A collection of rows and columns. |
| zipped files | Another name for a compressed file. |