Term
|
Definition
Programms that run inside the computer |
|
|
Term
|
Definition
Refers to physical devices such as computer,discs, monitorsand mouse. |
|
|
Term
|
Definition
|
|
Term
|
Definition
any input, output or storage connected to the l/O port |
|
|
Term
|
Definition
read only memory
Cant be changed
stores intructions nfor computer setup |
|
|
Term
|
Definition
Random Access Memory
fast temporary memory |
|
|
Term
|
Definition
a block of extra fast ram located on the cpu.
|
|
|
Term
|
Definition
equivalent to ram but is non volitile |
|
|
Term
|
Definition
remote storage of date via the internet
eg. Google drive |
|
|
Term
|
Definition
Universal serial bus
*connecting devices |
|
|
Term
|
Definition
will state the capacity of the computers ram
every app needs a certain amount of ram |
|
|
Term
|
Definition
software suitable for mangaing info in a table format |
|
|
Term
|
Definition
|
|
Term
|
Definition
a computerised filling system |
|
|
Term
|
Definition
allows ser to imitate a process to see how it would behave in the real world |
|
|
Term
|
Definition
|
|
Term
|
Definition
Computer aided manufacture |
|
|
Term
|
Definition
a type of cam coumputer uses data from cam to operate machines |
|
|
Term
|
Definition
a 3d model or drawing can be input to a 3d printer to create a 3 dimensional shape |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
the protocol used to transmit web pages over the internet |
|
|
Term
|
Definition
a secure version of Https.
Encrypted |
|
|
Term
|
Definition
user must pay to to use this software .
they do not have access to the sorce code |
|
|
Term
|
Definition
free to use.
source code is locked |
|
|
Term
|
Definition
free to use
soure-code is open to modification |
|
|
Term
|
Definition
local area wireless technology |
|
|
Term
|
Definition
pieces of data from a website stored on a users computer or web browser |
|
|
Term
|
Definition
malicious software
eg. viruses |
|
|
Term
|
Definition
hacking, copyright, malware ect. |
|
|
Term
|
Definition
attempt to acuire private information eg. password by pretending to be somebody else |
|
|
Term
|
Definition
a security system that controls incoming and outgoing traffic between a computer and the internet. |
|
|
Term
|
Definition
installs a firewall on your comuter |
|
|
Term
|
Definition
legally protects owners of info, images ,sound and music. |
|
|
Term
|
Definition
network that covers a small area such as a school. |
|
|
Term
|
Definition
network that covers a large geographical area. |
|
|
Term
|
Definition
thin flexible pieces of glaas or plastic.
they transmit info through pules of light. |
|
|