合集
2023-12-13 17:55:00 1 举报
登录查看完整内容
花海123
作者其他创作
大纲/内容
Node
Mesh network
tiniversal serial bus (USB) ports
Menus
General-purpose applications
Providers
Specialized Applications
Web Utilities
Windows
Virtual private networks (VPN)
Desktop operating systems
Private Networks
ROM
Joysticks
Groups
Metropolitan Area Networks
Word processors create text-based documents and are one of the most flexible andwidely used software tools
Baseband
Networks
Internet scams
Wireless Connections
App Stores
ALook lo the Future:Next-Generatlon Starage
3D Printers
FireWire buses
Data Transmission
Numeric Representation
Digital Millennium Copyright Act
LCD Ciquid crystal display)
A Look to the Future: Telepresence Leta You BeThere without Actually Being There
File compression and file decompression
A cable modem
Solid-state drives (SSDs) store and retrieve data and information much in the samemanner as RAM.
Digital versatile discs (DVDs
Star network
Thermal printers
Features
Email
an intranet
Memory
Specialized and Utility Suites
Electronic commerce
Password managers
Color capability
Host
Spreading inaccurate information
USB Drives
8105 (basic input/ouiput system).
A Look to the Future: End of Anonymity
Authority
Web-based e-mail systems
Optical Scanners
Network administrator
Presenttation files
USB-A
software
Firewalls
Careers in IT
Twisted-pair cable
Internet Access
Accuracy
Virtualization
1G
Network Security
Search Tools
Mobile apps
Touch Screen
Character Encoding
Cell phones
Galleries
小唐
Network Architecture
Measures to Protect Computer Security
Bluetooth
Motion-sensing devices
Home Networks
Friends
Secondary storage
Content Evaluation
Image Capturing Devices
Broadband
Flash Memory Cards
Tabs
WhatIs Input?
Laptops
Currency
Connectivity
Ports
Types of Computers
Edit options
Chapter 4 SYSTEM SOFTWARE
Coaxial cable
laptop keyboards
Power Supply
Directory server
Backup programs
Capacity
Addresses
Obicctivitw
Security
Robots
Cestore conirol
Internet Technologies
Profiles
Preventing Data Loss
Share settings
Input is any data or instructions entered into a computer.
Spreadsheets
Big Data
Malicious Software
Flat-PanelMonitors
Other Monitors
Operating systems
Fonts and font sizes
Network interface cards (NIC)
Bus Lines
Ethernet ports
third-party cookie
bus lines
system software
MaxiCode
Copyright
Antivirus programs
Consumer-to-consumer (C2C)
The most common way to access the Internet is through anInternet service provider (ISP)
Smartwatches
VGA (Video Graphics Adapter) and DVI (Digital Video Interface) ports
Video
Image editors
Storese management programs
Storage Area Network
Printers
Organizational Networks
Tead messaging
Communicafion
Document files
Write-once
Fash Memony
Troubleshooting or diagnostic programs
Componerts
pinch & stretch
Solid.State Drives
Storage devices
Midrange computers
Mobile Apps
Connection Service
Viruses
Security suites
RAM
Medium band
Filtens
Communications
Website encryption
Character and Mark RecognitionDevices
Texting
FireWire ports
Resolution
Icons
Mainframe computers
Web-based file fransfer services
Enterprise Storage System
Device Drivers
Bandwidth
notebook computers
Physical Connections
Back and neck pain
Search Engines
Performance Enhancements
Cloud printers
Client-based e-mail systems
Personal Computer Hardware
macOS
Iraditional keyboards
Other Printers
Desktogs
Pages
Mrtual keyboards
Chapter 5 THE SYSTEMUNIT
Browsers
Utility suite
Portable scanner
Inkjet Printers
Oyhicalaharacter reupltion (OCR)
USB-B
IOS
Maeticink cheracter recgnition (MICR)
Messaging
Input/output
Cyberbullying
Fiber-opti cable
Digital projectors
The Internet of Things
Portable Computers
Application Software
Major Laws on Privacy
Alignment
Storage
System unit
Gaming laptops
Chapter 6 INPUT AND OUTPUT
A Look to the Future: Using and UnderstandingInformation Technology
E-mail encryption
Mass Storage Devices
File sharing and collaboration
Specialized and Utility Suite
Langauge Translators
Specialized Ports
Anticipating Disasters
Dialog beves
Slots
Bar Code Readers
Webcams
Operating Systems
Graphics cards
Shopping
Cable service
Toolbars
redundant arravs of inexpensive disks (RAID)
Tree network
Combination Input and OutputDevices
pile transfer protocol (FIP)
Active display area
Rewritable
Infected USB flash drives
Server
Ebook Readers
Secialty Processors
Document scanner
Flatbed scanner
What ls Output?
Expansion Buses
Common Features
lrojan horses
Ergonomics
Denial of service attacks
Iiber-optic service (FiOS)
Chapter 2 THE INTERNET THE WEB ANDELECTRONIC COMMERCE
Identity theft
Cybercrime or computer crime
Intrusion detection systems (IDS)
Thunderbolt ports
File servers
Client/server networks
Social Engineering
Software Suites
Chapter 1 Information Technology The Internet And You
Specialized applications
Router
UNIXand Linux
A DSL (digital subscriber line) modem
Keyboards
Wireless network encryption
Managing resources
Wearable Computers
RAID systems
Ribbons
peer-to-peer (P2P)network
Videoconferencing
Organizational cloud storage
Web Authoring Programs
Desktop computers
UPCs (Universal Product Codes)
Packetization
Presentation Software
application software
Ultrabooks
Voice Recognition Systems
Wide Area Networks
Find and Replace
Date
Digital or interactive whiteboards
Smartphones
Terms
Output is processed data or information.
Cloud Storage
VR head-mounted displays
5G
&send otMljos
Game Controllers
Network attached storage (NAS)
Access speed
Modems
Malicious Hardware
Electronic Commerce
Monitors
Cellular
A Look to the Future: Brain-ComputerInterfaces
Digital Cameras
Chapter 8 COMMUNICATIONS AND NETWORKS
Keyboard Entry
General-Purpose Applications
Plagiarism
cloud computinguses the Internet and the web to shift many of these computer activities from theuser' computer to other computers on the Internet.
Graphics Programs
Access
Solid-State Storage
Duplex printing
Video Game Design Software
Supercomputers
Aspect ratio
Character effects-
Laser Printers
Running applications
Word Processors
LED (ightemitting diode)
Multifunctional Devices
Internet Security Suites
Software engineers analyze users' needs and create application soft-ware. Software engineers typically have experience in programmingbut focus on the design and development of programs using the principles of mathematics and engineering
Spreading information without personal consent
Communication
Utilities
Media
Drones
Categories
Flexible screens
Blu-ray discs (BDs)
Pointing Devices
Communication Systems
Property
Windems
Topologies
Virtual Reality Head-Mounted Displaysand Controllers
Office Suites
Mcroprocessor Chips
Strategies
Music
Physical security
A Look to the Future: The Internet ofThings
News feed
Client
Ethics
Electronic Data andInstructions
Connection Devices
System Software
Universal serial bus (USB)
WiMax (Worldwide Interoperability for Microwave Acess)
Rogue W-Fi hotspots
Personal computers
History files
Scanning Devices
Wi-Fi (wireless fidelity)
Voiceband
Maintenance
Expansion Cards and Slots
Pvesestatian sofware are prograims that combine a variety of visual objects to createwrethe
System Board
Hardware
Operatiog systems
5ockets
the Internet of Things (loT) is the continuing development of the Internet thatallows everyday objects embedded with electronic devicesto send and receive dataover the Internet.
E-mail
Mobile Operating Systems
Gaming
Network Drives
Datebase files
Contrast ratios
Andrnid
Disk caching
Standard Ports
Audio-Output Devices
3G
Data security
Ring network
Network operating systems (N0S)
Tabiets
Database Management Systems
Gaming mice
Ransomware
Laptop computers
Protocols
Plotters
Wireless network cards
Worms
Repetitive strain injury: Repetitive strain injury (RSI)
4G
hatellite connection services
Hardware upgrades
Switch
Privacy
Dical cash
Communication Channeis
System Unat
Online ldentity
Mouse
A wireless modem
Careers in IT
File Transfer Utilities
Spell checker-
User Interface
Careers in IT
Headsets
https (hypertext transfer protocol secure)
Careers in T
Headphones
Chapter 7 SECONDARY STORAGE
Microprocessor
OLED (organic light emitting diode)
Siri
People
Speed
Pointer
Wireless LAN
Apps
langyage txusators
External Hard Disks
Functions
Social networking
Dialog boxes
Embedded operating sstems
File encryption
Device driyers
Cloud Computing
Digital subscriber line (DSL) service
Dot (pixel) pitch
The Wireless Reyolution
Network operating systems (NOS)
An extranet
小艺
Authentication
Copyright and Digita/ RightsManagement
Smarerones
Personal Area Network
MMS (Multimedia Messaging Service)
BitTorrenf
Eyestrain and headache
Satellite
Mini DisplayPort (MiniDP or mDP) ports
Gamepads
Readonly (ROM for read-only memory) discs
A firewall consists
Zombies
Card Readers
Secerity
Aetivity trackers
Bus network
Virtual private networks: Virtual privatenetworks (VPNs)
Optical Discs
first party cookie
Stand-alone operating systems
The Internet and the Web
Video editors
Subject
Search programs
Identification
Soclal Networking
Cell Phones
Internal Hard Disks
Local Area Networks
Restricting Access
Memony
Microwave
Business-to-consumer (B2C)
USB-C
2G
PCI Express (PCle)
High Definition Multimedia Interface (HDMI) ports
Network Types
Clular service praviders
Help
Ilustration programs
小布
Virtual assistants
File security
Other Specialized Applications
Desktop publishing programs
VR controllers
Games
Worksheet files
Flash memory cards are small solidstate storage devices widely used iportable devices
Encrypting Data
Hard Disks
Chapter 3APPLICATION SOFTWARE
Providing user interface:
Tablets
Instant messaging (IM)
RFID Readers
Data manipulation
Audio-lnput Devices
Cables
Hybrid drives
Temporary Internet files
3D scanners
0 条评论
回复 删除
下一页