2.1.1+System+Fundamentals+KEY+TERMS+(y1)

===In the space below, write your key terms (in ALL CAPS), followed by the best definition you found for your term(s). Along with the definition provide an example to go along. A visual example is preferred (an embedded image, video link, etc.), but if your term is hard to visualize, a written example will suffice.===


 * COMPUTER MEMORY** - It is the internal storage space in a computer. It exists in two basic types of memory: ROM and RAM. ROM, read-only memory, holds data that is prerecorded for read only, and can not be removed. RAM, random access memory, holds data that can be accessed, changed, or removed. RAM is generally the primary storage space in computers.

Here is an easy way to remember:




 * VERIFICATION AND VALIDATION** - It is the process of checking that a software system meets specific goals or its intended purpose. It is mainly practiced in software project management, software testing, software engineering.

-- ChingFung


 * DATA** - Data refers to a collection of organized information, usually the result of experience, observation or experiment, other information within a computer system, or a set of premises. This may consist of numbers, words, or images, particularly as measurements or observations of a set of variables.


 * TB (Tera Byte)** - A trillion bytes, 1,000,000,000,000 bytes, 10004 or 1012 bytes.

1221736171
 * LOGIC BOMB -** A piece of code intentionally inserted into a software system (Usually viruses) that will set off a malicious function when specified conditions are met. The most common use is to erase data automatically after the conditions are met. Trial software that are set to deactivate after a certain time are not considered logic bombs. Logic bombs are not necessary Time Bombs, some conditions in a logic bomb program does not involve the time variable.

Example:
 * American Standard Code for Information Interchange** (**ASCII**)- is a character encoding based on the English alphabet. ASCII codes represent text in computers, communications equipment, and other devices that work with text.

Example: Java, .Net Framework, Operating System(Windows, Mac OS, linux, Solaris)
 * Platform**- is an underlying computer system on which application programs run. A platform includes an operating system, the coordinating program, and a microprocessor.

Example: everything on this page is information, you are reading information 1221720556  **PROCESSING** -    the converting of raw data to machine-readable form and its subsequent processing (as storing, updating, rearranging, or printing out) by a computer. [|www.m-w.com]  Example:<span style="color: rgb(0, 128, 0)">www.luminous-landscape.com <span class="sense_content"><span style="color: rgb(255, 146, 31)">Example:<span style="color: rgb(0, 128, 0)">www.imedeen.co.uk 1221718873
 * Information**-Data that have been processed and presented in a form suitable for human interpretation, often with the purpose of revealing trends or patterns.
 * BAR CODE** - <span class="sense_content">a code consisting of a group of printed and variously patterned bars and spaces and sometimes numerals that is designed to be scanned and read into computer memory and that contains information (as identification) about the object it labels. [|www.m-w.com]

example -:**Input** **devices:** Keyboard, Mouse, CD drive, ADSL DSL Moderm (input and output). **Output devices:** Monitor, Printer, Internet Cable (outgoing signals from the computer) example : Itunes, Safari and Mac OS; Adobe Photoshop, Computer Games and Windows <span style="font-size: 11pt; color: rgb(51, 51, 51); line-height: 115%; font-family: 'Calibri','sans-serif'">**-hardware** capable of being connected to another device without the use of special equipment or software. example : Hard drive, Disc drive, Monitor, USB, Ipod and the computer. example : the keyboard, mouse, touch pad etc etc 1221719434
 * HARDWARE COMPONENTS** - main memory, secondary memory, central processing unit (CPU), output devices <span style="color: rgb(0, 128, 0)">vh216602.truman.edu/agarvey/cs170/exam1terms.html
 * COMPATABLITY -** <span style="font-size: 11pt; color: rgb(51, 51, 51); line-height: 115%; font-family: 'Calibri','sans-serif'">**software** capable of being run on another computer without change. [|www.dictionary.com]
 * PERIPHERAL** - External devices connected to the computer used for human interface.

=<span style="color: rgb(234, 11, 101)"><span style="color: rgb(255, 0, 159)"><span class="sense_content">Computer Data Storage  =

<span style="color: rgb(234, 11, 101)"><span style="color: rgb(255, 0, 159)"><span class="sense_content">
<span style="color: rgb(234, 11, 101)"><span style="color: rgb(255, 0, 159)">**Computer data storage**, often called **storage** or **memory**, refers to computer components, devices, and recording media that retain digital data used for computing for some interval of time. Computer data storage provides one of the core functions of the modern computer, that of information retention. It is one of the fundamental components of all modern computers, and coupled with a central processing unit(CPU, a processor), implements the basic computer model used since the 1940s. (http://en.wikipedia.org/wiki/Computer_storage) Above is a SDRAM which is mounted into a computer. =<span style="color: rgb(234, 11, 101)"><span style="color: rgb(255, 0, 159)">Baud = <span style="color: rgb(234, 11, 101)"><span style="color: rgb(255, 0, 159)">BaudIn telecommunications and electronics, **baud** (pronounced /bɔːd/ unit symbol "Bd"), is a measure of the symbol rate, the number of distinct symbol changes (signalling events) made to the transmission medium per second in a digitally modulated signal. The baud is named after Emile Baudot, the inventor of the Baudot code for telegraphy. <span style="color: rgb(234, 11, 150)"><span style="color: rgb(233, 22, 195)"><span style="color: rgb(0, 0, 0)">1221731111

**MHz**
Stands for //megahertz//. Mhz is used to measure the clock speed (speed of microprocessors). One MHz represents one million cycles per second. MHz can generally determine how powerful the microprocessor is.

**Encryption/Decryption**
Encryption is the translation/conversion of data into a secret code. It is frequently used to achieve data security. Unencrypted data is called //plain text//, while encrypted data is called //cipher text//. There are two main types of encryption: asymetrical encryption (a.k.a. public-key encryption) and symmetrical encryption. Decryption is the translation/conversion of the code into readable data. In order to decrypt data, a key or password is required.

1221765372

**Input Device**
An **input device** is any peripheral that can be inserted into the computer to transmit signals or data. Examples of input devices include keyboards and mice. **A monitor is NOT an input device**, but rather an output device as it displays information sent to it by the computer. - Phil Cao

OUTPUT DEVICES! An output device is any piece of computer hardware equipment used to communicate the results of data processing carried out by an information processing system (such as a computer ) to the outside world. go to http://www.youtube.com/watch?v=Eu2-VKPqLQI for more information - guy with scottish accent explains about output devices. 1222071547

OMR! Optical Mark Reader (OMR), also called “mark sensing”, is a method of scanning technology in which data is input via marks made in predefined positions on a form and entering data into a computer system. Therefore, OMR is best for handling discrete data, where values fall into a limited number of values. For examples, sex, occupation, religion, etc. http://img1.tradeget.com/lxnhii666%5CPRYPNBN0148fs_.jpg

**OCR**
- Phil Cao
 * O**ptical **C**haracter **R**ecognition, or **OCR**, is translation of physical (e.g. handwritten, printed, typewritten etc) text into a form that is machine editable. (For example scanning a handwritten essay and translating it to become editable on a computer.) Most machines are now intelligent enough to recognize most fonts. This technology is still being researched.

=Firewall= A firewall is a device or set of devices used to permit, deny, encrypt, decrypt, or proxy computer traffic between different security domains based upon a set of rules and other criteria. An example of a firewall would be window's firewall, NOD32, or Nortan Antivirus. 1221996011

=Dots per inch= 1221996011
 * Dots per inch** (**DPI**) is a measure of spatial printing or video dot density, in particular the number of individual dots that can be placed within the span of one linear inch. However, a digitally stored image has no inherent physical dimensions, measured in inches or centimeters. Some digital file formats record a DPI value, or more commonly a pixels per inch value, which is to be used when printing the image.

BIT - a bit is a binary digit at the simplest form of digital information storage unit used by the computer. Binary digits can be either 1 or 0, or “on” or “off”. The symbol “bit” or “b” is used for the unit. A series of bits of 1's and 0's together represent a character or number. 1222045265

VIRUS – an exactable file or application designed to carry out tasks not wanted by the primary users of the computer. It could delete important user files or breach the confidential information stored on the computer. It is a type of computer programme that could run without the user knowing and often contains the ability to interfere with the normal functionality of the computer. It usually includes the characteristics of replicating and redistributing itself. 1222046416

1222092644
 * KB** – kilobyte is a unit used of information or computer storage, which usually represents 1024 bytes (2^10), such as memory chip capacities. Most software also expresses storage capacity in units of 1024 bytes. When it is used to describe data transfer rates, which is a measure of how fast data is transferred from one location to another, kilobyte represents 1,000 bytes.

1222092790
 * Trojan Horse** – in Greek history the Trojan Horse was a giant hollow horse containing Greek soldiers. They drove the horse into the city of Troy and unexpectedly the Greek soldiers emerged out and overtook the city during the Trojan War. The computer virus Trojan Horse is malware, which was named after this episode. As the virus enters the computer system, it looks like something useful, but in fact it performs hidden malicious functions. The Trojan horse in affect creates a vulnerable system to allow unauthorized access to the user’s computer.


 * Worm -** A worm is a self-replicating virus that does not alter files but resides in the active memory and duplicates itself. Worms use part of an operating system that are automatic and are commonly invisible to the user. The worm is usually noticed only after their constant replicating consumes the computer's resources, slowing down or even stopping other tasks. (http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213386,00.html)


 * MB (MegaByte) -** A unit of storage capacity in computers which is equal to 1024 KB or over 1 million bytes. (http://www.hddtech.co.uk/resource/hard-disk-glossary.htm)
 * 1222118309**