You are on page 1of 23

TECHNOLOGY TERMS

PRESENTATION
UIS 350 Technology in Education
By Jaime Rankin

This Photo by Unknown Author is licensed under CC BY-NC-ND


This Photo by Unknown Author is licensed under CC BY-NC-ND This Photo by Unknown Author is licensed under CC BY

NOW, let’s get started and explore what our computer can do for us by
learning a few terms.
Zip is a process of making a file smaller.
Unzip is restoring the file to it’s original size.

Zip files take up less room on your


computer because they are
compressed. They are easier to send through email.

UnZip files sent through email must be unzipped to


access them.

This Photo by Unknown Author is licensed under CC BY-NC


Firewall is like a wall of
protection for your computer.

Most people protect their computer through companies


that offer security services. They provide virus scans to
This Photo by Unknown Author is licensed under CC BY-NC

determine if the computer has been corrupted. A


couple of well known companies are McAfee and
Norton.
JAVA is a software programming
product that deals with computer
programming language.

If you do not have the Java software installed on


your computer you may not be able to access
some websites.

This Photo by Unknown Author is licensed under CC BY-SA-NC


Computer/Technology Terms

Browse

Operating System

This Photo by Unknown Author is licensed under CC BY-NC-ND


Java Cookies

Zip and UnZip


Browser is a program within the
computer that helps you to access
information from the World Wide Web
(www.).

So let’s get started and “surf” the


“web”, well not exactly this way. Let’s
pick a subject and give it a try!!

You could choose to search through


Google Chrome or Internet Explorer,
they seem to be popular site.

https://www.regent.edu

This Photo by Unknown Author is licensed under CC BY


Compression is the action
of reducing the size of a
file. When this is done it
will increase the amount
of memory on your
computer.
This Photo by Unknown Author is licensed under CC BY-SA-NC
Cookies are small files that track a
user’s activity on a web page.

Some companies use “cookies” for online


shopping. They can store customer
information from orders you have made
so you don’t have to re-enter it every time you
visit their website.

This Photo by Unknown Author is licensed under CC BY-NC-ND


CPU which means
Central Processing
Unit. This is the
“nerve center” of
the computer.

It’s like a huge


calculator! It tells the
computer what to do.
This Photo by Unknown Author is licensed under CC BY-SA-NC
A Device driver allows you to
pull or send information
from your computer.

You can use the device driver to connect to your

printer, access files from a disk/flash drive and

download pictures from your iPhone or digital

camera.

This Photo by Unknown Author is licensed under CC BY-NC-ND


You can make a file
require a password in
order to access it.
Most legal
documents come in
This Photo by Unknown Author is licensed under CC BY-SA an encrypted
(Ciphertext) form.
Encryption is a safety measure to
protect the data on your
computer.
Virus is an unknown
software that invades
the computer.

People can click on an infected site and spread the


virus from computer to computer. You may not
know your computer is infected unless you
start experiencing signs of excessive pop-ups,
decreased speed, crash or restart, etc.

This Photo by Unknown Author is licensed under CC BY-NC-ND


URL stands for Unique Resource
Locator.

This is the address that is assigned


to a website, most begin with http://
This Photo by Unknown Author is licensed under CC BY-SA-NC

https://www.regent.edu
Search Engine a tool to help
locate information on the
computer.
Look at all the
possibilities!!

This Photo by Unknown Author is licensed under CC BY-NC-ND


Phishing is a scam dealing with emails

This scam deals with trying to obtain


personal information (social security
number, bank account information,
passwords, etc.).
Protocol is how computers communicate with each other

This Photo by Unknown Author is licensed under CC BY-SA


Cache is like
“instant re-play” on
a computer.
When you search a website,
your computer remembers what
you’ve searched previously. This Photo by Unknown Author is licensed under CC BY-SA-NC
This is a program
useful to
architects,
engineers and
builders. It
replaces the old
This Photo by Unknown Author is licensed under CC BY-NC-ND hand drawings of
drafting plans with
2D and 3D designs.
CAD stands for Computer Aided Design
SSL stands for Secure
Sockets Layer
This Photo by Unknown Author is licensed under CC BY-ND

This feature allows you to send emails with


confidential information being protected.
The web would begin with https:// (the “S”
stands for SSL).

This Photo by Unknown Author is licensed under CC BY-NC-ND


JPEG stands for Joint
Photographic Experts
Group

This is a format used


when saving pictures
and digital images.

This Photo by Unknown Author is licensed under CC BY-SA-NC


The “and” , “or” and “not” are the most used.

Boolean
Operators are not

words to help
define your
search.
or
and
Works Cited
Hawthorne, T. (2018). Glossary of Technology Terms. Retrieved from
https://www.scsb.org/glossary.html

Our Community Matters. (2018). The A-Z of Technology Terms. Retrieved from
https://www.ourcommunity.com.au/tech_article.jsp

https://java.com/en/

https://us.norton.com

Microsoft Office Clipart

You might also like