| A | B |
| Input Device | “used to enter information into the computer. Examples are keyboard |
| Output Device | “displays or prints information produced by a computer. Printers and monitors are examples of output devices. A printer produces a hard copy output while a monitor produces a soft copy output.” |
| Processor | the device that processes data into information. |
| Storage | “the device that saves data so it can be used again. Disk drives are used to store data on disks.” |
| CPU (Central Processing Unit) | the “Brains” of the computer where the work is done. |
| Command-line Interface | type of user interface in which the user types commands or press special keys on the keyboard to enter data and instructions. |
| Graphical User Interface | a menu based interface known as icons (pictures that appear on the desktop environment). |
| Hard Copy | a printed page of text or graphics. |
| Hardware | the physical equipment of a computer system that you can touch. |
| Impact Printers | “a printer that strikes the paper in order to form images. Example: Dot Matrix Printer” |
| Keyboard | “an input device that enters data with letters |
| Modem | computer hardware that allows information to be passed through the telephone lines. |
| Monitor | the video screen of the computer. |
| Mouse | a pointing device used primarily with graphical interfaces. |
| Non-impact Printer | “a printer that forms images without striking the paper. Example: Laser or Inkjet Printers. (Laser printers are considered to be the Cadillac of all printers)” |
| Output | the information that leaves the computer. |
| Random Access Memory (RAM) | “a type of memory that can be read from and written to by the processor and other devices. Ram memory is volatile.” |
| Read Only Memory (ROM) | a type of memory that is used to store permanent data and instructions because it is nonvolatile. |
| Scanner | used like a copy machine to allow information to be input into the computer. |
| Softcopy | output viewed on the monitor. |
| Antivirus Program | A computer program that detects viruses and repairs files. |
| Bomb | A destructive computer code or virus designed to activate at a specific time. |
| Commercial Software | Software whose copyright is owned by the author/software publisher. |
| Copyright | Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work. |
| Encryption | Process of converting readable data into unreadable characters to prevent unauthorized access. |
| Ethics | The moral guidelines that govern the use of computers and information systems. |
| Freeware | Software that is given away free of charge |
| Hacker | A person who secretly gains access to computers and files without permission. |
| Hoax | A program intended to scare users into thinking they have a virus. |
| Password | A safeguard for access to a computer or computer program. |
| Phage | A program that modifies other programs |
| Piracy | The illegal copying and distribution of software. |
| Public Domain Software | Software that is not copyrighted and is free to copy and distribute. |
| Shareware | Copyrighted software distributed free of charge on a trial basis with payment by the honor system. |
| Trojan Horse | A virus that is disguised as a useful piece of software. |
| Virus | A computer program designed to cause damage to computer files. |
| Worm | A destructive computer program that bores its way through a computer’s files or through a computer’s network. |