| A | B |
| Input Device | used to enter information into the computer. |
| Output Device | displays or prints information produced by a computer. |
| Processor | the device that processes data into information. |
| Storage | the device that saves data so it can be used again. |
| CPU | the “Brains” of the computer where the work is done. |
| Command Line Interface | type of user interface in which the user types commands or press special keys on the keyboard to enter data and instructions. |
| Graphical User Interface | a menu based interface known as icons (pictures). |
| Hardcopy | a printed page of text or graphics. |
| Hardware | the physical equipment of a computer system that you can touch. |
| Impact Printers | a printer that strikes the paper in order to form images. |
| Keyboard | an input device that enters data with letters, numbers, symbols, and special function keys. |
| Modem | computer hardware that allows information to be passed through the telephone lines. |
| Monitor | the video screen of the computer. |
| Mouse | a pointing device used primarily with graphical interfaces. |
| Non-Impact Printer | a printer that forms images without striking the paper. |
| Output | the information that leaves the computer. |
| Random Access Memory (RAM) | a type of memory that can be read from and written to by the processor and other devices. Volatile. |
| Read Only Memory (ROM) | a type of memory that is used to store permanent data and instructions. Nonvolatile. |
| Scanner | used like a copy machine to allow information to be input into the computer. |
| Softcopy | output viewed on the monitor. |
| Antivirus Program | A computer program that detects viruses and repairs files. |
| Bomb | A destructive computer code or virus designed to activate at a specific time. |
| Commercial Software | Software whose copyright is owned by the author/software publisher. |
| Copyright | Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work. |
| Encryption | Process of converting readable data into unreadable characters to prevent unauthorized access. |
| Ethics | The moral guidelines that govern the use of computers and information systems. |
| Freeware | Software that is given away free of charge, but whose author still retains all rights. |
| Hacker | A person who secretly gains access to computers and files without permission. |
| Hoax | A program intended to scare users into thinking they have a virus. |
| Password | A safeguard for access to a computer or computer program. |
| Phage | A program that modifies other programs, operating systems, and databases. |
| Piracy | The illegal copying and distribution of software. |
| Public Domain Software | Software that is not copyrighted and is free to copy and distribute. |
| Shareware | Copyrighted software distributed free of charge on a trial basis with payment by the honor system. |
| Trojan Horse | A virus that is disguised as a useful piece of software. |
| Virus | A computer program designed to cause damage to computer files. |
| Worm | A destructive computer program that bores its way through a computer’s files or through a computer’s network. |