•  

    Technology Terms for 8th Grade Computer Literacy

     

     comp terms

     

    Classroom Kahoot: Link (make sure you are logged into kahoot to display quiz)

     
     
     Computer Basics and Hardware
     
    Motherboard:  is the main circuit board of a computer. All electrical components plug into it.
     
    Hard Drive: is the primary device that a computer uses to store information.

    Hardware: Anything you can touch on the computer.     
     
    CPU: Central Processing Unit. This is the main chip in a computer. It processes instructions, performs calculations and manages the flow of information through a computer. 
     
    RAM: Random Access Memory. This is the type of memory that temporarily stores information inside a computer. This information is lost when you turn off the computer.    
     
    Software: a set of electronic instructions that tell a computer what to do. You cannot see or touch this, but you can see and touch the packaging software comes in     
     
    Peripheral : is any piece of hardware attached to a computer, such as a printer. 
     
    ROM: Read only Memory. This type of memory is permanent and cannot be changed. It stores instructions that help prepare the computer for use each time you turn on the computer.    
     
    Supercomputer: are the most powerful computers of all. Supercomputers are used to do things like predict hurricanes and navigate satellites through distant outer space. 

    Input Device:  Is hardware that allows you to communicate with your computer. A keyboard for example allows you to enter information and issue commands.

    Output device: is hardware that allows your computer to communicate with you. For example the monitor that displays information or the printer that prints letters are both devices that give you information from the computer.

    Storage Device: allows you to store or retrieve information.
     
     
    Email and Internet Basics
     
    Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone. Cyberbullying is often done by children, who have increasingly early access to these technologies.
     
    A smiley or Emoticon: is a group of characters typed in such a way that they look like a human face.  They are used to express emotions in a message.
     
    Flame is an angry message to someone.
     
    Bounced message  is one that has been returned to you because of an error of some kind.
     
    Shouting is expressed by typing in all caps.
     
    An attachment is usually a document or a file you want to send with an email message. Think of email attachments just like enclosures in a letter. 
     
    Forwarding: a message is when you send a copy of a message you have written or received to another person.
    Signature: a signature usually includes your name and perhaps an address, it is included at the end of the body. It may be added by the software when the message is sent or perhaps by clicking on a button.

    CC notation/ CC Box:  is used when you want to send a copy of your message to one or more persons.
     
    Netiquette is a word used to describe some basic rules to guide you when you compose a proper email message. 
     
    Cookie is a text file on your hard disk that Web sites use to store information about you and your preferences for the site.

    The Internet is a huge network of computers around the world that are linked together. (network: an interconnected system of things)
     
    A web browser is software that helps you move through Web pages.  (Firefox, Chrome, Safari etc)
     
    URL: a web address is called a Uniform Resource Locator (URL).  
     
     
    Parts of a Search Engines
     
    1. The Spider: The spider visits a web page, reads it, and then follows links to other pages within the site. This is what it means when someone refers to a site being "spidered" or "crawled." The spider returns to the site on a regular basis, such as every month or two, to look for changes.
     
    2.  The Index: Everything the spider finds goes into the second part of the search engine, the index. The index, sometimes called the catalog, is like a giant book containing a copy of every web page that the spider finds. If a web page changes, then this book is updated with new information. 
     
    3.  The Software: Search engine software is the third part of a search engine. This is the program that sifts through the millions of pages recorded in the index to find matches to a search and rank them in order of what it believes is most relevant. 
     
     
    Website Validity: Six categories are presented to help in assessing the validity of an Internet site: Purpose, Authorship, Currency, Content, Site Design, and Technical Issues.  
     
     Computer Ethics
     
    Hacking: Hacking is the unauthorized use of a computer system or program. 
     
    Computer Virus:A computer virus is any software program that destroys information or makes it difficult to use the contents of a computer disk.  
     
    Copyright Laws: Copyright laws exist to protect those who create an idea or product. The U.S. Copyright Act of 1978 protects software companies from illegal use of their products.