0% found this document useful (0 votes)
10 views

CH 5

The document provides an overview of operating systems, detailing their functions, types, and key components such as the Windows 10 operating system. It explains the roles of operating systems in managing hardware, applications, and security, and introduces key terms and definitions related to operating systems and utility software. Additionally, it covers the importance of user interfaces, disk management, and the Windows Registry, along with the differences between workstation and mobile operating systems.

Uploaded by

gamerksa346
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CH 5

The document provides an overview of operating systems, detailing their functions, types, and key components such as the Windows 10 operating system. It explains the roles of operating systems in managing hardware, applications, and security, and introduces key terms and definitions related to operating systems and utility software. Additionally, it covers the importance of user interfaces, disk management, and the Windows Registry, along with the differences between workstation and mobile operating systems.

Uploaded by

gamerksa346
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 144

5.

Operating
Systems
Section Skill Overview
Identify common operating systems, including systems designed for mobile devices.
Describe the basic functions of different types of operating systems.
Identify and describe components of the Windows 10 operating system.
Change display settings in Windows.
 Use the Settings app to view system information.
Section Skill Overview
Configure a screen saver through the Settings app.
Describe the purpose of the configuration settings stored in the Windows registry.
 Use iOS on a mobile device to check email account settings, Wi-Fi settings, Bluetooth
settings, and the iOS version.
Key Terms
Operating System
Graphical User Interface
Command Line Interface
Disk Management
Application Management
 Service Management
Key Terms
Device Management
Access Control/Protection
Windows Settings App
Windows Update
Windows Registry
 Registry Editor
Key Definitions
Operating System: A computer program that makes it so people, hardware, and
software can interface with each other in a meaningful way.
Graphical User Interface: An operating system interface that allows a user to interact
with the computer by displaying pictures, icons, and other images on a screen to
represent files, folders, and system controls and by accepting input from a mouse or a
touch screen.
 Command Line Interface: An operating system interface that allows a user to interact
with the computer by displaying text on a screen and accepting input from the
keyboard. The input is entered as commands. The command line is used primarily by
IT and other tech professionals.
Key Definitions
Disk Management: A role of the operating system that helps keep storage devices well
organized and maintained.
Application Management: A role of the operating system that manages applications or
programs that are installed on a system. Applications are run, configured, and deleted
through application management.
 Service Management: A role of the operating system that runs processes or programs
automatically in the background. These programs are services that perform functions
like indexing files for better searches, verifying that software is up to date, and
backing up files.
Key Definitions
Device Management : A role of the operating system that determines the hardware
that is connected to the system, interprets instructions from the hardware, and sends
instructions to it. Device management includes managing device drivers.
Access Control/Protection : A role of the operating system that requires users to log in
with their credentials before accessing sensitive information on the computer. It also
manages antivirus and antimalware software to prevent malicious files from accessing
the computer.
 Windows Settings App: In Windows 10, an application that organizes the settings and
customizes how the computer looks and functions.
Key Definitions
Windows Update: A feature of the Windows operating system that keeps the system up
to date.
Windows Registry: A database that stores settings for the operating system and other
programs. These settings are stored as keys and values.
 Registry Editor: A utility of the Windows operating system which lets you view and
change all the keys in the registry, giving users greater control over their computers.
Introduction to Operating
Systems
Introduction to Operating
Systems
Introduction to Operating
Systems
Operating Systems
Interface - user and computer
Interface - apps and hardware
Disk management
Process/Memory management
Application management
Service management
Device management
 Access control/protection
Introduction to Operating
Systems
5.2

OS functions and
descriptions
OS Interfaces
OS Interfaces
Graphical User Interface
 Command Line
Graphical user interfaces

 One of the main functions of an operating system is to provide an


interface between the computer and the user. Most modern operating
systems use a graphical user interface (GUI), where pictures, icons, and
other images are used to represent files, folders, and system controls.

The GUI makes it easy for humans to understand and use. People
interact with these graphics using a mouse, touchscreen, or keyboard.
Typically, GUIs are better for consumers. They're easier to learn and
have safeguards against accidentally ruining the system by deleting or
modifying important files.
Command line interface

 Another way users interact with the operating system is using the
command line interface. The command line is used primarily by IT and
other tech professionals. The command line accepts input from the
keyboard, instead of a mouse or touchscreen.

The command line has a steeper learning curve, and it's possible to
accidentally break the system if you don't know what you're doing.
However, it also gives the user greater control over the file and
operating systems. It is faster than using a GUI
Interface between applications and
hardware
 Operating systems provide an interface between the computer's hardware and
application software. Hardware communicates in raw physical signals, like pulses of
electricity or light. Software interprets ones and zeroes as digital information.

 The OS takes data from the hardware and passes it to the software in a way the
software can understand. The operating system takes instructions from the software
and passes it to the hardware be executed.

 Applications are computing software that are designed to perform a specific function
such as word processing, web browsing, or media playing.

 When choosing application software, check the computer's CPU processing capability.
Older computers use a 32-bit processing capacity. Newer computers typically have a
64-bit processing capacity. Some newer computers are designed to operate either 32-
bit or 64-bit modes
Disk Management

 It's important for storage hardware to be well organized. If information is


scattered around a disk in a haphazard way, it takes a long time for the
computer to get the information it needs and the system slows down.
 Operating systems have disk management software that helps keep
storage devices well organized and maintained.
File Management

 The file management interface for Microsoft Windows is called File


Explorer. Within this interface, you can create, delete, open, or rename
files and folders. The files can be stored on a local disk or on other
devices connected through a network server.
Process/memory management

 Computers work by executing lists of instructions. Sometimes, computers need to run


multiple lists of instructions, or processes, at the same time. The OS makes sure that
each process is sent to the CPU in an orderly way.

Sometimes, a process will malfunction. For example, there may be a memory leak
caused by a poorly-written program not releasing space in RAM when it's done with it. If
this happens, the operating system can kill the process so it doesn't clog up computer
resources.

If your computer is unable to process all the programs you would like to run at the
same time, you can either:
• Add more memory by physically installing memory banks to your motherboard.
• Open Task Manager (or a memory monitoring program on non-Windows operating systems)
and stop any programs from running that you don't need or want.
 This will allow the memory to be used for the programs you do want to run.
Application management

 Operating systems manage applications installed on a system. The OS


has tools to view, configure, and delete applications.
Service management

 The OS also runs services, which are processes that run automatically in
the background. Services do things like indexing files for better
searches, verifying that software is up to date, and backing up files.
Device management

 Another of the operating system's jobs is to know the hardware that is


connected to the system, interpret instructions from the hardware, and
send instructions to it.

You may install a piece of hardware (such as a printer) that your


operating system doesn't know how to talk to. To make the printer work,
you need to install a driver. Drivers are like interpreters that help the
hardware and the OS to speak the same language.
Access control/protection
• An important operating system role is security. Operating systems require
users to log in with credentials before accessing sensitive information on
the computer.

One of these most important principles in network security is the principle


of least privilege. This means that a user is given access and permissions
at the level that is required to do a job or tasks and nothing more. If the
account is compromised, the hacker is limited to whatever that user's
permissions and access are.

Operating systems help you follow this privilege by providing two types of
user accounts: administrative and standard. The account that is created
when initially installing an OS is an administrative account by default and
cannot be changed. This is to give the person installing the OS all the
rights and privileges to set up the computer.
Access control/protection

 Best practices specify that an administrator create a standard user account to use for day-
to-day tasks. The administrator account should be used only for the tasks that require that
level of privilege. This limits risk if the system is hacked.

All other users should be given only standard user accounts. If someone does need an
administrator account, be sure to provide a standard user account for use for anything non-
administrative.

In addition to limiting privileges, operating systems also use antivirus and anti-malware
software to prevent malicious files from accessing the computer.

The Windows Enterprise editions allow administrators to configure privilege levels and rights
through groups in the Local Users and Groups tab in the Computer Management console.
This saves administrators time by:
 Grouping users that need the same privileges and rights to do their jobs.
 Controlling access by assigning the rights and privileges to the group and then adding the
appropriate users to each group.
Operating Systems Types

 Workstation
 Operating systems (OS) that run on a laptop, desktop, or an all-in-one computer are
typically referred to as workstation operating systems. Some examples include
Microsoft Windows, Linux, and Apple OS X/macOS.
 Server
 A server computer is designed to interface with multiple computer systems
providing services these other computers need. Servers usually have more
resources allocated to them, such as disk storage, read-only memory (RAM), and
processing capabilities.

In many cases, a server OS is based off the same basic code (also known as a
kernel) as its workstation counterpart. However, server operating systems typically
include additional software packages (sometimes known as roles) that provide the
extra services needed by a network of computers and are therefore used more often
in the business environments. Mobile Device
Operating Systems Types

 Mobile device operating systems :


 Mobile OS : are used for hand-held devices, such as smartwatches, mobile
phones, tablets, and even smart speakers. These operating systems combine
the features of a workstation operating system with other features useful for
mobile or handheld use.

 While there are many different mobile device operating systems


available, some of the most used include Android, Apple iOS, and KaiOS.
OS Interfaces
OS Interfaces
OS Interfaces
The Windows Registry

 The Windows Registry is a database that stores settings for the


operating system and other programs.
 These settings are stored as keys and values. You can think of it like a
filing cabinet - each file in the cabinet is a key, and the information
written in the file is a value.
 Whenever you change a setting on your computer, such as changing the
home page of your web browser or your PC's power settings, that
change is stored as a key in the registry.
Registry Editor

 Windows comes with a utility called Registry Editor, which lets you view
and change all the keys in the registry.
 This gives users a huge amount of control over their computers. By
making small changes to the registry, you can customize just about any
aspect of your machine.
 That said, it's a bad idea to change a registry key unless you understand
exactly what it does and how it will affect the system.
 The registry contains many essential keys that are necessary for the
computer to function correctly, and changing them could cause the
computer to malfunction.
Registry Editor Example

1. if you want to see the registry in action, you can use the following steps to make your
system clock show hours, minutes, and seconds.
2. Open Registry editor by typing regedit into the search bar and pressing Enter. You may
have to confirm you want to do this if a warning screen pops up.
3. The Registry Editor shows all the keys on the computer, which are stored in a folder-like
structure. Navigate to the following key: HKEY_CURRENT_USER, Software, Microsoft,
Windows, CurrentVersion, Explorer, Advanced.
4. Create a new key by right-clicking the Advanced folder, then selecting New > DWORD (32-
bit) Value.
5. Name the value ShowSecondsInSystemClock. Make sure to spell and capitalize the
name correctly.
6. By default, this key will have a value of zero, which means it's turned off. To turn it on,
double-click it and set its value to 1. When you restart your computer, you'll see the
seconds displayed on the system clock. You can reverse this change by navigating to the
new key and changing its value back to zero, then restarting your computer.
Windows Settings
Class Discussion
How does the operating system coordinate the work of hardware and software?
 How are mobile and desktop operating systems similar? How are they different?
5.3

Computer Software
Key Terms
Utility Software
Device Drivers
Firmware
Windows Settings App
 Windows 10 App
Key Terms
Basic Input/output System (BIOS)
CMOS
Power-on Self Test (POST)
UEFI
Virtualization
 Virtual Machine
Key Definitions
Utility Software: Software that analyzes, configures, and optimizes the computer,
including backup software, compression software, disk cleaners, and antivirus software.
Device Drivers: Software that allows an operating system to communicate with hardware
devices, such as printers, video cards, scanners, and cameras.
Firmware: Preinstalled, read-only software on a device that tells it how to work.
 Windows Settings App: In Windows 10, an application that organizes the settings and
customizes how the computer looks and functions.
Key Definitions
Windows 10 App: A Windows program that is installed and maintained through the
Windows Store and uses the type of interface you would typically see on a touchscreen
device.
Basic Input/output System (BIOS): A simple program that's written directly into the
motherboard's hardware used to initiate hardware in the booting process.
CMOS: The CMOS, an acronym for complementary metal-oxide-semiconductor, is a chip
where the BIOS settings are stored.
 Power-on Self Test (POST): A test that ensures that all the system's hardware is in
working order before loading the operating system. During this test, an error message
may display on the screen notifying you of the faulty component.
Key Definitions
UEFI: UEFI, which stands for Unified Extensible Firmware Interface, is a graphical boot
tool that is utilized to configure the BIOS for the end user, offering several advantages
including faster booting, supporting larger hard drives, and providing more security
features.
Virtualization: The process of running a virtual instance of a computer system on its own
partition, creating a software-based version of something such as an application, server,
network, or storage.
 Virtual Machine: A file that acts like a computer but in reality only exists virtually as
opposed to physically.
System Software
Utility Software
 Utility Software analyzes, configures, and optimizes the computer. Unlike application software,
which benefits the end user directly, utility software is used to support and maintain the computer
system itself. Let's look at a few examples.
 Backup software is used to copy files from a disk to another location, such as an external hard
drive or cloud storage. This is because hard drives can fail and become unreadable. If this
happens, you can simply restore your backup instead of losing all your data.
 Compression software takes full-size files and applies compression algorithms to shrink the file
size, often without losing any data. Compressed files take up less disk space than uncompressed
files and are easier to transmit over the Internet or a network.
 Disk cleaners find unnecessary files that are saved on a computer and help decide which files to
delete when the hard drive is full.
 Antivirus software scans for and deletes malicious code before it can compromise your computer.
System Software
System Software

 Firmware is pre-installed, read-only software on


a device that tells it how to work.
 In many ways, it's like a low-level operating
system.
 Firmware can be found in televisions,
remote controls, game consoles, printers,
cameras, music players, and even automobiles.
 Sometimes, manufacturers release
firmware updates that fix bugs and add new
features.
System Software
Utility Software
Device Drivers
 Firmware
5.4

Application Software
Section Skill Overview
Identify application software that increases personal productivity.
Identify application software that facilitates collaboration.
Identify some common business application software.
Run Windows applications.
 Pin applications to the Start menu and the taskbar.
Section Skill Overview
Unpin applications from the Start menu and the taskbar.
Create application shortcuts on the Windows desktop.
Explain how app stores are used to distribute application software.
Open, modify, and save a Microsoft Word document.
 Open, modify, and run a Microsoft PowerPoint slide show.
Key Terms
Productivity Software
Collaboration Software
Business Software
Netiquette
Windows Application
Windows 10 App
 App Store
Key Definitions
Productivity Software: Software that is used to perform common tasks in a business or
home office such as word processing, spreadsheets, presentations, web browsing, and
visual diagramming.
 Collaboration Software: Software that facilitates the sharing, processing, and
management of files, documents and other data between members of a team. This
software includes message boards, screen sharing, conferencing software, email,
calendaring, instant messaging, text messaging, and online workspace and document
sharing.
Key Definitions
Business Software: Software designed for advanced or specialized business functions
such as database management, project management, customer relationship
management, accounting, desktop publishing, graphic design, and computer aided
design.
 Netiquette: The rules of etiquette that should be observed while using computer
networks, such as the internet.
Key Definitions
Windows Application: A traditional desktop application or program.
Windows 10 App: A Windows program that is installed and maintained through the
Windows Store and uses the type of interface you would typically see on a touchscreen
device.
 App Store: A platform that allows users to search for a variety of apps that can be
delivered to many different devices. Most apps in app stores can be downloaded for
free while others must be purchased.
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Productivity Software
Word processors
Spreadsheets
Presentations
 Web browsers
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Collaboration Software
Message Boards
Screen Sharing
Webinars
Email & Calendaring
Instant Messaging
 Collaborative Editing
Business Software
Business Software
Business Software
Business Software
Business Software
Business Software
Business Software
Business Software
Business Software
Databases
Project Management
Customer Relationship Management
Accounting
Desktop Publishing
Graphic Design
 Computer-Aided Design
Managing Desktop Applications
Class Discussion
How can software applications increase your productivity at home or at the office?
What software applications can assist you in collaborating with other people?
 What makes a slideshow effective? What makes a slideshow ineffective?
5.5

Software Troubleshooting
Section Skill Overview

Identify common steps to follow in troubleshooting software problems.


Configure compatibility settings for Windows applications.
 Use Windows Task Manager to:
 View information on running processes.
 Prevent applications from running at system startup.
 Close unresponsive apps.
 Repair a Windows program in Apps & features.
Key Terms

Software Crash
System Slowness
System Crash
Malicious Software Infection
 Task Manager
Key Definitions

Software Crash: A common issue in which software stops running


properly, forcing you to exit and reopen the program.
System Slowness: A common issue where the software starts running more
slowly than usual and every command the computer makes may be
delayed by a few seconds or longer.
 System Crash: An issue in which software problems cause the system to
crash completely, possibly forcing the entire system to restart. This can
cause data loss.
Key Definitions

Malicious Software Infection: A kind of software that can harm a


computer and compromise security.
 Task Manager: A program used by Windows to provide information about
how a computer is performing and which processes and services are
running at any given time.
Class Discussion

Why is resetting the computer often the first troubleshooting step for a
software problem?
What should I do when an app becomes unresponsive?
 Why is it important to keep apps up to date?
In-Class Practice
Do the following labs:
4.2.8 Explore the Windows 10 OS
4.2.10 Change Windows Settings
 4.2.12 Explore iOS
5.6

Technical
Support
Section Skill Overview

Describe common careers in system support.


 Identify skills and educational requirements for system support careers.
Key Terms

Technical Support Specialist


 Managed Service Provider
Key Definitions

Technical Support Specialist: A specialist that serves as the main


contact for a company's help desk or support organization, often
performing tasks such as recording help desk tickets, simple
troubleshooting, researching a knowledge base, and providing basic
support.
 Managed Service Provider: A third party technical support organization
employed by a company in order to cut costs and focus on business
operations.
System Support Careers
System Support Careers
Technical Support

 Technical support specialists serve as the main contact for a company's help desk
or support organization.
 When it comes to fixing problems, these specialists are the first person an
employee or client speaks with. While these can often be entry-level
positions, technical support specialists who gain extensive knowledge of software
applications and computer systems are extremely valuable to an organization.
 A level one support technician is responsible for basic tasks such as recording
problem descriptions in help desk tickets, simple troubleshooting, researching a
knowledge base, and then providing basic support such as resetting passwords
and installing printers. When a problem can't be resolved at this level, the ticket is
escalated to a higher level of support. These employees require more advanced
knowledge and skills, including database administration, software installation, and
complex troubleshooting.
System Support Careers
Class Discussion

How does the work of support professionals affect my daily life?


 How can I prepare for a career in support?
5.7

The World Wide


Web
Key Terms
Internet
The Web
The Internet
Internet Service Providers (ISP)
IP Address
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Universal Resource Locator (URL)
Domain Name System (DNS)
 Transmission Control Protocol/Internet Protocol (TCP-IP)
Key Terms
Hypertext Markup Language (HTML)
Intranet
Voice over IP (VoIP)
Wi-Fi
 Internet of Things (IoT)
Key Terms
Web Application
Blog
Wiki
RSS
 Podcast
Key Definitions
Internet: The worldwide system of interconnected computers and public networks.
The Web: Short for world wide web. Digital content that is delivered over the internet,
usually through a web browser.
Internet Service Providers (ISP): A company that provides individuals and businesses
access to the internet and other related services.
 IP Address: A numerical label that is assigned to devices so they can connect and
communicate on a network.
Key Definitions
Hypertext Transfer Protocol (HTTP): A set of rules that govern the transfer of web
content between computers.
File Transfer Protocol (FTP): A set of rules that govern the transfer of files between
computers.
Universal Resource Locator (URL): The reference or address to a resource on the Internet.
Example: http://www.testout.com/home/about/privacy
 Domain Name System (DNS): A system and set of rules that associates domain names
(such as web servers) with unique IP addresses so users can find and use network
resources by an easily readable name instead of by IP address.
Key Definitions
Transmission Control Protocol/Internet Protocol (TCP-IP): A set of rules that
facilitates internet communication.
Hypertext Markup Language (HTML): A computer language that web pages use to display
content through web browsers.
Intranet: A private network, usually hidden from the internet and protected by a security
device, that uses the same technologies that are used on the internet and may or may
not be connected to the internet.
 Voice over IP (VoIP): A technology that sends voice phone calls using the TCP/IP
protocol over digital data lines.
Key Definitions
Wi-Fi: A technology that allows computers, smartphones, and other devices to
communicate on a wireless network.
Internet of Things (IoT): A computing concept that describes the network of physical
devices and everyday devices (including refrigerators, thermostats, streetlights, and
environmental tracking systems) that communicate with the internet.
 Web Application: A program or app that uses the internet and a web browser to
complete a task. The user's computer interacts with a remote server to access the
app.
Key Definitions
Blog: A blog is a website that produces content in forms of blog posts that can contain
text, images, video, or other media. Blogs usually have a more casual, conversational
style than more mainstream websites.
 Wiki: An online encyclopedia that uses hyperlinks to connect each entry to other
relevant entries.
Key Definitions
RSS: A system based on simple text files that are read by a program to provide a stream
of updates or feed about a particular topic. RSS originally stood for RDF Site Summary
but is also known as "really simple syndication" or "rich-site summary."
 Podcast: An audio program split up into episodes that can be enjoyed on demand.
Podcast topics can range from cooking, fashion, music, and about any other topic you
can think of.
The Internet
The Internet
The Internet
The Internet
The Internet
The Internet
The Internet
The Web and Other Internet Technologies
The Web and Other Internet Technologies
The Web and Other Internet Technologies
Web Apps
Webmail
Productivity software
Video games
 Social media
The Web and Other Internet Technologies
The Web and Other Internet Technologies
The Web and Other Internet Technologies
The Web and Other Internet Technologies
The Web and Other Internet Technologies
Intranet
Private Network
 Uses Internet Technologies
The Web and Other Internet Technologies

World Wide Web


Internet of Things
 Intranets
Class Discussion
How are the internet and the world wide web similar? How are they different?
What internet technologies other than the web do I use?
 How have the internet and the web impacted my life?
Key Terms
Web Browser
Web Search
Cookie
Browser Extension
 Client-Side Scripting
Key Terms
Certificate
Caching
Proxy Server
Pop-up Blocker
 IP Address
Key Definitions
 Web Browser: An application for accessing information on the web.
 Web Search: A search of the web using a web browser, often done by visiting a web
search engine site such as Google, Bing, or Yahoo.
 Cookie: A small piece of data sent from a website and stored on a user's computer by
the web browser while the user is browsing. Cookies are designed to help websites
remember information such as items in an online shopping cart and entries in a web
form so that the website can customize a web page for the user.
Key Definitions
 Browser Extension: Software that adds functionality to a web browser.
 Client-Side Scripting: The process of transferring source code from a web server to
a web browser and running that code directly in the browser.
 Certificate: A digital document that contains encryption keys and is used for
encryption and identification.
 Caching: The storing of images, sounds, web pages, and other information associated
with particular websites that allows a browser to redisplay data without having to
reload it from the website.
Key Definitions
Proxy Server: A device that stands as an intermediary between an application such as a
web browser and the Internet. A proxy server intercepts all requests and can use filter
rules to allow or deny internet traffic.
Pop-up Blocker: A feature of most web browsers that prevents pop-up windows such as
advertisements from being displayed.
 IP Address: A numerical label that is assigned to devices so they can connect and
communicate on a network.
5.8

Web browsers
Key Terms
Web Browser
Web Search
Cookie
Browser Extension
 Client-Side Scripting
Key Terms
Certificate
Caching
Proxy Server
Pop-up Blocker
 IP Address
Key Definitions
 Web Browser: An application for accessing information on the web.
 Web Search: A search of the web using a web browser, often done by visiting a web
search engine site such as Google, Bing, or Yahoo.
 Cookie: A small piece of data sent from a website and stored on a user's computer by
the web browser while the user is browsing. Cookies are designed to help websites
remember information such as items in an online shopping cart and entries in a web
form so that the website can customize a web page for the user.
Key Definitions
 Browser Extension: Software that adds functionality to a web browser.
 Client-Side Scripting: The process of transferring source code from a web server to
a web browser and running that code directly in the browser.
 Certificate: A digital document that contains encryption keys and is used for
encryption and identification.
 Caching: The storing of images, sounds, web pages, and other information associated
with particular websites that allows a browser to redisplay data without having to
reload it from the website.
Key Definitions
Proxy Server: A device that stands as an intermediary between an application such as a
web browser and the Internet. A proxy server intercepts all requests and can use filter
rules to allow or deny internet traffic.
Pop-up Blocker: A feature of most web browsers that prevents pop-up windows such as
advertisements from being displayed.
 IP Address: A numerical label that is assigned to devices so they can connect and
communicate on a network.

You might also like