Chapter 1
Start menu
A menu that opens from the Start button on the taskbar.
computer virus
A program code hidden in a system that can later do damage to software or stored data.
Software
A program or instructions that give directions to the computer.
browser
A program that allows the user to find and view pages on the world wide web.
Social Network
A series of social relationships that links a person directly to others.
blog
A series, or log, of discussion items on a page of the World Wide Web.
Toolbar
A set of icons or buttons displayed horizontally or vertically on the screen that can be used to issue commands to the computer.
World Wide Web
A system for finding information on the Internet through the use of linked documents.
cloud computing
A system in which all computer programs and data is stored on a central server owned by a company (e.g. Google) and accessed virtually.
file extension
A tag of three or four letters, preceded by a period, which identifies a data file's format or the application used to create the file.
Minimize button
Hides a window so that only its program button is visible on the taskbar.
Selecting
Highlighting text or activating an object so that you can manipulate or edit it in some way.
icons (computer)
Small picture symbols that identify computer programs, features, and documents.
communications programs
Software applications that enable users to electronically communicate through computers with people around the world.
Open-source software
Software such as Linux that includes its uncompiled source code which can be modified and distributed by programmers
application programs
Software that helps the user to perform tasks.
freeware
Software that is given away free of charge, but whose author still retains all rights.
online applications (online apps)
Software that resides online rather than on a user's computer; used to accomplish specific tasks such as finding directions, browsing multimedia content, sending e-mail, or creating office documents such as presentations and spreadsheets
antivirus software
Software used to detect and eliminate computer viruses and other types of malware.
Public Domain
Some published content may be used without permission if it is part of the public domain-generally content that is more than 75 years old
Wide Area Network (WAN)
Spans a large geographic area such as a state, province, or country
Fair Use Laws
The ability to use a small amount of copyrighted work without permission, but only in certain ways and in specific situations (schoolwork and education, news reporting, criticizing or commenting on something, and comedy/parody).
website domain name
last portion (after the period) of the website address or URL, such as .com, .org, or .edu
confidentiality
the assurance that messages and information are available only to those who are authorized to view them
Close button
window button that closes the open window or application
Spam
Unwanted e-mail (usually of a commercial nature sent out in bulk)
click
Pressing the left mouse button and releasing it quickly
double-click
Pressing the left mouse button twice in rapid succession
Pinned programs
Programs that you use regularly, so they have a shortcut icon on the Start menu.
Internet
A global network connecting millions of computers, making it possible to exchange information.
byte
A group of eight bits.
mouse
A hand-operated electronic device that controls the coordinates of a cursor on your computer screen as you move it around on a pad.
bit
A binary digit, a 0 or a 1.
network
A chain of communication that connects places.
local area network (LAN)
A computer network that covers a small area
Output devices include:
A computer process, which may be displayed on a screen, printed on a report, played over speakers as sound, or sent via a network link to another computer.
Server
A computer that awaits and responds to requests for data.
Shareware
A copyrighted software that can be sampled before it is purchased.
Router
A device that transfers data from one network to another in an intelligent way
online scams
A general way to define the different types of fraud that consumers face when using the Internet.
Scroll Bar
A tool that allows the user to move up or down within the document.
Megabyte (MB)
A unit of storage measuring roughly one million bytes.
Menu bar/navigation bar
An area on a web page that contains links to the main pages of a website.
copyright
An exclusive right granted by the federal government allowing the owner to reproduce and sell an artistic or published work.
cyberbullying
Bullying through Internet applications and technologies such as instant messaging (IM), social networking sites, and cell phones.
Process of Computer
Computer is performing some action to manipulate data
E-commerce (electronic commerce)
Conducting business online.
input
Data that is entered into the computer system via an input or storage device.
Ribbon tab
Each tab represents a group of commands for specific purposes such as editing, inserting graphics, viewing options, or page layout.
distribution on computers
Enables the computer to share information with computers and other users, typically across a network.
ROM (read-only memory)
Long-term memory that resides in the computer and is used for programs that run when the computer is started up; it cannot be easily accessed or changed.
RAM (random-access memory)
Memory modules on the motherboard containing microchips used to temporarily hold data and programs while the CPU processes both. Information is lost when the PC is turned off.
Mouse Pointer
Move the mouse (roll it on the work surface) so that the pointer (the arrow that represents the mouse's position on the screen) points to an item.
desktop
The area of the screen in graphical user interfaces against which icons and windows appear
Maximize button
The button that expands a window to fill the screen.
Restore Down button
The button that returns a window to its previous size.
Netiquette (Internet Etiquette)
The code of acceptable behaviors users should follow while on the internet
identity theft
The fraudulent acquisition and use of a person's private identifying information, usually for financial gain.
Windows Explorer
The main tool for finding, viewing, and managing the contents of your computer by showing the location and contents of every drive, folder, and file.
Plagiarism
The practice of taking someone else's work or ideas and passing them off as one's own.
Uniform Resource Locator (URL)
The set of letters that identifies the address of a specific resource on the Web.
System Utilities (utility software)
The software that keeps the computer running well and performs routine tasks associated with file maintenance.
Operating system
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
ergonomics
The study of workplace equipment design or how to arrange and design devices, machines, or workspace so that people and things interact safely and most efficiently.
Right-Click
The use of the right mouse button to access special features of an application
Peripheral Hardware
The various external hardware parts and components of a computer system, such as the monitor, printer, scanner, speakers, disk drives, etc.
active window
The window in which you are currently working
instant messaging (chat)
Web service that allows users to communicate in real time.
keyword search
When a user enters text, such as a word or phrase, to find files that contain the specified text.
drag
When you move the mouse while holding down the mouse button (usually the left) to select a range of cells.
Internet service provider (ISP)
a company that provides access to the internet for a monthly fee.
Gigabyte (GB)
a unit of storage measuring roughly one billion bytes