Computer Application chapters 1 - 5
Media sharing Web site
A ______ is a specific type of online social network that enables members to share photos, music, and videos.
Microblog
A ______ is a website that allows users to post short text updates, usually between 100 and 200 characters.
Driver
A _______ in a small program that tells the operating system how to communicate with a specific device
Folder
A _______ is a specific named location on a storage medium that contains related documents.
Chapter 5 Worm
A ________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer
DoS attack (Denial of Service)
A ________ is an assault whose purpose is to distribute computer access to an internet service such as the web or email
Wordwrap
A feature, called ______ allows users of word processing software to type words continually without pressing the enter key at the end of each line
Worm
A potentially damaging computer program that affects, or in fact, a computer negatively by altering the way the computer works without the user's knowledge or permission.
Instant
A(n) _____ message is a real-time Internet communication, where you exchange messages with other connected users.
Thumbnail
A(n) ______ is a small version of a larger graphic
Newsgroup/message software
A(n) ______ is an online area where users have written discussions.
Media player
A(n) _______ Is a program that allows you to view images and animation, listen to audio, and watch video files on your computer.
Phishing filter
A(n) _______ is a program that warns or blocks you from potentially fraudulent or suspicious websites.
Encryption algorithm
A(n) ________ is a programmed formula that the organizer of the data uses to encrypt the plaintext and the recipients of a data uses to decrypt the ciphertext
Command
An instruction that causes a program to perform a specific action
Spam
An unsolicited email message or newsgroup hosting sent too many recipients or Newsgroups at once.
Social engineering
As related to the use of computers,________ is defined as gaining unauthorized access or retaining confidential information by taking advantage of the trusting human nature of some victims in the naivety of others.
Format
Change the appearance of a document
E-mail address
Combination of a username and a domain name that identifies and internet user
Chapter 1 Computers and their uses
Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _____.
Administrator account
Computer network administrators typically have a(n) _______ that enables them to access all files and programs on the computer or network, install programs, specify settings that affected all users on the computer or Network
Virus
Copies itself repeatedly using up system resources and possibly shutting the system down.
Web app
Delivers applications to meet a specific business needs
Digital Camera
Device that allows users to take pictures and store the photographed images digitally instead of on traditional film
Surge protector
Easiest special electrical components to provide a stable current flow to the computer and other electronic equipment
Processor
Electronic Component that interprets and carries out the basic instructions for a computer
Note taking software
Enable users to enter typed text, handwritten comments, drawings, or sketches anywhere on page
Notebook computer
Five popular types of _____ are smart phones, PDAs, handheld computers, portable media players, and digital cameras.
MP3
Format reduces an audio file to about one-tenth its original size
Consumer- to - consumer
In _______ e-commerce, one consumers sells directly to another
Chapter 4 Windows aero
In the Windows 7 Operating System, _______ provides an enhanced visual look, additional navigation options, and animation.
Dial-up access
Instead of using broadband internet service some home users connect to the internet via______, which is a slower speed technology
All the above (viruses, rootkits, trojan horse, worms)
Malware is a term that can be used to describe ________
Enterprise computing
Many large companies use word(s), _____, to refer to the huge network of computers that meets their diverse computing needs
A social networking Web site or online social network
Millions of people worldwide join online communities, each called _____, that encourage members to share their interests, ideas, stories, photos, music, and videos with other registered users
Portable media player
Mobile device on which you can store, organized, and play digital media
Trusted source
Organization or person you believe will not send a virus infected file knowingly
All the above (hardware theft, unauthorized access, software piracy)
Physical access controls, such as locked doors and windows, usually are adequate to protect against________
Virus
Potentially damaging computer program that affects, or in fact, a computer negatively by altering the way the computer works without the user's knowledge or permission
Search engine
Program that finds websites, what pages, images, videos, news, maps, and other information related to a specific topic
Storage device
Records (writes) and/or retrieves (reads) items to and from storage
Hibernate
Save any open documents and programs to a hard disc before removing power from the computer.
Sleep mode
Saved any open documents and programs toRAM, turns off all unneeded functions, and then places the computer in a low-power state.
Information processing cycle
Series of input, process, output, and storage activities
Encryption algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext
Personal finance software
Simplified accounting program that helps home users and small office users balance their checkbooks, pay bills, track personal income in expensive, set up budgets, manage home Inventory, track Investments, and valuate financial plans
Spoofing
Technique Intruders use to make their Network or Internet transmission appear legitimate to a victim computer or network enter uses special electrical components to provide stable current flow to the computer and other electronic equipment
Payload
The _______ is destructive event or prank that malware is intended to deliver
FTP (File Transfer Protocol)
The _______ standard permit uploading and downloading of files on the internet
Home page
The first page that a website display
Embedded operating system
The operating system on most mobile devices and many consumer electronics, called a(n) _______, resides on a ROM chip.
Personal computer
Two types of _____ are desktop computers and notebook computers.
Emoticons
Used to express emotions in email, chat rooms, and new groups
Change certain values to reveal the effects of the changes
When using spreadsheet software, a function ______.
windows readyboost
Windows users can increase the size of memory through _______, which can allocate available storage space on removable flash memory device as additional memory cache.
Photo Management software
With ______ you can view, organized, sort, catalog, print, and share digital photos.
Data
_____ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.
Software suite
______ combined application software such as word processing, spreadsheet, presentation graphics, and email.
Chapter 2 Cellular radio network
______ offers high-speed internet connections to devices with built-in capable technology or computers with wireless modern
Document Management
______ software provides a means for sharing, Distributing, and searching through documents by converting them into a format that can be viewed by any user.
Chapter 3 Package Software
_______ is mass-produced, copyrighted retail software that makes that needs of a wide variety of users, not just a single user or company
Online help
_______ is the electronic equivalent of a user manual.
Downloading
_______ is the process of a computer or device receiving information, such as a web page, from a server on the internet.
System software
________ consists of the programs that control or maintain the operations of the computer and its devices.
Digital forensics
________ involves the examination of computer media, programs, data and log files on computers, servers, and networks.