Computer Application chapters 1 - 5

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Media sharing Web site

A ______ is a specific type of online social network that enables members to share photos, music, and videos.

Microblog

A ______ is a website that allows users to post short text updates, usually between 100 and 200 characters.

Driver

A _______ in a small program that tells the operating system how to communicate with a specific device

Folder

A _______ is a specific named location on a storage medium that contains related documents.

Chapter 5 Worm

A ________ is a program that hides in a computer and allows someone from a remote location to take full control of the computer

DoS attack (Denial of Service)

A ________ is an assault whose purpose is to distribute computer access to an internet service such as the web or email

Wordwrap

A feature, called ______ allows users of word processing software to type words continually without pressing the enter key at the end of each line

Worm

A potentially damaging computer program that affects, or in fact, a computer negatively by altering the way the computer works without the user's knowledge or permission.

Instant

A(n) _____ message is a real-time Internet communication, where you exchange messages with other connected users.

Thumbnail

A(n) ______ is a small version of a larger graphic

Newsgroup/message software

A(n) ______ is an online area where users have written discussions.

Media player

A(n) _______ Is a program that allows you to view images and animation, listen to audio, and watch video files on your computer.

Phishing filter

A(n) _______ is a program that warns or blocks you from potentially fraudulent or suspicious websites.

Encryption algorithm

A(n) ________ is a programmed formula that the organizer of the data uses to encrypt the plaintext and the recipients of a data uses to decrypt the ciphertext

Command

An instruction that causes a program to perform a specific action

Spam

An unsolicited email message or newsgroup hosting sent too many recipients or Newsgroups at once.

Social engineering

As related to the use of computers,________ is defined as gaining unauthorized access or retaining confidential information by taking advantage of the trusting human nature of some victims in the naivety of others.

Format

Change the appearance of a document

E-mail address

Combination of a username and a domain name that identifies and internet user

Chapter 1 Computers and their uses

Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _____.

Administrator account

Computer network administrators typically have a(n) _______ that enables them to access all files and programs on the computer or network, install programs, specify settings that affected all users on the computer or Network

Virus

Copies itself repeatedly using up system resources and possibly shutting the system down.

Web app

Delivers applications to meet a specific business needs

Digital Camera

Device that allows users to take pictures and store the photographed images digitally instead of on traditional film

Surge protector

Easiest special electrical components to provide a stable current flow to the computer and other electronic equipment

Processor

Electronic Component that interprets and carries out the basic instructions for a computer

Note taking software

Enable users to enter typed text, handwritten comments, drawings, or sketches anywhere on page

Notebook computer

Five popular types of _____ are smart phones, PDAs, handheld computers, portable media players, and digital cameras.

MP3

Format reduces an audio file to about one-tenth its original size

Consumer- to - consumer

In _______ e-commerce, one consumers sells directly to another

Chapter 4 Windows aero

In the Windows 7 Operating System, _______ provides an enhanced visual look, additional navigation options, and animation.

Dial-up access

Instead of using broadband internet service some home users connect to the internet via______, which is a slower speed technology

All the above (viruses, rootkits, trojan horse, worms)

Malware is a term that can be used to describe ________

Enterprise computing

Many large companies use word(s), _____, to refer to the huge network of computers that meets their diverse computing needs

A social networking Web site or online social network

Millions of people worldwide join online communities, each called _____, that encourage members to share their interests, ideas, stories, photos, music, and videos with other registered users

Portable media player

Mobile device on which you can store, organized, and play digital media

Trusted source

Organization or person you believe will not send a virus infected file knowingly

All the above (hardware theft, unauthorized access, software piracy)

Physical access controls, such as locked doors and windows, usually are adequate to protect against________

Virus

Potentially damaging computer program that affects, or in fact, a computer negatively by altering the way the computer works without the user's knowledge or permission

Search engine

Program that finds websites, what pages, images, videos, news, maps, and other information related to a specific topic

Storage device

Records (writes) and/or retrieves (reads) items to and from storage

Hibernate

Save any open documents and programs to a hard disc before removing power from the computer.

Sleep mode

Saved any open documents and programs toRAM, turns off all unneeded functions, and then places the computer in a low-power state.

Information processing cycle

Series of input, process, output, and storage activities

Encryption algorithm

Set of steps that can convert readable plaintext into unreadable ciphertext

Personal finance software

Simplified accounting program that helps home users and small office users balance their checkbooks, pay bills, track personal income in expensive, set up budgets, manage home Inventory, track Investments, and valuate financial plans

Spoofing

Technique Intruders use to make their Network or Internet transmission appear legitimate to a victim computer or network enter uses special electrical components to provide stable current flow to the computer and other electronic equipment

Payload

The _______ is destructive event or prank that malware is intended to deliver

FTP (File Transfer Protocol)

The _______ standard permit uploading and downloading of files on the internet

Home page

The first page that a website display

Embedded operating system

The operating system on most mobile devices and many consumer electronics, called a(n) _______, resides on a ROM chip.

Personal computer

Two types of _____ are desktop computers and notebook computers.

Emoticons

Used to express emotions in email, chat rooms, and new groups

Change certain values to reveal the effects of the changes

When using spreadsheet software, a function ______.

windows readyboost

Windows users can increase the size of memory through _______, which can allocate available storage space on removable flash memory device as additional memory cache.

Photo Management software

With ______ you can view, organized, sort, catalog, print, and share digital photos.

Data

_____ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.

Software suite

______ combined application software such as word processing, spreadsheet, presentation graphics, and email.

Chapter 2 Cellular radio network

______ offers high-speed internet connections to devices with built-in capable technology or computers with wireless modern

Document Management

______ software provides a means for sharing, Distributing, and searching through documents by converting them into a format that can be viewed by any user.

Chapter 3 Package Software

_______ is mass-produced, copyrighted retail software that makes that needs of a wide variety of users, not just a single user or company

Online help

_______ is the electronic equivalent of a user manual.

Downloading

_______ is the process of a computer or device receiving information, such as a web page, from a server on the internet.

System software

________ consists of the programs that control or maintain the operations of the computer and its devices.

Digital forensics

________ involves the examination of computer media, programs, data and log files on computers, servers, and networks.


Kaugnay na mga set ng pag-aaral

Unit 4 Lung/Larynx Caner (test book) NCLEX

View Set

Sophia Art History I Units 2 Key Terms

View Set

Pharmacology Exam #2 Multiple Choice Questions

View Set

General Insurance - Property and Casualty Insurance

View Set