Final Exam CGS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

CPU (Central Processing Unit)

(Or microprocessor) The main processor of a computer. It is responsible for organizing and carrying out instructions to produce desired output. Also nicknamed "the brain" of the computer. (Intel core i3)

Memory Cards

(Tiny and flat) Are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames. (type of solid state storage)

Hub

A basic network device that provides multiple port for connecting nodes.

Office suite

A bundle of programs that help businesses efficiently carry out tasks such as writing letters, analyzing sales figures, and scheduling meetings.

Presentation

A category of software that enables users to create electronic slideshows that are used to present information. (Example: Powerpoint)

Wikis

A collaborative information site, such as Wikipedia, that relies on the internet community to both create and edit content.

Router

A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.

Acceptable Use Policy (AUP)

A document containing an organization's policies for ethical, secure, and appropriate use of computing resources.

Copyright Law

A federal law that gives software creators a variety of rights and privileges over their creative work.

Word: Theme

A group of formatting options that is applied to an entire Word document. (font, color, and effect styles that are applied to text, tables, graphics, and other elements int he document)

Volume Licence

A license that allows companies to install software on multiple machines.

Frequently Asked Questions (FAQ)

A list of common questions and their responses on a website.

Distributed Denial-of-Service (DDoS)

A network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.

Switch

A network device that is similar to hub, but it is aware of the exact address or identify of all the nodes attached to it, thereby increasing the efficiency of the network.

3D printers

A printer that can create a 3-dimensional object made of various materials. (example: phone cases)

Trojan horse

A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Microblogging Services

A short-form blog where users share brief thoughts, links, and multimedia. (Services: Tumblr & Twitter)

Bluetooth

A short-range wireless technology used in devices such as hands-free systems.

Cookies

A small data file created by a web browser that remembers your preferences for a specific website and is one of the most misunderstood features of the web.

USB flash drive

A small storage stick that plugs into a USB port. (type of solid state storage device)

Shareware/Trial Software

A software license that is free to download and install but will stop working after 30 days unless the user purchases the software.

Virtual Private Network (VPN)

A type of connection that increases the security of network communication by employing a method called "tunneling," whereby each packet from the sending computer is encapsulated within another packet.

Open Source

A type of licence that permits the source code to be freely distributed and modified. (GNU {General Public License}: one of the most famous open source license remains free to distribute)

IP Address

A unique set of numbers and/or letters that uniquely identifies every computer or device on the internet.

Blog

A web page or small website that contains a series of chronological posts and comments.

NFC (near field communication)

A wireless technology that lets your mobile device communicate over very short distances, such as when paying for goods on wireless payment devices.

Business Accounting, Personal Finance, and Tax Preparation.

Accounting Software has three forms of managing your finance-related tasks in which are

Piracy

Acquiring or exchanging copies of protected digital creations without payment or permission from the creator.

Overview: Smart Lookup Tool

Allows you to quickly search the Internet about any word or phrase in a document, spreadsheet, or presentation.

Monitor

An electronic display device, or screen, used to output text and graphics to the user.

Fair Use

An exception to copyright law that provides for a limited set of circumstances where other can use copyrighted material without first obtaining permission.

Freeware

Any software that is free to use without any specified time restrictions. Although it is free it is still protected by a licence and by copyright law.

Biotechnology

Application of biology that uses living organisms to manufacture new products or improve existing ones.

Kilobyte (KB)

Approximate value: 1,000 Actual value(bytes): 1,024

Terabytes (TB)

Approximate value: 1,000 GB Actual value(bytes): 1,099,511,627,776

Megabyte (MB)

Approximate value: 1,000 KB Actual value(bytes); 1,048,576

Gigabyte (GB)

Approximate value: 1,000 MB Actual value(bytes): 1,073,741,824

Search Engine

Are sophisticated services that store URLs of millions of web pages and most of the content on those pages. (Google)

BCC (email parts)

Blind carbon copy, will be invisible to the recipients of your message.

Overview: Backstage View

Clicking the File Tab opens Backstage view, where you can access the commands for managing and protecting your files, including Save, Open, Close, New, Print, and Share.

Word: Styles

Complex formatting, including font, color, size, and spacing, that can be applied to text. Use consistent styles for headings, body text, notes, and captions throughout your document. Can also be applied to tables and graphics.

LAN (local area network)

Data communication system consisting of multiple devices that are relatively near each other and physically connected using cables or wireless media.

Unix

Dates 1969, runs many of the worlds most powerful servers. (uses a command-line interaface)

operating systems

Exists primarily to help the computer run and manage its resources .(Such as Windows or Mac OS) A software that manages the flow of data between hardware components and allows the user to communicate with the computer.

Network Bandwidth

In networks, it refers to the amount of data that can be transmitted over a given amount of time.

Business Accounting Software examples

Intuit Quickbooks, Sage 50 Accounting, Xero (cloud based)

Personal Finance Software examples

Intuit Quicken and YNAB (Desktop & Mobile), Mint (most popular cloud based software)

Tax Preparation Software examples

Intuit TurboTax & H&R Block ( most popular desktop programs)

Nanotechnology

Involves the creation of manipulation of matter at the smallest possible scale.

Artificial Intelligence (AI)

Involves the development of intelligent systems or machines that posses capabilities such as learning, problem-solving, and communication.

Database

Is simply an organized method to store information. (Example: Access)

Overview: Mini Toolbar

It appears to the upper right of text that is selected. A small toolbar containing frequently used formatting commands that displays as a result of selecting text or objects.

Overview: Protected View

It provides a red-only format that protects your computer from becoming infected with a virus or other malware.

Overview: File Properties

It provides information about a file such as the location of the file, the size of the file, when the file was created and when it was last modified, the title, and the author.

Overview: Keyboard Shortcuts

Keys or combinations of keys that you press to execute a command. They run across the top of the keyboard. (F keys or functions) or (Ctrl+F = Find)

Overview: The Ribbon

Located above the address bar. It is divided into tabs that contain buttons for various commands for working with files and folders.

Overview: Quick Access Toolbar

Located in the upper left corner of the File Explorer window. It gives you one-click access to common commands.

Phishing

Luring individuals into entering personal information into the website controlled by a hacker.

Overview: Account Page

Microsoft account you use when installing Office. You can view your Microsoft user profile, switch between user accounts, view your product information, and connect to online services, such as Twitter and YouTube.

Overview: OneDrive

Microsoft's free cloud storage where you can save documents, workbooks, presentations, videos, pictures, and other files and access those files from any computer or share the files with others.

Android

Open source operating system. Owned by Google and manages the google play to store apps , allowing any manufacturer to use and modify this operating system for their devices, example: Samsung, Motorola, and HTC.

Linux

Open source, Unix-like operating system created by Linus Torvalds in 1991. (contributing modifications and enhancements)

iOS

Operating system powers Apple's iPhone and iPad. (Considered to be a very friendly and stable operating system, largely due to Apple's tight control of the hardware and software ecosystem.)

Software

Refers to one or more of these programs (computer programming language C++,Java & Visual Basic) that are packaged together for a unified purpose.

Biometrics

Refers to the measurement of patterns or characteristics found in the human body. (facial recognition is a biometric technology)

Screen resolution

Refers to the number of pixels that it can display on the screen.

Solid State Storage

Relies on a special kind of flash memory chip to permanently store data.

Computer program

Set of instructions that directs the computer to perform a variety of tasks.

Social Networking

Sites that are used to create connections between friends, family members, and organizations,thereby allowing individuals to share information and receive updates from those in their social circles.

Web browser

Software that helps you find and retrieve a web page that you are interested in viewing.

PIM Software (personal information manager)

Software that is designed to keep individuals organized via the management of contacts, appointments, to-do lists, and email. (Example: Outlook)

Word Processing

Software that provides tools for creating, editing, and formatting all kinds of text-based documents.(Example: Microsoft Word)

Spreadsheet

Software used for entering, calculating, and analyzing sets of numbers. This software is also used for creating charts. (Example: Excel)

Word: Header

Text that appears at the top of every page in a document.

Storage

The ability of a computer to hold or remember the information it processes.

Processing

The ability of a computer to perform actions based on instructions from the user or a program.

cloud computing

The ability to store your files and use various applications in an online account.

Cloud storage

The ability to store your files online and access them from any Internet-connected device.

Whistleblowing

The act of alerting the public about harmful activities that are being hidden by an organization.

WAN (wide area network)

The connection of two or more central computers or LANs, generally across a wide geographical area.

Supercomputers

The largest and most powerful computers in the world. (Can link hundreds of thousands of processors)

Internet

The largest network in the world, it connects billions of people and organizations.

WiFi

The most popular standard for wireless networking also known as "802.11"

Hardware

The physical devices that makeup a computer system. (Processors, monitors and keyboard)

Domain Name

The portion of the URL that uniquely identifies a site and a brand on the web. (apple.com, layalimiami.com)

Hard Drive

The primary storage of a personal computer.

Compression (file compression)

The process of making a file smaller than its original size. (squeezing more than one file into a smaller compressed file)

Encryption

The process of scrambling your date storage devices to make them unreadable by anyone who doesn't have the proper key(password, pin, or card)

CC (email parts)

The section knows as cc, or carbon copy, is used to send a copy of your message to individuals other than your primary recipient.

Byte

The unit of a memory or storage that represents eight bits. It is the amount of space required to store a single character, such as a letter or number.

To (email parts)

This contains the email address of the primary recipients.

Virus

Type of malware that is attached to a host file and has the ability to replicate, or copy itself.

Spyware

Type of malware that reposts activity on your computer to another party.

Worm

Type of malware that self-replicates and spread through computers and networks.

RAM (random access memory)

Type of memory that temporarily stores the data and programs that a computer is currently using. (temporary workspace)

Virtual Reality

Where humans can experience realistic environments that are simulated by computers.

Augmented Reality

Where the real world is supplemented with computer generated information.

World Wide Web (WWW)

a global system of linked, hypertext documents known as web pages.

Output

refers to the processed results that a computer sends out to you.

Input

refers to user entries or activities that tell the computer what to do.


Kaugnay na mga set ng pag-aaral

Managerial Accounting - Ch 7: Incremental Analysis for short term decision making

View Set

10th grade Biology Unit 1: Lesson 6

View Set

PCAP- programing Essentials in Python

View Set

OB Adaptive quizzing test 3 CH 33

View Set