Module 5,6,7,8,9,10,11

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

wireframe drawing

A 3D object composed of individual lines.

social engineering

A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.

relative reference

A cell reference that changes when the formula containing that reference is moved to a new location

relatve reference

A cell reference that changes when the formula containing that reference is moved to a new location

Absolute reference

A cell reference that does not change when the formula containing that reference is moved to a new location.

absolute reference

A cell reference that does not change when the formula containing that reference is moved to a new location.

cell address

A cell's location, expressed by its column letter and row number, such as A1.

sound card

A circuit board that gives a computer the ability to process sound.

video card

A circuit board that processes image signals.

database

A collection of data organized in a manner that allows access, retrieval, and use of that data.

worm

A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.

productivity suite

A collection of productivity apps such as Microsoft Office 365, Apple iWork, G Suite, or Apache OpenOffice.

workbook

A collection of related worksheets contained within a single file.

network

A collection of two or more computers connected together to share resources.

Internet Service Provider (ISP)

A company that sells Internet access.

name

A component of a function or formula that indicates what will occur. For example SUM is the name of a function.

client

A computer or mobile device on the network that relies on the server for its resources.

relational database

A database that consists of a collection of tables that can be joined through a common field; each table contains information on a specific subject, stored in the same file.

distributed denial of service (DDoS) attack

A denial of service attack that uses multiple computers to attack a server or other network resource.

mobile first design

A design principle centered on building apps to work on mobile devices first because these typically have more restrictions, such as smaller screens.

zombie

A device infected with malware that an attacker uses to control the device remotely.

codec

A device or program that encodes and usually compresses digital media data for storage and then decompresses the data for playback. Short for compressor/decompressor.

set top box

A device that allows you to view streaming media on your TV set; examples include Apple TV, Roku, and Google Chromecast.

network interface card (NIC)

A device that connects a computer to a network.

scanner

A device that converts an existing paper image into an electronic file that you can open and work with on your computer.

router

A device that directs traffic on a network and lets you share a single Internet connection among several computers.

uninterruptible power supply (UPS)

A device that maintains power to computer equipment in case of an interruption in the primary electrical source.

surge protector

A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.

modem

A device that sends and receives data over telephone or cable lines and is connected to your computer.

audio input devices

A device, such as microphone or headset, that lets you enter sound into a computer.

TV stick

A device, usually the size of a USB drive, that connects to a television to provide access to the Internet and to streaming apps.

camcorder

A digital video camera with the recorder in the same unit.

hoax

A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.

geotagging

A feature of digital cameras that can identify a picture's geographical location.

byte

A field size for Number fields that allows entries only from 0 to 255.

cookie

A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.

body area network (BAN)

A form of personal area network that consists of small, lightweight biosensors implanted in the body.

vector

A format for storing digital images that tend to be simple images composed of shapes, lines, and diagrams.

motion sensing gaming console

A game console that allows players to interact with the system through body movements. Input is usually accomplished through a combination of spoken commands, natural real-world actions and gesture recognition.

vector graphics

A graphic consisting of shapes, curves, lines, and text created by mathematical formulas.

charts

A graphic that represents data using bars, columns, dots, lines, or other symbols to make the data easier to understand and to make it easier to see the relationships among the data.

spreadsheet

A grid of cells that contain numbers and text; in Microsoft Excel, a spreadsheet is called a worksheet.

bitmap

A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.

bitmap graphic

A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.

graphics tablet

A hardware device used to create drawings with a pressure-sensitive pen.

mixed reality

A hybrid of virtual reality and augmented reality, simulations that let you see the real world while interacting with realistic virtual objects.

on screen keyboard

A keyboard displayed on-screen that includes keys for typing text, numbers, and symbols.

SQL (Structured Query Language)

A language that provides a standardized way to request information from a relational database system.

Trendlines

A line that represents the general direction in a series of data.

view only link

A link to a workbook on a OneDrive that can be viewed by users.

keyframe

A location on a timeline that marks the beginning or end of a movement, effect, or transition.

digital device

A machine that reads and produces digital, or binary, data.

analog device

A machine that reads or produces physical signals in their original form, such as a camera or tape player.

formulas

A mathematical statement in a spreadsheet or table cell that calculates a value using cell references, numbers, and arithmetic operators such as +, -, *, and /.

operators

A mathematical symbol used in a formula to combine different values, resulting in a single value that is displayed within the cell.

uptime

A measure of the percent of time a website is "up" or online; indicator of a web host's reliability.

video consoles

A meeting among several geographically separated people who use a network or the Internet to transmit audio and video data; also called a web conference.

lossless compression

A method of reducing graphics file size in which none of the original file data is discarded; TIF, PNG, and GIF files can be compressed using lossless compression. See also Lossy compression.

lossy compression

A method of reducing graphics file size in which some of the original file data is discarded; the lost data is generally not noticeable; JPEG files use lossy compression. See also Lossless compression.

two factor authentication (2FA)

A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.

style

A named collection of formats that are stored together and can be applied to text or objects.

function

A named operation that replaces the action of an arithmetic expression.

macros

A named set of instructions written in the Visual Basic programming language that perform tasks automatically in a specified order.

peer-to-peer (P2P) network

A network architecture in which a small number of computers (often fewer than 10) communicate directly with one another and can share each other's resources.

Creative Commons

A non-profit organization that makes it easy for content creators to license and share their work by supplying easy-to-understand copyright licenses; the creator chooses the conditions under which the work can be used.

evil twin

A normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit.

binary number system

A number system consisting of only two digits: 0 and 1.

hub

A pane in Microsoft Edge that provides access to favorite websites, a reading list, browsing history, and downloaded files.

Weak password

A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).

graphic

A picture, shape, design, graph or chart, diagram, or video.

JavaScript

A popular language for writing scripts that run in your browser to control a webpage's behavior and often make it interactive.

server

A powerful, high-capacity computer you access using the Internet or other network; it stores files and "serves" them, that is, makes the files available to, users; usually grouped at a location called a data center.

license filter

A search engine tool that lets you search for pictures that you can use, share, or even modify for personal or commercial use.

real time animation

A security feature that sets Windows Defender to constantly monitor your computer for virus and spyware activity.

encryption

A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.

animated GIF

A series of slightly different GIF images displayed in sequence to achieve animation effects.

web analytics

A set of measurements that helps you to understand how people use your website.

worksheets

A single sheet in a workbook file that is laid out in in a grid of rows and columns

relational database management system (RDBMS)

A software program in which data is organized as a collection of tables, and relationships between tables are formed through a common field.

presentation software

A software program used to organize and present information in the form of an electronic slide show.

simulation

A sophisticated computer animation that is useful for training and teaching in many fields, particularly in areas in which learning can be dangerous or difficult.

compression

A space-saving technique used to store data in a format that takes less space.

HTML

A special language that software developers use to create and format webpage elements; stands for Hypertext Markup Language.

webpage

A specially formatted document that can contain text, graphics, sound, video, and links to other webpages.

pivot tables

A spreadsheet table designed to create meaningful data summaries that analyze worksheets containing large amounts of data.

MIDI (Musical Instrument Digital Interface)

A standard music file protocol used by a variety of electronic musical instruments, computers, and other related devices to connect and communicate with one another; stands for Musical Instrument Digital Interface.

protocol

A standardized procedure used by computers to exchange information.

password

A string of uppercase and lowercase letters, numbers, and symbols that when entered correctly, allow you to open a password-protected database or to obtain access to a Window user's account.

video conferencing

A technology that allows people at two or more locations to meet electronically using a network such as the Internet to transmit video and audio data.

voice recognition

A technology that determines who is speaking rather than what is being said.

smart tv

A television that can connect to the Internet and stream TV shows and movies from subscription streaming services.

bandwidth

A term commonly used to describe the capacity of a communication channel.

slide show

A term used to describe a PowerPoint presentation.

content management system (CMS)

A tool used to create a blog or website that you usually install or manage on your web server.

Internet peer-to-peer (Internet P2P) network

A type of P2P network where users share files with each other over the Internet.

stop motion animation

A type of animation where animators move real-life objects through a sequence of poses and capture the movements one frame at a time. When you play the frames in sequence, the objects seem to move.

denial of service (DoS) attack

A type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services.

webcam

A type of digital video camera that captures video and still images as well as audio input; often built into a desktop, laptop, or tablet computer.

augmented reality gaming

A type of gaming that integrates visual and audio game content with your real environment.

Ransonware

A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.

ransomware

A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.

local area network (LAN)

A type of network installed to link multiple PCs together so they can share hardware and software resources.

wireless network

A type of printer or other device that is connected to either a wired or wireless network to which you have access.

digital audio

A type of sound that is recorded and stored as a series of 1s and 0s.

adware

A type of spyware that changes your browser settings to display advertisements.

code editor

A type of text editor that has additional features to help write code accurately and efficiently.

augmented reality (AR)

A type of virtual reality that uses an image of an actual place or thing and adds digital information to it.

metropolitan area network (MAN)

A type of wide area network (WAN) that is operated by a city or county.

web address

A unique address on the Internet where a webpage resides; also called a URL.

MAC address

A unique hardware address identified for your computer or device.

TCP/IP (Transmission Control Protocol/ Internet Protocol)

A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.

Wi-Fi hotspot

A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.

viral video

A video that has been shared millions of times over social media in a short period of time.

skin

A visual image created by audio software to go along with the sounds being played.

what if analysis

A way to explore the impact that changing input values has on calculated values and output values

responsive design

A way to provide content so that it adapts appropriately to the size of the display on any device.

website builder

A way to provide content so that it adapts appropriately to the size of the display on any device.

read-only access

A way to share files so others may read the file, but cannot change it.

biometric security

A way to verify your identity based on physical characteristics.

remote web server

A web server on the Internet.

stock photo gallery

A website that maintains an inventory of photographs and other graphics and makes them available for download.

wi-fi

A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.

bluetooth

A wireless short-range radio connection that simplifies communications among Internet devices and between devices and the Internet.

container

A wrapper that contains parts of a video file including the video, audio, and codec, in a single package.

micro speakers

Portable speakers that can be as small as an inch or two in height and width.

clip art

Premade pictures and symbols you can use in electronic documents.

extranet

Allows outsiders (such as customers, vendors, and suppliers) to access an organization's intranet.

mobile commerce

Also known as m-commerce. These apps let you use your mobile device to make online purchases of goods and services.

m-commerce

Also known as mobile commerce. These apps let you use your mobile device to make online purchases of goods and services.

report

An Access object that creates a professional printout of data that may contain enhancements such as headers, footers, and calculations on groups of records.

URL

An abbreviation for Uniform Resource Locator, which is a webpage address that identifies the location of the file on the Internet.

in-betweening

An animation technique using a sequence of images, in which one or more objects are changed slightly between each image. Often shortened to tweening.

2-d animation

An animation that displays 2-D images in rapid sequence to create the illusion of lifelike motion.

3-d animation

An animation that displays 3-D objects or models in rapid sequence to create the illusion of natural motion.

paint apps

An app designed for drawing pictures, shapes, and other graphics with various onscreen tools, such as a text, pen, brush, eyedropper, and paint bucket.

web app

An app stored on an Internet server that can be run entirely in a web browser.

presentation apps

An app that lets you create visual aids for presentations to communicate ideas, messages, and other information to a group.

native app

An app written for a specific operating system and installed on a computer or mobile device.

media player

An application that lets you play audio and video files; most tablets and smartphones include media players.

local applications

An application that runs from the hard drive of a local computer.

ergonomics

An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.

Address Spoofing

An attack that changes the device's address so that data is sent to the attacker's computer.

phishing

An attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a website.

virtual world

An environment simulated by virtual reality software to appear as a real or imagined 3-D space.

digital graphic

An image you can see, store, and manipulate on a computer, tablet, smartphone, or other digital device.

cyberterrorists

An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.

attackers

An individual who launches attacks against other users and their computers, also known as a threat actor.

script kiddies

An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so. Script kiddies download freely available automated attack software (scripts) from websites and use it to perform malicious acts.

mix

An interactive video created from a PowerPoint presentation using Office Mix and posted to a website.

intranet

An internal network site used by a group of people who work together.

App store

An online store to help you locate and download apps for your mobile device.

Apache OpenOffice

An open source suite of productivity apps.

domain registrar

An organization that sells and manages web domain names.

project

An organized set of tasks required to reach a goal.

raster

Another name for bitmap images.

FTP (File Transfer Protocol) client

App used to upload or download files between your local computer and a remote web server.

computer-aided design (CAD) software

Applications used by architects, scientists, designers, engineers, and others to create highly detailed and technically accurate drawings that can be shared, modified, and enhanced with speed and accuracy.

3-d cad software

Applications used by engineers and scientists to create wireframe drawings of objects, which they can rotate to view from multiple angles.

productivity apps

Apps for personal use that you may use to create documents, develop presentations, track appointments, or to stay organized.

graphics and media apps

Apps that allow you to interact with and edit digital media.

video editing apps

Apps that allow you to modify a segment of a video, called a clip.

personal interest apps

Apps that give you tools to pursue your interests.

animation software

Apps that let you create animations to give objects the appearance of motion or activity

drawing apps

Apps that let you create simple, two-dimensional images, which are often vector graphics.

photo and image editing apps

Apps that provide the capabilities of paint apps and let you enhance and modify existing photos and images.

device management apps

Apps that provide tools for maintaining your computer or mobile device.

communications apps

Apps that provide tools for sharing or receiving information.

portable apps

Apps that run from a removable storage device such as an external hard drive or flash drive, or from the cloud.

mobile apps

Apps that you access on a smartphone or tablet.

hactivists

Attackers who are strongly motivated by principles or beliefs.

live audio feed

Audio transmitted live, as it happens; you can play the audio directly from the Internet.

cyberbullying

Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.

digital media

Content you create, produce, and distribute in digital, or computer-readable, form, such as photos, audio, video, and virtual reality.

analog sound waves

Continuous sound waves created in response to vibrations in the surrounding air, such as a drumstick hitting a drum pad.

built in function

Features in spreadsheet apps that perform financial, mathematical, logical, date and time, and other calculations.

G suite

Google's web-based productivity applications for creating documents, spreadsheets, presentations, email, and calendars.

nation state actors

Government-sponsored attacker that launches computer attacks against their enemies.

one-sided tag

HTML 5 tag that does not require a closing tag.

VR gaming system

Hardware necessary for playing virtual reality games.

game console

Hardware that allows you to play video games; examples include Xbox, Nintendo Wii, and Sony PlayStation.

resolution dependent

Describes graphics whose image quality deteriorates as their size increases; bitmap graphics are resolution dependent, but vector graphics keep the same quality as their size increases.

static

Describes webpage content that does not change very often.

cable modem

Device that sends and receives digital data over a cable TV connection.

e-waste

Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.

records

In Access and Excel, a row of data in a table, representing a complete set of field values for a specific person, place, object, event, or idea; also called a tuple.

field name

In Access, Excel, Publisher, or in a Word table, a column label that describes a data field.

Tables

In Access, a collection of records for a single subject, such as all of the customer records; the fundamental building block of a relational database because it stores all of the data.

hyperlink

In Access, a data type for fields that store a link to a webpage, file, or email address.

form

In Access, an object that provides an easy-to-use data entry screen that generally shows only one record at a time.

controls

In Access, any form or report element such as a label, text box, or combo box. In Windows, an object used to manipulate a window or to use a program.

attributes

In Access, property of an entity or a column in a table.

strong password

In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length.

Template

In Computer Concepts, a document that has been preformatted for specific purpose (such as an invitation, a brochure, a flyer, a cover letter, or a resume).

web based applications

In Computer Concepts, a program that you access over the Internet, in a browser on your computer or on your mobile device, also known as a web app.

Virus

In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.

virus

In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.

phishing

In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.

Argument

In Excel and Access, and in Word tables, information necessary for a formula or function to calculate an answer.

documents

In Excel, to make notes about basic worksheet assumptions, complex formulas, or questionable data.

inline style

In HTML, a style attribute of most HTML tags.

tags

In HTML, codes used to identify or "mark up" the content in a webpage such as, <p>....</p> tags to markup a paragraph.

query

In Power BI or similar programs, a request for information from a data source.

Animations

In PowerPoint, an effect applied to an object that makes the object appear, disappear, change, or move.

animation

In PowerPoint, an effect applied to an object that makes the object appear, disappear, change, or move.

sampling

In Publisher, a command that lets you copy an element's color and apply it elsewhere.

switch

In a field in Word, a comman that follows \*, \#, \@, or \! and turns on or off certain features of a field.

dynamic

In a multipage workbook, describes pagination represented by horizontal or vertical dashed lines, which indicate where pages print separately, and which adjust automatically when the workbook content changes.

field

In an Access or in an Excel table or PivotTable, a column containing a specific property for each record, such as a person, place, object, event, or idea.

style sheet

External file that stores style information for a larger website to create a consistent appearance across all pages in the website.

malware

Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.

rootkit

Malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence.

Trojan

Malware that hides inside another program, often one downloaded from the web.

trojan

Malware that hides inside another program, often one downloaded from the web.

cross platform

Tools that developers can use to build apps that work on multiple platforms, rather than writing different code for Android or iPhone devices.

document management tools

Tools that protect and organize files and let you share documents with others.

search engine optimization (SEO)

Tools to allow search engines to better find or index your website.

spam

Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.

CSS (Cascading Style Sheets)

Used to specify the format and appearance of content on webpages.

identity theft

Using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.

voice over

Voice narration that can accompany a slide presentation or other video.

synthesized music

Voice output that converts text to speech.

mobile hotspot

Wireless network available in public places such as hotels, restaurants, and coffee shops.

bus network

Wires on which data travels to and from the CPU.

client-side script

Script that runs in your browser to control a webpage's behavior and often make it interactive; usually written in JavaScript.

Server side script

Script that runs on server, often to process data from an online form or interact with a database.

wired network

Sends signals and data through cables to connect to other network devices; tend to be more secure and transmit data faster than wireless networks.

Apps

Short for "application," a computer program that performs specific tasks; also called a program.

XML

Short for Extensible Markup Language, a language used to mark up structured data so that it can be more easily shared between different computer programs; contains XML tags that identify field names and data.

pixel

Short for picture element, an individual point of color on a display screen or printout.

pixels

Short for picture element, an individual point of color on a display screen or printout.

Audio Capture and Editing Software

Software for editing, copying, and sharing digital audio files.

speech recognition

Software that helps a user to input data or information verbally.

on demand content

Software that is distributed online for a monthly subscription or an annual fee.

music production software

Software that lets you record, compose, mix (combine), and edit music and sounds.

stand alone player

Software that plays certain types of audio files on a desktop or laptop computer.

spyware

Software that tries to collect personal information or change computer settings without your consent.

synthesized speech

Sound output that is the result of breaking words into individual sound units, called phonemes, and stringing them together to create words and phrases.

conditional formatting

Special formatting that is applied if values meet specified criteria.

network standards

Specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used.

Page Orientation

The direction in which content is printed on the page.

HTML 5

The latest version of the Hypertext Markup Language, which is built into browsers.

privacy

The state or condition of being free from public attention to the degree that you determine.

virtual reality (VR)

The use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space.

cyberstalking

The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.

plug in

Third-party program that extends the built-in functionality of an application or browser.

plugin

Third-party program that extends the built-in functionality of an application or browser.

text editor

Third-party program that extends the built-in functionality of an application or browser.

wireless routers

This central connection device needed for a home-based Wi-Fi network. The wireless router acts as the "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet. worm

publish

To share Excel workbook data on a network or on the web so that others can access it using a web browser.

filter

To specify a set of restrictions to only display specific database records, online images, or files.

render

To transform a wireframe drawing into a solid 3D image.

bit

(Short for binary digit), the smallest unit of data a computer can process.

presentation

A PowerPoint document that lets you create and deliver a dynamic, professional-looking message to an audience in the form of a slide show.

technology addiction

A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.

insertion point

A blinking vertical line that appears when you click in a paragraph, cell or text box; indicating where new text or an object will be inserted.

machine learning

A branch of AI that uses statistics to help machines learn from data, identify patterns, and make decisions to progressively improve their performance without much human intervention.

DSL modem

A broadband technology that creates a high-speed connection to the Internet through standard telephone lines.

network topology

A broadband technology that creates a high-speed connection to the Internet through standard telephone lines.

wireless network key

A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.

digital video camera

A camera that can capture video files in a digital format, as a series of 0s and 1s.

digital camera

A camera that creates a digital image of an object, person, or scene.

Virtual Private Network (VPN)

A private, secure path across a public network that allows authorized users secure access to a company or other network.

Apple iWork

A productivity suite for computers running macOS and iPhones and iPads running the iOS operating system.

audio software

A program included on portable media players such as iPods and smartphones that often offers features such as file-shuffling and volume control.

text-to-speech software

A program that accepts text as input and then generates sounds from phoneme sequences to create synthesized speech.

graphics software

A program that allows you to create, view, manipulate, and print digital images such as photos, drawings, clip art, and diagrams.

sampling software

A program that breaks sound waves into separate segments, or samples, and stores each sample numerically.

sound recorder software

A program that can capture sound from an audio input device such as a microphone or headset.

password manager

A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.

drawing program

A program that lets you create vector images.

image editing software

A program that lets you open and modify existing images.

video editing software

A program you use to enhance and customize a video.

photo editing software

A program, such as Adobe Photoshop, that lets you enhance and correct photographs.

hologram

A projected image that appears three-dimensional.

firewall

A protective barrier between a computer or network and others on the Internet.

deprecated

A quality of a technology indicating that developers are discouraged from using it because a newer technology has been created to take its place.

sparklines

A quick, simple chart located within a cell that serves as a visual indicator of data trends.

logos

A recognizable symbol that identifies a person, business, or organization.

repetitve strain injury (rsi)

Aches and pains associated with repeated and long-term usage of the devices.

scroll bars

Bars on the right edge (vertical scroll bar) and bottom edge (horizontal scroll bar) of a document window that let you view a document that is too large to fit on the screen at once.

digital certificate

Code attached to a file that verifies the identity of the creator of the file.

Integrated Development Environment (IDE)

Combines advanced code editing tools, debugging tools, and a graphical user interface to interact with file management tools, to simplify the process of developing websites and applications.

word processing software

Commonly used software to create documents and reports, mailing labels, flyers, brochures, newsletters, resumes, letters, and more.

headset

Includes one or more headphones for output, and a microphone for input.

Big Data

Large and complex data sources that defy easy handling with traditional data processing methods.

external link

Link to to another website.

digital video

Live action captured in digital format by a video camera.

Microsoft Office 365

Microsoft's productivity suite which includes word processing, spreadsheets, and presentation apps, as well as Microsoft Outlook for email, Microsoft OneNote for note taking, and Microsoft Access for databases.

platform specific

Mobile apps designed for a specific operating system like Android or iPhone.

stream

Music that you can listen to as it is being downloaded from the web.

client/server network

Network architecture in which one or more computers act as a server, and the other computers on the network request resources from the server.

wide area network (WAN)

Network that connects devices in a large geographic region, such as a multinational company or national retail chain.

personal area network (PAN)

Network that connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone.

mesh network

Network topology in which all devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.

network architecture

Network topology in which all devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.

ring network

Network topology in which data travels from one device to the next in a sequential fashion; if one device on the network fails, network communication could cease to function. No longer common.

star network

Network topology in which each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.

megapixel

One million pixels. On a digital camera, the measurement that describes the camera's maximum resolution; the higher the number of megapixels, the higher the resolution of photos, and the larger the picture files.

World Wide Web Consortium (W3C)

One of the leading organizations that set guidelines for the web and that work together to write web standards.

network attached storage (NAS)

One or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks.

script

Programming code that performs a series of commands and can be embedded in a webpage.

scripting language

Programming language used to code webpage scripts, such as Python, Java, JavaScript, PHP, Ruby, or C#.

Application software

Programs that help you perform specific tasks when using your computer or smartphone. They are also called software applications or apps.

cloud computing

Providing and using computer tools, such as software, via the Internet (or the cloud).

live video streaming

Streaming video content transmitted live, as it happens; you can view the media as it arrives.

cell

The box formed by the intersection of a column and a row.

local computer

The computer storing files to publish to a server using an FTP client.

net neutrality

The concept that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site.

Transitions

The manner in which a slide appears on the screen in place of the previous slide during a slide show.

transition

The manner in which a slide appears on the screen in place of the previous slide during a slide show.

Ethernet

The most common network standard for wired networks.

bit rate

The number of bits of data processed every second, usually measured as kilobits per second (kbps).

resolution

The number of horizontal and vertical pixels in a display device or the sharpness and clarity of an image.

file format

The organization and layout of data in a file

format

The process of changing the appearance of text and objects.

data backup

The process of copying files from a computer's hard drive to be stored in a remote location.

authentication

The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.

data mining

The process of sifting through big data to find the important questions that will yield fruitful results.

download

The process of transferring (copying) a file from a server, computer, or device to another computer or device.

decryption

The process of unlocking encrypted information back into a readable format.

insiders

The security threat to a company that comes from its own employees, contractors, and business partners.

artificial intelligence (AI)

The technological use of logic and prior experience to simulate human intelligence.

slide master

The template for the slides in a presentation that contains theme elements and styles, text formatting, the slide background, and other objects that appear on all the slides in the presentation.

digitize

To convert sound to a format your computer can read.

sort

To organize data, such as table rows, items in a list, or records in a mail merge, in ascending or descending order, based on criteria such as date, alphabetical order, file size, or filename.

embedded styles

To place a copy of an object created in a source file into a destination file so that a one-way connection to the source program becomes part of the destination file; you can then edit the embedded object using the source program.


Kaugnay na mga set ng pag-aaral

Literacy Development Final Review.

View Set

Worksheet: Chemical Energy & ATP

View Set

Contemporary Views of Classical Conditioning (Chapter 5)

View Set

Plants and Civilization Quizlet (NOT ON FINAL EXAM)

View Set

Ch 19 INSURANCE OF SUBSTANDARD RISKS

View Set