Module 5,6,7,8,9,10,11
wireframe drawing
A 3D object composed of individual lines.
social engineering
A category of attacks that attempts to trick the victim into giving valuable information to the attacker. At its core, social engineering relies on an attacker's clever manipulation of human nature in order to persuade the victim to provide information or take actions.
relative reference
A cell reference that changes when the formula containing that reference is moved to a new location
relatve reference
A cell reference that changes when the formula containing that reference is moved to a new location
Absolute reference
A cell reference that does not change when the formula containing that reference is moved to a new location.
absolute reference
A cell reference that does not change when the formula containing that reference is moved to a new location.
cell address
A cell's location, expressed by its column letter and row number, such as A1.
sound card
A circuit board that gives a computer the ability to process sound.
video card
A circuit board that processes image signals.
database
A collection of data organized in a manner that allows access, retrieval, and use of that data.
worm
A collection of harmful computer code that spreads throughout a computer and/or network without requiring user interaction.
productivity suite
A collection of productivity apps such as Microsoft Office 365, Apple iWork, G Suite, or Apache OpenOffice.
workbook
A collection of related worksheets contained within a single file.
network
A collection of two or more computers connected together to share resources.
Internet Service Provider (ISP)
A company that sells Internet access.
name
A component of a function or formula that indicates what will occur. For example SUM is the name of a function.
client
A computer or mobile device on the network that relies on the server for its resources.
relational database
A database that consists of a collection of tables that can be joined through a common field; each table contains information on a specific subject, stored in the same file.
distributed denial of service (DDoS) attack
A denial of service attack that uses multiple computers to attack a server or other network resource.
mobile first design
A design principle centered on building apps to work on mobile devices first because these typically have more restrictions, such as smaller screens.
zombie
A device infected with malware that an attacker uses to control the device remotely.
codec
A device or program that encodes and usually compresses digital media data for storage and then decompresses the data for playback. Short for compressor/decompressor.
set top box
A device that allows you to view streaming media on your TV set; examples include Apple TV, Roku, and Google Chromecast.
network interface card (NIC)
A device that connects a computer to a network.
scanner
A device that converts an existing paper image into an electronic file that you can open and work with on your computer.
router
A device that directs traffic on a network and lets you share a single Internet connection among several computers.
uninterruptible power supply (UPS)
A device that maintains power to computer equipment in case of an interruption in the primary electrical source.
surge protector
A device that protects computer equipment by absorbing electrical spikes, surges, or noise before they can reach the equipment.
modem
A device that sends and receives data over telephone or cable lines and is connected to your computer.
audio input devices
A device, such as microphone or headset, that lets you enter sound into a computer.
TV stick
A device, usually the size of a USB drive, that connects to a television to provide access to the Internet and to streaming apps.
camcorder
A digital video camera with the recorder in the same unit.
hoax
A false warning, often contained in an email message that pretends to come from a valid source like the company's IT department. Attackers use this method to break into computers.
geotagging
A feature of digital cameras that can identify a picture's geographical location.
byte
A field size for Number fields that allows entries only from 0 to 255.
cookie
A file created by a website and that stores information on your computer, such as your website preferences; also called a first-party cookie.
body area network (BAN)
A form of personal area network that consists of small, lightweight biosensors implanted in the body.
vector
A format for storing digital images that tend to be simple images composed of shapes, lines, and diagrams.
motion sensing gaming console
A game console that allows players to interact with the system through body movements. Input is usually accomplished through a combination of spoken commands, natural real-world actions and gesture recognition.
vector graphics
A graphic consisting of shapes, curves, lines, and text created by mathematical formulas.
charts
A graphic that represents data using bars, columns, dots, lines, or other symbols to make the data easier to understand and to make it easier to see the relationships among the data.
spreadsheet
A grid of cells that contain numbers and text; in Microsoft Excel, a spreadsheet is called a worksheet.
bitmap
A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.
bitmap graphic
A grid of square colored dots, called pixels, that form a picture; also, a file containing a graphic that consists of a bitmap.
graphics tablet
A hardware device used to create drawings with a pressure-sensitive pen.
mixed reality
A hybrid of virtual reality and augmented reality, simulations that let you see the real world while interacting with realistic virtual objects.
on screen keyboard
A keyboard displayed on-screen that includes keys for typing text, numbers, and symbols.
SQL (Structured Query Language)
A language that provides a standardized way to request information from a relational database system.
Trendlines
A line that represents the general direction in a series of data.
view only link
A link to a workbook on a OneDrive that can be viewed by users.
keyframe
A location on a timeline that marks the beginning or end of a movement, effect, or transition.
digital device
A machine that reads and produces digital, or binary, data.
analog device
A machine that reads or produces physical signals in their original form, such as a camera or tape player.
formulas
A mathematical statement in a spreadsheet or table cell that calculates a value using cell references, numbers, and arithmetic operators such as +, -, *, and /.
operators
A mathematical symbol used in a formula to combine different values, resulting in a single value that is displayed within the cell.
uptime
A measure of the percent of time a website is "up" or online; indicator of a web host's reliability.
video consoles
A meeting among several geographically separated people who use a network or the Internet to transmit audio and video data; also called a web conference.
lossless compression
A method of reducing graphics file size in which none of the original file data is discarded; TIF, PNG, and GIF files can be compressed using lossless compression. See also Lossy compression.
lossy compression
A method of reducing graphics file size in which some of the original file data is discarded; the lost data is generally not noticeable; JPEG files use lossy compression. See also Lossless compression.
two factor authentication (2FA)
A method that combines multiple types of authentication to increase security. This is most often used with passwords (something you know) and the approved user having a specific item in his possession (something you have) that no one else would have. This is commonly used by combining passwords and codes sent to a cell phone using a text message.
style
A named collection of formats that are stored together and can be applied to text or objects.
function
A named operation that replaces the action of an arithmetic expression.
macros
A named set of instructions written in the Visual Basic programming language that perform tasks automatically in a specified order.
peer-to-peer (P2P) network
A network architecture in which a small number of computers (often fewer than 10) communicate directly with one another and can share each other's resources.
Creative Commons
A non-profit organization that makes it easy for content creators to license and share their work by supplying easy-to-understand copyright licenses; the creator chooses the conditions under which the work can be used.
evil twin
A normal-looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit.
binary number system
A number system consisting of only two digits: 0 and 1.
hub
A pane in Microsoft Edge that provides access to favorite websites, a reading list, browsing history, and downloaded files.
Weak password
A password that is short in length (less than 15 characters),uses a common word (princess), a predictable sequence of characters (abc123), or personal information (Braden).
graphic
A picture, shape, design, graph or chart, diagram, or video.
JavaScript
A popular language for writing scripts that run in your browser to control a webpage's behavior and often make it interactive.
server
A powerful, high-capacity computer you access using the Internet or other network; it stores files and "serves" them, that is, makes the files available to, users; usually grouped at a location called a data center.
license filter
A search engine tool that lets you search for pictures that you can use, share, or even modify for personal or commercial use.
real time animation
A security feature that sets Windows Defender to constantly monitor your computer for virus and spyware activity.
encryption
A security method of "scrambling" information as it is transmitted over a network. Information is scrambled in such a way that it cannot be read unless the user possesses the "key" to unlock it back to a readable format.
animated GIF
A series of slightly different GIF images displayed in sequence to achieve animation effects.
web analytics
A set of measurements that helps you to understand how people use your website.
worksheets
A single sheet in a workbook file that is laid out in in a grid of rows and columns
relational database management system (RDBMS)
A software program in which data is organized as a collection of tables, and relationships between tables are formed through a common field.
presentation software
A software program used to organize and present information in the form of an electronic slide show.
simulation
A sophisticated computer animation that is useful for training and teaching in many fields, particularly in areas in which learning can be dangerous or difficult.
compression
A space-saving technique used to store data in a format that takes less space.
HTML
A special language that software developers use to create and format webpage elements; stands for Hypertext Markup Language.
webpage
A specially formatted document that can contain text, graphics, sound, video, and links to other webpages.
pivot tables
A spreadsheet table designed to create meaningful data summaries that analyze worksheets containing large amounts of data.
MIDI (Musical Instrument Digital Interface)
A standard music file protocol used by a variety of electronic musical instruments, computers, and other related devices to connect and communicate with one another; stands for Musical Instrument Digital Interface.
protocol
A standardized procedure used by computers to exchange information.
password
A string of uppercase and lowercase letters, numbers, and symbols that when entered correctly, allow you to open a password-protected database or to obtain access to a Window user's account.
video conferencing
A technology that allows people at two or more locations to meet electronically using a network such as the Internet to transmit video and audio data.
voice recognition
A technology that determines who is speaking rather than what is being said.
smart tv
A television that can connect to the Internet and stream TV shows and movies from subscription streaming services.
bandwidth
A term commonly used to describe the capacity of a communication channel.
slide show
A term used to describe a PowerPoint presentation.
content management system (CMS)
A tool used to create a blog or website that you usually install or manage on your web server.
Internet peer-to-peer (Internet P2P) network
A type of P2P network where users share files with each other over the Internet.
stop motion animation
A type of animation where animators move real-life objects through a sequence of poses and capture the movements one frame at a time. When you play the frames in sequence, the objects seem to move.
denial of service (DoS) attack
A type of attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services.
webcam
A type of digital video camera that captures video and still images as well as audio input; often built into a desktop, laptop, or tablet computer.
augmented reality gaming
A type of gaming that integrates visual and audio game content with your real environment.
Ransonware
A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.
ransomware
A type of malware that prevents a user's device from properly and fully functioning until a fee is paid. The ransomware embeds itself onto the computer in such a way that it cannot be bypassed, even by rebooting.
local area network (LAN)
A type of network installed to link multiple PCs together so they can share hardware and software resources.
wireless network
A type of printer or other device that is connected to either a wired or wireless network to which you have access.
digital audio
A type of sound that is recorded and stored as a series of 1s and 0s.
adware
A type of spyware that changes your browser settings to display advertisements.
code editor
A type of text editor that has additional features to help write code accurately and efficiently.
augmented reality (AR)
A type of virtual reality that uses an image of an actual place or thing and adds digital information to it.
metropolitan area network (MAN)
A type of wide area network (WAN) that is operated by a city or county.
web address
A unique address on the Internet where a webpage resides; also called a URL.
MAC address
A unique hardware address identified for your computer or device.
TCP/IP (Transmission Control Protocol/ Internet Protocol)
A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.
Wi-Fi hotspot
A unique number that identifies every computer on the Internet; consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 216.35.148.4.
viral video
A video that has been shared millions of times over social media in a short period of time.
skin
A visual image created by audio software to go along with the sounds being played.
what if analysis
A way to explore the impact that changing input values has on calculated values and output values
responsive design
A way to provide content so that it adapts appropriately to the size of the display on any device.
website builder
A way to provide content so that it adapts appropriately to the size of the display on any device.
read-only access
A way to share files so others may read the file, but cannot change it.
biometric security
A way to verify your identity based on physical characteristics.
remote web server
A web server on the Internet.
stock photo gallery
A website that maintains an inventory of photographs and other graphics and makes them available for download.
wi-fi
A wireless data network technology that provides high-speed data connections that do not require a physical connection. It is used for mobile devices.
bluetooth
A wireless short-range radio connection that simplifies communications among Internet devices and between devices and the Internet.
container
A wrapper that contains parts of a video file including the video, audio, and codec, in a single package.
micro speakers
Portable speakers that can be as small as an inch or two in height and width.
clip art
Premade pictures and symbols you can use in electronic documents.
extranet
Allows outsiders (such as customers, vendors, and suppliers) to access an organization's intranet.
mobile commerce
Also known as m-commerce. These apps let you use your mobile device to make online purchases of goods and services.
m-commerce
Also known as mobile commerce. These apps let you use your mobile device to make online purchases of goods and services.
report
An Access object that creates a professional printout of data that may contain enhancements such as headers, footers, and calculations on groups of records.
URL
An abbreviation for Uniform Resource Locator, which is a webpage address that identifies the location of the file on the Internet.
in-betweening
An animation technique using a sequence of images, in which one or more objects are changed slightly between each image. Often shortened to tweening.
2-d animation
An animation that displays 2-D images in rapid sequence to create the illusion of lifelike motion.
3-d animation
An animation that displays 3-D objects or models in rapid sequence to create the illusion of natural motion.
paint apps
An app designed for drawing pictures, shapes, and other graphics with various onscreen tools, such as a text, pen, brush, eyedropper, and paint bucket.
web app
An app stored on an Internet server that can be run entirely in a web browser.
presentation apps
An app that lets you create visual aids for presentations to communicate ideas, messages, and other information to a group.
native app
An app written for a specific operating system and installed on a computer or mobile device.
media player
An application that lets you play audio and video files; most tablets and smartphones include media players.
local applications
An application that runs from the hard drive of a local computer.
ergonomics
An applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
Address Spoofing
An attack that changes the device's address so that data is sent to the attacker's computer.
phishing
An attempt to deceive you into revealing personal or financial information when you respond to an email message or visit a website.
virtual world
An environment simulated by virtual reality software to appear as a real or imagined 3-D space.
digital graphic
An image you can see, store, and manipulate on a computer, tablet, smartphone, or other digital device.
cyberterrorists
An individual who attacks a nation's computer networks, like the electrical power grid, to cause disruption and panic among citizens.
attackers
An individual who launches attacks against other users and their computers, also known as a threat actor.
script kiddies
An individual who wants to attack computers, but lacks the knowledge of computers and networks needed to do so. Script kiddies download freely available automated attack software (scripts) from websites and use it to perform malicious acts.
mix
An interactive video created from a PowerPoint presentation using Office Mix and posted to a website.
intranet
An internal network site used by a group of people who work together.
App store
An online store to help you locate and download apps for your mobile device.
Apache OpenOffice
An open source suite of productivity apps.
domain registrar
An organization that sells and manages web domain names.
project
An organized set of tasks required to reach a goal.
raster
Another name for bitmap images.
FTP (File Transfer Protocol) client
App used to upload or download files between your local computer and a remote web server.
computer-aided design (CAD) software
Applications used by architects, scientists, designers, engineers, and others to create highly detailed and technically accurate drawings that can be shared, modified, and enhanced with speed and accuracy.
3-d cad software
Applications used by engineers and scientists to create wireframe drawings of objects, which they can rotate to view from multiple angles.
productivity apps
Apps for personal use that you may use to create documents, develop presentations, track appointments, or to stay organized.
graphics and media apps
Apps that allow you to interact with and edit digital media.
video editing apps
Apps that allow you to modify a segment of a video, called a clip.
personal interest apps
Apps that give you tools to pursue your interests.
animation software
Apps that let you create animations to give objects the appearance of motion or activity
drawing apps
Apps that let you create simple, two-dimensional images, which are often vector graphics.
photo and image editing apps
Apps that provide the capabilities of paint apps and let you enhance and modify existing photos and images.
device management apps
Apps that provide tools for maintaining your computer or mobile device.
communications apps
Apps that provide tools for sharing or receiving information.
portable apps
Apps that run from a removable storage device such as an external hard drive or flash drive, or from the cloud.
mobile apps
Apps that you access on a smartphone or tablet.
hactivists
Attackers who are strongly motivated by principles or beliefs.
live audio feed
Audio transmitted live, as it happens; you can play the audio directly from the Internet.
cyberbullying
Bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. Cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person.
digital media
Content you create, produce, and distribute in digital, or computer-readable, form, such as photos, audio, video, and virtual reality.
analog sound waves
Continuous sound waves created in response to vibrations in the surrounding air, such as a drumstick hitting a drum pad.
built in function
Features in spreadsheet apps that perform financial, mathematical, logical, date and time, and other calculations.
G suite
Google's web-based productivity applications for creating documents, spreadsheets, presentations, email, and calendars.
nation state actors
Government-sponsored attacker that launches computer attacks against their enemies.
one-sided tag
HTML 5 tag that does not require a closing tag.
VR gaming system
Hardware necessary for playing virtual reality games.
game console
Hardware that allows you to play video games; examples include Xbox, Nintendo Wii, and Sony PlayStation.
resolution dependent
Describes graphics whose image quality deteriorates as their size increases; bitmap graphics are resolution dependent, but vector graphics keep the same quality as their size increases.
static
Describes webpage content that does not change very often.
cable modem
Device that sends and receives digital data over a cable TV connection.
e-waste
Electronic waste from discarded digital devices. It often contains toxic metals such as lead and mercury.
records
In Access and Excel, a row of data in a table, representing a complete set of field values for a specific person, place, object, event, or idea; also called a tuple.
field name
In Access, Excel, Publisher, or in a Word table, a column label that describes a data field.
Tables
In Access, a collection of records for a single subject, such as all of the customer records; the fundamental building block of a relational database because it stores all of the data.
hyperlink
In Access, a data type for fields that store a link to a webpage, file, or email address.
form
In Access, an object that provides an easy-to-use data entry screen that generally shows only one record at a time.
controls
In Access, any form or report element such as a label, text box, or combo box. In Windows, an object used to manipulate a window or to use a program.
attributes
In Access, property of an entity or a column in a table.
strong password
In Computer Concepts, a combination of letters, numbers, and/or symbols that unlocks access to protected electronic data that is a minimum of 15-20 characters in length.
Template
In Computer Concepts, a document that has been preformatted for specific purpose (such as an invitation, a brochure, a flyer, a cover letter, or a resume).
web based applications
In Computer Concepts, a program that you access over the Internet, in a browser on your computer or on your mobile device, also known as a web app.
Virus
In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.
virus
In Computer Concepts, malicious computer code that reproduces itself on the same computer. Almost all viruses "infect" by inserting themselves into a computer file. When the file is opened, the virus is activated.
phishing
In Computer Concepts, sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into giving private information.
Argument
In Excel and Access, and in Word tables, information necessary for a formula or function to calculate an answer.
documents
In Excel, to make notes about basic worksheet assumptions, complex formulas, or questionable data.
inline style
In HTML, a style attribute of most HTML tags.
tags
In HTML, codes used to identify or "mark up" the content in a webpage such as, <p>....</p> tags to markup a paragraph.
query
In Power BI or similar programs, a request for information from a data source.
Animations
In PowerPoint, an effect applied to an object that makes the object appear, disappear, change, or move.
animation
In PowerPoint, an effect applied to an object that makes the object appear, disappear, change, or move.
sampling
In Publisher, a command that lets you copy an element's color and apply it elsewhere.
switch
In a field in Word, a comman that follows \*, \#, \@, or \! and turns on or off certain features of a field.
dynamic
In a multipage workbook, describes pagination represented by horizontal or vertical dashed lines, which indicate where pages print separately, and which adjust automatically when the workbook content changes.
field
In an Access or in an Excel table or PivotTable, a column containing a specific property for each record, such as a person, place, object, event, or idea.
style sheet
External file that stores style information for a larger website to create a consistent appearance across all pages in the website.
malware
Malicious software, such as viruses and spyware, that can delete or corrupt files and gather personal information.
rootkit
Malware that gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence.
Trojan
Malware that hides inside another program, often one downloaded from the web.
trojan
Malware that hides inside another program, often one downloaded from the web.
cross platform
Tools that developers can use to build apps that work on multiple platforms, rather than writing different code for Android or iPhone devices.
document management tools
Tools that protect and organize files and let you share documents with others.
search engine optimization (SEO)
Tools to allow search engines to better find or index your website.
spam
Unwanted email messages sent from an unknown sender to many email accounts, usually advertising a product or service such as low-cost medication, low-interest loans, or free credit reports; also called junk mail or junk email.
CSS (Cascading Style Sheets)
Used to specify the format and appearance of content on webpages.
identity theft
Using someone's personal information, such as their name, Social Security number, or credit card number, to commit financial fraud.
voice over
Voice narration that can accompany a slide presentation or other video.
synthesized music
Voice output that converts text to speech.
mobile hotspot
Wireless network available in public places such as hotels, restaurants, and coffee shops.
bus network
Wires on which data travels to and from the CPU.
client-side script
Script that runs in your browser to control a webpage's behavior and often make it interactive; usually written in JavaScript.
Server side script
Script that runs on server, often to process data from an online form or interact with a database.
wired network
Sends signals and data through cables to connect to other network devices; tend to be more secure and transmit data faster than wireless networks.
Apps
Short for "application," a computer program that performs specific tasks; also called a program.
XML
Short for Extensible Markup Language, a language used to mark up structured data so that it can be more easily shared between different computer programs; contains XML tags that identify field names and data.
pixel
Short for picture element, an individual point of color on a display screen or printout.
pixels
Short for picture element, an individual point of color on a display screen or printout.
Audio Capture and Editing Software
Software for editing, copying, and sharing digital audio files.
speech recognition
Software that helps a user to input data or information verbally.
on demand content
Software that is distributed online for a monthly subscription or an annual fee.
music production software
Software that lets you record, compose, mix (combine), and edit music and sounds.
stand alone player
Software that plays certain types of audio files on a desktop or laptop computer.
spyware
Software that tries to collect personal information or change computer settings without your consent.
synthesized speech
Sound output that is the result of breaking words into individual sound units, called phonemes, and stringing them together to create words and phrases.
conditional formatting
Special formatting that is applied if values meet specified criteria.
network standards
Specify the way computers access a network, the type(s) of hardware used, data transmission speeds, and the types of cable and wireless technology used.
Page Orientation
The direction in which content is printed on the page.
HTML 5
The latest version of the Hypertext Markup Language, which is built into browsers.
privacy
The state or condition of being free from public attention to the degree that you determine.
virtual reality (VR)
The use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space.
cyberstalking
The use of technology to stalk another person through email, text messages, phone calls, and other forms of communication.
plug in
Third-party program that extends the built-in functionality of an application or browser.
plugin
Third-party program that extends the built-in functionality of an application or browser.
text editor
Third-party program that extends the built-in functionality of an application or browser.
wireless routers
This central connection device needed for a home-based Wi-Fi network. The wireless router acts as the "base station" for the wireless devices, sending and receiving wireless signals between all devices as well as providing the "gateway" to the external Internet. worm
publish
To share Excel workbook data on a network or on the web so that others can access it using a web browser.
filter
To specify a set of restrictions to only display specific database records, online images, or files.
render
To transform a wireframe drawing into a solid 3D image.
bit
(Short for binary digit), the smallest unit of data a computer can process.
presentation
A PowerPoint document that lets you create and deliver a dynamic, professional-looking message to an audience in the form of a slide show.
technology addiction
A behavioral hazard that occurs when a user is obsessed with using a technology device and cannot walk away from it without feeling extreme anxiety.
insertion point
A blinking vertical line that appears when you click in a paragraph, cell or text box; indicating where new text or an object will be inserted.
machine learning
A branch of AI that uses statistics to help machines learn from data, identify patterns, and make decisions to progressively improve their performance without much human intervention.
DSL modem
A broadband technology that creates a high-speed connection to the Internet through standard telephone lines.
network topology
A broadband technology that creates a high-speed connection to the Internet through standard telephone lines.
wireless network key
A broadband technology that uses infrared light or radio-frequency signals to communicate with devices that are physically connected to a network or the Internet.
digital video camera
A camera that can capture video files in a digital format, as a series of 0s and 1s.
digital camera
A camera that creates a digital image of an object, person, or scene.
Virtual Private Network (VPN)
A private, secure path across a public network that allows authorized users secure access to a company or other network.
Apple iWork
A productivity suite for computers running macOS and iPhones and iPads running the iOS operating system.
audio software
A program included on portable media players such as iPods and smartphones that often offers features such as file-shuffling and volume control.
text-to-speech software
A program that accepts text as input and then generates sounds from phoneme sequences to create synthesized speech.
graphics software
A program that allows you to create, view, manipulate, and print digital images such as photos, drawings, clip art, and diagrams.
sampling software
A program that breaks sound waves into separate segments, or samples, and stores each sample numerically.
sound recorder software
A program that can capture sound from an audio input device such as a microphone or headset.
password manager
A program that helps you create and store multiple strong passwords in single user "vault" file that is protected by one strong master password.
drawing program
A program that lets you create vector images.
image editing software
A program that lets you open and modify existing images.
video editing software
A program you use to enhance and customize a video.
photo editing software
A program, such as Adobe Photoshop, that lets you enhance and correct photographs.
hologram
A projected image that appears three-dimensional.
firewall
A protective barrier between a computer or network and others on the Internet.
deprecated
A quality of a technology indicating that developers are discouraged from using it because a newer technology has been created to take its place.
sparklines
A quick, simple chart located within a cell that serves as a visual indicator of data trends.
logos
A recognizable symbol that identifies a person, business, or organization.
repetitve strain injury (rsi)
Aches and pains associated with repeated and long-term usage of the devices.
scroll bars
Bars on the right edge (vertical scroll bar) and bottom edge (horizontal scroll bar) of a document window that let you view a document that is too large to fit on the screen at once.
digital certificate
Code attached to a file that verifies the identity of the creator of the file.
Integrated Development Environment (IDE)
Combines advanced code editing tools, debugging tools, and a graphical user interface to interact with file management tools, to simplify the process of developing websites and applications.
word processing software
Commonly used software to create documents and reports, mailing labels, flyers, brochures, newsletters, resumes, letters, and more.
headset
Includes one or more headphones for output, and a microphone for input.
Big Data
Large and complex data sources that defy easy handling with traditional data processing methods.
external link
Link to to another website.
digital video
Live action captured in digital format by a video camera.
Microsoft Office 365
Microsoft's productivity suite which includes word processing, spreadsheets, and presentation apps, as well as Microsoft Outlook for email, Microsoft OneNote for note taking, and Microsoft Access for databases.
platform specific
Mobile apps designed for a specific operating system like Android or iPhone.
stream
Music that you can listen to as it is being downloaded from the web.
client/server network
Network architecture in which one or more computers act as a server, and the other computers on the network request resources from the server.
wide area network (WAN)
Network that connects devices in a large geographic region, such as a multinational company or national retail chain.
personal area network (PAN)
Network that connects personal digital devices within a range of approximately 30 feet, such as a smartwatch that connects to your cell phone.
mesh network
Network topology in which all devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.
network architecture
Network topology in which all devices interconnect with each other. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route.
ring network
Network topology in which data travels from one device to the next in a sequential fashion; if one device on the network fails, network communication could cease to function. No longer common.
star network
Network topology in which each device on the network is attached to a central device such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate.
megapixel
One million pixels. On a digital camera, the measurement that describes the camera's maximum resolution; the higher the number of megapixels, the higher the resolution of photos, and the larger the picture files.
World Wide Web Consortium (W3C)
One of the leading organizations that set guidelines for the web and that work together to write web standards.
network attached storage (NAS)
One or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks.
script
Programming code that performs a series of commands and can be embedded in a webpage.
scripting language
Programming language used to code webpage scripts, such as Python, Java, JavaScript, PHP, Ruby, or C#.
Application software
Programs that help you perform specific tasks when using your computer or smartphone. They are also called software applications or apps.
cloud computing
Providing and using computer tools, such as software, via the Internet (or the cloud).
live video streaming
Streaming video content transmitted live, as it happens; you can view the media as it arrives.
cell
The box formed by the intersection of a column and a row.
local computer
The computer storing files to publish to a server using an FTP client.
net neutrality
The concept that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site.
Transitions
The manner in which a slide appears on the screen in place of the previous slide during a slide show.
transition
The manner in which a slide appears on the screen in place of the previous slide during a slide show.
Ethernet
The most common network standard for wired networks.
bit rate
The number of bits of data processed every second, usually measured as kilobits per second (kbps).
resolution
The number of horizontal and vertical pixels in a display device or the sharpness and clarity of an image.
file format
The organization and layout of data in a file
format
The process of changing the appearance of text and objects.
data backup
The process of copying files from a computer's hard drive to be stored in a remote location.
authentication
The process of ensuring that the person requesting access to a computer or other resources is authentic, and not an imposter.
data mining
The process of sifting through big data to find the important questions that will yield fruitful results.
download
The process of transferring (copying) a file from a server, computer, or device to another computer or device.
decryption
The process of unlocking encrypted information back into a readable format.
insiders
The security threat to a company that comes from its own employees, contractors, and business partners.
artificial intelligence (AI)
The technological use of logic and prior experience to simulate human intelligence.
slide master
The template for the slides in a presentation that contains theme elements and styles, text formatting, the slide background, and other objects that appear on all the slides in the presentation.
digitize
To convert sound to a format your computer can read.
sort
To organize data, such as table rows, items in a list, or records in a mail merge, in ascending or descending order, based on criteria such as date, alphabetical order, file size, or filename.
embedded styles
To place a copy of an object created in a source file into a destination file so that a one-way connection to the source program becomes part of the destination file; you can then edit the embedded object using the source program.