MIS 161 TEST 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

productivity applications

. can assist you in becoming more effective while performing daily activities at work, school, and home. They include word processing presentation, spreadsheet, database, note taking, calendar, and contact management, project management, accounting, personal finance, legal, tax preparation, document management, and enterprise of computing.

Byte

8 bits formed together as a unit. Provides enough different combinations of 0 and 1 to represent 256 different characters.

Zombie

A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.

Uninstaller

A tool that removes a program, as well as any associated entries in the system files.

tools or utilities

enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.

sound card

enhances the sound- generating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones.

adapter cards

expansion card or adapter board, a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.

processor or central processing unit

interprets and carries out the basic instructions that operate a computer.

green computing

involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies.

Anti spam program

is a filtering program that attempts to remove spam before it reaches your inbox or forum.

Function

is a predefined formula that performs common calculations, such as adding the values in a group of cells or generating a value such as the time or date.

Folder

is a specific named location on a storage medium that contains related files.

Presentation Software

is an application that allows users to create visual aids for presentations to communicated ideas, messages, and other information to a group.

Software registration

is optional and usually involves submitting your name and other personal information to the software manufacturer or developer.

copying

is the process of placing content on a clipboard, with the content remaining in the project.

unauthorized use

is the use of a computer or its data for unapproved or possibly illegal activities.

Unauthorized access

is the use of a computer or network without permission.

power supply

laptop AC adapter converts the wall outlet AC power into DC power.

RAM random access memory

main memory, consists of memory chips that can be read from and written to by the processor and other devices. see page 292 for types of RAM

Malware

malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices. see page 215 for different types of malware.

retail software

mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company.

edit

means to make changes to its existing content.

Font

name assigned to a specific design of characters, font style adds emphasis to font.

information theft

occurs when someone steals personal or confidential information.

Software theft

occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates programs, or illegally copies a program.

gigahertz

one billion ticks of the system clock per second.

nanosecond

one billionth of a second.

License agreement

or an end-user license agreement, Is the right to use a program or app.

custom software

performs functions specific to a business or industry. Sometimes a company cannot locate retail software that meets its unique requirements. In this case the company may use software developers to create a tailor made custom software usually costs more than retail software.

PDF

portable document format developed by adobe systems, an electronic image file format that document management software users to save converted documents.

Antivirus programs

protects a computer against viruses by identifying and removing any computer viruses found in memory on storage media, or in incoming files.

CMOS complementary metal-oxide semiconductor

provides high speeds and consumes little power.

Cloud computing

refers to an environment of servers that house and provide access to resources users access via the Internet. see page 287

Read- only memory (ROM)

refers to memory chips storing permanent data and instructions.

Cyber crime

refers to online or internet-based illegal acts such as distributing malicious software or committing identify theft. Software used by cybercriminals is sometimes called crimeware. see page 214 for more crimeware terminology.

Intellectual property

refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Intellectual property rights are the rights to which creators are entitled for their work.

uncompressed

restored to its original form.

Cooling pad

rests below a laptop and protects the computer from over heating and also the user's lap from excessive heat.

Restore tool

reverses the process and returns backed up files to their original form.

cookie

s small text file that a web server stores on your computer, cookie files typically contain data about you , such as your username, postal code, or viewing preferences.

Disk cleanup

searches for and removes unnecessary files.

Personal interests Applications

see page 185-186

Coding schemes

see page 289

Bit

short for binary digit, the smallest unit of data the computer can process

File compression tool

shrinks the size of a file. Sometimes called zip files

bus width

size of bus, determines the number of bits that the computer can transmit at one time

system clock

small quartz crystal circuit that controls the timing of all computer operations.

registers

small, high speed storage locations.

Open source software

software provided for use, modification, and redistribution.

PIN

sometimes called a passcode, a numeric password, either assigned by a company or selected by a user.

Word processing software

sometimes called a word processor, is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics.

Application or app

sometimes called application software consist of programs designed to make users more productive and/ or assist them with personal tasks.

index

stores a variety of information about a file, including its name, date created, date modified, author name, and so on.

motherboard

system board, the main circuit board of the computer.

Hardware theft, vandalism, and failure

the act of stealing digital equipment, involves defacing or destroying equipment, can fail because aging hardware or natural or man made disasters

Access Time

the amount of time it takes the processor to read data, instructions, and information from memory.

the control unit

the component of the processor that directs and coordinates most of the operations in the computer.

Plug and play technology

the computer automatically can recognize peripheral devices as you install them. you can plug in a device and then immediately begin using it.

A cell

the intersection of a column and row.

word size

the number of bits the processor can interpret and execute at a given time.

System software

the operating system and other tools

clock speed

the pace of the system clock, measured by the number of ticks per second.

Encryption

the process of converting data that is readable by humans into encoded characters to prevent unauthorized access. see page 230 for different types of encryption

content filtering

the process of restricting access to certain material.

Installing

the process of setting up the software to work with a computer, printer, and other hardware.

pasting

the process of transferring content from a clipboard to a specific location in a project.

Information privacy

the right of individuals and companies to deny or restrict the collection, use and dissemination of information about them.

software piracy

the unauthorized and illegal duplication of copyrighted software.

Two step verification

two factor verification, a computer or mobile device uses two separate methods, one after the next, to verify the identity of a user.

data bus

used to transfer actual data

address bus

used to transfer information about where the data should reside in memory.

username

user Id, log on name, or sign in name, a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

Liquid cooling technology

uses a continuous flow of fluids such as water, and glycol, in a process that transfers the heated fluid away from the processor to a radiator type grill, which cools the liquid and then returns the cooled fluid to the processor.

automatic update feature

where the updates can be configured to download and install automatically.

Disc burning software

writes text, graphics, audio, and video files on a recordable or rewritable disc. Enables home users to easily back up contents of their hard drive on an optical disc. (DVD,CD).

Photo management software

you can view, organize, sort, catalog, print, and share digital photos.

create

you enter text or numbers ,insert images, add contacts, schedule appointments, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.

Botnet

zombie army, a group of compromised computers or mobile devices connected to a network, such as the internet, that are used to attack other networks, usually for nefarious purposes.

digital

Most computers are digital they recognize only two discrete states:on and off.

password

a private combination of characters associated with the username that allows access to certain computer resources.

passphrase

a private combination of words, often containing mixed capitalization and punctuation, associated with a username that allows access to certain computer resources.

e-filing

a process where you can file your tax forms electronically.

back door

a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.

Media player

a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device.

Adware remover

a program that detects and deletes adware.

adware

a program that displays an online advertisement in a banner, a pop-up window, or pop- under window in webpages, email messages, or other Internet services. On mobile phones its known as madware.

PC Maintenance tool

a program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance.

Bot

a program that performs a repetitive task on a network.

web filtering software

a program that restricts access to certain material on the web.

Web filtering software

a program that restricts access to specified websites.

Phishing filter

a program that warns or blocks you from potentially fraudulent or suspicious websites.

Search tool

a program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app, or any other item stored on your computer or mobile device based on criteria you specify.

power usage effectiveness

a ratio that measures how much power enters the computer facility or data center against the amount of power required to run the computers and devices.

Phishing

a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.

access control

a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

Personal Firewall

a security tool that detects and protects a personal computer and its data from unauthorized intrusions and its data from unauthorized intrusions.

quarantine

a separate area of a hard drive that holds the infected file until the infection can be removed.

Proxy server

a server outside the organization's network that controls which communications pass in and out of the organization's network.

Operating system

a set of programs that coordinates all the activities among computer or mobile device hardware. serves as the interface between the user, the applications and other programs, and the computer's or mobile devices hardware .

Personal Finance software

a simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer funds, track investments, and evaluate financial plans.

multi core processor

a single chip with two or more separate processor cores.

Heat sink

a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.

Memory Module

a small circuit board. SIMMS(Single inline memory module) and DIMMS(Dual line memory module).

Chip

a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

expansion slot

a socket on a desktop or server motherboard that can hold an adapter card.

personal firewall

a software firewall that detects and protects a personal computer and its data from unauthorized intrusions.

digital rights management

a strategy designed to prevent illegal distribution of movies, music, and other digital content.

Spoofing

a technique intruders use to make their networks or Internet transmission appear legitimate to a victim computer or network. see page 217 for two types of spoofing.

product activation

a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed.

cache

a temporary storage area; two different types, memory cache and disk cache.

Image viewer

a tool that allows users to display, copy, and print the contents of a graphics file, such as a photo.

Screensaver

a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

File manager

a tool that performs functions related to file management.

Disk fragmentation

a tool that recognizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.

Computed- aided design (CAD)

a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.

Photo editing software

a type of image editing software that allows users to edit and customize digital photos.

Flash Memory

a type of nonvolatile memory that can be erased electronically and rewritten.

Spyware

a type of program placed on a computer or mobile device without the user's knowledge that security collects information about the user and then communicates the information it collects to some outside source while the user is online.

A spyware remover

a type of program that detects and deletes spyware programs.

Adware

a type of program that displays an online advertisement in a banner or pop-up or pop-up window on webpages, email messages, or other Internet services.

mobile web app

a web app that is optimized for display in a browser on a mobile device, regardless of screen size or orientation

secure site

a website that uses encryption techniques to secure its data.

code of conduct

a written guideline that helps determine whether a specification is ethical/ unethical or allowed/not allowed.

disaster recovery plan

a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.

Multimedia authoring software

allows users to combine text, graphics, audio, video, and animation in an interactive application.

Back up tool

allows users to copy, or back up selected files or the contents of an entire storage medium to any other storage location, such as another hard drive, optical disc, USB flash drive, or cloud storage.

pop up ad

an Internet advertisement that suddenly appears in a new window on top of a webpage.

web app

an application stored on a web server that you access through a browser

Project Management software

an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project. Helps users manage project variables, allowing them to complete a project on time and within budget.

Video editing software

an application that allows professionals to modify a segment of a video called a clip.

Database software

an application that allows users to create, access, and manage a database.

Paint software or illustration software

an application that allows users to draw pictures, shapes, and other graphics with various on-screen tools, such as a pen, brush, eye dropper, and paint bucket.

Spreadsheet Software

an application that allows users to organize data in columns and rows and perform calculations on the data.

Legal Software

an application that assists in the preparation of legal documents and provides legal information to individuals, families, and small businesses. It provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.

Home design/networking software

an application that assists users with the design, remodeling, or improvement of a home, deck, or landscape.

Tax preparation software

an application that can guide individuals, families, or small business through the process of filing federal and state taxes.

Desktop Publishing Software (DTP)

an application that enables designers to create sophisticated publications that contain text, graphics, and many colors.

Note taking software

an application that enables to enter a typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook.

Audio editing software

an application that enables users to modify audio clips, produce studio- quality soundtracks and add audio to video clips.

Accounting software

an application that helps businesses of all size record and report their financial transactions. users can perform accounting activities related to the general ledger, accounts receivable, accounts payable, purchasing, invoicing, and payroll functions. also enables businesses users to write and print checks, track checking account activity and update and reconcile balances on demand.

Calendar and Contact management software

an application that helps you organize your calendar, keep track of contacts, and share this information with other users, who can view it on their computers and mobile devices. The software provides a way for individuals and workgroups to organize, find, view, and share a appointment and contact information easily.

Document Management Software

an application that provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.

Image editing software

an application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images.

mobile app

an application you download from a mobile device's app store, sometimes called a market place, or other location on the internet to a smartphone or other mobile device.

Denial of service attack

an assault whose purpose is to disrupt computer access to an internet service, such as the web or email.

digital signature

an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.

Spam

an unsolicited email message or posting sent to many recipients or forums at once. Considered internet junk mail.

arithmetic logic unit (ALU)

another component of the processor, performs arithmetic comparison, and other operations.

Digital Security risk

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.

computer crime

any illegal act involving the use of a computer or related devices.

possessed object

any item that you must posses, or carry with you, in order to gain access to a computer or computer facility.

technology ethics

are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.

Biometric device

authenticates a person's identity by translating a personal characteristic code, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer or mobile device verifying physical or behavioral characteristics.

transistor

can act as an electronic switch that opens or closes the circuit for electrical

fingerprint reader

captures curves and indentations of a fingerprint. see page 225 for different types of recognition

format

change its appearance.

worksheet

collection of columns and rows formed in spreadsheet software.

Program or Software

consists of a series of related instructions organized for a common purpose, that tells the computer what tasks to perform and how to perform them.

Memory

consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing data. see page 290

Integrated circuit

contains many microscopic pathways capable of carrying electrical current.

video card or graphics card

converts computer output into a video signal that travels through a capable to the monitor, which displays an image on the screen.

freeware

copyrighted software provided at no cost by an individual or a company that retains all rights to the software.

Shareware

copyrighted software that is distributed at no cost for a trial period. To use

Digital forensics

cyberforensics, the discovery, collection, and analysis of evidence found on computers and networks.

social engineering

defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

Payload

destructive event or prank

Public-domain software

donated for public use and has no copyright restrictions.

Bus

electrical channel that allows various devices both inside and attached to the system unit to communicate with one another. Bits travel on a bus. used to transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to ouput or storage devices. see page 300 for bus types

Binary system

a number system that has just two unique digits, 0 and 1 called bits.

machine cycle

1 fetching, 2 decoding, 3 executing, and, if necessary, 4 storing. see page 281

Enterprise computing

A large organization, commonly referred to as an enterprise, requires special computing solutions because of its size and geographic distribution.

Firmware

ROM chips that contain permanently written data, instructions, or information such as a computer or mobile device's start up instructions.

USB adapter

a dongle that plugs into a USB port, enhances functions of a mobile computer and/or provides connections to peripheral devices.

back up

a duplicate of a file, program, or media that can be used if the original is lost, damaged or destroyed.

Database

a collection of data organized in a manner that allows access, retrieval, and use of that data.

Software Suite

a collection of individual related applications available together as a unit.

Pop up blocker and Pop under blocker

a filtering program that stops pop-up or pop-under ads from displaying on webpages.

Digital certificate

a notice that guarantees a user or a website is legitimate.

Firewall

hardware and/or software that protects a network's resources from intrusion by users on another network such as the internet.

Memory cache

helps speed the process of the computer because it stores frequently used instructions and data. see page 294 for different levels of cache.

Web authoring software

helps users of all skill levels create related webpages that include graphics, video, audio, animation, special effects with interactive content, and blog posts.

analog

human speech is analog because it uses continuous wave form signals that vary in strength and quality.

Graphic and Media applications

include computer-aided design, desktop publishing, paint/image editing, photo editing and photo management, video and audio editing, multimedia and website authoring,media players, and disc burning.


Ensembles d'études connexes

chapter 9: the Confederation and the Constitution (1776-1790)

View Set

EMT (Cardiovascular Emergencies)

View Set

Lab: Boyle's Law Assignment: Reflect on the Lab

View Set

MKTG 3553Chapter 9-10-11-12-13-14-15

View Set

Test 4 Questions, Chapter 51: Caring for Clients with Diabetes Mellitus, CH.51 - Diabetes PrepU ?'s, Diabetes Prep-U (easy), Prep U: Chapter 51: Assessment and Management of Patients With Diabetes

View Set