MIS 161 TEST 2
productivity applications
. can assist you in becoming more effective while performing daily activities at work, school, and home. They include word processing presentation, spreadsheet, database, note taking, calendar, and contact management, project management, accounting, personal finance, legal, tax preparation, document management, and enterprise of computing.
Byte
8 bits formed together as a unit. Provides enough different combinations of 0 and 1 to represent 256 different characters.
Zombie
A compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider.
Uninstaller
A tool that removes a program, as well as any associated entries in the system files.
tools or utilities
enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices.
sound card
enhances the sound- generating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones.
adapter cards
expansion card or adapter board, a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.
processor or central processing unit
interprets and carries out the basic instructions that operate a computer.
green computing
involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies.
Anti spam program
is a filtering program that attempts to remove spam before it reaches your inbox or forum.
Function
is a predefined formula that performs common calculations, such as adding the values in a group of cells or generating a value such as the time or date.
Folder
is a specific named location on a storage medium that contains related files.
Presentation Software
is an application that allows users to create visual aids for presentations to communicated ideas, messages, and other information to a group.
Software registration
is optional and usually involves submitting your name and other personal information to the software manufacturer or developer.
copying
is the process of placing content on a clipboard, with the content remaining in the project.
unauthorized use
is the use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized access
is the use of a computer or network without permission.
power supply
laptop AC adapter converts the wall outlet AC power into DC power.
RAM random access memory
main memory, consists of memory chips that can be read from and written to by the processor and other devices. see page 292 for types of RAM
Malware
malicious software, consists of programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices. see page 215 for different types of malware.
retail software
mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company.
edit
means to make changes to its existing content.
Font
name assigned to a specific design of characters, font style adds emphasis to font.
information theft
occurs when someone steals personal or confidential information.
Software theft
occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates programs, or illegally copies a program.
gigahertz
one billion ticks of the system clock per second.
nanosecond
one billionth of a second.
License agreement
or an end-user license agreement, Is the right to use a program or app.
custom software
performs functions specific to a business or industry. Sometimes a company cannot locate retail software that meets its unique requirements. In this case the company may use software developers to create a tailor made custom software usually costs more than retail software.
portable document format developed by adobe systems, an electronic image file format that document management software users to save converted documents.
Antivirus programs
protects a computer against viruses by identifying and removing any computer viruses found in memory on storage media, or in incoming files.
CMOS complementary metal-oxide semiconductor
provides high speeds and consumes little power.
Cloud computing
refers to an environment of servers that house and provide access to resources users access via the Internet. see page 287
Read- only memory (ROM)
refers to memory chips storing permanent data and instructions.
Cyber crime
refers to online or internet-based illegal acts such as distributing malicious software or committing identify theft. Software used by cybercriminals is sometimes called crimeware. see page 214 for more crimeware terminology.
Intellectual property
refers to unique and original works, such as ideas, inventions, art, writings, processes, company and product names, and logos. Intellectual property rights are the rights to which creators are entitled for their work.
uncompressed
restored to its original form.
Cooling pad
rests below a laptop and protects the computer from over heating and also the user's lap from excessive heat.
Restore tool
reverses the process and returns backed up files to their original form.
cookie
s small text file that a web server stores on your computer, cookie files typically contain data about you , such as your username, postal code, or viewing preferences.
Disk cleanup
searches for and removes unnecessary files.
Personal interests Applications
see page 185-186
Coding schemes
see page 289
Bit
short for binary digit, the smallest unit of data the computer can process
File compression tool
shrinks the size of a file. Sometimes called zip files
bus width
size of bus, determines the number of bits that the computer can transmit at one time
system clock
small quartz crystal circuit that controls the timing of all computer operations.
registers
small, high speed storage locations.
Open source software
software provided for use, modification, and redistribution.
PIN
sometimes called a passcode, a numeric password, either assigned by a company or selected by a user.
Word processing software
sometimes called a word processor, is an application that allows users to create and manipulate documents containing mostly text and sometimes graphics.
Application or app
sometimes called application software consist of programs designed to make users more productive and/ or assist them with personal tasks.
index
stores a variety of information about a file, including its name, date created, date modified, author name, and so on.
motherboard
system board, the main circuit board of the computer.
Hardware theft, vandalism, and failure
the act of stealing digital equipment, involves defacing or destroying equipment, can fail because aging hardware or natural or man made disasters
Access Time
the amount of time it takes the processor to read data, instructions, and information from memory.
the control unit
the component of the processor that directs and coordinates most of the operations in the computer.
Plug and play technology
the computer automatically can recognize peripheral devices as you install them. you can plug in a device and then immediately begin using it.
A cell
the intersection of a column and row.
word size
the number of bits the processor can interpret and execute at a given time.
System software
the operating system and other tools
clock speed
the pace of the system clock, measured by the number of ticks per second.
Encryption
the process of converting data that is readable by humans into encoded characters to prevent unauthorized access. see page 230 for different types of encryption
content filtering
the process of restricting access to certain material.
Installing
the process of setting up the software to work with a computer, printer, and other hardware.
pasting
the process of transferring content from a clipboard to a specific location in a project.
Information privacy
the right of individuals and companies to deny or restrict the collection, use and dissemination of information about them.
software piracy
the unauthorized and illegal duplication of copyrighted software.
Two step verification
two factor verification, a computer or mobile device uses two separate methods, one after the next, to verify the identity of a user.
data bus
used to transfer actual data
address bus
used to transfer information about where the data should reside in memory.
username
user Id, log on name, or sign in name, a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
Liquid cooling technology
uses a continuous flow of fluids such as water, and glycol, in a process that transfers the heated fluid away from the processor to a radiator type grill, which cools the liquid and then returns the cooled fluid to the processor.
automatic update feature
where the updates can be configured to download and install automatically.
Disc burning software
writes text, graphics, audio, and video files on a recordable or rewritable disc. Enables home users to easily back up contents of their hard drive on an optical disc. (DVD,CD).
Photo management software
you can view, organize, sort, catalog, print, and share digital photos.
create
you enter text or numbers ,insert images, add contacts, schedule appointments, and perform other tasks using a variety of input methods, such as a keyboard, a mouse, touch, or voice.
Botnet
zombie army, a group of compromised computers or mobile devices connected to a network, such as the internet, that are used to attack other networks, usually for nefarious purposes.
digital
Most computers are digital they recognize only two discrete states:on and off.
password
a private combination of characters associated with the username that allows access to certain computer resources.
passphrase
a private combination of words, often containing mixed capitalization and punctuation, associated with a username that allows access to certain computer resources.
e-filing
a process where you can file your tax forms electronically.
back door
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
Media player
a program that allows you to view images and animations, listen to audio, and watch video files on your computer or mobile device.
Adware remover
a program that detects and deletes adware.
adware
a program that displays an online advertisement in a banner, a pop-up window, or pop- under window in webpages, email messages, or other Internet services. On mobile phones its known as madware.
PC Maintenance tool
a program that identifies and fixes operating system problems, detects and repairs drive problems, and includes the capability of improving a computer's performance.
Bot
a program that performs a repetitive task on a network.
web filtering software
a program that restricts access to certain material on the web.
Web filtering software
a program that restricts access to specified websites.
Phishing filter
a program that warns or blocks you from potentially fraudulent or suspicious websites.
Search tool
a program, usually included with an operating system, that attempts to locate a file, contact, calendar event, app, or any other item stored on your computer or mobile device based on criteria you specify.
power usage effectiveness
a ratio that measures how much power enters the computer facility or data center against the amount of power required to run the computers and devices.
Phishing
a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information.
access control
a security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.
Personal Firewall
a security tool that detects and protects a personal computer and its data from unauthorized intrusions and its data from unauthorized intrusions.
quarantine
a separate area of a hard drive that holds the infected file until the infection can be removed.
Proxy server
a server outside the organization's network that controls which communications pass in and out of the organization's network.
Operating system
a set of programs that coordinates all the activities among computer or mobile device hardware. serves as the interface between the user, the applications and other programs, and the computer's or mobile devices hardware .
Personal Finance software
a simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer funds, track investments, and evaluate financial plans.
multi core processor
a single chip with two or more separate processor cores.
Heat sink
a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.
Memory Module
a small circuit board. SIMMS(Single inline memory module) and DIMMS(Dual line memory module).
Chip
a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
expansion slot
a socket on a desktop or server motherboard that can hold an adapter card.
personal firewall
a software firewall that detects and protects a personal computer and its data from unauthorized intrusions.
digital rights management
a strategy designed to prevent illegal distribution of movies, music, and other digital content.
Spoofing
a technique intruders use to make their networks or Internet transmission appear legitimate to a victim computer or network. see page 217 for two types of spoofing.
product activation
a technique that some software manufacturers use to ensure that you do not install the software on more computers than legally licensed.
cache
a temporary storage area; two different types, memory cache and disk cache.
Image viewer
a tool that allows users to display, copy, and print the contents of a graphics file, such as a photo.
Screensaver
a tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.
File manager
a tool that performs functions related to file management.
Disk fragmentation
a tool that recognizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.
Computed- aided design (CAD)
a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
Photo editing software
a type of image editing software that allows users to edit and customize digital photos.
Flash Memory
a type of nonvolatile memory that can be erased electronically and rewritten.
Spyware
a type of program placed on a computer or mobile device without the user's knowledge that security collects information about the user and then communicates the information it collects to some outside source while the user is online.
A spyware remover
a type of program that detects and deletes spyware programs.
Adware
a type of program that displays an online advertisement in a banner or pop-up or pop-up window on webpages, email messages, or other Internet services.
mobile web app
a web app that is optimized for display in a browser on a mobile device, regardless of screen size or orientation
secure site
a website that uses encryption techniques to secure its data.
code of conduct
a written guideline that helps determine whether a specification is ethical/ unethical or allowed/not allowed.
disaster recovery plan
a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
Multimedia authoring software
allows users to combine text, graphics, audio, video, and animation in an interactive application.
Back up tool
allows users to copy, or back up selected files or the contents of an entire storage medium to any other storage location, such as another hard drive, optical disc, USB flash drive, or cloud storage.
pop up ad
an Internet advertisement that suddenly appears in a new window on top of a webpage.
web app
an application stored on a web server that you access through a browser
Project Management software
an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project. Helps users manage project variables, allowing them to complete a project on time and within budget.
Video editing software
an application that allows professionals to modify a segment of a video called a clip.
Database software
an application that allows users to create, access, and manage a database.
Paint software or illustration software
an application that allows users to draw pictures, shapes, and other graphics with various on-screen tools, such as a pen, brush, eye dropper, and paint bucket.
Spreadsheet Software
an application that allows users to organize data in columns and rows and perform calculations on the data.
Legal Software
an application that assists in the preparation of legal documents and provides legal information to individuals, families, and small businesses. It provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust.
Home design/networking software
an application that assists users with the design, remodeling, or improvement of a home, deck, or landscape.
Tax preparation software
an application that can guide individuals, families, or small business through the process of filing federal and state taxes.
Desktop Publishing Software (DTP)
an application that enables designers to create sophisticated publications that contain text, graphics, and many colors.
Note taking software
an application that enables to enter a typed text, handwritten comments, drawings, sketches, photos, and links anywhere on a page and then save the page as part of a notebook.
Audio editing software
an application that enables users to modify audio clips, produce studio- quality soundtracks and add audio to video clips.
Accounting software
an application that helps businesses of all size record and report their financial transactions. users can perform accounting activities related to the general ledger, accounts receivable, accounts payable, purchasing, invoicing, and payroll functions. also enables businesses users to write and print checks, track checking account activity and update and reconcile balances on demand.
Calendar and Contact management software
an application that helps you organize your calendar, keep track of contacts, and share this information with other users, who can view it on their computers and mobile devices. The software provides a way for individuals and workgroups to organize, find, view, and share a appointment and contact information easily.
Document Management Software
an application that provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.
Image editing software
an application that provides the capabilities of paint software and also includes the capability to enhance and modify existing photos and images.
mobile app
an application you download from a mobile device's app store, sometimes called a market place, or other location on the internet to a smartphone or other mobile device.
Denial of service attack
an assault whose purpose is to disrupt computer access to an internet service, such as the web or email.
digital signature
an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
Spam
an unsolicited email message or posting sent to many recipients or forums at once. Considered internet junk mail.
arithmetic logic unit (ALU)
another component of the processor, performs arithmetic comparison, and other operations.
Digital Security risk
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability.
computer crime
any illegal act involving the use of a computer or related devices.
possessed object
any item that you must posses, or carry with you, in order to gain access to a computer or computer facility.
technology ethics
are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
Biometric device
authenticates a person's identity by translating a personal characteristic code, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer or mobile device verifying physical or behavioral characteristics.
transistor
can act as an electronic switch that opens or closes the circuit for electrical
fingerprint reader
captures curves and indentations of a fingerprint. see page 225 for different types of recognition
format
change its appearance.
worksheet
collection of columns and rows formed in spreadsheet software.
Program or Software
consists of a series of related instructions organized for a common purpose, that tells the computer what tasks to perform and how to perform them.
Memory
consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing data. see page 290
Integrated circuit
contains many microscopic pathways capable of carrying electrical current.
video card or graphics card
converts computer output into a video signal that travels through a capable to the monitor, which displays an image on the screen.
freeware
copyrighted software provided at no cost by an individual or a company that retains all rights to the software.
Shareware
copyrighted software that is distributed at no cost for a trial period. To use
Digital forensics
cyberforensics, the discovery, collection, and analysis of evidence found on computers and networks.
social engineering
defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Payload
destructive event or prank
Public-domain software
donated for public use and has no copyright restrictions.
Bus
electrical channel that allows various devices both inside and attached to the system unit to communicate with one another. Bits travel on a bus. used to transfer bits from input devices to memory, from memory to the processor, from the processor to memory, and from memory to ouput or storage devices. see page 300 for bus types
Binary system
a number system that has just two unique digits, 0 and 1 called bits.
machine cycle
1 fetching, 2 decoding, 3 executing, and, if necessary, 4 storing. see page 281
Enterprise computing
A large organization, commonly referred to as an enterprise, requires special computing solutions because of its size and geographic distribution.
Firmware
ROM chips that contain permanently written data, instructions, or information such as a computer or mobile device's start up instructions.
USB adapter
a dongle that plugs into a USB port, enhances functions of a mobile computer and/or provides connections to peripheral devices.
back up
a duplicate of a file, program, or media that can be used if the original is lost, damaged or destroyed.
Database
a collection of data organized in a manner that allows access, retrieval, and use of that data.
Software Suite
a collection of individual related applications available together as a unit.
Pop up blocker and Pop under blocker
a filtering program that stops pop-up or pop-under ads from displaying on webpages.
Digital certificate
a notice that guarantees a user or a website is legitimate.
Firewall
hardware and/or software that protects a network's resources from intrusion by users on another network such as the internet.
Memory cache
helps speed the process of the computer because it stores frequently used instructions and data. see page 294 for different levels of cache.
Web authoring software
helps users of all skill levels create related webpages that include graphics, video, audio, animation, special effects with interactive content, and blog posts.
analog
human speech is analog because it uses continuous wave form signals that vary in strength and quality.
Graphic and Media applications
include computer-aided design, desktop publishing, paint/image editing, photo editing and photo management, video and audio editing, multimedia and website authoring,media players, and disc burning.