CGS Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Open Source License

Although they can be obtained legally for free, programs such as these are governed by licenses. One of the most famous open source licenses is the GNU General Public License (GPL), which ensures that a particular program and any of its derivatives (modified versions) remain free to distribute.

Biotechnology

An application of biology that uses living organisms to manufacture new products or improve existing ones. Computing technology is being used by researchers in this field to develop new medications, map human genes, and increase crop yields.

Virtual Reality

An experience where humans can interact with realistic environments that are simulated by computers; A variety of headsets and machines have already been developed for playing games. Others can be used to train individuals such as pilots or soldiers, or even allow individuals to travel virtually to any other place in the world.

Augmented Reality

An experience where the real-world is supplemented with computer-generated information.

World Wide Web

Most individuals use the Internet to access web pages on the World Wide Web (WWW). These pages can contain a seemingly unlimited variety of information, from news and sports to updates from your family and social circle.

Phishing

Phishing involves luring individuals into entering personal information into a website controlled by the hacker. This scam involves two steps. First, the hacker must make a website that looks like the login page of a popular site such as Facebook or PayPal. Second, the hacker will send an alarming email to millions of users asking them to sign into the site by following the bad link. Hundreds of thousands of individuals have fallen prey to this scam.

Mini Toolbar

Provides access to common tools for working with text. When text is selected and then the mouse is rested over the text, the Mini toolbar fades in.

Biometrics

Refers to the measurement of patterns or characteristics found in the human body. Various biometric input devices are now being used to authenticate, or identify, an individual when accessing a device. Fingerprint scanners detect the unique patterns and swirls of an individual's finger. Facial recognition is a biometric technology that looks for unique measurements in an individual's face.

Solid State Storage

Relies on a special kind of flash memory chip to permanently store data; the devices can perform read, write, and erase operations at much quicker speeds. The following devices use this new type of technology: A USB flash drive is the small storage stick that plugs into a USB port. You have likely used one of these to transfer files between computers or store copies of important files. The tiny and flat memory cards are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames. The most common format currently in use for these devices is Secure Digital (SD), available in various speeds and storage capacities. Smaller versions of SD are known as mini and micro SD. Many hard drives now use flash memory instead of the more traditional magnetic technology. These are known as solid state drives (SSDs), and they can be found as both internal and external drives. Ultraportable computers will often use this technology exclusively, even though the storage capacity is only a fraction of what a traditional hard drive offers. Many desktop and laptop computers use a different approach, whereby they include a large traditional hard drive and a small SSD that only stores the operating system.

Search Engine

Search engine optimization (SEO) involves improving the ranking of a website when users enter relevant keywords in a search engine.

Social Networking

Services that make it easy for friends and family to share updates and special events with each other. While messaging services target specific people, social networking allows users to post a message, photo, or video that can be viewed by anyone in their social circle.

RAM

The most noticeable type of memory for a user is the temporary workspace known as random access memory

PIM Software

A personal information manager (PIM) is software designed to keep individuals organized. You can use a PIM to manage your contacts, create appointments and meetings, set up reminders, and keep track of various to-do lists. A PIM also provides email capabilities that allow you to send messages to any one of your contacts. Most office workers, from employees to managers, use a PIM on a daily basis.

Word Processing Software

provides tools for creating and editing all kinds of text-based documents. In addition, this software allows you to format your document by changing the appearance of text and the layout of each page. These capabilities allow you to create anything from simple one-page letters and résumés to large reports and publications containing separate chapters, a table of contents, and an index. These programs also enable you to add photos, graphics, tables, and various other elements to each page.

Output

refers to the processed results that a computer sends out to you. Typically, the results appear on the computer's screen or on a printed piece of paper.

Spelling and Grammar Errors

the Spelling & Grammar command analyzes your entire document for spelling and grammar errors and displays any potential errors in the Editor task pane where you can make decisions about how to handle each error or type of error in turn. Red Line- Indicates a misspelled word Blue Line- Indicates a grammatical error

VPN

A popular way for both individuals and businesses to increase the security of a network connection is by using a virtual private network (VPN). A VPN employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet. When you use a VPN, all of your activity will first pass through the secure connection between your computer and a VPN server before traveling to the Internet. This effectively shields your data traffic from nearby hackers who would otherwise be monitoring your unsecured communication.

Piracy

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator. These creations often include software, photos, music, and movies. Piracy doesn't need to involve profit to be illegal. Sharing digital products without consent is considered piracy even if they are given away.

Trojan Horse

A Trojan horse (or Trojan) is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system. Users often download Trojans from a compromised website, file-sharing service, or even an email attachment. When the user installs this software, it will often work as intended so that the user will not suspect anything.

What is a blog?

A blog (web log) is a web page or small website that contains a series of chronological posts and comments. These posts can contain just about anything, from the thoughts of an individual to updates from the executives of a large organization. It can be a work that stands on its own or a portion of a large corporate website. WordPress has become the most popular blogging tool. Individuals can create a free account, choose the site's theme, and start writing within minutes. A blog's purpose can cover a wide range of topics such as politics, sports, movies, video games, music, creative writing, and much more.

Datebase Management

A computer database is simply an organized method for storing information. Practically every business and organization relies on databases for the storage and quick retrieval of information. To create and manage such complex databases, businesses can use software known as a database management system (DBMS).

Switch

A computer networking device that connects network segments; A switch is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it. Because it can determine the identity of each node, it is able to send packets directly and only to the correct destination.

Router

A device that transfers data from one network to another in an intelligent way; A router is a complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. Routers also provide increased security for the LAN they link.

Hub

A hub provides multiple ports for connecting nodes. When it receives a packet from one port, it transmits the packet without modification to all the other nodes to which the hub is connected. Although all nodes receive the packet, they will ignore it; only the node that is the actual target of the packet will accept it.

LAN

A local area network (LAN) is a data communication system consisting of multiple devices that are relatively near each other and are physically connected using cables or wireless media. Any network that exists within a room, a single building, or even a group of adjacent buildings, is considered to be a LAN. It is often helpful to connect separate LANs so they can communicate and exchange data.

Smart Lookup Tool

Allows you to quickly search the Internet about any word or phrase in a document, spreadsheet, or presentation. When you look up a word or phrase, the Smart Lookup task pane displays. This task pane has two tabs—Explore and Define. The Explore tab displays search results powered by Microsoft's Bing search engine. The Define tab displays a definition of the word or phrase from the Oxford Dictionaries.

Presentation Software

Enables users to create electronic slideshows that are used to present information. Each slide in the presentation can contain a combination of text, images, charts, videos, and other elements that are arranged in an appealing layout. These slides are then shown in sequence to support the individual who is speaking in front of an audience.

Microblogging Services

Essentially a short-form blog, one where users share brief thoughts, links, and multimedia. Much like regular blogs, individuals can follow their favorite blogs and write comments or responses to any post they read.

Employee Monitoring: What is the ethical way to do it?

Everyone generally agrees about one aspect of monitoring: Employers should always inform employees about what kind of monitoring the company will engage in. This shows respect for the employee's privacy as no one will be caught off guard by monitoring devices. Also clear is the legality of monitoring. Various court cases have demonstrated that employers are generally within their rights to restrict Internet access at work and monitor employee use of the company's computing resources.

Copyright Law

Gives software creators a variety of rights and privileges over their creative work. There are many types of licenses, with some being customized to meet the needs of a large business. The following terminology and license categories will help you gain a better understanding of the software acquisition and installation processes.

Undo

If you make a mistake when working, the Undo command allows you to reverse the last action you performed. To undo multiple actions at the same time: Click the arrow next to the Undo button to expand the list of your most recent actions. Click an action in the list. The action you click will be undone, along with all the actions completed after that. In other words, your document will revert to the state it was in before that action.

Account Page

In the upper right corner of any Office application, you will see the name of the person who is currently logged into Office. The Account page lists more information for that user. This account information comes from the Microsoft account you used when installing Office. From the Account page, you can view your Microsoft user profile, switch between user accounts, view your product information, and connect to online services, such as Twitter and YouTube.

File Properties

Information about a file such as the location of the file, the size of file, when the file was created and when it was last modified, the title, and the author. File properties can be found on the Info page in Backstage view.

Nanotechnology

Involves the creation or manipulation of matter at the smallest possible scale. Researchers from a variety of fields are creating new types of materials, devices, and even computer circuits by working directly with molecules and atoms. Nanotechnology is being used to develop effective drug delivery systems that can better target problem areas while reducing side effects.

Keyboard Shortcuts

Keys or combinations of keys that, when pressed, execute a command. Some keyboard shortcuts refer to F keys or function keys. These are the keys that run across the top of the keyboard. Pressing these keys will execute specific commands. Pressing the F1 key will open Help in any of the Microsoft Office applications. Keyboard shortcuts typically use a combination of two keys, although some commands use a combination of three keys and others only one key.

Android

Like Linux, Android is an open source operating system. Although Google owns Android and manages the Google Play Store for apps, it allows any manufacturer to use and modify this operating system for their devices. The open source nature of Android allows any programmer to alter it and add innovative features. Android versions use numbers (e.g., 4.2.2), but they are popularly referred to by the names of various sweets, such as "Jelly Bean" and "Ice Cream Sandwich." Each version brings a wide range of improvements, some of which rival or even exceed the features of iOS. One unique feature is the ability to add widgets, which are much larger than icons and provide automatically updating information without the need to open an app.

Linux

Linux is an open source, Unix-like operating system that was created by Linus Torvalds in 1991. It is considered to be open source because it can be freely distributed and modified. This community invites Linux users and developers to contribute modifications and enhancements, and it freely shares information about Linux-related issues.

FAQ

Many websites also have frequently asked questions (FAQ) areas that should be checked for common questions and their responses. If you cannot find your question anywhere, go ahead and ask it; however, do not keep posting your question over and over. If it went unanswered, it means the user community likely does not know the answer.

One Drive

Microsoft's free cloud storage where you can save documents, workbooks, presentations, videos, pictures, and other files and access those files from any computer or share the files with others. When you save files to your OneDrive, they are stored locally on your computer and then "synched" with your OneDrive account and stored in the "cloud" where you can then access the files from another computer or device that has OneDrive capability.

Automation

Occurs when computers or machines can perform the work that was once done by a human. In some cases, the machine completely replaces a human worker. For example, large robotic arms now handle many aspects of a car's assembly, a process that used to take several people to complete. Automated systems offer many benefits to organizations and individuals. However, sometimes the advantages for a company can result in lost jobs or job shifts. For example, a large number of Americans were employed in manufacturing 60 years ago. Today, very few people are needed for those types of jobs. More people are now working in service industries and in the creation or support of those automated systems.

Office Suite

Office software includes some of the most popular programs that help businesses efficiently carry out tasks such as writing letters, analyzing sales figures, and scheduling meetings. The same software helps students create reports and presentations for class. Often, several office programs are bundled as a unit known as an office suite. Microsoft Office, Libre Office, iWork.

DDoS Attack

One popular type of network attack, known as a distributed denial-of-service (DDoS) attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests. And because the attacks come from millions of infected computers instead of the one owned by the hacker, it makes it difficult to know who was responsible. Unfortunately, users who are part of these botnets will usually have no idea that their computer has been compromised.

Spyware

One type of malware that has rapidly grown in use is spyware, which is designed to report activity on your computer to another party. Spyware can record individual keystrokes (using keyloggers), visited websites, and other types of activities. It does this to obtain personal information such as passwords, account numbers, browsing history, and just about anything that might be useful to a thief or unethical marketing company.

Cut

Remove text or other information. Text, or an object that is cut, is removed from the file and placed on the Clipboard for later use. You can then use the Paste command to insert the text or object into the same document, another document, or another Microsoft Office file.

Volume License

Software companies usually offer a volume license, which allows companies to install the software on multiple machines. Businesses can buy a license for a certain number of users, or they can negotiate a package that includes maintenance and support. Software companies will usually offer a discount for volume licenses.

Freeware

Software that is free to use without any specified time restrictions. Although it doesn't cost anything, it is still protected by a license and by copyright law.

Shareware License

Some software is free to download and install, but will stop working as intended after about 30 days. This software is known as shareware or trial software. To keep using the software after the trial period, you must purchase a full version or a code that can be entered into the software. This software is very popular with users, as they get to try it for free before they commit to paying for it.

Operating Systems

Some software, such as the Windows or Mac OS operating systems, exists primarily to help the computer run and manage its resources. Other types of software known as applications or apps enable users to perform a variety of activities. These include creating documents, playing games, or communicating with others.

Tab Stop

The location along the horizontal ruler that indicates how far to indent text when the Tab key is pressed. To set a tab stop: Select the text in which you want to set a tab stop. Click the tab selector at the far left of the horizontal ruler until it changes to the type of tab you want. Click the horizontal ruler where you want to set a tab stop.

Hardware

The physical devices that make up a computer system

Compression

The process of making a file smaller than its original size is known as file compression. The process of making a file smaller than its original size is known as file compression. Most operating systems contain a file compression utility. The most popular format for compression is known as ZIP. In Windows, these files are represented by an icon that looks like a folder with a zipper on it. Less popular is the compression known as RAR, which requires separate utility software to create and open. Regardless of the compression type, always be sure to remove or extract the files from their compressed container before using them.

Encryption

The process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

Monitor/Screen Resolution

The resolution of a monitor refers to the number of pixels that it can display on the screen. A monitor with a maximum resolution of 1920x1080 will display up to 1,920 pixels in each row (horizontally) and up to 1,080 pixels in each column (vertically). Although a higher resolution will produce a sharper image, screen elements will appear to shrink because of these tightly packed pixels. Your operating system will allow you to set an ideal resolution for both your monitor and your eyes.

Displaying the Ruler

The ruler displays horizontally across the top of the window just below the Ribbon and vertically along the left side of the window. The ruler gives you a quick view of the margins and position of elements in your document. From the ruler you can also control other document layout controls such as tabs, first line indents, and hanging indents. To display the ruler: Click the View tab. In the Show group, click the check box next to Ruler so a checkmark appears. To hide the ruler, click the check box again so the checkmark disappears.

Web Browser

To view web pages, you need special software known as a web browser. Web browsers are so important that practically all desktop and mobile operating systems now include one. It helps you find and retrieve a web page that you are interested in viewing. When the page arrives at your computer, the browser translates the code that web pages are made of into the attractive layouts you see today.

Email Parts

To: This contains the email address of the primary recipient(s) of your message. This address typically contains the name of an individual and the organization that provides the email, separated by the "@" symbol (e.g., [email protected]). Cc: The section known as Cc, or carbon copy, is used to send a copy of your message to individuals other than your primary recipient. Bcc: Any email address placed in the Bcc, or blind carbon copy, will be invisible to the recipients of your message. It is common to use Bcc when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email address.

IP Address

Today, every computer or device that is on the Internet needs an IP address that uniquely identifies it.

Quick Access Toolbar

Toolbar located at the top of the application window above the File tab. The Quick Access Toolbar gives quick one-click access to common commands.

Unix

Unix (or UNIX), which dates to 1969, runs many of the world's most powerful servers. Although Unix may not be as easy to use or configure as Windows, for example, it is very powerful and extremely stable. Since its development, Unix has been operated by a command-line interface. Many system administrators prefer to use it by typing quick commands.

Spreadsheet Software

Used for entering, calculating, and analyzing sets of numbers. These programs also create charts and graphs that are based on the selected set of numbers. Spreadsheets have a wide range of uses, from managing a teacher's grade book to performing complex analysis on a company's sales figures. One of a spreadsheet's most powerful purposes is to answer "what if" questions for a variety of scenarios.

Storage Units

When it comes to describing a computer's storage or memory, we commonly use the unit known as the byte, which is simply a collection of eight bits. The eight is significant because it is the amount of space required to store a single character, such as a letter or number. KB: Approx. Value: 1,000; Actual Value: 1,024 MB: Approx. Value: 1,000 KB; Actual Value: 1,048,576 GB: 1,000 MB: Approx. Value: Actual Value: 1,073,741,824 TB: 1,000 GB: Approx. Value; Actual Value: 1,099,511,627,776

Protected View

When you download a file from a location that Office considers potentially unsafe, it opens automatically in Protected View. Protected View provides a read‐only format that protects your computer from becoming infected by a virus or other malware. To disable Protected View, click the Enable Editing button in the Message Bar.

Supercomputers

re the largest and most powerful computers in the world. These enormous machines, which often fill warehouse-sized rooms, can link hundreds of thousands of processors. Supercomputers are ideal for handling large and highly complex problems that require extreme calculating power. NASA, for example, will use supercomputers to conduct modeling and simulations for upcoming missions. Others might be involved in forecasting weather, performing nuclear research, and even breaking codes on behalf of a government agency.

Software

refers to one or more of these programs that are packaged together for a unified purpose.

Input

refers to user entries or activities that tell the computer what to do. Input can take a variety of forms, such as the text you type with your keyboard or finger movements on the touchscreen of a mobile device

Paste

Command that is used to insert text or an object from the Clipboard into a file.

Cookies

A small data file created by a web browser that remembers your preferences for a specific website. First-party cookies: These cookies can only be created and read by the actual website you are visiting. Companies such as Amazon often request that the browser make cookies that allow the company to remember your name and ID when you return to the site. Third-party cookies: These cookies are typically created by marketing and advertising companies that work with the website you are visiting. For example, suppose that you visit the websites of two different car manufacturers who happen to employ the same advertising company. Besides receiving first-party cookies from the car companies, you will also receive third-party cookies from the advertising companies. While the second car company is not allowed to read the cookie from the first car company, the advertising company can read the cookies issued from both sites! This allows the company to effectively track you because it knows which of its partner's websites you have visited.

Virus

A virus is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself. A virus can be found in many types of files, from executable programs to Microsoft Office files. Users can unknowingly receive a computer virus via file-sharing services and email attachments, or when copying infected files from someone else's computer.

Privacy Policy

A website's written statement that clearly states what information is collected from users and what is done with that information.

WAN

A wide area network (WAN) is the connection of two or more central computers or LANs, generally across a wide geographical area. For example, a company may have its corporate headquarters and manufacturing plant in one city and its marketing office in another. Each site needs resources, data, and programs locally, but it also needs to share data with the other sites. To accomplish this feat of data communication, the company can attach devices that connect over public utilities to create a WAN. Though it is common for a WAN to be made up of interconnected LANs, it is not a requirement.

Wikis

A wiki is a collaborative information site that relies on the Internet community to both create and edit content. Wikis encourage people with subject knowledge to contribute at their convenience, adding to or fixing pages where information is missing or incorrect. If this knowledge is crucial for your job or one of your classes, be sure to double-check that particular fact on another reliable site

Worm

A worm is a type of malware that self-replicates and spreads through computers and networks. Unlike a virus, a worm is a fully contained program that is not attached to a host file. Furthermore, a worm does not require that a user take an action such as opening a file. It can spread on its own rather quickly, usually by exploiting a vulnerability in an operating system or some other software.

How do you identify a CPU in a computer ad?

Brand and model: Intel and AMD dominate the market for desktop and laptop computers. Next to these manufacturers' names you will find a series and model, such as Intel's i7-3630QM or AMD's A8-4500M; For mobile devices, you will find companies such as Apple, Qualcomm, and Texas Instruments producing ARM-based processors. These types of chips generally produce less heat and use less power—characteristics that are crucial for mobile devices. Multiple cores: Most of today's microprocessors have several processors, or cores, inside a single chip. A dual-core processor can be twice as efficient as a traditional processor, given that it can handle twice the work at any given moment. Many of today's processors have more than two cores, with four, six, and even eight becoming common. Clock rate: A CPU's clock rate measures the frequency or speed at which it can process instructions. This speed is measured in hertz, which is equal to one instruction cycle per second. Today's processors have reached the gigahertz (GHz) mark, capable of processing billions of instructions per second.

Find

Command that locates specific text or formatting in a document. In Word 2010, Microsoft introduced the Navigation task pane as the default method for searching for text in a document. When you search for a word or phrase in a document using the Navigation task pane, Word highlights all instances of the word or phrase in the document and displays each instance as a separate result in the pane.

Styles

Complex formatting, including font, color, size, and spacing, that can be applied to Office files. Heading styles make your document look more structured and clean

Fair Use

Copyright law contains an exception known as fair use, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission. Some of these circumstances include education, commentary, criticism, and parody. People can use small excerpts from a larger work in reviews and observations, so long as the review is genuine and not just a disguised means of unauthorized reproduction. What is the nature of the use? Educational use and commentary are more acceptable than a for-profit use. What is the nature of the work? Copying from a news article (nonfiction) is more acceptable than a popular song or major network TV show (works of fiction). How much of the work is being copied? Using only a few seconds of a song or video is more acceptable than copying the entire thing. How will the copy affect the market? If you are claiming fair use just to avoid paying for a book, song, or movie, then fair use will likely not apply. Remember, the reason for the existence of copyright law is to protect authors and allow them to profit from their creations.

Backstage View (file tab)

Tab that contains the commands for managing and protecting files, including Save, Open, Close, New, Share, Export, and Print.

Copy

The Copy command places a duplicate of the selected text or object on the Clipboard but does not remove it from your document.

Redo

The Redo command allows you to reverse the Undo command and restore the file to its previous state. The Quick Access Toolbar gives you immediate access to both commands.

The Ribbon

The Ribbon is located across the top of the application window and organizes common features and commands into tabs. Each tab organizes commands further into related groups. The dialog launcher appears in the lower right corner of some groups. Clicking this button opens the primary dialog for working with commands in the group. For example, clicking the dialog launcher in the Font group will open the Font dialog.`

Cloud Storage

The ability to store your files online and access them from any Internet-connected device.

Whistleblowing

The act of alerting the public about harmful activities that are being hidden by an organization. These activities can range from the production of harmful chemicals to deceiving the U.S. government or its people. Since most companies keep electronic records of just about anything, evidence is often easy for potential whistleblowers to find. before someone can ethically blow the whistle and turn against their organization, a few questions should be considered: Have I alerted my supervisor and, if needed, the top-level managers of the organization? Is the activity in question illegal or likely to cause harm to the public? Do I have documented proof of the activities that will cause this alleged harm?

Network Bandwidth

The amount of data that can be transferred on a network during a specific interval; usually measured in bits per second. Bandwidth is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

What is the cursor?

The cursor indicates the place on the page where text will appear when you begin typing. There are a number of cursors that display, but the default text cursor is a blinking vertical line.

Domain Name

The domain name uniquely identifies a site and a brand on the web. Examples include apple.com, whitehouse.gov, and red-cross.org. The first part indicates the unique domain name, while the second half, known as a top-level domain (TLD), indicates the type of site.

IOS

The iOS operating system powers Apple's iPhone and iPad. It is considered to be a very friendly and stable operating system, largely due to Apple's tight control of the hardware and software ecosystem. Since then, Apple has added a variety of features including messaging, videoconferencing, and cloud storage that are exclusively available for Apple users. More recently, the Siri speech recognition system has made a big impact on the way many users interact with their mobile device.

Internet

The largest network in the world is known as the Internet, which connects billions of people and organizations throughout the world.

Acceptable Use Policy

a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources. They can be useful tools for protecting an organization and creating a legal framework for punishing wrongdoers. Some AUPs are simply a comprehensive statement of policy so that the institution's point of view is made clear. Others are framed as an agreement or contract that individuals are required to sign or agree to before being given access to computer-related resources. Although many different types of organizations use them, AUPs generally have a few common elements: Outlawing the use of computing resources to commit crimes, such as hacking and piracy. Restricting particular services, such as file-sharing, on their networks. Banning inappropriate and unethical behavior, and guidelines for the organization's netiquette. Stressing the importance of security, especially the creation of a strong password. Explaining the ownership and privacy of email, storage, and other resources that you have access to. Typically, companies reserve the right to monitor your email, web activity, and files stored on company equipment.

Cloud Computing

allows you to store your files and use various applications in an online account.

What is Accounting Software? Give examples

an application that helps businesses of all sizes record and report their financial transactions; * Intuit QuickBooks * Sage 50 Accounting * Xero (cloud based)

Bluetooth

calls could be made with a wireless headset worn on the ear or the hands-free systems in some cars. In addition to Bluetooth, many mobile devices now support voice input as a hands-free way to issue commands and dictate messages. Hands-free computing has a couple of benefits—convenience and safety.

3D Printing

can create a three-dimensional object made of various materials. Although several technologies exist for accomplishing this, the rapid growth is in commercially available printers that use several types of polymers, or plastics. a 3D model is created on a computer using special software.

Artificial Intelligence

involves the development of intelligent systems. These systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans. Though the sciences of AI and robotics are very different, some of the futuristic products and accomplishments we envision involve contributions from both of them.

Computer Program

is a set of instructions that directs the computer to perform a variety of tasks. These instructions are written in a computer programming language such as C++, Java, and Visual Basic.

Storage

is the ability of a computer to hold or remember the information it processes. Some storage is temporary, such as the data held by your computer's RAM, or memory. Most storage, however, is permanent; it will remain there until you erase it.

Processing

is the ability of a computer to perform actions based on instructions from the user or a program. As you already know, a computer can complete a variety of tasks including financial calculations and handling the graphics for a video game

Wi-Fi

is the current standard for wireless networks and Internet connectivity.

Hard Drive

is the primary storage device of a personal computer; You can also buy an external hard drive to store additional information or make copies of your irreplaceable data. These external drives are very portable and typically connect to the USB port on a computer. Both types of hard drives are currently capable of storing a few terabytes of data.

NFC

near field communication), many smartphones can now be tapped on special payment devices to complete your purchase at select stores. All you need to do is save your bank or credit card information in an app such as Google Wallet. The payment device at the store will then process the transaction as if you had swiped your debit or credit card. Google Wallet can also store promotions and coupons electronically.

CPU

or microprocessor, is the main processor of a computer. It is responsible for organizing and carrying out instructions to produce a desired output. It can perform a diverse number of operations, from finding a name in your smartphone's contacts to handling the complex calculations required by today's engineers.


संबंधित स्टडी सेट्स

COM1320 chapter 11 video:Analytical Reports

View Set

Origin of the Solar System & Exrasolar Planets

View Set

Les Jeux Olympiques - The Olympic Games

View Set

Chapter 38: Nursing Care of the Child With an Alteration in Intracranial Regulation/Neurologic Disorder - ML4

View Set

History Chapters 8.1 - 8.3 RECONSTRUCTION

View Set

Chapter 2: Cost Behavior and Cost Estimation

View Set

Anatomy and Physiology- Body Systems Review

View Set

ExamFX Taxes, Retirement, and other Insurance concepts

View Set