CIS 120 Vocabulary

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

User Interface (UI)

Components of an application that the user interacts with. User interface components include navigation paths, commands, the graphical composition, and the overall look and feel of the application.

Operating System Files

Computer files that contain programs and data that are essential for the operating system to function.

Malware

Computer programs designed to gain inappropriate or unauthorized access to computer systems and information.

Software

Computer programs, procedures, instruction, and data that control how the computer operates.

Spyware

Computer software that secretly collects user information and monitors computing activities, without the user's knowledge or consent. Spyware transfers this information to individuals who use it for activities, such as online advertising or identity theft.

Neural Networks

Computer systems modeled on organic brains and nervous systems.

Alphanumeric

Consisting of letters and numbers.

User Account

Created for a user so that the operating system, website, or application software can authenticate that the user is a valid user and is authorized to access specific resources.

Text

Data composed of alphanumeric characters and punctuation marks.

Calendar Views

Different ways to organize an Outlook calendar. For example, you can view a single day, a week, or a whole month.

AutoFilter

Displays a subset of the data in a worksheet that meets certain criteria.

DNS

Domain Name System. A service that converts numeric IP addresses into words. For example, DNS converts the IP address 67.192.129.239 to www.testout.com.

Byte

Eight bits together form a byte. 1024 bytes make a kilobyte, 1024 kilobytes make a megabyte, and 1024 megabytes make a gigabyte.

Webmail

Email services that can be accessed through a web browser. Webmail can be provided by an Internet service provider (ISP) or an online email service, such as Google or Yahoo.

Cell Border (Excel)

Emphasizes, decorates, or gives context-sensitive meaning to a cell or group of cells.

Skills Lab

Hands-on simulation labs where students develop basic computer, Word, Excel, PowerPoint, and Access skills.

Print Titles (Excel)

Headings or labels that are repeated on each printed page of a spreadsheet.

Random-Access Memory (RAM)

High-speed integrated circuits used to store computer, user, and program data during computer processing. RAM is volatile memory, which means that when the computer is powered off all information stored in RAM is lost.

Memory Chip

High-speed integrated circuits used to store operating system, program, and user data for quick computer processing.

Zoom

How large or small a program appears on the screen.

HTML

Hypertext Markup Language. A way to store text so its formatting can be interpreted by a web browser.

HTTPS

Hypertext Transfer Protocol + Secure Sockets Layer (SSL). Transfers hypertext documents on the World Wide Web while applying encryption algorithms to them, unlike HTTP, which transfers documents in plain text.

HTTP

Hypertext Transfer Protocol. A way for computers to send and receive text, images, and other media files over the Internet. Files sent with HTTP can be viewed in an internet browser.

Column Heading

In Excel, the column header is above row one and contains the letters used to identify each column in the spreadsheet.

Webinar

One user projecting their screen to the computers of multiple remote users.

Security Settings

Options in the Microsoft Operating system that control computer security. For example, options can be set to control password characteristics and file access.

Transition Timing Options

Options that can be used to change the speed and timing of a slide transition in Microsoft PowerPoint.

Printing Options

Options that define how a document should be printed, including number of copies, page orientation, margins, and page size. Printing options are located on the Print tab in the Backstage view of Microsoft Office applications.

System Settings

Options that define how the Windows operating system functions.

Descending Sort

Orders data in a high to low sequence. For example, from Z to A when ordering letters and 9 to 0 when ordering numbers.

Ascending Sort

Orders data in a low to high sequence. For example, from A to Z when ordering letters and 0 to 9 when ordering numbers.

Ethics

Personal behaviors that build responsibility and trust.

Ports

Physical or virtual connection points through which computing devices are connected to computers.

Slide Layouts

Pre-built and customizable slide templates that contain placeholder boxes for slide objects, such as titles, graphics, or text. Slide layouts include formatting and positioning of objects on the slide template.

Firmware

Preinstalled, read-only software on a device that tells it how to work.

Phishing Attack

Pretending to be a trusted entity, such as a bank, social media website, or government agency in order to acquire personal information, financial information, usernames, and passwords. Once acquired, this information is used fraudulently to gain access to other computer resources and information.

Confidentiality

Protecting secret or sensitive data and information.

Copyright

Protections granted by the federal government to creators, writers, and inventors. Copyright includes the rights to reproduce, display, make derivatives, sell, rent, or lend a work.

Bcc

Recipients included in this email field will be hidden from other recipients.

Netiquette

Rules for being safe, courteous, and polite on the Internet.

Data Validation

Rules that dictate what kind of information can be entered into a cell.

Embedding Fonts

Saving the included fonts in the same file as the document so they'll be available from any computer.

Microsoft Windows Defender (Windows 8 and later)

Security software developed by Microsoft that protects against viruses, spyware, and malware.

Windows

See Microsoft Windows.

Account

See User Account

SQL

Structured Query Language. A computer language that is used to retrieve and interact with data in a database.

Systems Analysis

Studying different aspects of an information system to better define goals and optimize performance.

Taskbar

The bar at the bottom of the screen in the Microsoft Windows operating system. The taskbar contains the Start button, pinned application shortcuts, and the notification area.

Robotics

The branch of technology that deals with making and operating robots, or automated machines.

Font Case

The case in which letters are displayed. The two types of font cases are uppercase and lowercase. ABC are uppercase letters and abc are lowercase letters.

Data Type

The classification of the type of data that can be stored in a database column. Common data types include integer, date, and varchar. If a column is given an integer data type, then the database management system will only allow integer values to be stored in the column.

Internet of Things

The connection via the Internet of everyday objects that contain embedded sensors and/or WiFi capabilities. Examples include cellphones, coffee makers, lamps, and vehicles.

Windows Firewall

The default host-based firewall included with Windows.

Microsoft Edge Browser

The default web browser on the Windows 10 Operating System.

Artificial Intelligence

The development of computers to perform tasks that normally require human intelligence.

Margin

The distance between the edge of the page and the page's content. Each page contains four margins: Top Margin, Bottom Margin, Left Margin, and Right Margin.

Indent

The distance between the left margin of a page and where a paragraph or other element begins. Indenting can be used to call attention to certain information on the page.

Human Dignity

The ethical principle that says one should respect the privacy and dignity of other human beings.

Theme Font

The font or set of fonts that are used in a theme.

Header Row Style

The format style applied to the first (or header) row of a table.

Citation Style

The format you use to cite sources in an academic paper. Citation styles include APA, MLA, and the Chicago Manual of Style.

Computer Ethics

The guidelines that computer users should use regarding ther professional and social conduct online.

Slide Size

The height and width of a PowerPoint slide. The slide size can be customized to accommodate the size of the display being used for the presentation.

Form Data (Access)

The information that is entered into each field on a form. This data is stored in the corresponding database columns and tables when the user submits the form.

Cell

The intersection of a row and a column in an Excel spreadsheet. Users can type data into cells and then use spreadsheet features and functions to analyze the data.

Start Menu

The location in the Microsoft Windows operating system where programs, system settings, files and folders, and devices can be quickly accessed.

Operating System

The main software program that controls computer processing, software application execution, and integration and operation of computer peripherals, devices, and hardware. Microsoft Windows, Linux, and OS X are examples of popular operating systems.

Windows Defender

The malware protection included by default with Windows systems.

Bandwidth

The maximum rate of data transfer on a network or Internet connection, typically expressed in megabits per second (Mbps).

Bit Depth (Audio)

The measure of how many bits are used to store the value of each sample in a digital audio recording. Using more bits makes for higher-quality recordings, at the cost of making the file larger.

System Development Life Cycle (SDLC)

The methodology used by systems analysts. It's divided into a series of phases, from analysis and design to implementation and maintenance.

Display Resolution

The number of pixels (dots) displayed on a computer monitor. For example, a monitor resolution of 1366 x 768 displays 1366 pixels on each horizontal line, with a total of 768 horizontal lines.

Sampling Rate (Audio)

The number of samples taken in an audio recording each second. This rate is measured in Hertz (Hz). 1 Hz means one sample per second. A typical sampling rate is 44.1 kHz, or 44,100 samples per second.

Cell Value

The number or text string shown in a cell. Often, cell values are the result of a formula calculation.

Directory

The organizational structure that defines how files and folders are arranged for storage on a computer. The directory structure is used to locate files within folders in a way that is intuitive to the user.

Font Style

The particular style(s) applied to a font. For example, the Arial font can have Bold, Regular, Italic, or Bold Italic styles applied to it.

Hardware

The physical components of a computer system. Common hardware components include the CPU, motherboard, hard drive, and RAM.

Continuous Section Break

The point where one section of a document ends and the next section of the document begins. Documents can be divided into multiple sections, allowing each section to be formatted differently.

Computer Security

The policies, procedures, methods, software, and hardware that is used to protect the information contained in computers, computer devices, and computer networks.

Default Printer

The printer that is automatically selected when printing from a software program or application.

Data Integrity

The process of ensuring the accuracy, quality, completeness, consistency, and security of data.

Data Analysis

The process of evaluating data to identify useful information that can be used to support decision-making and problem-solving.

Install

The process of loading and configuring computer software and applications so that they can be run on the computer.

Grouping

The process of putting items into groups or sets. This process is used often in computer processing. For example, a system administrator can put users into different groups and apply specific security permissions and roles to each group. A database management system can be used to put data into groups that become tables in a relational database. Software applications can group data together for processing, such as when the Subtotal command is used in Excel.

Download

The process of receiving a file from another computer, usually over a local network or the Internet.

Delete

The process of removing material from digital files, including documents, spreadsheets, and database records.

Query

The process of retrieving information from a database. Information can be retrieved from a database by using a query language, such as SQL, or by using a database application that retrieves information based on user-selected options.

Encryption

The process of transforming information into a format that can only be read by authorized entities.

Authentication

The process of validating the identity of a computer user.

Telecoms

The sector of the ICT industry that specializes in communications technology, such as phone lines and cell towers.

Row (Access)

The set of columns in a table that describe a specific instance of an entity. For example, columns describing the employee John Smith would be stored in one row in the employees table.

File Format

The standard for how a software application or computer program stores information in a file.

Computer Science

The study of computer use and principles.

Subtotal

The sum of a group of numbers that will later be added to another value.

Total

The sum of an entire group of numbers.

Cell Reference

The unique name of a cell in Excel. Cell references are formed by combining the letter name of the column with the number of the row, e.g. D3.

Default Value

The value that a software program or application will automatically enter into a field unless the user enters a different value.

Function Argument

The values inside the parentheses of a function. For example, the function =AVERAGE (C1:C20) contains the arguments C1:C20, which references the numbers contained in those cells.

Cc

This field is for adding people to an email who aren't necessarily expected to respond.

Reply All

This will send an email to all people included on the original message.

Reply

This will send an email to the sender of the original message.

TCP/IP

Transmission Control Protocol/Internet Protocol. TCP/IP are the rules that computers on the Internet use to talk to each other.

Streaming

Transmitting or receiving computer data as a continuous flow, which allows video or audio information to play while subsequent data is still being downloaded.

Piracy

Unauthorized use of another person's or entity's intellectual property. Piracy can include downloading a movie without paying, making photocopies of a book, or selling a copy of a CD.

URL

Uniform Resource Locator. A way to specify a specific address on the Internet.

Spam Email

Unsolicited email sent to many people by using mailing lists or newsgroups. It often encourages people to buy products or services. Spam is also sent by people phishing for personal information that can be used for identity theft. Spam is considered online junk mail.

Small Caps

Uppercase characters that are the same size and format as nearby lowercase characters.

Citation

Used in an academic paper, article, or book to reference the source of a quote or idea.

Playback Options

Used to control how a video is played in a Microsoft PowerPoint presentation. Available options include Play Full Screen, Hide While Not Playing, Start, and Rewind After Playing.

Animation Timing Options

Used to control the timing of an animation effect in Microsoft PowerPoint.

And operator

Used to find records that meet more than one criteria.

Email Address

Used to identify an email box that is the source or destination of an email message. An email address contains a user name and a host name, separated by an @ symbol (e.g., [email protected]).

UDP

User Datagram Protocol. A transfer protocol where packets are not acknowledged by the receiving computer, making for faster, less stable downloads.

Wireless Network

Uses radio waves instead of wires to connect computers and computing devices together.

Wireless Connection

Uses radio waves instead of wires to connect to a network.

Gaming

Using a computer to play video games, either by yourself, with other local players, or over the Internet.

Data Mining

Using automated tools to discover trends or patterns in big data.

Cloud Computing

Using remote computer hardware and software to store and process data.

Cyberbullying

Using the Internet to harass, intimidate, or threaten other people.

Transition Animation

Visual effects for when a PowerPoint presentation moves from one slide to the next.

VoIP

Voice Over IP. A way to make telephone calls using the Internet.

One-to-Many Relationship

When a row or record in one relational database table is associated with zero, one, or more rows or records in another relational database table.

Compression Artifact

When a visual file is compressed to an extremely small size, there may be patches of pixels that have less visible detail than the rest of the image. These are called compression artifacts.

Sample (Audio)

When computers digitally record sound, they divide the continuous sound wave into discrete segments. Each segment is called a sample.

Microsoft Security Essentials (Windows 7

Windows Vista) , Security software developed by Microsoft that protects against viruses, spyware, and malware.

Banded Columns (Excel

Word) , Alternating background colors on columns that increase readability.

Banded Rows (Excel

Word) , Alternating background colors on rows that increase readability.

Column (Excel

Word, Access) , In Excel, a column is a vertical line of cells extending from the top of the screen to the bottom of the screen. In Word, a column is a vertical section of a table. In Access, a column is a set of data values of the same data type; each column corresponds to a particular row in a database table.

Telecommuting

Working from home by using a computer and the Internet to connect to an organization's systems and applications.

Public Domain

Works whose copyrights have expired enter the public domain. Public domain works are free for anyone to reproduce, display, and make derivatives.

HDMI Connector

A 19-pin connector used for the High-Definition Multimedia Interface (HDMI). HDMI cables use this connector to transfer audio and visual data between devices at extremely high bitrates.

Find and Replace

A Microsoft Office feature that searches a document for a series of characters and replaces them with another series of characters.

Control Panel

A Microsoft Windows operating system program used to perform various system-level tasks, including user account management, computer device management, and network administration.

Windows Control Panel

A Microsoft Windows operating system program used to perform various system-level tasks, including user account management, computer device management, and networking administration.

Presenter View

A PowerPoint view option where the presentation slides and speaker notes are displayed on the speaker's computer, but the audience sees only the current presentation slide.

Select

A SQL language command in Microsoft Access that is used to retrieve data from tables. For example, the command SELECT * FROM Employee; retrieves all of the information stored in the rows and columns of the Employee table.

Settings App

A Windows 10 application where users can configure basic system settings such as privacy, language, and power use.

Paragraph

A basic unit of writing consisting of one or more sentences focused on a single theme or idea. Typically, paragraphs are separated by indents or spacing.

Stacking Order

A behind-the-scenes number assigned to all objects that determines which one shows up on top when they overlap.

Academic Source

A book or article written by a credentialed expert in a particular field of study. These publications are typically reviewed and validated by other scholars who are experts in the field.

Name Box

A box that shows the name or coordinates of the selected cell.

Placeholder (PowerPoint)

A box with a dotted line that is added to a slide or slide layout to mark where an object or text will go. Placeholders are commonly used for text and prompt the user with the message Click to add text.

Ecommerce

A business model that uses the Internet for commercial activities, such as buying and selling products, services, or information.

Dialog Box Launcher

A button at the bottom-right corner of many Ribbon groups that launches a dialog box where you can find additional settings, many of which do not appear on the Ribbon.

Registered Jack 45 (RJ45)

A cable connector specification commonly used in Ethernet networks. An RJ45 has an 8-pin connector that can be attached to a twisted pair cable.

Temporary Internet Files

A cache that contains files related to websites that the user has recently visited. Storing visited website data allows the computer to load frequently visited websites much faster.

Video Camera

A camera that records motion picture and audio in either digital or analog format. Digital video cameras are more popular because their recordings can easily be transferred to a computer.

Tab

A category of features in the Ribbon.

Named Cell

A cell that has been assigned a specific name, as opposed to merely being known by its coordinates.

Delimiter

A character or group of characters that are used to separate regions, areas, or fields in a file. A common delimiter is the comma. Files that use commas to separate fields are called Comma Delimited Files.

Subscript

A character or symbol that is about half the size of, and lowered slightly below, the characters around it.

Superscript

A character or symbol that is about half the size of, and raised slightly above, the characters around it.

Relationships Diagram

A chart that is created by using entity-relationship data modeling techniques. The diagram documents the relationships between entities and is used to define the logical structure of a relational database.

Pie Chart

A chart type that displays data values as parts of a whole by dividing a circle into proportional sections.

Line Chart

A chart type where data points are connected by lines to show changes in data values over time.

Bar Chart

A chart type where numeric values are represented by the length of horizontal or vertical rectangles.

Button

A clickable element in a software program that controls user navigation, application features, or triggers an event.

Hyperlink

A clickable image or text that takes you to another webpage or document.

OneDrive

A cloud storage service provided by Microsoft.

File

A collection of data created on a computer that can be opened, modified, saved, and deleted.

Microsoft Office

A collection of desktop productivity applications. Examples of software applications included in Microsoft Office are Microsoft Word, Excel, PowerPoint, Access, and Outlook.

SmartArt

A collection of diagrams and images that can be added to Word documents or PowerPoint slides in order to enhance the visual appeal of the information being presented.

Clip Art

A collection of simple pictures, images, graphics, and symbols that can be inserted into documents for visual appeal and to enhance an author's message.

Theme Color

A color or group of colors that are used in a theme.

Clustered Column Chart

A column chart that compares data values across categories.

Absolute Reference (Excel)

A column letter and a row number that identify the location of a spreadsheet cell or group of cells. It can be used in a formula or chart to reference the value of a specific cell or group of cells.

Keyboard Shortcut

A combination of keys that, when pressed together, execute a command. A common example is Ctrl + C, which copies selected text to the clipboard.

Font

A combination of various attributes that dictate how text characters appear. A specific font is defined by character spacing, size, pitch, serifs, etc. Times New Roman and Arial are both examples of fonts.

Copy

A command that duplicates selected data (e.g., text, graphics, folders, documents, etc.) and stores the data in the clipboard. This data can then be placed in another location or document.

Paste

A command that moves copied material from the clipboard to a user-determined location in a document.

Undo

A command that removes the last update or change made to a document, spreadsheet, presentation, or database.

Nigerian scam

A common email hoax where a scammer asks a victim for money in exchange for a reward of even more money later.

Lossy Compression

A compression algorithm that alters the original data to make it easier to compress. Lossy compression is most commonly used with audio, image, and video files.

Lossless Compression

A compression algorithm where the uncompressed file is identical, bit for bit, to the original.

Function

A computational procedure that performs a specific operation. Examples of common functions include AVERAGE, SUM, and RANK.

Direct Reference

A computer address that identifies the memory location where information is stored.

Monitor

A computer device that displays a computer's visual output. It is often referred to as the computer screen.

Mouse

A computer device that is used to move the cursor to interact with various user interface elements.

Web Server

A computer or computing device that is dedicated to processing Web pages or running a website.

Server

A computer or computing device that is dedicated to supporting specific computer services or applications. Examples of computer servers are email servers, file servers, database servers, printer servers, application servers, etc.

RGB Display

A computer or television monitor that is made of tiny red, green, and blue lights. Together, one of each light makes a pixel.

Network Administrator

A computer professional who installs, manages, secures, and updates computer networks by using network-specific computer hardware, software, and tools.

Desktop Application

A computer program that is installed on a computer's hard drive.

Web Application

A computer program that runs in an Internet browser.

Web Developer

A computer programmer who makes websites and web applications.

Application Developer

A computer programmer who writes software for end users.

Read-Write Disk

A computer storage device whose data can be read by a computer, and data can be written to it.

Read-Only Disk

A computer storage device whose data can be read by a computer, but data cannot be written to it.

Optical Drive

A computing device that uses laser light and electromagnetic waves to read and write data on optical discs.

Storage Device

A computing device used to store information (e.g., hard drives, optical drives, USB drives).

Password

A confidential series of characters that a computer user types in order to gain access to computer accounts, computing devices, files, and applications.

Network Connection

A connection point used by a computer or computing device to connect to a network. Network connections can be made by using a network cable or a wireless network connection.

Network and Sharing Center

A control panel category in the Microsoft Windows Operating System where most network settings can be changed.

Excel Outline

A convenient way to view and perform calculations on transactional data.

Theme

A coordinated group of color styles, effects, and fonts that are applied to a slide or page to give it a consistent and professional look.

Binary

A counting system that uses only two digits - zero and one. Computers use binary to encode data. Data encoded this way are called "digital data."

Slide Master

A customizable slide whose layout, formatting, and organization is automatically applied to each new slide created in a presentation. The slide master provides a consistent look and feel to a presentation.

Cloud Storage

A data storage service provided by a hosting company that makes stored data available on any device via the Internet.

Record

A data structure composed of fields. For example, an employee record could be created for each employee and could contain fields, such as employee first name, employee last name, job, salary, and hire date.

Database Object

A data structure created by the database management system that stores, organizes, and accesses data in the database. Examples of database objects include tables, views, indexes, and primary keys.

Referential Integrity

A database design principle that ensures primary key and foreign key data consistency for tables that are related to each other through a one-to-one, one-to-many, or many-to-many relationship.

Relational Database

A database structure where data is stored in tables and a logical relationship exists among tables and columns in a one-to-one, one-to-many, or many-to-many form.

AutoNumber (Access)

A datatype used to generate an automatically incremented number that is inserted into the identity column of an Access table.

Bug

A defect in a computer program, software application, or information technology system that causes unexpected behavior.

Internet Options

A dialog box that allows users to manage a computer's Internet settings. For example, users can use this dialog box to change their home page, manage browser add-ons, manage security settings, delete browser history and cookies, etc.

Raster Image

A digital image that is stored by holding the color value of each individual pixel in memory.

Vector Image

A digital image that is stored by remembering the relative positions of anchor points and the lines that connect them.

Folder

A directory element that can contain one or more files. Folders are used to organize files so that they are easier to find and access.

Documents Folder

A directory folder that Windows provides for each user to store and manage document files, such as spreadsheets, presentations, and Word files.

Recycle Bin

A directory where deleted folders and files are temporarily stored. Items in the recycle bin can be either restored or permanently deleted. The Recycle Bin is accessed through an icon on the Windows desktop.

Navigation Pane

A display element in Microsoft Office applications that is used to quickly navigate and modify objects.

Touch Screen Interface

A display screen on a computing device that can process user input through touch.

Distribute Horizontally

A document design layout where objects are evenly spaced from the left side of the document to the right side of the document.

Distribute Vertically

A document design layout where objects are evenly spaced from the top of the document to the bottom of the document.

Blank Document

A document template (with preset margins and font styles) that is opened when a user wants to create a new document in Microsoft Word.

Spreadsheet

A document that stores and manipulates data in columns and rows. This can also refer to a single worksheet in an Excel workbook.

Gallery

A drop-down window within a Ribbon where you can preview and choose from a variety of preconfigured settings.

PivotTable

A dynamic table that shows a subset of information from a larger table or database.

Watermark

A faint background image added to a Word document or PowerPoint slide.

Email hoax

A fake news story or other false information sent through email.

Conditional Formatting

A feature in Excel that changes the formatting of a cell or group of cells when values in the spreadsheet meet criteria defined in a conditional format statement.

Microsoft Windows Explorer

A feature in Windows that is used to navigate the files and folders contained on a computer.

Pop-up Blocker

A feature of most web browsers that prevents pop-up windows from being displayed. If a website (such as www.testout.com) uses pop-ups in a useful way, you should disable the pop-up blocker for that site.

Shopping Cart

A feature on ecommerce websites that temporarily stores items that customers have selected to purchase. Customers can visit the shopping cart page to remove items from the cart or to complete the order and purchase the items.

Track Changes

A feature that keeps track of all changes made to a document. Track changes is especially useful when collaborating with other people.

Word Processing Document

A file created by a word processing application that contains text, images, and/or graphics.

Document

A file created with a software application, such as Microsoft Word, that can contain text, graphics, charts, images, etc.

Image File

A file that contains picture data. Common image file extensions include .jpg, .gif, and .png.

Attachment

A file that is sent along with an email.

File Explorer

A file-managing application included with Microsoft Windows. File Explorer provides a graphical interface for accessing files on a computer.

Archive

A folder for long-term email storage.

Email Folder

A folder for storing emails in Outlook. The default folder is called the Inbox.

Search Folder

A folder in Outlook that stores the results of a search. Search folders don't actually contain messages, but they do automatically update to show new messages that match the search criteria.

Boldface

A font style that makes text heavier, or darker, than the text around it.

Foreign Key (Access)

A foreign key is a column or group of columns in one table that references the primary key column of another table. The foreign key and primary key establish the relationships between tables and are used to join two tables together when using the Select statement. The values in the foreign key column(s) must exist in the primary key columns(s) that they reference or they will be NULL.

Navigation Form

A form containing other database objects, usually other forms and reports.

Column Break

A format element that stops the flow of text in one column and continues the flow of text into the next column.

Dot Leader

A formatting option in Microsoft Word that uses a line of periods, or dots, between characters and tabs to adjust the visual alignment of information in a document.

APA Format

A formatting style defined by the American Psychological Association (APA). APA format defines structure and appearance requirements for writing academic papers, articles, books, etc.

MLA Format

A formatting style defined by the Modern Language Association (MLA). MLA format defines structure and appearance requirements for writing academic papers, articles, books, etc.

SUMIF

A function that adds together all of the values in a group of numbers based on a given criteria.

COUNTIF

A function that counts the number of cells within a specified range that meets a defined criteria that is specified by the user.

IF Function

A function that evaluates a user-specified condition as either TRUE or FALSE and then returns a unique result for each outcome. For example, the Excel formula =IF(C15>100, "Over 100", "Less than 100") will display "Over 100" if the value in C15 is greater than 100 and "Less than 100" if the value is less than 100.

Internet

A global infrastructure of interconnected networks that link together computer users and devices. The Internet allows people to communicate and collaborate with anyone else around the world who has access to the Internet.

Bullet

A graphical symbol used to set apart items in a list.

Window

A graphical user interface (GUI) component that is used to view and interact with information, applications, files, and graphics on a computer screen.

Chip

A group of electronic circuits made of silicon used to create integrated circuits such as central processing units, graphics chips, or memory modules.

Styles Gallery

A group of formatting styles that can change the style of text, images, or other elements in a document.

Network

A group of two or more interconnected computer devices that can communicate and share resources with each other.

Challenge Lab

A hands-on simulation where students develop basic computer, Word, Excel, PowerPoint, and Access skills by solving real-world scenarios in a time-sensitive exercise.

Applied Lab

A hands-on simulation where students develop basic computer, Word, Excel, PowerPoint, and Access skills by solving real-world scenarios.

Hard Drive (Hard Disk Drive)

A hardware device that uses magnetic disks to store electronic data. Computers use hard drives as their main storage device and read and write data on the disks.

Disk Drive

A hardware device used by a computer to read and write data to a storage medium, such as a hard disk or CD-ROM.

Blu-ray Drive

A hardware drive that can read optical disc data stored in the Blu-ray format. Some Blu-ray drives can also write data to a Blu-ray disc.

CD-ROM Drive

A hardware drive that has the ability to read data on a compact disc. Some CD-ROM drives can also write information to a compact disc.

Workstation

A high-performance personal computer designed to run complex application software.

Windows Workstation

A high-performance personal computer that runs the Windows Server operating system.

FireWire (IEEE 1394)

A high-speed cable connection developed by Apple Inc. to connect peripheral devices to computers.

Row (Excel)

A horizontal group of cells that is defined by a number.

Technological Singularity

A hypothetical point in the future in which artificial intelligence surpasses human intelligence and leads to the end of humanity. If you're reading this, the singularity has not happened yet.

Signature

A line of text that is automatically included at the bottom of an email.

Unsubscribe Link

A link that is added to bulk email messages that, if clicked, will remove your name from an electronic mailing list so that you don't receive future emails from the online advertiser.

Bulleted List

A list of items that are set apart by bullets, rather than numbers or letters.

Numbered List

A list of items that are set apart by numbers, rather than bullets or letters. Numbered lists are typically used to list steps or sequential tasks.

Drop-down Menu/List

A list of options, typically in a vertical format. When an option is selected, the application executes the command associated with the option.

Bibliography

A list of source material that an author used while writing a paper, article, book, etc.

Clipboard

A location where cut or copied material is temporarily stored. This material can be transferred to other documents or files by using the paste command.

Lookup Field

A lookup field is a read-only field that displays a user-friendly description for another data value. For example, a lookup field could display a company's name when the user is actually working with a numeric company identification value.

Color Depth

A measure of how much memory the computer uses to display colors. Eight-bit color images use one byte of data for each pixel, whereas 24-bit images use three bytes for each pixel.

Shortcut Menu

A menu that appears when you right-click an item in Microsoft Office. Outside of Office, these are called "context menus."

Email

A message sent from a computer user to one or more recipients via an Email server.

Computer Tower

A metal case that holds the parts of a desktop computer system.

Compression

A method for reducing the size of a file. A simple compression algorithm is run-length encoding, which reduces repeated data in a file. For example, instead of storing thirty individual zeros in a binary signal, the compressed file would store the number thirty, followed by a zero.

Relative Reference

A method of identifying cells in a spreadsheet formula based on the location of the formula, and not the location of the cells. This allows the cell references to automatically adjust when they are copied to another location in the spreadsheet. For example, if the formula =SUM(C6:C10) is moved from cell C11 to cell D11, the relative references in the formula would change to =SUM(D6:D10).

Tablet

A mobile computer that uses a touch screen as its primary input method. Tablets typically have wireless capabilities and include cameras. A tablet is usually larger than a smart phone and smaller than a notebook computer.

Smart Phone

A mobile device that combines cell phone and computer capabilities, such as the ability to browse the Internet.

Iterative Design

A modern approach to systems design where small pieces of the finished product are taken through the entire SDLC, then cycling back and doing another piece.

Animation

A movement effect that can be applied to slide objects in Microsoft PowerPoint. Animations can control how objects appear, disappear, or move on a slide.

Music File

A multimedia file that is used to store and play back recorded music on a computer.

Memory Card

A non-volatile flash memory device that can be used in electric devices, such as digital cameras and mobile phones. Memory cards provide additional storage and are often used to transfer data between electronic devices and computers.

Landscape Orientation

A page format where the long edge of the page is horizontal.

Portrait Orientation

A page format where the long edge of the page is vertical.

Document View

A particular way of visualizing the data in a Microsoft Office application.

Scanner

A peripheral device that can convert paper documents and images into electronic data that can be stored on a computer.

Printer

A peripheral device that communicates with a computer and receives electronic data that is then converted into printed images, graphics, and text.

Speakers

A peripheral device that connects to a computer's sound card and creates audible sound from audio files and data.

USB Hub

A peripheral device that contains multiple USB ports in order to extend the number of USB devices that can connect to a computer. A USB hub occupies only a single port on the computer, but it allows multiple devices to use that single port.

Database Programmer

A person who creates and maintains databases.

Programmer

A person who creates or modifies computer programs with a coding language.

Database Administrator

A person who designs, creates, maintains, and interfaces with data in databases.

Administrator

A person who has the required skills, experience, and security privileges to manage a technology device, software system, or software application.

Quality Assurance Engineer

A person who identifies bugs and problems in software and makes sure they get resolved.

Troll

A person who purposely starts fights on the Internet to sow discord and cause distress.

Spammer

A person who sends unsolicited email to many people for the purpose of online advertising or phishing for personal information.

Security Analyst

A person who specializes in identifying and fixing vulnerabilities in a network.

Gamer

A person who uses computers primarily to play computer games.

Spear Phishing

A phishing attack that uses personal details about the victim to gain their trust.

Icon

A picture, image, or symbol used in a computer program or application to represent an object, command, or action.

Printer Driver

A piece of software that lets your computer communicate with a printer.

Privacy Policy

A policy that defines what kind of information can be gathered from customers as they use organizations' websites or software, and how that information can be shared and used by the organizations who collect it.

Mobile Device

A portable handheld computing device, such as a smart phone or tablet computer.

Style Set

A predefined group of formatting styles that visually complement each other when used to format a document.

Bookmark (Word)

A predefinied location in the document that can be reached by using a hyperlink.

Template

A preformatted outline that can speed up the creation of a document, presentation, spreadsheet, or database object.

Building Block

A premade element, such as a header, footer, or cover page, that can be inserted into a document.

Slide Show

A presentation option in PowerPoint that allows a presenter to display a presentation one slide at a time to an audience. The presenter can choose to manually control when a new slide displays or to have slides automatically change after a predefined length of time.

Intranet

A private network that uses Internet technologies such as email.

Graphic Artist

A professional who communicates information and ideas by using images, text, and graphics. Graphic Artists design the visual interface for websites, software, and computer applications.

Support Specialist

A professional who specializes in helping end users implement, use, and troubleshoot software.

Mobile App

A program designed to run on a mobile device with a touch-screen interface. Mobile apps are typically downloaded through an app store.

Search Engine

A program that searches for sites on the World Wide Web.

JavaScript

A programming language that is used to add interactivity to websites.

Visual Basic for Applications (VBA)

A programming language used for creating macros in Microsoft Office products.

Object-Oriented Programming

A programming technique where real-world objects are modeled into computer code.

Calculated Field

A query field that is derived by performing a calculation on another query or table field.

Crosstab Query

A query that displays data in a table with row and column headers.

Action Query

A query that modifies the information stored in a table.

Browsing History

A record of the web pages a user has visited, as well as data associated with the visit.

Type A Connector

A rectangular USB connector that plugs into a computer, USB host, or hub.

Table (Access)

A relational database object that stores information in rows and columns. Each column contains attributes of the information being stored. For example, in a database table containing employee information, columns could be created for the employee's first name, last name, job, and salary. Each employee in the employee table would be represented by one row.

Primary Key

A relational database table column or set of columns that uniquely identify each row (record) in a table.

Filter

A restriction that is applied during computer processing. Filters are used in computer security to restrict access to objects based on permissions. Filters are used in database queries to restrict the records that they return. Filters are used in computations to exclude certain values from being included in the computational process.

Total Row

A row at the end of an Excel table that displays the results of the various formulas that are applied to data within each column in the table.

Pharming

A scam that directs users to a fraudulent, malicious website that mimics a legitimate one.

Firewall

A security instrument that controls network communication and user access to computers and networks. Firewalls can be either software or hardware based.

Print Area (Excel)

A selection of cells in a spreadsheet that are printed by default, instead of the entire spreadsheet. The print area can be set on the Page Layout tab.

Transistor

A semiconductor computer part with three connections.

Pane

A separate area of a window that contains tools and features that aid in object creation and manipulation. Typically, panes appear vertically next to the main content of a window.

Quick Step

A series of actions that can be executed all at once.

Database Server

A server that stores database information.

Gaming Server

A server that transmits and receives information, such as player inputs, that are necessary to play a video game.

Windows Update

A service included with Windows operating systems that automatically searches for and installs important system updates.

Instant Messaging

A service where one user can type a message and another user immediately receives it. Also called chat.

Contact Group

A set of Outlook contacts that you can email all at once.

Formula (Excel)

A set of calculations that are applied to values in a spreadsheet. Formulas range from simple mathematical operations to complex statistical calculations.

Security Zones

A setting in Internet Explorer where you can choose how secure you want your browsing to be.

Bluetooth

A short-range wireless specification for connecting various electronic devices.

WordPad

A simple document editing software included with the Microsoft Windows operating system.

Microsoft Paint

A simple graphics editing application included with the Microsoft Windows operating system.

Bit

A single 0 or 1 in a digital signal.

Field

A single collection of data that is at least one byte in size. Fields are used to store information in forms, spreadsheets, files, and databases. Examples of fields include EMPLOYEE FIRST NAME, EMPLOYEE LAST NAME, SALARY, and ADDRESS.

Excel Worksheet

A single page of cells in an Excel Workbook file. Worksheets contain data that can be used to create functions, calculations, and charts.

Custom Slideshow

A slideshow that shows only some of the slides in a presentation.

USB Flash Drive

A small flash drive that plugs into the USB port of a computer. (Also referred to as a thumb drive.)

ScreenTip

A small message that appears when you hover over a button in Microsoft Office.

Microchip

A small piece of semiconducting material that holds the parts of an integrated circuit.

Dialog Box

A small pop-up window where you can configure settings or choose from various options.

Footer

A small section at the bottom of each page in a document where information can be added. Typically, the page number, current date, or company information is added to the footer.

Header

A small section at the top of each page in a document where information can be added. Typically, the page number, current date, or author name is added to the header.

First-Party Cookie

A small text file that a website sends to a web browser to store on a user's computer. A first-party cookie is sent from the same website that the user is visiting.

Third-Party Cookie

A small text file that a website sends to a web browser to store on a user's computer. A third-party cookie is sent from a website other than the one the user is visiting.

Cookie

A small text file that a website sends to a web browser to store on a user's computer. The cookie contains information about the user's previous browsing sessions on the website, which the website accesses the next time the user visits.

Mini Toolbar

A small toolbar that appears above selected text in some Microsoft Office applications.

Notebook Computer

A small, lightweight computer with a clam-shape design that functions as a portable computer. There are small distinctions between notebook computers and laptop computers, but they are essentially synonymous terms.

Flash Drive

A small, portable storage device that uses flash memory to store information. Typically, flash drives connect to computers through a USB port.

Micro USB Connector

A smaller USB connector that is designed to connect with mobile and small computing devices, such as tablets and smart phones.

Mini USB Connector

A smaller USB connector that is designed to connect with small computing devices, such as digital cameras and portable hard drives.

Restore Point

A snapshot of the file system at a specific point in time. Restore points are created by the Windows System Restore tool and can be used to restore a computer system and user data to how they were at the latest restore point.

Social Validation

A social engineering technique that uses peer pressure to coerce a victim into bending rules or revealing information that they shouldn't.

Pretexting

A social engineering technique where a perpetrator pretends to be someone else, or sets up a misleading situation, in order to obtain information that can be used for accessing computer assets and data for fraudulent purposes.

Shoulder Surfing

A social engineering technique where a threat agent looks over people's shoulders while they use a computer, in order to obtain material that can be used to compromise computer and network security. For example, the threat agent could look at key strokes while someone types in login credentials.

Eavesdropping

A social engineering technique where threat agents listen to other people's conversations in order to find information that they can use to compromise computer and network security.

Dumpster Diving

A social engineering technique where threat agents look through a target's trash in order to find information that can be used to compromise computer and network security.

Productivity Application

A software application designed to increase a user's work efficiency. Examples of productivity applications are Microsoft Word, Excel, PowerPoint, and Access.

Web Browser

A software application that processes HTML web pages so that a user can interact with websites. Common web browsers include Chrome, Internet Explorer, Safari, and Firefox.

Desktop Email Client

A software application that runs on a desktop or laptop computer that organizes, sends, and receives email (e.g., Microsoft Outlook, Mozilla Thunderbird).

AutoFit

A software feature that automatically adjusts the width and height of a column, row, cell, or header.

AutoCorrect

A software feature that automatically corrects perceived errors in user input.

AVERAGEIF (Excel)

A software function that calculates the average value of a group of numbers based on a given criteria.

Application

A software program that performs a specific function for a user. For example, Microsoft Excel is an application that is used to create spreadsheets and perform calculations.

Primary Source

A source that provides a firsthand account of something. Primary sources include original speeches, letters, poems, laws, scientific fieldwork, and artwork.

Email Server

A special computer system dedicated to receiving, storing, and forwarding email on a network.

Type B Connector

A square USB connector that is used with a detachable cable. The square USB connector is designed to connect to a printer or scanner. The other end of the detachable cable uses a Type A connector, which is plugged into the computer.

Universal Serial Bus (USB)

A standard that specifies cables, connectors, communication protocols, and power supply requirements for the connections between computers and computing devices.

Network Drive

A storage device, typically a hard drive, that is connected to a network and that allows multiple users, computers, applications, and computing devices to read from and write to it.

Live Stream

A stream, such as a video call, where data is streamed as it happens in real time.

Ribbon Group

A subclassification of features within a Ribbon tab.

Abstract

A summary of the main ideas of a paper, report, book, etc.

Host-based Firewall

A system for preventing malicious software and users from accessing an individual computer.

Network Firewall

A system for preventing malicious software and users from accessing the computers on a network.

World Wide Web

A system on the Internet where documents can be shared and viewed in a web browser.

Network Location Awareness

A system where devices can determine whether they are connected to a public or private network, allowing them to alter their security settings.

Contextual Tab

A tab that is only available when a certain kind of data, such as an image, is selected.

WiFi

A technology that allows devices to connect to the Internet wirelessly.

Application Parts

A template that can be used to create or extend a database object.

Web Browser Cache

A temporary storage area that contains a record of the websites visited by a user and the associated website data stored by the browser. While the cache helps your browser load previously-visited pages faster, clearing the browser cache is a good troubleshooting step if a browser-based app isn't working correctly.

Word Wrapping (Text Wrapping)

A text option that automatically breaks text to the next line when it reaches the boundaries of a field, table column, or cell.

Search Box

A text-entry box that is used to search for and find information related to a word or phrase.

Thesaurus

A tool in Microsoft Office applications for finding multiple synonyms for a word.

Spelling and Grammar Checker

A tool in Microsoft Office applications that identifies and corrects misspelled words and grammatical mistakes.

Word Art

A tool in Microsoft Word that adds various text effects, such as outlines, shadows, and colors.

Scheduling Assistant

A tool in Outlook for finding an available time slot where several people are free to attend a meeting.

Wizard

A tool that assists a computer user in completing a specific task by guiding the user through each step.

Ruler

A tool used by Microsoft Office applications to align text, tables, graphics, indents, and margins in a document.

Crop

A tool used to remove the outer section of an image in order to improve image framing or to highlight the subject of the image.

Quick Access Toolbar

A toolbar at the top-left of a Microsoft application where commonly-used commands can be executed.

NoSQL

A type of database that does not use SQL. NoSQL databases are generally better for unstructured data, such as big data.

Virus

A type of malware that copies itself to other computer programs and files and then executes malicious activities, such as erasing files or logging user input.

Persistent Storage

A type of non-volatile storage device that retains information that has been stored on it, even after the computer is turned off and the persistent storage device loses power.

Inkjet Printer

A type of printer that uses inkjets and magnetized plates to spray ink directly onto paper to create printed text and images.

Laser Printer

A type of printer that uses toner and a laser to print images and text. The laser electrostatically charges a drum which then attracts toner in the shape of the text and images. The toner is then transferred to the paper using heat.

Username

A unique name used to authenticate a person to a computer, network, application, website, etc. Typically, usernames are used in conjunction with passwords to ensure that only authorized individuals have access to secure assets and information.

Macro

A user-defined program that can be used to automate repetitive tasks.

Webcam

A video camera that connects to a computer and is able to broadcast video on the Internet. Webcams connect to a computer through a USB connection, or they are included in the screen/monitor of the desktop, laptop, tablet, or smart phone.

On-Demand Stream

A video or audio file that can be streamed at any time.

Datasheet View

A view in Microsoft Access that displays data contained in certain database objects, in tabular form. The datasheet view is available for database objects, such as tables, queries, and forms.

Design View

A view in Microsoft Access where you can create new database objects, update existing database objects, create tables, and add fields to tables.

Form View (Access)

A view that allows the user to select, insert, update, and delete data in a database table.

Chart

A visual representation of a particular data set. Types of visual representations include bar charts, pie charts, line charts, etc.

Analog

A way of recording data that directly represents or reproduces something in the real world. For example, a sound wave recorded onto a vinyl disc is an analog storage method.

Digital

A way of representing data as a string of 1s and 0s.

Programming Language

A way to give specific, line-by-line instructions to a computer to tell it what to do. Common programming languages include Java, C#, and C++.

Go To

A way to quickly navigate to a certain page, heading, or bookmark in a document.

Split Window

A way to view two parts of a large document at the same time.

Chrome

A web browser created by Google that was built on the open-source Chromium project web browser.

Internet Explorer

A web browser created by Microsoft that is included with the Windows operating system.

Discussion Board

A website where people can discuss various topics by posting messages. Typically, each conversation topic is a top-level post, and discussions happen as replies to the original post.

Forum

A website where people can discuss various topics by posting messages. Typically, each conversation topic is a top-level post, and discussions happen as replies to the original post.

Task Pane

A window that appears to the right side of an Office application, where you can configure settings for specific features in a document.

Pop-up Window

A window that appears when a user performs a certain action, such as pressing a function key, clicking the mouse, or hovering over an area. A window appears that typically contains additional options or is used to input additional information.

WPA2-Personal

A wireless security access protocol designed to protect wireless networks from unauthorized access.

Formula Bar (Excel)

A workbook tool directly above the spreadsheet cells. The Formula Bar displays the contents of the active cell. You can use the Formula Bar to enter or update the value or formula contained in the active cell.

AutoSum (Excel

Access) , A software function that automatically performs addition on a group of numbers.

Average (Excel

Access) , A software function that calculates the average value of a group of numbers.

AutoFill (Excel

Access) , A software tool that automatically inserts data into a column, row, cell, or form.

Count (Excel

Access) , In Microsoft Excel, Count is a function that counts the number of cells within a range of cells. In Microsoft Access, Count is a function that counts the number of rows returned in a query.

Footnote

Additional information (e.g., notes, explanation, comments, or citations) placed in the footer of a page in a document.

Endnote

Additional information, (e.g., notes, explanations, comments, citations) placed at the end of a document.

AES

Advanced Encryption Standard (AES) is a symmetric 128-bit block encryption technique.

Texting

Also called Short Message Service (SMS). Service that provides quick exchange of short messages that is provided through a cellular carrier instead of the Internet. Texting is typically done on cell phones.

Theme Variant

Alterations that can be applied to a theme. Variant options allow you to change color, fonts, effects, and background styles for each theme.

AC Power

Alternating current (AC) is the type of electric power distributed to businesses and residences.

Excel Workbook

An Excel file that contains individual worksheets.

CONCATENATE

An Excel function that is used to combine text strings from multiple cells together. In current versions of Excel, CONCATENATE has been replaced with the CONCAT function, which can accept a range of cells as an argument.

VLOOKUP

An Excel function that is used to look up information from a vertical list.

Internet Zone

An Internet Explorer security feature that defines the security settings for websites.

Trusted Site

An Internet Explorer security setting that allows a user to identify trusted websites.

Social Media

An Internet application where users create a personal profile and share information with each other.

Recurrence

An Outlook calendar item such as a weekly meeting that is repeated on multiple days. Outlook allows recurring items to be scheduled all at once.

Shared Calendar

An Outlook calendar that can be viewed by more than one person.

Contact

An Outlook contact is a way to store a person's information, such as email address and phone number.

Note

An Outlook feature similar to a sticky note. Notes keep snippets of information and display them on the screen

Pop-up Advertisement

An advertisement that appears in a pop-up window when a certain action takes place, such as a mouse click or mouse over on a website.

Motion Path Animation

An animation effect in PowerPoint that is applied when an object moves on a slide.

Entrance Animation

An animation effect in PowerPoint that is applied when the object first appears on a slide.

Exit Animation

An animation effect in PowerPoint that is applied when the object leaves a slide.

Status Bar

An area at the bottom of the screen in Microsoft Office applications and the Windows operating system that displays information about the current document or program.

Cache

An area of memory where the operating system or application software stores recently used information for quick access. The process of caching data improves the performance of software applications when subsequent retrieval of the same data is needed. See Web Browser Cache.

Browser Window

An area of the browser where users can view the information and graphics contained on web pages.

Quick Launch Area

An area on the taskbar where shortcuts to frequently used programs can be pinned for quick access.

Chart sheet

An area separate from the Excel worksheet, where charts are created and stored. The chart sheet is identified by a tab near the bottom of the screen.

Integrated Circuit

An electronic circuit on a small piece of semiconducting material, which does the same thing as a large circuit made from separate components.

Computer

An electronic device that stores and processes data and can run software and applications, such as Microsoft Word, Excel, PowerPoint, and Access.

Security Certificate

An electronic file provided by a third-party verification organization. It is stored on a website and proves the identity and authenticity of a website. Types of security certificates include digital certificates and public key certificates.

Video Game

An electronic game that can be played on a computer, smartphone, or mobile device. Typically, electronic games are action-oriented and require the player to respond to visual cues.

Video File

An electronic multimedia file that contains video and audio information stored in a digital format.

Page Break

An element inserted into a document that starts a new page. A page break signals to a printer where one page ends and the next begins.

Scroll Bar

An element on the side or bottom of a window that is used to control which part of the window is currently in view. The scroll bar contains a scroll box and scroll arrows, which are used for navigation.

Section Break

An element that separates two different sections of a document. Long documents can be divided into sections to increase document readability. Text formatting can also change between sections to improve the format, flow, and readability of the document.

Malicious Attachment

An email attachment that contains a virus or other malware.

Conversation

An email that has been replied to multiple times in a long chain.

Civility

An ethical principle that says one should observe the rules of "netiquette" and treat others politely.

Digital Property Rights

An ethical principle that says one should refuse to violate the intellectual property rights of others.

Fair Use

An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public. Such uses include criticism, teaching, research, and news reporting.

Cell Formula

An expression in a cell that tells Excel to perform a calculation and return the calculated value.

Peripheral Device

An external device that connects to a computer in order to provide additional functions and capabilities. Examples of peripheral devices include mice, keyboards, graphics cards, and speakers.

Command Button

An icon that, when clicked, executes a function or applies a setting.

File Extension

An identifier at the end of a file name that indicates its format and the program used to create and open it. File extensions are separated from the file name by a period (e.g., .docx, .pdf, .html, .txt, .mdb, .kls).

Cursor

An indicator that identifies where the next character that is typed will be displayed and the current screen location of the mouse pointer.

Cyber Criminal

An individual who uses computers, technology, and the Internet to commit crime.

Keyboard

An input device used to enter data into a computer. Desktop computers primarily use hardware keyboards, while handheld or mobile devices use on-screen or software keyboards.

Command

An instruction from a user that causes a computer to perform a specific task or action.

Central Processing Unit (CPU)

An integrated circuit that processes instructions from the operating system, applications, and software programs. The CPU is the main processing unit of a computer and coordinates all processing that takes place.

Check Box

An interface control element used to select or deselect an option or setting.

USB Port

An interface port that uses USB technology to connect peripheral and computing devices to a computer.

Task

An item in Outlook's to-do list.

Form (Access)

An object that is designed for users to input information. Forms contain fields, user prompts, and other features that make entering information easier and more efficient.

Encapsulation

An object-oriented programming principle that restricts outside access to values in a class.

Waterfall Model

An older development model that divides the SDLC into a series of linear phases.

Banner Ad

An online advertisement on a web page that is designed to entice visitors to go to the advertiser's website.

Linux

An open-source operating system that was designed using the UNIX operating system model.

Firefox

An open-source web browser created by Mozilla.

Memory Card Slot

An opening on an electronic device where a memory card can be inserted. Memory card slots are found on mobile devices, smart phones, cameras, and most desktop and laptop computers.

iOS

An operating system created by Apple Inc. for mobile devices.

Android

An operating system designed to run on mobile and touchscreen devices.

OS X

An operating system developed by Apple Inc. to run on Mac computers.

Microsoft Windows 10

An operating system developed by Microsoft in 2015.

Windows RT

An operating system developed by Microsoft that is designed to run on touch screen tablets and computers.

Mobile Operating System

An operating system for mobile devices. Common mobile operating systems include Android and iOS.

Microsoft Windows 7

An operating system released by Microsoft in 2009. Microsoft Windows Version 7 was preceded by Windows Vista and succeeded by Windows 8.

Microsoft Windows 8

An operating system released by Microsoft in 2012. Microsoft Windows Version 8 was preceded by Windows 7 and succeeded by Windows 10.

DVD

An optical disc format used to store computer data and video.

Style

An option that is used to define text formatting and provide consistency throughout an entire document.

Junk Mail

An unwanted, unsolicited email. Junk Mail includes advertisements, cyberattacks, and scams.

Emphasis Animation

Animation that draws attention to specific objects, information, or ideas in a PowerPoint slide.

Meeting

Any Outlook calendar item that is shared with another person becomes a meeting.

Computing Devices

Any component that connects to a computer to add additional functionality. Examples of computing devices include keyboards, mice, disk drives, printers, and monitors.

Flash Storage

Any data storage device that uses flash memory to store electronic information.

Calendar Item

Any event on an Outlook calendar. Appointments and meetings are both calendar items.

Threat Agent

Any individual that poses a threat to a company or organization. Threat agents can act intentionally (e.g., a hacker trying to gain access to a server) or unintentionally (e.g., an inexperienced user that divulges sensitive information through a phishing scam).

Proprietary Software

Any software in which the publisher retains intellectual property rights to use the source code.

Intellectual Property

Anything that is owned by a copyright holder. Books, paintings, songs, poems, and movies can all be intellectual property.

Word Processing Software

Applications used to create, modify, and format documents containing text, images, and/or graphics.

Sort

Arranging data based on its alphabetical or numerical order. Sorts can be in ascending or descending order.

Big Data Analytics

Asking specific questions to help interpret big data, and building models from the data to help answer them.

Notepad

Basic text editing software that is included with the Microsoft Windows operating system.

Macro Security

Because malicious users can program viruses or spyware into a macro, most macros are disabled by default and must be enabled by the user.

Secondary Source

Books or articles that review, analyze, or describe primary sources.

Update

Bug fixes and feature upgrades that are offered periodically from developers, which keep your systems and programs current.

Video Connections

Cables and connectors that connect electronic video devices to computers, TVs, projectors, and monitors. Typical connector types are HDMI and VGA.

CSS

Cascading Style Sheets. A computer language that is used to give websites visual style.

Text Functions

Excel functions that manipulate text. Examples included CONCATENATE, UPPER, and LOWER.

Format Painter (Word

Excel) , A feature that applies a document style or format that is used in one section of the document to another section of the document.

Sum (Access

Excel) , A function that adds together all of the values in a group of numbers.

Report Wizard (Access

Excel) , A tool that assists computer users with creating reports by guiding them through report design and build steps.

Border (Word

Excel, PowerPoint) , Used to add emphasis, decoration, or context-sensitive meaning to an object within a document, spreadsheet, or presentation.

Big Data

Extremely large sets of data that, when analyzed, can reveal patterns and trends.

Accessibility

Features, such as alternative text for screen readers, that make documents available to people with disabilities.

FTP

File Transfer Protocol. A way to share files from one computer to another on a network.

Program Files

Files that are associated with specific programs. These files typically contain program instructions or settings.

Artistic Effects

Filters that make a picture look like a sketch, drawing, or painting.

Query Parameters

Filters that narrow down the results of a query.

Report

Formatted and organized information that creates a visualization of data that can be used for analysis and decision making.

Metadata

Information about the document, such as the author, date created, and file size.

Citation Source

Information about the documents, papers, articles, books, etc., that are the sources of quotes or ideas in an academic paper.

ICT Industry

Information and Communications Technology. The industry that specializes in building, maintaining, and running of computer networks, telephone lines, and other technology.

Database

Information organized in a central location or file so a computer can efficiently insert, update, delete, retrieve, and process it.

Table

Information organized in rows and columns.

Data

Information that is created by or stored on a computer.

User Profile

Information that is specific to a user. The user profile can be used to customize the application environment based on the individual preferences of the user.

Memory

Integrated circuits used to store computer data, user data, and program data during computer processing. There are two general classifications of computer memory: volatile memory and non-volatile memory. Volatile memory is erased whenever power is lost. Random-access memory (RAM) is an example of volatile memory. Non-volatile memory retains stored data even when power is lost. Read-only memory (ROM) is an example of non-volatile memory.

Video Port

Interface port on a computer or computing device used to connect it to a monitor or to a television. Typical connector types include VGA, HDMI, and DisplayPort.

IP Address

Internet Protocol address. A unique set of numbers that identifies a computer on the Internet.

ISP

Internet Service Provider. A company that provides its customers with access to the internet.

Horizontal Alignment

Layout options that define how objects are aligned horizontally. For example, objects can be aligned to the left, right, or center of a document or container.

Vertical Alignment

Layout options that define how objects are aligned vertically. For example, objects can be aligned to the top, bottom, or middle of a document or container.

Pseudocode

Line-by-line instructions written in regular language. Pseudocode is sometimes used by developers to plot how a program should work before they begin coding.

Borders

Lines that are placed around text, paragraphs, cells, tables, etc., for emphasis or decoration.

Tab Stop

Locations on each line of a Word document where the cursor stops when the Tab key is pressed.

Pin (Microsoft Office Ribbon)

Making the Ribbon permanently visible in Microsoft Office applications. Unpinning the Ribbon hides it from view.

Text Highlighting

Marking text to make it stand out from the text around it.

Frame Rate

Measures how many individual images are shown in a video each second. A typical movie has a frame rate of 24 fps (frames per second).

Resolution

Measures how many pixels tall and wide a digital image is. Resolution applies both to individual images and videos.

Pin (Start menu and Taskbar)

Moving a program to a permanent location in either the Start menu or the Taskbar for easier access.

Power Strip

Several electrical sockets attached to a cord and plug. The power strip plugs into an electrical outlet, and electronic devices can be plugged into the power strip, providing additional outlets and power fluctuation protection.

Video Call

Similar to a telephone call, but with live video feed. Video calls send data over the Internet and use VoIP (Voice over Internet Protocol).

Microsoft PowerPoint

Software developed by Microsoft that is used to create and display slideshow presentations.

Microsoft Word

Software developed by Microsoft that is used to create and edit text documents.

Microsoft Access

Software developed by Microsoft that is used to create and manage relational databases.

Microsoft Windows Media Player

Software developed by Microsoft that is used to manage and play multimedia files, such as video and audio files.

Software Update

Software features, functions, or bug fixes that are added to an operating system or software application. Typically, software updates result in new versions of the operating system or software application.

Expert System

Software programmed using artifical intelligence techniques or technology.

Security Measures

Software programs, operating system options, policies, and procedures that an organization implements to secure its computer assets and information.

Utility Software

Software that analyzes, configures, and optimizes the computer.

Open-Source Software

Software that anyone can inspect, enhance, and modify the source code.

Anti-malware Software

Software that detects and removes malicious computer programs that are designed to gain unauthorized access to computer systems and information.

Antivirus Software

Software that detects, quarantines, and deletes computer files that have been infected with computer viruses.

Anti-spam Software

Software that detects, quarantines, and deletes unsolicited emails.

Adware

Software that displays advertisements on a user's computer.

Software as a Service (SaaS)

Software that requires users to pay a monthly subscription fee.

Driver

Software used by a computer operating system to communicate with and operate computer hardware, such as printers, scanners, and hard drives.

Information System

Software, people, and procedures that help an organization to manage and analyze data.

Tertiary Source

Source that compiles or summarizes material from other sources. Indexes, encyclopedias, bibliographies, and databases can all be tertiary sources.

Consumer-Level Source

Sources that are not written or peer-reviewed by experts. They are often published on personal websites, online forums, news websites, or online magazines.

Microsoft Excel

Spreadsheet software developed by Microsoft that is used to create and manage spreadsheets.

SIM Card

Stands for Subscriber Identity Module. A small chip that gives a mobile phone a unique customer ID, phone number, and authentication codes.

Next Page Section Break

Starts a new section on the next page of a document in Microsoft Word.

Social Engineering

Techniques used by threat agents to obtain personal information that can be used to access secure data and computer assets or to circumvent security policies and procedures.

Screen Sharing

Technology that lets users transmit their computer screens to each other.

Caption

Text that describes an image or table.

Backstage View

The File menu of Microsoft Office applications opens the backstage view, where you can set document-level properties.

Network Profile

The Network Profile controls the privacy level of a computer on a network. For example, if you use your laptop in a public area like an airport, your network profile should prevent other users on the network from accessing your files.

Natural Language Processing

The ability of a computer to recognize and understand human speech.

Line Spacing

The amount of vertical space between lines of text within the same paragraph in a document.

Paragraph Spacing

The amount of vertical space between one paragraph and another paragraph in a document.

Navigation Bar

The area at the bottom-left of the Outlook screen where you can choose between the Mail, Calendar, and People views.

Ribbon

The area at the top of Microsoft Office applications where you can access the programs' features.


Set pelajaran terkait

Chapter 10 - Florida Laws and Rules Pertinent to Insurance

View Set

Laylah Daniels Key Terms Chapter 6 Vegetables

View Set