Final Exam CGS
CPU (Central Processing Unit)
(Or microprocessor) The main processor of a computer. It is responsible for organizing and carrying out instructions to produce desired output. Also nicknamed "the brain" of the computer. (Intel core i3)
Memory Cards
(Tiny and flat) Are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames. (type of solid state storage)
Hub
A basic network device that provides multiple port for connecting nodes.
Office suite
A bundle of programs that help businesses efficiently carry out tasks such as writing letters, analyzing sales figures, and scheduling meetings.
Presentation
A category of software that enables users to create electronic slideshows that are used to present information. (Example: Powerpoint)
Wikis
A collaborative information site, such as Wikipedia, that relies on the internet community to both create and edit content.
Router
A complex device that stores the routing information for networks. It looks at each packet's header to determine where the packet should go, then determines the best route for the packet to take toward its destination.
Acceptable Use Policy (AUP)
A document containing an organization's policies for ethical, secure, and appropriate use of computing resources.
Copyright Law
A federal law that gives software creators a variety of rights and privileges over their creative work.
Word: Theme
A group of formatting options that is applied to an entire Word document. (font, color, and effect styles that are applied to text, tables, graphics, and other elements int he document)
Volume Licence
A license that allows companies to install software on multiple machines.
Frequently Asked Questions (FAQ)
A list of common questions and their responses on a website.
Distributed Denial-of-Service (DDoS)
A network attack that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.
Switch
A network device that is similar to hub, but it is aware of the exact address or identify of all the nodes attached to it, thereby increasing the efficiency of the network.
3D printers
A printer that can create a 3-dimensional object made of various materials. (example: phone cases)
Trojan horse
A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Microblogging Services
A short-form blog where users share brief thoughts, links, and multimedia. (Services: Tumblr & Twitter)
Bluetooth
A short-range wireless technology used in devices such as hands-free systems.
Cookies
A small data file created by a web browser that remembers your preferences for a specific website and is one of the most misunderstood features of the web.
USB flash drive
A small storage stick that plugs into a USB port. (type of solid state storage device)
Shareware/Trial Software
A software license that is free to download and install but will stop working after 30 days unless the user purchases the software.
Virtual Private Network (VPN)
A type of connection that increases the security of network communication by employing a method called "tunneling," whereby each packet from the sending computer is encapsulated within another packet.
Open Source
A type of licence that permits the source code to be freely distributed and modified. (GNU {General Public License}: one of the most famous open source license remains free to distribute)
IP Address
A unique set of numbers and/or letters that uniquely identifies every computer or device on the internet.
Blog
A web page or small website that contains a series of chronological posts and comments.
NFC (near field communication)
A wireless technology that lets your mobile device communicate over very short distances, such as when paying for goods on wireless payment devices.
Business Accounting, Personal Finance, and Tax Preparation.
Accounting Software has three forms of managing your finance-related tasks in which are
Piracy
Acquiring or exchanging copies of protected digital creations without payment or permission from the creator.
Overview: Smart Lookup Tool
Allows you to quickly search the Internet about any word or phrase in a document, spreadsheet, or presentation.
Monitor
An electronic display device, or screen, used to output text and graphics to the user.
Fair Use
An exception to copyright law that provides for a limited set of circumstances where other can use copyrighted material without first obtaining permission.
Freeware
Any software that is free to use without any specified time restrictions. Although it is free it is still protected by a licence and by copyright law.
Biotechnology
Application of biology that uses living organisms to manufacture new products or improve existing ones.
Kilobyte (KB)
Approximate value: 1,000 Actual value(bytes): 1,024
Terabytes (TB)
Approximate value: 1,000 GB Actual value(bytes): 1,099,511,627,776
Megabyte (MB)
Approximate value: 1,000 KB Actual value(bytes); 1,048,576
Gigabyte (GB)
Approximate value: 1,000 MB Actual value(bytes): 1,073,741,824
Search Engine
Are sophisticated services that store URLs of millions of web pages and most of the content on those pages. (Google)
BCC (email parts)
Blind carbon copy, will be invisible to the recipients of your message.
Overview: Backstage View
Clicking the File Tab opens Backstage view, where you can access the commands for managing and protecting your files, including Save, Open, Close, New, Print, and Share.
Word: Styles
Complex formatting, including font, color, size, and spacing, that can be applied to text. Use consistent styles for headings, body text, notes, and captions throughout your document. Can also be applied to tables and graphics.
LAN (local area network)
Data communication system consisting of multiple devices that are relatively near each other and physically connected using cables or wireless media.
Unix
Dates 1969, runs many of the worlds most powerful servers. (uses a command-line interaface)
operating systems
Exists primarily to help the computer run and manage its resources .(Such as Windows or Mac OS) A software that manages the flow of data between hardware components and allows the user to communicate with the computer.
Network Bandwidth
In networks, it refers to the amount of data that can be transmitted over a given amount of time.
Business Accounting Software examples
Intuit Quickbooks, Sage 50 Accounting, Xero (cloud based)
Personal Finance Software examples
Intuit Quicken and YNAB (Desktop & Mobile), Mint (most popular cloud based software)
Tax Preparation Software examples
Intuit TurboTax & H&R Block ( most popular desktop programs)
Nanotechnology
Involves the creation of manipulation of matter at the smallest possible scale.
Artificial Intelligence (AI)
Involves the development of intelligent systems or machines that posses capabilities such as learning, problem-solving, and communication.
Database
Is simply an organized method to store information. (Example: Access)
Overview: Mini Toolbar
It appears to the upper right of text that is selected. A small toolbar containing frequently used formatting commands that displays as a result of selecting text or objects.
Overview: Protected View
It provides a red-only format that protects your computer from becoming infected with a virus or other malware.
Overview: File Properties
It provides information about a file such as the location of the file, the size of the file, when the file was created and when it was last modified, the title, and the author.
Overview: Keyboard Shortcuts
Keys or combinations of keys that you press to execute a command. They run across the top of the keyboard. (F keys or functions) or (Ctrl+F = Find)
Overview: The Ribbon
Located above the address bar. It is divided into tabs that contain buttons for various commands for working with files and folders.
Overview: Quick Access Toolbar
Located in the upper left corner of the File Explorer window. It gives you one-click access to common commands.
Phishing
Luring individuals into entering personal information into the website controlled by a hacker.
Overview: Account Page
Microsoft account you use when installing Office. You can view your Microsoft user profile, switch between user accounts, view your product information, and connect to online services, such as Twitter and YouTube.
Overview: OneDrive
Microsoft's free cloud storage where you can save documents, workbooks, presentations, videos, pictures, and other files and access those files from any computer or share the files with others.
Android
Open source operating system. Owned by Google and manages the google play to store apps , allowing any manufacturer to use and modify this operating system for their devices, example: Samsung, Motorola, and HTC.
Linux
Open source, Unix-like operating system created by Linus Torvalds in 1991. (contributing modifications and enhancements)
iOS
Operating system powers Apple's iPhone and iPad. (Considered to be a very friendly and stable operating system, largely due to Apple's tight control of the hardware and software ecosystem.)
Software
Refers to one or more of these programs (computer programming language C++,Java & Visual Basic) that are packaged together for a unified purpose.
Biometrics
Refers to the measurement of patterns or characteristics found in the human body. (facial recognition is a biometric technology)
Screen resolution
Refers to the number of pixels that it can display on the screen.
Solid State Storage
Relies on a special kind of flash memory chip to permanently store data.
Computer program
Set of instructions that directs the computer to perform a variety of tasks.
Social Networking
Sites that are used to create connections between friends, family members, and organizations,thereby allowing individuals to share information and receive updates from those in their social circles.
Web browser
Software that helps you find and retrieve a web page that you are interested in viewing.
PIM Software (personal information manager)
Software that is designed to keep individuals organized via the management of contacts, appointments, to-do lists, and email. (Example: Outlook)
Word Processing
Software that provides tools for creating, editing, and formatting all kinds of text-based documents.(Example: Microsoft Word)
Spreadsheet
Software used for entering, calculating, and analyzing sets of numbers. This software is also used for creating charts. (Example: Excel)
Word: Header
Text that appears at the top of every page in a document.
Storage
The ability of a computer to hold or remember the information it processes.
Processing
The ability of a computer to perform actions based on instructions from the user or a program.
cloud computing
The ability to store your files and use various applications in an online account.
Cloud storage
The ability to store your files online and access them from any Internet-connected device.
Whistleblowing
The act of alerting the public about harmful activities that are being hidden by an organization.
WAN (wide area network)
The connection of two or more central computers or LANs, generally across a wide geographical area.
Supercomputers
The largest and most powerful computers in the world. (Can link hundreds of thousands of processors)
Internet
The largest network in the world, it connects billions of people and organizations.
WiFi
The most popular standard for wireless networking also known as "802.11"
Hardware
The physical devices that makeup a computer system. (Processors, monitors and keyboard)
Domain Name
The portion of the URL that uniquely identifies a site and a brand on the web. (apple.com, layalimiami.com)
Hard Drive
The primary storage of a personal computer.
Compression (file compression)
The process of making a file smaller than its original size. (squeezing more than one file into a smaller compressed file)
Encryption
The process of scrambling your date storage devices to make them unreadable by anyone who doesn't have the proper key(password, pin, or card)
CC (email parts)
The section knows as cc, or carbon copy, is used to send a copy of your message to individuals other than your primary recipient.
Byte
The unit of a memory or storage that represents eight bits. It is the amount of space required to store a single character, such as a letter or number.
To (email parts)
This contains the email address of the primary recipients.
Virus
Type of malware that is attached to a host file and has the ability to replicate, or copy itself.
Spyware
Type of malware that reposts activity on your computer to another party.
Worm
Type of malware that self-replicates and spread through computers and networks.
RAM (random access memory)
Type of memory that temporarily stores the data and programs that a computer is currently using. (temporary workspace)
Virtual Reality
Where humans can experience realistic environments that are simulated by computers.
Augmented Reality
Where the real world is supplemented with computer generated information.
World Wide Web (WWW)
a global system of linked, hypertext documents known as web pages.
Output
refers to the processed results that a computer sends out to you.
Input
refers to user entries or activities that tell the computer what to do.