Computer Apps Exam 2
False
A DSL connection is faster than a dial-up Internet connection or a cable Internet connection. True or False
False
The terms portable Internet access and mobile Internet access are interchangeable. True or False
thesaurus
a book of synonyms
power failure
a complete loss of power to the computer system, usually caused by something over which you have no control
software pirate
a person who goes around copyright law and illegally copies, distributes, or modifies software
restore point
a snapshot of your computer settings
synonym
a word similar in meaning
ctrl shift a
all capital letters
once
amount of times you press the spacebar after periods, colons, and other punctuation marks
software
antivirus software
body copy
between the headline and the signature line
comma style
causes the cells to be displayed with two decimal places and commas as thousands separator
ctrl e
center paragraph
organizational structure
client/server, peer-to-peer (p2p)
numbers, text, images
data can include these three things
bittorrent
distributes files using scattered slients
chip
electronic circuit
productivity software/office productivity software
generally defined as the software that allows you to be productive in an office setting
automatically updated properties
includes file system properties, such as the date you create or change a file, and statistics, such as the file size
ctrl enter
insert a page break
transparency
measurement of how much you can see through the backgroud
peripheral device
media player
activities an operating system coordinates
memory, storage devices, and printers
MLA
modern language association of america-no title page and page number with last name of author preceding in the header
equal sign
must precede all formula to alert Excel that you are entering a formula or function and not text
100
number of actions Excel can undo
indirect circular reference
occurs when a formula in a cell refers to another cell or cells that include a formula that refers back to the original cell
malicious code/malware
one of the biggest security threats to your computer
supercomputer
one of the fastest computers in the world at the time it was built; cna handle tasks that are too complex for other computers
01 2 3 4 5 6 7 8 9 = - ( ) , / . $ % Ee
only characters a number can contain
notes placed in a OneNote notebook
pages that are grouped into sections, which can be further grouped into folders
libraries area
shows folders included in library
patches, service packs, software upgrades
software updates available
counterfeiting
the large-scale illegal duplication of software distribution media and sometimes even its packaging
widow
the last line of a paragraph that is by itself at the top of a page
general public license
the linux operating system is distributed under the terms of this
rotate handle
the little white circle attached to the top of a selected graphic
recycle bin
the location of files that have been deleted
botnet
the network that bots are linked together through
color or bit depth
the number of colors that a monitor and graphics card can display
processor
the place where all the processing takes place
ctrl u
underline
splitting
unmerging cells
big cats
what the versions of Mac OS X are named after
document window
what you view a portion of a document on the screen through
input
whatever is put into a computer system (telling the computer what to do)
overtype mode
when Excel replaces the character to the right of the insertion point
LANjacking (war driving)
when hackers can intercept signals with a Wi-Fi enabled notebook computer
variable character font
where the size of some characters are wider than the size of other characters
landscape orientation
where the slide length is greater than its width (default layout)
drag-and-drop editing
you select the item to be moved, drag the selected item to the new location, and then drop, or insert, it in the new location
sleep command
"shut down options" button command that waits to save your work and then turns off the computer fans and hard disk
False
A wireless network is very secure. true or false
registration
Activation is required but __________ is voluntary.
APA
American Psychological Association-title page with brief summary of the title preceding page number
end user license agreement
As part of the installation process, you will be asked to accept the__________.
no
Do you have to type the footnote text for one footnote before you can add another?
edit mode
Excel displays the active cell entry to the formula bar and a flashing insertion point in the active cell
insert mode
Excel inserts the character and moves all character to the right of the typed character one position to the right
spreadsheet
Excel is an_____app that allows users to organize data, complete calculations, make decisions, graph data, and develop reports.
False
File transfers on wireless networks are significantly faster and offer a faster infrastructure than on wired networks
operating system
If a device driver or a peripheral device is not performing correctly, the ____________ ____________ usually displays an on-screen warning about the problem so you can take corrective action.
risk to renaming files
If you inadvertently rename a file that is associated with certain apps, the apps may not be able to find the file and, therefore, may not run properly.
true
If your computer is connected to the Internet then your computer is part of a network. True or False
no
Is it necessary to type dollar signs, commas, or trailing zeros?
true
Most routers are shipped with a predefined SSID set by the manufacturer. True or False
geographical structure
PAN, LAN, NAN, MAN, WAN
True
SSIDs help you log into the right network and provide a level of security. True or False
operating system
When you purchase a computer, it usually comes with the ______ ______ already installed.
True
WiMAX is an ethernet-compatible network standard. True or False
yes
Will Word keep track of the numbering of footnotes if you rearrange, insert, or remove them?
shade
Word colors the rectangular area behind any text or graphics
false
Your Internet connection does not affect connection speed. True or False
space
a URL never contains a_________, even after a punctuation mark
offset
a background feature that moves the background away from the slide borders in varying distances bu percentages
insertion point
a blinking vertical line that indicates where the next typed character will appear
recovery cd (recovery disk)
a bootable cd, dvd, or other media that contains a complete copy of your computer's hard drive, as if existed when shipped from the manufacturer
autocorrect options button
a button you click to display a menu that allows you to undo a correction or change how Word handles future automatic corrections of this type
portable software
a category of software designed to run from removable storage
formatting mark
a character that Word displays on the screen but is not visible on a printed document
SkyDrive
a cloud storage service that provides storage and other services, such as office web apps, to computer users
SharePoint Workspace
a collaboration app that allows you to access and revise files stored on your computer from other locations
wiki
a collaborative web site that allows people to add and modify material posted by other people
software suite
a collection of application software sold as a single package
database
a collection of data that is stored electronically as a series of records in tables
clip art
a collection of graphic images
suite
a collection of individual apps available together as a unit
homegroup
a collection of trusted networked computers that automatically share files and folders
service pack
a collection of updates, fixes, and/or enhancements to a software program delivered int he form of a single installable package
web
a collection of web pages that are interconnected through the use of hypertext or links
column heading
a column letter above the grid that identifies each column
mouse
a common input device designed to move and select on-screen graphical objects and controls
Outlook
a communications and scheduling app that allows you to manage email accounts, calendars, contacts, and access to other internet content
Lync
a communications app that allows you to use various modes of communications such as instant messaging, videoconferencing, and sharing files and apps
internet service provider
a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to business, organizations, and individuals
PowerPoint
a complete presentation app that enables you to produce professional-looking presentations and then deliver them to an audience
email message
a computer file containing a letter or memo that is transmitted electronically via a network; includes the recipient's email address,the address of everyone who is receiving a copy of the message, the message subject, the body and the name of any file attachments
local area network
a computer network that is located within a limited geographical area, such as your home, a school computer lab, or a small business
virus
a computer program that can damage files and programs on your computer
rootkit
a computer program that gives privilege to a computer while actively hiding its presence; this allows someone to maintain command and control over a computer without the computer user knowing
trojan horse
a computer program that seems to perform one function while actually doing something else
software
a computer program that tells the computer how to perform tasks
operating system
a computer program(set of computer instructions) that coordinates all the activities of computer hardware and provides the capability for you to communicate with your computer
email server
a computer that acts as a central post office for a group of people
personal computer
a computer that is intended for a single user at a time; electronic device you are going to use for processing information and browsing the internet
server
a computer that provides services and distributes resources to other computers on the network, usually called clients
server
a computer that serves the computers on a network, such as the Internet or a home network, by supplying them with data
zombie
a computer under the control of a bad bot because it carries out instructions without the knowledge of the computer owner
network switch
a connection devices that sends data aonlu to the network devices specified as the destination
dial up connection
a connection that uses a phone line to establish a temporary Internet connection
expansion port
a connector that passes data between a computer and peripheral device
ad serving cookie
a cookie that is used to track a user's activities at any site containing the associated third-party banner ads
backup
a copy of one or more files that has been made in case the original files become damaged
LAN (local area network)
a data communications network that typically connects personal computers within a very limited geographical area - usually a single building
domain name system
a database each domain name and its corresponding IP address have been entered into
Access
a database management system that enables you to create a database, add, change, and delete data in the database; ask questions concerning the database; and create forms and reports using the data in the database
Publisher
a desktop publishing app that helps you to create professional-quality publications and marketing materials that can be shared easily
UPS
a device containing a battery that provides a continuous supply of power and other circuity to prevent spikes and surges from reaching your computer
network print server device
a device that allows a workstation to be connected to the network without going through a workstation
Network access point
a device that connects network service provider equipment and links
network hub
a device that links two or more nodes of a wired network
modem
a device that sends and receives data to and from computers over cable, satellite, or telephone lines; what internet connection requires
organic light emitting diode (OLED)
a display device that draws less power than an LCD screen; have a crisp image and fast response rate; can be seen from any angle and work well in direct sunlight
color scheme
a document theme that identifies 12 complementary colors for text, background, accents, and links in a document
research paper
a document you can use to communicate the results of research findings
pixel
a dot on the screen that contains a color
live preview
a feature that allows you to point to a gallery choice and see its effect in the document without actually selecting the choice
InfoPath Designer
a form development app that helps you create forms for use on the web and gather data from these forms
circular reference
a formula in a cell that contains a reference back to itself
Word
a full-featured word presenting app that allows you to create professional-looking documents and revise them easily
software bug
a general term for a mistake in the code or flaw in the design that creates an error or unexpected result when a program runs
application software
a general term used to classify the programs that help you use the computer o carry out tasks
gateway
a generic term for any device or software code used to join two networks
worksheet
a grid of columns and rows
workgroup
a group of computers that communicate with each other to share resources on a network
way to tell a cell is active
a heavy border surrounds the cell
scroll bar
a horizontal or vertical bar that appears wen the content of an area may not be visible
title bar
a horizontal space that contains the window's name
mainframe computer
a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users
license agreement/software license
a legal contract that lets you know the ways in which you may use a certain computer program
copyright
a legal protection that grants the author of an original work an exclusive right to copy, distribute, sell, and modify that work, except under special circumstances described by copyright laws
safe mode
a limited version of Windows that allows you to use your mouse, screen, and keyboard, but no other peripheral device
copyright notice
a line that identifies a copyright holder
shortcut menu
a list of frequently used commands that relate to the right-clicked object
bulleted list
a list of paragraphs, each of which may be preceded by bullet character, such as a dot, arrow, or check mark
works cited page
a list of sources that are referenced directly in a research paper
thesaurus
a list of synonyms and antonyms
parenthetical references
a list of the works cited for information of the researched for the paper at the end of the paper on a separate page called a bibliography
bibliographical list
a lists that alphabetizes the list of sources used for the research (works cited)
IP address
a logical address that is a series of numbers used to identify a network device
validation code
a long sequence of numbers and letters that is typically supplied separately from the software itself
expansion slot
a long, narrow socket on the mother board into which you can plug an expansion card
mac os
a main operating system installed on Apple MacIntosh computers
linux
a main operating system installed on PCs, available as free download
windows
a main operating system installed on PCs, designed by Microsoft and provides a graphical interface
dot pitch (dp)
a measure of image clarity
kbps
a measurement of connection speed that refers ti the amount of data that travels between a subscriber's computer and an ISP within a given time period
mbps
a measurement of connection speed that refers to the amount of data that travels between a subscriber's computer and an ISP within a given time period
point
a measurement system that determines the font size; each of these is about 1/72 of an inch tall
cookie
a message containing information about the user sent from a web server to a browser and stored on the user's hard drive
a message sent electronically over the Internet
cloud computing
a method of offering Internet-accessible computing services ranging from office productivity to complex corporate processing
gesture
a motion you make on a touch screen with the tip of one or more fingers or your hand
file
a named collection of data that exists on a storage medium
style
a named group of formatting characteristics
style
a named group of formatting characteristics including font and font size
file
a named unit of storage
logical address
a network address that is assigned to a network when the physical address is in an incorrect format
workstation
a network client that is usually a personal computer
modem
a network device that converts the digital signals from a computer into signals from a computer into signals that can travel over a network such as telephone system or the Internet
ethernet adapter/ethernet card
a network interface card (NIC) designed to support Ethernet
endnote
a note existing at the end of a document
OneNote
a note taking app that allows you to store and share information in notebooks with other people
footnote
a note that exists at the bottom of a document
manual/ hard page break
a page break that you force into a document at a specific location
service set identifier (SSID)
a particular LAN in areas with overlapping wireless networks that helps you log into the right network and provide a level o security
digital media player
a peripheral device that can be attached to a personal computer system to transfer and play music
digital camera
a peripheral input device that records photographic images in digital format; used to transfer photos from the camera to the computer
static IP address
a permanently assigned IP address
botmaster
a person who controls many bot-infected computers and can link the bots together into a network called a botnet
blog
a personal journal focusing on a single topic or a variety of topics
MAC address
a physical address, a unique number assigned to a network interface card when it is manufactured
user icon
a picture associated with a user name
exploded
a pie chart with one or more slices offset
field
a placeholder for data whose contents can change
security tracking of office property
a plate that contains a unique ID number, a warning message, and an 800 number to report a stolen computer; leaves an indelible tattoo and is extremely difficult to remove; what STOP means
level
a position within a structure that indicates the magnitude of importance
Excel
a powerful spreadsheet app that allows you to organize data, complete calculations, make decisions, graph data, develop professional-looking reports, publish organized data to the web, and access real-time data from websites
function
a prewritten formula that is built into Excel
password
a private and unique combination of letters, numbers, and special characters associated with the username that allows access to a user's account resources
password
a private combination of letters, numbers, and special characters associated with the user name the allows access to a user's account resources
instant messaging
a private version of chat that allows you to sen text messages, images, and hyperlinks back and forth to another person instantly
drive mapping
a process that lets you create a shortcut to a shared folder, storage device, or computer network
desktop publishing program
a program that provides more sophisticated features to help you produce professional-quality publications
keylogger
a program used by trojan horses to secretly steal passwords by recording keystrokes and sending the information to a hacker
dynamic host configuration protocol
a protocol designed to automatically distribute IP addresses
MAN (metropolitan area network)
a public high-speed network capable of voice and data transmission within a range of about 50 miles
window
a rectangular area that displays data and information
text box
a rectangular box in which you type text
tape cartridge
a removable magnetic tape module similar to a cassette tape
boot disk
a removable storage medium containing the operating system files needed to boot your computer without accessing the hard drive
trackball
a rollerball on the top of the mouse
row heading
a row number on the left side of the grid that identifies each row
pharming
a scam that redirects users to fake sites by poisoning a domain name server with a false IP address
light emitting diode (LED)
a screen that looks similar to an LCD screen but it uses light emitting diodes for backlighting
virus signature
a section of program code that can e used to identify a known malicious program
paragraph
a segment of text with the same format that begins when you press the ENTER key and ends when you press the ENTER key
sizing handles
a selected graphic appears to be surrounded by a selection rectangle, which has small squares and circles called _______; used for resizing the graphic
bulleted list
a series of paragraphs, each beginning with a bullet character
setup program
a series of steps designed to guide you through the installation process
range
a series of two or more adjacent cells in a column or row or a rectangular group of cells
email account
a service that provides an email address and mailbox; needs an email provider
gallery
a set of choices, often graphical arranges in a grid or in a list
computer virus
a set of program instructions that attaches itself to a files, reproduces itself, and spreads to other files on the same computer using a file document
document theme
a set of unified formats for fonts, colors, and graphics
backup software
a set of utility programs designed to back up and restore files
bluetooth
a short range (3-300 feet of 1-91 meters) wireless network technology that's designed to make its own connections between electronic devices
pixel (picture element)
a single point or the smallest unit in a graphic image
multibulleted list slide
a slide that consists of more than one level of bulleted text
sound card
a small circuit board in a sound system that is required for the sound system to produce high-quality music or sound
expansion card
a small circuit board that makes it possible for the computer to communicate with a peripheral device
browser
a software program that allows you to view pages on your computer
slide transition
a special effect used to progress form one slide to the next in a slide show
computer-aided design (CAD)
a special type of 3D graphics software used bu architects, engineers, and others who use computers to create blueprints and product specifications
tax preparation software
a specialized type of personal finance software designed to help organize your annual income and expense data, identify deductions, and calculate your tax payment
mailbox
a storage area for your emails
network attached storage
a storage device that directly connects to a network
surge strip/surge protector/surge suppressor
a strip used to protect electrical devices from power surges and voltage spikes
dictionary attack
a technique used by hackers to guess your password by stepping through a password dictionary ontaining thousands of the most common passwords
hiding cells
a technique used to hide data if you decrease the column width to 0 because the information may not be relevant
dynamic IP address
a temporary IP address most computers are assigned; used to identify a computer while it is connected to the Internet
office clipboard
a temporary storage area that holds up to 24 items copied from any Office program
digital subscriber line
a type of internet connection that provides high-speed, digital, always-on Internet access over standard telephone cables
spyware
a type of malware program that secretly gathers personal information without the victim's knowledge, usually for advertising and other commercial purposes
ethernet
a type of network on which network nodes are connected by coaxial cable or twisted pair wire; the most popular network architecture, it typically transmits data at 10 or 100 megabits per second
malware
a type of software that can do harm to your computer data
utility software
a type of system software designed to perform a specialized task
remote access trojan
a type of trojan horse that has backdoor capabilities that allow remote hackers to transmit files to victim's computers, search for data, run programs, and use a victim's computer as a relay station for breaking into computers
spam filter
a type of utility software that captures unsolicited email messages before they reach your inbox
device driver
a type of utility software that helps a peripheral device to establish communication with a computer
user name
a unique combination of letters or numbers that identifies a specific user to windows
widget
a utility program placed on an Apple computer's desktop
gadget/desktop gadget
a utility program that is placed on a computer's desktop
compression utility
a utility program used to reduce file size for quick transmission or efficient storage
hypertext
a way of linking information through the use of text and multimedia
ctrl a
a way to select the entire worksheet besides tapping or clicking the select all button
internet forum
a web sire where yo can put comment to discussion threads
search site
a web site that provides a variety of tools to help you find information on the web
task pane
a window that can remain open and visible while you work in the document
navigation pane
a window that enables you to browse through headings in a document, browse through pages in a document, or search for the text in a document
public wifi network
a wireless LAN that provides open internet access to the public
wifi card/wifi adapter/ tranceiver
a wireless NIC that includes a transmitter, a receiver, and an antenna to transmit signals
wireless router
a wireless access point that also includes the circuitry needed to connect a wifi network to the Internet
synonym
a word similar in meaning to another word
antonym
a word with an opposite meaning
mass mailing worm
a worm that spreads by sending itself to every email address in the address book of an infected computer
basic function a computer performs
accepts input
mobile internet access
access offers a continuous internet connection as you are walking or riding in a bus, car, train, or plane
http
acronym for hypertext transfer protocol; the technology used to transport web pages over the Internet
sum function
adds all the numbers in a range of cells
spend less money, have wider access to services
advantages of sharing network hardware
spend less money, share files, work together with people
advantages of sharing networked software
equal sign
alerts Excel that you are entering a formula or function and not text
excel worksheet
allows data to easily be summarized and charted
general public license
allows everyone to make copies for his or her own use, give to others, or to sell it
worksheet
allows users to enter, calculate, manipulate, and analyze data such as numbers and text
web support
allows users to save Excel worksheets or parts of a worksheet in a format that a user can view in a browser, so that a user can view and manipulate the worksheet using a browser
internet telephony
allows voice conversations to travel over the Internet
voice over ip
allows voice conversations to travel over the internet
mobile internet access
allows you to access the internet, such as using a mobile phone or tablet computer to check your email and browse the web, while traveling
web cam
allows you to capture video images using your computer
auto fill options button
allows you to choose whether you want to copy the values from the source area to the destination area with formatting, do so without formatting, or copy only the format
mouse
allows you to control an on-screen pointer
page layout view
allows you to create or modify a worksheet while viewing how it will look in printed format
graphical user interface
allows you to give the computer commands using pointing devices and graphics such as menus, buttons, icons, links, and more
portable internet access
allows you to move your network device, such as a notebook computer, and stay connected as long as you are within range of the fixed wireless signal
point mode
allows you to select cells for use in a formula by using the mouse
wordwrap
allows you to type words in a paragraph continually without pressing the enter key at the end of each line
pointing stick
also called a TrackPoint; looks like the tip of an eraser embedded in the keyboard of a notebook computer; can be used to move the on-screen pointer
insertion point
also called a cursor; indicates where he characters you type will appear
touch pad
also called a trackpad; a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer
tool tabs
also called contextual tabs; appears when you perform tasks or work with objects such as pictures or tables; gives you more choices to work with
random access
also called direct access; the ability of a device to jump directly to the requested data
notebook computers
also known as a laptop computer; a portable computer that usually runs on batteries and has a top that you can open and close to wake up your computer and put it to sleep; small, light-weight object; has clam-shell design (hinges)
microprocessor
also known as the processor-same thing
physical address
an address built into the circuitry of each network device at the time it is manufactured
EULA (end-user license agreement)
an agreement that displays on the screen when you install software that contains terms you have to agree to in order to run software
bibliography
an alphabetical list of sources referenced in a paper
buffer
an area of memory that holds data from one device while it is waiting to be transferred to another device
denial of service
an attempt to disrupt the operations of a network or computer system, usually by flooding it with data traffic
computer
an electronic device that accepts input, processes data, stores data, and produces out[put as information
tablet computers
an electronic device that functions like a regular laptop or personal computer but has a touch-screen that is used as an input device instead of a mouse and keyboard; portable like a laptop
phising
an email-based or IM scam designed to persuade you to reveal confidential information
virus hoax
an emailed warning about new viruses that don't exist; contains dire warnings about a new virus that is on the loose but is a prank
wimax
an ethernet compatible network standard system that transmits data to and from wimax antennas mounted on towers
top-level domain
an extension a domain name ends with
USB flash drive
an external hard drive that can be plugged directly into a USB port on the computer system unit (storage device)
tag name
an identifier that links a citation to a source
project management software
an important tool for planning and managing large or small projects
storage medium
an object of physical unit used to store information
slider
an object that allows users to choose from multiple predetermined options
screen-tip
an on-screen note that provides the name of the command, available keyboard shortcuts, a description of the command, and sometimes instructions for how to obtain help about the command
desktop
an on-screen work area app
digital revolution
an ongoing process of social, political, and economic change brought on by digital technology; influences the tools you use to work, play, teach, and govern
social networking
an online networking activity that allows registered members to communicate with others in the network
minimized window
an opened window that is hidden from view but can be displayed quickly by clicking the window's app button on the task bar
printer
an output device that produces computer-generated text, photographs, or graphic images on paper
underline
an__________character is sometimes used to give the appearance of a space between words
slideshow
another name for a PowerPoint presentation; a group of slides on a PowerPoint that are used to help prompt you during a presentation
network link
another name for a communications channel
wireless broadband service
another name for fixed wireless internet service
contextual tabs
another name for tool tabs
domain name server
any computer that hosts the domain name server
networked perpripheral
any deice that has built-in net so it can connect directly to a network
network device
any electronic device that broadcasts network data, boosts signals, or routes data to its destination
email attachment
any file that travels with an email message
text
any set of characters containing a letter, hyphen (as a telephone number), or space; used to place titles, such as worksheet titles, column titles, and row titles, on the worksheet
text
any set of characters containing a letter, hyphen, or space; used to place titles, column titles, and row titles on the worksheet
intelligent agent
any software that can automate a task or execute a task when commanded to do so
digital content
any text, graphics, video, audio, or any data and information stored in a file and available for transmission, viewing, or playing, and storage vua computer
keyword
any word or phrase that you type to describe the information that you are trying to find
trailing zero
any zero after the decimal point (don't need)
object tabs
appear as top of the work area for the open objects
Title slide
appears when you create a new presentation; introduces the presentation to the audience
software
apps
geographical structure
area in which network devices are located
active cell
area in which you can enter data, surrounded by a heavy border
autocalculate area
area on status bar to obtain an average or total or other information about the numbers in a range
standard properties
associated with all Microsoft Office files and include author, title, and subject
standard properties
associated with all Microsoft office files and include author, title, and subject
sheet tab
at the bottom of the workbook where the sheet name appears
maximum
auto calculate area displays the highest value in the selected range
average
autocalculate area displays the average of the numbers in the selected range
minimum
autocalculate area displays the lowest value in the selected range
numerical count
autocalculate area displays the number of cells containing numbers in the selected range
count
autocalculate area displays the number of nonblank cells in the selected range
sum
autocalculate area displays the sum of the numbers in the selected range
autocorrect
automatically corrects errors you make while typing such as spelling, capitalization, grammar, or other typing errors
spam filter
automatically routes advertisements and other junk mail to either the deleted items or a span folder maintained bu your email provider
software upgrade
available to customers who already have a software program installed
windows help and support
available when using Windows or when using any Microsoft app running windows; displays help for Windows
illegal characters for a folder
backslash, slash, colon, asterisk, less than symbol, question mark, quotation mark, greater than symbol, vertical bar
cell
basic unit of a worksheet into which you enter data
click and type
being able to double click a blank area of the document window and Word automatically formats the item you type or insert according to the location where you clicked
right arrow key
best method of entering numbers in cells horizontally across a row
reconfigure a browser
blocks access to some websites, changes the home page setting, and/or redirects the browser to infected websites
piconets
bluetooth networks that form automatically when two or more bluetooth devices come within range of each other because a bluetooth device can search for other bluetooth devices within a range
ctrl b
bold
usb flash drive
both a storage device and the storage medium
cancel box
box you tap or click to cancel an entry
enter box
box you tap or click to complete an entry
placeholders
boxes with dashed or solid borders that are displayed when you create a new slide
placeholders
boxes with dotted or hatched-marked borders that are displayed when you create a new slide
bandwidth
broadband, narrowband
F1 key
button you press to obtain help in many apps
change all
button you select to change the current and future occurrences of a misspelled word
communications channel
cable, RF signals, microwaves, laseer and infrared light
display device
called a monitor; displays the output on the screen and is the primary output device; presents visual information on a screen
power spikes/voltage spikes/power surges
can damage sensitive computer parts; can be caused by malfunctions in the local generating plant or the power distribution network, downed power lines, power grid switching by the electric company, and faulty wiring
wifi protected access
can encrypt data based on the user's password and implements message integerity checking
touch screen technology
can interpret a single touch or more complex input, such as handwriting
number
can only contain 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, =, -, (, ), /, ., $, %, E, e, and ,; used to represent amounts
bandwidth
capacity of a network
type of correction AutoCorrect makes
capitalizes the first letter in the name of days
infrared signals
carrying data only for short distances and with a clear line of sight, such as between a notebook computer and a printer
system, application
categories of software
protocol
certain rules computers on the internet follow to communicate with each other
format
change the appearance of the text
bold
characters that are somewhat thicker and darker than others are called_______
area
chart illustrates changes over time, but are often used to compare more than one set of data, and the area below the lines is filled in with different color for each set of data
radar
chart that can compare several sets of data in a manner that resembles a screen, with each set of data represented by a different color
surface
chart that compares data from three columns and/or rows in a three-dimensional manner
column or cylinder
chart that is a good way to compare values side by side
bubble
chart that is much like an XY (scatter) chart, but a third set of data results indicates how large each individual dot is on the chart
stock
chart that provides a number of methods commonly used in the financial industry to show stock market data
xy scatter
chart used much like a line chart, but each piece of data is represented by a dot and is not connected with a line
line
chart used to illustrate changes in data over time
pie
chart used to show the contribution of each piece of data to the whole, or total, of the data
f7
check spelling and grammar at once
range finder
checks which cells are referenced in the formula assigned to the active cell
data bus
circuits that computers send over to control the peripheral device
getting to backstage view
click the file tab or the save icon at the top left corner of the Microsoft app window open
ignore all
click this option on the shortcut menu to instruct Word not to flag future occurrences of a spelling error
demoware
commercial software that is available as a trial version
regular, bold, underline, italic
common font styles
network service provider
company that maintains a series of nationwide Internet links
input device
computer hardware that can communicate with the computer
desktop computers
computers that are only meant to be placed on a table or desk
portable computers
computers that can be placed on a table or desk as well as carried around and placed on other various surfaces
router
connects to your computer and to the Internet; needed in order to connect and access the internet
bridge
connects two networks and transfers data without regard to its format
path
consists of a drive letter (preceded by a drive name when necessary) and colon, to identify the storage device, and one or more folder names
app
consists of programs designed to make users more productive and/or assist them with personal tasks
chat group
consists of several people who connect to the Internet and communicate in real time by typing notes to each other
computer network
consists of two or more computers and other devices that are connected for the purpose of sharing data and programs
data
consolidated into a summary
group
contains a collection of commands
tab
contains a collection of groups
full backup
contains a copy of every program, data, and system file on a computer
backstage view
contains a set of commands that enable you to manage documents and data about the documents
mini toolbar
contains commands related to changing the appearance of text in a document-appears automatically
navigation pane
contains the Favorites area, Libraries area, Homegroup area, Computer area, and network area
search box
contains the dimmed words, "Search Documents"; where you type a term in the search box for a list of files, folders, shortcuts, and elements containing that term within the locations you are searching
graphics card
contains the technology used to display images on the screen
restore point
contains your computer settings; a place you can roll back to if you experience a hard drive problem
voiceband modem
converts the digital signals from your computer into analog signals
gray
conveys neutrality and, thus, often is found in backgrounds and other effects
ctrl c
copy
shareware
copyrighted software marketed under a try-before-you-buy policy
freeware
copyrighted software that is available without a fee
autocorrect feature
corrects common mistakes when you complete a text entry in a cell
type of correction AutoCorrect makes
corrects two initial uppercase letters by changing the second letter to lowercase
ctrl shift g
count words
WAN (wide area network)
covers a large geographical area and typically consists of smaller networks, which might use different computer platforms and network technologies
ctrl t
create hanging indent
transmission control protocol
creates connections and exchange packets of data
promoting
creating a higher-level paragraph
demoting
creating a lower-level paragraph
merging
creating a single cell by combining two or more selected cell
ctrl x
cut
mobile broadband
data services such as email and internet access most cellular service providers offer
ctrl shift <
decrease font size
ctrl shift m
decrease indent
8.43
default column width
calibri light
default font for heading
normal style
default in word which most likely has 11 point Calibri
title and content
default slide that PowerPoint uses when you add a new slide
print layout view
default view in Word; shows the document on a mock sheet of paper in the document window
font
defines that appearance and shape of the letters, numbers, and special characters
font
defines the appearance and shape of the letters, numbers, punctuation marks, and symbols
font color
defines the color of the characters
color
defines the hue of the characters
point size
defines the size of the font by using a measurement system caused points
delete and modify files
deletes files, downloads unwanted files, and/or modifies the registry
logic bomb
delivers payloads in response to some other system event
orange
denotes success, victory, creativity, and enthusiasm
database
describes a collection of data organized in a manner that allows access, retrieval, and use of that data
personal finance software
designed to help manage individual finances
graphics software
designed to help you create, display, modify, manipulate, and print graphics
portable applications
designed to run from a removable storage device such as a USB flash drive
mobile application/app
designed to run on mobile devices such as smartphones and tablet computers
duty cycle
determines how many pages a printer is able to print in a specified period of time
computer platform
determines the hardware and software of the computer system (Windows, Mac OS, Linux OS) intel processor- needed to run Windows
brightness
determines the overall lightness or darkness of an entire image
printer resolution
determines the quality or sharpness of printed images and text
operating system
determines the user interface on your digital device
network router
device that can transmit data from one network to another network
output devices
devices that receive the processed information of the computer and input device
input devices
devices used to put information into the computer
peripheral device
digital cameras
captcha
displays a combination of letters and numbers that you must type that procides security for the Web site because computers cannot access this code to create phony registrations
dialog box launcher
displays a dialog box or a task pane with additional options for the group
spelling and grammar check icon
displays either a check mark to indicate the entered text; contains no spelling or grammar errors, or an X to indicate that it found potential errors
graphical user interface
displays on-screen icons, menus, buttons, and other graphical controls
Name box
displays the active cell reference
name box
displays the active cell reference
ease of access
displays the ease of access menu, which provides tools to optimize a computer to accommodate the need of mobility, hearing, and vision impaird issues.
max function
displays the highest value in a range
previous locations arrow
displays the locations you have visited
merge and split cells
do this by selecting the cells and tapping or clicking 'merge and center' in the home tab|alignment group
webpages
documents on the world wide web that consists of a specially coded HTML fole with associated text, audio, video, graphics, and links to other web pages
first and total
dollar sign is only needed for these rows
floating
dollar sign that appears immediately to the left of the first digit with no spaces
ctrl 2
double space lines
solid state drives
drive that has no moving parts
relative reference
each adjusted cell reference
in-cell editing
editing the contents directly in the cell
edutainment software
educational software that is also entertaining
scroll arrows/box
enable you to view areas that currently cannot be seen on the screen
sign-in screen
enables you to sign in to your user account and makes the computer available for use
install ransomware
encrypts files, then demands payment for the decryption key
wireless encryption
encrypts the data transmitted between wireless devices and then decrypts the data only on devices that have a valid encryption key
resizing
enlarging or reducing the size of a graphic
central processing unit, storage devices, RAM, peripherals
examples of computer resources
utility program, device drivers
examples of freeware software
device drivers, utilities, programming languages
examples of system software
brute force attack
exhausts all possible keys to decrypt a password
restart command
exits running apps, shuts down Windows, and then restarts Windows
shut down command
exits running apps, shuts down Windows, and then turns off the computer
red
expresses danger, power, or energy and often is associated with sports or physical exertion
find and replace
feature that automatically locates specific text and then replaces it with desired text
bcc
feature used to blind copy your email to people without revealing to the send to and c: recipients who else got the message
cc
feature used to include people you want to read your email but that you don't want to respond to the message
reply all
feature you click if you want your response sent to everyone who received the original email message (except the Bcc recipients)
reply
feature you click to reply or answer back only to the person who sent an email message
load operating system
fifth step in the boot process
part of a file name
file extension
pattern
fill that adds designs such as dots or diamonds that repeat in rows across the slide
solid
fill that uses one color throughout the entire slide
texture (picture)
fill the uses a specific file or an image that simulates a material such as cork, granite, marble, or canvas to "fill" or make up the interior of a shape, line, or character
gradient
fill where one color shade is gradually progressing to another shade of the same color or one color progressing to another color
solid, gradient, picture, texture, pattern
fills available in wordart
signature line
final line on a flyer; contact information line or identifies a call to action
shift f7
find and insert a synonym
ctrl f
find text
tab
first line indent
headline
first line of text on a flyer
power up
first step in the boot process
word processing, spreadsheet, presentation, database, scheduling
five major software categories that are integrated into office productivity software
liquid crystal display (LCD)
flat-panel display monitors that produce an image by manipulating light within a layer of liquid crystal cells
initiate a denial of service attack
floods servers with useless traffic to overwhelm the server's processing capability and stops all communications
user ID
for security reasons; identifies the person using the computer and applications; ways to sign into your computer
degrade performance
forces a computer to perform more slowly than normal, and/or sends annoying messages or pop-ups
identify peripheral devices
fourth step in the boot process
site license
generally priced at a flat rate and allows software to be used on all computers at a specific location
create network traffic jam
generatess traffic on LANs and the Internet and/or causes services to determine as download time increases for files, Web pages, and email messages
computer program/software
gives computers the instructions and and data necessary to carry out tasks
ctrl g
go to a page
installation agreement
goes into effect as soon as you click the option to accept the terms of agreement
shrink-wrap license
goes into effect as soon as you open the packaging
print serer
handles jobs sent to network printers
peripheral device
hardware that can be added to a computer system to expand what a computer can do
italic
has a slanted appearance
ink-jet printer
has aprint head that sprays ink onto paper to form characters and graphics
proprietary software
has restrictions on its use that are delineated by copyright, patents, or license agreements
network interface card
has the network circuitry needed to connect a deice to a network; sends data over the network to and from networked devices, such as computers or printers
microwave signals
have more carrying capacity than RF signals so they typically provide data transport for large corporate networks and form part of the Internet backbone
effects
helps add emphasis or depth to characters
library
helps you manage folders stored in various locations on a computer and devices
full screen mode
hides all the commands and just displays the document
organizational structure
hierarchy of devices connected to a network
broadband
high bandwidth communications systems, such as cable TV, fiber optic, and DSL
storage
holds computer data on a permanent basis when it is not immediately needed for processing
ruler
horizontal or vertical bar with 1/8" markings to show the measurements of the page and where to place your insertion point to start typing when given a specific measurement of the page
response rate
how fast a screen updates the information being displayed
pages per minute (ppm)
how printer speed is measured
click the cancel box
how to cancel an entire entry before entering it into a cell
user account
identifies to Windows the resources a user can access when working with the computer
software piracy
illegally installing software onto a computer; stealing software
folder name
in the URL http://www.nps.gov/yose/index.htm, what part of the URL is /yose/
web protocol standard
in the URL http://www.nps.gov/yose/index.htm, what part of the URL is http://
document name and file extension
in the URL http://www.nps.gov/yose/index.htm, what part of the URL is index.htm
web server name
in the URL http://www.nps.gov/yose/index.htm, what part of the URL is www.nps.gov
user ID
in the email [email protected], what part of the email is David_velez
email provider
in the email [email protected], what part of the email is rutgers.edu
compactflash
include a built-in controller that reads data from and writes data to the card
automatically updated properties
include file system properties, such as the date you create or change a file, and statistics, such as file size
automatically updated properties
include file system properties, such as the date you created or changed a file and statistics, such as the file size
app bar
includes a button that enables you to display all of your apps
requirements document
includes a needs statement, a source of data, a summary of calculations, and any other special requirements for the worksheet, such as charting and web support
resizing
includes both increasing and reducing the size of the graphic
ctrl shift >
increase font size
ctrl m
increase paragraph indent
first line indent
indenting just the first line of a paragraph
viewing angle width
indicates how far to the side you can still clearly see the screen image
style
indicates how the characters are formatted
blue
indicates integrity, trust, importance, confidence, and stability
transparency slider
indicates the amount of opaqueness
url
indicates the computer on which it is stored its location on the web server, the folder name or names indicating where it is stores, its file name, and its file extension (a unique address)
screen resolution
indicates the number of pixels that the computer uses to display the letters, numbers, graphics, and background you see on the screen
boot sector virus
infects the system files your computer uses every time the computer is powered up
hardcopy/printout
information that exists on a physical medium such as paper
printout/hard copy
information that exists on a physical medium such as paper
alt ctrl f
insert footnote
custom
installation that can save space on your hard drive but limits functionality of the program because not all features are installed
full
installation that gives you access to all features of the software
full
installation where the setup copies all files and data from the distribution medium to the hard drive of your computer system
custom
installation where the setup displays a list of software features for your selection and the setup program copies only the selected program and data files to your hard drive
end-user piracy
installing software on more computers than the end-user license agreement allows
computer program
instructions that tell a computer how to carry out the processing tasks
security suite
integrates several security modules to protect against the most common types of malware, unauthorized access, and spam into one package
vandalism
intentional defacement of Web sites
sniffing
intercepts information sent our over networks
title slide
introduces the presentation to the audience
green computing
involves reducing the electricity consumed and environmental waste generated when using computers, mobile devices, and related technologies
ctrl i
italicize
ctrl j
justify paragraph
ALT
key on the keyboard you can use to display KeyTips for certain commands when you prefer using the keyboard instead of the mouse
page down
key that selects the cell down one worksheet window from the active cell
page up
key that selects the cell up one worksheet window from the active cell
keytips
keyboard icons for certain commands
ctrl m
keyboard shortcut to insert a new slide
virus distribution
launching viruses, worms and Trojan horses
physical topology
layout and relationship between network devices
disable antivirus and firewall software
leaves your system vulnerable to even more malware
ctrl l
left align
workbook
like a notebook; a collection of worksheets
single-user license
limits the use of the software to one person at a time
fixed internet access
links your computer to an ISP through a fixed point, such as a wall socket used in a cable Internet connection
name for retrieving data
loading
web site
location on the world wide web that contains information relating to specific topics
sound system
made up of speakers and a small circuit board called a sound card required for high-quality music, narration, and sound effects
differential backup
makes a backup of only those files that were added or changed since your last full backup session
incremental backup
makes a backup of the files that were added or changed since the last backup-no necessarily the files that changed from the last full backup, but the files that changed since any full or differential backup
open source software
makes the program instructions available to programmers who want to modify and improve the software
select
making a cell active
modifications
making changes to a document
scroll
moving the text and/or graphics on a computer screen in a certain direction to see other parts of that document or page on window
peer to peer network
network computers serve as both clients and servers; does not have a server
Windows 8
newest version of Microsoft Windows
31
number of characters a worksheet name can be up to
140 to 160
number of characters or less a text message can be
10
number of chart types Excel offers
12
number of complementary colors identified by a color theme
name for retrieving data
opening
trace error
option button selection that lists error-checking options following the assignment of an invalid formula to a cell
insert options
option button that lists formatting options following an insertion of cells, rows, or columns
tables
organized and store data within worksheets
file management
organizing files in folders
client
other computers on a network
icann
oversees IP addresses
automatic/soft page break
page breaks Word automatically inserts when documents exceed one page
ctrl v
paste
one third
people remember at least this much more information when the document they are seeing or reading contains visual elements
hackers
people that want to steal or damage your data or assume your identity
notes pane
place at bottom of slides pane where you can type information that you may want to mention but not put in the slides
status bar
place that tells you the total number of words in a document
handheld computer
portable computer that fits in your pocket; runs on battery and provides users with basic applications
centered
positioned horizontally between the left and right margins on the page
power up
power switch is turned on, power light is illuminated, and power is distributed to the computer circuitry
autocomplete feature
predicts some words or phrases as you are typing and displays its prediction on a ScreenTip
status bar
presents information about the document, the progress of current tasks, and the status of certain commands and keys
insert
press this key to toggle between Insert mode and Overtype mode
concurrent-use license
priced per copy and allows a specific number of copies to be used at the same time
multiple-user license
priced per user and allows the allocated number of people to use the software at any time
keyboard
primary input device; used to enter text and numbers
ctrl p
hard copy
printed output
peripheral device
printer
duplex printer
printer that can print on both sides of the paper
network-enabled printer
printer that connects directly to the network without needing to connect to a computer that is connected to the network
basic function a computer performs
processes data
basic function a computer performs
produces output as information
photo printer
produces professional-quality images on specialized papers; has slower output speeds when compared to ink-jet or laser printers
search engine
program that uses keywords to find information on the internet and return a list of relevant documents
NAN (neighborhood area network)
provide connectivity within a limited geographical area, such as in a city's downtown area
radio frequency signals
provide data transport or small home networks, campus networks, and business networks
3D graphics software
provides a set of tools for creating wire-frame models that represent three-dimensional objects
theme
provides consistency in design and color throughout the entire presentation
ip
provides devices with unique addresses
quick access toolbar
provides easy access to some of the more frequently used commands in the Office apps
fixed wireless internet service
provides internet access to homes and businesses by broadcasting data signals over large areas
address bar
provides quick navigation options, the arrows on the address bar allow you to visit different locations on the computer
mobile wimax
provides service to remote locations such as where you might want to hike, ski, or conduct research
portable satellite internet service
provides service while you are on the move usually by mounting a satellite dish on a vehicle
internet service provider
provides the service of connecting the router to the Internet, usually for a mothly fee
mathematical software
provides tools for solving a wide range of math, science, and engineering problems; helps see patterns that can be difficult to identify in columns and numbers
paste area
range of cells receiving the copy
sequential access
reading through a tape drive from beginning to end
salami shaving
redirecting small, unnoticeable amounts of money from large amounts
ctrl y
redo
green computing
reducing the electricity consumed and environmental waste generated when using computers, mobile devices, and related technology
human error/operator error
refers to a mistake made by a computer operator or programmer
resource
refers to any computer component that is required to perform work
graphics
refers to any picture drawing, sketch, photograph, image, or icon that appears on your computer screen or on your printed output
hardware
refers to the electronic and mechanical parts of the computer; both the internal and external parts (peripheral devices) of a computer
line weight
refers to the line's thickness
PAN (personal area network)
refers to the networking of personal digital devices within a range of about 30 feet (10 meters) and without the use of wires or cables
intellectual property
refers to the ownership of certain types of information, ideas, or representations
refresh button
refreshes the contents of the folder list
ctrl spacebar
remove character formatting
ctrl shift t
remove hanging indent
ctrl q
remove paragraph formatting
ctrl 0
remove space after paragraph
tiling options
repeat the background image many times vertically and horizontally on the slide, the smaller the percentage, the greater the number of times the image is repeated
ctrl h
replace text
type of correction AutoCorrect makes
replaces commonly misspelled words with their correct spelling
brown
represents simplicity, honesty, and dependability
purple
represents wealth, power, comfort, extravagance, magic, mystery, and spirituality
double spacing
required line spacing in a document following the MLA documentation style - when the amount of vertical space between each line of text and above and below paragraphs should be equal to one blank line
proofreading
rereading your paper to heck for correct source information and nay grammatical, spelling, and punctuation errors
ctrl r
right align
name for retrieving data
ripping
7x7
rule all presentations should follow; maximum number or lines and maximum number of words per line
horizontal ruler
ruler displayed at the top edge of the document window just below the window
user rights
rules that limit the directories and files that each user can access
application server
runs application software for network computers
laptop computers
same as notebook computer; portable and has a top you can open and close; runs on batteries
source area
same thing as copy area
destination area
same thing as paste area
encryption
scrambles (encrypts) data sent over wind or wireless networks and unscrambles (decrypts) data received to provide secure data transmissions
start bootstrap program
second step in the boot process
antispyware
security software designed to identify and neutralize ad-serving cookies and other spyware
arrow
select adjacent cell
alt page up
select cell one worksheet window to the left
alt page down
select cell one worksheet window to the right
ctrl home
select first cell in worksheet
home
selects the cell at the beginning of the row that contains the active cell and moves the worksheet window accordingly
computer worm
self-copying program designed to carry out unauthorized activity on a victim's computer
keyboard shortcuts
shortcut keys or keyboard key combinations used for you convenience while typing commands you tell the computer to do by using the keyboard
tile
shortcut to an app or other content
favorites area
shows your favorite locations by default, this list contains only links to your Desktop, Downloads, and Recent places
clip
single media file that can include photo, illustration, sound, or video
ctrl 1
single space lines
power outages, hardware failures, software failures, human error, theft, computer viruses
six things that can go wrong with a computer
check configuration and customization
sixth step in the boot process
blank layout slide
slide layout that does not contain placeholders and therefore does not have a slide title either
ctrl shift k
small caps
patch
small programs designed to correct, secure, or enhance an existing program
left indent marker
small square at the 0" mark that allows you to change the entire left margin
netbooks
smaller version of a laptop or a notebook computer; portable and runs on batteries
adware
software bundled with a program that automatically displays or downloads advertising material to a computer after the program is installed or while the program is being used
computer-aided music software
software for non-musicians that is designed to generate unique musical compositions simply by selecting the musical style, instruments, key, and tempo
spreadsheet software
software ideal for projects that require repetitive calculations such as budgeting, maintaining a grade book, balancing a checkbook, tracking investments, and calculating loan payments
firewall
software or hardware designed to filter out suspicious data attempting to enter or leave a computer
apps
software programs designed to run on mobile devices, such as your smartphone
database management system
software that allows you to use a computer to create a database; add change, and delete data in the database; create queries that allow you to ask questions concerning the data in the database; and create forms and reports using the data in the database
application software
software that helps you carry out tasks such as sending an email, getting you street-by-street driving directions, editing a photo, or writing a report
web authoring software
software that helps you design and develop web pages that can be published on the web
web application/web app/cloudware
software that is accessed with a web browser
public domain software
software that is not protected by copyright because the copyright has expired, or the author has placed the program in the public domain making it available without restriction
commercial software
software that is typically sold in stores or on the web sites
desktop publishing software
software that provides both word processing and graphic design tools
video editing software/DVD authoring software
software that provides tools for transferring video footage from a camcorder to a computer, deleting unwanted footage, assembling video segments in any sequence, adding special visual effects, and adding a sound track
database software
software that provides tools needed to create a database
drawing software
software that provides tools such as lines, shapes and colors to help you create simple images such as diagrams and corporate logos
web applications
software that you access through a web browser
photo editing software
software that you can use on your computer to help edit digital photos; helps improve the quality of your photos
local application
software the is installed on a computer
presentation software
software the provides the tools you need for combining text, graphics, animations, video, and sound into a series of electronic slides
educational software
software used to learn and practice new skills
word processing software
software used to produce documents such as reports, letter, books, blogs, and manuscripts
white space
space that is displayed at the top and bottom of pages and the space between pages
reference software
spans a wide range of applications from encyclopedias and medical references to map software trip planners, cookbooks, and telephone books
layout
specifies the arrangement of placeholders on a slide
size
specifies the height of a characters and is gauged by a measurement system that uses points
font size
specifies the size of characters on the screen
font size
specifies the size of the characters and is determined by a measurement system called points
system requirements
specify the operating system and minimum hardware capacities; give you the information you need to know if a software program will work on a computer
control your computer
spreads malware, allows hackers to access data on your computer remotely, and/or turns a computer into a zombie
white
stands for purity, goodness, cleanliness, precision, and perfection
physical topology
star, ring, bus, mesh, tree
access confidential information
steals passwords and credit card numbers, and/or sends spam to everyone in your email address book or your instant messaging buddy list
right click the file or folder you want to share and then select Share
step one of file sharing steps
set access
step three of file sharing steps
select who can access the shared files
step two of file sharing steps
boot process
steps and operating system takes when turning on a computer
authentication protocols
steps taken to confirm a person's identity when he or she tries to use a computer
optical devices
storage devices that work with storage media such as CDs, DVDs. and BDs; can be used to store computer data; combination drive usually mounted inside the system unit
basic function a computer performs
stores data
optical storage
stores data as microscopic light and dark spots on the disc surface
magnetic storage
stores data by magnetizing microscopic particles on the disk or tape surface
file serer
stores files and supplies them to network computers on request
password manager
stores user IDs with their corresponding passwords and automatically fills in login forms
currency
style you apply to assign a floating dollar sign that appears immediately to the left of the first digit with no spaces
ctrl =
subscript
black
suggests authority, strength, elegance, power, and prestige
yellow
suggests sunshine, happiness, hope, liveliness, and intelligence
average function
sums the numbers in a specified range and then divides the sum by the number of cells with numeric values in the range
ctrl shift +
superscript
green
symbolizes growth, healthiness, harmony, blooming, and healing and often is associated with safety or money
operating system (OS)
system software that is the master controller for all of the activities that take place in any computer system
narowband
system with less capacity, such as dial up internet access
email authentication
techniques that verify that email messages originate from the Internet domain from which they claim to have been sent
communications channel
technologies for cables and signals
digital technology
technologies that work using digital electronics such as computers, communications networks, the Web, and digitization; starts the digital revolution
solid-state technology
technology in a hard drive that doesn't move
tape storage
technology that consists of a tape drive for the storage device and a tape for the storage medium
solid-state storage
technology that stores data in a durable, erasable, low-power chip
mimo technology
technology that wireless devices use that have two or ore antennas to send multiple sets of signals between network dices
rewritable
technology that you can change, write, and delete data on
read only
technology that you can only read; cannot write, change, or delete data
recordable
technology that you can write data on
memory
temporarily holds computer data waiting to be processed, stored, or output
works cited
term used in the MLA documentation style to refer to the bibliographic list of sources at the end of the paper
blended threat
term used to describe malware that combines more than one type of malicious program
cyberterrorism
terrorist acts committed via the internet
footer
text and graphics that print at the bottom of each page
header
text and graphics that print at the top of each page
header
text and/or graphics that print at the top of each page in a document
footer
text printed at the bottom of every page
underlined
text prints with an underscore ( __ ) below each character
bold
text that has a darker appearance than normal text
italicized
text that has a slanted appearance
link
text, graphic, or other object on a webpage that is linked to another webpage or another area on the current web page
biometrics
that use some physical trait to authenticate a person
restore
the act of moving data from a backup storage medium to hard drive in the event original data has been lost
way to tell a cell is active
the active cell reference appears in the Name box on the left side of the formula bar
data transfer rate
the amount of data that a storage device can move from the storage medium to the computer per second
paragraph spacing
the amount of space above and below a paragraph
line spacing
the amount of vertical space between lines of text in a paragraph
minus sign
the arithmetic operator that directs Excel to perform the subtraction operation
access time
the average time it takes a computer to locate data on the storage medium and read it
slide
the basic unit of a PowerPoint presentation
wireless network key
the basis for encrypting and decrypting the data transmitted between wireless devices
hanging indent marker
the bottom right triangle on the ruler that sets the hanging indent at the location desired on the ruler
system unit
the box that houses the most important parts of a computer system
tower
the case for a vertical system unit; the system unit of choice for computer owners who want to upgrade their system, such as by adding additional storage devices or a more powerful graphics card
copy area
the cell being copied
deck
the collection of slides in a presentation
user interface
the combination of hardware and software that helps you communicate with a computer
network
the combination of hardware, software, cables, and signals that transports data and allows computers to communicate with each other and other electronic devices
display device
the computer hardware that shows, or displays, the data
fill
the content that makes up the interior of a shape, line, or character
ribbon
the control center in Word and other Office apps; contains five tabs used to accomplish various tasks on the computer related to organizing and managing the contents of the open window
cell reference
the coordinates of the intersection of a column and a row (it's unique address)
data series
the data that determines the size of the slices in the pie chart
print layout view
the default (preset) view in Word (shows the document in a mock sheet of paper in the document window)
normal view
the default PowerPoint view
left-aligned
the default alignment for paragraphs in a document; flush at the left margin of the document with the uneven right edges
normal style
the default style in Word
insert mode
the default typing mode; as you type a character, Word moves all the characters to the right of the typed character one position to the right
document properties
the details about a file such as the project author, title, and subject
contrast
the difference between the darkest and lightest areas of the image
monitor
the display device for the computer; what the output information is displayed on
domain name
the easy to remember name many host computers have that translates directly to the computer's static IP address
storage device
the equipment that stores and retrieves data from it storage medium
outline
the exterior border surrounding each letter of symbol
part of a file name
the filename
orphan
the first line of a paragraph all by itself at the bottom of a page
variants
the four alternate designs each theme has
computer system
the hardware, peripheral devices, and software that work together to produce the four main functions of a computer; a computer and all of the input, output, and storage devices that are connected to it
grid lines
the horizontal and vertical lines on the worksheet itself
virus definitions
the information needed to find and remove malware
home page
the main page of a website; acts as a doorway to the rest of the website
central processing unit
the main processor in a computer also described as the brain of the computer
hard drive
the main storage system for a personal computer
internet backbone
the major communications links that form the core of the internet a high speed fiber optic cables that connect high capacity routers that direct network traffic and provide the main high speed routes for data traffic
operating system
the master controller for all the activities that take place within a computer system
storage capacity
the maximum amount of data that can be stored on a storage medium
resolution
the maximum number of horizontal and vertical pixels displayed on the screen
screen size
the measurement in inches from one corner of the screen diagonally across to the opposite corner
wifi (wireless fidelity)
the most popular wireless LAN technology; this technology refers to a set of wireless networking technologies defined by IEEE 802.11 standards that are compatible with Ethernet
file name
the name assigned to a file when it is saved
filename
the name that you give a file; should provide meaningful information about the file contents
client/server network
the network must have at least one server and one or more clients
Microsoft Office 2013
the newest version of Microsoft Office that offers features that provide users with better functionality and easier ways to work with the various files they create; a wide variety of apps such as Word, PowerPoint, Excel, Access, Outlook, Publisher, OneNote, InfoPath, SharePoint Workspace, and Lync
active cell
the one cell which you can enter data
clear all
the only command on the clear menu that clears both the cell entry and the cell formatting
identify peripheral devices
the operating system identifies the peripheral devices that are connected to the computer and checks their settings
load operating system
the operating system is copied from the hard drive to random access memory
power-on self-test
the operating system performs diagnostic tests of several crucial system parts
check configuration and customization
the operating system reads configuration data and the processor executes any customized startup routines
order of operations
the order in which calculations are performed
soft copy
the output display on a monitor
file extension
the period and two or more characters to the right of the period
hard drive
the primary storage device; contains a large-capacity hard disk sealed inside the drive case; usually mounted inside the system unit
paragraph formatting
the process of changing the appearance of the paragraph
character formatting
the process of changing the way characters appear on the screen and in print
digitization
the process of converting text, numbers, sound, photos, and video into data that can be processed by a computer
cutting
the process of copying an item from the Office Clipboard into the document at the location of the insertion point
download
the process of copying the digital picture from the camera or phone to your computer
navigating
the process of finding a location on a storage device
debugging
the process of finding and correcting errors in the worksheet
risk management
the process of identifying potential threats, avoiding as many threats as possible, and developing steps to fix whatever went wrong
copying
the process of placing items on the Office Clipboard, while leaving the item in the document
output
the processed results provided by a computer
start bootstrap program
the processor begins to execute the bootstrap program that is stored in permanent memory called ROM
wifi hotspot
the range of a network coverage
downstream speed
the rate data arrives at your computer
upstream speed
the rate data is transmitted from your computer to the internet
selection rectangle
the rectangle that appears with the sizing handles surrounding it around the selected graphic
way to tell a cell is active
the row and column headings are a shaded color
vertical ruler
the ruler displayed along the left edge of the window
expansion bus
the segment of the data bus between RAM and the peripheral devices
chart sheet
the sheet that the pie chart resides on which contains only the chart
fill handle
the small black square located in the lower-right corner of the heavy border around the active cell
blue/black screen of death
the sudden and unexpected display of an error message written in the white text against a blue or black background that fills the screen
drive bay
the system unit case for a desktop computer that contains several storage device "parking spaces" (expansion bay)
active tab
the tab that is currently being displayed
storage medium
the technology that holds data
the transmission of messages and files over a computer network
digital convergence
the trend to blend several technologies that have distinct functions into a single product
cancel and enter boxes
the two additional boxes in the formula bar
wireless network
the type of network that uses antennas to transfer data from one device to another
wired network
the type of network that uses cables and wires to transfer data from one deice to another
font
the typeface that defines the appearance and shape of the letters, numbers, and sepecial characters
email address
the unique address for each mailbox on the Internet, which typically consists of a user ID, an @ symbol, and the name of the computer that maintains the mailbox
port probe
the use of automated software to lacte computers that have open ports and are vulnerable to unauthorized access
best fit
the width of the column will be increased or decreased so that the widest entry will fit in the column
internet
the world-wide communication infrastructure that links computer networks using TCP/IP
power-on self-test
third step in the boot process
margins
those portions of a printed page outside the main body of a printed document and always are blank when printed
music collection, a university's students records, a company's customer information
three examples of data that a database can contain
microsoft access, filemaker pro, open office base
three examples of database software
microsoft powerpoint, iwork keynote, open office impress
three examples of presentation software
technical management of the Internet's domain system, the allocation of IP addresses, the assignment of protocol parameters
three things the global organization ICANN oversees
category names
titles in a given range that identify the slices of a pie chart
circumstance to press the enter key
to begin a new paragraph
deletions
to delete or take away from a document
maximize
to enlarge the window so that it fills the entire screen
enter
to enter a blank line in a document press the ______key without typing any text on the line
circumstance to press the enter key
to insert a blank line between texts
view ruler check box
to remove or display rulers, click on the ribbon to display the view tab and then click on this
circumstance to press the enter key
to respond to questions or prompts in Word dialog boxes, task panes, and other on-screen objects
reset
to return a graphic to its original size, click the size dialog box launcher, click the size tab, and click the _____ button
one page
to see the entire page on the screen at once, click view on the ribbon to display the view tab | Zoom group, and click the ______ button
ctrl
to select nonadjacent items, select the first item, press and hold down the ______ key and select other items
circumstance to press the enter key
to terminate a short line of text and advance to the next line
first line indent marker
top triangle at the 0" mark on the ruler that indents only the first line of the paragraph
file transfer protocol
transfers files between local and remote host computers
true
true or false: all commands on the mini toolbar also exist on the ribbon
false
true or false: the remove keytips from the screen, press the CTRL key until all keytips disappear
sound recorder, audacity
two audio editing software that you might use
microsoft excel, openoffice calc
two examples of spreadsheet software
microsoft word, openoffice writer
two examples of word processing software
fingerprint, handprint
two physical traits used to authenticate a person
to help reduce downtime, maintain the best working conditions
two reasons to use risk management
corel paintshop pro/ adobe photoshop
two sophisticated paint programs
right align
type of alignment Excel uses for values as numbers
paint software/image editing software
type of software used to create a sophisticated logo
text message
typed messages you send using your smartphone, or mobile device
publications types in Publisher
typical publications used by desktop publishers
columns
typically contain information that helps t group the data in the worksheet
rows
typically contain information that is similar to items in a list
node
typically contains the network hardware, including computers, networked peripherals, or network devices; what each connection point on a network is referred to as
information theft
unauthorized access to a computer system, such as military or government computers, to gain restricted information
data diddling
unauthorized alterations to data stored on a computer system, such as a student changing grades stored in a school's computer
identity theft
unauthorized copying of person information, such as credit card numbers, passwords, social security numbers, and bank account PINs; when your personal data is used illegally
red wavy
underline that indicates the flagged text is not in Word's dictionary (because it is a proper name or misspelled)
green wavy
underline that indicates the text may be incorrect grammatically
blue wavy
underline that indicates the text may have a contextual error
ctrl shift w
underline words, not spaces
points
unit of measurement the height of the characters is gauged by - 1/72 of a height
spam
unwanted electric junk mail that arrives in your online mailbox
spam
unwanted electronic junk mail that arrives in your email inbox
securedigital card
use a card reader to copy data from the card to a computer
keyboard shortcut
use this instead of the ribbon to format the text when you hands are already on the keyboard
system software
used by the computer for tasks that help the computer work
communications channel
used for transporting data over a network
statistical software
used to analyze large sets of data in order to discover relationships and patterns
pointing device
used to change the location of the insertion point
spell checker
used to check a worksheet for spelling errors
min function
used to determine the lowest number in a given range
apostrophe
used to identify numbers as text
scanner
used to input data onto the computer that already exists on paper
accounting software/finance software
used to keep a record of monetary transactions and investments
audio editing software
used to make digital voice and music recordings; typically includes playback as well as recording capabilities so you can preview your work and make changes as needed
layouts
used to position content on a slide
storage device
used to store data on a computer or to share data among computer; both input and output device
laser mouse
uses a laser as the light source to track mouse movement
optical mouse
uses an LED and computer chip to track your mouse movements as a light beam bounces off a hard surface, such as a desk
IEEE
uses numbers to designate different network standards
laser printer
uses technology that produces dots of light on a light-sensitive drum
internet piracy
uses the web as a way to distribute unauthorized software illegally
plagiarize
using someone else's work and claiming it to be your own
workstations
usually powerful desktop computers designed for specialized tasks that require a lot of processing speed, such as medical imaging, full-motion video graphics, and computer-aided design
gadgets
usually start automatically when a computer boots, and they remain on the desktop until the computer is shut down
security utility
utilities that scan incoming and outgoing files to be sure they are safe
antivirus software
utility software that looks for and removes viruses, Trojan horses, worms, and bats
password
verifies a user ID and guarantees that you are the person you claim to be
two factor authentication
verifies identity using two independent elements of confirmation
values
version of a worksheet that shows the results of formulas
formulas
version of the actual formulas you have entered
time bombs
viruses that deliver their payloads on a specific date
charts
visual representations of data in Excel spreadsheets
random access memory (RAM)
volatile storage used by a computer
launch program, manage files, get help, customize the user interface environment, configure equipment and install and uninstall programs
ways to use an operating system
completely automated public turing test to tell computers and humans apart
what CAPTCHA stands for
multiple input multiple output
what MIMO stands for
personal identifier number
what PIN stands for
plain old telephone serice
what POTS stands for
uninterruptible power supply
what UPS stands for in the context of protecting computers from power problems
uniform resource locator
what URL stands for
background repagination
what Word refers to the automatic page break task as
slide show
what a PowerPoint presentation is also called
card reader
what a solid-state storage card requires to transfer data to or from a computer
note reference mark
what a superscript is used as to signal that a note exists either at the bottom of the page or at the end of a document
milliseconds
what access time is measured in
bot
what an intelligent agent that behaves somewhat like a robot is called
system software
what an operating system is classified as; primary purpose is to help the computer system monitor itself in order to function efficiently
commands
what each group in a tab contains a related collection of
pirated software
what illegal copies of software are referred to as
at symbol
what is this: @
kilobits per second
what kbps stands for
folder windows
what most users rely on for finding, viewing, and managing information on their computers
sections
what pages are grouped into
dots per inch (dpi)
what resolution is measured in
folder
what sections are placed into
exactly
what the line spacing may be set to if the top of a set of characters or a graphical image is chopped off
pages
what the notes that the OneNote Notebook consists of are placed on
active cell entry
when Excel is in Edit mode, this displays in the formula bar
multitasking
when more than one program is running at a time
right aligned
when text and/or graphics print at the right margin
hanging indent
when the first line hangs to the left of the rest of the paragraph
format
when you emphasize certain entries and make the worksheet easier to read and understand
presentation
when you explain or talk about a slideshow that was made on PowerPoint
additions
when you omit text from a document and want to insert it later
keyboard shortcut
when you perform tasks using the keyboard, you press one or more keyboard keys
formula bar
where Excel displays the entry
notebook
where all activity in OneNote takes place; where the pages of notes are placed
thumbnail pane
where miniature views of the individual slides are displayed
Access work area
where you work on objects such as tables, forms, and reports
sizing handles
white squares that you can drag to change the size of the title text placeholder; can also be found within an office app
hackers/crackers/black hats/cybercriminals
who malware is created and unleashed by
wifi protected access 2
wi-fi protected access that uses the same kind of strong encryption required by government agencies and businesses
software
word processing software
note text
words that are placed to the side of a document that correspond with the information in the document
processing
working with data in many ways
always on connection
you are always on the Internet and you stay connected as long as your browser is open
summarize or paraphrase
you must acknowledge the source when you_____ or_________
software
you must install_________before you can use it, unless you are using web apps.
user ID
your unique identifier on a computer or Web page