Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
112 Cards in this Set
- Front
- Back
performs tens of thousands of specific tasks
the end‐user needs, like creating a budget for accounting, creating a resume, or making a professional presentation. |
Application Software
|
|
software has been developed by hundreds,
even thousands of people and is constantly evolving to meet the infinite needs of the end‐user, so the chances of application software not fulfilling a user’s needs are remote. |
Commercial Application
|
|
Software manufacturers like Microsoft and Mac produce business application software and sell them in packages called
|
Software Suite/Productivity Suite
|
|
allow a user to make document files. Documents
can be created, updated through editing, saved to secondary storage, and eventually printed. Word processing applications are often taken for granted because of their ease of use relative to other business software applications and the perception of singular use. |
Word processors
|
|
A word processor document can also be saved as a web page for the
World Wide Web, and often times in a business environment, an Intranet, which allows an organization to communicate essential information for operations. Intranet human resources manuals, policies and procedures, knowledge bases, and many other essential functions can be created in a word processor and posted directly, including images and hyperlinks. |
Word Processor Documents...
|
|
presents an interface in grid of information separated
by columns and rows, often financial information that is capable of calculation and graphing and most importantly “what if” analysis graphing, importantly, what‐analysis. |
Spreadsheet Software
|
|
The intersection of a column and row
|
Cell
|
|
Text or Numeric
|
A Cell holds two types of entries...
|
|
is well thought‐out
collection of files that consist of records (rows) of data separated by fields (columns) that can be queried (questioned) to produce subsets of information |
Database Software
|
|
allows businesses to store their history in
relational databases |
Data Warehousing
|
|
where businesses store their history in relational databases.
|
Corporate Memory
|
|
are used to display
information typically in a slide show. |
Presentation Application Programs
|
|
The most important aspect of application software.
|
Sharing Data and Information
|
|
Productivity suites have three ways of sharing information between
applications: |
Cut and Paste ‐ static
Object embedding ‐ static Object linking ‐ dynamic |
|
are application
programs that enable an end‐user to manipulate visual images on a computer. |
Image editing softwares
|
|
Computer graphics are classified in two categories:
|
Raster graphics
Vector graphics |
|
is a graphics editing application
software and the current market leader for commercial business bitmap, image, and photographic manipulation and has been described as the industry standard for graphics professionals. |
Adobe Systems Photoshop
|
|
is specialized application software that allows a user to create, publish and administer web sites on the World Wide Web through
publish, the use of a WYSIWYG interface. (WYSIWYG is an acronym for “What You See Is What You Get”). |
Web Authoring Application Software
|
|
is to post a website on
the World Wide Web (WWW) or a corporate Intranet. In business, it is important to know which web authoring products are appropriate for which task. |
Ultimate Goal of Web Authoring Programs
|
|
Professional web site designers must take into consideration many
factors for a good website. |
Intention, Viewers, Content, Design Layout, Search Engine Optimization
|
|
One of the most powerful web authoring programs in the business
environment is |
Microsoft Office Sharepoint Designer
|
|
which allows
corporate webmasters and content managers to Create and administer web pages like other commercial web authoring software and intranets. |
Microsoft Office Sharepoint Designer
|
|
is a GUI element composed of a strip across the top of the window that exposes all functions the program can perform in a single
place. |
Ribbon
|
|
Multiple windows that represent multiple applications
can be used at the same time |
Multi-Tasking
|
|
Presented on the user’s monitor in rectangular boxes called:
|
Windows
|
|
Type of document file that can be used
regardless of operating system platforms |
Platform Neutral
|
|
is used by businesses generally to
combine and manipulate text, graphics, audio, and video into a format like presentation software. |
Multimedia application software
|
|
is an electronic method of composing, sending,
storing and receiving messages over electronic communication storing, systems. |
Email
|
|
is a personal information manager that facilitates
tracking and managing personal information. |
PIM
|
|
systems are application software
that attempts to integrate all data and processes of an entire business into one integrated system. A key feature of most ERP systems is the use of an integrated database that stores data for the assorted system modules, like accounting and human resources functions. |
Enterprise Resource Planning (ERP)
|
|
Most common ERPs:
|
SAP AG, the
largest software enterprise in Europe; PeopleSoft and SAS Systems, which specialize in manufacturing, financial, human resources, and customer management. |
|
Collaboration is a method of mutual learning between two or more
people who are working together towards a common goal. |
Collaboration
|
|
is basically a conversation
with two or more participants to trade information and ideas, and also to build relationships. |
Conversational Interaction
|
|
is software that manages and controls the physical hardware of a computer so that
application software can work. |
System Software (Firmware)
|
|
are the programs that help an end‐user do a particular task.
|
Application Software
|
|
Loading the platform into the computer’s memory is called:
|
Booting
|
|
Powering up a computer on for the first time is called:
|
Cold Boot
|
|
a computer that is restarted while it was already
running is called: |
Warm Boot
|
|
basic input/output system
|
BIOS
|
|
is firmware programming embedded in to a computer
chip, meaning the computer runs the same program every time it’s turned on. |
BIOS
|
|
On a typical business computer, once the BIOS locates a hard drive,
it is able to execute instructions and programming that loads the operating system. The operating system in turn takes control and configures the computer’s hardware to settings stored in a database called: |
Registry
|
|
Virus protection
programs are considered to be: |
System Utilities
|
|
it is extremely important that the operating system
_____________ a user to determine if they are the computer’s appropriate user. |
Authenticates
|
|
The business computer authenticates users by
requiring them to: |
Login and load user profile
|
|
Whether a computer is multitasking or just running singular
application software, system software needs to carefully _______________________ the computer’s available memory. |
Allocate and Manage
|
|
, the system software
needs to switch, or________information in and out of RAM as needed based on the RAM’s capacity |
Swap
|
|
is actually the technique of breaking files
requested from a secondary memory like a hard drive into smaller, more manageable files that can fit into RAM. |
Virtual Memory
|
|
These smaller files
that represent pieces of larger files are called: |
Pages or Swap Files
|
|
Since a computer is a binary system that only understands machine
code, it needs special programs called_________ to make input and output devices operate properly. |
Drivers
|
|
is what the user sees on the monitor and provides
means in which a person can interact with the computer system, whether they are inputting to manipulate the system, or receiving output from their manipulation. |
User Interface
|
|
All system software needs to:
|
input and output data and information
|
|
The most common aspect of all major operating system user
interfaces is that they present data and information in a graphical manner, and are therefore referred to as: |
Graphical User Interface (GUI)
|
|
provide vital information about
folders and files as well, and offer tools to navigate and organize the computer’s “filing cabinet”;allow the user to search for computer files based on almost any criteria. |
File Managers
|
|
Name the four File Management Features commonly used:
|
File name, Modification Date, File Type, File Size
|
|
is a utility that that moves positive and negative charges to
the innermost tracks of a disk which in turn reduce the amount of time it takes the read/write arm to save or erase data and information. Fragmented files become defragmented and more efficiently stored resulting in better and faster disk performance. |
Defrag
|
|
is a program that copies data
from a computer’s hard drive to a backup device. |
Backup Utility
|
|
are system software that identifies known viruses and attempts to block them from entering and infecting a
computer system. |
Antivirus Utilities
|
|
To compensate for any operating system inadequacies, companies
like Microsoft offer a system software utility called: |
System Update
|
|
New or modified programming
|
Patches
|
|
is the practice of using computing resources
efficiently while reducing the use of hazardous materials, maximizing energy efficiency, promoting the recyclability of defunct products, and reducing factory waste during the computer’s manufacturing process. |
Green Computing
|
|
Computers use power, lots of it. Since virtually all businesses use
computers, they need to be concerned with: |
Overall energy costs and ways to reduce that cost.
|
|
evaluates electronic products, many of which are business
computers relative to 51 environmental criteria, 23 of the criteria are required and 28 of the criteria are optional. |
Electronic Product Environmental Assessment Tool (EPEAT)
|
|
encourages manufacturers to reduce the amount of
chemicals or eliminate them altogether whether in the manufacturing process or when the computer is discarded. |
Reduction or elimination of environmentally sensitive materials
|
|
informs the consumer of the percentage of
recycled plastics and offers a declaration of the percentage of renewable/bio‐based plastic material content. |
Materials selection
|
|
means that computer
manufacturers, as well as all electronics manufacturers, inform their consumers about the special handling needs while disposing of their product when it is no longer useful. |
Design for end of life
|
|
encourages manufacturers to
make extended warranties available to their consumers so their products last longer, and also to design the product so it can be upgraded with common tools. |
Product longevity/life cycle extension
|
|
asks manufacturers to make provisions to
take their product back at the end of the product's life cycle. |
End of life management
|
|
means that a manufacturer must
demonstrate a sound corporate environmental policy consistent with International Organization for Standardization and have selfcertified environmental management systems for in place for the design and manufacturing. |
Corporate performance
|
|
requires computer and electronics
manufacturers to reduce or eliminate intentionally added toxins in packaging as well as having separable packing materials with a declaration of recycled content. |
Packaging Criteria
|
|
asks manufacturers to adopt the government’s
Energy Star® specifications. |
Energy conservation
|
|
Personal computer (PC) makers are working diligently to develop
more environmentally friendly systems called |
Green PC
|
|
means a computer is on and being used
|
Active Use
|
|
a special low power mode where power to certain low‐areas of the computer is shut off after a designated period of time.
|
Sleep Mode
|
|
is when a computer turns off automatically when it
has not been used for a specific amount of time designated by the user. |
Standby Mode
|
|
are based on the idea that
businesses can become environmentally friendly, more profitable, and socially responsible through well‐though out implementations of sustainable policies and procedures . |
Green Computing Business Plans
|
|
Reusing paper is a good start, but in
information technology, recycling involves discarding old computers in very conscientious ways because they are filled with harmful chemicals and toxins. |
Responsible Recycling
|
|
Include the bronze,
silver, and gold EPEAT logos, as well as Energy Star® seals, for computer purchasing criteria to evaluate, compare, and select computers. |
Follow EPEAT and Energy Star® Guidelines
|
|
The easiest way to
decrease or eliminate paper consumption is simply to not print documents, ever. |
Decrease or Eliminate Paper Consumption:
|
|
It is gratifying to implement a Green
Computing Business Plan as well as fostering a socially responsible corporate environment; however, do not ignore economic implications for the sake of being “Green”. |
Economic Considerations:
|
|
is essentially a work arrangement where employees
benefit from flexibility in working location and hours. |
Telecommuting
|
|
which is the measure of
the impact human activities have on the environment relative to the amount of greenhouse gases produced, measured in units of carbon dioxide". |
Carbon Footprint
|
|
is two or more computers connected together
to communicate and share resources. The shared resources refer to computer files, folders, software, and also peripheral hardware like printers, scanners, webcams, etc. |
Computer Network
|
|
is a computer network made up of three computers
|
Clients
|
|
Computers which are connected to a central computer called the:
|
Server
|
|
Name two peripheral devices:
|
a printer and a scanner
|
|
Every device connected to a
network is called a: |
Node
|
|
Four Basic Components of a Network:
|
Network Interface
Controller (NIC); protocol, physical cables that connect them together, Hub |
|
allows a
network cable to be plugged in so it can interface, or communicate with other computers. |
Network Interface
Controller Card (NIC) |
|
The most common network protocol is called:
|
Transmission Control
Protocol / Internet Protocol (TCP/IP). |
|
Another common network protocol:
|
User Datagram
Protocol (UDP). |
|
is a central location of the computer network that
serves as a traffic cop for network connection and communication. |
Network Hub
|
|
is software that controls an
entire network; responsible for network traffic control, administering packets, file management, administering certain functions like backup, and security. |
Network operating system (NOS)
|
|
is responsible for smooth network
operations, network performance and implementation of new nodes or even new networks. Once a user is registered with the network, they must provide a password to log on to the network which in turn authenticates their identity and controls access to certain areas of the network |
Network Administrator
|
|
refers to the mapping of a physical network and logical
interconnections between nodes. |
Topology
|
|
is a network topology
where all of the nodes of the network are connected to a common linear backbone with two endpoints. Data is transmitted between the two endpoints and the nodes are connected to this backbone. |
Bus Topology
|
|
name from its star shape
with all of the nodes connected to a common central node in a hub and spoke‐like fashion. The center of the star is the hub which attach to the nodes with spokes. Many times the hub is a server with the networked computers and nodes as clients, thus, a client / server model. |
Star Topology
|
|
topology is shaped like a ring where each
computer (node) is connected to two other computers in the network and with the first and last computers being connected to each other. Data is transmitted between computers from one to another in a circular manner. |
Ring Topology
|
|
is a computer network that is relatively
small, typically in a single building, but sometimes as small as a single room. |
Wide Area Networks (WAN)
|
|
is a computer network that connects
two or more LANs located on a campus, like a university, or an organization’s national headquarters, or even an industrial complex. |
Campus Area Network (CAN)
|
|
is a computer network that
connects two or more LANs or CANs together, but within the boundaries of a town or city. |
Metropolitan Area Network (MAN)
|
|
is a computer network over a wide
geographical area that connects LANs, CANs, and MANs together. Many times, WANs rely on a telephone company’s transmission facilities to connect the smaller networks together. Many large organizations rely on MANs to centralize data and information from its satellite office spread all over a country, and sometimes the world. |
Wide Area Networks (WAN)
|
|
is a computer network that generally
connects computers directly to one another without the use of a server. |
Peer to Peer Networks (P2P)
|
|
starts with a solid understanding of network
threats, and the primary threat is an unwanted user. Network administrators need to adopt policies and procedures that define rules for network access, that determines who is allowed to use the network and to what extent. |
Network Security
|
|
is a secret word, or combination of
keyboard characters typed in by a user to authenticate their identity to a computer network. |
Password
|
|
Network security policies should outline user’s
web access as well as web browsing habits of a user if web access is indeed granted. Some organizations choose to restrict web browsing altogether to avoid potential problems. |
Web Browsing
|
|
policies and procedures are
similar to web browsing policies in that users need to be trained and educated on proper usage. |
Email / Instant Messaging
|
|
Most computer networks refer to network access as
permissions, essentially restricting or granting access to specific files and folders on a computer network to a user or group of users. |
Permissions
|
|
is specialized hardware and software that
insures that only authorized personnel within an organization can use an organization’s Intranet. An intranet is a like a private version of the Internet that works the same way as the Internet, but is confined within an organization. |
Firewall
|
|
Ask the database question, this is also known asking a
|
Query
|
|
Databases can have an absolute profound affect on your business; Databases can also profoundly change your:
|
Best Practice
|
|
Basic files inside a database are called:
|
Tables
|
|
Tables are connected in some way making it a:
|
Relational Database
|