• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/111

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

111 Cards in this Set

  • Front
  • Back
The gathering together of groups of people using online tools to connect and exchange ideas
social networking
The type of computing that relates to emotion or deliberately tries to influence emotion
affective computing
Wearable devices that hang around your neck consisting of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology
Sixth sense
A crisis mapping tool that can collect information to make instantly and publicly available for use in emergencies
Ushahidi
unwanted email
spam
The first word processing application to be used on personal computers
Wordstar
The company that approached Bill Gates to write an OS program for the PC in 1980
IBM
The personal computer that was chosen as "machine of the year" by Time magazine
IBM PC
What was Grace Hopper's greatest contribution to computing?
the compiler, a program that translates English language instructions into computer language
Which company developed the first commercial Internet web browser?
Mosaic
What type of computer chips are specially designed to reside inside other devices such as your car?
embedded computers
What are computer programs that enable the hardware to perform different tasks called?
application programs
What term describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular?
legacy technology
What component housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips?
power supply
What device enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer?
input device
What do Instant messaging (IM) services and programs enable you to do?
communicate with others in real time
In the URL http://www.prenhall.com, what is the portion labeled .com called?
top-level domain
E-commerce that involves businesses buying and selling goods and services to other businesses is called what?
Business-to-business (B2B)
What is a webcast?
a broadcast of audio or video content over the Internet
Name the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.
relativism
Intellectual property (such as music, writing, and software) is protected through what type of law?
copyright law
What describes a person who does not conform to a set of approved standards of social or professional behavior?
unethical behavior
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of?
internet censorship
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called?
shareware
What are some applications of GPS software?
navigation, freight tracking, Google maps
Applications used for creating budgets is an example of what type of software?
financial planning software
Microsoft Word and OpenOffice.org Writer are examples of what type of software?
word-processing software
Describe the Windows Recycle Bin
location for deleted files and folders from the C drive only; deleted files can be located easily before Recycle Bin is emptied
Where would you find all of the different configurations used by the OS and by other applications?
registry
What software is required for all computer systems to run?
system software
Describe OpenOffice
a free suite of productivity software programs that provides functionality similar to that of Microsoft Office
List several examples of open source operating systems discussed in the text
OpenOffice; MySQL; Thinkfree Online Office
What is the Linux distro?
various packages of Linux available for download; different makes and models similar to that of automobiles
What characteristic describes hard drives?
non-volatile
Where would you look to determine the amount of RAM on a computer?
system properties window
What technology supports fast transfer rates of 10 Gb/s?
Ethernet
Which is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
router
Each device connected to a network is called a ?
node
What are network adapters?
devices that enable the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
How many bits are needed to describe a single alphabetic or special character?
8 bits (1 byte)
What contains the central electronic components of the computer?
motherboard
How many bits are used by Unicode to code character data?
16 bits
What is LogMeIn?
a website that allows you to access the files on your computer from your cellphone without installing any software on you cellphone
What is the technical name for Text messaging?
short-message-service (SMS)
What is the name of the single cable that carries all audio and video information from devices connected to a TV to the TV itself?
HDMI cable
How do hackers access your computer?
by entering indirectly through the computer's internet connection through open logical ports; must know the computer's IP address
What are the rules for creating a password?
should contain at least 14 characters and include numbers, symbols, and upper- and lower-case letters
List the members of a systems development team
system analysts; programmers; project managers; technical writers; network engineers, database developers
What job title is responsible for staffing the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person?
helpdesk analysts
List the steps of the system development life cycle
problem/opportunity identification, analysis, design, development and documentation, testing and installation, maintenance and evaluation
How is information represented?
output
Describe the organization of data in a multidimensional database
organized in cube format
What is the job title of an individual trained in the design and building of databases?
database administrator (database designer)
What device can serve as a hardware firewall on a computer network?
router
Describe IPv4
Internet protocol version 4; original IP addressing scheme; had up to 4 billion values for an address field
What is computer literacy?
being familiar enough with computers that you understand their capabilities and limitations and know how to use them
What is it called when a programming job is sent to other countries?
offshoring
What legacy computer used switches on the front to enter data?
Altair 8800
List several reasons for the popularity of the Apple II computer
had color, sound, & game paddles; the program that made the computer function when the power was first turned on (operating system) was stored in read-only memory (ROM) which encouraged less technically oriented computer enthusiasts to try writing their won software programs
What file extension is found at the end of a Microsoft Access file?
.accdb
List examples of permanent storage
ROM, hard drives, flash drives, memory cards,CDs, DVDs, BluRays
What name is given to large, expensive computers that support hundreds of users simultaneously?
mainframes
Describe the function of browsers
software installed on a computer system that allows individuals to locate, view, and navigate the Web
What are the forms of cyberbullying?
-bombarding a victim with harassing instant messages or text messages
-stealing a password and then using the victim's account to embarrass the victim by sending harassing, threatening, or lewd messages while pretending to be the victim
-spreading rumors or lies on social networking sites
-posting embarrassing photos or videos on the Web
-infecting the victim's computer with malware, usually to spy on the victim
List examples of system software capabilities
Operating System (OS)-manages the computer's hardware, including the CPU, memory, and storage devices, as well as peripheral devices such as the monitor and printer; provides a consistent means for software applications to work with the CPU, and it is responsible for the management, scheduling, and coordination of tasks as well as system maintenance; your first interaction with the OS is the user interface, the features of the program such as the desktop, icons, and menus that allow the user to communicate with the computer system
utility programs- small programs that perform many of the general house-keeping tasks for the computer, such as system maintenance and file compression
List examples of Web-based software discussed in the text
Google Docs, Thinkfree Online Office, Zoho
What types of slots are found on notebook computers?
USB, HDMI, sound, memory card, Ethernet, phone jack
What is throughput?
the actual speed of data transfer that is achieved; it is usually less than the data transfer rate and is measured in Mbps
What type of semiconductor material is used to make transistors?
silicon
List the advantages of VoIP
-for people who make many long-distance phone calls, the advantage of VoIP is it's free or low cost
-portability is another advantage because all you need is an Internet connection
How does a multipartite virus evade detection?
infects multiple file types in an effort to fool the antivirus software that is looking for it
How does a polymorphic virus evade detection?
changes its own code or periodically rewrites itself to avoid detection
How does a worm evade detection?
takes advantage of file transport methods, such as e-mail or network connections, to spread on its' own
How does a stealth virus avoid detection?
temporarily erases its' code from the files where it resides and then hides in the active memory of the computer
Which job titles would design Web-based multimedia content?
video producers, graphic designers, animators
What variable declaration tells the operating system to allocate storage space?
CPU
Which Management Information systems provide reports to show conditions that are unusual or need attention from users of the system?
exception reports
What needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate?
network adapter
series of tags that modify the display of text
HTML-original standard
XHTML- newer standard
What enables your computer to connect to other computers or to the Internet?
Network Interface Card (NIC)
What would you use if you wanted to keep a written online journal?
web log (blog)
What are the advantages and disadvantages of Social media sites?
-provide ways for members to communicate w/ friends through voice, chat, IM, videoconference w/out having separate communication accounts
-privacy issues are a concern
What type of software installation allows you to decide which features you want to install on the hard drive?
custom installation
What are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games?
gadgets
What is the number of bits the video card uses to represent each pixel on the monitor called?
bit depth
What term describes how the number of times an analog wave is measured each second during an analog-to-digital conversion?
sampling rate
the most natural of programming languages; problem is considered as a series of facts or constraints instead of as a specific algorithm
fifth-generation language
What is the main suite of protocols used on the Internet?
TCP/IP
computer jobs that include programmers, system analysts, project managers, technical writers, network engineers, and database developers
system development jobs
jobs in which include interfacing with users (external customers or employees) and troubleshoot their computer problems; include help-desk analysts & computer support technicians
support services
job department that keeps the networks and telecommunications up and running at all times; include network administrators, database administrators, web server administrators, & telecommunications technicians
Information systems
What programming language revolutionized the software industry because because beginning students could learn it easily?
BASIC (Beginner All-purpose Symbolic Instruction Code)
on the Office Ribbon, the name of each activity area on the Office Ribbon
tab
custom file properties that you create to help find and organize your own files
tag
a rectangular area on a computer screen in which programs and content appear, and which can be moved, resized, minimized, or closed
window
How is information entered into the computer?
through input devices
a menu that displays commands and options relevant to the selected text or object
shortcut menu
a round button that allows the user to make one selection from among several choices
option button
a view of a document as it will appear when you print it
print preview
What are the individual pages of an Excel document called?
sheets
What is created when a row and a column intersect in Excel?
cell
Where are the number, view, and zoom buttons displayed in the current cell mode?
status bar
What is another name for a text value?
label
What are two or more cells that Excel treats as a single unit called?
range
What is displayed on the Formula Bar?
the value or formula displayed in the active cell
decorative formats such as shadowed or mirrored text, text glow, 3-D effects, and colors that make text stand out
text effects
What is the difference between an inline object and a floating object?
an inline object is an object or graphic inserted in a document that acts like a character in a sentence while a floating object is a graphic that can be moved independently of the surrounding text characters
effects that include borders, shadows, and reflections
picture styles
details about a file that describe or identify it, including the title, author name, subject, and keywords that identify the document's topic or contents; also known as metadata
document properties
What would you turn on in order to view the small characters that display on the screen to show the location of paragraphs, tabs, and spaces?
formatting marks
The space between the text and the top, bottom, left, and right edges of the page is called the_____.
margin