Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
111 Cards in this Set
- Front
- Back
The gathering together of groups of people using online tools to connect and exchange ideas
|
social networking
|
|
The type of computing that relates to emotion or deliberately tries to influence emotion
|
affective computing
|
|
Wearable devices that hang around your neck consisting of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology
|
Sixth sense
|
|
A crisis mapping tool that can collect information to make instantly and publicly available for use in emergencies
|
Ushahidi
|
|
unwanted email
|
spam
|
|
The first word processing application to be used on personal computers
|
Wordstar
|
|
The company that approached Bill Gates to write an OS program for the PC in 1980
|
IBM
|
|
The personal computer that was chosen as "machine of the year" by Time magazine
|
IBM PC
|
|
What was Grace Hopper's greatest contribution to computing?
|
the compiler, a program that translates English language instructions into computer language
|
|
Which company developed the first commercial Internet web browser?
|
Mosaic
|
|
What type of computer chips are specially designed to reside inside other devices such as your car?
|
embedded computers
|
|
What are computer programs that enable the hardware to perform different tasks called?
|
application programs
|
|
What term describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular?
|
legacy technology
|
|
What component housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips?
|
power supply
|
|
What device enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer?
|
input device
|
|
What do Instant messaging (IM) services and programs enable you to do?
|
communicate with others in real time
|
|
In the URL http://www.prenhall.com, what is the portion labeled .com called?
|
top-level domain
|
|
E-commerce that involves businesses buying and selling goods and services to other businesses is called what?
|
Business-to-business (B2B)
|
|
What is a webcast?
|
a broadcast of audio or video content over the Internet
|
|
Name the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.
|
relativism
|
|
Intellectual property (such as music, writing, and software) is protected through what type of law?
|
copyright law
|
|
What describes a person who does not conform to a set of approved standards of social or professional behavior?
|
unethical behavior
|
|
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of?
|
internet censorship
|
|
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called?
|
shareware
|
|
What are some applications of GPS software?
|
navigation, freight tracking, Google maps
|
|
Applications used for creating budgets is an example of what type of software?
|
financial planning software
|
|
Microsoft Word and OpenOffice.org Writer are examples of what type of software?
|
word-processing software
|
|
Describe the Windows Recycle Bin
|
location for deleted files and folders from the C drive only; deleted files can be located easily before Recycle Bin is emptied
|
|
Where would you find all of the different configurations used by the OS and by other applications?
|
registry
|
|
What software is required for all computer systems to run?
|
system software
|
|
Describe OpenOffice
|
a free suite of productivity software programs that provides functionality similar to that of Microsoft Office
|
|
List several examples of open source operating systems discussed in the text
|
OpenOffice; MySQL; Thinkfree Online Office
|
|
What is the Linux distro?
|
various packages of Linux available for download; different makes and models similar to that of automobiles
|
|
What characteristic describes hard drives?
|
non-volatile
|
|
Where would you look to determine the amount of RAM on a computer?
|
system properties window
|
|
What technology supports fast transfer rates of 10 Gb/s?
|
Ethernet
|
|
Which is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
|
router
|
|
Each device connected to a network is called a ?
|
node
|
|
What are network adapters?
|
devices that enable the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
|
|
How many bits are needed to describe a single alphabetic or special character?
|
8 bits (1 byte)
|
|
What contains the central electronic components of the computer?
|
motherboard
|
|
How many bits are used by Unicode to code character data?
|
16 bits
|
|
What is LogMeIn?
|
a website that allows you to access the files on your computer from your cellphone without installing any software on you cellphone
|
|
What is the technical name for Text messaging?
|
short-message-service (SMS)
|
|
What is the name of the single cable that carries all audio and video information from devices connected to a TV to the TV itself?
|
HDMI cable
|
|
How do hackers access your computer?
|
by entering indirectly through the computer's internet connection through open logical ports; must know the computer's IP address
|
|
What are the rules for creating a password?
|
should contain at least 14 characters and include numbers, symbols, and upper- and lower-case letters
|
|
List the members of a systems development team
|
system analysts; programmers; project managers; technical writers; network engineers, database developers
|
|
What job title is responsible for staffing the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person?
|
helpdesk analysts
|
|
List the steps of the system development life cycle
|
problem/opportunity identification, analysis, design, development and documentation, testing and installation, maintenance and evaluation
|
|
How is information represented?
|
output
|
|
Describe the organization of data in a multidimensional database
|
organized in cube format
|
|
What is the job title of an individual trained in the design and building of databases?
|
database administrator (database designer)
|
|
What device can serve as a hardware firewall on a computer network?
|
router
|
|
Describe IPv4
|
Internet protocol version 4; original IP addressing scheme; had up to 4 billion values for an address field
|
|
What is computer literacy?
|
being familiar enough with computers that you understand their capabilities and limitations and know how to use them
|
|
What is it called when a programming job is sent to other countries?
|
offshoring
|
|
What legacy computer used switches on the front to enter data?
|
Altair 8800
|
|
List several reasons for the popularity of the Apple II computer
|
had color, sound, & game paddles; the program that made the computer function when the power was first turned on (operating system) was stored in read-only memory (ROM) which encouraged less technically oriented computer enthusiasts to try writing their won software programs
|
|
What file extension is found at the end of a Microsoft Access file?
|
.accdb
|
|
List examples of permanent storage
|
ROM, hard drives, flash drives, memory cards,CDs, DVDs, BluRays
|
|
What name is given to large, expensive computers that support hundreds of users simultaneously?
|
mainframes
|
|
Describe the function of browsers
|
software installed on a computer system that allows individuals to locate, view, and navigate the Web
|
|
What are the forms of cyberbullying?
|
-bombarding a victim with harassing instant messages or text messages
-stealing a password and then using the victim's account to embarrass the victim by sending harassing, threatening, or lewd messages while pretending to be the victim -spreading rumors or lies on social networking sites -posting embarrassing photos or videos on the Web -infecting the victim's computer with malware, usually to spy on the victim |
|
List examples of system software capabilities
|
Operating System (OS)-manages the computer's hardware, including the CPU, memory, and storage devices, as well as peripheral devices such as the monitor and printer; provides a consistent means for software applications to work with the CPU, and it is responsible for the management, scheduling, and coordination of tasks as well as system maintenance; your first interaction with the OS is the user interface, the features of the program such as the desktop, icons, and menus that allow the user to communicate with the computer system
utility programs- small programs that perform many of the general house-keeping tasks for the computer, such as system maintenance and file compression |
|
List examples of Web-based software discussed in the text
|
Google Docs, Thinkfree Online Office, Zoho
|
|
What types of slots are found on notebook computers?
|
USB, HDMI, sound, memory card, Ethernet, phone jack
|
|
What is throughput?
|
the actual speed of data transfer that is achieved; it is usually less than the data transfer rate and is measured in Mbps
|
|
What type of semiconductor material is used to make transistors?
|
silicon
|
|
List the advantages of VoIP
|
-for people who make many long-distance phone calls, the advantage of VoIP is it's free or low cost
-portability is another advantage because all you need is an Internet connection |
|
How does a multipartite virus evade detection?
|
infects multiple file types in an effort to fool the antivirus software that is looking for it
|
|
How does a polymorphic virus evade detection?
|
changes its own code or periodically rewrites itself to avoid detection
|
|
How does a worm evade detection?
|
takes advantage of file transport methods, such as e-mail or network connections, to spread on its' own
|
|
How does a stealth virus avoid detection?
|
temporarily erases its' code from the files where it resides and then hides in the active memory of the computer
|
|
Which job titles would design Web-based multimedia content?
|
video producers, graphic designers, animators
|
|
What variable declaration tells the operating system to allocate storage space?
|
CPU
|
|
Which Management Information systems provide reports to show conditions that are unusual or need attention from users of the system?
|
exception reports
|
|
What needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate?
|
network adapter
|
|
series of tags that modify the display of text
|
HTML-original standard
XHTML- newer standard |
|
What enables your computer to connect to other computers or to the Internet?
|
Network Interface Card (NIC)
|
|
What would you use if you wanted to keep a written online journal?
|
web log (blog)
|
|
What are the advantages and disadvantages of Social media sites?
|
-provide ways for members to communicate w/ friends through voice, chat, IM, videoconference w/out having separate communication accounts
-privacy issues are a concern |
|
What type of software installation allows you to decide which features you want to install on the hard drive?
|
custom installation
|
|
What are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games?
|
gadgets
|
|
What is the number of bits the video card uses to represent each pixel on the monitor called?
|
bit depth
|
|
What term describes how the number of times an analog wave is measured each second during an analog-to-digital conversion?
|
sampling rate
|
|
the most natural of programming languages; problem is considered as a series of facts or constraints instead of as a specific algorithm
|
fifth-generation language
|
|
What is the main suite of protocols used on the Internet?
|
TCP/IP
|
|
computer jobs that include programmers, system analysts, project managers, technical writers, network engineers, and database developers
|
system development jobs
|
|
jobs in which include interfacing with users (external customers or employees) and troubleshoot their computer problems; include help-desk analysts & computer support technicians
|
support services
|
|
job department that keeps the networks and telecommunications up and running at all times; include network administrators, database administrators, web server administrators, & telecommunications technicians
|
Information systems
|
|
What programming language revolutionized the software industry because because beginning students could learn it easily?
|
BASIC (Beginner All-purpose Symbolic Instruction Code)
|
|
on the Office Ribbon, the name of each activity area on the Office Ribbon
|
tab
|
|
custom file properties that you create to help find and organize your own files
|
tag
|
|
a rectangular area on a computer screen in which programs and content appear, and which can be moved, resized, minimized, or closed
|
window
|
|
How is information entered into the computer?
|
through input devices
|
|
a menu that displays commands and options relevant to the selected text or object
|
shortcut menu
|
|
a round button that allows the user to make one selection from among several choices
|
option button
|
|
a view of a document as it will appear when you print it
|
print preview
|
|
What are the individual pages of an Excel document called?
|
sheets
|
|
What is created when a row and a column intersect in Excel?
|
cell
|
|
Where are the number, view, and zoom buttons displayed in the current cell mode?
|
status bar
|
|
What is another name for a text value?
|
label
|
|
What are two or more cells that Excel treats as a single unit called?
|
range
|
|
What is displayed on the Formula Bar?
|
the value or formula displayed in the active cell
|
|
decorative formats such as shadowed or mirrored text, text glow, 3-D effects, and colors that make text stand out
|
text effects
|
|
What is the difference between an inline object and a floating object?
|
an inline object is an object or graphic inserted in a document that acts like a character in a sentence while a floating object is a graphic that can be moved independently of the surrounding text characters
|
|
effects that include borders, shadows, and reflections
|
picture styles
|
|
details about a file that describe or identify it, including the title, author name, subject, and keywords that identify the document's topic or contents; also known as metadata
|
document properties
|
|
What would you turn on in order to view the small characters that display on the screen to show the location of paragraphs, tabs, and spaces?
|
formatting marks
|
|
The space between the text and the top, bottom, left, and right edges of the page is called the_____.
|
margin
|