Digital literacy
having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies
Computer
electronic device, operating under the control of instructions stored in its own memory (laptop, tablet, desktop, server)
Memory Card
removable flash memory, usually no bigger than 1.5 inches, that you insert in and remove from a slot in a computer, mobile device, or card reader
Web Server
computer that delivers requested webpages to your computer or mobile device
HDMI, USB, Lightening
ports that can be used for audio
Host
any computer that provides services and connections to other computers on a network
Tools or utilities
programs that enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers an mobile devices
Custom Software
software that performs functions specific to a business or industry
Trojan Horse
destructive program disguised as a real program
Resolving name, TLD, Root, DNS, authoritative
server types that are used when finding an IP address using the DNS process
Information
conveys meaning and is useful to users
Software
consists of a series of related instructions that tells the computer what tasks to perform and how to perform them
SSDs
memory that is very durable and shock resistant
VoIP
enables users to speak to other users over the internet
Byte
basic storage unit on a mobile device; represents a single character
gov, org, net
valid TLDs
Registar
organization that sells domain names
Tower
house of desktop's system; unit made of metal
Linux
operating system besides Windows and Mac OS
file type that Adobe Reader allows you to view
Botnet
group of compromised computers connected to a network that attacks other networks
DDoS Attack
a zombie army is used to attack computers or networks
Firewall
hardware/ software that protects a network's resources from intrusion
PIN
acronym for personal identification number
Keygen
can be used to create a software registration number, sometimes illegally
ARPANET
root of the Internet that became functional in 1969; linked scientific and academic researchers across the US
DSL
technology that provides high-speed internet connection using the telephone network
Megabyte
equal to approximately one million characters
Streaming
process of transferring data in a continuous and even flow, which allows users to access and use a file while its transmitting
Blade Server
type of server that exists in the form of a single circuit board
MMS
term for the picture/video message service on smartphones and other mobile devices
127
number of peripheral devices that you can connect with a USB port
Personal Firewall
utility that detects and protects a computer from unauthorized intrusions
Malware
viruses, worms, Trojan horses, and rootkits are classified by
Spoofing
technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Backing Up
refers to making a copy of a file
Full Backup
copies all of the files in a computer
Spyware
collects information about users web browsing habits
Print Layout View
default view in Word
Font
defines the appearance and shape of letters, numbers, and special characters
11
default font size in Word
.docx
identifies a Word 2013 document
Backspace
key to erase one character left of the insertion point
Delete
key to erase one character to the right of the insertion point
Headers and Footers
can include text, graphics, current date, page number, and current time
Horizontal Ruler
provides a quicker way to indent paragraphs
AutoCorrect
feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them
ESC
key to press if you want to remove AutoCorrect options button from the screen
(Office) Clipboard
temporary storage area
Synonym
word similar in meaning to a given word; found in a thesaurus
Clip Art
predefined graphic
Bullet
another name for a dot symbol
.5
tabs are placed this far apart by default on the ruler
Something you know, something you have, something you are
3 forms of authenication
Manage Sources
located in the References tab; allows you to enter or edit sources that you use in the paper
Insert Citation
located in the References tab; inserts a citation in the selected format after the cursor
Placeholder
located in the References tab; inserted as parentheses when you don't feel like entering the source information at that moment
Show All Bibliography Fields
located in the References tab; shows all of the available options that can be filled in when creating a citation or source
Theme
located in the design tab; set of colors that are used in the document
Caption
typically under a picture or chart that may explain or list the source
Excel Worksheet
allows data to be summarized and charted easily
Left-Aligned
how the text in a cell is aligned by default
Colon
used to separate the beginning and end cell references in a range
CTRL+B
shortcut used to apply the bold font style
10
number of chart types Excel offers
PowerPoint Presentation
can help deliver a dynamic, professional message to an audience
Document theme
specific design with coordinating colors, fonts, and special effects
Variants
alternate designs that exist for each theme
Title
PowerPoint assumes that every slide, except a blank side, has one of these
Demoting
creating a lower-level paragraph in a multilevel bulleted list
Contrast and Brightness
changed when a photo's color intensity is modified
WordArt Styles
allows you to type a new text or convert existing text into WorkArt
Solid Fill
one color used throughout the entire slide
Bring to Front
moves a stacked object to the top of the stack
Trim Video
allows you to set the timing for a video clip
Animation
includes special visual and sound effects applied to text or other content
Motion Path, Entrance, Emphasis, and Exit
four types of animations in PowerPoint
Solid State Drive
safest storage type for backing up a computer
Peripheral Device
examples of this device are keyboard, mouse, microphone, monitor, printer, USB, flash drive, scanner, webcam, speakers
Authenication
process of identifying someone or making sure something is what it says it is
Authorization
determines what is allowed to be done and by whom
Defragmenting
process of reorganizing files on a systems computer into unused space on the hard disk; increases functionaility because files are easier to access and programs run faster
Productivity Software
helps the user to be more productive and efficient when tasks are being completed on the compputer
Graphics and Media Software
designed for a specific field of work, but similar to Productivity software
Personal Interest Software
designed for entertainment, lifestyle, medical, educational, and other personal uses
Communications Software
used to help people share information with others in easier and more effective ways
Security Software
used to protect a device (ex. firewall)
File and Disk Software
used to perform maintenance tasks, helping to manage the computer
Internet
worldwide collection of networks that connect millions of businesses, government agencies, educational institutions, and individuals
Web
consists of a worldwide collection of electronic documents
Website
collection of related webpages
Browser
software that enables users with an Internet connection to access and view webpages
Green Computing
involves reducing the electricity consumed and environmental waste generated when using a computer
Software Developer
someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information
Communication Device
hardware capable of transferring items from computers and devices to transmission media and vice versa
Network
collection of computers and devices connected together via communications devices and transmission media
IP Address
sequence of numbers that uniquely identifies each computer or device connected to the internet
Domain Name
text-based name that corresponds to the IP address
DNS Server
translates the domain name into its IP address
Graphic
digital representation of nontext information
FTP (File Transfer Protocol)
Internet standard that permits file uploading and downloading to and from other computers on the Internet
Personal Computer
a computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time
Desktop
personal computer designed to be in a stationary location
Server
computer dedicated to providing one or more services to other computers or devices on a network
Mainframe
large, expensive, powerful server that can handle hundreds or thousands of connected users simultaneously
Terminal
a computer, usually with limited processing power, that enables users to send data to and/or receive information from a server or host computer (ex. ATM)
Embedded Computer
special-purpose computer that functions as a component in a larger product (ex. GPS in a car)
Port
Point at which a peripheral device attaches to or communicated with a computer or mobile device so that it can send data or receive information from the computer or device
Connector
joins a cable to a port
Ergonomics
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
App
consists of programs designed to make users more productive and/or assist them with personal tasks
Software Suite
collection of individual programs available together as a unit
Antivirus Program
protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage, or on incoming files
Digital Security Risk
any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
Computer Crime
any illegal act involving the use of a computer or related devices
Back Door
program or set of instructions in a program that allow users to bypass security controls
Biometric Device
authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Product Activation and License Agreement
how manufacturers protect against software threat
Encryption
process of converting data that is readable by humans into encoded character to prevent unauthorized access
Digital Signature
encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
Information Privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Cookie
small text file that a web server stores on your computer
Adware
program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other internet services
Social Engineering
gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature/naivety of victims
Content Filtering
the process of restricting access to certain material on the web
Wordwrap
allows you to type words in a paragraph continually w/o pressing the ENTER key at the end of each line
Format
change the appearance of something (ex. paragraph, character)
Point
one is 1/72 of an inch
Shade
when the rectangular area behind any text or graphics is colored
Color Scheme
a document theme that identifies 12 complementary colors for text, background, accents, and links in a document
Style
named group of formatting characteristics
Line Spacing
amount of vertical space between lines of text in a paragraph
Deck
refers to the collection of slides in a presentation
Layout
specifies the arrangement of placeholders on a slide (determined by using the layout gallery)
Normal View
default view in PowerPoint and Excel
Slide Transition
a special effect used to progress from one slide to the next
Weight
thickness of a line
Gradient Fill
one color shade gradually progressing to another shade of the same color as the background
Pattern Fill
adds designs that repeat in rows across the slide
Picture Fill
specific image that simulates a material as the background of a slide
Range
series of two or more adjacent cells in a column or row or rectangular group of cells
Relative Reference
each adjusted cell reference in Excel
Data Series
refers to the entries selected to be included in the chart
Function
a pre-written formula that is built into Excel
Point Mode
allows you to select cells for use in a formula by using your finger or the pointer
Range Finder
checks which cells are referenced in the formula assigned to the active cell
Best Fit
the width of the column will be increased or decreased so that the widest entry will fit into the column
Assumptions
values in cells that you can change to determine new values for formulas
Absolute Cell Reference
instructs Excel to keep the area (ex. $B$14)
Relative Cell Reference
instructs Excel to adjust the cell reference as it copies to the destination area (ex. B4)
Mixed Cell Reference
a cell reference with only one $ before either the column or row (ex. $B14)
IF Function
when you want to assign a value to a cell based on a logical test (=IF(logical_test, value_if_true, value_if_false))
Nested IF Function
the action to be taken for the true or false includes another IF function
What-if Analysis
scrutinizes the impact of changing values in cells that are referenced by a formula in another cell
Microsoft Access
referred to as a database management system; software that allows you to use a computer to create a database; add, change, and delete forms and reports using the data