Introduction to Computers- Final Exam

Digital literacy

having a current knowledge and understanding of computers, mobile devices, the internet, and related technologies

Computer

electronic device, operating under the control of instructions stored in its own memory (laptop, tablet, desktop, server)

Memory Card

removable flash memory, usually no bigger than 1.5 inches, that you insert in and remove from a slot in a computer, mobile device, or card reader

Web Server

computer that delivers requested webpages to your computer or mobile device

HDMI, USB, Lightening

ports that can be used for audio

Host

any computer that provides services and connections to other computers on a network

Tools or utilities

programs that enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers an mobile devices

Custom Software

software that performs functions specific to a business or industry

Trojan Horse

destructive program disguised as a real program

Resolving name, TLD, Root, DNS, authoritative

server types that are used when finding an IP address using the DNS process

Information

conveys meaning and is useful to users

Software

consists of a series of related instructions that tells the computer what tasks to perform and how to perform them

SSDs

memory that is very durable and shock resistant

VoIP

enables users to speak to other users over the internet

Byte

basic storage unit on a mobile device; represents a single character

gov, org, net

valid TLDs

Registar

organization that sells domain names

Tower

house of desktop's system; unit made of metal

Linux

operating system besides Windows and Mac OS

PDF

file type that Adobe Reader allows you to view

Botnet

group of compromised computers connected to a network that attacks other networks

DDoS Attack

a zombie army is used to attack computers or networks

Firewall

hardware/ software that protects a network's resources from intrusion

PIN

acronym for personal identification number

Keygen

can be used to create a software registration number, sometimes illegally

ARPANET

root of the Internet that became functional in 1969; linked scientific and academic researchers across the US

DSL

technology that provides high-speed internet connection using the telephone network

Megabyte

equal to approximately one million characters

Streaming

process of transferring data in a continuous and even flow, which allows users to access and use a file while its transmitting

Blade Server

type of server that exists in the form of a single circuit board

MMS

term for the picture/video message service on smartphones and other mobile devices

127

number of peripheral devices that you can connect with a USB port

Personal Firewall

utility that detects and protects a computer from unauthorized intrusions

Malware

viruses, worms, Trojan horses, and rootkits are classified by

Spoofing

technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Backing Up

refers to making a copy of a file

Full Backup

copies all of the files in a computer

Spyware

collects information about users web browsing habits

Print Layout View

default view in Word

Font

defines the appearance and shape of letters, numbers, and special characters

11

default font size in Word

.docx

identifies a Word 2013 document

Backspace

key to erase one character left of the insertion point

Delete

key to erase one character to the right of the insertion point

Headers and Footers

can include text, graphics, current date, page number, and current time

Horizontal Ruler

provides a quicker way to indent paragraphs

AutoCorrect

feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them

ESC

key to press if you want to remove AutoCorrect options button from the screen

(Office) Clipboard

temporary storage area

Synonym

word similar in meaning to a given word; found in a thesaurus

Clip Art

predefined graphic

Bullet

another name for a dot symbol

.5

tabs are placed this far apart by default on the ruler

Something you know, something you have, something you are

3 forms of authenication

Manage Sources

located in the References tab; allows you to enter or edit sources that you use in the paper

Insert Citation

located in the References tab; inserts a citation in the selected format after the cursor

Placeholder

located in the References tab; inserted as parentheses when you don't feel like entering the source information at that moment

Show All Bibliography Fields

located in the References tab; shows all of the available options that can be filled in when creating a citation or source

Theme

located in the design tab; set of colors that are used in the document

Caption

typically under a picture or chart that may explain or list the source

Excel Worksheet

allows data to be summarized and charted easily

Left-Aligned

how the text in a cell is aligned by default

Colon

used to separate the beginning and end cell references in a range

CTRL+B

shortcut used to apply the bold font style

10

number of chart types Excel offers

PowerPoint Presentation

can help deliver a dynamic, professional message to an audience

Document theme

specific design with coordinating colors, fonts, and special effects

Variants

alternate designs that exist for each theme

Title

PowerPoint assumes that every slide, except a blank side, has one of these

Demoting

creating a lower-level paragraph in a multilevel bulleted list

Contrast and Brightness

changed when a photo's color intensity is modified

WordArt Styles

allows you to type a new text or convert existing text into WorkArt

Solid Fill

one color used throughout the entire slide

Bring to Front

moves a stacked object to the top of the stack

Trim Video

allows you to set the timing for a video clip

Animation

includes special visual and sound effects applied to text or other content

Motion Path, Entrance, Emphasis, and Exit

four types of animations in PowerPoint

Solid State Drive

safest storage type for backing up a computer

Peripheral Device

examples of this device are keyboard, mouse, microphone, monitor, printer, USB, flash drive, scanner, webcam, speakers

Authenication

process of identifying someone or making sure something is what it says it is

Authorization

determines what is allowed to be done and by whom

Defragmenting

process of reorganizing files on a systems computer into unused space on the hard disk; increases functionaility because files are easier to access and programs run faster

Productivity Software

helps the user to be more productive and efficient when tasks are being completed on the compputer

Graphics and Media Software

designed for a specific field of work, but similar to Productivity software

Personal Interest Software

designed for entertainment, lifestyle, medical, educational, and other personal uses

Communications Software

used to help people share information with others in easier and more effective ways

Security Software

used to protect a device (ex. firewall)

File and Disk Software

used to perform maintenance tasks, helping to manage the computer

Internet

worldwide collection of networks that connect millions of businesses, government agencies, educational institutions, and individuals

Web

consists of a worldwide collection of electronic documents

Website

collection of related webpages

Browser

software that enables users with an Internet connection to access and view webpages

Green Computing

involves reducing the electricity consumed and environmental waste generated when using a computer

Software Developer

someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information

Communication Device

hardware capable of transferring items from computers and devices to transmission media and vice versa

Network

collection of computers and devices connected together via communications devices and transmission media

IP Address

sequence of numbers that uniquely identifies each computer or device connected to the internet

Domain Name

text-based name that corresponds to the IP address

DNS Server

translates the domain name into its IP address

Graphic

digital representation of nontext information

FTP (File Transfer Protocol)

Internet standard that permits file uploading and downloading to and from other computers on the Internet

Personal Computer

a computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time

Desktop

personal computer designed to be in a stationary location

Server

computer dedicated to providing one or more services to other computers or devices on a network

Mainframe

large, expensive, powerful server that can handle hundreds or thousands of connected users simultaneously

Terminal

a computer, usually with limited processing power, that enables users to send data to and/or receive information from a server or host computer (ex. ATM)

Embedded Computer

special-purpose computer that functions as a component in a larger product (ex. GPS in a car)

Port

Point at which a peripheral device attaches to or communicated with a computer or mobile device so that it can send data or receive information from the computer or device

Connector

joins a cable to a port

Ergonomics

an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

App

consists of programs designed to make users more productive and/or assist them with personal tasks

Software Suite

collection of individual programs available together as a unit

Antivirus Program

protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage, or on incoming files

Digital Security Risk

any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

Computer Crime

any illegal act involving the use of a computer or related devices

Back Door

program or set of instructions in a program that allow users to bypass security controls

Biometric Device

authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

Product Activation and License Agreement

how manufacturers protect against software threat

Encryption

process of converting data that is readable by humans into encoded character to prevent unauthorized access

Digital Signature

encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender

Information Privacy

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Cookie

small text file that a web server stores on your computer

Adware

program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other internet services

Social Engineering

gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature/naivety of victims

Content Filtering

the process of restricting access to certain material on the web

Wordwrap

allows you to type words in a paragraph continually w/o pressing the ENTER key at the end of each line

Format

change the appearance of something (ex. paragraph, character)

Point

one is 1/72 of an inch

Shade

when the rectangular area behind any text or graphics is colored

Color Scheme

a document theme that identifies 12 complementary colors for text, background, accents, and links in a document

Style

named group of formatting characteristics

Line Spacing

amount of vertical space between lines of text in a paragraph

Deck

refers to the collection of slides in a presentation

Layout

specifies the arrangement of placeholders on a slide (determined by using the layout gallery)

Normal View

default view in PowerPoint and Excel

Slide Transition

a special effect used to progress from one slide to the next

Weight

thickness of a line

Gradient Fill

one color shade gradually progressing to another shade of the same color as the background

Pattern Fill

adds designs that repeat in rows across the slide

Picture Fill

specific image that simulates a material as the background of a slide

Range

series of two or more adjacent cells in a column or row or rectangular group of cells

Relative Reference

each adjusted cell reference in Excel

Data Series

refers to the entries selected to be included in the chart

Function

a pre-written formula that is built into Excel

Point Mode

allows you to select cells for use in a formula by using your finger or the pointer

Range Finder

checks which cells are referenced in the formula assigned to the active cell

Best Fit

the width of the column will be increased or decreased so that the widest entry will fit into the column

Assumptions

values in cells that you can change to determine new values for formulas

Absolute Cell Reference

instructs Excel to keep the area (ex. $B$14)

Relative Cell Reference

instructs Excel to adjust the cell reference as it copies to the destination area (ex. B4)

Mixed Cell Reference

a cell reference with only one $ before either the column or row (ex. $B14)

IF Function

when you want to assign a value to a cell based on a logical test (=IF(logical_test, value_if_true, value_if_false))

Nested IF Function

the action to be taken for the true or false includes another IF function

What-if Analysis

scrutinizes the impact of changing values in cells that are referenced by a formula in another cell

Microsoft Access

referred to as a database management system; software that allows you to use a computer to create a database; add, change, and delete forms and reports using the data