AIT-2 Flashcards

(270 cards)

1
Q

to supervise or manage a person or their work. especially in an official capacity

A

to oversee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is responisble for what you hear in the speakers or headphones

A

Sound card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a technique used by some websites to keep visitors from leaving their website. either by launching an endless series of popup adssknown colloquially as a soggy biscuitsor by relaunching their website in a window that cannot be easily closed (sometimes this window runs like a standalone application. and the taskbar and the browser’s menu become inaccessible). Many websites that do this also employ browser hijackers to reset the user’s default homepage.[1]

A

mousetrapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

enables the performance of more than one computer process at the same time with minimal lag in overall performance

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a kind of programmer who specializes in the development of applications relating to the World Wide Web or distributed network applications. which typically run protocols like HTTP from a Web server to a client browser using associated programming languages like HTML/CSS. C#. Ruby and PHP to name a few.

A

web developer/webmaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one. in order to obtain personal information such as passwords. account numbers. etc.

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a powerful. highend microcomputer. They contain one or more microprocessor CPUs. They may be used by a singleuser for applications requiring more power than a typical PC (rendering complex graphics. or performing intensive scientific calculations)

A

Workstations/Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to produce and discharge radiation

A

to emit/to radiate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the unauthorized distribution. theft. reproduction. copying. performance. storage. sale or other use of intellectual property (IP) protected under copyright law.

A

piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ____ command allows you to ___ the last action you performed in the program. Control+Z

A

Undo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

select an object or text. move it and place it into an alternate area

A

to drag/ to drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a generic term for any device (e.g. a graphics tablet. mouse. stylus. or trackball) used to control the movement of a cursor on a computer screen.

A

pointing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the shaft that rotates in the middle of a disk driv

A

spindle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the part of graphic design that deals in the arrangement of visual elements on a page. It generally involves organizational principles of composition to achieve specific communication objectives

A

page layout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _______ is the area is the document window where you type the text.

A

working area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

protocol, enables two hosts to establish a connection and exchange streams of data

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

make an exact copy of reproduce. ||| Computer viruses replicate themselves and are passed along from user to user.

A

replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a detailed study of a subject. especially in order to discover (new) information or reach a (new) understanding:

A

research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

specialist, that tests the security of networks systems and advises customers how to introduce and maintain security policies including setting up secure password systems. installing firewalls. keeping out hackers and dealing with viruses

A

Security Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

memory that loses its contents when the power is turned off including all RAM except the CMOS RAM used for the BIOS

A

volatile (memory) (note: RAM is an example of volatile memory. but there is also nonvolatile RAM. e.g. flash memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the sexual abuse of children and youth (potentially older people) through the exchange of sex or sexual acts for drugs. food. shelter. protection. other basics of life. and/or money.

A

sexual exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is system software designed to help to analyze. configure. optimize or maintain a computer.

A

utility software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is nonvolatile(permanent) and contains instructions needed by the processor. The ___ does not need power to remember its contents

A

ROM (Read Only Memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a section of main memory or mass storage that has been reserved for a particular application / are logical divisions into more regions on a hard disk so that the OS can manage information in each region separately

A

partition /s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
is an assemblage of files and information about those files
software package
26
an electronic device in a computer that issues a steady highfrequency signal that synchronizes all the internal components
system clock
27
to cause or enable (a condition or situation) to continue.
to maintain
28
a standard computer language for relational database management and data manipulation. __ is used to query. insert. update and modify data.
Structured Query Language (SQL)
29
employing or involving a module or modules as the basis of design or construction.
modular
30
is a database management system (DBMS) based on the relational model of data. Most databases in widespread use today are based on this model
relational database management system (RDBMS)
31
is when someone gains access to a website. program. server. service. or other system using someone else's account or other methods.
unauthorized access
32
a computer pointing device that uses a lightemitting diode (LED). optoelectronic sensor and digital signal processor (DSP) to detect changes in reflected light from image to image.
optical mouse
33
refers to a feature of an application that shows users what they are about to print or produce before the final product is ready
WYSIWYG editor
34
to make exact copies of themselves (of computer viruses)
to replicate
35
to use someone/something for your own advantage
to exploit
36
______ is when the left edge of the texts in documents is further from the margin. ... You can also use the Increase and Decrease _____ on the paragraph group to _____ a whole paragraph or text in your document.
to decrease/increase indent
37
The key used for moving on a page above or below in the document
Page up/down key
38
reverse the action of an earlier action
to redo changes
39
the ability of a microscope. or a television or computerscreen. to show things clearly and with a lot of detail:
resolution
40
a highlevel. interpreted programming language developed by Guido van Rossum at CWI in the Netherlands
Python
41
to find and be able to describe someone or something: identify what/which/who
to identify
42
arrange or order (a computer system or an element of it) so as to fit it for a designated task.
to configure
43
A is a long thin strip with scroll arrows and a sliding section
scroll bar/scrollbar
44
observe and check the progress or quality of (something) over a period of time keep under systematic review. We can monitor some data(flow charts of global warninig)
monitoring
45
to ____ a number of recent actions in a worksheet such as deletions. formatting changes
to undo changes
46
conclude a letter. broadcast. or other message.
to sign off
47
to change the direction of something. especially to send it to a different place
to redirect
48
a list of a company's employees and the amount of money they are to be paid.
payroll
49
a hard plastic or rubbery disc (the wheel) on a computer mouse that is perpendicular to the mouse surface. It is normally located between the left and right mouse buttons. It is used. as the name suggests. for scrolling. It can often also be used as a third mouse button by pressing on it. The wheel is often but not always engineered with detents to turn in discrete steps. rather than continuously as an analog axis. to allow the operator to more easily intuit how far they are scrolling.
scroll/mouse wheel
50
the palmsized. 17key section of a standard computer keyboard. usually on the far right.
numeric keypad
51
is a digital networking communications method that groups all transmitted data into suitablysized blocks. called packets. which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
Transmission Control/Internet Protocol (TCP/IP)
52
the action of making a product available to the public.
release
53
highlight text or pick an object
to select
54
is a device that optically scans images. printed text. handwriting. or an object. and converts it to adigital image
scanner
55
are highspeed units of memory used to store and control information
register
56
an unvarying condition in a physical process. especially as in the theory that the universe is eternal and maintained by constant creation of matter.
steady state
57
The sixaxis wrist force sensor is one of the most important sensors of the robot. which can simultaneously detect the full information of threedimensional space. It is widely used in position/force control. axle hole matching. contour tracking. coordination of two robots. and other fields of robot [1.2.3.4].
sixaxis sensing system
58
can be used to automatically perform an action. such as updating a deployment. when a new image. such as a new version of the base image that is used in that deployment. is created. An image stream comprises one or more Docker images identified by tags.
stream (image)
59
to (cause to) work. be in action or have an effect: Fungovat
operate
60
a register in the control unit of a computer which contains the address of the next instruction to be executed. the address being increased by one after each execution unless an instruction to do otherwise occurs
program counter (PC)/instruction pointer (IP)
61
to start using a plan or system
to implement
62
is a small circuit board that can hold a group of memory chips. The bus from a SIM to the actual memory chips is 32 bits wide
SIM (Single inline memory module)
63
is a term used to describe how text is placed on the screen in relation to the margins.
text alignment
64
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
whitehat hacker
65
the process of enabling a computer to identify and respond to the sounds produced in human speech.
speech recognition
66
to change the words of a text. especially a law or a legal document: MPs were urged to amend the law to prevent another oil tanker disaster.
to amend
67
an occasion when a photographer takes pictures. especially of models or famous people. to be used in a newspaper or magazine.
shoot
68
allows your computer to communicate over a network and access the Internet
Network interface card/controller (NIC)
69
a surface for placing and moving a computer mouse.
mouse pad/mousepad
70
not smooth : rough. harsh strokes his unsmooth face awkward and unsmooth writing. | smooth = гладкий
unsmoothly
71
move an object or text from the clipboard to a specific location
to paste
72
the practice of taking someone else's work or ideas and passing them off as one's own.
plagiarism
73
examine (something) methodically and in detail. typically in order to explain and interpret it.
to analyze
74
the ordinary postal system as opposed to email
spam emails
75
Maintains the link between PCs and workstations connected in a network. Uses telecommunications. software and electronic skills. and knowledge of the networking software to locate and connect faults.
Network Support Person/Network Engineer
76
select an object or text and store it in a temporary location often known as the clipboard. which is usually invisible to the user
to cut
77
a scrollable viewing area on the screen
Window
78
o do something in order to discover if something is safe. works correctly. etc.. or if something is present:
test
79
the sending and receiving of messages over distance. especially by phone. radio. and television
telecom
80
is a horizontal bar at the top of the window and part of the window decoration. It displays the name of the program and active document.
title bar
81
To put into a proper order or into a correct or suitable sequence. relationship. or adjustmen
to arrange
82
Is an analyst programmer who is responsible for maintaining updating and modifying the software used by a company.
System Support Person/System Administrator
83
is a specialised computer connected to at least two networks. commonly two LANs or WANs or a LAN and its ISPs network
Router
84
a very small portable device that functions as a personal information manager
personal digital assistant
85
a video camera connected to a computer. allowing its images to be seen by Internet users
webcam
86
a detailed description of how something should be done. made. etc. + a clear. detailed plan or description of how something will be made:
specification
87
to eliminate an object or text
to delete
88
a device that forwards data packets along networks
router
89
to take hold of something or someone suddenly and roughly
to grab
90
name and address of the recipient
TO
91
In computing. a Trojan horse. or Trojan. is any malicious computer program which misleads users of its true intent.
Trojan horse
92
the final part of domain
toplevel domain (TLD)
93
full of something unpleasant:
rife
94
make a way through or into by physical strength break open by force.
to force
95
the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.(usually on a particular company)
spear phishing
96
measures the width and shows the margins
ruler
97
keep information safe from loss
to protect
98
put a new program onto a computer
to install
99
to modify something (e.g. software) to suit a particular individual or task
to customize
100
the amount of something produced by a person. machine. or industry
output
101
an individual responsible for maintaining a multiuser computer system. including a localarea network (LAN)
system administrator/sysadmin
102
configure (something) differently.
reconfigured
103
A ____ is a grid of rows and columns that intersect to form cells.
Table
104
is system software that manages computer hardware and software resources and provides common services for computer programs.
operating system (OS)
105
is an emal scam that is disguised to look like official communication from a legitimate website. These scams fool users into providing sensitive information like passwords. credit card details
Phishing
106
are the pages displayed by search engines in response to a query by a searcher. The main component of the SERP is the listing of results that are returned by the search engine in response to a keyword query. although the pages may also contain other results such as advertisements
search engine result pages (SERPs)
107
A security incident is an event that may indicate that an organization's systems or data have been compromised or that measures put in place to protect them havefailed. ... Examples of security incidents: Attempts from unauthorized sources to access systems or data.
security failure
108
to prepare a storage medium to receive data
to format
109
prepare (written material) for publication by correcting. condensing. or otherwise modifying it.
to edit
110
an objectoriented. highlevel. interpreted programming language developed in the 1990ss by Japanese programmer Yukihiro Matsumoto.
Ruby
111
In computing. a keyboard shortcut is a set of one or more keys that invoke a command in software or an operating system. (the System Request key. Escape key and the Menu key).
system keys
112
a key on a typewriter or alphanumeric keyboard in the form of a horizontal bar in the lowermost row. significantly wider than other keys. Its main purpose is to conveniently enter a space. e.g.. between words during typing.
space bar/spacebar
113
to use a mouse or other device to position the cursor over a particular area of a computer screen so as to cause a program to respond without clicking a button on the device
to hover
114
a machine controlled by a computer that is used to perform jobs automatically
robot
115
a connection point a device linked in a network
node
116
grouping of two or more computer systems linked together
network
117
any of various solid crystalline substances used especially as a base material for computer chips and other electronic devices
semiconductors
118
shows which programs or applications are running on the device. as well as provide links and shortcuts to other programs or places
taskbar (dock for OS X)
119
duplicate an object or text
to copy
120
deal with and control
to handle
121
software distribution model in which a thirdparty provider hosts applications and makes them available to customers over the Internet
Software as a Service(SaaS)
122
is a computer network for interconnecting devices centered on an individual person's workspace
personal area network (PAN)
123
to send an email that you have received to someone else
to forward
124
is a topic of the message
SUBJECT
125
a graphical control element that allows multiple documents or panels to be contained within a single Windows. It is an interface style most commonly associated with web browsers. web applications. and text editors
tabbed document interface (TDI)/tab
126
affect (a person. organism. etc.) with a diseasecausing organism.
to nfect
127
______ is a type of computer program that is designed to run a computer's
system software
128
a technology similar in theory to bar code identification. With it. the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals
radiofrequency identification (RFID)
129
strong and healthy
robust
130
An antivirus scanner is part and parcel of a freeantivirus software. it scans a hard drive to detect malicious software in a computing device.
virus scanner
131
the average speed required to transmit data from the disk to the CPU. measured in megabytes per second
transfer rate
132
not moving or not intended to be moved.
stationary
133
is software with source code that anyone can inspect. modify. and enhance.
opensource software
134
select as an object of attention or attack.
targeted
135
a special type of file in some operating systems that points to another file or device
shortcut
136
is a software tool included with some word processors that provides synonyms for selected words on command.
thesaurus
137
A ______ is a horizontal bar at the bottom of the window that displays information about the cursor position. It shows the page number. column number and the line number
status bar
138
Num Lock or Numeric Lock is a key on the numeric keypad of most computer keyboards. It is alock key. like Caps Lock and Scroll Lock.
Num lock
139
is system that allows access by multiple users of a computer. Timesharing systems
multiuser system
140
An act or instance of launching something again. to launch again start or get going.
to relaunch
141
is a person who applies the principles of software engineering to the design. development. maintenance. testing. and evaluation of computer software.
software engineer/designer
142
are nonsubsidiary. independent firms which employ fewer than a given number of employees
small and mediumsized enterprises (SME)
143
computer robot programs that collect information from sites by using keywords
spider/webcrawler
144
a design for a set of characters
typeface/font family
145
(also known as font family) is a set of one or more fonts each composed of glyphs that share common design features.
typeface
146
a handheld electronic device for playing digital media such as audio and video files.
portable media player
147
type of software includes virus checkers and firewalls
security software
148
invent something new or a new way of doing something
to devise
149
Trustworthy describes something you can believe in s it's completely reliable. Your favorite newspaper can be trustworthy s they always print the truth. The same with programs
trustworthy entity
150
a digital audio file made available on the Internet for downloading to a computer or mobile device. typically available as a series. new instalments of which can be received by subscribers automatically.
podcast
151
is a unique identifier for any document on the Internet. which tells the browser exactly where to find the page
URL (also known as the web address)
152
make the best or most effective use of (a situation or resource).
to optimize
153
The output of taking an image . in other word an image
shot
154
A context menu (also called contextual. shortcut. and pop up or popup menu) is a menu in a graphical user interface (GUI) that appears upon user interaction. such as a rightclick mouse operation.
popup/context/shortcut menu
155
pass information from one place to another
to transmit
156
makes copies of all information stored on a disk and restores either the entire disk or selected files
to backup
157
the fastest type of computer which is very expensive and is employed for specialized applications that require immense amounts of calculations
supercomputer
158
In computability theory and computationalcomplexity theory. a reduction is an algorithm for transforming one problem into another problem. Areduction from one problem to another may be used to show that the second problem is at least as difficult as the first. |or| The action or fact of making something smaller or less in amount. degree. or size.
reduction
159
software searches files for potentially harmful programs such as viruses. worms. or Trojan horses that are written by malicious programmers.
virus checker
160
What is privacy violation? ... Privacy violation takes place when sensitive information enters the program server/database and is illegally accessed by malicious attackers. There are three common occurrences of Privacy Violation: Unprotected storage of user data.
privacy violation
161
the programs and other operating information used by a computer.
software
162
a pointing device typically embedded between the G. H and B keys on a QWERTY keyboard
trackpoint
163
Studies methods of working within an organization to decide how tasks can be done efficiently by computers. Makes a detailed analysis of the employerss requirements and work patterns to prepare a report on different options for using information technology.
System Analyst
164
is a web browser that was created in 2003 by Apple Inc. included with the OS X and iOS operating systems. but is also available for Windows computers.
Safari
165
is a data communication technique in which a message transmitted from a source node is stored at an intermediary device before being forwarded to the destination node
storeandforward model
166
A page arranged in sequence that contain text and images for presenting to an audience.
slide
167
A rootkit is a program or. more often. a collection of software tools that gives a threat actor remote access to and control over a computer or other system. While there have been legitimate uses for this type of software. such as to provide remote enduser support. most rootkits open a backdoor on victim systems to introduce malicious software. such as viruses. ransomware. keylogger programs or other types of malware. or to use the system for further network security attacks. Rootkits often attempt to prevent detection of malicious software by endpoint antivirus software.
rootkit
168
A scheme for making money by deceptive. dishonest. or fraudulent means. i.e.. a swindle or fraud.(like MMM ) usually they use email
scam
169
system can only run one program at a time
singletasking OS
170
the ____ buttons are a feature that lets you change how the presentation or document appears.
View
171
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
spyware
172
typically consists of two or more LANs. The computers are farther apart and are linked by telephone lines. dedicated telephone lines. or radio waves
wide area network (WAN)
173
Selfreplication is any behavior of a dynamical system that yields construction of an identical copy of itself. Biological cells. given suitable environments. reproduce by cell division. ( viruses always do that to keep themselves in the system)
selfreplicating
174
interrupt (an event. activity. or process) by causing a disturbance or problem.
to disrupt
175
to watch or organize a job or an activity to make certain that it is being done correctly
oversee
176
help the user to easily and quickly access files. applications
pointer
177
The red line indicates a spelling error (proccess)
spellchecking
178
is a group of radio stations. television stations. or other electronic media outlets. that form an agreement to air. or broadcast. content from a centralized source.
terestrial network/broadcast network
179
type of software. such as MS PowerPoint. is used to create presentations of slides containing text and graphics and also incorporating sound and visual effects
presentation software
180
let you watch movies or TV. play games and listen to music wherever you are. They usually run on batteries. have a widescreen (rectangular 16:9 format) LCD and support multiformat playback
Portable DVD players
181
a penshaped device used on a display screen to input commands or handwritten textor drawings.
stylus
182
A single click or click is the act of pressing a computer mouse button once without moving the mouse. Single clicking is usually a primary action of the mouse. Single clicking. by default in many operating systems. selects (or highlights) an object while doubleclicking executes or opens the object.
single click
183
Windows NT is a family of operating systems produced by Microsoft. the first version of which was released on July 27. 1993. It is a processorindependent. multiprocessing and multiuser operating system.
NT/Windows NT (New Technology)
184
the type of computer system or smartphone you are using. in relation to the type of software (= computer programs) you can use on it
platform
185
a related group of things when they are offered together as a single unit: The computer comes with a software package.
package
186
websites that offer all types of services. e.g. email. forums. search engines. etc.
web portals
187
is the area between the main content of a page and the page edges.
page margins
188
In computing. multitouch is technology that enables a surface (a trackpad or touchscreen) to recognize the presence of more than one point of contact with the surface.
multitouch gestures
189
translate instructions from one computer language into another so that a particular computer can understand them
to compile
190
the public introduction
rollout
191
to find and bring back information
to retrieve/to fetch/to restore
192
man who recieves mail
recipient
193
not designed or made to order but taken from existing stock or supplies.
off the shelf (software package)
194
A network administrator is an IT expert who manages an organization's network Network administrators keep networks operational and monitor functions and operations within the network.
network administrator/engineer/support person
195
to deal with. have responsibility for. or be in charge of:. manipulate
to handle(verb)
196
is a web browser developed by Opera Software
Opera
197
to change or make something from one format or system to another (e.g. data)
to convert
198
to draw a line under a word
to underline
199
the practice of basing some of a company's processes or services overseas. so as to take advantage of lower costs
offshoring
200
The tab key Tab ↹ (abbreviation of tabulator key or tabularkey) on a keyboard is used to advance the cursor to the nexttab stop.
Tab key
201
a program that automatically fetches web pages which is used to feed pages to search engines
spider/webcrawler/crawler
202
a folder or directory where deleted items are temporarily stored
recycle bin/trash can
203
an international communications standard for sending voice. video. and data over digital telephone lines or normal telephone wires.
TSDN
204
the action or crime of making a false spoken statement damaging to a person's reputation.
slander
205
push through / apply/ make/ enforce a control (ing)
to assert control
206
a pattern
template
207
A _____ is a strip of icons located in the top left corner contains some of the most frequently used commands such as Print. View. Undo and Redo are placed
quick access toolbar/ribbon
208
is responisble for what you see on the monitor
Video card
209
Decide upon the look and functioning of (a building. garment. or other object). by making a detailed drawing of it
to design
210
to include different types of things
to encompass/to cover/to embrace
211
allows a person to write computer instructions in a language that is easier for a human to understand. but which is then converted into the low level numerical instruction codes that a computer processor unit can execute.
programming language
212
to control something or someone to your advantage. often unfairly or dishonestly
to manipulate
213
all the achievements or failures that someone or something has had in the past:
track record
214
to convert a document or picture into digital form for storage or processing on a computer
to scan
215
do and complete a task
to carry out
216
to carry out an instruction or progra
to execute/to run
217
a long key on a or computer keyboard for making a blank between words
spacebar
218
A touchpad or trackpad is a flat control surface used to move the cursor and perform other functions on a computer. This allows for a larger touchpadsurface. but you can press the lower left or lower right section of the touchpad to click the buttons
touchpad
219
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. ... Worms almost always cause at least some harm to the network. even if only by consuming bandwidth. whereas viruses almost always corrupt or modify files on a targeted computer.
worm
220
Project management is the practice of initiating. planning. executing. controlling. and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time. ALSO project management includes overseeing projects for software development. hardware installations. network upgrades. cloud computing and virtualization rollouts. business analytics and data management projects and implementing IT services.
project management
221
Visual Basic (VB) is a programming environment from Microsoft in which a programmer uses a graphical user interface (GUI) to choose and modify preselected sections of code written in the BASIC programming language.
VB (Visual Basic)
222
organize and manipulate data. usually large amounts of numeric data
to proccess
223
fasten or secure (something) with a lock.
to lock
224
to convert information or an instruction into a particular form
to encode
225
to (cause something to) grow or change into a more advanced. larger. orstronger form
to develop
226
Clicking ______ reveal a dropdown menu showing commands for file operations such as Open. Safe. Safe As and Print
office button
227
a pointing device shaped as a mouse lying on its back
trackball
228
refers to a computer that is not connected to a network
standloun
229
Produces the programs which control the internal operations of computers. Converts the system analystss specification to a logical series of steps.
Software Engineer/Software Designer
230
is a software system designed to search for information on the World Wide Web
web search engine
231
makes Internet content accessible via speech recognition and phone
VoiceXML
232
a piece of code which is capable of copying itself and typically has a detrimental effect. such as corrupting the system or destroying data.
virus
233
now used to create Windows applications intended for beginners or casual use
Visual BASIC
234
Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products. Sybase was an enterprise software and services company that produced software to manage and analyze information in relational databases.
Sybase
235
is a subdivision of a track on a magnetic disk or optical disc
sector
236
A webmaster is a person responsible for maintaining one or many websites.
webmaster
237
is an interactive computer application for organization. analysis and storage of data in tabular form
spreadsheet
238
... (such as MS Word or WordPerfect) allows you to enter and format a text. some graphics and to create reports and letters.
word processor
239
enables a user to save. sort and manage data in an arranged form of rows and columns/ software. such as MS Excel. allows the user to do numerical calculations and produce charts of the results.
spreadsheet software
240
is a device that has a screen and keyboard for input and output. but it does not do its own processing
terminal
241
to discover the exact place or position of something
to locate
242
architecture. where the two computers have the same capabilities
peertopeer
243
uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. such as a compact disc (CD) and a digital video disc (DVD)
optical disc drive
244
If a photograph is underexposed. it is darker than it should be because the film was not exposed to enough light
underexposed
245
cunningly deceive or outwit.
to trick
246
MS Word has dozens of ____ to make the editing process as easy as possible.
Tools
247
defines the type of Internet service (most common is http)
Scheme
248
after clicking on the start button you will be returned to the ...
Start screen
249
part of the scroll bar in the sliding section
scroll arrows
250
is an input device and normally layered on the top of an electronic visual display of an information processing system
touchscreen
251
Oracle Corporation is an American multinational computer technology corporation headquartered in Redwood Shores. California. The company specializes primarily in developing and marketing database software and technology. cloud ngineered systems. and enterprise software products s particularly its own brands of database management systems.
Oracle
252
to make something suitable for a new use or purpose to modif /change something in order to make it suitable for a new use or situation
to adapt
253
The red line indicates a ____(in ms word)
spelling error
254
copy data from a CPU to memory. or from memory to a mass storage devic
to store
255
with the upper part where the lower part should be in or into an inverted position.
upsidedown
256
a large number or wide range (of something)
multiplicity
257
When the Scroll Lock mode was on. the arrow keys would scroll the contents of a text window instead of moving the cursor. In this usage. Scroll Lock is a toggling lock key like Num Lock or Caps Lock. which have a state that persists after the key is released.
Scroll lock
258
is situated in the lower left corner of the screen. In Windows 8. you will click the Start button to return to the Start screen.
Start button/menu
259
place an object or text in a specific location
to Insert
260
To have a clear understanding or determination of something.
solid grasp
261
subject directories that are selected by people and organized into hierarchical subject categories
web indexes
262
WWW
virtual network
263
Proprietary technology is any combination of processes. tools. or systems of interrelated connections that are the property of a business or an individual. These combinations provide a benefit or competitive advantage to the owners of proprietary technologies (запатентованная технология)
proprietary technology
264
include compilers (translate a highlevel language into a lowerlevel language machine code). assemblers (translate assembly language into machine code). and debuggers (allow programmers to test software for errors ‘bugss) for various programming languages.
programming tools
265
Offset printing is a commonly used printing technique in which the inked image is transferred (or offset) from a plate to a rubber blanket. then to the printing surface.
offset lithography
266
also known as a supplier. is an individual or company that sells goods or services to someone else in the economic production chain
vendor
267
invisible layer . indistinguishable from actual layer
transparent layer
268
a secret word or phrase that must be used to gain admission to a place. or a string of characters that allows access to a computer system or service.
password
269
to transmit video and audio material over the Internet as a steady. continuous flow.
to stream
270
numerical methods. computational methods): The process of taking a complex problem and breaking it into many smaller and simpler problems.
numerical calculations