AIT-2 Flashcards
(270 cards)
to supervise or manage a person or their work. especially in an official capacity
to oversee
is responisble for what you hear in the speakers or headphones
Sound card
a technique used by some websites to keep visitors from leaving their website. either by launching an endless series of popup adssknown colloquially as a soggy biscuitsor by relaunching their website in a window that cannot be easily closed (sometimes this window runs like a standalone application. and the taskbar and the browser’s menu become inaccessible). Many websites that do this also employ browser hijackers to reset the user’s default homepage.[1]
mousetrapping
enables the performance of more than one computer process at the same time with minimal lag in overall performance
multitasking
a kind of programmer who specializes in the development of applications relating to the World Wide Web or distributed network applications. which typically run protocols like HTTP from a Web server to a client browser using associated programming languages like HTML/CSS. C#. Ruby and PHP to name a few.
web developer/webmaster
the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one. in order to obtain personal information such as passwords. account numbers. etc.
pharming
is a powerful. highend microcomputer. They contain one or more microprocessor CPUs. They may be used by a singleuser for applications requiring more power than a typical PC (rendering complex graphics. or performing intensive scientific calculations)
Workstations/Servers
to produce and discharge radiation
to emit/to radiate
the unauthorized distribution. theft. reproduction. copying. performance. storage. sale or other use of intellectual property (IP) protected under copyright law.
piracy
The ____ command allows you to ___ the last action you performed in the program. Control+Z
Undo
select an object or text. move it and place it into an alternate area
to drag/ to drop
a generic term for any device (e.g. a graphics tablet. mouse. stylus. or trackball) used to control the movement of a cursor on a computer screen.
pointing device
the shaft that rotates in the middle of a disk driv
spindle
the part of graphic design that deals in the arrangement of visual elements on a page. It generally involves organizational principles of composition to achieve specific communication objectives
page layout
A _______ is the area is the document window where you type the text.
working area
protocol, enables two hosts to establish a connection and exchange streams of data
TCP
make an exact copy of reproduce. ||| Computer viruses replicate themselves and are passed along from user to user.
replicate
a detailed study of a subject. especially in order to discover (new) information or reach a (new) understanding:
research
specialist, that tests the security of networks systems and advises customers how to introduce and maintain security policies including setting up secure password systems. installing firewalls. keeping out hackers and dealing with viruses
Security Specialist
memory that loses its contents when the power is turned off including all RAM except the CMOS RAM used for the BIOS
volatile (memory) (note: RAM is an example of volatile memory. but there is also nonvolatile RAM. e.g. flash memory)
the sexual abuse of children and youth (potentially older people) through the exchange of sex or sexual acts for drugs. food. shelter. protection. other basics of life. and/or money.
sexual exploitation
is system software designed to help to analyze. configure. optimize or maintain a computer.
utility software
is nonvolatile(permanent) and contains instructions needed by the processor. The ___ does not need power to remember its contents
ROM (Read Only Memory)
a section of main memory or mass storage that has been reserved for a particular application / are logical divisions into more regions on a hard disk so that the OS can manage information in each region separately
partition /s