Midterm Flashcards

(105 cards)

1
Q

application software

A

program that makes users more productive, assist with personal taks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

application software functions

A
  1. business activities more efficient
  2. assist with graphics/mulitmedia projects
  3. support home, personal, education tasks
  4. facilitate communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 catergories of application software

A
  1. business
  2. graphics/multimedia
  3. home/personal/educational
  4. communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

clip art

A

a collection of electronic drawings, photos, and other images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

font

A

name assigned to a specific design of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

format

A

to change in appearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

blog

A

informational Web site consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order, short for Web log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

chat

A

real-time typed conversation that takes place on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software

A

series of related instructions that tells a computer what task(s) to perform and how to perform them, program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hardware

A

electric, electronic, and mechanical components contained in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GUI - graphical user interface

A

allows a user to interact with software using texts, graphics, and visual images such as icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

command line interface

A

user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

icon

A

small image displayed on a computer screen that represents a program, a document, or some other object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

server

A

computer that controls access to the hardware, software, and other resources on a net-work and provides a centralized storage area for programs, data and information, host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

operating system

A

set of programs that coordinates all of the activities among computer hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

utility program

A

type of system software that allows a used to perform maintenance-type taks usually related to managing a computer, its devices, or its programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

operating system for Apple

A

Mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

mobile device

A

computing device small enough for a user to hold in his or her hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

desktop

A

on-screen work are that has a graphical user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

supercomputers

A

fastest, most powerful, and most expensive computer, capable of processing more than 135 trillion instructions ina single second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

mainframes

A

large, expensive, powerful computer that can handle hundreds of thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

enterprise user

A

computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with office across a region, the country or the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

hacker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

adware

A

program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
antivirus program
program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media, or on incoming files
26
back door
program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network
27
back up
to make a copy of a file
28
backup
duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
29
biometric device
device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavorial characteristic
30
anti-spam program
program that attempts to remove spam before it reaches a user's inbox
31
cyberextorionist
someone who uses e-mail as a vehicle for extortion
32
cyberterrorist
someone who uses the Internet or network to destroy or damage computers for political reasons
33
copyright
exclusive rights give to authors, and artists to duplicate, publish, and sell their materials
34
cookie
small text file that a Web server stores on a computer
35
malware
short for malicious software; programs that act without a user's knowledge and deliberately alter a comptuer's operations
36
script kiddie
someone who accesses a computer or network illegal with the intent of destroying data, stealing information, or other malicious actions but does not have the technical skills and knowledge
37
spoofing
technique intruders use to make their network or Internet transmisson appear legitmate to a victim computer or network
38
spam
unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once
39
password
private combination of characters associated with a user name that allows access to certain computer resources
40
encyption
process of converting readable data into unreadable characters to prevent unauthorized access
41
internet
worldwide collection of networks that connects millions of business, government agencies, educational institutions, and individuals
42
IP address
a number that uniquely identifies each computer or device connected to the Internet
43
link
built-in connection to another related Web page or part of a Web page, short for hyperlink
44
multimedia
any application that combines text with graphics, animation, audio, video, and/or virtual reality
45
media players
programs that allows you to view images and animation, listen to audio, and watch video files on your computer
46
streaming
process of transferring data in a continuous and even flow
47
e-mail
software used to creat, send, receive, forward, store, print and delete e-mail messages
48
username
unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user
49
domain name
text version of an IP address
50
cold boot
process of turning on a computer that has been powered off completely
51
warm boot
process of using the operating system to restart a computer
52
spooling
operating system process that sends documents to be printed toa buffer instead of sending them immediately to the printer, the buffer then holds the information waiting to print while the printer printers from the buffer at its own rate of speed
53
network administrator
computer user that is able to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network
54
defragmentation
process of reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and that performance of the entire computer
55
virus
potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission
56
firewall
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
57
pop-up blocker
filtering program that stops pop-up ads from displaying on Web pages
58
zipped files
type of compressed files that usually have a .zip extension
59
phishing
scam in which a perpetrator sends and official looking e-mail that attempts to obtain your financial or personal information
60
pharming
scam, similar to phishing, where a perpetrator attempts to obtain your personal and finanical information, except they do so via spoofing
61
computer security risk
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
62
computer crime
any illegal act involving a computer
63
cybercrime
on-line or Internet based illegal acts
64
intrusion detection software
program that automatically analyzes all network traffic, assesses system vulnerability, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches
65
possessed object
any item that a user must carry to gain access to a computer or computer facility
66
software theft
computer security risk that occurs when someone 1. steals software media 2. intentionally erases programs 3. illegally copies a program 4. illegaly registers and/or activates a program
67
license
an agreement issued by a software manufacturer that gives the user the right to use the software
68
information theft
computer security risk that occurs when someone steals personal or confidential information
69
surge protector
device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment
70
social engineering
gaing unauthorized access or obtaining confidential information by taking advantage ofthe trusting huamn nature of some victims and the naivety of others
71
software suite
collection of individual programs available together as a unit, business typically include word processing, spreadsheet, e-mail, and presentation graphics software
72
instant messaging
real-time Internet communications services that notifies a user when one or more people are online and then allows the user to exchange messages or files or join a private chat room with those people
73
information
processed data that conveys meaning and is useful to people
74
data
collection of unprocessed items, can include text, numbers, images, audio, and video
75
ISP (internet service provider)
regional or national Internet access provider
76
worm
program that copies itself repeatedly, using up system resources and possibly shutting down the system
77
cerificate authority
authorized person or company that issues and verifies digitial certificates
78
spyware
program placed on a computer without the user's knowledge that secretly collects information about the user
79
trojan horse
malicious-logic program named after the Greek myth that hides within or looks like a legitmate program
80
cracker
someone who access a computer or network illegally with the intent of destryoing dat, stealing information, or other malicious action
81
Windows 7
Microsoft's fastest, most efficient operating system to date, offering quicker program start up, built in diagnostics, automatic recovery, improved security, enhanced searching and organizing capabilities, and an easy to use interface
82
virtual memory
a portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM
83
microblog
blog that allows users to publish short messages, usually between 100 and 200 characters, for others to read
84
smart phone
Internet-enabled telephone that usually also provides personal information management functions
85
text message
short note, typically fewer than 300 characters, sent to or from a smart phone or other mobile device
86
digital camera
mobile device that allows user to take pictures and stores the photographed images digitially, instead of on a traditional film
87
handheld computer
computer small enoguh to fit in one hand
88
video message
short video clip, usually about 30 seconds, sent to or from a smart phone to other mobile devices
89
pictures message
photo or other image, sometimes along with sound and text, sent to or from a smart phone or other mobile device
90
game console
mobile computing device designed fo single player or mulitplayer video games
91
netbook
type of notebook computer that is smaller, lighter, and often not as powerful as a traditional notebook computer
92
public doman software
free software that has been donated for public use and has no copyright restrictions
93
freeware
copyrighted software provided at no cost to a user by an individual or company that retains all rights to the software
94
custom software
software that performs functions specific to a business or industry, developed by a user or at a user's request
95
shareware
copyrighted software that is distributed at no cost for a trial period
96
Linux
popular, multitasking UNIX-type operating system
97
UNIX
multitasking operating system that is now available for most computers of all sizes
98
Mac OS X
multitasking operating system that is the latest version of the Macintosh operating system
98
types of application software for businesses
``` Word processing Spreadsheet Database Presentation Note taking Personal information management Business software for photos Business software suite Project management Accounting Document management Enterprise computing ```
99
Types of graphics and multimedia application software
``` Computer aided design (CAD) Desktop publishing Paint/image editing Photo editing Video and audio Multimedia authoring Web page authoring ```
100
Types of application software for personal/home/educational
``` Software suite Personal finance Legal Tax preparation Desktop publishing Paint/image editing Photo editing and management Clip art/image gallery Video and audio editing Home design/landscaping Reference and education Entertainment ```
101
Types of communications application software
``` Web browser Email Blogging RSS aggregator IM Newsgroup/message board Chat room FTP Text, pictures, video messaging VoIP Video conferencing ```
102
Types of operating systems
Stand alone, sever and embedded
103
When the first version of Microsoft was developed
1985
104
7 categories if software
``` Packaged Custom Web application Open source Freeware Public domain Shareware ```