Outcome 1 Flashcards

(185 cards)

1
Q

The main work area of the screen

A

desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Whenever you open a program, file, or folder, it appears on your screen in a box or frame called a _____

A

window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ____ displays the name of the document and program. This can also be used to drag the window around the desktop or double-clicked to maximize or restore the window.

A

title bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The ____ button hides the open window.

A

minimize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a window is open but doesn’t fill the whole screen, the ____ button will enlarge it to fill the whole screen.

A

maximize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ____ is the long horizontal bar at the bottom of your screen that helps to organize all of your windows.

A

taskbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The ____, at the far right of the taskbar, includes a clock and a group of icons.

A

notification area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When a window is open and fills the whole screen, the ____ button will make it smaller.

A

restore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Window borders and corners can be manipulated using the mouse pointer in order to ____ the window.

A

resize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All open windows are represented by taskbar ____.

A

buttons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A small, fixed-size window that asks you a question—often requires a response before the user can continue—is called a ____ box.

A

dialog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The window that is on top of all the other windows and ready for interaction is referred to as the ____ window.

A

active

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____ is a small picture preview of the corresponding window or file.

A

thumbnail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When having multiple windows open on the desktop, you can use ____ to take a quick look at other open windows without clicking away from the window you are currently utilizing.

A

peek

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shortcut key; combination allows you to preview all open windows

A

Alt+Tab or Logo Tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You can close a program that is not responding by using the ____.

A

task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Task manager can be accessed by right-clicking on the taskbar or using these 2 keyboard shortcut key combinations

A

Ctrl+Alt+Del or Ctrl+Shift+Esc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The smallest element of computerized data

A

byte

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A program that allows a user to find, view, hear, and interact with material on the World Wide Web

A

browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Alphabetic names used to refer to computers on the internet

A

domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A piece of information sent by a Web server to a user’s browser

A

cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

An identity theft scam in which criminals send out spam that imitates the look and language of legitimate correspondence from e-commerce sites

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A special computer connected to a network that provides or serves up data

A

server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Unsolicited “junk” email sent to large numbers of people to promote products or services

A

spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Term used interchangeably to indicate Microsoft's file viewing program or Microsoft's internet broswer
Explorer
26
A hardware device that allows computers to communicate with each other by transmitting signals over telephone lines
cloud
27
Short-term, temporary memory that contributes to the speed of the computer
RAM
28
A piece of computer software or hardware that restricts the data that is allowed to flow through (blocks undesirable traffic)
firewall
29
To switch a computer off and on again, allowing its operating system and programs to be reloaded
reboot
30
To transfer a file or files from one computer to another, for example, from a server
download
31
Copying or sending files or data from one computer to another
upload
32
The group of letters after a period or "dot" in a file name that indicates the format or type of file
extension
33
The World Wide Web address of a site on the internet
URL
34
Software that allows your computer to communicate with hardware or devices
driver
35
A four part or eight part electronic serial number that identifies every computer, cell phone, and device that accesses the internet for tracking purposes (like a license plate)
IP Address
36
3 steps before opening your computer
1. back up 2. System Restore Point 3. shut down Windows & unplug console
37
When unscrewing the back of a console, don't unscrew the ____
power supply
38
The power supply is always by the ___ and ____
fan and power plug
39
2 types of cables you find inside your computer
1. power cables | 2. data cables
40
Where is the drive bay located in a computer console
front of computer
41
The ______ is the main circuitry board
motherboard
42
The ______ are where you plug in printers, external hard drives, headphones, etc
I/O panel connectors
43
Why does the processor cooling fan sit on top of the microprocessor?
Help keep it cool
44
The _____ is where the motherboard connects to the power supply
power supply connector
45
_____ exist all over the motherboard to allow it to connect to the hard drive.
data connectors
46
The clock battery is attached to the ____
motherboard
47
The expansion slots are located in the ____
back
48
6 basic components of any computer system
1. input unit 2. output unit 3. storage unit 4. central processing unit (CPU) 5. arithmetic & logic unit (ALU) 6. control unit
49
What is another term for these 6 basic components/units?
functional units
50
What are two examples of input devices?
keyboard, mouse
51
3 functions performed by output devices
1. accepts code produced by computer 2. converts codes to readable form 3. supplies converted results to the outside world
52
The data and instructions entered into the computer system through input units have to be stored inside the computer before _____ starts
actual processing
53
What two elements together are known as the CPU?
ALU and control unit
54
The ____ is the brain of the computer system
CPU
55
The internal element of the computer that deals with all computations
ALU
56
Generates intervals during which all activities in the computer system are carried out in ordered steps
clock unit
57
Every operation in a CPU takes place at _____
clock pulse
58
Clock pulse dictates that no operation is performed in less time than transpires between ____
clock ticks
59
Clock unit speed is measured in ____
megahertz (MHz) or gigahertz (GHz)
60
Consolidates ALERTS from key Windows maintenance and security features like Windows Defender/User Account Control, etc
Action Center
61
If Windows requires your attention, the Action Center icon appears where?
notification area of taskbar
62
Red items in the Action Center are labelled ____
important
63
Yellow items in the Action Center are ____ that you should consider addressing
suggested taskss
64
How do you access Action Center?
1. Start > control panel > System & Security > review computer status 2. Action Center icon 3. Start > control panel icon view > action center 4. Start > search: Action Center
65
What does the Action Center icon look like?
flag
66
Antispyware software included with Windows and runs automatically when turned on
Windows Defender
67
Windows Defender keeps spyware from infecting computer using ______ and ______
real time protection and scanning options
68
Windows Defender feature: alerts you when spyware attempts to install/run on your computer
real time protection
69
Windows Defender feature: scans for spyware that may already be present
scanning options
70
It's important to have up-to-date _____ when using Windows Defender
definitions
71
Files that act like an ever-growing encyclopedia of potential software threats
definitions
72
Windows Defender works with ___ to automatically install new definitions as they're released
Windows Update
73
3 types of scans that Windows Defender can perform
1. quick 2. full 3. custom
74
Windows Defender scan: Checks places on your computer's hard disk that spyware is most likely to infect
quick scan
75
Windows Defender scan: Checks all files on hard disk + currently running programs
full scan
76
Windows Defender scan: checks specific locations
custom scan
77
If you do not use scheduled scans, how often should you update definitions?
every week
78
Shortcut key: close program
Alt + F4
79
Shortcut key: display print preview
Ctrl+F2 or Ctrl+P
80
Shortcut key: switch between open documents/programs
Alt Tab
81
Shortcut key: open a new blank document
Ctrl+N
82
Shortcut key: open an existing document
Ctrl+O
83
Shortcut key: "save as" a document
F12 or Alt+F, A
84
Shortcut key: save a document
Ctrl + S
85
Shortcut key: close a document
Ctrl+F4, Ctrl+W
86
Shortcut key: move to the beginning or end of a line
Home/End
87
Shortcut key: move around a document by words
Ctrl+L or R arrows
88
Shortcut key: move around a document by lines
Up/Down arrows
89
Shortcut key: select all text in a document
Ctrl+A
90
Shortcut key: select one word
F8 x2 or Ctrl+Shift+L/R arrows
91
Shortcut key: deselect text
arrow keys
92
Shortcut key: select from cursor to the end of a document
Ctrl + End
93
Shortcut key: delete word to the right of the cursor
Ctrl + Delete
94
Shortcut key: delete character to the right of the cursor
Delete
95
Shortcut key: delete word to the left of the cursor
Ctrl+Backspace
96
Shortcut key: copy selected text
Ctrl+C
97
Shortcut key: undo an action
Ctrl+Z
98
Shortcut key: paste selected text
Ctrl+V
99
Shortcut key: apply double line spacing to selected text
Ctrl+2
100
Shortcut key: bold selected text
Ctrl+B
101
Shortcut key: change the case of letters
Shift + F3
102
Shortcut key: center text
Ctrl+E
103
Area of Word's status bar that displays word count, page number, etc
status info
104
Minimize, restore and maximize in a Word document
Window controls
105
Shortcut key: go to start of document
Shift + Home
106
Shortcut key: replace words in Word
Ctrl + H
107
Shortcut key: create new page in word
Ctrl+End+Enter
108
Computers that communicate with each other
network
109
4 computer maintenance items that should be performed on a regular basis
1. antivirus scans 2. cleaning 3. software updates 4. regular backups
110
This maintenance item helps eliminate potential security vulnerabilities and provide error fixes
software updates
111
Software that allows your computer to communicate with hardware or devices. Without one, the hardware you connect to your computer—for example, a video card or a printer—won't work properly.
driver
112
What does a CMOS error mean?
PC needs a new motherboard internal battery
113
Proper shutting down avoids ___: pieces of programs that clutter, build up and create future problems
digital detritus
114
Difference between an error message and an error code
error messages are usually text while error codes have a numerical value made by the programmer for the programmer
115
Something the user starts in windows such as Word or Excel
application
116
A program that Windows runs that may not have a window and may run invisibly
process
117
Power-saving state allowing a computer to quickly resume full-power operation when you want to start working again. Works like the pause function in a DVD player
sleep
118
Power-saving state designed primarily for laptops that puts open documents and programs on your hard disk and then turns off your computer. Uses the least amount of power. Used when laptop won’t be in use for an extended period and won’t have an opportunity to charge the battery during that time
hibernate
119
Combination of sleep and hibernate for desktop computers. Puts any open documents and programs in memory and on your hard disk, then puts your computer into a low-power state to quickly resume your work. Allows users to restore their work from their hard disk. Preferred for desktops
hybrid sleep
120
Key that alternates between "off" and "on" like Caps Lock and the F Lock
toggle
121
Key dependent on keyboard programming, like F1-F12
function
122
Key that changes function of another key when pressed simultaneously or sequentially like Alt, Ctrl, Shift
modifier
123
2 most overlooked keys
1. logo key | 2. application key
124
Key used to reference the underlined letters in a menu or dialog box that enable commands using the keyboard; similar to shortcut keys ex. F10
hot keys
125
Shortcut key: highlight URL
F6
126
3 ways to position a wireless router
1. central location 2. off the floor away from walls and metal objects 3. reduce interference
127
process of consolidating fragmented data on a volume (such as a hard disk or a storage device) so it will work more efficiently.
disk defragmentation
128
rearranges the data on your volume and reunites fragmented data so your computer can run more efficiently
Disk Defragmenter
129
Why do people generally think they are safer than they are while on the Internet?
Impersonal nature of technology gives us a false sense of security—we can’t be physically attacked through a computer screen. There is a belief that computers automatically take care of internet security.
130
Malware or spyware replaces your home page with one of their own to accumulate hits for a certain website
browser hijacking
131
Tricks users into clicking on a concealed link which gives the scammers access to private information. These links are hidden by adding the link to a transparent layer over what looks like a legitimate web page.
clickjacking
132
Locks users into a window; opens multiple windows, or relaunches a website in a window that can’t be closed
mousetrapping
133
Redirects legitimate website traffic to an illegitimate website in order to gain access to personal information
pharming
134
Usually bundled with software; malware that collects information about users without their knowledge and tracks browsing habits. Interferes computer functions
spyware
135
Malware that appears to be harmless or intriguing; tricks users into letting the program access a computer. Usually found in a download or email attachment
trojan horse
136
Much like a viral infection, these are programs that self-replicate. They infect computers by spreading from one file to another
virus
137
Similar to viruses but are spread without human help
worms
138
E-mail scams disguised to look like official messages from a legitimate website; fools users into providing sensitive information like passwords and credit card details
phishing
139
Intentionally harmful software or code that damages computers or collects information without a user’s knowledge. Ex: viruses, Trojan horses, worms, spyware, etc.
malware
140
A fake identity used to trick others for personal gain, usually by creating more than one account on a website. Ex. Middle aged man pretending to be a friendly teenager to determine where you live or go to school
sockpuppet
141
Representation of a user through graphics or virtual images; one may use an avatar to protect privacy
avatar
142
Someone losing their job because of an online post
dooced
143
Person who posts comments to get a rise out of users and cause a distraction; may make offensive remarks, post incorrect information, etc.
troll
144
Picture, video, post, catchphrase, hoax, topic, concept or piece of media that has gone viral or spread rapidly around the internet
meme
145
Anti-cyberbullying law making it illegal to distribute intimate images of a person without their consent
Bill C-13
146
Penalties for breaking C-13?
Fine from $5000 to $250, 000 or six months imprisonment
147
2 amendments in C-13 to the Criminal Code
1. knowingly publishing an intimate image of a person without their consent gives courts complementary power to order removal of the image and forfeiture if the device used 2. allow law enforcement officers to collect electronic evidence relating to individuals that are the subject of an investigation
148
Difference between a router and a modem
Routers are connected to a modem. The modem allows access to the Internet; the router lets multiple computers join the same network and manages network traffic.
149
Allows access to the internet
modem
150
Lets multiple computers join the same network and manages network traffic
router
151
Cable used to connect computers
ethernet cables, CAT5
152
Similarities between routers and hubs
coordinate network traffic
153
Differences between routers and hubs
hubs only let computers to communicate with each other and don't provide firewall support
154
What is the primary reason for configuring a router?
security reasons; allows you to set a password for a router
155
Sends a signal that proves that the router is there and that the computer is connected to the router
pinging a router
156
How do you reset a router?
Stick a bent paper clip into the reset hole. Press and hold. Release. This restarts the router, erases settings and places it into the condition it was in when you first set things up.
157
What is the “ultimate network fix” in the case of a network problem?
Restart the entire network—this is a general cure-all for network issues.
158
Explain the function of the notification area in terms of networking software.
Contains icons that represent the local network, which indicate the presence of a network connection.
159
Window that lists every network adapter connected to | your PC
Network Connections window
160
Tech that has been around since the 1990s. A wireless standard for connecting peripherals and for wireless networking
Bluetooth
161
Name three items you need to set up a wireless network.
1. broadband internet connection and modem 2. wireless router 3. wireless network adapters
162
Name three ways to help secure a wireless network.
a. change the default username and PASSWORD to protect the router b. set up a SECURITY KEY for your network c. use a FIREWALL
163
Protects from unauthorized access to your network
security key
164
hardware/software that help protect from hackers or malicious software
firewall
165
Word interface: Shows the name of the document on screen.
title bar
166
Word interface: Located in the top left corner of the Word window; contains some of the most frequently used commands like Save, Undo, Redo. You can add more commands to this if you need. This toolbar helps you to perform Word tasks quickly by providing one-click access to oft used documents.
Quick Access Toolbar
167
Collection of seven horizontal tabbed toolbars arranged on top of each other. These toolbars are accessed through their tabs. The toolbars have command buttons, menus and input boxes arranged in groups. Some have dialog launchers that display a dialog box related to that group. Only one tabbed toolbar is visible at any given time.
ribbon
168
The ribbon can be minimized by clicking the ____ below Window Controls.
inverted V
169
Replaces the document window with a full screen menu showing commands for file operations. Also called "backstage". Includes Save, Save As, Open, Close, Info, New, Print, Save & Send, Help, and Options commands.
File tab
170
Used to set tabs and indent text. Show measurements in inches or centimetres depending on specified Word Options
Rulers
171
You may use the vertical ruler to set ____ of text in the document.
vertical location
172
Allow you to use five different document views: Print Layout View, Full Screen Reading View, Web Layout View, Outline View, and Draft View
view buttons
173
View Button: print preview
Print Layout View
174
View Button: document on full screen
Full Screen Reading View
175
View Button: document as it would appear in-browser
Web Layout View
176
View Button: displays document in outline form
Outline View
177
View Button: editing view, most used
Draft View
178
Displays document info such as the current page number, total number of pages, word count, language, proofing error notification. Customizable by right clicking the status bar and making selections from the context menu.
Status bar
179
Lets you zoom out or zoom in the current document. Range is from 10% to 500%.
zoom tools
180
Shortcut key: open a new tab
Ctrl+T
181
Shortcut key: switch tabs
Ctrl+Tab
182
Shortcut key: reload a webpage
F5
183
3 things you should do before physically opening your computer
1. backup stuff 2. set a system restore point 3. shut down windows and unplug console
184
When unscrewing the back of the console, be sure that you don't unscrew the ___
power supply
185
The power supply is always by the ___ and ___
fan and power plug