AIT-2 Flashcards
to supervise or manage a person or their work. especially in an official capacity
to oversee
is responisble for what you hear in the speakers or headphones
Sound card
a technique used by some websites to keep visitors from leaving their website. either by launching an endless series of popup adssknown colloquially as a soggy biscuitsor by relaunching their website in a window that cannot be easily closed (sometimes this window runs like a standalone application. and the taskbar and the browser’s menu become inaccessible). Many websites that do this also employ browser hijackers to reset the user’s default homepage.[1]
mousetrapping
enables the performance of more than one computer process at the same time with minimal lag in overall performance
multitasking
a kind of programmer who specializes in the development of applications relating to the World Wide Web or distributed network applications. which typically run protocols like HTTP from a Web server to a client browser using associated programming languages like HTML/CSS. C#. Ruby and PHP to name a few.
web developer/webmaster
the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one. in order to obtain personal information such as passwords. account numbers. etc.
pharming
is a powerful. highend microcomputer. They contain one or more microprocessor CPUs. They may be used by a singleuser for applications requiring more power than a typical PC (rendering complex graphics. or performing intensive scientific calculations)
Workstations/Servers
to produce and discharge radiation
to emit/to radiate
the unauthorized distribution. theft. reproduction. copying. performance. storage. sale or other use of intellectual property (IP) protected under copyright law.
piracy
The ____ command allows you to ___ the last action you performed in the program. Control+Z
Undo
select an object or text. move it and place it into an alternate area
to drag/ to drop
a generic term for any device (e.g. a graphics tablet. mouse. stylus. or trackball) used to control the movement of a cursor on a computer screen.
pointing device
the shaft that rotates in the middle of a disk driv
spindle
the part of graphic design that deals in the arrangement of visual elements on a page. It generally involves organizational principles of composition to achieve specific communication objectives
page layout
A _______ is the area is the document window where you type the text.
working area
protocol, enables two hosts to establish a connection and exchange streams of data
TCP
make an exact copy of reproduce. ||| Computer viruses replicate themselves and are passed along from user to user.
replicate
a detailed study of a subject. especially in order to discover (new) information or reach a (new) understanding:
research
specialist, that tests the security of networks systems and advises customers how to introduce and maintain security policies including setting up secure password systems. installing firewalls. keeping out hackers and dealing with viruses
Security Specialist
memory that loses its contents when the power is turned off including all RAM except the CMOS RAM used for the BIOS
volatile (memory) (note: RAM is an example of volatile memory. but there is also nonvolatile RAM. e.g. flash memory)
the sexual abuse of children and youth (potentially older people) through the exchange of sex or sexual acts for drugs. food. shelter. protection. other basics of life. and/or money.
sexual exploitation
is system software designed to help to analyze. configure. optimize or maintain a computer.
utility software
is nonvolatile(permanent) and contains instructions needed by the processor. The ___ does not need power to remember its contents
ROM (Read Only Memory)
a section of main memory or mass storage that has been reserved for a particular application / are logical divisions into more regions on a hard disk so that the OS can manage information in each region separately
partition /s
is an assemblage of files and information about those files
software package
an electronic device in a computer that issues a steady highfrequency signal that synchronizes all the internal components
system clock
to cause or enable (a condition or situation) to continue.
to maintain
a standard computer language for relational database management and data manipulation. __ is used to query. insert. update and modify data.
Structured Query Language (SQL)
employing or involving a module or modules as the basis of design or construction.
modular
is a database management system (DBMS) based on the relational model of data. Most databases in widespread use today are based on this model
relational database management system (RDBMS)
is when someone gains access to a website. program. server. service. or other system using someone else’s account or other methods.
unauthorized access
a computer pointing device that uses a lightemitting diode (LED). optoelectronic sensor and digital signal processor (DSP) to detect changes in reflected light from image to image.
optical mouse
refers to a feature of an application that shows users what they are about to print or produce before the final product is ready
WYSIWYG editor
to make exact copies of themselves (of computer viruses)
to replicate
to use someone/something for your own advantage
to exploit
______ is when the left edge of the texts in documents is further from the margin. … You can also use the Increase and Decrease _____ on the paragraph group to _____ a whole paragraph or text in your document.
to decrease/increase indent
The key used for moving on a page above or below in the document
Page up/down key
reverse the action of an earlier action
to redo changes
the ability of a microscope. or a television or computerscreen. to show things clearly and with a lot of detail:
resolution
a highlevel. interpreted programming language developed by Guido van Rossum at CWI in the Netherlands
Python
to find and be able to describe someone or something: identify what/which/who
to identify
arrange or order (a computer system or an element of it) so as to fit it for a designated task.
to configure
A is a long thin strip with scroll arrows and a sliding section
scroll bar/scrollbar
observe and check the progress or quality of (something) over a period of time keep under systematic review. We can monitor some data(flow charts of global warninig)
monitoring
to ____ a number of recent actions in a worksheet such as deletions. formatting changes
to undo changes
conclude a letter. broadcast. or other message.
to sign off
to change the direction of something. especially to send it to a different place
to redirect
a list of a company’s employees and the amount of money they are to be paid.
payroll
a hard plastic or rubbery disc (the wheel) on a computer mouse that is perpendicular to the mouse surface. It is normally located between the left and right mouse buttons. It is used. as the name suggests. for scrolling. It can often also be used as a third mouse button by pressing on it. The wheel is often but not always engineered with detents to turn in discrete steps. rather than continuously as an analog axis. to allow the operator to more easily intuit how far they are scrolling.
scroll/mouse wheel
the palmsized. 17key section of a standard computer keyboard. usually on the far right.
numeric keypad
is a digital networking communications method that groups all transmitted data into suitablysized blocks. called packets. which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
Transmission Control/Internet Protocol (TCP/IP)
the action of making a product available to the public.
release
highlight text or pick an object
to select
is a device that optically scans images. printed text. handwriting. or an object. and converts it to adigital image
scanner
are highspeed units of memory used to store and control information
register
an unvarying condition in a physical process. especially as in the theory that the universe is eternal and maintained by constant creation of matter.
steady state
The sixaxis wrist force sensor is one of the most important sensors of the robot. which can simultaneously detect the full information of threedimensional space. It is widely used in position/force control. axle hole matching. contour tracking. coordination of two robots. and other fields of robot [1.2.3.4].
sixaxis sensing system
can be used to automatically perform an action. such as updating a deployment. when a new image. such as a new version of the base image that is used in that deployment. is created. An image stream comprises one or more Docker images identified by tags.
stream (image)
to (cause to) work. be in action or have an effect: Fungovat
operate
a register in the control unit of a computer which contains the address of the next instruction to be executed. the address being increased by one after each execution unless an instruction to do otherwise occurs
program counter (PC)/instruction pointer (IP)
to start using a plan or system
to implement
is a small circuit board that can hold a group of memory chips. The bus from a SIM to the actual memory chips is 32 bits wide
SIM (Single inline memory module)
is a term used to describe how text is placed on the screen in relation to the margins.
text alignment
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
whitehat hacker
the process of enabling a computer to identify and respond to the sounds produced in human speech.
speech recognition
to change the words of a text. especially a law or a legal document: MPs were urged to amend the law to prevent another oil tanker disaster.
to amend
an occasion when a photographer takes pictures. especially of models or famous people. to be used in a newspaper or magazine.
shoot
allows your computer to communicate over a network and access the Internet
Network interface card/controller (NIC)
a surface for placing and moving a computer mouse.
mouse pad/mousepad
not smooth : rough. harsh strokes his unsmooth face awkward and unsmooth writing. | smooth = гладкий
unsmoothly
move an object or text from the clipboard to a specific location
to paste
the practice of taking someone else’s work or ideas and passing them off as one’s own.
plagiarism
examine (something) methodically and in detail. typically in order to explain and interpret it.
to analyze
the ordinary postal system as opposed to email
spam emails
Maintains the link between PCs and workstations connected in a network. Uses telecommunications. software and electronic skills. and knowledge of the networking software to locate and connect faults.
Network Support Person/Network Engineer
select an object or text and store it in a temporary location often known as the clipboard. which is usually invisible to the user
to cut
a scrollable viewing area on the screen
Window
o do something in order to discover if something is safe. works correctly. etc.. or if something is present:
test
the sending and receiving of messages over distance. especially by phone. radio. and television
telecom
is a horizontal bar at the top of the window and part of the window decoration. It displays the name of the program and active document.
title bar
To put into a proper order or into a correct or suitable sequence. relationship. or adjustmen
to arrange
Is an analyst programmer who is responsible for maintaining updating and modifying the software used by a company.
System Support Person/System Administrator
is a specialised computer connected to at least two networks. commonly two LANs or WANs or a LAN and its ISPs network
Router
a very small portable device that functions as a personal information manager
personal digital assistant
a video camera connected to a computer. allowing its images to be seen by Internet users
webcam
a detailed description of how something should be done. made. etc. + a clear. detailed plan or description of how something will be made:
specification
to eliminate an object or text
to delete
a device that forwards data packets along networks
router
to take hold of something or someone suddenly and roughly
to grab
name and address of the recipient
TO
In computing. a Trojan horse. or Trojan. is any malicious computer program which misleads users of its true intent.
Trojan horse
the final part of domain
toplevel domain (TLD)
full of something unpleasant:
rife
make a way through or into by physical strength break open by force.
to force
the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.(usually on a particular company)
spear phishing
measures the width and shows the margins
ruler
keep information safe from loss
to protect
put a new program onto a computer
to install
to modify something (e.g. software) to suit a particular individual or task
to customize
the amount of something produced by a person. machine. or industry
output
an individual responsible for maintaining a multiuser computer system. including a localarea network (LAN)
system administrator/sysadmin
configure (something) differently.
reconfigured
A ____ is a grid of rows and columns that intersect to form cells.
Table
is system software that manages computer hardware and software resources and provides common services for computer programs.
operating system (OS)
is an emal scam that is disguised to look like official communication from a legitimate website. These scams fool users into providing sensitive information like passwords. credit card details
Phishing
are the pages displayed by search engines in response to a query by a searcher. The main component of the SERP is the listing of results that are returned by the search engine in response to a keyword query. although the pages may also contain other results such as advertisements
search engine result pages (SERPs)
A security incident is an event that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them havefailed. … Examples of security incidents: Attempts from unauthorized sources to access systems or data.
security failure
to prepare a storage medium to receive data
to format
prepare (written material) for publication by correcting. condensing. or otherwise modifying it.
to edit
an objectoriented. highlevel. interpreted programming language developed in the 1990ss by Japanese programmer Yukihiro Matsumoto.
Ruby
In computing. a keyboard shortcut is a set of one or more keys that invoke a command in software or an operating system. (the System Request key. Escape key and the Menu key).
system keys
a key on a typewriter or alphanumeric keyboard in the form of a horizontal bar in the lowermost row. significantly wider than other keys. Its main purpose is to conveniently enter a space. e.g.. between words during typing.
space bar/spacebar
to use a mouse or other device to position the cursor over a particular area of a computer screen so as to cause a program to respond without clicking a button on the device
to hover
a machine controlled by a computer that is used to perform jobs automatically
robot
a connection point a device linked in a network
node
grouping of two or more computer systems linked together
network
any of various solid crystalline substances used especially as a base material for computer chips and other electronic devices
semiconductors
shows which programs or applications are running on the device. as well as provide links and shortcuts to other programs or places
taskbar (dock for OS X)
duplicate an object or text
to copy
deal with and control
to handle
software distribution model in which a thirdparty provider hosts applications and makes them available to customers over the Internet
Software as a Service(SaaS)
is a computer network for interconnecting devices centered on an individual person’s workspace
personal area network (PAN)
to send an email that you have received to someone else
to forward
is a topic of the message
SUBJECT
a graphical control element that allows multiple documents or panels to be contained within a single Windows. It is an interface style most commonly associated with web browsers. web applications. and text editors
tabbed document interface (TDI)/tab
affect (a person. organism. etc.) with a diseasecausing organism.
to nfect
______ is a type of computer program that is designed to run a computer’s
system software
a technology similar in theory to bar code identification. With it. the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals
radiofrequency identification (RFID)
strong and healthy
robust
An antivirus scanner is part and parcel of a freeantivirus software. it scans a hard drive to detect malicious software in a computing device.
virus scanner
the average speed required to transmit data from the disk to the CPU. measured in megabytes per second
transfer rate
not moving or not intended to be moved.
stationary
is software with source code that anyone can inspect. modify. and enhance.
opensource software
select as an object of attention or attack.
targeted
a special type of file in some operating systems that points to another file or device
shortcut
is a software tool included with some word processors that provides synonyms for selected words on command.
thesaurus
A ______ is a horizontal bar at the bottom of the window that displays information about the cursor position. It shows the page number. column number and the line number
status bar
Num Lock or Numeric Lock is a key on the numeric keypad of most computer keyboards. It is alock key. like Caps Lock and Scroll Lock.
Num lock
is system that allows access by multiple users of a computer. Timesharing systems
multiuser system
An act or instance of launching something again. to launch again start or get going.
to relaunch
is a person who applies the principles of software engineering to the design. development. maintenance. testing. and evaluation of computer software.
software engineer/designer
are nonsubsidiary. independent firms which employ fewer than a given number of employees
small and mediumsized enterprises (SME)
computer robot programs that collect information from sites by using keywords
spider/webcrawler
a design for a set of characters
typeface/font family
(also known as font family) is a set of one or more fonts each composed of glyphs that share common design features.
typeface
a handheld electronic device for playing digital media such as audio and video files.
portable media player
type of software includes virus checkers and firewalls
security software
invent something new or a new way of doing something
to devise
Trustworthy describes something you can believe in s it’s completely reliable. Your favorite newspaper can be trustworthy s they always print the truth. The same with programs
trustworthy entity
a digital audio file made available on the Internet for downloading to a computer or mobile device. typically available as a series. new instalments of which can be received by subscribers automatically.
podcast
is a unique identifier for any document on the Internet. which tells the browser exactly where to find the page
URL (also known as the web address)
make the best or most effective use of (a situation or resource).
to optimize
The output of taking an image . in other word an image
shot
A context menu (also called contextual. shortcut. and pop up or popup menu) is a menu in a graphical user interface (GUI) that appears upon user interaction. such as a rightclick mouse operation.
popup/context/shortcut menu
pass information from one place to another
to transmit
makes copies of all information stored on a disk and restores either the entire disk or selected files
to backup
the fastest type of computer which is very expensive and is employed for specialized applications that require immense amounts of calculations
supercomputer
In computability theory and computationalcomplexity theory. a reduction is an algorithm for transforming one problem into another problem. Areduction from one problem to another may be used to show that the second problem is at least as difficult as the first. |or| The action or fact of making something smaller or less in amount. degree. or size.
reduction
software searches files for potentially harmful programs such as viruses. worms. or Trojan horses that are written by malicious programmers.
virus checker
What is privacy violation? … Privacy violation takes place when sensitive information enters the program server/database and is illegally accessed by malicious attackers. There are three common occurrences of Privacy Violation: Unprotected storage of user data.
privacy violation
the programs and other operating information used by a computer.
software
a pointing device typically embedded between the G. H and B keys on a QWERTY keyboard
trackpoint
Studies methods of working within an organization to decide how tasks can be done efficiently by computers. Makes a detailed analysis of the employerss requirements and work patterns to prepare a report on different options for using information technology.
System Analyst
is a web browser that was created in 2003 by Apple Inc. included with the OS X and iOS operating systems. but is also available for Windows computers.
Safari
is a data communication technique in which a message transmitted from a source node is stored at an intermediary device before being forwarded to the destination node
storeandforward model
A page arranged in sequence that contain text and images for presenting to an audience.
slide
A rootkit is a program or. more often. a collection of software tools that gives a threat actor remote access to and control over a computer or other system. While there have been legitimate uses for this type of software. such as to provide remote enduser support. most rootkits open a backdoor on victim systems to introduce malicious software. such as viruses. ransomware. keylogger programs or other types of malware. or to use the system for further network security attacks. Rootkits often attempt to prevent detection of malicious software by endpoint antivirus software.
rootkit
A scheme for making money by deceptive. dishonest. or fraudulent means. i.e.. a swindle or fraud.(like MMM ) usually they use email
scam
system can only run one program at a time
singletasking OS
the ____ buttons are a feature that lets you change how the presentation or document appears.
View
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
spyware
typically consists of two or more LANs. The computers are farther apart and are linked by telephone lines. dedicated telephone lines. or radio waves
wide area network (WAN)
Selfreplication is any behavior of a dynamical system that yields construction of an identical copy of itself. Biological cells. given suitable environments. reproduce by cell division. ( viruses always do that to keep themselves in the system)
selfreplicating
interrupt (an event. activity. or process) by causing a disturbance or problem.
to disrupt
to watch or organize a job or an activity to make certain that it is being done correctly
oversee
help the user to easily and quickly access files. applications
pointer
The red line indicates a spelling error (proccess)
spellchecking
is a group of radio stations. television stations. or other electronic media outlets. that form an agreement to air. or broadcast. content from a centralized source.
terestrial network/broadcast network
type of software. such as MS PowerPoint. is used to create presentations of slides containing text and graphics and also incorporating sound and visual effects
presentation software
let you watch movies or TV. play games and listen to music wherever you are. They usually run on batteries. have a widescreen (rectangular 16:9 format) LCD and support multiformat playback
Portable DVD players
a penshaped device used on a display screen to input commands or handwritten textor drawings.
stylus
A single click or click is the act of pressing a computer mouse button once without moving the mouse. Single clicking is usually a primary action of the mouse. Single clicking. by default in many operating systems. selects (or highlights) an object while doubleclicking executes or opens the object.
single click
Windows NT is a family of operating systems produced by Microsoft. the first version of which was released on July 27. 1993. It is a processorindependent. multiprocessing and multiuser operating system.
NT/Windows NT (New Technology)
the type of computer system or smartphone you are using. in relation to the type of software (= computer programs) you can use on it
platform
a related group of things when they are offered together as a single unit: The computer comes with a software package.
package
websites that offer all types of services. e.g. email. forums. search engines. etc.
web portals
is the area between the main content of a page and the page edges.
page margins
In computing. multitouch is technology that enables a surface (a trackpad or touchscreen) to recognize the presence of more than one point of contact with the surface.
multitouch gestures
translate instructions from one computer language into another so that a particular computer can understand them
to compile
the public introduction
rollout
to find and bring back information
to retrieve/to fetch/to restore
man who recieves mail
recipient
not designed or made to order but taken from existing stock or supplies.
off the shelf (software package)
A network administrator is an IT expert who manages an organization’s network Network administrators keep networks operational and monitor functions and operations within the network.
network administrator/engineer/support person
to deal with. have responsibility for. or be in charge of:. manipulate
to handle(verb)
is a web browser developed by Opera Software
Opera
to change or make something from one format or system to another (e.g. data)
to convert
to draw a line under a word
to underline
the practice of basing some of a company’s processes or services overseas. so as to take advantage of lower costs
offshoring
The tab key Tab ↹ (abbreviation of tabulator key or tabularkey) on a keyboard is used to advance the cursor to the nexttab stop.
Tab key
a program that automatically fetches web pages which is used to feed pages to search engines
spider/webcrawler/crawler
a folder or directory where deleted items are temporarily stored
recycle bin/trash can
an international communications standard for sending voice. video. and data over digital telephone lines or normal telephone wires.
TSDN
the action or crime of making a false spoken statement damaging to a person’s reputation.
slander
push through / apply/ make/ enforce a control (ing)
to assert control
a pattern
template
A _____ is a strip of icons located in the top left corner contains some of the most frequently used commands such as Print. View. Undo and Redo are placed
quick access toolbar/ribbon
is responisble for what you see on the monitor
Video card
Decide upon the look and functioning of (a building. garment. or other object). by making a detailed drawing of it
to design
to include different types of things
to encompass/to cover/to embrace
allows a person to write computer instructions in a language that is easier for a human to understand. but which is then converted into the low level numerical instruction codes that a computer processor unit can execute.
programming language
to control something or someone to your advantage. often unfairly or dishonestly
to manipulate
all the achievements or failures that someone or something has had in the past:
track record
to convert a document or picture into digital form for storage or processing on a computer
to scan
do and complete a task
to carry out
to carry out an instruction or progra
to execute/to run
a long key on a or computer keyboard for making a blank between words
spacebar
A touchpad or trackpad is a flat control surface used to move the cursor and perform other functions on a computer. This allows for a larger touchpadsurface. but you can press the lower left or lower right section of the touchpad to click the buttons
touchpad
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. … Worms almost always cause at least some harm to the network. even if only by consuming bandwidth. whereas viruses almost always corrupt or modify files on a targeted computer.
worm
Project management is the practice of initiating. planning. executing. controlling. and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time. ALSO project management includes overseeing projects for software development. hardware installations. network upgrades. cloud computing and virtualization rollouts. business analytics and data management projects and implementing IT services.
project management
Visual Basic (VB) is a programming environment from Microsoft in which a programmer uses a graphical user interface (GUI) to choose and modify preselected sections of code written in the BASIC programming language.
VB (Visual Basic)
organize and manipulate data. usually large amounts of numeric data
to proccess
fasten or secure (something) with a lock.
to lock
to convert information or an instruction into a particular form
to encode
to (cause something to) grow or change into a more advanced. larger. orstronger form
to develop
Clicking ______ reveal a dropdown menu showing commands for file operations such as Open. Safe. Safe As and Print
office button
a pointing device shaped as a mouse lying on its back
trackball
refers to a computer that is not connected to a network
standloun
Produces the programs which control the internal operations of computers. Converts the system analystss specification to a logical series of steps.
Software Engineer/Software Designer
is a software system designed to search for information on the World Wide Web
web search engine
makes Internet content accessible via speech recognition and phone
VoiceXML
a piece of code which is capable of copying itself and typically has a detrimental effect. such as corrupting the system or destroying data.
virus
now used to create Windows applications intended for beginners or casual use
Visual BASIC
Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products. Sybase was an enterprise software and services company that produced software to manage and analyze information in relational databases.
Sybase
is a subdivision of a track on a magnetic disk or optical disc
sector
A webmaster is a person responsible for maintaining one or many websites.
webmaster
is an interactive computer application for organization. analysis and storage of data in tabular form
spreadsheet
… (such as MS Word or WordPerfect) allows you to enter and format a text. some graphics and to create reports and letters.
word processor
enables a user to save. sort and manage data in an arranged form of rows and columns/ software. such as MS Excel. allows the user to do numerical calculations and produce charts of the results.
spreadsheet software
is a device that has a screen and keyboard for input and output. but it does not do its own processing
terminal
to discover the exact place or position of something
to locate
architecture. where the two computers have the same capabilities
peertopeer
uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. such as a compact disc (CD) and a digital video disc (DVD)
optical disc drive
If a photograph is underexposed. it is darker than it should be because the film was not exposed to enough light
underexposed
cunningly deceive or outwit.
to trick
MS Word has dozens of ____ to make the editing process as easy as possible.
Tools
defines the type of Internet service (most common is http)
Scheme
after clicking on the start button you will be returned to the …
Start screen
part of the scroll bar in the sliding section
scroll arrows
is an input device and normally layered on the top of an electronic visual display of an information processing system
touchscreen
Oracle Corporation is an American multinational computer technology corporation headquartered in Redwood Shores. California. The company specializes primarily in developing and marketing database software and technology. cloud ngineered systems. and enterprise software products s particularly its own brands of database management systems.
Oracle
to make something suitable for a new use or purpose to modif /change something in order to make it suitable for a new use or situation
to adapt
The red line indicates a ____(in ms word)
spelling error
copy data from a CPU to memory. or from memory to a mass storage devic
to store
with the upper part where the lower part should be in or into an inverted position.
upsidedown
a large number or wide range (of something)
multiplicity
When the Scroll Lock mode was on. the arrow keys would scroll the contents of a text window instead of moving the cursor. In this usage. Scroll Lock is a toggling lock key like Num Lock or Caps Lock. which have a state that persists after the key is released.
Scroll lock
is situated in the lower left corner of the screen. In Windows 8. you will click the Start button to return to the Start screen.
Start button/menu
place an object or text in a specific location
to Insert
To have a clear understanding or determination of something.
solid grasp
subject directories that are selected by people and organized into hierarchical subject categories
web indexes
WWW
virtual network
Proprietary technology is any combination of processes. tools. or systems of interrelated connections that are the property of a business or an individual. These combinations provide a benefit or competitive advantage to the owners of proprietary technologies (запатентованная технология)
proprietary technology
include compilers (translate a highlevel language into a lowerlevel language machine code). assemblers (translate assembly language into machine code). and debuggers (allow programmers to test software for errors ‘bugss) for various programming languages.
programming tools
Offset printing is a commonly used printing technique in which the inked image is transferred (or offset) from a plate to a rubber blanket. then to the printing surface.
offset lithography
also known as a supplier. is an individual or company that sells goods or services to someone else in the economic production chain
vendor
invisible layer . indistinguishable from actual layer
transparent layer
a secret word or phrase that must be used to gain admission to a place. or a string of characters that allows access to a computer system or service.
password
to transmit video and audio material over the Internet as a steady. continuous flow.
to stream
numerical methods. computational methods): The process of taking a complex problem and breaking it into many smaller and simpler problems.
numerical calculations