AIT-2 Flashcards
to supervise or manage a person or their work. especially in an official capacity
to oversee
is responisble for what you hear in the speakers or headphones
Sound card
a technique used by some websites to keep visitors from leaving their website. either by launching an endless series of popup adssknown colloquially as a soggy biscuitsor by relaunching their website in a window that cannot be easily closed (sometimes this window runs like a standalone application. and the taskbar and the browser’s menu become inaccessible). Many websites that do this also employ browser hijackers to reset the user’s default homepage.[1]
mousetrapping
enables the performance of more than one computer process at the same time with minimal lag in overall performance
multitasking
a kind of programmer who specializes in the development of applications relating to the World Wide Web or distributed network applications. which typically run protocols like HTTP from a Web server to a client browser using associated programming languages like HTML/CSS. C#. Ruby and PHP to name a few.
web developer/webmaster
the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one. in order to obtain personal information such as passwords. account numbers. etc.
pharming
is a powerful. highend microcomputer. They contain one or more microprocessor CPUs. They may be used by a singleuser for applications requiring more power than a typical PC (rendering complex graphics. or performing intensive scientific calculations)
Workstations/Servers
to produce and discharge radiation
to emit/to radiate
the unauthorized distribution. theft. reproduction. copying. performance. storage. sale or other use of intellectual property (IP) protected under copyright law.
piracy
The ____ command allows you to ___ the last action you performed in the program. Control+Z
Undo
select an object or text. move it and place it into an alternate area
to drag/ to drop
a generic term for any device (e.g. a graphics tablet. mouse. stylus. or trackball) used to control the movement of a cursor on a computer screen.
pointing device
the shaft that rotates in the middle of a disk driv
spindle
the part of graphic design that deals in the arrangement of visual elements on a page. It generally involves organizational principles of composition to achieve specific communication objectives
page layout
A _______ is the area is the document window where you type the text.
working area
protocol, enables two hosts to establish a connection and exchange streams of data
TCP
make an exact copy of reproduce. ||| Computer viruses replicate themselves and are passed along from user to user.
replicate
a detailed study of a subject. especially in order to discover (new) information or reach a (new) understanding:
research
specialist, that tests the security of networks systems and advises customers how to introduce and maintain security policies including setting up secure password systems. installing firewalls. keeping out hackers and dealing with viruses
Security Specialist
memory that loses its contents when the power is turned off including all RAM except the CMOS RAM used for the BIOS
volatile (memory) (note: RAM is an example of volatile memory. but there is also nonvolatile RAM. e.g. flash memory)
the sexual abuse of children and youth (potentially older people) through the exchange of sex or sexual acts for drugs. food. shelter. protection. other basics of life. and/or money.
sexual exploitation
is system software designed to help to analyze. configure. optimize or maintain a computer.
utility software
is nonvolatile(permanent) and contains instructions needed by the processor. The ___ does not need power to remember its contents
ROM (Read Only Memory)
a section of main memory or mass storage that has been reserved for a particular application / are logical divisions into more regions on a hard disk so that the OS can manage information in each region separately
partition /s
is an assemblage of files and information about those files
software package
an electronic device in a computer that issues a steady highfrequency signal that synchronizes all the internal components
system clock
to cause or enable (a condition or situation) to continue.
to maintain
a standard computer language for relational database management and data manipulation. __ is used to query. insert. update and modify data.
Structured Query Language (SQL)
employing or involving a module or modules as the basis of design or construction.
modular
is a database management system (DBMS) based on the relational model of data. Most databases in widespread use today are based on this model
relational database management system (RDBMS)
is when someone gains access to a website. program. server. service. or other system using someone else’s account or other methods.
unauthorized access
a computer pointing device that uses a lightemitting diode (LED). optoelectronic sensor and digital signal processor (DSP) to detect changes in reflected light from image to image.
optical mouse
refers to a feature of an application that shows users what they are about to print or produce before the final product is ready
WYSIWYG editor
to make exact copies of themselves (of computer viruses)
to replicate
to use someone/something for your own advantage
to exploit
______ is when the left edge of the texts in documents is further from the margin. … You can also use the Increase and Decrease _____ on the paragraph group to _____ a whole paragraph or text in your document.
to decrease/increase indent
The key used for moving on a page above or below in the document
Page up/down key
reverse the action of an earlier action
to redo changes
the ability of a microscope. or a television or computerscreen. to show things clearly and with a lot of detail:
resolution
a highlevel. interpreted programming language developed by Guido van Rossum at CWI in the Netherlands
Python
to find and be able to describe someone or something: identify what/which/who
to identify
arrange or order (a computer system or an element of it) so as to fit it for a designated task.
to configure
A is a long thin strip with scroll arrows and a sliding section
scroll bar/scrollbar
observe and check the progress or quality of (something) over a period of time keep under systematic review. We can monitor some data(flow charts of global warninig)
monitoring
to ____ a number of recent actions in a worksheet such as deletions. formatting changes
to undo changes
conclude a letter. broadcast. or other message.
to sign off
to change the direction of something. especially to send it to a different place
to redirect
a list of a company’s employees and the amount of money they are to be paid.
payroll
a hard plastic or rubbery disc (the wheel) on a computer mouse that is perpendicular to the mouse surface. It is normally located between the left and right mouse buttons. It is used. as the name suggests. for scrolling. It can often also be used as a third mouse button by pressing on it. The wheel is often but not always engineered with detents to turn in discrete steps. rather than continuously as an analog axis. to allow the operator to more easily intuit how far they are scrolling.
scroll/mouse wheel
the palmsized. 17key section of a standard computer keyboard. usually on the far right.
numeric keypad
is a digital networking communications method that groups all transmitted data into suitablysized blocks. called packets. which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.
Transmission Control/Internet Protocol (TCP/IP)
the action of making a product available to the public.
release
highlight text or pick an object
to select
is a device that optically scans images. printed text. handwriting. or an object. and converts it to adigital image
scanner
are highspeed units of memory used to store and control information
register
an unvarying condition in a physical process. especially as in the theory that the universe is eternal and maintained by constant creation of matter.
steady state
The sixaxis wrist force sensor is one of the most important sensors of the robot. which can simultaneously detect the full information of threedimensional space. It is widely used in position/force control. axle hole matching. contour tracking. coordination of two robots. and other fields of robot [1.2.3.4].
sixaxis sensing system
can be used to automatically perform an action. such as updating a deployment. when a new image. such as a new version of the base image that is used in that deployment. is created. An image stream comprises one or more Docker images identified by tags.
stream (image)
to (cause to) work. be in action or have an effect: Fungovat
operate
a register in the control unit of a computer which contains the address of the next instruction to be executed. the address being increased by one after each execution unless an instruction to do otherwise occurs
program counter (PC)/instruction pointer (IP)
to start using a plan or system
to implement
is a small circuit board that can hold a group of memory chips. The bus from a SIM to the actual memory chips is 32 bits wide
SIM (Single inline memory module)
is a term used to describe how text is placed on the screen in relation to the margins.
text alignment
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.
whitehat hacker
the process of enabling a computer to identify and respond to the sounds produced in human speech.
speech recognition
to change the words of a text. especially a law or a legal document: MPs were urged to amend the law to prevent another oil tanker disaster.
to amend
an occasion when a photographer takes pictures. especially of models or famous people. to be used in a newspaper or magazine.
shoot
allows your computer to communicate over a network and access the Internet
Network interface card/controller (NIC)
a surface for placing and moving a computer mouse.
mouse pad/mousepad
not smooth : rough. harsh strokes his unsmooth face awkward and unsmooth writing. | smooth = гладкий
unsmoothly
move an object or text from the clipboard to a specific location
to paste
the practice of taking someone else’s work or ideas and passing them off as one’s own.
plagiarism
examine (something) methodically and in detail. typically in order to explain and interpret it.
to analyze
the ordinary postal system as opposed to email
spam emails
Maintains the link between PCs and workstations connected in a network. Uses telecommunications. software and electronic skills. and knowledge of the networking software to locate and connect faults.
Network Support Person/Network Engineer
select an object or text and store it in a temporary location often known as the clipboard. which is usually invisible to the user
to cut
a scrollable viewing area on the screen
Window
o do something in order to discover if something is safe. works correctly. etc.. or if something is present:
test
the sending and receiving of messages over distance. especially by phone. radio. and television
telecom
is a horizontal bar at the top of the window and part of the window decoration. It displays the name of the program and active document.
title bar
To put into a proper order or into a correct or suitable sequence. relationship. or adjustmen
to arrange
Is an analyst programmer who is responsible for maintaining updating and modifying the software used by a company.
System Support Person/System Administrator
is a specialised computer connected to at least two networks. commonly two LANs or WANs or a LAN and its ISPs network
Router
a very small portable device that functions as a personal information manager
personal digital assistant
a video camera connected to a computer. allowing its images to be seen by Internet users
webcam
a detailed description of how something should be done. made. etc. + a clear. detailed plan or description of how something will be made:
specification
to eliminate an object or text
to delete
a device that forwards data packets along networks
router
to take hold of something or someone suddenly and roughly
to grab
name and address of the recipient
TO
In computing. a Trojan horse. or Trojan. is any malicious computer program which misleads users of its true intent.
Trojan horse
the final part of domain
toplevel domain (TLD)
full of something unpleasant:
rife
make a way through or into by physical strength break open by force.
to force
the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.(usually on a particular company)
spear phishing
measures the width and shows the margins
ruler
keep information safe from loss
to protect
put a new program onto a computer
to install
to modify something (e.g. software) to suit a particular individual or task
to customize
the amount of something produced by a person. machine. or industry
output
an individual responsible for maintaining a multiuser computer system. including a localarea network (LAN)
system administrator/sysadmin
configure (something) differently.
reconfigured
A ____ is a grid of rows and columns that intersect to form cells.
Table
is system software that manages computer hardware and software resources and provides common services for computer programs.
operating system (OS)
is an emal scam that is disguised to look like official communication from a legitimate website. These scams fool users into providing sensitive information like passwords. credit card details
Phishing
are the pages displayed by search engines in response to a query by a searcher. The main component of the SERP is the listing of results that are returned by the search engine in response to a keyword query. although the pages may also contain other results such as advertisements
search engine result pages (SERPs)
A security incident is an event that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them havefailed. … Examples of security incidents: Attempts from unauthorized sources to access systems or data.
security failure
to prepare a storage medium to receive data
to format