AIT-2 Flashcards

1
Q

to supervise or manage a person or their work. especially in an official capacity

A

to oversee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is responisble for what you hear in the speakers or headphones

A

Sound card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a technique used by some websites to keep visitors from leaving their website. either by launching an endless series of popup adssknown colloquially as a soggy biscuitsor by relaunching their website in a window that cannot be easily closed (sometimes this window runs like a standalone application. and the taskbar and the browser’s menu become inaccessible). Many websites that do this also employ browser hijackers to reset the user’s default homepage.[1]

A

mousetrapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

enables the performance of more than one computer process at the same time with minimal lag in overall performance

A

multitasking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

a kind of programmer who specializes in the development of applications relating to the World Wide Web or distributed network applications. which typically run protocols like HTTP from a Web server to a client browser using associated programming languages like HTML/CSS. C#. Ruby and PHP to name a few.

A

web developer/webmaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one. in order to obtain personal information such as passwords. account numbers. etc.

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is a powerful. highend microcomputer. They contain one or more microprocessor CPUs. They may be used by a singleuser for applications requiring more power than a typical PC (rendering complex graphics. or performing intensive scientific calculations)

A

Workstations/Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

to produce and discharge radiation

A

to emit/to radiate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

the unauthorized distribution. theft. reproduction. copying. performance. storage. sale or other use of intellectual property (IP) protected under copyright law.

A

piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ____ command allows you to ___ the last action you performed in the program. Control+Z

A

Undo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

select an object or text. move it and place it into an alternate area

A

to drag/ to drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a generic term for any device (e.g. a graphics tablet. mouse. stylus. or trackball) used to control the movement of a cursor on a computer screen.

A

pointing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the shaft that rotates in the middle of a disk driv

A

spindle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the part of graphic design that deals in the arrangement of visual elements on a page. It generally involves organizational principles of composition to achieve specific communication objectives

A

page layout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _______ is the area is the document window where you type the text.

A

working area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

protocol, enables two hosts to establish a connection and exchange streams of data

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

make an exact copy of reproduce. ||| Computer viruses replicate themselves and are passed along from user to user.

A

replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

a detailed study of a subject. especially in order to discover (new) information or reach a (new) understanding:

A

research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

specialist, that tests the security of networks systems and advises customers how to introduce and maintain security policies including setting up secure password systems. installing firewalls. keeping out hackers and dealing with viruses

A

Security Specialist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

memory that loses its contents when the power is turned off including all RAM except the CMOS RAM used for the BIOS

A

volatile (memory) (note: RAM is an example of volatile memory. but there is also nonvolatile RAM. e.g. flash memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

the sexual abuse of children and youth (potentially older people) through the exchange of sex or sexual acts for drugs. food. shelter. protection. other basics of life. and/or money.

A

sexual exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

is system software designed to help to analyze. configure. optimize or maintain a computer.

A

utility software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is nonvolatile(permanent) and contains instructions needed by the processor. The ___ does not need power to remember its contents

A

ROM (Read Only Memory)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

a section of main memory or mass storage that has been reserved for a particular application / are logical divisions into more regions on a hard disk so that the OS can manage information in each region separately

A

partition /s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

is an assemblage of files and information about those files

A

software package

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

an electronic device in a computer that issues a steady highfrequency signal that synchronizes all the internal components

A

system clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

to cause or enable (a condition or situation) to continue.

A

to maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

a standard computer language for relational database management and data manipulation. __ is used to query. insert. update and modify data.

A

Structured Query Language (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

employing or involving a module or modules as the basis of design or construction.

A

modular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

is a database management system (DBMS) based on the relational model of data. Most databases in widespread use today are based on this model

A

relational database management system (RDBMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

is when someone gains access to a website. program. server. service. or other system using someone else’s account or other methods.

A

unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

a computer pointing device that uses a lightemitting diode (LED). optoelectronic sensor and digital signal processor (DSP) to detect changes in reflected light from image to image.

A

optical mouse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

refers to a feature of an application that shows users what they are about to print or produce before the final product is ready

A

WYSIWYG editor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

to make exact copies of themselves (of computer viruses)

A

to replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

to use someone/something for your own advantage

A

to exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

______ is when the left edge of the texts in documents is further from the margin. … You can also use the Increase and Decrease _____ on the paragraph group to _____ a whole paragraph or text in your document.

A

to decrease/increase indent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The key used for moving on a page above or below in the document

A

Page up/down key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

reverse the action of an earlier action

A

to redo changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

the ability of a microscope. or a television or computerscreen. to show things clearly and with a lot of detail:

A

resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

a highlevel. interpreted programming language developed by Guido van Rossum at CWI in the Netherlands

A

Python

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

to find and be able to describe someone or something: identify what/which/who

A

to identify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

arrange or order (a computer system or an element of it) so as to fit it for a designated task.

A

to configure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A is a long thin strip with scroll arrows and a sliding section

A

scroll bar/scrollbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

observe and check the progress or quality of (something) over a period of time keep under systematic review. We can monitor some data(flow charts of global warninig)

A

monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

to ____ a number of recent actions in a worksheet such as deletions. formatting changes

A

to undo changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

conclude a letter. broadcast. or other message.

A

to sign off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

to change the direction of something. especially to send it to a different place

A

to redirect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

a list of a company’s employees and the amount of money they are to be paid.

A

payroll

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

a hard plastic or rubbery disc (the wheel) on a computer mouse that is perpendicular to the mouse surface. It is normally located between the left and right mouse buttons. It is used. as the name suggests. for scrolling. It can often also be used as a third mouse button by pressing on it. The wheel is often but not always engineered with detents to turn in discrete steps. rather than continuously as an analog axis. to allow the operator to more easily intuit how far they are scrolling.

A

scroll/mouse wheel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

the palmsized. 17key section of a standard computer keyboard. usually on the far right.

A

numeric keypad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

is a digital networking communications method that groups all transmitted data into suitablysized blocks. called packets. which are transmitted via a medium that may be shared by multiple simultaneous communication sessions.

A

Transmission Control/Internet Protocol (TCP/IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

the action of making a product available to the public.

A

release

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

highlight text or pick an object

A

to select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

is a device that optically scans images. printed text. handwriting. or an object. and converts it to adigital image

A

scanner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

are highspeed units of memory used to store and control information

A

register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

an unvarying condition in a physical process. especially as in the theory that the universe is eternal and maintained by constant creation of matter.

A

steady state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

The sixaxis wrist force sensor is one of the most important sensors of the robot. which can simultaneously detect the full information of threedimensional space. It is widely used in position/force control. axle hole matching. contour tracking. coordination of two robots. and other fields of robot [1.2.3.4].

A

sixaxis sensing system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

can be used to automatically perform an action. such as updating a deployment. when a new image. such as a new version of the base image that is used in that deployment. is created. An image stream comprises one or more Docker images identified by tags.

A

stream (image)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

to (cause to) work. be in action or have an effect: Fungovat

A

operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

a register in the control unit of a computer which contains the address of the next instruction to be executed. the address being increased by one after each execution unless an instruction to do otherwise occurs

A

program counter (PC)/instruction pointer (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

to start using a plan or system

A

to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

is a small circuit board that can hold a group of memory chips. The bus from a SIM to the actual memory chips is 32 bits wide

A

SIM (Single inline memory module)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

is a term used to describe how text is placed on the screen in relation to the margins.

A

text alignment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security.

A

whitehat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

the process of enabling a computer to identify and respond to the sounds produced in human speech.

A

speech recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

to change the words of a text. especially a law or a legal document: MPs were urged to amend the law to prevent another oil tanker disaster.

A

to amend

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

an occasion when a photographer takes pictures. especially of models or famous people. to be used in a newspaper or magazine.

A

shoot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

allows your computer to communicate over a network and access the Internet

A

Network interface card/controller (NIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

a surface for placing and moving a computer mouse.

A

mouse pad/mousepad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

not smooth : rough. harsh strokes his unsmooth face awkward and unsmooth writing. | smooth = гладкий

A

unsmoothly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

move an object or text from the clipboard to a specific location

A

to paste

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

the practice of taking someone else’s work or ideas and passing them off as one’s own.

A

plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

examine (something) methodically and in detail. typically in order to explain and interpret it.

A

to analyze

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

the ordinary postal system as opposed to email

A

spam emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Maintains the link between PCs and workstations connected in a network. Uses telecommunications. software and electronic skills. and knowledge of the networking software to locate and connect faults.

A

Network Support Person/Network Engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

select an object or text and store it in a temporary location often known as the clipboard. which is usually invisible to the user

A

to cut

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

a scrollable viewing area on the screen

A

Window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

o do something in order to discover if something is safe. works correctly. etc.. or if something is present:

A

test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

the sending and receiving of messages over distance. especially by phone. radio. and television

A

telecom

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

is a horizontal bar at the top of the window and part of the window decoration. It displays the name of the program and active document.

A

title bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

To put into a proper order or into a correct or suitable sequence. relationship. or adjustmen

A

to arrange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Is an analyst programmer who is responsible for maintaining updating and modifying the software used by a company.

A

System Support Person/System Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

is a specialised computer connected to at least two networks. commonly two LANs or WANs or a LAN and its ISPs network

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

a very small portable device that functions as a personal information manager

A

personal digital assistant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

a video camera connected to a computer. allowing its images to be seen by Internet users

A

webcam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

a detailed description of how something should be done. made. etc. + a clear. detailed plan or description of how something will be made:

A

specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

to eliminate an object or text

A

to delete

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

a device that forwards data packets along networks

A

router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

to take hold of something or someone suddenly and roughly

A

to grab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

name and address of the recipient

A

TO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

In computing. a Trojan horse. or Trojan. is any malicious computer program which misleads users of its true intent.

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

the final part of domain

A

toplevel domain (TLD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

full of something unpleasant:

A

rife

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

make a way through or into by physical strength break open by force.

A

to force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.(usually on a particular company)

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

measures the width and shows the margins

A

ruler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

keep information safe from loss

A

to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

put a new program onto a computer

A

to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

to modify something (e.g. software) to suit a particular individual or task

A

to customize

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

the amount of something produced by a person. machine. or industry

A

output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

an individual responsible for maintaining a multiuser computer system. including a localarea network (LAN)

A

system administrator/sysadmin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

configure (something) differently.

A

reconfigured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

A ____ is a grid of rows and columns that intersect to form cells.

A

Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

is system software that manages computer hardware and software resources and provides common services for computer programs.

A

operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

is an emal scam that is disguised to look like official communication from a legitimate website. These scams fool users into providing sensitive information like passwords. credit card details

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

are the pages displayed by search engines in response to a query by a searcher. The main component of the SERP is the listing of results that are returned by the search engine in response to a keyword query. although the pages may also contain other results such as advertisements

A

search engine result pages (SERPs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

A security incident is an event that may indicate that an organization’s systems or data have been compromised or that measures put in place to protect them havefailed. … Examples of security incidents: Attempts from unauthorized sources to access systems or data.

A

security failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

to prepare a storage medium to receive data

A

to format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

prepare (written material) for publication by correcting. condensing. or otherwise modifying it.

A

to edit

110
Q

an objectoriented. highlevel. interpreted programming language developed in the 1990ss by Japanese programmer Yukihiro Matsumoto.

A

Ruby

111
Q

In computing. a keyboard shortcut is a set of one or more keys that invoke a command in software or an operating system. (the System Request key. Escape key and the Menu key).

A

system keys

112
Q

a key on a typewriter or alphanumeric keyboard in the form of a horizontal bar in the lowermost row. significantly wider than other keys. Its main purpose is to conveniently enter a space. e.g.. between words during typing.

A

space bar/spacebar

113
Q

to use a mouse or other device to position the cursor over a particular area of a computer screen so as to cause a program to respond without clicking a button on the device

A

to hover

114
Q

a machine controlled by a computer that is used to perform jobs automatically

A

robot

115
Q

a connection point a device linked in a network

A

node

116
Q

grouping of two or more computer systems linked together

A

network

117
Q

any of various solid crystalline substances used especially as a base material for computer chips and other electronic devices

A

semiconductors

118
Q

shows which programs or applications are running on the device. as well as provide links and shortcuts to other programs or places

A

taskbar (dock for OS X)

119
Q

duplicate an object or text

A

to copy

120
Q

deal with and control

A

to handle

121
Q

software distribution model in which a thirdparty provider hosts applications and makes them available to customers over the Internet

A

Software as a Service(SaaS)

122
Q

is a computer network for interconnecting devices centered on an individual person’s workspace

A

personal area network (PAN)

123
Q

to send an email that you have received to someone else

A

to forward

124
Q

is a topic of the message

A

SUBJECT

125
Q

a graphical control element that allows multiple documents or panels to be contained within a single Windows. It is an interface style most commonly associated with web browsers. web applications. and text editors

A

tabbed document interface (TDI)/tab

126
Q

affect (a person. organism. etc.) with a diseasecausing organism.

A

to nfect

127
Q

______ is a type of computer program that is designed to run a computer’s

A

system software

128
Q

a technology similar in theory to bar code identification. With it. the electromagnetic or electrostatic coupling in the RF portion of the electromagnetic spectrum is used to transmit signals

A

radiofrequency identification (RFID)

129
Q

strong and healthy

A

robust

130
Q

An antivirus scanner is part and parcel of a freeantivirus software. it scans a hard drive to detect malicious software in a computing device.

A

virus scanner

131
Q

the average speed required to transmit data from the disk to the CPU. measured in megabytes per second

A

transfer rate

132
Q

not moving or not intended to be moved.

A

stationary

133
Q

is software with source code that anyone can inspect. modify. and enhance.

A

opensource software

134
Q

select as an object of attention or attack.

A

targeted

135
Q

a special type of file in some operating systems that points to another file or device

A

shortcut

136
Q

is a software tool included with some word processors that provides synonyms for selected words on command.

A

thesaurus

137
Q

A ______ is a horizontal bar at the bottom of the window that displays information about the cursor position. It shows the page number. column number and the line number

A

status bar

138
Q

Num Lock or Numeric Lock is a key on the numeric keypad of most computer keyboards. It is alock key. like Caps Lock and Scroll Lock.

A

Num lock

139
Q

is system that allows access by multiple users of a computer. Timesharing systems

A

multiuser system

140
Q

An act or instance of launching something again. to launch again start or get going.

A

to relaunch

141
Q

is a person who applies the principles of software engineering to the design. development. maintenance. testing. and evaluation of computer software.

A

software engineer/designer

142
Q

are nonsubsidiary. independent firms which employ fewer than a given number of employees

A

small and mediumsized enterprises (SME)

143
Q

computer robot programs that collect information from sites by using keywords

A

spider/webcrawler

144
Q

a design for a set of characters

A

typeface/font family

145
Q

(also known as font family) is a set of one or more fonts each composed of glyphs that share common design features.

A

typeface

146
Q

a handheld electronic device for playing digital media such as audio and video files.

A

portable media player

147
Q

type of software includes virus checkers and firewalls

A

security software

148
Q

invent something new or a new way of doing something

A

to devise

149
Q

Trustworthy describes something you can believe in s it’s completely reliable. Your favorite newspaper can be trustworthy s they always print the truth. The same with programs

A

trustworthy entity

150
Q

a digital audio file made available on the Internet for downloading to a computer or mobile device. typically available as a series. new instalments of which can be received by subscribers automatically.

A

podcast

151
Q

is a unique identifier for any document on the Internet. which tells the browser exactly where to find the page

A

URL (also known as the web address)

152
Q

make the best or most effective use of (a situation or resource).

A

to optimize

153
Q

The output of taking an image . in other word an image

A

shot

154
Q

A context menu (also called contextual. shortcut. and pop up or popup menu) is a menu in a graphical user interface (GUI) that appears upon user interaction. such as a rightclick mouse operation.

A

popup/context/shortcut menu

155
Q

pass information from one place to another

A

to transmit

156
Q

makes copies of all information stored on a disk and restores either the entire disk or selected files

A

to backup

157
Q

the fastest type of computer which is very expensive and is employed for specialized applications that require immense amounts of calculations

A

supercomputer

158
Q

In computability theory and computationalcomplexity theory. a reduction is an algorithm for transforming one problem into another problem. Areduction from one problem to another may be used to show that the second problem is at least as difficult as the first. |or| The action or fact of making something smaller or less in amount. degree. or size.

A

reduction

159
Q

software searches files for potentially harmful programs such as viruses. worms. or Trojan horses that are written by malicious programmers.

A

virus checker

160
Q

What is privacy violation? … Privacy violation takes place when sensitive information enters the program server/database and is illegally accessed by malicious attackers. There are three common occurrences of Privacy Violation: Unprotected storage of user data.

A

privacy violation

161
Q

the programs and other operating information used by a computer.

A

software

162
Q

a pointing device typically embedded between the G. H and B keys on a QWERTY keyboard

A

trackpoint

163
Q

Studies methods of working within an organization to decide how tasks can be done efficiently by computers. Makes a detailed analysis of the employerss requirements and work patterns to prepare a report on different options for using information technology.

A

System Analyst

164
Q

is a web browser that was created in 2003 by Apple Inc. included with the OS X and iOS operating systems. but is also available for Windows computers.

A

Safari

165
Q

is a data communication technique in which a message transmitted from a source node is stored at an intermediary device before being forwarded to the destination node

A

storeandforward model

166
Q

A page arranged in sequence that contain text and images for presenting to an audience.

A

slide

167
Q

A rootkit is a program or. more often. a collection of software tools that gives a threat actor remote access to and control over a computer or other system. While there have been legitimate uses for this type of software. such as to provide remote enduser support. most rootkits open a backdoor on victim systems to introduce malicious software. such as viruses. ransomware. keylogger programs or other types of malware. or to use the system for further network security attacks. Rootkits often attempt to prevent detection of malicious software by endpoint antivirus software.

A

rootkit

168
Q

A scheme for making money by deceptive. dishonest. or fraudulent means. i.e.. a swindle or fraud.(like MMM ) usually they use email

A

scam

169
Q

system can only run one program at a time

A

singletasking OS

170
Q

the ____ buttons are a feature that lets you change how the presentation or document appears.

A

View

171
Q

software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.

A

spyware

172
Q

typically consists of two or more LANs. The computers are farther apart and are linked by telephone lines. dedicated telephone lines. or radio waves

A

wide area network (WAN)

173
Q

Selfreplication is any behavior of a dynamical system that yields construction of an identical copy of itself. Biological cells. given suitable environments. reproduce by cell division. ( viruses always do that to keep themselves in the system)

A

selfreplicating

174
Q

interrupt (an event. activity. or process) by causing a disturbance or problem.

A

to disrupt

175
Q

to watch or organize a job or an activity to make certain that it is being done correctly

A

oversee

176
Q

help the user to easily and quickly access files. applications

A

pointer

177
Q

The red line indicates a spelling error (proccess)

A

spellchecking

178
Q

is a group of radio stations. television stations. or other electronic media outlets. that form an agreement to air. or broadcast. content from a centralized source.

A

terestrial network/broadcast network

179
Q

type of software. such as MS PowerPoint. is used to create presentations of slides containing text and graphics and also incorporating sound and visual effects

A

presentation software

180
Q

let you watch movies or TV. play games and listen to music wherever you are. They usually run on batteries. have a widescreen (rectangular 16:9 format) LCD and support multiformat playback

A

Portable DVD players

181
Q

a penshaped device used on a display screen to input commands or handwritten textor drawings.

A

stylus

182
Q

A single click or click is the act of pressing a computer mouse button once without moving the mouse. Single clicking is usually a primary action of the mouse. Single clicking. by default in many operating systems. selects (or highlights) an object while doubleclicking executes or opens the object.

A

single click

183
Q

Windows NT is a family of operating systems produced by Microsoft. the first version of which was released on July 27. 1993. It is a processorindependent. multiprocessing and multiuser operating system.

A

NT/Windows NT (New Technology)

184
Q

the type of computer system or smartphone you are using. in relation to the type of software (= computer programs) you can use on it

A

platform

185
Q

a related group of things when they are offered together as a single unit: The computer comes with a software package.

A

package

186
Q

websites that offer all types of services. e.g. email. forums. search engines. etc.

A

web portals

187
Q

is the area between the main content of a page and the page edges.

A

page margins

188
Q

In computing. multitouch is technology that enables a surface (a trackpad or touchscreen) to recognize the presence of more than one point of contact with the surface.

A

multitouch gestures

189
Q

translate instructions from one computer language into another so that a particular computer can understand them

A

to compile

190
Q

the public introduction

A

rollout

191
Q

to find and bring back information

A

to retrieve/to fetch/to restore

192
Q

man who recieves mail

A

recipient

193
Q

not designed or made to order but taken from existing stock or supplies.

A

off the shelf (software package)

194
Q

A network administrator is an IT expert who manages an organization’s network Network administrators keep networks operational and monitor functions and operations within the network.

A

network administrator/engineer/support person

195
Q

to deal with. have responsibility for. or be in charge of:. manipulate

A

to handle(verb)

196
Q

is a web browser developed by Opera Software

A

Opera

197
Q

to change or make something from one format or system to another (e.g. data)

A

to convert

198
Q

to draw a line under a word

A

to underline

199
Q

the practice of basing some of a company’s processes or services overseas. so as to take advantage of lower costs

A

offshoring

200
Q

The tab key Tab ↹ (abbreviation of tabulator key or tabularkey) on a keyboard is used to advance the cursor to the nexttab stop.

A

Tab key

201
Q

a program that automatically fetches web pages which is used to feed pages to search engines

A

spider/webcrawler/crawler

202
Q

a folder or directory where deleted items are temporarily stored

A

recycle bin/trash can

203
Q

an international communications standard for sending voice. video. and data over digital telephone lines or normal telephone wires.

A

TSDN

204
Q

the action or crime of making a false spoken statement damaging to a person’s reputation.

A

slander

205
Q

push through / apply/ make/ enforce a control (ing)

A

to assert control

206
Q

a pattern

A

template

207
Q

A _____ is a strip of icons located in the top left corner contains some of the most frequently used commands such as Print. View. Undo and Redo are placed

A

quick access toolbar/ribbon

208
Q

is responisble for what you see on the monitor

A

Video card

209
Q

Decide upon the look and functioning of (a building. garment. or other object). by making a detailed drawing of it

A

to design

210
Q

to include different types of things

A

to encompass/to cover/to embrace

211
Q

allows a person to write computer instructions in a language that is easier for a human to understand. but which is then converted into the low level numerical instruction codes that a computer processor unit can execute.

A

programming language

212
Q

to control something or someone to your advantage. often unfairly or dishonestly

A

to manipulate

213
Q

all the achievements or failures that someone or something has had in the past:

A

track record

214
Q

to convert a document or picture into digital form for storage or processing on a computer

A

to scan

215
Q

do and complete a task

A

to carry out

216
Q

to carry out an instruction or progra

A

to execute/to run

217
Q

a long key on a or computer keyboard for making a blank between words

A

spacebar

218
Q

A touchpad or trackpad is a flat control surface used to move the cursor and perform other functions on a computer. This allows for a larger touchpadsurface. but you can press the lower left or lower right section of the touchpad to click the buttons

A

touchpad

219
Q

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. … Worms almost always cause at least some harm to the network. even if only by consuming bandwidth. whereas viruses almost always corrupt or modify files on a targeted computer.

A

worm

220
Q

Project management is the practice of initiating. planning. executing. controlling. and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time. ALSO project management includes overseeing projects for software development. hardware installations. network upgrades. cloud computing and virtualization rollouts. business analytics and data management projects and implementing IT services.

A

project management

221
Q

Visual Basic (VB) is a programming environment from Microsoft in which a programmer uses a graphical user interface (GUI) to choose and modify preselected sections of code written in the BASIC programming language.

A

VB (Visual Basic)

222
Q

organize and manipulate data. usually large amounts of numeric data

A

to proccess

223
Q

fasten or secure (something) with a lock.

A

to lock

224
Q

to convert information or an instruction into a particular form

A

to encode

225
Q

to (cause something to) grow or change into a more advanced. larger. orstronger form

A

to develop

226
Q

Clicking ______ reveal a dropdown menu showing commands for file operations such as Open. Safe. Safe As and Print

A

office button

227
Q

a pointing device shaped as a mouse lying on its back

A

trackball

228
Q

refers to a computer that is not connected to a network

A

standloun

229
Q

Produces the programs which control the internal operations of computers. Converts the system analystss specification to a logical series of steps.

A

Software Engineer/Software Designer

230
Q

is a software system designed to search for information on the World Wide Web

A

web search engine

231
Q

makes Internet content accessible via speech recognition and phone

A

VoiceXML

232
Q

a piece of code which is capable of copying itself and typically has a detrimental effect. such as corrupting the system or destroying data.

A

virus

233
Q

now used to create Windows applications intended for beginners or casual use

A

Visual BASIC

234
Q

Sybase is a computer software company that develops and sells database management system (DBMS) and middleware products. Sybase was an enterprise software and services company that produced software to manage and analyze information in relational databases.

A

Sybase

235
Q

is a subdivision of a track on a magnetic disk or optical disc

A

sector

236
Q

A webmaster is a person responsible for maintaining one or many websites.

A

webmaster

237
Q

is an interactive computer application for organization. analysis and storage of data in tabular form

A

spreadsheet

238
Q

… (such as MS Word or WordPerfect) allows you to enter and format a text. some graphics and to create reports and letters.

A

word processor

239
Q

enables a user to save. sort and manage data in an arranged form of rows and columns/ software. such as MS Excel. allows the user to do numerical calculations and produce charts of the results.

A

spreadsheet software

240
Q

is a device that has a screen and keyboard for input and output. but it does not do its own processing

A

terminal

241
Q

to discover the exact place or position of something

A

to locate

242
Q

architecture. where the two computers have the same capabilities

A

peertopeer

243
Q

uses laser light or electromagnetic waves within or near the visible light spectrum as part of the process of reading or writing data to or from optical discs. such as a compact disc (CD) and a digital video disc (DVD)

A

optical disc drive

244
Q

If a photograph is underexposed. it is darker than it should be because the film was not exposed to enough light

A

underexposed

245
Q

cunningly deceive or outwit.

A

to trick

246
Q

MS Word has dozens of ____ to make the editing process as easy as possible.

A

Tools

247
Q

defines the type of Internet service (most common is http)

A

Scheme

248
Q

after clicking on the start button you will be returned to the …

A

Start screen

249
Q

part of the scroll bar in the sliding section

A

scroll arrows

250
Q

is an input device and normally layered on the top of an electronic visual display of an information processing system

A

touchscreen

251
Q

Oracle Corporation is an American multinational computer technology corporation headquartered in Redwood Shores. California. The company specializes primarily in developing and marketing database software and technology. cloud ngineered systems. and enterprise software products s particularly its own brands of database management systems.

A

Oracle

252
Q

to make something suitable for a new use or purpose to modif /change something in order to make it suitable for a new use or situation

A

to adapt

253
Q

The red line indicates a ____(in ms word)

A

spelling error

254
Q

copy data from a CPU to memory. or from memory to a mass storage devic

A

to store

255
Q

with the upper part where the lower part should be in or into an inverted position.

A

upsidedown

256
Q

a large number or wide range (of something)

A

multiplicity

257
Q

When the Scroll Lock mode was on. the arrow keys would scroll the contents of a text window instead of moving the cursor. In this usage. Scroll Lock is a toggling lock key like Num Lock or Caps Lock. which have a state that persists after the key is released.

A

Scroll lock

258
Q

is situated in the lower left corner of the screen. In Windows 8. you will click the Start button to return to the Start screen.

A

Start button/menu

259
Q

place an object or text in a specific location

A

to Insert

260
Q

To have a clear understanding or determination of something.

A

solid grasp

261
Q

subject directories that are selected by people and organized into hierarchical subject categories

A

web indexes

262
Q

WWW

A

virtual network

263
Q

Proprietary technology is any combination of processes. tools. or systems of interrelated connections that are the property of a business or an individual. These combinations provide a benefit or competitive advantage to the owners of proprietary technologies (запатентованная технология)

A

proprietary technology

264
Q

include compilers (translate a highlevel language into a lowerlevel language machine code). assemblers (translate assembly language into machine code). and debuggers (allow programmers to test software for errors ‘bugss) for various programming languages.

A

programming tools

265
Q

Offset printing is a commonly used printing technique in which the inked image is transferred (or offset) from a plate to a rubber blanket. then to the printing surface.

A

offset lithography

266
Q

also known as a supplier. is an individual or company that sells goods or services to someone else in the economic production chain

A

vendor

267
Q

invisible layer . indistinguishable from actual layer

A

transparent layer

268
Q

a secret word or phrase that must be used to gain admission to a place. or a string of characters that allows access to a computer system or service.

A

password

269
Q

to transmit video and audio material over the Internet as a steady. continuous flow.

A

to stream

270
Q

numerical methods. computational methods): The process of taking a complex problem and breaking it into many smaller and simpler problems.

A

numerical calculations