Midterm Flashcards
application software
program that makes users more productive, assist with personal taks
application software functions
- business activities more efficient
- assist with graphics/mulitmedia projects
- support home, personal, education tasks
- facilitate communications
4 catergories of application software
- business
- graphics/multimedia
- home/personal/educational
- communications
clip art
a collection of electronic drawings, photos, and other images
font
name assigned to a specific design of characters
format
to change in appearance
blog
informational Web site consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order, short for Web log
chat
real-time typed conversation that takes place on a computer
software
series of related instructions that tells a computer what task(s) to perform and how to perform them, program
hardware
electric, electronic, and mechanical components contained in a computer
GUI - graphical user interface
allows a user to interact with software using texts, graphics, and visual images such as icons
command line interface
user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions
icon
small image displayed on a computer screen that represents a program, a document, or some other object
server
computer that controls access to the hardware, software, and other resources on a net-work and provides a centralized storage area for programs, data and information, host computer
operating system
set of programs that coordinates all of the activities among computer hardware devices
utility program
type of system software that allows a used to perform maintenance-type taks usually related to managing a computer, its devices, or its programs
operating system for Apple
Mac OS
mobile device
computing device small enough for a user to hold in his or her hand
desktop
on-screen work are that has a graphical user interface
supercomputers
fastest, most powerful, and most expensive computer, capable of processing more than 135 trillion instructions ina single second
mainframes
large, expensive, powerful computer that can handle hundreds of thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information
enterprise user
computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with office across a region, the country or the world
hacker
someone who accesses a computer or network illegally
adware
program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services
antivirus program
program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media, or on incoming files
back door
program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network
back up
to make a copy of a file
backup
duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
biometric device
device that authenticates a person’s identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavorial characteristic
anti-spam program
program that attempts to remove spam before it reaches a user’s inbox
cyberextorionist
someone who uses e-mail as a vehicle for extortion
cyberterrorist
someone who uses the Internet or network to destroy or damage computers for political reasons
copyright
exclusive rights give to authors, and artists to duplicate, publish, and sell their materials
cookie
small text file that a Web server stores on a computer
malware
short for malicious software; programs that act without a user’s knowledge and deliberately alter a comptuer’s operations
script kiddie
someone who accesses a computer or network illegal with the intent of destroying data, stealing information, or other malicious actions but does not have the technical skills and knowledge
spoofing
technique intruders use to make their network or Internet transmisson appear legitmate to a victim computer or network
spam
unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once
password
private combination of characters associated with a user name that allows access to certain computer resources
encyption
process of converting readable data into unreadable characters to prevent unauthorized access
internet
worldwide collection of networks that connects millions of business, government agencies, educational institutions, and individuals
IP address
a number that uniquely identifies each computer or device connected to the Internet
link
built-in connection to another related Web page or part of a Web page, short for hyperlink
multimedia
any application that combines text with graphics, animation, audio, video, and/or virtual reality
media players
programs that allows you to view images and animation, listen to audio, and watch video files on your computer
streaming
process of transferring data in a continuous and even flow
software used to creat, send, receive, forward, store, print and delete e-mail messages
username
unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user
domain name
text version of an IP address
cold boot
process of turning on a computer that has been powered off completely
warm boot
process of using the operating system to restart a computer
spooling
operating system process that sends documents to be printed toa buffer instead of sending them immediately to the printer, the buffer then holds the information waiting to print while the printer printers from the buffer at its own rate of speed
network administrator
computer user that is able to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network
defragmentation
process of reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and that performance of the entire computer
virus
potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
firewall
hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet
pop-up blocker
filtering program that stops pop-up ads from displaying on Web pages
zipped files
type of compressed files that usually have a .zip extension
phishing
scam in which a perpetrator sends and official looking e-mail that attempts to obtain your financial or personal information
pharming
scam, similar to phishing, where a perpetrator attempts to obtain your personal and finanical information, except they do so via spoofing
computer security risk
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer crime
any illegal act involving a computer
cybercrime
on-line or Internet based illegal acts
intrusion detection software
program that automatically analyzes all network traffic, assesses system vulnerability, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches
possessed object
any item that a user must carry to gain access to a computer or computer facility
software theft
computer security risk that occurs when someone
- steals software media
- intentionally erases programs
- illegally copies a program
- illegaly registers and/or activates a program
license
an agreement issued by a software manufacturer that gives the user the right to use the software
information theft
computer security risk that occurs when someone steals personal or confidential information
surge protector
device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment
social engineering
gaing unauthorized access or obtaining confidential information by taking advantage ofthe trusting huamn nature of some victims and the naivety of others
software suite
collection of individual programs available together as a unit, business typically include word processing, spreadsheet, e-mail, and presentation graphics software
instant messaging
real-time Internet communications services that notifies a user when one or more people are online and then allows the user to exchange messages or files or join a private chat room with those people
information
processed data that conveys meaning and is useful to people
data
collection of unprocessed items, can include text, numbers, images, audio, and video
ISP (internet service provider)
regional or national Internet access provider
worm
program that copies itself repeatedly, using up system resources and possibly shutting down the system
cerificate authority
authorized person or company that issues and verifies digitial certificates
spyware
program placed on a computer without the user’s knowledge that secretly collects information about the user
trojan horse
malicious-logic program named after the Greek myth that hides within or looks like a legitmate program
cracker
someone who access a computer or network illegally with the intent of destryoing dat, stealing information, or other malicious action
Windows 7
Microsoft’s fastest, most efficient operating system to date, offering quicker program start up, built in diagnostics, automatic recovery, improved security, enhanced searching and organizing capabilities, and an easy to use interface
virtual memory
a portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM
microblog
blog that allows users to publish short messages, usually between 100 and 200 characters, for others to read
smart phone
Internet-enabled telephone that usually also provides personal information management functions
text message
short note, typically fewer than 300 characters, sent to or from a smart phone or other mobile device
digital camera
mobile device that allows user to take pictures and stores the photographed images digitially, instead of on a traditional film
handheld computer
computer small enoguh to fit in one hand
video message
short video clip, usually about 30 seconds, sent to or from a smart phone to other mobile devices
pictures message
photo or other image, sometimes along with sound and text, sent to or from a smart phone or other mobile device
game console
mobile computing device designed fo single player or mulitplayer video games
netbook
type of notebook computer that is smaller, lighter, and often not as powerful as a traditional notebook computer
public doman software
free software that has been donated for public use and has no copyright restrictions
freeware
copyrighted software provided at no cost to a user by an individual or company that retains all rights to the software
custom software
software that performs functions specific to a business or industry, developed by a user or at a user’s request
shareware
copyrighted software that is distributed at no cost for a trial period
Linux
popular, multitasking UNIX-type operating system
UNIX
multitasking operating system that is now available for most computers of all sizes
Mac OS X
multitasking operating system that is the latest version of the Macintosh operating system
types of application software for businesses
Word processing Spreadsheet Database Presentation Note taking Personal information management Business software for photos Business software suite Project management Accounting Document management Enterprise computing
Types of graphics and multimedia application software
Computer aided design (CAD) Desktop publishing Paint/image editing Photo editing Video and audio Multimedia authoring Web page authoring
Types of application software for personal/home/educational
Software suite Personal finance Legal Tax preparation Desktop publishing Paint/image editing Photo editing and management Clip art/image gallery Video and audio editing Home design/landscaping Reference and education Entertainment
Types of communications application software
Web browser Email Blogging RSS aggregator IM Newsgroup/message board Chat room FTP Text, pictures, video messaging VoIP Video conferencing
Types of operating systems
Stand alone, sever and embedded
When the first version of Microsoft was developed
1985
7 categories if software
Packaged Custom Web application Open source Freeware Public domain Shareware