Midterm Flashcards
application software
program that makes users more productive, assist with personal taks
application software functions
- business activities more efficient
- assist with graphics/mulitmedia projects
- support home, personal, education tasks
- facilitate communications
4 catergories of application software
- business
- graphics/multimedia
- home/personal/educational
- communications
clip art
a collection of electronic drawings, photos, and other images
font
name assigned to a specific design of characters
format
to change in appearance
blog
informational Web site consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order, short for Web log
chat
real-time typed conversation that takes place on a computer
software
series of related instructions that tells a computer what task(s) to perform and how to perform them, program
hardware
electric, electronic, and mechanical components contained in a computer
GUI - graphical user interface
allows a user to interact with software using texts, graphics, and visual images such as icons
command line interface
user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions
icon
small image displayed on a computer screen that represents a program, a document, or some other object
server
computer that controls access to the hardware, software, and other resources on a net-work and provides a centralized storage area for programs, data and information, host computer
operating system
set of programs that coordinates all of the activities among computer hardware devices
utility program
type of system software that allows a used to perform maintenance-type taks usually related to managing a computer, its devices, or its programs
operating system for Apple
Mac OS
mobile device
computing device small enough for a user to hold in his or her hand
desktop
on-screen work are that has a graphical user interface
supercomputers
fastest, most powerful, and most expensive computer, capable of processing more than 135 trillion instructions ina single second
mainframes
large, expensive, powerful computer that can handle hundreds of thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information
enterprise user
computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with office across a region, the country or the world
hacker
someone who accesses a computer or network illegally
adware
program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services
antivirus program
program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media, or on incoming files
back door
program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network
back up
to make a copy of a file
backup
duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
biometric device
device that authenticates a person’s identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavorial characteristic
anti-spam program
program that attempts to remove spam before it reaches a user’s inbox
cyberextorionist
someone who uses e-mail as a vehicle for extortion
cyberterrorist
someone who uses the Internet or network to destroy or damage computers for political reasons
copyright
exclusive rights give to authors, and artists to duplicate, publish, and sell their materials
cookie
small text file that a Web server stores on a computer
malware
short for malicious software; programs that act without a user’s knowledge and deliberately alter a comptuer’s operations
script kiddie
someone who accesses a computer or network illegal with the intent of destroying data, stealing information, or other malicious actions but does not have the technical skills and knowledge
spoofing
technique intruders use to make their network or Internet transmisson appear legitmate to a victim computer or network
spam
unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once
password
private combination of characters associated with a user name that allows access to certain computer resources
encyption
process of converting readable data into unreadable characters to prevent unauthorized access
internet
worldwide collection of networks that connects millions of business, government agencies, educational institutions, and individuals
IP address
a number that uniquely identifies each computer or device connected to the Internet