Midterm Flashcards

1
Q

application software

A

program that makes users more productive, assist with personal taks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

application software functions

A
  1. business activities more efficient
  2. assist with graphics/mulitmedia projects
  3. support home, personal, education tasks
  4. facilitate communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 catergories of application software

A
  1. business
  2. graphics/multimedia
  3. home/personal/educational
  4. communications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

clip art

A

a collection of electronic drawings, photos, and other images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

font

A

name assigned to a specific design of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

format

A

to change in appearance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

blog

A

informational Web site consisting of time-stamped articles, or posts, in a diary or journal format, usually listed in reverse chronological order, short for Web log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

chat

A

real-time typed conversation that takes place on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

software

A

series of related instructions that tells a computer what task(s) to perform and how to perform them, program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hardware

A

electric, electronic, and mechanical components contained in a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GUI - graphical user interface

A

allows a user to interact with software using texts, graphics, and visual images such as icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

command line interface

A

user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

icon

A

small image displayed on a computer screen that represents a program, a document, or some other object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

server

A

computer that controls access to the hardware, software, and other resources on a net-work and provides a centralized storage area for programs, data and information, host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

operating system

A

set of programs that coordinates all of the activities among computer hardware devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

utility program

A

type of system software that allows a used to perform maintenance-type taks usually related to managing a computer, its devices, or its programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

operating system for Apple

A

Mac OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

mobile device

A

computing device small enough for a user to hold in his or her hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

desktop

A

on-screen work are that has a graphical user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

supercomputers

A

fastest, most powerful, and most expensive computer, capable of processing more than 135 trillion instructions ina single second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

mainframes

A

large, expensive, powerful computer that can handle hundreds of thousands of connected users simultaneously, storing tremendous amounts of data, instructions, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

enterprise user

A

computer user working for a business that has hundreds or thousands of employees or customers that work in or do business with office across a region, the country or the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

hacker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

adware

A

program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

antivirus program

A

program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media, or on incoming files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

back door

A

program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

back up

A

to make a copy of a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

backup

A

duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

biometric device

A

device that authenticates a person’s identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavorial characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

anti-spam program

A

program that attempts to remove spam before it reaches a user’s inbox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

cyberextorionist

A

someone who uses e-mail as a vehicle for extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

cyberterrorist

A

someone who uses the Internet or network to destroy or damage computers for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

copyright

A

exclusive rights give to authors, and artists to duplicate, publish, and sell their materials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

cookie

A

small text file that a Web server stores on a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

malware

A

short for malicious software; programs that act without a user’s knowledge and deliberately alter a comptuer’s operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

script kiddie

A

someone who accesses a computer or network illegal with the intent of destroying data, stealing information, or other malicious actions but does not have the technical skills and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

spoofing

A

technique intruders use to make their network or Internet transmisson appear legitmate to a victim computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

spam

A

unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

password

A

private combination of characters associated with a user name that allows access to certain computer resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

encyption

A

process of converting readable data into unreadable characters to prevent unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

internet

A

worldwide collection of networks that connects millions of business, government agencies, educational institutions, and individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

IP address

A

a number that uniquely identifies each computer or device connected to the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

link

A

built-in connection to another related Web page or part of a Web page, short for hyperlink

44
Q

multimedia

A

any application that combines text with graphics, animation, audio, video, and/or virtual reality

45
Q

media players

A

programs that allows you to view images and animation, listen to audio, and watch video files on your computer

46
Q

streaming

A

process of transferring data in a continuous and even flow

47
Q

e-mail

A

software used to creat, send, receive, forward, store, print and delete e-mail messages

48
Q

username

A

unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user

49
Q

domain name

A

text version of an IP address

50
Q

cold boot

A

process of turning on a computer that has been powered off completely

51
Q

warm boot

A

process of using the operating system to restart a computer

52
Q

spooling

A

operating system process that sends documents to be printed toa buffer instead of sending them immediately to the printer, the buffer then holds the information waiting to print while the printer printers from the buffer at its own rate of speed

53
Q

network administrator

A

computer user that is able to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network

54
Q

defragmentation

A

process of reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and that performance of the entire computer

55
Q

virus

A

potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

56
Q

firewall

A

hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet

57
Q

pop-up blocker

A

filtering program that stops pop-up ads from displaying on Web pages

58
Q

zipped files

A

type of compressed files that usually have a .zip extension

59
Q

phishing

A

scam in which a perpetrator sends and official looking e-mail that attempts to obtain your financial or personal information

60
Q

pharming

A

scam, similar to phishing, where a perpetrator attempts to obtain your personal and finanical information, except they do so via spoofing

61
Q

computer security risk

A

any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

62
Q

computer crime

A

any illegal act involving a computer

63
Q

cybercrime

A

on-line or Internet based illegal acts

64
Q

intrusion detection software

A

program that automatically analyzes all network traffic, assesses system vulnerability, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches

65
Q

possessed object

A

any item that a user must carry to gain access to a computer or computer facility

66
Q

software theft

A

computer security risk that occurs when someone

  1. steals software media
  2. intentionally erases programs
  3. illegally copies a program
  4. illegaly registers and/or activates a program
67
Q

license

A

an agreement issued by a software manufacturer that gives the user the right to use the software

68
Q

information theft

A

computer security risk that occurs when someone steals personal or confidential information

69
Q

surge protector

A

device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment

70
Q

social engineering

A

gaing unauthorized access or obtaining confidential information by taking advantage ofthe trusting huamn nature of some victims and the naivety of others

71
Q

software suite

A

collection of individual programs available together as a unit, business typically include word processing, spreadsheet, e-mail, and presentation graphics software

72
Q

instant messaging

A

real-time Internet communications services that notifies a user when one or more people are online and then allows the user to exchange messages or files or join a private chat room with those people

73
Q

information

A

processed data that conveys meaning and is useful to people

74
Q

data

A

collection of unprocessed items, can include text, numbers, images, audio, and video

75
Q

ISP (internet service provider)

A

regional or national Internet access provider

76
Q

worm

A

program that copies itself repeatedly, using up system resources and possibly shutting down the system

77
Q

cerificate authority

A

authorized person or company that issues and verifies digitial certificates

78
Q

spyware

A

program placed on a computer without the user’s knowledge that secretly collects information about the user

79
Q

trojan horse

A

malicious-logic program named after the Greek myth that hides within or looks like a legitmate program

80
Q

cracker

A

someone who access a computer or network illegally with the intent of destryoing dat, stealing information, or other malicious action

81
Q

Windows 7

A

Microsoft’s fastest, most efficient operating system to date, offering quicker program start up, built in diagnostics, automatic recovery, improved security, enhanced searching and organizing capabilities, and an easy to use interface

82
Q

virtual memory

A

a portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM

83
Q

microblog

A

blog that allows users to publish short messages, usually between 100 and 200 characters, for others to read

84
Q

smart phone

A

Internet-enabled telephone that usually also provides personal information management functions

85
Q

text message

A

short note, typically fewer than 300 characters, sent to or from a smart phone or other mobile device

86
Q

digital camera

A

mobile device that allows user to take pictures and stores the photographed images digitially, instead of on a traditional film

87
Q

handheld computer

A

computer small enoguh to fit in one hand

88
Q

video message

A

short video clip, usually about 30 seconds, sent to or from a smart phone to other mobile devices

89
Q

pictures message

A

photo or other image, sometimes along with sound and text, sent to or from a smart phone or other mobile device

90
Q

game console

A

mobile computing device designed fo single player or mulitplayer video games

91
Q

netbook

A

type of notebook computer that is smaller, lighter, and often not as powerful as a traditional notebook computer

92
Q

public doman software

A

free software that has been donated for public use and has no copyright restrictions

93
Q

freeware

A

copyrighted software provided at no cost to a user by an individual or company that retains all rights to the software

94
Q

custom software

A

software that performs functions specific to a business or industry, developed by a user or at a user’s request

95
Q

shareware

A

copyrighted software that is distributed at no cost for a trial period

96
Q

Linux

A

popular, multitasking UNIX-type operating system

97
Q

UNIX

A

multitasking operating system that is now available for most computers of all sizes

98
Q

Mac OS X

A

multitasking operating system that is the latest version of the Macintosh operating system

98
Q

types of application software for businesses

A
Word processing
Spreadsheet
Database
Presentation
Note taking
Personal information management
Business software for photos
Business software suite
Project management
Accounting
Document management
Enterprise computing
99
Q

Types of graphics and multimedia application software

A
Computer aided design (CAD)
Desktop publishing 
Paint/image editing
Photo editing 
Video and audio
Multimedia authoring 
Web page authoring
100
Q

Types of application software for personal/home/educational

A
Software suite
Personal finance
Legal
Tax preparation 
Desktop publishing
Paint/image editing
Photo editing and management 
Clip art/image gallery
Video and audio editing 
Home design/landscaping
Reference and education 
Entertainment
101
Q

Types of communications application software

A
Web browser 
Email
Blogging
RSS aggregator
IM
Newsgroup/message board
Chat room 
FTP
Text, pictures, video messaging
VoIP
Video conferencing
102
Q

Types of operating systems

A

Stand alone, sever and embedded

103
Q

When the first version of Microsoft was developed

A

1985

104
Q

7 categories if software

A
Packaged
Custom
Web application
Open source
Freeware
Public domain
Shareware