Outcome 1 Flashcards
The main work area of the screen
desktop
Whenever you open a program, file, or folder, it appears on your screen in a box or frame called a _____
window
The ____ displays the name of the document and program. This can also be used to drag the window around the desktop or double-clicked to maximize or restore the window.
title bar
The ____ button hides the open window.
minimize
When a window is open but doesn’t fill the whole screen, the ____ button will enlarge it to fill the whole screen.
maximize
The ____ is the long horizontal bar at the bottom of your screen that helps to organize all of your windows.
taskbar
The ____, at the far right of the taskbar, includes a clock and a group of icons.
notification area
When a window is open and fills the whole screen, the ____ button will make it smaller.
restore
Window borders and corners can be manipulated using the mouse pointer in order to ____ the window.
resize
All open windows are represented by taskbar ____.
buttons
A small, fixed-size window that asks you a question—often requires a response before the user can continue—is called a ____ box.
dialog
The window that is on top of all the other windows and ready for interaction is referred to as the ____ window.
active
A ____ is a small picture preview of the corresponding window or file.
thumbnail
When having multiple windows open on the desktop, you can use ____ to take a quick look at other open windows without clicking away from the window you are currently utilizing.
peek
Shortcut key; combination allows you to preview all open windows
Alt+Tab or Logo Tab
You can close a program that is not responding by using the ____.
task manager
Task manager can be accessed by right-clicking on the taskbar or using these 2 keyboard shortcut key combinations
Ctrl+Alt+Del or Ctrl+Shift+Esc
The smallest element of computerized data
byte
A program that allows a user to find, view, hear, and interact with material on the World Wide Web
browser
Alphabetic names used to refer to computers on the internet
domain
A piece of information sent by a Web server to a user’s browser
cookie
An identity theft scam in which criminals send out spam that imitates the look and language of legitimate correspondence from e-commerce sites
phishing
A special computer connected to a network that provides or serves up data
server
Unsolicited “junk” email sent to large numbers of people to promote products or services
spam
Term used interchangeably to indicate Microsoft’s file viewing program or Microsoft’s internet broswer
Explorer
A hardware device that allows computers to communicate with each other by transmitting signals over telephone lines
cloud
Short-term, temporary memory that contributes to the speed of the computer
RAM
A piece of computer software or hardware that restricts the data that is allowed to flow through (blocks undesirable traffic)
firewall
To switch a computer off and on again, allowing its operating system and programs to be reloaded
reboot
To transfer a file or files from one computer to another, for example, from a server
download
Copying or sending files or data from one computer to another
upload
The group of letters after a period or “dot” in a file name that indicates the format or type of file
extension
The World Wide Web address of a site on the internet
URL
Software that allows your computer to communicate with hardware or devices
driver
A four part or eight part electronic serial number that identifies every computer, cell phone, and device that accesses the internet for tracking purposes (like a license plate)
IP Address
3 steps before opening your computer
- back up
- System Restore Point
- shut down Windows & unplug console
When unscrewing the back of a console, don’t unscrew the ____
power supply
The power supply is always by the ___ and ____
fan and power plug
2 types of cables you find inside your computer
- power cables
2. data cables
Where is the drive bay located in a computer console
front of computer
The ______ is the main circuitry board
motherboard
The ______ are where you plug in printers, external hard drives, headphones, etc
I/O panel connectors
Why does the processor cooling fan sit on top of the microprocessor?
Help keep it cool
The _____ is where the motherboard connects to the power supply
power supply connector
_____ exist all over the motherboard to allow it to connect to the hard drive.
data connectors
The clock battery is attached to the ____
motherboard
The expansion slots are located in the ____
back
6 basic components of any computer system
- input unit
- output unit
- storage unit
- central processing unit (CPU)
- arithmetic & logic unit (ALU)
- control unit
What is another term for these 6 basic components/units?
functional units
What are two examples of input devices?
keyboard, mouse
3 functions performed by output devices
- accepts code produced by computer
- converts codes to readable form
- supplies converted results to the outside world
The data and instructions entered into the computer system through input units have to be stored inside the computer before _____ starts
actual processing
What two elements together are known as the CPU?
ALU and control unit
The ____ is the brain of the computer system
CPU
The internal element of the computer that deals with all computations
ALU
Generates intervals during which all activities in the computer system are carried out in ordered steps
clock unit
Every operation in a CPU takes place at _____
clock pulse
Clock pulse dictates that no operation is performed in less time than transpires between ____
clock ticks
Clock unit speed is measured in ____
megahertz (MHz) or gigahertz (GHz)
Consolidates ALERTS from key Windows maintenance and security features like Windows Defender/User Account Control, etc
Action Center
If Windows requires your attention, the Action Center icon appears where?
notification area of taskbar
Red items in the Action Center are labelled ____
important
Yellow items in the Action Center are ____ that you should consider addressing
suggested taskss
How do you access Action Center?
- Start > control panel > System & Security > review computer status
- Action Center icon
- Start > control panel icon view > action center
- Start > search: Action Center
What does the Action Center icon look like?
flag
Antispyware software included with Windows and runs automatically when turned on
Windows Defender
Windows Defender keeps spyware from infecting computer using ______ and ______
real time protection and scanning options
Windows Defender feature: alerts you when spyware attempts to install/run on your computer
real time protection
Windows Defender feature: scans for spyware that may already be present
scanning options
It’s important to have up-to-date _____ when using Windows Defender
definitions
Files that act like an ever-growing encyclopedia of potential software threats
definitions
Windows Defender works with ___ to automatically install new definitions as they’re released
Windows Update
3 types of scans that Windows Defender can perform
- quick
- full
- custom
Windows Defender scan: Checks places on your computer’s hard disk that spyware is most likely to infect
quick scan
Windows Defender scan: Checks all files on hard disk + currently running programs
full scan
Windows Defender scan: checks specific locations
custom scan
If you do not use scheduled scans, how often should you update definitions?
every week
Shortcut key: close program
Alt + F4
Shortcut key: display print preview
Ctrl+F2 or Ctrl+P
Shortcut key: switch between open documents/programs
Alt Tab
Shortcut key: open a new blank document
Ctrl+N
Shortcut key: open an existing document
Ctrl+O
Shortcut key: “save as” a document
F12 or Alt+F, A
Shortcut key: save a document
Ctrl + S
Shortcut key: close a document
Ctrl+F4, Ctrl+W
Shortcut key: move to the beginning or end of a line
Home/End
Shortcut key: move around a document by words
Ctrl+L or R arrows
Shortcut key: move around a document by lines
Up/Down arrows
Shortcut key: select all text in a document
Ctrl+A
Shortcut key: select one word
F8 x2 or Ctrl+Shift+L/R arrows
Shortcut key: deselect text
arrow keys
Shortcut key: select from cursor to the end of a document
Ctrl + End
Shortcut key: delete word to the right of the cursor
Ctrl + Delete
Shortcut key: delete character to the right of the cursor
Delete
Shortcut key: delete word to the left of the cursor
Ctrl+Backspace
Shortcut key: copy selected text
Ctrl+C
Shortcut key: undo an action
Ctrl+Z
Shortcut key: paste selected text
Ctrl+V
Shortcut key: apply double line spacing to selected text
Ctrl+2
Shortcut key: bold selected text
Ctrl+B
Shortcut key: change the case of letters
Shift + F3
Shortcut key: center text
Ctrl+E
Area of Word’s status bar that displays word count, page number, etc
status info
Minimize, restore and maximize in a Word document
Window controls
Shortcut key: go to start of document
Shift + Home
Shortcut key: replace words in Word
Ctrl + H
Shortcut key: create new page in word
Ctrl+End+Enter
Computers that communicate with each other
network
4 computer maintenance items that should be performed on a regular basis
- antivirus scans
- cleaning
- software updates
- regular backups
This maintenance item helps eliminate potential security vulnerabilities and provide error fixes
software updates
Software that allows your computer to communicate with hardware or devices. Without one, the hardware you connect to your computer—for example, a video card or a printer—won’t work properly.
driver
What does a CMOS error mean?
PC needs a new motherboard internal battery
Proper shutting down avoids ___: pieces of programs that clutter, build up and create future problems
digital detritus
Difference between an error message and an error code
error messages are usually text while error codes have a numerical value made by the programmer for the programmer
Something the user starts in windows such as Word or Excel
application
A program that Windows runs that may not have a window and may run invisibly
process
Power-saving state allowing a computer to quickly resume full-power operation when you want to start working again. Works like the pause function in a DVD player
sleep
Power-saving state designed primarily for laptops that puts open documents and programs on your hard disk and then turns off your computer. Uses the least amount of power. Used when laptop won’t be in use for an extended period and won’t have an opportunity to charge the battery during that time
hibernate
Combination of sleep and hibernate for desktop computers. Puts any open documents and programs in memory and on your hard disk, then puts your computer into a low-power state to quickly resume your work. Allows users to restore their work from their hard disk. Preferred for desktops
hybrid sleep
Key that alternates between “off” and “on” like Caps Lock and the F Lock
toggle
Key dependent on keyboard programming, like F1-F12
function
Key that changes function of another key when pressed simultaneously or sequentially like Alt, Ctrl, Shift
modifier
2 most overlooked keys
- logo key
2. application key
Key used to reference the underlined letters in a menu or dialog box that enable commands using the keyboard; similar to shortcut keys ex. F10
hot keys
Shortcut key: highlight URL
F6
3 ways to position a wireless router
- central location
- off the floor away from walls and metal objects
- reduce interference
process of consolidating fragmented data on a volume (such as a hard disk or a storage device) so it will work more efficiently.
disk defragmentation
rearranges the data on your volume and reunites fragmented data so your computer can run more efficiently
Disk Defragmenter
Why do people generally think they are safer than they are while on the Internet?
Impersonal nature of technology gives us a false sense of security—we can’t be physically attacked through a computer screen. There is a belief that computers automatically take care of internet security.
Malware or spyware replaces your home page with one of their own to accumulate hits for a certain website
browser hijacking
Tricks users into clicking on a concealed link which gives the scammers access to private information. These links are hidden by adding the link to a transparent layer over what looks like a legitimate web page.
clickjacking
Locks users into a window; opens multiple windows, or relaunches a website in a window that can’t be closed
mousetrapping
Redirects legitimate website traffic to an illegitimate website in order to gain access to personal information
pharming
Usually bundled with software; malware that collects information about users without their knowledge and tracks browsing habits. Interferes computer functions
spyware
Malware that appears to be harmless or intriguing; tricks users into letting the program access a computer. Usually found in a download or email attachment
trojan horse
Much like a viral infection, these are programs that self-replicate. They infect computers by spreading from one file to another
virus
Similar to viruses but are spread without human help
worms
E-mail scams disguised to look like official messages from a legitimate website; fools users into providing sensitive information like passwords and credit card details
phishing
Intentionally harmful software or code that damages computers or collects information without a user’s knowledge. Ex: viruses, Trojan horses, worms, spyware, etc.
malware
A fake identity used to trick others for personal gain, usually by creating more than one account on a website. Ex. Middle aged man pretending to be a friendly teenager to determine where you live or go to school
sockpuppet
Representation of a user through graphics or virtual images; one may use an avatar to protect privacy
avatar
Someone losing their job because of an online post
dooced
Person who posts comments to get a rise out of users and cause a distraction; may make offensive remarks, post incorrect information, etc.
troll
Picture, video, post, catchphrase, hoax, topic, concept or piece of media that has gone viral or spread rapidly around the internet
meme
Anti-cyberbullying law making it illegal to distribute intimate images of a person without their consent
Bill C-13
Penalties for breaking C-13?
Fine from $5000 to $250, 000 or six months imprisonment
2 amendments in C-13 to the Criminal Code
- knowingly publishing an intimate image of a person without their consent gives courts complementary power to order removal of the image and forfeiture if the device used
- allow law enforcement officers to collect electronic evidence relating to individuals that are the subject of an investigation
Difference between a router and a modem
Routers are connected to a modem. The modem allows access to the Internet; the router lets multiple computers join the same network and manages network traffic.
Allows access to the internet
modem
Lets multiple computers join the same network and manages network traffic
router
Cable used to connect computers
ethernet cables, CAT5
Similarities between routers and hubs
coordinate network traffic
Differences between routers and hubs
hubs only let computers to communicate with each other and don’t provide firewall support
What is the primary reason for configuring a router?
security reasons; allows you to set a password for a router
Sends a signal that proves that the router is there and that the computer is connected to the router
pinging a router
How do you reset a router?
Stick a bent paper clip into the reset hole. Press and hold. Release. This restarts the router, erases settings and places it into the condition it was in when you first set things up.
What is the “ultimate network fix” in the case of a network problem?
Restart the entire network—this is a general cure-all for network issues.
Explain the function of the notification area in terms of networking software.
Contains icons that represent the local network, which indicate the presence of a network connection.
Window that lists every network adapter connected to
your PC
Network Connections window
Tech that has been around since the 1990s. A wireless standard for connecting peripherals and for wireless networking
Bluetooth
Name three items you need to set up a wireless network.
- broadband internet connection and modem
- wireless router
- wireless network adapters
Name three ways to help secure a wireless network.
a. change the default username and PASSWORD to protect the router
b. set up a SECURITY KEY for your network
c. use a FIREWALL
Protects from unauthorized access to your network
security key
hardware/software that help protect from hackers or malicious software
firewall
Word interface: Shows the name of the document on screen.
title bar
Word interface: Located in the top left corner of the Word window; contains some of the most frequently used commands like Save, Undo, Redo. You can add more commands to this if you need. This toolbar helps you to perform Word tasks quickly by
providing one-click access to oft used documents.
Quick Access Toolbar
Collection of seven horizontal tabbed toolbars arranged on top of each other. These toolbars are accessed through their tabs. The toolbars have command buttons, menus and input boxes arranged in groups. Some have dialog launchers that display a dialog box related to that group. Only
one tabbed toolbar is visible at any given time.
ribbon
The ribbon can be minimized by clicking the ____ below Window Controls.
inverted V
Replaces the document window with a full screen menu showing commands for file operations. Also called “backstage”. Includes Save, Save As, Open, Close, Info, New, Print, Save & Send, Help, and Options commands.
File tab
Used to set tabs and indent text. Show measurements in inches or centimetres depending on specified Word Options
Rulers
You may use the vertical ruler to set ____ of text in the document.
vertical location
Allow you to use five different document views: Print Layout View, Full Screen Reading View, Web Layout View, Outline View, and Draft View
view buttons
View Button: print preview
Print Layout View
View Button: document on full screen
Full Screen Reading View
View Button: document as it would appear in-browser
Web Layout View
View Button: displays document in outline form
Outline View
View Button: editing view, most used
Draft View
Displays document info such as the current page number, total number of pages, word count, language, proofing error notification. Customizable by right clicking the status bar and making selections from the context menu.
Status bar
Lets you zoom out or zoom in the current document. Range is from 10% to 500%.
zoom tools
Shortcut key: open a new tab
Ctrl+T
Shortcut key: switch tabs
Ctrl+Tab
Shortcut key: reload a webpage
F5
3 things you should do before physically opening your computer
- backup stuff
- set a system restore point
- shut down windows and unplug console
When unscrewing the back of the console, be sure that you don’t unscrew the ___
power supply
The power supply is always by the ___ and ___
fan and power plug