Study Guide Chapter 24-25 Flashcards
Give examples of the advantages of using a laser printer.
Advantages of laser printers over inkjet printers include their high-speed printing, high quality output, and quality graphics. Can support many fonts and font sizes. Toner cartridges are changed less often than inkjet printers. But cost is higher than inkjet printers.
Lists examples of input and output devices
An input device is any peripheral hardware that allows users to provide data to the computer. Common devices are keyboards, mice and other pointing devices, touchscreens, webcams, microphones, and scanners
The data entered into the computer is then processed by it. The processed data is displayed using output devices. Common devices are monitors, printers, and speakers.
Why do we back up office computer programs?
Backing up is a process in which the network files are copied using an external hard drive, a server, an online backup system. To protect the data from a disaster in the medical facility, it is important to store backup files offsite. When data is compromised, either by errors or human causes, the data can be restored using offsite backup copy
What are used to help prevent access to private networks?
Authentication
What is the other name for the brains of the computer?
Central processing unit (CPU)
Describe what an ergonomic workstation for prolonged use
Torso and neck should be vertical and in line, feet flat on floor, backrest should support the upper body, the seat should be appropriate size and height to accommodate the person’s body, monitor should be directly in front of the person with top monitor or at just below eye level, use an ergonomic split-key keyboard at a height and angle that allow wrists to be neutrally positioned.
What is cipher text and what is it also known as?
Ciphertext is encrypted text transformed from plaintext using an encryption algorithm. Ciphertext can’t be read until it has been converted into plaintext (decrypted) with a key. The decryption cipher is an algorithm that transforms the ciphertext back into plaintext.
What is included in email etiquette in an ambulatory care facility?
When sending the email to several people, separate each email address by a semicolon, Add an email address to the cc line if another person needs to receive a courtesy copy of the email, Start a greeting and a formal greeting by person’s name and title, Be polite and respectful in your words, maintain appropriate level of formality in email and be gracious such as “please “ and “thank you”
Common network security procedures include
-privacy filters.
-authentication.
-logging out of the network before leaving the computer.
-using strong passwords with eight characters
What is the size of a usual business envelope?
Standard #10 business-sized envelopes. 4.125x 9.5 inches
Business letters are usually __________ spaced.
single spaced except for a double space between paragraphs.
What is the most common type of business letter and how does it look on the paper
The full block format and all elements are left justified.
Know what is included in a memo
They address one topic and provide a message to the reader
TO: Includes name of recipient and omit the titles (Mrs)
FROM: Include name of the sender of the memo
DATE: spell out month day year
SUBJECT: Include the topic of the memo
Should be single spaced and left justifed
How many bytes are in a gigabyte, terabyte, megabyte
1 Gigabyte- 1 billion bytes, 1 terabyte- 1 trillion bytes , 1 Megabyte- 1 million bytes
What application software is used to manage data like budgets?
Spreadsheet software