Term
| RAM (Random Access Memory) |
|
Definition
| temporary holding area for data, application program instructions, and the operating system |
|
|
Term
|
Definition
type of memory circuitry that holds the computer’s startup routine (Permanent and non-volatile) |
|
|
Term
|
Definition
| can be used if an application runs out of allocated RAM |
|
|
Term
|
Definition
| special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board |
|
|
Term
|
Definition
| a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users |
|
|
Term
|
Definition
| one of the fastest computers in the world |
|
|
Term
|
Definition
| supplies data to computers on a network |
|
|
Term
|
Definition
| requests data from a server |
|
|
Term
|
Definition
| process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices (photos-maps of dots) |
|
|
Term
| Desktop publishing software/word processing software |
|
Definition
| Assists you with composing, editing, designing, printing, and electronically publishing documents |
|
|
Term
|
Definition
| changed the way we do business by leveling the playing field |
|
|
Term
|
Definition
| refers to a virus that does not really exist |
|
|
Term
|
Definition
| many malicious programs that attack together |
|
|
Term
|
Definition
| stores data by magnetizing microscopic particles on the disk or tape surface |
|
|
Term
|
Definition
stores data as microscopic light and dark spots on the disk surface (CD and DVD storage technologies) |
|
|
Term
|
Definition
| stores data in an erasable, rewritable circuitry (Non-volatile/Card reader may be required to read data on solid state storage) |
|
|
Term
|
Definition
| a collection of linked documents, graphics, and sounds that can be accessed over the Internet |
|
|
Term
|
Definition
| a global computer network originally developed as a military project, then handed over to the NSF for research and academic use. |
|
|
Term
|
Definition
| a process by which several technologies with distinct functionalities evolve to form a single product; tends to offer enhanced functionality and convenience |
|
|
Term
|
Definition
| 7-bit character encoding (128 characters) |
|
|
Term
|
Definition
| 8-bit character encoding used on IBM mainframe operating systems (256 characters) |
|
|
Term
|
Definition
| 16-bit character encoding (65,000 characters) |
|
|
Term
|
Definition
| allows you to switch between tasks and distinguishes the computer from other devices. |
|
|
Term
|
Definition
| any method confirms a person’s identity |
|
|
Term
|
Definition
| the name on an account that requires a password |
|
|
Term
|
Definition
| computer programs that seem to perform one funtion while actually doing something else (keylogger/RAT) |
|
|
Term
|
Definition
| self-replicating program designed to carry out some unauthorized activity on a victim's computer |
|
|
Term
|
Definition
a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files;
corrupt files, destroy data, display an irritating message, or otherwise disrupt computer operations |
|
|
Term
|
Definition
| Viruses that deliver their payloads on a specific date |
|
|
Term
|
Definition
| the simultaneous use of more than one processor to execute a program |
|
|
Term
|
Definition
| supplements the functions of the CPU |
|
|
Term
|
Definition
| single chip containing the circuitry for 2 microprocessors |
|
|
Term
|
Definition
| circuitry that enables a single processor to simulate two processors |
|
|
Term
|
Definition
| a legal contract that defines the ways in which you use a computer program |
|
|
Term
| EULA (End User License Agreement) |
|
Definition
| displayed on-screen when you first install software |
|
|
Term
|
Definition
| program or set of program instructions that surreptitiously enter a computer and disrupt its normal operation |
|
|
Term
| microprocessor (processor) |
|
Definition
| an integrated circuit designed to process instructions |
|
|
Term
|
Definition
| number of bits that a microprocessor can manipulate at one time |
|
|
Term
|
Definition
| tells the computer how to access the hard disk, find the operating system, and load it into RAM |
|
|
Term
|
Definition
| to help the computer system monitor itself in order to function efficiently |
|
|
Term
|
Definition
| a set of computer programs that helps a person carry out a task |
|
|
Term
| spreadsheet cell references |
|
Definition
| the column letter and row number that designate the location of a worksheet cell |
|
|
Term
|
Definition
| automatically recalculates every formula after a user makes a change to any cell |
|
|
Term
| Examples of graphics suites: |
|
Definition
| Adobe Creative, Macromedia Studio MX and CorelDRAW Graphics |
|
|
Term
|
Definition
| you customize your document and control the position of different items on it |
|
|
Term
| Application software contains |
|
Definition
| a jumpstart program that guides you through the installation process. |
|
|
Term
| SQL (Structured Query Language) |
|
Definition
provides a set of commands for locating and manipulating data. -Natural language query -Query by example |
|
|
Term
|
Definition
| the combination of hardware and software that helps people and computers communicate with each other |
|
|
Term
| example of operating system for a PDA |
|
Definition
|
|
Term
|
Definition
| allows a processor to begin executing an instruction before completing the previous instruction |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| C:\My Music\Reggae\Marley One Love |
|
|
Term
|
Definition
|
|
Term
|
Definition
| manipulates light within a layer of liquid crystal cells |
|
|
Term
|
Definition
| illuminates lights arranged in a panel-like screen |
|
|
Term
|
Definition
a group of sectors/the hard disk’s smallest addressable unit; A file that does not fit into a single cluster spills over into the next contiguous cluster unless that cluster already contains data. |
|
|
Term
|
Definition
| the sum of all bytes of a given file and is used by the antivirus software to detect the presence of a virus infecting the file |
|
|