Term
|
Definition
| ____software allows users to combine text, graphics, audio, video, and animation into an interactive application. |
|
|
Term
| A large amount of applications software is designed for home, personal and educational use. |
|
Definition
|
|
Term
|
Definition
| A ___ is a named collection of stored data, instructions, or information |
|
|
Term
|
Definition
| In a worksheet, the intersections of column B and row 6 is referred to as |
|
|
Term
|
Definition
| A___ restricts access to specified Web sites. |
|
|
Term
|
Definition
| ___ provides the capabilities of paint software and also includes the ability to enhance and modify existing pictures and images. |
|
|
Term
|
Definition
| A feature called wordwrap forces users of word processing software to press the ENTER key at the end of each line. |
|
|
Term
| For most home users, the capabilities of software suites for personal use fails to meet their needs |
|
Definition
|
|
Term
|
Definition
| Once loades into memory, a program is displayed in a ___, which is a rectangluar area of the screen that displays data and or information. |
|
|
Term
| Training centers, educational institutions, and online magazine publications all use computer-aided design software to develop interactive applications. |
|
Definition
|
|
Term
| A single point is about 1/4 of an inch in height |
|
Definition
|
|
Term
|
Definition
| ____ software is a simplified accounting program that helps home users and small office/home office users balance their chechbooks, pay bills, tracj personal income and expenses, track investments, and evaluate financial plans. |
|
|
Term
|
Definition
| To ___ a document means to make changes to its existing content. |
|
|
Term
|
Definition
| A ___ is an instruction that causes a program to perform a specific action. |
|
|
Term
|
Definition
| A___ is a small image displayed on the screen that represents a program, a document, or some other object. |
|
|
Term
|
Definition
| ___, which includes encyclopedias and dictionaries, provides a valuable and thorough information for all individuals. |
|
|
Term
| When you save a document, the computer transfers the document from a storage medium, such as a floppy disk, to memory. |
|
Definition
|
|
Term
|
Definition
| ___ is copyrighted software that is distributed at no cost for a trial period. |
|
|
Term
|
Definition
| ___ software provides a means for sharing, distributing and searching through documents by coverting them into a format that can be viewed by any user. |
|
|
Term
|
Definition
| ___ is used as a business tool and to facilitate comunications, to assist with graphics and multimedia projects, and to support home, personal and educational activities. |
|
|
Term
| Each time you start a computer the operating system is loaded(copied) from the computer's memory to a hard disk. |
|
Definition
|
|
Term
|
Definition
| _____lets users create video and allow the edit of audio tracks. |
|
|
Term
|
Definition
| One popular type of image editing software, called ____, allows users to edit digital pictures by removing red eye, erasing blemishes, restoring aged photos, adding special effects, or creating electronic photo albums. |
|
|
Term
| The lower the bus clock speed, the faster the transmission of data, which results in applications running faster. |
|
Definition
|
|
Term
| Each processor on a dual core multicore processor chips generally runs at a faster clock speed that a single core processor |
|
Definition
|
|
Term
|
Definition
| the operating system and other systems software that control or maintain the computer and its devices, applicaton programs that carry out a specific task, and the data being processed by application programs and the resulting information. |
|
|
Term
|
Definition
For every instruction, a processor repeats a set of four basic operations, which comprise a: ____
- fetching
- decoding
- executing
- storing
|
|
|
Term
|
Definition
| A ___ connects other computers through telephone or cable televison lines. |
|
|
Term
|
Definition
| ____ can hold multiple programs simultaneously, provided the computer has enough RAM to accommodate all the programs. |
|
|
Term
|
Definition
| ___ is slightly slower than L1 cache but has a much larger capacity. |
|
|
Term
|
Definition
| Coding schemes such as ____ make it possible for humans to interact with a digital computer that process only bits. |
|
|
Term
|
Definition
| Current personal computer processors have clock speeds in the ____ range, which equals one billion ticks of the system clock per second. |
|
|
Term
|
Definition
| A ____ is a device that plugs in a FireWire port and contains multiple FireWire ports which you can plug cables from FireWire devices. |
|
|
Term
|
Definition
| A ____ is equal to approximately 1 billion bytes. |
|
|
Term
| Static RAM (SRAM) chips are slower and less reliable than any variation of DRAM chips and must be re-energized more often. |
|
Definition
|
|
Term
| The arithmetic logic unit (ALU) is the component of the processor that directs and coordinates most of the operations in a computer. |
|
Definition
|
|
Term
|
Definition
| A____ is equal to exactly 1,024 bytes, but often rounded down to 1,000 bytes. |
|
|
Term
|
Definition
| A ____ can connect up to 127 different peripherals together with a single connector type. |
|
|
Term
|
Definition
| A____ equals approximately one trillion bytes |
|
|
Term
|
Definition
| Generally, home users running Windows Vista and using basic application software such as word processing should have at least ___ of RAM. |
|
|
Term
| Cleaning a computer once or twice a year can extend its life. |
|
Definition
|
|
Term
|
Definition
| ROM chips called___ contain permanently written data, instructions or information. |
|
|
Term
| The first step in cleaning a computer is |
|
Definition
| turn it off, unplug it and unplug all cables from the ports. |
|
|
Term
| The case of the system unit is made of metal or plastic and protects the internal electronic components from damage. |
|
Definition
|
|
Term
|
Definition
| A ___ is a document that you return to the company that creates and sends it. |
|
|
Term
|
Definition
| A____ works in a manner similar to a copy machine excepts it creates files of the document in memory instead of a paper copy. |
|
|
Term
|
Definition
| A___ is a vertical lever mounted on a base. |
|
|
Term
|
Definition
| An ____ is a self-service banking machine that connects to a host computer through a network. |
|
|
Term
| Exposure to a magnet or magnetic field can erase the contents of a card's magnetic stripe. |
|
Definition
|
|
Term
|
Definition
| ___ involves reading typewritten, computer printed, or hand printed characters from ordinary documents and translating the images into a form the computer can process. |
|
|
Term
|
Definition
| A ____ is a small flat, rectangular pointing device that is sensitive to pressure and motion. |
|
|
Term
| Gamepads can communicate with a game console or personal computer via wired or wireless. |
|
Definition
|
|
Term
|
Definition
| A _____ is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data. |
|
|
Term
|
Definition
| A____is stationary pointing device with a ball on its top or side. |
|
|
Term
|
Definition
| A ____ monitor is a desktop monitor that contains a cathode ray tube. |
|
|
Term
| Users rotate a portable music player's gamepad to browse through song lists. |
|
Definition
|
|
Term
|
Definition
| ____ is a technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal or a person. |
|
|
Term
| The only equipment necessary for a video conference is a Web cam. |
|
Definition
|
|
Term
|
Definition
| A____ allows user to control a pointer on the screen. |
|
|
Term
| Some laser printers can print more than 150 pages per minute. |
|
Definition
|
|
Term
| A bar code identifies the price, the manufacturer, and the size of the product. |
|
Definition
|
|
Term
|
Definition
| ___devices read hand drawn marks such as small circles or rectangles. |
|
|
Term
| Operating in a manner similar to a copy machine, a dye sublimation printer creates images using laser beam and powered ink, called toner. |
|
Definition
|
|
Term
| A CRT monitor costs more than a LCD monitor. |
|
Definition
|
|
Term
|
Definition
| ____ is the number of horizontal and vertical pixels in a display device. |
|
|
Term
| Visually imparied users can change Windows Vista settings to increase the size or change the color of text, making it easier to read. |
|
Definition
|
|
Term
|
Definition
| A____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink. |
|
|
Term
|
Definition
| A ____ generates images by pushing electrically heated pins against heat sensitive paper. |
|
|
Term
|
Definition
| A_____ frequently us used by banking industry for check processing. |
|
|
Term
| thousandths (or millionths) |
|
Definition
| Storage devices access datat in ____ of a second. |
|
|
Term
|
Definition
| A ____ also is called a secondary storage. |
|
|
Term
| A CD-R's contents can be erased. |
|
Definition
|
|
Term
| Floppy disks are not as widely used as they were 15 years ago because of their low storage capacity. |
|
Definition
|
|
Term
|
Definition
| A____ which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| 1MB is equal to exactly ___ bytes. |
|
|
Term
|
Definition
| ___is the number of bytes a storage medium can hold |
|
|
Term
|
Definition
| A typical CD-ROM holds up to ___ of data. |
|
|
Term
|
Definition
| A___ stores items by using microscopic pits and lands in its middle layer and is read by a laser beam. |
|
|
Term
|
Definition
| The locations of a hard disk's read/write heads oftern is referred to by its ____. |
|
|
Term
|
Definition
| With a storage capacity of 512MB to 100GB, a ____ card is used in digital cameras, PDAs, smart phones, photo printers, audio players, and notebook, and desktop computers. |
|
|
Term
| All of the following are flash memory devices: |
|
Definition
- Compact Flash
- Secure Digital
- Memory Stick
|
|
|
Term
|
Definition
| is not a seconday medium. |
|
|
Term
|
Definition
| Removable hard disk have storage capacities up to ___. |
|
|
Term
| A type of disk controller |
|
Definition
|
|
Term
|
Definition
| You can not erase a _____ |
|
|
Term
|
Definition
| _____has the longest life expectancy over magnetic disks. |
|
|
Term
| embedded operating system |
|
Definition
| The operating system on most PDAs and small devices, is called_____ and resides on the ROM chip. |
|
|
Term
|
Definition
| _____ the successor to Windows XP, is Microsoft's fastest, most reliable and efficient operating system to date, offering quicker applications startup, built in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities. |
|
|
Term
|
Definition
| When an operating system spends much of its time paging, instead of executing application software, it is said to be ____. |
|
|
Term
|
Definition
| ___is the process of encoding data and information into a unreadable form. |
|
|
Term
|
Definition
| A ____ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. |
|
|
Term
|
Definition
| When you purchase application software, the package identifies the required_____. |
|
|
Term
|
Definition
| Compressed files sometimes are called ____ files. |
|
|
Term
|
Definition
| The first version of Windows was developed in the mid____. |
|
|
Term
|
Definition
| When turning on a computer that has been powered off completely, you are performing a ____. |
|
|
Term
|
Definition
| A____ is a set of programs containing instructions that coordinate all the activities among hardware resources. |
|
|
Term
|
Definition
| A performance ____ is a program that assesses and reports information about various computer resources and devices. |
|
|
Term
| The following are operation system functions: |
|
Definition
- starting the computer
- managing programs
- establishing an Internet connection
|
|
|
Term
|
Definition
| ____programs protect against worms and Trojan horses. |
|
|
Term
|
Definition
| _____is a program placed on a computer without the user's knowledge that secretly collects informatin about the user. |
|
|
Term
| The following are types of operating system: |
|
Definition
- stand-alone
- network
- embedded
|
|
|
Term
|
Definition
| To ____ a disk means to reorganize it. |
|
|
Term
|
Definition
| A____ is a type of system software that allows a user to perform maintenance type tasks, ususally relate to mananging a computer, its devices, or its program. |
|
|
Term
|
Definition
| A___ is a navigations system that consists of one or more earth based receivers that accept and analyze signals sent by satellites in order to determine the receiver's geographical location. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| ____is a type of always onconnetion that is established between two communications devices. |
|
|
Term
|
Definition
| Bluetooth, UWB, HomeRF, WiFi, and WiMax communications technology use ____. |
|
|
Term
|
Definition
| A ___ connects a communcations channel to a sending or receiving device such as a computer. |
|
|
Term
|
Definition
| A ____ network is a simple, inexpensive network that typically connects fewer that 10 computer. |
|
|
Term
|
Definition
| Some computers and devices use the ____ specification to transmit data wirelessly to each other via infared light waves. |
|
|
Term
| Physical transmission media used in communication include: |
|
Definition
- twisted pair
- coaxial
- fiber optic
|
|
|
Term
|
Definition
| The word ___ is derived from the words, modulate and demodualte. |
|
|
Term
|
Definition
| If a computer or device on a ___ network fails, all devices before the failed device are unaffected, but those after the failed device cannot function. |
|
|
Term
|
Definition
| The design of computers, devices, and nedia in a network is sometimes called the ____. |
|
|
Term
|
Definition
| ____allows users to share documents with others in real time. |
|
|
Term
|
Definition
| ____is a network that connects computers and devices ina limited geographical area without the use of physical wires. |
|
|
Term
|
Definition
| Wireless __ is a real time Internet communications service that allows you to exchange messages with one or more mobile or online users. |
|
|
Term
|
Definition
| ____device accepts the transmission of data, instructions or information. |
|
|
Term
|
Definition
| A developer of a relational database refers to a record as a ____. |
|
|
Term
|
Definition
| A ___ consists of simple, English like statement that allows users to specifiy the data to display, print,or store. |
|
|
Term
|
Definition
| A smaller version of a data warehouse, is a ____, which contains a database that helps a specific group make decisions. |
|
|
Term
|
Definition
| Sharing data from multiple, separate files is complicated and ususally requires the experience of a ____. |
|
|
Term
|
Definition
| ___ is a computing phrase that points out the accuract of a computer's output depends on teh accuracy of the input. |
|
|
Term
|
Definition
| ______information has meaning to the person who receives it. |
|
|
Term
|
Definition
| A developer of a relational database refers to a file as a ____. |
|
|
Term
|
Definition
| _______information has an age suited to its use. |
|
|
Term
|
Definition
| A data_____contains data about each file in the database and each field with those files. |
|
|
Term
|
Definition
| A virus hoax often is in the form of a ____. |
|
|
Term
|
Definition
| A ___ is an injury or disorder of the muscle, nerves, tendons, ligaments, and joints. |
|
|
Term
|
Definition
| ______laws gives the public fair us to copyrighter material. |
|
|
Term
|
Definition
| ______is someone who assesses a computer or network illegally but has teh intent of destroying data, stealing information, or other malicious action. |
|
|
Term
|
Definition
| ______users decide which folders and files to include in a backup. |
|
|
Term
|
Definition
| A person breaking into a computer laboratory and smashing computer. |
|
|
Term
|
Definition
| often target notebook computers of a company executives. |
|
|
Term
| quarantines the infected files |
|
Definition
| If an antivirus program cannot reove an infection it often ____. |
|
|
Term
|
Definition
| ___is a potentially damaging computer program that affects, or infects , a computer negatively by altering the way the computer works without the user's knowledge or permission. |
|
|
Term
|
Definition
| _____is a separate area of a hard disk that holds the infected file until the infection can be removed. |
|
|
Term
|
Definition
| ___is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. |
|
|
Term
|
Definition
| The main purpose of the _________investigation is to determine the exact nature of the problem or improvement and decide whether it is worth pursuing. |
|
|
Term
|
Definition
| ______is a method of creating interactive Web applications designed to provide immediate response to user requests. |
|
|
Term
|
Definition
| _____ are sets of rules and procedures a company expects employees to accept and follow. |
|
|
Term
|
Definition
| The user stops using the old system and begins using the new system on a certain date. |
|
|
Term
|
Definition
| In a _______ each location converts at a separte time. |
|
|
Term
|
Definition
| An _______verifies that all programs in an application work with the other application |
|
|
Term
|
Definition
| A ____ committee is a decision making body of the company. |
|
|
Term
|
Definition
| A ____ is a set of words, symbols, and codes that enables a programmer to communicate instructions to a computer. |
|
|
Term
|
Definition
| ___ is a measure of hw suitable the development of a system will be to the company. |
|
|
Term
|
Definition
| The two types of programmining languages are ____. |
|
|
Term
|
Definition
| ______ is an ongoing process within system development. |
|
|
Term
| An RFP uses a standard form to request information about an product. |
|
Definition
|
|
Term
|
Definition
| ____is a meaningful name that identifies a storage location. |
|
|
Term
|
Definition
| ____is a programming language designed for business applications. |
|
|
Term
|
Definition
| A ___ is a company that purchases products from manufacturers and then resells these products to the public - offering additional services with the products. |
|
|
Term
|
Definition
| One application of XML is the ____ specification. |
|
|
Term
|
Definition
| ______conversion consists of running the old system alongside the new system for a specific time. |
|
|
Term
| The main disadvantage of compliled programs is that they do not run as fast as interpreted programs. |
|
Definition
|
|
Term
|
Definition
| A ___ program is the program that contains the language or code to be converted. |
|
|
Term
|
Definition
| _____allows users to pay bills from their computer. |
|
|
Term
|
Definition
| A____ is an information system that enables employees to perfrom tasks using computers and other electronic devices, instead of manually. |
|
|
Term
| Blade servers require more maintenance and use more energy than other types of servers. |
|
Definition
|
|
Term
|
Definition
| ____includes several types of applications and technologies for aquiring, storing, analyzing, and providing access to information to help users make more sound business decisions. |
|
|
Term
|
Definition
| In a typical enterprise, _____ is the functional init that is responsible for developing ideas into a product that can be used by customers. |
|
|
Term
|
Definition
| A____ is a defined process that identifies the spectific set of steps involved in completing a particular project or business process. |
|
|
Term
|
Definition
| _____ occurs when retailers use the Web to sell their products and services. |
|
|
Term
| Telecommunications companies, such as local telephone companies, rely on high availability systems to deliver telephone service. |
|
Definition
|
|
Term
|
Definition
| __is the process of collecting data from the Internet as a source for the data warehouse. |
|
|
Term
| A disaster recovery test plan specifies the actions to be taken to restore full processing operations. |
|
Definition
|
|
Term
| In an expert system, the knowledge base consists of a set of logical judgements that are applied to the inference rules each time a user describes a situation to the expert system. |
|
Definition
|
|
Term
|
Definition
| A _____ created three basic types of report, detailed, summary and exception. |
|
|
Term
| For a backup plan to be successful, the company must back up all critical resources. |
|
Definition
|
|
Term
|
Definition
| ______manages one or more human resources functions. |
|
|
Term
| knowledge base and inference rules |
|
Definition
| an expert system consists of two main components |
|
|
Term
|
Definition
| ____provides easy exchange of information among business applications, reduces teh need for human intervention in process, and utilizes software to automate processes wherever possible. |
|
|
Term
|
Definition
| Most traditional enterprises are organized in a ____ manner. |
|
|
Term
|
Definition
| A _____ is an information system that captures and processes data from day to day business activities. |
|
|
Term
|
Definition
| One of the first steps in the development of e-commerce was ____, which originally was created to eliminate paperwork and increase response time in business interactions. |
|
|
Term
|
Definition
| A __ is an information system that generates accurate,timely, and organized information, so managers, andother users can make decisions, solve problems,supervise activities and track progress. |
|
|
Term
|
Definition
| Many companies elevate the importance of IT by including a ___ executive position that reports to the CEO. |
|
|
Term
| Publishing entities, such as new services use CRM systems to keep Web sites up to date. |
|
Definition
|
|
Term
|
Definition
| The ___ management activity involves measuring performance and if necessary taking corrective actions. |
|
|