Computer Science Quiz: Hardware and Software
119 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of an accelerometer in smartphones and tablets?

  • To detect the device's orientation and movement (correct)
  • To increase processing speed for applications
  • To enhance the device's camera quality
  • To improve battery life by optimizing settings
  • Which of the following best describes biometric identification?

  • Implementing two-factor authentication methods
  • Scanning biologically unique features for identification (correct)
  • Using password-based security systems
  • Tracking user activity through software
  • What is the purpose of backup in data management?

  • To permanently delete unwanted files
  • To compress files to save space
  • To create duplicates of files for retrieval in case of loss or damage (correct)
  • To optimize the performance of the computer
  • What defines the aspect ratio of a display?

    <p>The relationship between the width and height of the display</p> Signup and view all the answers

    What is the significance of cache memory in a computer?

    <p>It holds frequently accessed data for quicker retrieval</p> Signup and view all the answers

    Which of the following describes what beta software is?

    <p>A preliminary version released for public testing to identify bugs</p> Signup and view all the answers

    Which type of printer is capable of creating physical three-dimensional objects from digital designs?

    <p>3D printer</p> Signup and view all the answers

    How is access control used in operating systems?

    <p>To authorize software installations and protect against malware</p> Signup and view all the answers

    What does the acronym RFID stand for?

    <p>Radio Frequency Identification</p> Signup and view all the answers

    A service pack is intended to provide which of the following?

    <p>A collection of previous software updates</p> Signup and view all the answers

    What is the primary function of Safe Mode?

    <p>To fix various software problems by loading only essential programs</p> Signup and view all the answers

    Which of the following best describes a single-user licence?

    <p>Installation is restricted to one computer only</p> Signup and view all the answers

    What does spooling refer to in the context of printing?

    <p>Sending print tasks to disk until the printer is ready</p> Signup and view all the answers

    How is the quality of an image in a digital camera affected by sensor size?

    <p>Larger sensors typically yield better quality images</p> Signup and view all the answers

    What distinguishes SSDs from traditional hard drives?

    <p>SSDs use flash memory for faster data access</p> Signup and view all the answers

    What kind of software is typically categorized as utility programs?

    <p>Software intended to perform maintenance tasks</p> Signup and view all the answers

    What is the purpose of a USB port?

    <p>To connect devices such as printers and keyboards</p> Signup and view all the answers

    Which of the following is true about subscription-based software?

    <p>Renewals are typically made yearly or monthly</p> Signup and view all the answers

    What does 'resolution' in printing refer to?

    <p>The number of dots created along a horizontal line in inches</p> Signup and view all the answers

    What kind of licence allows for multiple installations within an organization?

    <p>Site licence</p> Signup and view all the answers

    What does the term 'soft copy' refer to?

    <p>Digital files stored on a computer</p> Signup and view all the answers

    What is the purpose of a dongle in computing?

    <p>To enable wireless connectivity for devices</p> Signup and view all the answers

    Which statement accurately describes the concept of defragmentation?

    <p>Rearranging fragmented files to enhance retrieval speed</p> Signup and view all the answers

    Which feature distinguishes a DSLR camera from other types of cameras?

    <p>It allows for more control over technical settings</p> Signup and view all the answers

    What does the term 'default printer' refer to?

    <p>The printer selected to send print jobs unless changed by the user</p> Signup and view all the answers

    What is the main purpose of Disk Cleanup utility?

    <p>To free up storage by deleting unnecessary files</p> Signup and view all the answers

    Which of the following is a characteristic of a free software?

    <p>It can be modified without restrictions</p> Signup and view all the answers

    What does the term cloud storage refer to?

    <p>Online storage of files accessible via the internet</p> Signup and view all the answers

    Why is a high contrast ratio beneficial for a display device?

    <p>It enhances the visibility of colors</p> Signup and view all the answers

    What does a dual-core processor imply?

    <p>It has two physical CPUs on one chip</p> Signup and view all the answers

    Which attribute of a file indicates it cannot be modified?

    <p>Read-only attribute</p> Signup and view all the answers

    What is the purpose of an End User License Agreement (EULA)?

    <p>To explain restrictions on software usage</p> Signup and view all the answers

    Which process results in fragmentation of files on a disk?

    <p>Regularly saving files to disk</p> Signup and view all the answers

    What is the function of a graphics processing unit (GPU)?

    <p>To improve performance for graphics and video processing</p> Signup and view all the answers

    What is the significance of a file extension?

    <p>To determine the type of file and its associated applications</p> Signup and view all the answers

    What type of memory does not retain its contents when power is turned off?

    <p>Volatile memory</p> Signup and view all the answers

    Which statement correctly describes the purpose of a firewall?

    <p>Acts as a barrier between the computer and the internet</p> Signup and view all the answers

    How does optical zoom differ from digital zoom?

    <p>Uses lenses to magnify images</p> Signup and view all the answers

    What does the acronym CAPTCHA stand for?

    <p>Computerized Automatic Public Turing test to tell Computers and Humans Apart</p> Signup and view all the answers

    What is the primary function of virtual assistants?

    <p>To allow users to communicate naturally with their devices</p> Signup and view all the answers

    Which technology allows a computer to operate as if it has more RAM than is physically present?

    <p>Virtual memory</p> Signup and view all the answers

    What is meant by 'Bandwidth' in networking?

    <p>The total amount of data that can be transferred over a network in a given time</p> Signup and view all the answers

    What does 'BYOD' stand for in a workplace context?

    <p>Bring Your Own Device</p> Signup and view all the answers

    What is the main function of ADSL technology?

    <p>To deliver permanent digital internet connections using telephone lines</p> Signup and view all the answers

    Which type of cable uses light to transmit data and offers high speed?

    <p>Fibre cable</p> Signup and view all the answers

    What is a common use of a webcam?

    <p>For video conferencing</p> Signup and view all the answers

    Which best describes the concept of grid computing?

    <p>Distributed processing across multiple computers</p> Signup and view all the answers

    What does 'caching' refer to in web technology?

    <p>Storing frequently accessed data for quicker retrieval</p> Signup and view all the answers

    What is the purpose of bookmarks in a web browser?

    <p>To store shortcuts to frequently visited pages</p> Signup and view all the answers

    What is the primary purpose of a memory card?

    <p>To provide electronic storage for digital cameras and smartphones</p> Signup and view all the answers

    Which statement best describes Optical Character Recognition (OCR)?

    <p>It converts text images into editable text.</p> Signup and view all the answers

    What distinguishes a laser printer from an inkjet printer?

    <p>Laser printers work by using toner instead of ink.</p> Signup and view all the answers

    How does a multi-user operating system function?

    <p>It enables multiple users to access the same operating system simultaneously.</p> Signup and view all the answers

    What is a defining characteristic of open source software (OSS)?

    <p>It may be freely used, modified, and distributed.</p> Signup and view all the answers

    Which of these describes the role of the motherboard in a computer?

    <p>It connects all the internal components to enable communication.</p> Signup and view all the answers

    What does the term 'plug-and-play' refer to?

    <p>A technology that allows automatic detection and configuration of devices.</p> Signup and view all the answers

    What is the importance of pixel density in displays?

    <p>It indicates the number of pixels per inch in the display.</p> Signup and view all the answers

    Which of the following best defines a multi-function printer?

    <p>A device that can print, scan, photocopy, and fax.</p> Signup and view all the answers

    What is the main function of metadata in digital files?

    <p>To provide additional context about the file's content.</p> Signup and view all the answers

    How is 'ppm' relevant to printers?

    <p>It represents the pages a printer can print in one minute.</p> Signup and view all the answers

    Which of these devices would typically use a Micro-USB port?

    <p>Smartphones</p> Signup and view all the answers

    What does the term 'refresh rate' describe in display technology?

    <p>The frequency at which the display updates the image.</p> Signup and view all the answers

    What functionality does a pointing stick offer in laptops?

    <p>It serves as an alternative to a mouse for cursor control.</p> Signup and view all the answers

    What type of network connects computers in a limited area, such as a university campus?

    <p>LAN</p> Signup and view all the answers

    Which of the following technologies allows devices to connect and exchange data by being close to each other?

    <p>NFC</p> Signup and view all the answers

    What is the primary function of an ISP?

    <p>To sell internet access and services</p> Signup and view all the answers

    Which of the following allows real-time messaging, including text and video?

    <p>Instant Messaging</p> Signup and view all the answers

    What is a characteristic of a secure URL?

    <p>It starts with https://</p> Signup and view all the answers

    What is the main purpose of a mailing list?

    <p>To group multiple email addresses under one name</p> Signup and view all the answers

    What does a router do in a network?

    <p>Connects devices wirelessly to the internet</p> Signup and view all the answers

    What defines an IP address?

    <p>A numerical address identifying a device on a network</p> Signup and view all the answers

    Which of the following best describes a podcast?

    <p>An audio file available for download or purchase</p> Signup and view all the answers

    What does throttling mean in the context of internet service?

    <p>Slowing down the internet connection based on usage</p> Signup and view all the answers

    What does a switch do in a LAN?

    <p>Connects computers using cables for communication</p> Signup and view all the answers

    What is the purpose of a URL shortener?

    <p>To create a shorter version of a URL for easier sharing</p> Signup and view all the answers

    What is a primary feature of tabbed browsing?

    <p>Browsing multiple pages within a single window</p> Signup and view all the answers

    Which of the following best describes social networking sites?

    <p>Sites for individuals to share personal updates and interests</p> Signup and view all the answers

    Which term describes a computer that relies on a server for resources?

    <p>Thin Client</p> Signup and view all the answers

    What is a characteristic feature of Unshielded Twisted Pair (UTP) cable?

    <p>It is the most common cable type for LAN connections.</p> Signup and view all the answers

    What defines a video blog (vlog)?

    <p>A form of blog that uses video as its primary medium.</p> Signup and view all the answers

    Which term describes software that allows telephone calls over the Internet?

    <p>VoIP</p> Signup and view all the answers

    What is a common method used by cybercriminals to steal sensitive information via email?

    <p>Phishing</p> Signup and view all the answers

    What is the main purpose of a computer worm?

    <p>To replicate and spread across networks.</p> Signup and view all the answers

    Which of the following best describes 'Big Data'?

    <p>Large data sets analyzed for trends and patterns.</p> Signup and view all the answers

    What does the term 'digital divide' refer to?

    <p>The disparity in technology access and knowledge in developing regions.</p> Signup and view all the answers

    What is the main function of a card skimmer?

    <p>To read the magnetic data on bank cards.</p> Signup and view all the answers

    In what manner does augmented reality differ from virtual reality?

    <p>Augmented reality enhances the real world rather than replacing it.</p> Signup and view all the answers

    What characterizes a Denial of Service (DoS) attack?

    <p>It floods a server with excessive requests.</p> Signup and view all the answers

    What is the primary goal of cyber-bullying?

    <p>To spread rumors and harass individuals digitally.</p> Signup and view all the answers

    Which technology allows collaborative editing on a website, like Wikipedia?

    <p>Wiki</p> Signup and view all the answers

    What distinguishes web-based email from traditional email services?

    <p>Web-based email is accessible through a web browser from any location.</p> Signup and view all the answers

    What is a keylogger primarily designed to do?

    <p>Record keystrokes and possibly track mouse movements.</p> Signup and view all the answers

    Which type of software is specifically designed to disrupt or damage systems?

    <p>Malware</p> Signup and view all the answers

    What does the term pharming refer to?

    <p>Automatically redirecting users to fake websites.</p> Signup and view all the answers

    Which of the following describes phishing?

    <p>Tricking individuals into revealing confidential information.</p> Signup and view all the answers

    What is one of the primary functions of ransomware?

    <p>To encrypt data until a ransom is paid.</p> Signup and view all the answers

    What is the purpose of quarantining a virus?

    <p>Preventing the virus from further infecting the computer.</p> Signup and view all the answers

    What is considered a repetitive strain injury (RSI)?

    <p>Pain or damage resulting from repetitive actions.</p> Signup and view all the answers

    What is social engineering in the context of information security?

    <p>Deceiving individuals to gain confidential information.</p> Signup and view all the answers

    What does software piracy entail?

    <p>Illegally copying and distributing software.</p> Signup and view all the answers

    Which term refers to the subset of people analyzed in a survey?

    <p>Sample group</p> Signup and view all the answers

    How is an absolute cell reference in Excel indicated?

    <p>By adding a dollar sign before the column letter or row number.</p> Signup and view all the answers

    What is a combo chart in Excel?

    <p>A chart representing data in multiple formats in one chart.</p> Signup and view all the answers

    Which of the following best describes a CSV file?

    <p>A format using commas to separate values for data transfer.</p> Signup and view all the answers

    What does SMiShing refer to?

    <p>Phishing attempts through SMS messages on smartphones.</p> Signup and view all the answers

    What is the purpose of data validation in a spreadsheet or database?

    <p>To ensure that only valid data is entered</p> Signup and view all the answers

    What distinguishes a footnote from an endnote in a document?

    <p>Footnotes are positioned at the bottom of each page</p> Signup and view all the answers

    Which character is commonly used as a delimiter in a CSV file?

    <p>Comma</p> Signup and view all the answers

    What is the primary function of a legend in an Excel chart?

    <p>To describe the data series and their colors</p> Signup and view all the answers

    Which feature in Excel would you use to display only specific rows of data?

    <p>Filtering</p> Signup and view all the answers

    What is the purpose of a primary key in a database?

    <p>To uniquely identify each record</p> Signup and view all the answers

    How does a hard space function in a word processing document?

    <p>It prevents word wrapping between characters</p> Signup and view all the answers

    Which of the following describes a 'stacked chart' in Excel?

    <p>Data series are placed one on top of another</p> Signup and view all the answers

    What does an input mask enforce in Access?

    <p>Input of data in a specific format</p> Signup and view all the answers

    What is the function of gridlines in an Excel worksheet?

    <p>They separate individual cells from each other</p> Signup and view all the answers

    What is the primary use of a date picker in Access?

    <p>To select a date from a calendar</p> Signup and view all the answers

    Which of the following accurately describes 'markers' on an Excel line chart?

    <p>They indicate the actual data points in the chart</p> Signup and view all the answers

    What is a template in the context of document creation?

    <p>A pre-designed document layout</p> Signup and view all the answers

    What does a section break allow in a word processing document?

    <p>It allows different formatting in each section</p> Signup and view all the answers

    Study Notes

    3D Printer

    • A 3D printer creates physical 3D objects from computer designs.
    • CAD or 3D modeling software is used for the designs.

    Accelerometer

    • An input device in smartphones and tablets.
    • Detects device orientation and movement.
    • Allows screen orientation adjustments based on how the device is held.

    Access Control

    • Operating system verifies permission before installing software.
    • Aims to prevent malware installation without user knowledge.

    Algorithm

    • A step-by-step solution for problem-solving (in programming).

    Application Software

    • Programs performing specific user tasks (e.g., word processors).

    Archiving (Files)

    • Creating file copies for reference, not regular use.

    Aspect Ratio

    • The width-to-height relationship of a display (e.g., 16:9).

    Backup

    • Making copies of files to prevent loss or damage.

    Beta Software

    • Preliminary versions of software released for public testing.
    • Developers fix reported errors before release.

    Biometric Identification

    • Using unique biological measures (e.g., fingerprints, iris scans) for identification.

    Bluetooth

    • A short-range wireless technology connecting devices (e.g., mice, printers, smartphones).

    Blu-ray

    • An optical disc format for high-definition video and large data storage.

    Boot

    • The computer's startup process.
    • Restarting a computer is rebooting.

    Bug (Software)

    • An accidental mistake in software code (not a virus).

    Byte

    • The space occupied by a single character (e.g., '4', 'A', '%').

    Cache Memory

    • High-speed memory for frequently accessed data, for faster retrieval.

    Card Reader

    • A device for inserting memory cards to transfer data.

    Carpal Tunnel Syndrome (CTS)

    • Painful nerve compression in the wrist caused by repetitive actions (e.g., typing).

    Clipboard

    • Temporary memory area for copied/moved text and graphics.
    • Retained until pasted or program closes.

    Cloud Computing

    • Sharing and using resources/applications as services over the internet.

    Cloud Storage

    • Online storage of files accessible from anywhere with internet access.

    Color Depth

    • Number of bits to represent each pixel's color in an image.

    Contrast Ratio

    • Relationship between the darkest black and brightest white on a display.
    • Higher values are better.

    Convergence

    • Combining separate technologies/functions into a single device (e.g., smartphones combining phone and tablet functions).

    Core

    • A single physical processor.
    • "Dual Core" has two processors, "Quad Core" has four, etc.

    CPU (Central Processing Unit)

    • The hardware component that processes data and executes instructions.

    Dedicated Device

    • Devices designed for a single specific task (e.g., ATMs, GPS, microwaves).

    Default Printer

    • The printer that a print job is sent to unless otherwise specified.

    Defragmentation

    • Rearranging and consolidating fragmented files on disk for faster retrieval.

    DIMM (Dual Inline Memory Module)

    • A standardized RAM "stick" fitting into DIMM slots on the motherboard.

    Disk Cleanup

    • Utility to remove unnecessary files to free up storage space.

    Disk Scanner

    • Utility to check for and fix errors/bad sectors on a drive.

    Dongle

    • A device plugged into a USB port to enable wireless connections (e.g., keyboard, mouse, 3G/4G).

    Downward/Backward Compatibility

    • Software ability to open and use files from previous versions.

    Driver

    • Software enabling a computer to communicate with hardware/devices.
    • Typically installed automatically by the operating system.

    DSLR Camera

    • A type of digital camera for professional use offering lens changes and technical controls.

    Entry-Level Computer

    • The least expensive computer in its category (e.g., desktop PC), with lower specifications.

    Ergonomics

    • Studying and designing the workplace and equipment for worker comfort and safety.

    EULA (End User License Agreement)

    • A legally binding contract between a user and a software company detailing usage rules.

    File Attribute

    • Properties assigned to files (e.g., Hidden, Read-Only).

    File Extension

    • Characters (usually 3-5) identifying a file type (e.g., .docx is a Word file).

    File Property

    • Basic information about a file (e.g., name, size, modification date).

    Formatting (a disk)

    • Preparing a disk for data storage, erasing existing data.

    Fragmentation

    • Files becoming scattered on a disk over time, leading to slower performance.

    Freeware

    • Fully functional software usable and copyable without restrictions.

    Geo-tagging

    • Storing a photo's location (latitude/longitude) in the file metadata.

    GHz (Gigahertz)

    • The unit for measuring CPU speed.
    • Higher is better.

    GPS Device

    • Calculates location (latitude/longitude) on Earth using signals from GPS satellites.

    GPU (Graphics Processing Unit)

    • The chip on a video card that improves performance for certain software (e.g., CAD, gaming).

    Hard Copy

    • Printed output (vs. soft copy, displayed on a screen).

    HDMI (High-Definition Multimedia Interface)

    • Interface transmitting high-definition video and sound via a single cable.
    • Digital signals for better quality.

    Hidden (Attribute)

    • File attribute making a file invisible in file listings.

    Hybrid Computer

    • A laptop/tablet with a reversible/detachable touch screen and keyboard.

    Inkjet Printer

    • A relatively inexpensive printer that sprays ink dots.
    • Suitable for high-quality graphics (e.g., photos).

    ISO Rating (Digital Camera)

    • Measures a camera's sensitivity to light, higher values being better.

    Laser Printer

    • A relatively expensive, but cost-effective, printer using toner, suitable for high-volume printing.

    Linux

    • An open-source operating system.

    Lumen (Data Projector)

    • Measures the brightness of a data projector's image.
    • Higher lumen ratings are better.

    Memory (RAM)

    • Temporary storage for programs and data during computer processing.
    • Data lost when power is turned off.

    Memory Card

    • Electronic storage media used in digital cameras and smartphones.

    Metadata

    • Additional data describing a file (e.g., author, title).

    Micro-USB

    • A smaller type of USB port, often found on mobile devices.

    Mobile User

    • Users who need technology readily available for tasks (e.g., salespeople, consultants).

    Motherboard

    • A large board containing circuitry for connecting the CPU, RAM, storage, and peripherals.
    • Allows communication between computer components.

    Multi-function Printer

    • A device combining printing, scanning, copying, and faxing capabilities.

    Multitasking

    • The operating system's ability to run multiple tasks/processes concurrently.

    Multi-touch (Touch Screen)

    • Touch screens allowing two or more fingers to be detected simultaneously.

    Multi-user Operating System

    • An operating system that allows multiple users to access the computer concurrently (in a network).

    OCR (Optical Character Recognition)

    • Converts scanned text images into editable text.

    Online Storage

    • Disk space allocated to a user online accessible from anywhere with internet access.

    Open Source Software (OSS)

    • Software freely used, modified, and distributed but not sold.

    Operating System

    • Software controlling all computer activities (e.g., Windows, Linux, macOS, iOS, Android).

    Patch (Software)

    • Downloadable updates fixing bugs or vulnerabilities in existing software.

    Path

    • A series of folders leading to a specific file.

    PDF (Portable Document Format)

    • A file format for distributing documents, readable with a PDF reader.

    Pen Input

    • Using a pen/stylus with a pressure-sensitive digitizing tablet.

    Phablet

    • A smartphone with a larger screen (between a phone and tablet).

    Pixel Density (DPI)

    • Number of pixels per horizontal inch on a display, higher values are better.

    Plain Text File

    • Simple text files (without formatting) with a .txt extension.

    Platform

    • A type of operating system (e.g., Linux, Android, Windows).

    Plug-and-Play

    • Technology enabling the computer to automatically detect and configure connected devices quickly.

    Pointing Stick

    • A laptop input device acting as an alternative to a mouse.

    POS (Point of Sale) System

    • System used to speed up sales transactions.

    Power User

    • Users with specialized computing needs and using advanced software features.

    PPM (Pages per Minute)

    • Printer speed, measured in pages printed per minute.

    Printer Queue

    • Temporary storage for print jobs until the printer is ready.

    Program Files

    • Files that run applications (not data files), usually with a .com or .exe extension.

    Proprietary Software

    • Licensed software to be used under specified conditions (no modifications or distribution).

    QR Code

    • A two-dimensional barcode storing more data than standard barcodes.

    Read-only

    • A file attribute preventing modification of a file.

    Refresh Rate

    • Frequency of screen display refresh.
    • Higher values are better.

    Resolution (Display)

    • The maximum number of pixels a display supports (horizontal x vertical).

    Resolution (Scanner)

    • The number of dots scanned per inch (DPI), indicating image clarity.

    Resolution (Digital Camera)

    • The total number of pixels making up an image, indicating the total image quality.

    Resolution (Printer)

    • Number of dots a printer creates per horizontal inch (DPI), indicating the quality of print output.

    RFID (Radio Frequency Identification)

    • Uses small radio devices to store and transmit data (e.g., payment processing).

    Rich Text Format

    • A file format allowing many font/text and image formatting styles.

    ROM (Read-Only Memory)

    • A special chip holding instructions needed to start a computer.

    RPM (Revolutions per Minute)

    • Unit measuring a hard drive's rotational speed.

    Safe Mode

    • A computer startup mode for troubleshooting software problems.
    • Loads only essential system programs.

    SATA

    • The internal hard drive interface connection type.

    Scanner

    • Input device that scans images into a computer (text, graphics, barcodes, QR codes).

    Scheduler

    • A program used to run other programs at specific times.

    Screen Lock Pattern

    • A security method for mobile devices requiring a drawn pattern.

    Sensor Size (Digital Camera)

    • The size of the sensor in a digital camera, impacting image quality.

    Server

    • A computer providing services/resources to other linked computers (clients) in a network.

    Service Pack

    • A collection of previous software updates (now less common, as automated updates are more frequent).

    Shareware

    • Software available for a trial period (e.g., 30 days).
    • Full version requires payment after the trial period.

    Single-user License

    • Allows installation on only one computer.

    Single-user Operating System

    • Allows access by only one user at a time.

    Site License

    • Allows unlimited installations of software within an organization/company.

    Soft Copy

    • Visual output on a computer screen (opposite of hard copy).

    SOHO User (Small Office/Home Office)

    • A computer user for a small business.

    Speech Recognition

    • Software that understands spoken commands and converts speech to text.

    Spooling

    • Temporarily saving print jobs to disk until the printer is ready.

    SSD (Solid State Drive)

    • Electronic alternative to hard drives, using flash drive technology for fast access.

    Subscription-Based Software

    • Software with a monthly or yearly subscription for usage (e.g., Office 365).

    System Requirements

    • Minimum computer specifications needed to run a piece of software.

    System Software

    • Software controlling/supporting computer operations.

    Tablet

    • Portable computer with touch/pen-sensitive screen, suitable for extended use compared to smartphones.

    Task Manager

    • Provides information about computer performance and running applications/processes.

    Tooltip

    • Information that appears when the pointer rests on an icon or object.

    Touch Screen

    • Input/output screen used in smartphones/tablets, may use finger touch or stylus.

    Touchpad

    • Pressure-sensitive surface on laptops as a mouse alternative.

    Trackball

    • An input device with a ball that users roll to move the pointer.

    Update (Software)

    • Fixes bugs or adds features to existing software.

    Upgrade (Software)

    • A new software version with substantial changes/features that typically requires payment.

    UPS (Uninterruptible Power Supply)

    • Protects computers from power surges/outages to save work before a shutdown.

    USB Port

    • Standard port for connecting peripherals (e.g., keyboards, mice, printers).

    Utility Programs

    • System software for computer maintenance tasks.

    VGA Port

    • Port connecting a monitor to a computer, largely replaced by other connections.

    Video Card

    • A separate board with memory and GPU for improved video processing in a computer.

    Virtual Assistant

    • Software that understands and responds to spoken commands.

    Virtual Memory

    • Uses disk space to simulate more RAM than physically installed.
    • Allows running more programs.

    Voice Recognition Software

    • Allows computers to understand speech, including command execution and dictation.

    Volatile Memory

    • Temporarily holds data lost when power is off (e.g., RAM).

    Webcam

    • A low-resolution camera used for real-time video feeds (e.g., video conferencing).

    Zoom (Digital)

    • Enlarging an image, losing quality and resolution.

    Zoom (Optical)

    • Image enlargement using camera lenses, preserving image quality.

    3G/4G (LTE)

    • Cellular mobile phone technology generations with high-tech network infrastructure.

    802.11 a/b/g/n

    • Wi-Fi standards indicating wireless adapter specifications and network speed.

    Add-on/Extension (Browser)

    • Third-party apps extending browser functionality (e.g., translation, ad blockers).

    ADSL

    • Asymmetric Digital Subscriber Line, a permanent internet connection using telephone lines at a fixed cost..

    Archiving (Email)

    • Moving emails to an archive folder without deleting.

    AUP (Acceptable Use Policy)

    • Policy outlining user rights and responsibilities in networked environments.

    Backbone (Network)

    • Cable connecting different LANs.

    Bandwidth

    • The amount of data transferred per unit of time (measured in Kbps or Mbps).

    Bookmarks (Web Browser)

    • Stored shortcuts to frequently visited web pages (also known as Favorites).

    Botnet

    • A network of compromised computers controlled remotely to perform malicious actions.

    Broadband

    • A high-speed internet connection.

    BYOD (Bring Your Own Device)

    • Policy allowing users to bring personal devices to school/work for internet access.

    Caching (Web)

    • Temporarily storing recently accessed web pages for faster reloading.

    Cap (Data Usage)

    • A limit on data usage for a month.

    CAPTCHA

    • Test determining if a user is a human or a computer program.

    Clients (Network)

    • Devices using resources/services from servers in a computer network.

    Distributed Processing

    • Solving problems by distributing processing tasks among multiple computers.

    Distribution List (Email)

    • Grouped email addresses for sending emails to multiple recipients.

    E-commerce

    • Business transactions done over the internet.

    EFT (Electronic Funds Transfer)

    • Transferring money electronically using internet banking.

    Email

    • Electronic mail: composing, sending, and receiving messages digitally.

    Fiber Cable

    • Network cable using light signals for high-speed data transmission.

    Firewall

    • A barrier between a computer and the internet, filtering incoming/outgoing network traffic.

    FTP (File Transfer Protocol)

    • Protocol for transferring files between remote computers.

    Grid Computing

    • Sharing computer resources to solve a single problem to increase processing power.

    HAN (Home Area Network)

    • Small network connecting devices within a home environment.

    History (Web Browser)

    • Records previously visited web pages.

    Home Page

    • A website's main page containing information and links to other pages.

    Hotspot

    • Area/range of Wi-Fi network signal coverage
    • A connection to another place in a document or web page (often underlined blue text ).

    Instant Messaging (IM)

    • Real-time communication (text, images, video, voice) between users.

    Internet

    • A global computer network connecting computers and devices.

    Intranet

    • A private network within an organization for internal communication.

    IP Address

    • A unique numerical address identifying a device on a network or the internet.

    ISP (Internet Service Provider)

    • Company providing internet access.

    ISP-Based Email

    • Email access using software like Outlook configured with ISP credentials.

    LAN (Local Area Network)

    • A network connecting computers within a small area (e.g., school, office building).

    LTE (Long Term Evolution)

    • The next-generation high-speed cellular technology (4G).

    Mailing List

    • Grouped email addresses for sending mass mailings.

    NFC (Near Field Communication)

    • Wireless data exchange between devices through close contact.

    NIC (Network Interface Controller)

    • Hardware enabling network connection to a wired network.

    PAN (Personal Area Network)

    • A network organized around an individual or a couple of individuals.

    Plug-in (Browser)

    • Third-party apps for specialized content display within a browser (e.g., Flash videos).

    Podcast

    • Audio/video files available for download on the internet.

    Pop-up (Web Browser)

    • Small browser windows that appear on top of a website.

    Real-time Messaging

    • Real-time online communication exchange of messages (including text, images, video, and voice).

    Router

    • Network device enabling device connection and internet access (using wired or wireless connections, e.g., Wi-Fi).

    RSS (Really Simple Syndication)

    • Technology for automatically updating users with new content from multiple sites (blog entries, news headlines).

    Search Engine

    • Software for searching documents on the web using keywords/phrases.

    Secure URL

    • URL starting with "https://" or having a locked symbol in the address bar showing secure access.

    Shaped Connection (Network Tuning)

    • Internet connection prioritizing certain services (email, download, browsing).

    Skype

    • Popular VoIP software for voice/video communication.

    Social Networking Site

    • Websites where users share information (likes, activities, etc.).

    Spam

    • Unwanted email advertisements (electronic junk mail).

    Switch (Network)

    • Device connecting computers in a LAN, but not for internet access.

    Syncing (Files)

    • Keeping files consistent across multiple devices, automatically updating to the latest version.

    Tabbed Browsing

    • Multiple open web pages in separate tabs on a single browser to allow quick page transitions.

    Thin Client

    • Inexpensive computers with minimal processing capabilities relying on a server for resources.

    Throttling (Internet)

    • ISP slowing internet speed due to excessive data usage.

    Twitter

    • Microblogging service letting users send messages (tweets) to followers.

    Unshaped Connection

    • Internet connection giving all services equal priority.

    URL (Uniform Resource Locator)

    • Unique web address for locating resources on the web.

    URL Shortener

    • Service converting long URLs to shorter, easier-to-remember versions.

    UTP Cable (Unshielded Twisted Pair)

    • Common network cable type for computer connections.

    Video Blog (Vlog)

    • A blog that uses videos as the primary format of communication.

    Video Conference

    • Online conference using computer networks to enable audio/video communication.

    Virtual Community

    • Online groups sharing ideas and interests.

    Virus Signature (Definition)

    • A unique pattern identifying a specific malware type.

    Vlog

    • See Video Blog

    Vodcast

    • See Podcast

    VoIP (Voice over Internet Protocol)

    • Technology enabling phone calls over computer networks (e.g., Skype calls).

    WAN (Wide Area Network)

    • A computer network spanning a large geographic area (cities, countries).

    Web Application/Online Software

    • Software running on servers viewed through a web browser.

    Web Page

    • Document (containing text, images, audio, video) viewed in a web browser.

    Web-Based Email

    • Email service accessed through a web browser.

    Weblog/Blog

    • Regularly updated website offering news, events, and activities in chronological order.

    Wi-Fi

    • Wireless internet connection, enabling access in a specific range ("hotspot").

    Wiki

    • Collaborative website where multiple people contribute content.

    WiMAX

    • Advanced, more secure wireless network technology covering wider areas than Wi-Fi.

    WLAN (Wireless LAN)

    • A LAN with at least part of its connection done wirelessly.

    WWW (World Wide Web)

    • A service on the internet presenting a vast collection of interconnected documents.

    Adware

    • Software displaying many advertisements.

    Augmented Reality

    • Technology enhancing the real world with computer-generated images/objects.

    Big Data

    • Very large datasets analyzed to reveal trends and associations.

    Bitcoin

    • Digital currency not controlled by any bank or country.

    Bot (Robot)

    • A compromised (infected) computer remotely controlled.

    Card Skimmer

    • Device that steals magnetic stripe information from credit cards.

    Click-jacking

    • A malicious attack redirecting clicks to different destinations than intended.

    Computer Virus

    • A program disrupting computer functions without user consent.

    Computer Worm

    • Malware capable of self-replicating and distributing over networks (e.g., via emails).

    Crowdfunding

    • Funding a project/business idea via small amounts from many people.

    Cyber-bullying

    • Using digital communication to spread rumors and harass others.

    Cyber-stalking

    • Harassing someone using the internet.

    Cyberterrorism

    • Attacks targeting a country’s IT infrastructure via the internet.

    Digital Divide

    • Uneven access to technology for populations in developing or poorer areas.

    Digital Migration(Digitization of Media)

    • Moving from analog to digital broadcasting (TV signals).

    DoS Attack (Denial-of-Service)

    • Attack using many infected computers to flood a server with requests, making it unavailable.

    E-mail Spoofing

    • Forged email headers making the sender appear different from the actual sender.

    Green Computing

    • Using computers in an environmentally conscious way.

    Hackers/Crackers

    • Computer criminals (hackers for prestige, crackers for malicious intent).

    Hoax (Internet)

    • Deceptive messages/articles spread through various digital communication channels.

    Identity Theft

    • Criminals stealing an identity to perform fraudulent activities.

    Information Overload

    • Unable to manage the amount of information encountered daily, resulting in feelings of helplessness.

    IoT (Internet of Things)

    • The trend of connecting everyday devices to the internet for remote monitoring and control.

    Keylogger

    • Spyware recording keystrokes for extracting passwords and confidential information.

    Malware

    • Malicious software.

    Mobile Learning

    • Education/training delivered and conducted via the internet using mobile devices.

    Pharming

    • Redirect users to fake websites irrespective of the correct URL, stealing sensitive information.

    Phishing

    • Tricking users into giving up private information (passwords, credit card details) posing as a legitimate entity.

    Quarantine (Virus)

    • Isolating a virus in a designated area to prevent further spread.

    Ransomware

    • Malware encrypting data and demanding payment for release.

    RSI (Repetitive Strain Injury)

    • Injuries from repetitive fast actions.

    Smart Home

    • Home using virtual assistant software and internet-enabled devices for remote control.

    SMiShing

    • Phishing attack delivered through SMS messages on smartphones.

    Social Engineering

    • Tricking individuals into revealing confidential information or granting access.

    Software Piracy

    • Illegal copying and distribution of software.

    Spyware

    • Software monitoring computer use and reporting data to third parties.

    Telecommuting

    • Working remotely using electronic communication for interactions with colleagues and clients.

    Trojan

    • Destructive program disguised as a useful application.

    Virtual Reality

    • Computer-generated immersive environments replacing the real world.

    Closed Questions

    • Questions that can be answered with direct facts.

    Information Management

    • Topics related to managing information.

    Open-ended Questions

    • Questions that require exploring or judging information.

    Sample Group

    • Subset of people selected to represent a larger target group.

    Target Audience

    • The group of people the information is aimed at or intended for.

    Target Group

    • The group of people who are being studied or researched.

    Absolute Cell Reference (Excel)

    • Cell reference unaffected by copying formulas or functions.
    • Uses dollar signs to prevent changes.

    Append (Access)

    • Adding records to an existing table in a database.

    Attribute (HTML)

    • Name/value pair defining an element's property.

    Bibliography

    • Citing sources used in a document.

    Bookmark (HTML)

    • Marking a position on a web page with a name.

    Bookmark (Word)

    • Marking document locations for quick navigation.

    Caption (Word)

    • Numbered descriptions for graphics and tables.

    Chart Area (Excel)

    • Includes the Plot Area and chart surrounding elements (e.g., titles).

    Citation (Word)

    • Referencing a source in the body of a document.

    Column Break (Word)

    • Starting text at the top of the next column.

    Combo Box (Access)

    • A list of values for users to select from.

    Combo Chart (Excel)

    • Chart type using different chart types for different data series.

    Constant (Excel)

    • Value with a fixed amount (e.g., 3.5).

    Crop (Word)

    • Removing unwanted parts of a picture.

    Cross-reference (Word)

    • Referring to other parts of the same document (creating hyperlinks).

    CSV File (Comma Separated Values File)

    • Text file using commas to separate data items in each row.

    Data Labels (Excel)

    • Values displayed for data points on a chart.

    Data Series (Excel)

    • Column/row data represented on a chart.

    Data Validation

    • Techniques to prevent invalid data input.

    Date Picker (Access)

    • Selecting a date using a calendar-like onscreen control.

    Default Value (Access)

    • Automatically assigned value to a field in a new record.

    Delimiter

    • Character separating data values (e.g., comma, space, tab).

    Drop Cap

    • Enlarged first letter or word of a paragraph, dropping into line(s) below.

    En Dash (Word)

    • Dash longer than a hyphen, used for number ranges and parentheses.

    Endnote (Word)

    • Similar to footnotes, but placed after a document or section.

    Exporting (Data)

    • Saving data in a different format for compatibility with various applications.

    Field (Access)

    • Single piece of data element in a database.

    Filter (Access)

    • Criterion displaying specific records that meet a certain condition.

    Filter (Excel)

    • Displaying selected rows in a worksheet based on criteria.

    Footnote (Word)

    • Additional information at the bottom of a page, linked to the text above.

    Gap Width (Excel)

    • Distance between bars or columns in charts (as a percentage).

    Gridlines (Excel Chart)

    • Lines making it easier to interpret data points in a chart.

    Gridlines (Excel Worksheet)

    • Lines separating worksheet cells into rows and columns.

    Hard Space (Word)

    • Space preventing word wrapping.

    Header/Footer (Word)

    • Areas in the document margins for page-specific information (e.g., page numbers, logos).

    HTML

    • HyperText Markup Language for creating web pages' structure and content.

    Importing (Data)

    • Opening and importing data from a different format/file type.

    Input Mask (Access)

    • Enforcing data input format in a field (using characters/symbols).

    Label (Access)

    • Field to contain text (e.g., headings, captions) on a form.

    Legend (Excel Chart)

    • Key to identifying chart data series (e.g., bars, lines) visually.

    List Box (Access)

    • A list of values to select from in a form, but cannot add new ones.

    Markers (Excel Chart)

    • Dots/crosses used to represent data values on charts to indicate data point characteristics.

    Non-breaking Hyphen (Word)

    • Hyphen preventing the line break between words.

    OLE Object (Access)

    • Data type to support graphics, audio, video, and other complex files in a database record.

    Page Break (Word)

    • Starting text on a new page without separating the document into sections.

    Plot Area (Excel Chart)

    • Area plotting chart data points (e.g., bars, lines).

    Primary Key (Access)

    • Unique identifier for each record in a table.

    Record (Access)

    • Group of related fields containing details for a given entity.

    Relative Cell Reference (Excel)

    • Cell reference automatically adjusted when copied to a different location.

    Section (Word)

    • Documented part that can be formatted independently.

    Section Break (Word)

    • Separating a document into distinct sections for different formatting.

    Stack and Scale (Excel)

    • Representing chart data series using pictures to show different measured units within a chart.

    Stacked Chart (Excel)

    • Presenting data series side by side in one chart, where data values are stacked together.

    String (Text Data)

    • Combinations of letters, digits, and symbols in text data.

    Style (Word)

    • Predefined set of formatting settings (e.g., font, paragraph).

    Table of Contents (Word)

    • Auto-generated list of document headings and their corresponding pages.

    Template (Document)

    • Pre-designed document format for user input/creation, with suitable layout to achieve a desired look and feel.

    Track Changes (Word)

    • Feature in a document marking user edits and changes (inserting, deleting, or modifying).

    Trendline (Excel)

    • "Best-fit" line on a chart to show data trend over a period (straight or curved for data point trends).

    Valid Data

    • Data values acceptable within specified parameters (correct format, values and restrictions).

    Validation Rule (Access)

    • Condition specifying the type of data acceptable within a database field (numeric, text, dates, etc.).

    Validation Text (Access)

    • Message displayed when data in the field does not comply with the validation rule.

    Watermark (Word)

    • Lightly displayed text or image as a background on the document pages.

    Widow/Orphan (Word)

    • Single isolated line or lines from a paragraph at the top or bottom of a page.

    Word, Excel, Access, HTML

    • Software applications and a markup language used for various tasks.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on various aspects of computer hardware and software! This quiz covers topics such as accelerometers, biometric identification, and cache memory, providing a comprehensive overview of essential computer science concepts. Perfect for students and enthusiasts looking to enhance their understanding.

    More Like This

    Concepts de base de l'informatique
    8 questions
    Jeopardy Review - CST8208 Part 2
    15 questions

    Jeopardy Review - CST8208 Part 2

    GracefulIslamicArt5348 avatar
    GracefulIslamicArt5348
    Defining Information Technology Concepts
    16 questions
    Use Quizgecko on...
    Browser
    Browser