Computer Science Quiz: Hardware and Software

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary function of an accelerometer in smartphones and tablets?

  • To detect the device's orientation and movement (correct)
  • To increase processing speed for applications
  • To enhance the device's camera quality
  • To improve battery life by optimizing settings

Which of the following best describes biometric identification?

  • Implementing two-factor authentication methods
  • Scanning biologically unique features for identification (correct)
  • Using password-based security systems
  • Tracking user activity through software

What is the purpose of backup in data management?

  • To permanently delete unwanted files
  • To compress files to save space
  • To create duplicates of files for retrieval in case of loss or damage (correct)
  • To optimize the performance of the computer

What defines the aspect ratio of a display?

<p>The relationship between the width and height of the display (D)</p>
Signup and view all the answers

What is the significance of cache memory in a computer?

<p>It holds frequently accessed data for quicker retrieval (D)</p>
Signup and view all the answers

Which of the following describes what beta software is?

<p>A preliminary version released for public testing to identify bugs (D)</p>
Signup and view all the answers

Which type of printer is capable of creating physical three-dimensional objects from digital designs?

<p>3D printer (B)</p>
Signup and view all the answers

How is access control used in operating systems?

<p>To authorize software installations and protect against malware (A)</p>
Signup and view all the answers

What does the acronym RFID stand for?

<p>Radio Frequency Identification (C)</p>
Signup and view all the answers

A service pack is intended to provide which of the following?

<p>A collection of previous software updates (D)</p>
Signup and view all the answers

What is the primary function of Safe Mode?

<p>To fix various software problems by loading only essential programs (A)</p>
Signup and view all the answers

Which of the following best describes a single-user licence?

<p>Installation is restricted to one computer only (C)</p>
Signup and view all the answers

What does spooling refer to in the context of printing?

<p>Sending print tasks to disk until the printer is ready (A)</p>
Signup and view all the answers

How is the quality of an image in a digital camera affected by sensor size?

<p>Larger sensors typically yield better quality images (C)</p>
Signup and view all the answers

What distinguishes SSDs from traditional hard drives?

<p>SSDs use flash memory for faster data access (A)</p>
Signup and view all the answers

What kind of software is typically categorized as utility programs?

<p>Software intended to perform maintenance tasks (D)</p>
Signup and view all the answers

What is the purpose of a USB port?

<p>To connect devices such as printers and keyboards (C)</p>
Signup and view all the answers

Which of the following is true about subscription-based software?

<p>Renewals are typically made yearly or monthly (A)</p>
Signup and view all the answers

What does 'resolution' in printing refer to?

<p>The number of dots created along a horizontal line in inches (D)</p>
Signup and view all the answers

What kind of licence allows for multiple installations within an organization?

<p>Site licence (A)</p>
Signup and view all the answers

What does the term 'soft copy' refer to?

<p>Digital files stored on a computer (D)</p>
Signup and view all the answers

What is the purpose of a dongle in computing?

<p>To enable wireless connectivity for devices (C)</p>
Signup and view all the answers

Which statement accurately describes the concept of defragmentation?

<p>Rearranging fragmented files to enhance retrieval speed (D)</p>
Signup and view all the answers

Which feature distinguishes a DSLR camera from other types of cameras?

<p>It allows for more control over technical settings (B)</p>
Signup and view all the answers

What does the term 'default printer' refer to?

<p>The printer selected to send print jobs unless changed by the user (D)</p>
Signup and view all the answers

What is the main purpose of Disk Cleanup utility?

<p>To free up storage by deleting unnecessary files (D)</p>
Signup and view all the answers

Which of the following is a characteristic of a free software?

<p>It can be modified without restrictions (A)</p>
Signup and view all the answers

What does the term cloud storage refer to?

<p>Online storage of files accessible via the internet (B)</p>
Signup and view all the answers

Why is a high contrast ratio beneficial for a display device?

<p>It enhances the visibility of colors (C)</p>
Signup and view all the answers

What does a dual-core processor imply?

<p>It has two physical CPUs on one chip (C)</p>
Signup and view all the answers

Which attribute of a file indicates it cannot be modified?

<p>Read-only attribute (C)</p>
Signup and view all the answers

What is the purpose of an End User License Agreement (EULA)?

<p>To explain restrictions on software usage (A)</p>
Signup and view all the answers

Which process results in fragmentation of files on a disk?

<p>Regularly saving files to disk (D)</p>
Signup and view all the answers

What is the function of a graphics processing unit (GPU)?

<p>To improve performance for graphics and video processing (A)</p>
Signup and view all the answers

What is the significance of a file extension?

<p>To determine the type of file and its associated applications (D)</p>
Signup and view all the answers

What type of memory does not retain its contents when power is turned off?

<p>Volatile memory (B)</p>
Signup and view all the answers

Which statement correctly describes the purpose of a firewall?

<p>Acts as a barrier between the computer and the internet (D)</p>
Signup and view all the answers

How does optical zoom differ from digital zoom?

<p>Uses lenses to magnify images (B)</p>
Signup and view all the answers

What does the acronym CAPTCHA stand for?

<p>Computerized Automatic Public Turing test to tell Computers and Humans Apart (D)</p>
Signup and view all the answers

What is the primary function of virtual assistants?

<p>To allow users to communicate naturally with their devices (B)</p>
Signup and view all the answers

Which technology allows a computer to operate as if it has more RAM than is physically present?

<p>Virtual memory (D)</p>
Signup and view all the answers

What is meant by 'Bandwidth' in networking?

<p>The total amount of data that can be transferred over a network in a given time (B)</p>
Signup and view all the answers

What does 'BYOD' stand for in a workplace context?

<p>Bring Your Own Device (B)</p>
Signup and view all the answers

What is the main function of ADSL technology?

<p>To deliver permanent digital internet connections using telephone lines (A)</p>
Signup and view all the answers

Which type of cable uses light to transmit data and offers high speed?

<p>Fibre cable (D)</p>
Signup and view all the answers

What is a common use of a webcam?

<p>For video conferencing (A)</p>
Signup and view all the answers

Which best describes the concept of grid computing?

<p>Distributed processing across multiple computers (D)</p>
Signup and view all the answers

What does 'caching' refer to in web technology?

<p>Storing frequently accessed data for quicker retrieval (A)</p>
Signup and view all the answers

What is the purpose of bookmarks in a web browser?

<p>To store shortcuts to frequently visited pages (D)</p>
Signup and view all the answers

What is the primary purpose of a memory card?

<p>To provide electronic storage for digital cameras and smartphones (D)</p>
Signup and view all the answers

Which statement best describes Optical Character Recognition (OCR)?

<p>It converts text images into editable text. (D)</p>
Signup and view all the answers

What distinguishes a laser printer from an inkjet printer?

<p>Laser printers work by using toner instead of ink. (C)</p>
Signup and view all the answers

How does a multi-user operating system function?

<p>It enables multiple users to access the same operating system simultaneously. (B)</p>
Signup and view all the answers

What is a defining characteristic of open source software (OSS)?

<p>It may be freely used, modified, and distributed. (A)</p>
Signup and view all the answers

Which of these describes the role of the motherboard in a computer?

<p>It connects all the internal components to enable communication. (D)</p>
Signup and view all the answers

What does the term 'plug-and-play' refer to?

<p>A technology that allows automatic detection and configuration of devices. (D)</p>
Signup and view all the answers

What is the importance of pixel density in displays?

<p>It indicates the number of pixels per inch in the display. (A)</p>
Signup and view all the answers

Which of the following best defines a multi-function printer?

<p>A device that can print, scan, photocopy, and fax. (B)</p>
Signup and view all the answers

What is the main function of metadata in digital files?

<p>To provide additional context about the file's content. (B)</p>
Signup and view all the answers

How is 'ppm' relevant to printers?

<p>It represents the pages a printer can print in one minute. (C)</p>
Signup and view all the answers

Which of these devices would typically use a Micro-USB port?

<p>Smartphones (C)</p>
Signup and view all the answers

What does the term 'refresh rate' describe in display technology?

<p>The frequency at which the display updates the image. (A)</p>
Signup and view all the answers

What functionality does a pointing stick offer in laptops?

<p>It serves as an alternative to a mouse for cursor control. (B)</p>
Signup and view all the answers

What type of network connects computers in a limited area, such as a university campus?

<p>LAN (D)</p>
Signup and view all the answers

Which of the following technologies allows devices to connect and exchange data by being close to each other?

<p>NFC (A)</p>
Signup and view all the answers

What is the primary function of an ISP?

<p>To sell internet access and services (B)</p>
Signup and view all the answers

Which of the following allows real-time messaging, including text and video?

<p>Instant Messaging (B)</p>
Signup and view all the answers

What is a characteristic of a secure URL?

<p>It starts with https:// (D)</p>
Signup and view all the answers

What is the main purpose of a mailing list?

<p>To group multiple email addresses under one name (C)</p>
Signup and view all the answers

What does a router do in a network?

<p>Connects devices wirelessly to the internet (A)</p>
Signup and view all the answers

What defines an IP address?

<p>A numerical address identifying a device on a network (B)</p>
Signup and view all the answers

Which of the following best describes a podcast?

<p>An audio file available for download or purchase (A)</p>
Signup and view all the answers

What does throttling mean in the context of internet service?

<p>Slowing down the internet connection based on usage (B)</p>
Signup and view all the answers

What does a switch do in a LAN?

<p>Connects computers using cables for communication (B)</p>
Signup and view all the answers

What is the purpose of a URL shortener?

<p>To create a shorter version of a URL for easier sharing (B)</p>
Signup and view all the answers

What is a primary feature of tabbed browsing?

<p>Browsing multiple pages within a single window (A)</p>
Signup and view all the answers

Which of the following best describes social networking sites?

<p>Sites for individuals to share personal updates and interests (D)</p>
Signup and view all the answers

Which term describes a computer that relies on a server for resources?

<p>Thin Client (B)</p>
Signup and view all the answers

What is a characteristic feature of Unshielded Twisted Pair (UTP) cable?

<p>It is the most common cable type for LAN connections. (B)</p>
Signup and view all the answers

What defines a video blog (vlog)?

<p>A form of blog that uses video as its primary medium. (A)</p>
Signup and view all the answers

Which term describes software that allows telephone calls over the Internet?

<p>VoIP (D)</p>
Signup and view all the answers

What is a common method used by cybercriminals to steal sensitive information via email?

<p>Phishing (D)</p>
Signup and view all the answers

What is the main purpose of a computer worm?

<p>To replicate and spread across networks. (B)</p>
Signup and view all the answers

Which of the following best describes 'Big Data'?

<p>Large data sets analyzed for trends and patterns. (B)</p>
Signup and view all the answers

What does the term 'digital divide' refer to?

<p>The disparity in technology access and knowledge in developing regions. (C)</p>
Signup and view all the answers

What is the main function of a card skimmer?

<p>To read the magnetic data on bank cards. (D)</p>
Signup and view all the answers

In what manner does augmented reality differ from virtual reality?

<p>Augmented reality enhances the real world rather than replacing it. (B)</p>
Signup and view all the answers

What characterizes a Denial of Service (DoS) attack?

<p>It floods a server with excessive requests. (D)</p>
Signup and view all the answers

What is the primary goal of cyber-bullying?

<p>To spread rumors and harass individuals digitally. (A)</p>
Signup and view all the answers

Which technology allows collaborative editing on a website, like Wikipedia?

<p>Wiki (B)</p>
Signup and view all the answers

What distinguishes web-based email from traditional email services?

<p>Web-based email is accessible through a web browser from any location. (D)</p>
Signup and view all the answers

What is a keylogger primarily designed to do?

<p>Record keystrokes and possibly track mouse movements. (D)</p>
Signup and view all the answers

Which type of software is specifically designed to disrupt or damage systems?

<p>Malware (B)</p>
Signup and view all the answers

What does the term pharming refer to?

<p>Automatically redirecting users to fake websites. (D)</p>
Signup and view all the answers

Which of the following describes phishing?

<p>Tricking individuals into revealing confidential information. (C)</p>
Signup and view all the answers

What is one of the primary functions of ransomware?

<p>To encrypt data until a ransom is paid. (D)</p>
Signup and view all the answers

What is the purpose of quarantining a virus?

<p>Preventing the virus from further infecting the computer. (C)</p>
Signup and view all the answers

What is considered a repetitive strain injury (RSI)?

<p>Pain or damage resulting from repetitive actions. (A)</p>
Signup and view all the answers

What is social engineering in the context of information security?

<p>Deceiving individuals to gain confidential information. (A)</p>
Signup and view all the answers

What does software piracy entail?

<p>Illegally copying and distributing software. (D)</p>
Signup and view all the answers

Which term refers to the subset of people analyzed in a survey?

<p>Sample group (C)</p>
Signup and view all the answers

How is an absolute cell reference in Excel indicated?

<p>By adding a dollar sign before the column letter or row number. (A)</p>
Signup and view all the answers

What is a combo chart in Excel?

<p>A chart representing data in multiple formats in one chart. (B)</p>
Signup and view all the answers

Which of the following best describes a CSV file?

<p>A format using commas to separate values for data transfer. (C)</p>
Signup and view all the answers

What does SMiShing refer to?

<p>Phishing attempts through SMS messages on smartphones. (A)</p>
Signup and view all the answers

What is the purpose of data validation in a spreadsheet or database?

<p>To ensure that only valid data is entered (B)</p>
Signup and view all the answers

What distinguishes a footnote from an endnote in a document?

<p>Footnotes are positioned at the bottom of each page (A)</p>
Signup and view all the answers

Which character is commonly used as a delimiter in a CSV file?

<p>Comma (A)</p>
Signup and view all the answers

What is the primary function of a legend in an Excel chart?

<p>To describe the data series and their colors (A)</p>
Signup and view all the answers

Which feature in Excel would you use to display only specific rows of data?

<p>Filtering (A)</p>
Signup and view all the answers

What is the purpose of a primary key in a database?

<p>To uniquely identify each record (A)</p>
Signup and view all the answers

How does a hard space function in a word processing document?

<p>It prevents word wrapping between characters (C)</p>
Signup and view all the answers

Which of the following describes a 'stacked chart' in Excel?

<p>Data series are placed one on top of another (C)</p>
Signup and view all the answers

What does an input mask enforce in Access?

<p>Input of data in a specific format (C)</p>
Signup and view all the answers

What is the function of gridlines in an Excel worksheet?

<p>They separate individual cells from each other (B)</p>
Signup and view all the answers

What is the primary use of a date picker in Access?

<p>To select a date from a calendar (C)</p>
Signup and view all the answers

Which of the following accurately describes 'markers' on an Excel line chart?

<p>They indicate the actual data points in the chart (C)</p>
Signup and view all the answers

What is a template in the context of document creation?

<p>A pre-designed document layout (D)</p>
Signup and view all the answers

What does a section break allow in a word processing document?

<p>It allows different formatting in each section (B)</p>
Signup and view all the answers

Flashcards

3D Printer

A printer that creates physical 3D objects from designs created on a computer.

Accelerometer

A sensor in smartphones and tablets that detects how the device is being moved or held, allowing for screen orientation changes.

Access control

A security feature that asks for permission before installing software to prevent malware.

Algorithm

A set of instructions used to solve problems in computer programming.

Signup and view all the flashcards

Application software

Software designed for specific tasks, like word processing.

Signup and view all the flashcards

Archiving

Creating copies of files for safekeeping, even if not accessed regularly.

Signup and view all the flashcards

Aspect ratio

The ratio of the width to height of a display, like 16:9.

Signup and view all the flashcards

Backup

Making copies of files to ensure they are available if the originals are lost.

Signup and view all the flashcards

Carpal tunnel syndrome (CTS)

A painful compression of the nerves in the wrist caused by repetitive manual action such as typing.

Signup and view all the flashcards

Clipboard

Area in memory (RAM) where copied or moved objects – both text and graphics – are temporarily stored. They are kept there until they are pasted somewhere (or until the program is closed or the computer is shut down).

Signup and view all the flashcards

Cloud computing

A general term that refers to the sharing and use of resources and applications offered as services over the internet.

Signup and view all the flashcards

Cloud storage

The online storage of files.

Signup and view all the flashcards

Colour depth

The number of bits used to represent the colour of each pixel in an image.

Signup and view all the flashcards

Contrast ratio

The relationship between the darkest black and the brightest white that a display device can produce. Higher values are better.

Signup and view all the flashcards

Convergence

The trend where separate technologies and functions that required different devices in the past are combined into one single device, e.g. the smartphone and the tablet.

Signup and view all the flashcards

Core

A single physical processor. Chips that are ‘dual core’ have 2 processors, ‘quad core’ have 4 processors, etc.

Signup and view all the flashcards

CPU

Central Processing Unit – hardware component that processes all data and carries out all instructions.

Signup and view all the flashcards

Dedicated device

Devices that are designed to perform just one specific task, such as Automatic Teller Machines (ATMs), GPS devices and household appliances like microwave ovens and washing machines.

Signup and view all the flashcards

Default printer

The printer that printing will be sent to unless otherwise specified by the user.

Signup and view all the flashcards

Defragmentation

The process of using a defragmentation utility program to reverse the process of fragmentation. The defragmenter utility program rearranges and consolidates the scattered parts of files on disk so that they can be retrieved more quickly.

Signup and view all the flashcards

DIMM

Dual Inline Memory Module – a standardized ‘stick’ of RAM designed to fit into a DIMM slot on the motherboard.

Signup and view all the flashcards

Disk Cleanup

A utility that can be used to make more storage space available by deleting unnecessary files.

Signup and view all the flashcards

What is ROM?

A special chip on the motherboard that holds the instructions needed to start the computer and load the operating system when you switch it on.

Signup and view all the flashcards

What is printer resolution?

The number of dots the printer can create along a horizontal line; measured in dots per inch (dpi).

Signup and view all the flashcards

What is RTF?

A file format that supports text formatting such as bold, font sizes, tab settings and even images. Widely used and supported by most word processors.

Signup and view all the flashcards

What is speech recognition?

Software that 'listens' to what you say and 'understands' it as a command or turns it into text (instead of the user typing the text).

Signup and view all the flashcards

What is Safe Mode?

A mode in which a computer can be booted in order to help fix various software problems. In Safe Mode, only essential system programs and services are loaded.

Signup and view all the flashcards

What is RPM?

Unit in which the rotational speed of a hard drive is measured, e.g. 7200 rpm.

Signup and view all the flashcards

What is a scheduler?

A program that is used to run certain programs at specific times.

Signup and view all the flashcards

What is a tablet?

A portable computer with a touch- or pen-sensitive screen. Similar to smartphones, with advantages of a larger screen and a longer battery life. It cannot however make cellphone calls or send / receive SMS messages.

Signup and view all the flashcards

What is screen lock pattern?

A way of locking a mobile device by setting up a pattern you must 'draw' on the screen with your finger to unlock the device.

Signup and view all the flashcards

What is SATA?

The internal hard drive interface or connection - the way the drive is connected to the motherboard.

Signup and view all the flashcards

What is Task Manager?

Provides information about the computer's performance and applications and processes. Most often used to end non-responding tasks or programs.

Signup and view all the flashcards

What is a UPS?

A device used to protect a computer against power surges, spikes, and outages. It only provides power for a limited duration - enough time to save one's work and shut the computer down properly.

Signup and view all the flashcards

What is a Service Pack?

A collection of all the previous software updates for the last period of time (6 months to a year). It is meant to help people who are behind in their updates fix their software all at once. Service packs are pretty much a thing of the past. Most software companies create software so that it will regularly check for updates and then automatically download and install those updates.

Signup and view all the flashcards

What is sensor size?

The size of the sensor in a digital camera. The bigger the size, the better the quality of the image.

Signup and view all the flashcards

Memory (RAM)

A temporary storage area for programs and data being processed in the computer. Memory loses its contents when the power is switched off.

Signup and view all the flashcards

Memory Card

Electronic storage media used in digital cameras and smartphones, used to store photos, videos and other data.

Signup and view all the flashcards

Metadata

Additional data stored about a file that describes the contents of the file, like the author and title of the file.

Signup and view all the flashcards

Laser Printer

A type of printer that works like a photocopier, using toner instead of ink cartridges. More expensive to buy than inkjet printers, but cheaper to run and better suited for high-volume printing.

Signup and view all the flashcards

Micro-USB

A smaller type of USB port, typically found on mobile devices like smartphones.

Signup and view all the flashcards

Mobile User

A user who wants and needs to have their technology with them wherever they are, like salespeople and consultants.

Signup and view all the flashcards

Motherboard

The large rectangular board inside the computer case that contains circuitry, slots, and connectors for the CPU, RAM, storage devices, and peripherals to connect to it. It allows all the parts of a computer to communicate with each other.

Signup and view all the flashcards

Multi-function Printer

An all-in-one input/output device that can typically print, scan, photocopy, and fax.

Signup and view all the flashcards

Multitasking

The ability of the operating system to load and process multiple tasks or processes at the same time. The operating system manages the multitasking to ensure the tasks are completed in a timely manner.

Signup and view all the flashcards

Multi-touch (touch screen)

A screen that allows for two or more fingers to be detected and used on it at one time, like for pinching actions.

Signup and view all the flashcards

Multi-user Operating System

An operating system that allows multiple users to access a computer system at the same time. This is often used in networks where the same single operating system deals with multiple users that are simultaneously logged on.

Signup and view all the flashcards

OCR (Optical Character Recognition)

A software program that converts text in an image into editable text, which can then be copied and pasted into another document.

Signup and view all the flashcards

Online Storage

Disk space that is allocated to you on a server on the internet, which you can access wherever you can log into the server.

Signup and view all the flashcards

Operating System

System software that controls all activities that take place in a computer. Examples include the Windows range, Linux, macOS, iOS and Android.

Signup and view all the flashcards

Patch

A downloadable update to an operating system, especially one that fixes bugs or security vulnerabilities.

Signup and view all the flashcards

Webcam

A low-resolution camera that streams video to a computer in real time. Used for video conferencing, security, and other applications where a live video feed is needed.

Signup and view all the flashcards

Fibre cable

A type of network cable using light to transmit data, making it extremely fast.

Signup and view all the flashcards

Firewall

A software barrier protecting your computer from the internet. It checks what programs are accessing your computer or trying to connect to the internet.

Signup and view all the flashcards

FTP

A protocol for quickly transferring files between computers connected to the internet.

Signup and view all the flashcards

Grid computing

A system where multiple computers share their resources to solve a single problem, combining their processing power.

Signup and view all the flashcards

HAN

A small network connecting devices within a home, like computers, printers, and smartphones.

Signup and view all the flashcards

Botnet

A group of compromised computers controlled remotely to attack other machines, spread malware or spam.

Signup and view all the flashcards

Bandwidth

The total amount of data that can be transferred from one point to another within a certain time.

Signup and view all the flashcards

AUP

A policy outlining the rights and responsibilities of network users, typically in educational or corporate settings.

Signup and view all the flashcards

BYOD

A policy allowing employees or students to use their personal devices (like laptops or phones) for work or school tasks.

Signup and view all the flashcards

Caching (web)

Temporarily storing recently accessed web pages on your computer for faster reloading.

Signup and view all the flashcards

CAPTCHA

An online test to verify that a user is a human, often using distorted text or images.

Signup and view all the flashcards

Clients

Computers that connect to a network and use services provided by servers.

Signup and view all the flashcards

Distributed processing

A type of processing where tasks are distributed among multiple computers, increasing overall processing power.

Signup and view all the flashcards

Home page

The first page of a website containing overview information, links to other pages, and resources.

Signup and view all the flashcards

Internet

A worldwide network of computers and devices connected using various communication methods.

Signup and view all the flashcards

Intranet

A private network within an organization, accessible only to its employees, offering internal resources and information.

Signup and view all the flashcards

IP address

A unique numerical address assigned to each device connected to a network or the internet.

Signup and view all the flashcards

NFC

A technology allowing electronic devices to communicate wirelessly by touching or being close to each other, primarily used for payment processing.

Signup and view all the flashcards

NIC

A controller that connects a computer to a wired network, enabling communication with other devices.

Signup and view all the flashcards

Plug-in (browser)

A third-party software application that extends a browser's capabilities, enabling the display of specialized content.

Signup and view all the flashcards

Podcast

A downloadable audio file, often in MP3 format, available for free or purchase, providing regularly updated content like news or podcasts.

Signup and view all the flashcards

Pop-up (web browser)

A small window that appears on top of the website you're visiting, usually created by advertisers.

Signup and view all the flashcards

Router

A network device that connects devices together and allows internet connection using either wired or wireless means.

Signup and view all the flashcards

RSS

A technology that automatically provides updated content from various websites, such as new blog posts, feeds, and news headlines.

Signup and view all the flashcards

Search engine

A program used to search for documents on the web by using keywords or phrases entered by the user.

Signup and view all the flashcards

Secure URL

A website address that begins with https:// and often displays a lock icon, indicating the site is encrypted for security.

Signup and view all the flashcards

Shaped connection (network tuning)

An internet connection that prioritizes certain services like email and browsing over others, such as online gaming and VoIP, resulting in slower speeds for the latter.

Signup and view all the flashcards

VoIP

A technology that allows telephone calls to be made over networks like LANs, WANs, and the internet, enabling you to talk to anyone with a VoIP system globally.

Signup and view all the flashcards

Web application / Online software

Software that runs on servers on the internet, accessible through a web browser.

Signup and view all the flashcards

Web page

A document on the web, viewable in a web browser, created using languages like HTML, JavaScript, PHP, and Python.

Signup and view all the flashcards

Web-based email

Service allowing access to an email account through a web browser from any location with internet access.

Signup and view all the flashcards

Weblog / blog

A website updated frequently with news and events in chronological order, resembling a journal with the newest entry on top.

Signup and view all the flashcards

WiFi

A way of connecting to an existing ADSL or fiber connection wirelessly within a small area called a hotspot.

Signup and view all the flashcards

Wiki

A website allowing different people to contribute and make changes to the content, like Wikipedia.

Signup and view all the flashcards

WiMAX

A secure wireless networking technology, an upgrade on WiFi, allowing wireless devices to communicate over a larger area.

Signup and view all the flashcards

World Wide Web (WWW)

A service on the internet containing a vast collection of interconnected, interactive documents stored worldwide.

Signup and view all the flashcards

Adware

Software that downloads and displays adverts, often interrupting internet use.

Signup and view all the flashcards

Green computing

Using computers in an environmentally conscious way.

Signup and view all the flashcards

Hackers and crackers

Computer criminals who break into computer systems, either for recognition or with criminal intent.

Signup and view all the flashcards

Hoax (internet)

A message or article intended to deceive, often spread via email, SMS, WhatsApp, or social media.

Signup and view all the flashcards

Keylogger

A type of spyware that records your keystrokes (and possibly mouse movements and screenshots) to steal usernames and passwords.

Signup and view all the flashcards

Mobile learning

Learning delivered using mobile devices and the internet.

Signup and view all the flashcards

Pharming

A scam where a fake website is designed to trick users into revealing private information.

Signup and view all the flashcards

Phishing

An attempt to trick users into giving up personal information by posing as a legitimate entity, usually via email.

Signup and view all the flashcards

Quarantine (virus)

Placing a virus in a secure area of the disk where it cannot harm the computer.

Signup and view all the flashcards

Ransomware

Malware that encrypts your data and holds it hostage until you pay a ransom.

Signup and view all the flashcards

Smart home

A home where software controls connected devices, allowing automated functions.

Signup and view all the flashcards

SMiShing

Phishing attack conducted via text messages on smartphones.

Signup and view all the flashcards

Social engineering

Using deception to manipulate someone into giving up confidential information or access to their computer.

Signup and view all the flashcards

Software piracy

The illegal copying and distribution of software and CDs/DVDs.

Signup and view all the flashcards

Spyware

Any technique or software that monitors and tracks how you use your computer and reports it to a third party.

Signup and view all the flashcards

Telecommuting

Working remotely, communicating digitally instead of commuting to a traditional office.

Signup and view all the flashcards

Trojan

A destructive program disguised as a useful application, requiring user activation.

Signup and view all the flashcards

Data series (Excel)

A column or row of numbers in a spreadsheet represented visually in a chart.

Signup and view all the flashcards

Data validation

Techniques implemented to prevent incorrect data entry during input.

Signup and view all the flashcards

Date picker (Access)

A control in Access that allows the selection of a specific date by using an on-screen calendar.

Signup and view all the flashcards

Default value (Access)

A value automatically assigned to a field in a new record.

Signup and view all the flashcards

Delimiter

A character used to separate data fields in a CSV file.

Signup and view all the flashcards

Drop Cap (Word)

An enlarged beginning letter or word of a paragraph that extends into the lines below.

Signup and view all the flashcards

En dash (Word)

A dash slightly longer than a hyphen, mainly used for number intervals and parentheses.

Signup and view all the flashcards

Endnote (Word)

Additional information at the end of a section or document, similar in function to a footnote.

Signup and view all the flashcards

Exporting

Saving data in a format readable by another application, possibly from a different program.

Signup and view all the flashcards

Field (Access)

A single unit of data representing a fact within a database.

Signup and view all the flashcards

Filter (Access)

A criterion or rule for a field to display only matching records.

Signup and view all the flashcards

Filter (Excel)

A feature in Excel to display only specific rows of data.

Signup and view all the flashcards

Footnote (Word)

Additional information at the bottom of a page, linked to relevant text by a number or symbol.

Signup and view all the flashcards

Gap width (Excel)

The space between columns or bars in a chart, expressed as a percentage of their width.

Signup and view all the flashcards

Gridlines (Excel chart)

Lines in the plot area of a chart, aiding in visual estimation of data points.

Signup and view all the flashcards

Study Notes

3D Printer

  • A 3D printer creates physical 3D objects from computer designs.
  • CAD or 3D modeling software is used for the designs.

Accelerometer

  • An input device in smartphones and tablets.
  • Detects device orientation and movement.
  • Allows screen orientation adjustments based on how the device is held.

Access Control

  • Operating system verifies permission before installing software.
  • Aims to prevent malware installation without user knowledge.

Algorithm

  • A step-by-step solution for problem-solving (in programming).

Application Software

  • Programs performing specific user tasks (e.g., word processors).

Archiving (Files)

  • Creating file copies for reference, not regular use.

Aspect Ratio

  • The width-to-height relationship of a display (e.g., 16:9).

Backup

  • Making copies of files to prevent loss or damage.

Beta Software

  • Preliminary versions of software released for public testing.
  • Developers fix reported errors before release.

Biometric Identification

  • Using unique biological measures (e.g., fingerprints, iris scans) for identification.

Bluetooth

  • A short-range wireless technology connecting devices (e.g., mice, printers, smartphones).

Blu-ray

  • An optical disc format for high-definition video and large data storage.

Boot

  • The computer's startup process.
  • Restarting a computer is rebooting.

Bug (Software)

  • An accidental mistake in software code (not a virus).

Byte

  • The space occupied by a single character (e.g., '4', 'A', '%').

Cache Memory

  • High-speed memory for frequently accessed data, for faster retrieval.

Card Reader

  • A device for inserting memory cards to transfer data.

Carpal Tunnel Syndrome (CTS)

  • Painful nerve compression in the wrist caused by repetitive actions (e.g., typing).

Clipboard

  • Temporary memory area for copied/moved text and graphics.
  • Retained until pasted or program closes.

Cloud Computing

  • Sharing and using resources/applications as services over the internet.

Cloud Storage

  • Online storage of files accessible from anywhere with internet access.

Color Depth

  • Number of bits to represent each pixel's color in an image.

Contrast Ratio

  • Relationship between the darkest black and brightest white on a display.
  • Higher values are better.

Convergence

  • Combining separate technologies/functions into a single device (e.g., smartphones combining phone and tablet functions).

Core

  • A single physical processor.
  • "Dual Core" has two processors, "Quad Core" has four, etc.

CPU (Central Processing Unit)

  • The hardware component that processes data and executes instructions.

Dedicated Device

  • Devices designed for a single specific task (e.g., ATMs, GPS, microwaves).

Default Printer

  • The printer that a print job is sent to unless otherwise specified.

Defragmentation

  • Rearranging and consolidating fragmented files on disk for faster retrieval.

DIMM (Dual Inline Memory Module)

  • A standardized RAM "stick" fitting into DIMM slots on the motherboard.

Disk Cleanup

  • Utility to remove unnecessary files to free up storage space.

Disk Scanner

  • Utility to check for and fix errors/bad sectors on a drive.

Dongle

  • A device plugged into a USB port to enable wireless connections (e.g., keyboard, mouse, 3G/4G).

Downward/Backward Compatibility

  • Software ability to open and use files from previous versions.

Driver

  • Software enabling a computer to communicate with hardware/devices.
  • Typically installed automatically by the operating system.

DSLR Camera

  • A type of digital camera for professional use offering lens changes and technical controls.

Entry-Level Computer

  • The least expensive computer in its category (e.g., desktop PC), with lower specifications.

Ergonomics

  • Studying and designing the workplace and equipment for worker comfort and safety.

EULA (End User License Agreement)

  • A legally binding contract between a user and a software company detailing usage rules.

File Attribute

  • Properties assigned to files (e.g., Hidden, Read-Only).

File Extension

  • Characters (usually 3-5) identifying a file type (e.g., .docx is a Word file).

File Property

  • Basic information about a file (e.g., name, size, modification date).

Formatting (a disk)

  • Preparing a disk for data storage, erasing existing data.

Fragmentation

  • Files becoming scattered on a disk over time, leading to slower performance.

Freeware

  • Fully functional software usable and copyable without restrictions.

Geo-tagging

  • Storing a photo's location (latitude/longitude) in the file metadata.

GHz (Gigahertz)

  • The unit for measuring CPU speed.
  • Higher is better.

GPS Device

  • Calculates location (latitude/longitude) on Earth using signals from GPS satellites.

GPU (Graphics Processing Unit)

  • The chip on a video card that improves performance for certain software (e.g., CAD, gaming).

Hard Copy

  • Printed output (vs. soft copy, displayed on a screen).

HDMI (High-Definition Multimedia Interface)

  • Interface transmitting high-definition video and sound via a single cable.
  • Digital signals for better quality.

Hidden (Attribute)

  • File attribute making a file invisible in file listings.

Hybrid Computer

  • A laptop/tablet with a reversible/detachable touch screen and keyboard.

Inkjet Printer

  • A relatively inexpensive printer that sprays ink dots.
  • Suitable for high-quality graphics (e.g., photos).

ISO Rating (Digital Camera)

  • Measures a camera's sensitivity to light, higher values being better.

Laser Printer

  • A relatively expensive, but cost-effective, printer using toner, suitable for high-volume printing.

Linux

  • An open-source operating system.

Lumen (Data Projector)

  • Measures the brightness of a data projector's image.
  • Higher lumen ratings are better.

Memory (RAM)

  • Temporary storage for programs and data during computer processing.
  • Data lost when power is turned off.

Memory Card

  • Electronic storage media used in digital cameras and smartphones.

Metadata

  • Additional data describing a file (e.g., author, title).

Micro-USB

  • A smaller type of USB port, often found on mobile devices.

Mobile User

  • Users who need technology readily available for tasks (e.g., salespeople, consultants).

Motherboard

  • A large board containing circuitry for connecting the CPU, RAM, storage, and peripherals.
  • Allows communication between computer components.

Multi-function Printer

  • A device combining printing, scanning, copying, and faxing capabilities.

Multitasking

  • The operating system's ability to run multiple tasks/processes concurrently.

Multi-touch (Touch Screen)

  • Touch screens allowing two or more fingers to be detected simultaneously.

Multi-user Operating System

  • An operating system that allows multiple users to access the computer concurrently (in a network).

OCR (Optical Character Recognition)

  • Converts scanned text images into editable text.

Online Storage

  • Disk space allocated to a user online accessible from anywhere with internet access.

Open Source Software (OSS)

  • Software freely used, modified, and distributed but not sold.

Operating System

  • Software controlling all computer activities (e.g., Windows, Linux, macOS, iOS, Android).

Patch (Software)

  • Downloadable updates fixing bugs or vulnerabilities in existing software.

Path

  • A series of folders leading to a specific file.

PDF (Portable Document Format)

  • A file format for distributing documents, readable with a PDF reader.

Pen Input

  • Using a pen/stylus with a pressure-sensitive digitizing tablet.

Phablet

  • A smartphone with a larger screen (between a phone and tablet).

Pixel Density (DPI)

  • Number of pixels per horizontal inch on a display, higher values are better.

Plain Text File

  • Simple text files (without formatting) with a .txt extension.

Platform

  • A type of operating system (e.g., Linux, Android, Windows).

Plug-and-Play

  • Technology enabling the computer to automatically detect and configure connected devices quickly.

Pointing Stick

  • A laptop input device acting as an alternative to a mouse.

POS (Point of Sale) System

  • System used to speed up sales transactions.

Power User

  • Users with specialized computing needs and using advanced software features.

PPM (Pages per Minute)

  • Printer speed, measured in pages printed per minute.

Printer Queue

  • Temporary storage for print jobs until the printer is ready.

Program Files

  • Files that run applications (not data files), usually with a .com or .exe extension.

Proprietary Software

  • Licensed software to be used under specified conditions (no modifications or distribution).

QR Code

  • A two-dimensional barcode storing more data than standard barcodes.

Read-only

  • A file attribute preventing modification of a file.

Refresh Rate

  • Frequency of screen display refresh.
  • Higher values are better.

Resolution (Display)

  • The maximum number of pixels a display supports (horizontal x vertical).

Resolution (Scanner)

  • The number of dots scanned per inch (DPI), indicating image clarity.

Resolution (Digital Camera)

  • The total number of pixels making up an image, indicating the total image quality.

Resolution (Printer)

  • Number of dots a printer creates per horizontal inch (DPI), indicating the quality of print output.

RFID (Radio Frequency Identification)

  • Uses small radio devices to store and transmit data (e.g., payment processing).

Rich Text Format

  • A file format allowing many font/text and image formatting styles.

ROM (Read-Only Memory)

  • A special chip holding instructions needed to start a computer.

RPM (Revolutions per Minute)

  • Unit measuring a hard drive's rotational speed.

Safe Mode

  • A computer startup mode for troubleshooting software problems.
  • Loads only essential system programs.

SATA

  • The internal hard drive interface connection type.

Scanner

  • Input device that scans images into a computer (text, graphics, barcodes, QR codes).

Scheduler

  • A program used to run other programs at specific times.

Screen Lock Pattern

  • A security method for mobile devices requiring a drawn pattern.

Sensor Size (Digital Camera)

  • The size of the sensor in a digital camera, impacting image quality.

Server

  • A computer providing services/resources to other linked computers (clients) in a network.

Service Pack

  • A collection of previous software updates (now less common, as automated updates are more frequent).

Shareware

  • Software available for a trial period (e.g., 30 days).
  • Full version requires payment after the trial period.

Single-user License

  • Allows installation on only one computer.

Single-user Operating System

  • Allows access by only one user at a time.

Site License

  • Allows unlimited installations of software within an organization/company.

Soft Copy

  • Visual output on a computer screen (opposite of hard copy).

SOHO User (Small Office/Home Office)

  • A computer user for a small business.

Speech Recognition

  • Software that understands spoken commands and converts speech to text.

Spooling

  • Temporarily saving print jobs to disk until the printer is ready.

SSD (Solid State Drive)

  • Electronic alternative to hard drives, using flash drive technology for fast access.

Subscription-Based Software

  • Software with a monthly or yearly subscription for usage (e.g., Office 365).

System Requirements

  • Minimum computer specifications needed to run a piece of software.

System Software

  • Software controlling/supporting computer operations.

Tablet

  • Portable computer with touch/pen-sensitive screen, suitable for extended use compared to smartphones.

Task Manager

  • Provides information about computer performance and running applications/processes.

Tooltip

  • Information that appears when the pointer rests on an icon or object.

Touch Screen

  • Input/output screen used in smartphones/tablets, may use finger touch or stylus.

Touchpad

  • Pressure-sensitive surface on laptops as a mouse alternative.

Trackball

  • An input device with a ball that users roll to move the pointer.

Update (Software)

  • Fixes bugs or adds features to existing software.

Upgrade (Software)

  • A new software version with substantial changes/features that typically requires payment.

UPS (Uninterruptible Power Supply)

  • Protects computers from power surges/outages to save work before a shutdown.

USB Port

  • Standard port for connecting peripherals (e.g., keyboards, mice, printers).

Utility Programs

  • System software for computer maintenance tasks.

VGA Port

  • Port connecting a monitor to a computer, largely replaced by other connections.

Video Card

  • A separate board with memory and GPU for improved video processing in a computer.

Virtual Assistant

  • Software that understands and responds to spoken commands.

Virtual Memory

  • Uses disk space to simulate more RAM than physically installed.
  • Allows running more programs.

Voice Recognition Software

  • Allows computers to understand speech, including command execution and dictation.

Volatile Memory

  • Temporarily holds data lost when power is off (e.g., RAM).

Webcam

  • A low-resolution camera used for real-time video feeds (e.g., video conferencing).

Zoom (Digital)

  • Enlarging an image, losing quality and resolution.

Zoom (Optical)

  • Image enlargement using camera lenses, preserving image quality.

3G/4G (LTE)

  • Cellular mobile phone technology generations with high-tech network infrastructure.

802.11 a/b/g/n

  • Wi-Fi standards indicating wireless adapter specifications and network speed.

Add-on/Extension (Browser)

  • Third-party apps extending browser functionality (e.g., translation, ad blockers).

ADSL

  • Asymmetric Digital Subscriber Line, a permanent internet connection using telephone lines at a fixed cost..

Archiving (Email)

  • Moving emails to an archive folder without deleting.

AUP (Acceptable Use Policy)

  • Policy outlining user rights and responsibilities in networked environments.

Backbone (Network)

  • Cable connecting different LANs.

Bandwidth

  • The amount of data transferred per unit of time (measured in Kbps or Mbps).

Bookmarks (Web Browser)

  • Stored shortcuts to frequently visited web pages (also known as Favorites).

Botnet

  • A network of compromised computers controlled remotely to perform malicious actions.

Broadband

  • A high-speed internet connection.

BYOD (Bring Your Own Device)

  • Policy allowing users to bring personal devices to school/work for internet access.

Caching (Web)

  • Temporarily storing recently accessed web pages for faster reloading.

Cap (Data Usage)

  • A limit on data usage for a month.

CAPTCHA

  • Test determining if a user is a human or a computer program.

Clients (Network)

  • Devices using resources/services from servers in a computer network.

Distributed Processing

  • Solving problems by distributing processing tasks among multiple computers.

Distribution List (Email)

  • Grouped email addresses for sending emails to multiple recipients.

E-commerce

  • Business transactions done over the internet.

EFT (Electronic Funds Transfer)

  • Transferring money electronically using internet banking.

Email

  • Electronic mail: composing, sending, and receiving messages digitally.

Fiber Cable

  • Network cable using light signals for high-speed data transmission.

Firewall

  • A barrier between a computer and the internet, filtering incoming/outgoing network traffic.

FTP (File Transfer Protocol)

  • Protocol for transferring files between remote computers.

Grid Computing

  • Sharing computer resources to solve a single problem to increase processing power.

HAN (Home Area Network)

  • Small network connecting devices within a home environment.

History (Web Browser)

  • Records previously visited web pages.

Home Page

  • A website's main page containing information and links to other pages.

Hotspot

  • Area/range of Wi-Fi network signal coverage
  • A connection to another place in a document or web page (often underlined blue text ).

Instant Messaging (IM)

  • Real-time communication (text, images, video, voice) between users.

Internet

  • A global computer network connecting computers and devices.

Intranet

  • A private network within an organization for internal communication.

IP Address

  • A unique numerical address identifying a device on a network or the internet.

ISP (Internet Service Provider)

  • Company providing internet access.

ISP-Based Email

  • Email access using software like Outlook configured with ISP credentials.

LAN (Local Area Network)

  • A network connecting computers within a small area (e.g., school, office building).

LTE (Long Term Evolution)

  • The next-generation high-speed cellular technology (4G).

Mailing List

  • Grouped email addresses for sending mass mailings.

NFC (Near Field Communication)

  • Wireless data exchange between devices through close contact.

NIC (Network Interface Controller)

  • Hardware enabling network connection to a wired network.

PAN (Personal Area Network)

  • A network organized around an individual or a couple of individuals.

Plug-in (Browser)

  • Third-party apps for specialized content display within a browser (e.g., Flash videos).

Podcast

  • Audio/video files available for download on the internet.

Pop-up (Web Browser)

  • Small browser windows that appear on top of a website.

Real-time Messaging

  • Real-time online communication exchange of messages (including text, images, video, and voice).

Router

  • Network device enabling device connection and internet access (using wired or wireless connections, e.g., Wi-Fi).

RSS (Really Simple Syndication)

  • Technology for automatically updating users with new content from multiple sites (blog entries, news headlines).

Search Engine

  • Software for searching documents on the web using keywords/phrases.

Secure URL

  • URL starting with "https://" or having a locked symbol in the address bar showing secure access.

Shaped Connection (Network Tuning)

  • Internet connection prioritizing certain services (email, download, browsing).

Skype

  • Popular VoIP software for voice/video communication.

Social Networking Site

  • Websites where users share information (likes, activities, etc.).

Spam

  • Unwanted email advertisements (electronic junk mail).

Switch (Network)

  • Device connecting computers in a LAN, but not for internet access.

Syncing (Files)

  • Keeping files consistent across multiple devices, automatically updating to the latest version.

Tabbed Browsing

  • Multiple open web pages in separate tabs on a single browser to allow quick page transitions.

Thin Client

  • Inexpensive computers with minimal processing capabilities relying on a server for resources.

Throttling (Internet)

  • ISP slowing internet speed due to excessive data usage.

Twitter

  • Microblogging service letting users send messages (tweets) to followers.

Unshaped Connection

  • Internet connection giving all services equal priority.

URL (Uniform Resource Locator)

  • Unique web address for locating resources on the web.

URL Shortener

  • Service converting long URLs to shorter, easier-to-remember versions.

UTP Cable (Unshielded Twisted Pair)

  • Common network cable type for computer connections.

Video Blog (Vlog)

  • A blog that uses videos as the primary format of communication.

Video Conference

  • Online conference using computer networks to enable audio/video communication.

Virtual Community

  • Online groups sharing ideas and interests.

Virus Signature (Definition)

  • A unique pattern identifying a specific malware type.

Vlog

  • See Video Blog

Vodcast

  • See Podcast

VoIP (Voice over Internet Protocol)

  • Technology enabling phone calls over computer networks (e.g., Skype calls).

WAN (Wide Area Network)

  • A computer network spanning a large geographic area (cities, countries).

Web Application/Online Software

  • Software running on servers viewed through a web browser.

Web Page

  • Document (containing text, images, audio, video) viewed in a web browser.

Web-Based Email

  • Email service accessed through a web browser.

Weblog/Blog

  • Regularly updated website offering news, events, and activities in chronological order.

Wi-Fi

  • Wireless internet connection, enabling access in a specific range ("hotspot").

Wiki

  • Collaborative website where multiple people contribute content.

WiMAX

  • Advanced, more secure wireless network technology covering wider areas than Wi-Fi.

WLAN (Wireless LAN)

  • A LAN with at least part of its connection done wirelessly.

WWW (World Wide Web)

  • A service on the internet presenting a vast collection of interconnected documents.

Adware

  • Software displaying many advertisements.

Augmented Reality

  • Technology enhancing the real world with computer-generated images/objects.

Big Data

  • Very large datasets analyzed to reveal trends and associations.

Bitcoin

  • Digital currency not controlled by any bank or country.

Bot (Robot)

  • A compromised (infected) computer remotely controlled.

Card Skimmer

  • Device that steals magnetic stripe information from credit cards.

Click-jacking

  • A malicious attack redirecting clicks to different destinations than intended.

Computer Virus

  • A program disrupting computer functions without user consent.

Computer Worm

  • Malware capable of self-replicating and distributing over networks (e.g., via emails).

Crowdfunding

  • Funding a project/business idea via small amounts from many people.

Cyber-bullying

  • Using digital communication to spread rumors and harass others.

Cyber-stalking

  • Harassing someone using the internet.

Cyberterrorism

  • Attacks targeting a country’s IT infrastructure via the internet.

Digital Divide

  • Uneven access to technology for populations in developing or poorer areas.

Digital Migration(Digitization of Media)

  • Moving from analog to digital broadcasting (TV signals).

DoS Attack (Denial-of-Service)

  • Attack using many infected computers to flood a server with requests, making it unavailable.

E-mail Spoofing

  • Forged email headers making the sender appear different from the actual sender.

Green Computing

  • Using computers in an environmentally conscious way.

Hackers/Crackers

  • Computer criminals (hackers for prestige, crackers for malicious intent).

Hoax (Internet)

  • Deceptive messages/articles spread through various digital communication channels.

Identity Theft

  • Criminals stealing an identity to perform fraudulent activities.

Information Overload

  • Unable to manage the amount of information encountered daily, resulting in feelings of helplessness.

IoT (Internet of Things)

  • The trend of connecting everyday devices to the internet for remote monitoring and control.

Keylogger

  • Spyware recording keystrokes for extracting passwords and confidential information.

Malware

  • Malicious software.

Mobile Learning

  • Education/training delivered and conducted via the internet using mobile devices.

Pharming

  • Redirect users to fake websites irrespective of the correct URL, stealing sensitive information.

Phishing

  • Tricking users into giving up private information (passwords, credit card details) posing as a legitimate entity.

Quarantine (Virus)

  • Isolating a virus in a designated area to prevent further spread.

Ransomware

  • Malware encrypting data and demanding payment for release.

RSI (Repetitive Strain Injury)

  • Injuries from repetitive fast actions.

Smart Home

  • Home using virtual assistant software and internet-enabled devices for remote control.

SMiShing

  • Phishing attack delivered through SMS messages on smartphones.

Social Engineering

  • Tricking individuals into revealing confidential information or granting access.

Software Piracy

  • Illegal copying and distribution of software.

Spyware

  • Software monitoring computer use and reporting data to third parties.

Telecommuting

  • Working remotely using electronic communication for interactions with colleagues and clients.

Trojan

  • Destructive program disguised as a useful application.

Virtual Reality

  • Computer-generated immersive environments replacing the real world.

Closed Questions

  • Questions that can be answered with direct facts.

Information Management

  • Topics related to managing information.

Open-ended Questions

  • Questions that require exploring or judging information.

Sample Group

  • Subset of people selected to represent a larger target group.

Target Audience

  • The group of people the information is aimed at or intended for.

Target Group

  • The group of people who are being studied or researched.

Absolute Cell Reference (Excel)

  • Cell reference unaffected by copying formulas or functions.
  • Uses dollar signs to prevent changes.

Append (Access)

  • Adding records to an existing table in a database.

Attribute (HTML)

  • Name/value pair defining an element's property.

Bibliography

  • Citing sources used in a document.

Bookmark (HTML)

  • Marking a position on a web page with a name.

Bookmark (Word)

  • Marking document locations for quick navigation.

Caption (Word)

  • Numbered descriptions for graphics and tables.

Chart Area (Excel)

  • Includes the Plot Area and chart surrounding elements (e.g., titles).

Citation (Word)

  • Referencing a source in the body of a document.

Column Break (Word)

  • Starting text at the top of the next column.

Combo Box (Access)

  • A list of values for users to select from.

Combo Chart (Excel)

  • Chart type using different chart types for different data series.

Constant (Excel)

  • Value with a fixed amount (e.g., 3.5).

Crop (Word)

  • Removing unwanted parts of a picture.

Cross-reference (Word)

  • Referring to other parts of the same document (creating hyperlinks).

CSV File (Comma Separated Values File)

  • Text file using commas to separate data items in each row.

Data Labels (Excel)

  • Values displayed for data points on a chart.

Data Series (Excel)

  • Column/row data represented on a chart.

Data Validation

  • Techniques to prevent invalid data input.

Date Picker (Access)

  • Selecting a date using a calendar-like onscreen control.

Default Value (Access)

  • Automatically assigned value to a field in a new record.

Delimiter

  • Character separating data values (e.g., comma, space, tab).

Drop Cap

  • Enlarged first letter or word of a paragraph, dropping into line(s) below.

En Dash (Word)

  • Dash longer than a hyphen, used for number ranges and parentheses.

Endnote (Word)

  • Similar to footnotes, but placed after a document or section.

Exporting (Data)

  • Saving data in a different format for compatibility with various applications.

Field (Access)

  • Single piece of data element in a database.

Filter (Access)

  • Criterion displaying specific records that meet a certain condition.

Filter (Excel)

  • Displaying selected rows in a worksheet based on criteria.

Footnote (Word)

  • Additional information at the bottom of a page, linked to the text above.

Gap Width (Excel)

  • Distance between bars or columns in charts (as a percentage).

Gridlines (Excel Chart)

  • Lines making it easier to interpret data points in a chart.

Gridlines (Excel Worksheet)

  • Lines separating worksheet cells into rows and columns.

Hard Space (Word)

  • Space preventing word wrapping.

Header/Footer (Word)

  • Areas in the document margins for page-specific information (e.g., page numbers, logos).

HTML

  • HyperText Markup Language for creating web pages' structure and content.

Importing (Data)

  • Opening and importing data from a different format/file type.

Input Mask (Access)

  • Enforcing data input format in a field (using characters/symbols).

Label (Access)

  • Field to contain text (e.g., headings, captions) on a form.

Legend (Excel Chart)

  • Key to identifying chart data series (e.g., bars, lines) visually.

List Box (Access)

  • A list of values to select from in a form, but cannot add new ones.

Markers (Excel Chart)

  • Dots/crosses used to represent data values on charts to indicate data point characteristics.

Non-breaking Hyphen (Word)

  • Hyphen preventing the line break between words.

OLE Object (Access)

  • Data type to support graphics, audio, video, and other complex files in a database record.

Page Break (Word)

  • Starting text on a new page without separating the document into sections.

Plot Area (Excel Chart)

  • Area plotting chart data points (e.g., bars, lines).

Primary Key (Access)

  • Unique identifier for each record in a table.

Record (Access)

  • Group of related fields containing details for a given entity.

Relative Cell Reference (Excel)

  • Cell reference automatically adjusted when copied to a different location.

Section (Word)

  • Documented part that can be formatted independently.

Section Break (Word)

  • Separating a document into distinct sections for different formatting.

Stack and Scale (Excel)

  • Representing chart data series using pictures to show different measured units within a chart.

Stacked Chart (Excel)

  • Presenting data series side by side in one chart, where data values are stacked together.

String (Text Data)

  • Combinations of letters, digits, and symbols in text data.

Style (Word)

  • Predefined set of formatting settings (e.g., font, paragraph).

Table of Contents (Word)

  • Auto-generated list of document headings and their corresponding pages.

Template (Document)

  • Pre-designed document format for user input/creation, with suitable layout to achieve a desired look and feel.

Track Changes (Word)

  • Feature in a document marking user edits and changes (inserting, deleting, or modifying).

Trendline (Excel)

  • "Best-fit" line on a chart to show data trend over a period (straight or curved for data point trends).

Valid Data

  • Data values acceptable within specified parameters (correct format, values and restrictions).

Validation Rule (Access)

  • Condition specifying the type of data acceptable within a database field (numeric, text, dates, etc.).

Validation Text (Access)

  • Message displayed when data in the field does not comply with the validation rule.

Watermark (Word)

  • Lightly displayed text or image as a background on the document pages.

Widow/Orphan (Word)

  • Single isolated line or lines from a paragraph at the top or bottom of a page.

Word, Excel, Access, HTML

  • Software applications and a markup language used for various tasks.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Concepts de base de l'informatique
8 questions
Jeopardy Review - CST8208 Part 2
15 questions

Jeopardy Review - CST8208 Part 2

GracefulIslamicArt5348 avatar
GracefulIslamicArt5348
Use Quizgecko on...
Browser
Browser