• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/96

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

96 Cards in this Set

  • Front
  • Back
Five types of application software?
Word Processor
Spreadsheet
Database
Presentation
Project Management
All of Microsoft Office 2007-2008 is presented in rectangular boxes called?
windows
Multiple applications equal
multi-tasking
What is a ribbon?
a GUI element composed of a strip across the top of the window that exposes all the functions the program can perform in a single place
word processors allow?
a user to make document files
A word processor document can be saved as a..
web page
A word processor document can also be saved as....
an Intranet:allows an organization to communicate essential information for operations
Spreadsheet is capable of
"what-if" analysis
The intersection of a column and row is called?
a cell
A cell holds to types of entries
text or numeric
Text entries serve as
labels or notes
Numeric entries serve as
formulas and functions
Database software
is a collection of files that consist of records of data separated by fields to produce subsets of information
Allows businesses to store their history in relational databases which is called corporate memory
Data warehousing
Three ways of sharing information
Cut and Paste- static
Object embedding-static
Object linking- dynamic
Image editing softwares like
Adobe Photoshop are application programs that enable an end-user to manipulate visual images
Computer graphics are classified in two catergories
Raster and vector
Web authoring application software like Microsoft Expression Web
allows a user to create, publish, and administer web sites
WYSIWYG
"What you see is what you get" interface
Factors for a good website?
Intention
Viewers
Content
Design Layout
Search Engine Optimization
Intention?
Why does the website exist?
Viewers?
Who are the expected users?
Content?
Does it have complete and relevant information?
Design?
Is it easy to navigate and visually appealing
Search engine?
Can it be found by search engines?
One of the most powerful web authoring programs in the business environment?
Microsoft Office Sharepoint Designer: allows webmasters to create and administer web pages
What is a platform neutral?
document files can be used on any platform
Multimedia application software?
used by businesses to combine and manipulate text, graphics, audio, and video into presentation software
Emali is
an electronic method of composing, sending, storing, and receiving messages over electronic communication
Microsoft Outlook
manages and administers mail and is a PIM (personal information manager)
What is ERP?
Enterprise Resource Planning, attempts to integrate all data and processes of an entire business into just one integrated system
Moat common ERP's?
SAP AG
PeopleSoft
SAS Systems
Collaboration is?
a method of mutual learning between two or more people who are working together towards a common goal
Conversational interaction?
the main form of collaboration in business, also a conversation with 2 or more ppl to trade info and ideas
Other collaborations
Microsoft's Groove and Lotus notes
Loading the platform into the computer’s memory is called
booting
Powering up a computer on for the first time is called
cold boot
a computer that is restarted while it was already running is called
warm boot
When electricity courses through the circuits of a personal computer that has just been powered up, the first thing that happens is that system searches for the
basic input/output system (BIOS).
is firmware programming embedded in to a computer chip, meaning the computer runs the same program every time it’s turned on.
BIOS
The operating system in turn takes control and configures the computer’s hardware to settings stored in a database called
the registry
In business, it is extremely important that the operating system
authenticates the user
The business computer authenticates users by requiring them
to login and load the user’s profile.
Virtual memory is
actually the technique of breaking files requested from a secondary memory like a hard drive into smaller, more manageable files that can fit into RAM
These smaller files that represent pieces of larger files are called
pages, or swap files.
Since a computer is a binary system that only understands machine code, it needs special programs called
drivers
File management systems also provide vital information about
folders and files
Common file management features
File name – What is the name of the file?
Modification Date – When was the file last accessed or saved?
File Type – What kind of file is it?
File Size – How big or small is the file?
Defrag is
a utility that that moves positive and negative charges to the innermost tracks of a disk which in turn reduce the amount of time it takes the read/write arm to save or erase data and information.
Antivirus utilities are system software that
identifies known viruses and attempts to block them from entering and infecting a computer system.
To compensate for any operating system inadequacies, companies like Microsoft offer a system software utility called
system update
new or modified programming called
patches
Green computing is the practice of
using computing resources efficiently while reducing the use of hazardous materials, maximizing energy efficiency, promoting the recyclability of defunct products, and reducing factory waste during the computer’s manufacturing process.
Since virtually all businesses use computers, they need to be
concerned with overall energy costs and ways to reduce these costs.
concerned with government imposed levies and statutes on
carbon production in the computer manufacturing
&
regulations on power consumption and waste.
Environmental Protection Agency (EPA)
funded a grant that developed the Electronic Product Environmental Assessment Tool or EPEAT
Reduction or elimination of environmentally sensitive materials
EPEAT encourages manufacturers to reduce the amount of chemicals or eliminate them altogether whether in the manufacturing process or when the computer is discarded.
Materials selection
informs the consumer of the percentage of recycled plastics and offers a declaration of the percentage of renewable/bio‐based plastic material content.
Design for end of life is
means that computer manufacturers, as well as all electronics manufacturers, inform their consumers about the special handling needs while disposing of their product when it is no longer useful.
Product longevity/life cycle extension
encourage manufacturers to make extended warranties available to their consumers so their products last longer, and also to design the product so it can be upgraded with common tools.
End of life management asks manufacturers to
make provisions to take their product back at the end of the product's life cycle.
Corporate performance means that
a manufacturer must demonstrate a sound corporate environmental policy consistent with International Organization for Standardization and have self‐ certified environmental management systems for in place for the design and manufacturing.
Packaging:
requires computer and electronics manufacturers to reduce or eliminate intentionally added toxins in packaging as well as having separable packing materials with a declaration of recycled content.
Energy conservation
asks manufacturers to adopt the government’s Energy Star® specifications.
Active Use means
a computer is on and being used.
Sleep mode
low power mode
Stand-by mode
when a computer turns off automatically when it has not been used for a specific amount of time designated by the user.
Green Computing Business Plans are based on the idea that
businesses can become environmentally friendly, more profitable, and socially responsible through well‐though out implementations of sustainable policies and procedures .
Green Computing Business plan
Responsible Recycling
Follow EPEAT and Energy Star® Guidelines
Decrease or Eliminate Paper Consumption:
Economic Considerations
Telecommuting is
essentially a work arrangement where employees benefit from flexibility in working location and hours.
A computer network is?
two or more computers connected together to communicate and share resources
Network of 3 computers?
clients
Central computer is called?
server
Every device connected to a network is called a
node
Network Interface Controller?
allows network cable to be plugged in so it can communicate with other computers
MAC address?
48-bit address
A standard form of communication is called?
protocol
Network cables are?
specialized wires with adapter to plug into the NIC
Hub?
ensures that computer traffic does not run into each other
User Datagram Protocol
used mostly for video computer files
Network operating system (NOS)
software that controls an entire network
Network administrator
smooth network operations and performance
Refers to the mapping of a physical network and logical interconnections between nodes
topology
Bus topology?
all of nodes are connected to common linear bacons with 2 endpoins
Star topology?
star shaped, all nodes connected to common central node
Local Area Network (LAN)
network thats small and in a single building
Campus Ares Network (CAN)
2 or more LAN's located on a campus
Metropolitan Area Network (MAN)
connects 2 or more LANs or CANs but within boundaries of a town or city
Wide Area Network (WAN)
network over a wide geographical area that connects LANs CANs and MANs. Rely on telephone companies to connect.
Peer to Peer Network (P2P)
connects computers directly to one another without a sever
Internet
largest network, all networks combined.
Password?
secrecy word or combination of keyboard characters
Strong password?
mixed results
Web browsing
outlining a user's web access to avoid inappropriate sites
Permissions?
restricting or gaining access to specific files and folders
Firewall
ensures only authorized personnel can use Intranet