Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
96 Cards in this Set
- Front
- Back
Five types of application software?
|
Word Processor
Spreadsheet Database Presentation Project Management |
|
All of Microsoft Office 2007-2008 is presented in rectangular boxes called?
|
windows
|
|
Multiple applications equal
|
multi-tasking
|
|
What is a ribbon?
|
a GUI element composed of a strip across the top of the window that exposes all the functions the program can perform in a single place
|
|
word processors allow?
|
a user to make document files
|
|
A word processor document can be saved as a..
|
web page
|
|
A word processor document can also be saved as....
|
an Intranet:allows an organization to communicate essential information for operations
|
|
Spreadsheet is capable of
|
"what-if" analysis
|
|
The intersection of a column and row is called?
|
a cell
|
|
A cell holds to types of entries
|
text or numeric
|
|
Text entries serve as
|
labels or notes
|
|
Numeric entries serve as
|
formulas and functions
|
|
Database software
|
is a collection of files that consist of records of data separated by fields to produce subsets of information
|
|
Allows businesses to store their history in relational databases which is called corporate memory
|
Data warehousing
|
|
Three ways of sharing information
|
Cut and Paste- static
Object embedding-static Object linking- dynamic |
|
Image editing softwares like
|
Adobe Photoshop are application programs that enable an end-user to manipulate visual images
|
|
Computer graphics are classified in two catergories
|
Raster and vector
|
|
Web authoring application software like Microsoft Expression Web
|
allows a user to create, publish, and administer web sites
|
|
WYSIWYG
|
"What you see is what you get" interface
|
|
Factors for a good website?
|
Intention
Viewers Content Design Layout Search Engine Optimization |
|
Intention?
|
Why does the website exist?
|
|
Viewers?
|
Who are the expected users?
|
|
Content?
|
Does it have complete and relevant information?
|
|
Design?
|
Is it easy to navigate and visually appealing
|
|
Search engine?
|
Can it be found by search engines?
|
|
One of the most powerful web authoring programs in the business environment?
|
Microsoft Office Sharepoint Designer: allows webmasters to create and administer web pages
|
|
What is a platform neutral?
|
document files can be used on any platform
|
|
Multimedia application software?
|
used by businesses to combine and manipulate text, graphics, audio, and video into presentation software
|
|
Emali is
|
an electronic method of composing, sending, storing, and receiving messages over electronic communication
|
|
Microsoft Outlook
|
manages and administers mail and is a PIM (personal information manager)
|
|
What is ERP?
|
Enterprise Resource Planning, attempts to integrate all data and processes of an entire business into just one integrated system
|
|
Moat common ERP's?
|
SAP AG
PeopleSoft SAS Systems |
|
Collaboration is?
|
a method of mutual learning between two or more people who are working together towards a common goal
|
|
Conversational interaction?
|
the main form of collaboration in business, also a conversation with 2 or more ppl to trade info and ideas
|
|
Other collaborations
|
Microsoft's Groove and Lotus notes
|
|
Loading the platform into the computer’s memory is called
|
booting
|
|
Powering up a computer on for the first time is called
|
cold boot
|
|
a computer that is restarted while it was already running is called
|
warm boot
|
|
When electricity courses through the circuits of a personal computer that has just been powered up, the first thing that happens is that system searches for the
|
basic input/output system (BIOS).
|
|
is firmware programming embedded in to a computer chip, meaning the computer runs the same program every time it’s turned on.
|
BIOS
|
|
The operating system in turn takes control and configures the computer’s hardware to settings stored in a database called
|
the registry
|
|
In business, it is extremely important that the operating system
|
authenticates the user
|
|
The business computer authenticates users by requiring them
|
to login and load the user’s profile.
|
|
Virtual memory is
|
actually the technique of breaking files requested from a secondary memory like a hard drive into smaller, more manageable files that can fit into RAM
|
|
These smaller files that represent pieces of larger files are called
|
pages, or swap files.
|
|
Since a computer is a binary system that only understands machine code, it needs special programs called
|
drivers
|
|
File management systems also provide vital information about
|
folders and files
|
|
Common file management features
|
File name – What is the name of the file?
Modification Date – When was the file last accessed or saved? File Type – What kind of file is it? File Size – How big or small is the file? |
|
Defrag is
|
a utility that that moves positive and negative charges to the innermost tracks of a disk which in turn reduce the amount of time it takes the read/write arm to save or erase data and information.
|
|
Antivirus utilities are system software that
|
identifies known viruses and attempts to block them from entering and infecting a computer system.
|
|
To compensate for any operating system inadequacies, companies like Microsoft offer a system software utility called
|
system update
|
|
new or modified programming called
|
patches
|
|
Green computing is the practice of
|
using computing resources efficiently while reducing the use of hazardous materials, maximizing energy efficiency, promoting the recyclability of defunct products, and reducing factory waste during the computer’s manufacturing process.
|
|
Since virtually all businesses use computers, they need to be
|
concerned with overall energy costs and ways to reduce these costs.
|
|
concerned with government imposed levies and statutes on
|
carbon production in the computer manufacturing
& regulations on power consumption and waste. |
|
Environmental Protection Agency (EPA)
|
funded a grant that developed the Electronic Product Environmental Assessment Tool or EPEAT
|
|
Reduction or elimination of environmentally sensitive materials
|
EPEAT encourages manufacturers to reduce the amount of chemicals or eliminate them altogether whether in the manufacturing process or when the computer is discarded.
|
|
Materials selection
|
informs the consumer of the percentage of recycled plastics and offers a declaration of the percentage of renewable/bio‐based plastic material content.
|
|
Design for end of life is
|
means that computer manufacturers, as well as all electronics manufacturers, inform their consumers about the special handling needs while disposing of their product when it is no longer useful.
|
|
Product longevity/life cycle extension
|
encourage manufacturers to make extended warranties available to their consumers so their products last longer, and also to design the product so it can be upgraded with common tools.
|
|
End of life management asks manufacturers to
|
make provisions to take their product back at the end of the product's life cycle.
|
|
Corporate performance means that
|
a manufacturer must demonstrate a sound corporate environmental policy consistent with International Organization for Standardization and have self‐ certified environmental management systems for in place for the design and manufacturing.
|
|
Packaging:
|
requires computer and electronics manufacturers to reduce or eliminate intentionally added toxins in packaging as well as having separable packing materials with a declaration of recycled content.
|
|
Energy conservation
|
asks manufacturers to adopt the government’s Energy Star® specifications.
|
|
Active Use means
|
a computer is on and being used.
|
|
Sleep mode
|
low power mode
|
|
Stand-by mode
|
when a computer turns off automatically when it has not been used for a specific amount of time designated by the user.
|
|
Green Computing Business Plans are based on the idea that
|
businesses can become environmentally friendly, more profitable, and socially responsible through well‐though out implementations of sustainable policies and procedures .
|
|
Green Computing Business plan
|
Responsible Recycling
Follow EPEAT and Energy Star® Guidelines Decrease or Eliminate Paper Consumption: Economic Considerations |
|
Telecommuting is
|
essentially a work arrangement where employees benefit from flexibility in working location and hours.
|
|
A computer network is?
|
two or more computers connected together to communicate and share resources
|
|
Network of 3 computers?
|
clients
|
|
Central computer is called?
|
server
|
|
Every device connected to a network is called a
|
node
|
|
Network Interface Controller?
|
allows network cable to be plugged in so it can communicate with other computers
|
|
MAC address?
|
48-bit address
|
|
A standard form of communication is called?
|
protocol
|
|
Network cables are?
|
specialized wires with adapter to plug into the NIC
|
|
Hub?
|
ensures that computer traffic does not run into each other
|
|
User Datagram Protocol
|
used mostly for video computer files
|
|
Network operating system (NOS)
|
software that controls an entire network
|
|
Network administrator
|
smooth network operations and performance
|
|
Refers to the mapping of a physical network and logical interconnections between nodes
|
topology
|
|
Bus topology?
|
all of nodes are connected to common linear bacons with 2 endpoins
|
|
Star topology?
|
star shaped, all nodes connected to common central node
|
|
Local Area Network (LAN)
|
network thats small and in a single building
|
|
Campus Ares Network (CAN)
|
2 or more LAN's located on a campus
|
|
Metropolitan Area Network (MAN)
|
connects 2 or more LANs or CANs but within boundaries of a town or city
|
|
Wide Area Network (WAN)
|
network over a wide geographical area that connects LANs CANs and MANs. Rely on telephone companies to connect.
|
|
Peer to Peer Network (P2P)
|
connects computers directly to one another without a sever
|
|
Internet
|
largest network, all networks combined.
|
|
Password?
|
secrecy word or combination of keyboard characters
|
|
Strong password?
|
mixed results
|
|
Web browsing
|
outlining a user's web access to avoid inappropriate sites
|
|
Permissions?
|
restricting or gaining access to specific files and folders
|
|
Firewall
|
ensures only authorized personnel can use Intranet
|