• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/112

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

112 Cards in this Set

  • Front
  • Back
performs tens of thousands of specific tasks
the end‐user needs, like creating a budget for accounting, creating a
resume, or making a professional presentation.
Application Software
software has been developed by hundreds,
even thousands of people and is constantly evolving to meet the
infinite needs of the end‐user, so the chances of application
software not fulfilling a user’s needs are remote.
Commercial Application
Software manufacturers like Microsoft and Mac produce business application software and sell them in packages called
Software Suite/Productivity Suite
allow a user to make document files. Documents
can be created, updated through editing, saved to secondary
storage, and eventually printed. Word processing applications are
often taken for granted because of their ease of use relative to other
business software applications and the perception of singular use.
Word processors
A word processor document can also be saved as a web page for the
World Wide Web, and often times in a business environment, an
Intranet, which allows an organization to communicate essential
information for operations. Intranet human resources manuals,
policies and procedures, knowledge bases, and many other essential
functions can be created in a word processor and posted directly,
including images and hyperlinks.
Word Processor Documents...
presents an interface in grid of information separated
by columns and rows, often financial information that is capable of
calculation and graphing and most importantly “what if” analysis
graphing, importantly, what‐analysis.
Spreadsheet Software
The intersection of a column and row
Cell
Text or Numeric
A Cell holds two types of entries...
is well thought‐out
collection of files that consist of records (rows) of data separated by
fields (columns) that can be queried (questioned) to produce
subsets of information
Database Software
allows businesses to store their history in
relational databases
Data Warehousing
where businesses store their history in relational databases.
Corporate Memory
are used to display
information typically in a slide show.
Presentation Application Programs
The most important aspect of application software.
Sharing Data and Information
Productivity suites have three ways of sharing information between
applications:
Cut and Paste ‐ static
Object embedding ‐ static
Object linking ‐ dynamic
are application
programs that enable an end‐user to manipulate visual images on a
computer.
Image editing softwares
Computer graphics are classified in two categories:
Raster graphics
Vector graphics
is a graphics editing application
software and the current market leader for commercial
business bitmap, image, and photographic manipulation and
has been described as the industry standard for graphics
professionals.
Adobe Systems Photoshop
is specialized application software that allows a user to create, publish and administer web sites on the World Wide Web through
publish, the use of a WYSIWYG interface. (WYSIWYG is an acronym for
“What You See Is What You Get”).
Web Authoring Application Software
is to post a website on
the World Wide Web (WWW) or a corporate Intranet. In business, it
is important to know which web authoring products are appropriate
for which task.
Ultimate Goal of Web Authoring Programs
Professional web site designers must take into consideration many
factors for a good website.
Intention, Viewers, Content, Design Layout, Search Engine Optimization
One of the most powerful web authoring programs in the business
environment is
Microsoft Office Sharepoint Designer
which allows
corporate webmasters and content managers to Create and
administer web pages like other commercial web authoring
software and intranets.
Microsoft Office Sharepoint Designer
is a GUI element composed of a strip across the top of the window that exposes all functions the program can perform in a single
place.
Ribbon
Multiple windows that represent multiple applications
can be used at the same time
Multi-Tasking
Presented on the user’s monitor in rectangular boxes called:
Windows
Type of document file that can be used
regardless of operating system platforms
Platform Neutral
is used by businesses generally to
combine and manipulate text, graphics, audio, and video into a
format like presentation software.
Multimedia application software
is an electronic method of composing, sending,
storing and receiving messages over electronic communication
storing, systems.
Email
is a personal information manager that facilitates
tracking and managing personal information.
PIM
systems are application software
that attempts to integrate all data and processes of an entire
business into one integrated system. A key feature of most ERP
systems is the use of an integrated database that stores data for the
assorted system modules, like accounting and human resources
functions.
Enterprise Resource Planning (ERP)
Most common ERPs:
SAP AG, the
largest software enterprise in Europe; PeopleSoft
and SAS Systems, which specialize in manufacturing, financial,
human resources, and customer management.
Collaboration is a method of mutual learning between two or more
people who are working together towards a common goal.
Collaboration
is basically a conversation
with two or more participants to trade information and ideas, and
also to build relationships.
Conversational Interaction
is software that manages and controls the physical hardware of a computer so that
application software can work.
System Software (Firmware)
are the programs that help an end‐user do a particular task.
Application Software
Loading the platform into the computer’s memory is called:
Booting
Powering up a computer on for the first time is called:
Cold Boot
a computer that is restarted while it was already
running is called:
Warm Boot
basic input/output system
BIOS
is firmware programming embedded in to a computer
chip, meaning the computer runs the same program every time it’s
turned on.
BIOS
On a typical business computer, once the BIOS locates a hard drive,
it is able to execute instructions and programming that loads the
operating system. The operating system in turn takes control and
configures the computer’s hardware to settings stored in a database
called:
Registry
Virus protection
programs are considered to be:
System Utilities
it is extremely important that the operating system
_____________ a user to determine if they are the computer’s
appropriate user.
Authenticates
The business computer authenticates users by
requiring them to:
Login and load user profile
Whether a computer is multitasking or just running singular
application software, system software needs to carefully _______________________ the computer’s available memory.
Allocate and Manage
, the system software
needs to switch, or________information in and out of RAM as needed
based on the RAM’s capacity
Swap
is actually the technique of breaking files
requested from a secondary memory like a hard drive into smaller,
more manageable files that can fit into RAM.
Virtual Memory
These smaller files
that represent pieces of larger files are called:
Pages or Swap Files
Since a computer is a binary system that only understands machine
code, it needs special programs called_________ to make input and
output devices operate properly.
Drivers
is what the user sees on the monitor and provides
means in which a person can interact with the computer system,
whether they are inputting to manipulate the system, or receiving
output from their manipulation.
User Interface
All system software needs to:
input and output data and information
The most common aspect of all major operating system user
interfaces is that they present data and information in a graphical
manner, and are therefore referred to as:
Graphical User Interface (GUI)
provide vital information about
folders and files as well, and offer tools to navigate and organize
the computer’s “filing cabinet”;allow the user to search for computer files based on almost any
criteria.
File Managers
Name the four File Management Features commonly used:
File name, Modification Date, File Type, File Size
is a utility that that moves positive and negative charges to
the innermost tracks of a disk which in turn reduce the amount of
time it takes the read/write arm to save or erase data and
information. Fragmented files become defragmented and more
efficiently stored resulting in better and faster disk performance.
Defrag
is a program that copies data
from a computer’s hard drive to a backup device.
Backup Utility
are system software that identifies known viruses and attempts to block them from entering and infecting a
computer system.
Antivirus Utilities
To compensate for any operating system inadequacies, companies
like Microsoft offer a system software utility called:
System Update
New or modified programming
Patches
is the practice of using computing resources
efficiently while reducing the use of hazardous materials,
maximizing energy efficiency, promoting the recyclability of defunct
products, and reducing factory waste during the computer’s
manufacturing process.
Green Computing
Computers use power, lots of it. Since virtually all businesses use
computers, they need to be concerned with:
Overall energy costs and ways to reduce that cost.
evaluates electronic products, many of which are business
computers relative to 51 environmental criteria, 23 of the criteria
are required and 28 of the criteria are optional.
Electronic Product Environmental Assessment Tool (EPEAT)
encourages manufacturers to reduce the amount of
chemicals or eliminate them altogether whether in the
manufacturing process or when the computer is discarded.
Reduction or elimination of environmentally sensitive materials
informs the consumer of the percentage of
recycled plastics and offers a declaration of the percentage of
renewable/bio‐based plastic material content.
Materials selection
means that computer
manufacturers, as well as all electronics manufacturers, inform their
consumers about the special handling needs while disposing of their
product when it is no longer useful.
Design for end of life
encourages manufacturers to
make extended warranties available to their consumers so their
products last longer, and also to design the product so it can be
upgraded with common tools.
Product longevity/life cycle extension
asks manufacturers to make provisions to
take their product back at the end of the product's life cycle.
End of life management
means that a manufacturer must
demonstrate a sound corporate environmental policy consistent
with International Organization for Standardization and have selfcertified
environmental management systems for in place for the
design and manufacturing.
Corporate performance
requires computer and electronics
manufacturers to reduce or eliminate intentionally added toxins in
packaging as well as having separable packing materials with a
declaration of recycled content.
Packaging Criteria
asks manufacturers to adopt the government’s
Energy Star® specifications.
Energy conservation
Personal computer (PC) makers are working diligently to develop
more environmentally friendly systems called
Green PC
means a computer is on and being used
Active Use
a special low power mode where power to certain low‐areas of the computer is shut off after a designated period of time.
Sleep Mode
is when a computer turns off automatically when it
has not been used for a specific amount of time designated by the
user.
Standby Mode
are based on the idea that
businesses can become environmentally friendly, more profitable,
and socially responsible through well‐though out implementations
of sustainable policies and procedures .
Green Computing Business Plans
Reusing paper is a good start, but in
information technology, recycling involves discarding old computers
in very conscientious ways because they are filled with harmful
chemicals and toxins.
Responsible Recycling
Include the bronze,
silver, and gold EPEAT logos, as well as Energy Star® seals, for
computer purchasing criteria to evaluate, compare, and select computers.
Follow EPEAT and Energy Star® Guidelines
The easiest way to
decrease or eliminate paper consumption is simply to not print
documents, ever.
Decrease or Eliminate Paper Consumption:
It is gratifying to implement a Green
Computing Business Plan as well as fostering a socially responsible
corporate environment; however, do not ignore economic
implications for the sake of being “Green”.
Economic Considerations:
is essentially a work arrangement where employees
benefit from flexibility in working location and hours.
Telecommuting
which is the measure of
the impact human activities have on the environment relative to the
amount of greenhouse gases produced, measured in units of carbon
dioxide".
Carbon Footprint
is two or more computers connected together
to communicate and share resources. The shared resources refer to
computer files, folders, software, and also peripheral hardware like
printers, scanners, webcams, etc.
Computer Network
is a computer network made up of three computers
Clients
Computers which are connected to a central computer called the:
Server
Name two peripheral devices:
a printer and a scanner
Every device connected to a
network is called a:
Node
Four Basic Components of a Network:
Network Interface
Controller (NIC); protocol, physical cables that connect them together, Hub
allows a
network cable to be plugged in so it can interface, or communicate
with other computers.
Network Interface
Controller Card (NIC)
The most common network protocol is called:
Transmission Control
Protocol / Internet Protocol (TCP/IP).
Another common network protocol:
User Datagram
Protocol (UDP).
is a central location of the computer network that
serves as a traffic cop for network connection and communication.
Network Hub
is software that controls an
entire network; responsible for network traffic control,
administering packets, file management, administering certain
functions like backup, and security.
Network operating system (NOS)
is responsible for smooth network
operations, network performance and implementation of new
nodes or even new networks. Once a user is registered with the
network, they must provide a password to log on to the network
which in turn authenticates their identity and controls access to
certain areas of the network
Network Administrator
refers to the mapping of a physical network and logical
interconnections between nodes.
Topology
is a network topology
where all of the nodes of the network are connected to a common
linear backbone with two endpoints. Data is transmitted between
the two endpoints and the nodes are connected to this backbone.
Bus Topology
name from its star shape
with all of the nodes connected to a common central node in a hub
and spoke‐like fashion. The center of the star is the hub which
attach to the nodes with spokes. Many times the hub is a server
with the networked computers and nodes as clients, thus, a client / server model.
Star Topology
topology is shaped like a ring where each
computer (node) is connected to two other computers in the
network and with the first and last computers being connected to
each other. Data is transmitted between computers from one to
another in a circular manner.
Ring Topology
is a computer network that is relatively
small, typically in a single building, but sometimes as small as a
single room.
Wide Area Networks (WAN)
is a computer network that connects
two or more LANs located on a campus, like a university, or an
organization’s national headquarters, or even an industrial complex.
Campus Area Network (CAN)
is a computer network that
connects two or more LANs or CANs together, but within the
boundaries of a town or city.
Metropolitan Area Network (MAN)
is a computer network over a wide
geographical area that connects LANs, CANs, and MANs together.
Many times, WANs rely on a telephone company’s transmission
facilities to connect the smaller networks together. Many large
organizations rely on MANs to centralize data and information from
its satellite office spread all over a country, and sometimes the
world.
Wide Area Networks (WAN)
is a computer network that generally
connects computers directly to one another without the use of a
server.
Peer to Peer Networks (P2P)
starts with a solid understanding of network
threats, and the primary threat is an unwanted user. Network
administrators need to adopt policies and procedures that define
rules for network access, that determines who is allowed to use the
network and to what extent.
Network Security
is a secret word, or combination of
keyboard characters typed in by a user to authenticate their identity
to a computer network.
Password
Network security policies should outline user’s
web access as well as web browsing habits of a user if web access is
indeed granted. Some organizations choose to restrict web
browsing altogether to avoid potential problems.
Web Browsing
policies and procedures are
similar to web browsing policies in that users need to be trained
and educated on proper usage.
Email / Instant Messaging
Most computer networks refer to network access as
permissions, essentially restricting or granting access to specific files
and folders on a computer network to a user or group of users.
Permissions
is specialized hardware and software that
insures that only authorized personnel within an organization can
use an organization’s Intranet. An intranet is a like a private version
of the Internet that works the same way as the Internet, but is
confined within an organization.
Firewall
Ask the database question, this is also known asking a
Query
Databases can have an absolute profound affect on your business; Databases can also profoundly change your:
Best Practice
Basic files inside a database are called:
Tables
Tables are connected in some way making it a:
Relational Database