• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back

Knowing how to maintain and use a computer ethically and responsibly makes you

computer fluent

Data that is processed so it can be presented in an organized and meaningful way is

information

Desktops, laptops, tablet computers, and mobile devices are all considered

microcomputers



A user can record lectures or discussions or control a computer's functions by using voice commands with ____________ technology.

speech-recognition

The computer and any connected equipment are called

hardware

The computer's main memory that temporarily stores data is ____________.

random access memory

The interface between peripherals and the motherboard is called a

port

Keys that provide shortcuts or increased functionality to the keyboard when used in combination with another key are called ____________ keys.

control



The brain of the computer is the ____________; it is responsible for executing program instructions and converting data to information.

central processing unit

The instructions needed to start up and run a computer are provided by ____________.

system software

____________ are small programs that handle tasks involved with the management and maintenance of your system.

utility programs

The action of looking for hidden patterns in the data of a database to anticipate future patterns is called ____________.

data mining

Internet Explorer, Safari, Firefox, Mozilla, and Google Chrome are examples of __________

web browsers

The ____________ utility allows you to create a task, determines the frequency of the task, and selects the best time for the task to run and then automates the whole process.

task scheduler



Any type of malicious software is called ____________.

malware

A ____________ is a small text file that contains information that can identify you to a website.

cookie

Each object connected to a network, whether it is a computer or peripheral device, is known as a ____________.

node

Desktop computer

A computer that is used when portability is not needed; it sits on the floor or table and typically has a detachable keyboard, mouse, and monitor.

Gaming computer

A computer configured with a fast central processing unit, a large amount of memory, a special video card, a joystick or game pad, and a sound card with a surround sound speaker system.

Laptop computer

A computer designed to be portable that is equipped with rechargeable batteries and a built-in display screen, keyboard, and pointing device.

Tablet computer

A portable computer with a swivel touchscreen that enables the unit to be positioned as a clipboard, permitting the user to write directly on the screen with a stylus.

Trojan horse

Software that appears to be desirable, but in fact facilitates unauthorized access to a computer system.

Worm

A malicious program that can replicate itself without any human interaction and spreads from computer to computer.

Botnet

A term for malicious software that turns your computer into a robot and makes it run automated tasks in a network without your knowledge.

Virus

Malicious code or software designed to invade your computer system, attach to your programs or files, and alter or destroy data without your knowledge.

Adware

Spyware that tracks your Internet browsing.

Spam

Bulk unsolicited email messages sent to random lists of computer users.

A(n) __________ is a set of instructions used by a computer to accomplish a task.

program

Windows 8 is an example of a(n) __________.

operating system

A(n) __________ is a small image that represents commands, files, or other windows.

icon

Which of the following is NOT one of the major tasks of an operating system?

Manage Internet resources

The __________ is a blinking vertical line, which shows where typed text will be placed.

insertion point

__________ are combinations of two or more keyboard keys used to perform a task that normally requires a mouse.

Keyboard shortcuts

Which command automatically saves your work, darkens the screen, and stops the computer's fan?

sleep

A(n) __________ account allows people to have temporary access to a computer, but they cannot install software or hardware, change settings, or create a password.

guest

A(n) __________ is the fundamental unit of storage that distinguishes one set of information from another.

file

Which Windows 8 desktop app would you use to create and edit drawings and display and edit stored photos?

Paint

__________ is a full screen window preview feature that helps when multiple windows are open by allowing you to view a window that is hidden by other windows.

Peek

File size and author are examples of __________, which are data that describe other data.

metadata

file

collection of information stored on a computer with a single name

application

another term for a program

Recycle Bin

contains files and folders that have been deleted

taskbar

contains program buttons and buttons for all open programs

Snipping Tool

program that captures an image of all or part of a computer screen

File Explorer

displays contents of computer libraries, folders, and files

Details pane

shows the most common properties associated with the selected file

SkyDrive

Microsoft's cloud file storage and file sharing service

Shortcut menu

context-sensitive list of commands and options relevant to the active object

library

collection of items, such as files and folders, gathered from various locations