Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
35 Cards in this Set
- Front
- Back
business graphics
|
graphics that allow the user to display data in a visual manner that is easy to understand
|
|
analytical graphics
|
charts and graphs used for financial analysis and other types of numeric comparisons
|
|
presentation graphics
|
professional looking charts and graphs used to make an effective impression on an audience
|
|
pie chart
|
a circular graph used to compare values tht represent parts of a whole
|
|
exploded wedge
|
a wedge tha is separated from the rest of the pie chart to draw attention to the wedge
|
|
bar graph
|
a graph made up of horizontal or vertical bars that compare the performance of several subjects over time (simple and multiple)
|
|
plot area
|
space created by the x-axis and the y-axis where the graph is drawn
|
|
line graph
|
graph made by connecting data points with a line that show the direction of change in the performance of a subject
|
|
legend
|
text that explains the meanings of the colors, shading patterns, or symbols used in a graph
|
|
data point
|
a single point that represents the value of an item or subject being graphed
|
|
charting
|
process of transforming data or figures into a chart or graph
|
|
editing
|
selecting the colors and fonts for the text and graphics in a Presentation Graphics program
|
|
enhancing
|
dressing up the chart with symbols, freehand, drawings, clip art, word art, transitions, animation, and sound
|
|
computer crime
|
a criminal act that is either accomplished through the use of a computer or that involves the computer system itself
|
|
sabotage
|
crime directed against hardware or software
|
|
theft of services
|
crime that consists of using company computer time, servies, or equipment for personal use
|
|
property crimes
|
threat to the computer itself, such as theft of hardware, theft of software and sabotage
|
|
round off fraud
|
collects the fractions of cents in customers accounts, then amounts are stored in an account created by the thief
|
|
financial crime
|
crime in which computer hardware & software are used to manipulate financial data in the company to the benefit of the perpetrator
|
|
vaccine
|
a computer program that can prevent the infection of a computer by a known virus & detect when a virus is trying to copy itself onto a program
|
|
virus
|
a computer program that acts as a time bomb that can destroy the contents of a hard or floppy disk
|
|
computer security
|
technical and administrative safeguards
|
|
encrypted
|
a term describing data that have been translated into a secret code for security reasons
|
|
decrypted
|
a term describing data that have been translated back into regular text after being encrypted for security reasons
|
|
bug
|
a computer error
|
|
computer ethics
|
the standards of moral conduct in computer use
|
|
hacking
|
activity of breaking computer security measures designed to prevent unauthorized access to a particular computer system
|
|
software piracy
|
the unauthorized copying of a copyrighted computer program
|
|
privacy
|
an individual's rights regarding the collection, processing, storage, distribution, & use of data about his/her personal traits & activities
|
|
federal legislation
|
1970 Freedom of Information Act; Family Educational Rights & Privacy Act of 1974; Tax Reform Act of 1976
|
|
1970 Freedom of Information Act
|
limits access to files created by the federal government
|
|
Family Educational Rights and Privacy Act of 1974
|
FERPA 1974 -regulates access to computerized records of grades & behavioral evaluations in public and private schools
|
|
Tax Reform Act of 1976
|
protects the confidentiality of tax information
|
|
technical safeguards
|
surge protectors, sprinkler systems, proper wiring
|
|
administrative safeguards
|
background screening, proper computer training, limited access to computer areas
|