• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/35

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

35 Cards in this Set

  • Front
  • Back
business graphics
graphics that allow the user to display data in a visual manner that is easy to understand
analytical graphics
charts and graphs used for financial analysis and other types of numeric comparisons
presentation graphics
professional looking charts and graphs used to make an effective impression on an audience
pie chart
a circular graph used to compare values tht represent parts of a whole
exploded wedge
a wedge tha is separated from the rest of the pie chart to draw attention to the wedge
bar graph
a graph made up of horizontal or vertical bars that compare the performance of several subjects over time (simple and multiple)
plot area
space created by the x-axis and the y-axis where the graph is drawn
line graph
graph made by connecting data points with a line that show the direction of change in the performance of a subject
legend
text that explains the meanings of the colors, shading patterns, or symbols used in a graph
data point
a single point that represents the value of an item or subject being graphed
charting
process of transforming data or figures into a chart or graph
editing
selecting the colors and fonts for the text and graphics in a Presentation Graphics program
enhancing
dressing up the chart with symbols, freehand, drawings, clip art, word art, transitions, animation, and sound
computer crime
a criminal act that is either accomplished through the use of a computer or that involves the computer system itself
sabotage
crime directed against hardware or software
theft of services
crime that consists of using company computer time, servies, or equipment for personal use
property crimes
threat to the computer itself, such as theft of hardware, theft of software and sabotage
round off fraud
collects the fractions of cents in customers accounts, then amounts are stored in an account created by the thief
financial crime
crime in which computer hardware & software are used to manipulate financial data in the company to the benefit of the perpetrator
vaccine
a computer program that can prevent the infection of a computer by a known virus & detect when a virus is trying to copy itself onto a program
virus
a computer program that acts as a time bomb that can destroy the contents of a hard or floppy disk
computer security
technical and administrative safeguards
encrypted
a term describing data that have been translated into a secret code for security reasons
decrypted
a term describing data that have been translated back into regular text after being encrypted for security reasons
bug
a computer error
computer ethics
the standards of moral conduct in computer use
hacking
activity of breaking computer security measures designed to prevent unauthorized access to a particular computer system
software piracy
the unauthorized copying of a copyrighted computer program
privacy
an individual's rights regarding the collection, processing, storage, distribution, & use of data about his/her personal traits & activities
federal legislation
1970 Freedom of Information Act; Family Educational Rights & Privacy Act of 1974; Tax Reform Act of 1976
1970 Freedom of Information Act
limits access to files created by the federal government
Family Educational Rights and Privacy Act of 1974
FERPA 1974 -regulates access to computerized records of grades & behavioral evaluations in public and private schools
Tax Reform Act of 1976
protects the confidentiality of tax information
technical safeguards
surge protectors, sprinkler systems, proper wiring
administrative safeguards
background screening, proper computer training, limited access to computer areas