Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
72 Cards in this Set
- Front
- Back
A network that lets you transfer messages between your computer and a friends: |
Internet |
|
A computer that allows searches on the internet is: |
Online |
|
The internet can be defined as a: |
Worldwide collection of computer networks |
|
To set up an internet connection two things you need are: |
A modem and a Personal computer |
|
To send an e-mail message, your computer must be connected to the internet with a: |
Modem |
|
To get an internet connection for a home, store, business, etc.; go to an: |
Internet service provider (ISP) |
|
One device used by an ISP to connect a computer to the internet is a: |
Cable |
|
To connect a computer to the internet without cables, you need a: |
WiFi card |
|
An internet connection that is fast and reliable is a: |
Dedicated connection |
|
If you hear modem tones when using a computer connected to the internet, that conection is a: |
Dial-up connection |
|
A device that establishes an internet connection-sending a request to the ISP is a: |
Modem |
|
A _blank_-_ or ___blank__ __blank___ allows you to store files to take with you. |
CD-R; Flash Drive |
|
To connect a printer to a stand-alone computeryou need a: |
Parallel port or a USB port |
|
To create a text document use a: |
Word processer |
|
To view a live image while you chat use a: |
Webcam |
|
To login to a computer you typically use a: |
Usernam and Password |
|
To listen to audio without disturbing others use: |
Headphones |
|
The ___blank____ _____blank_____ __blank__ is the part of the computer that performs calculations. |
Central Processing Unit (CPU) |
|
The correct way to explain an operating system is a: |
Program that controls and manages the computer |
|
When using a word processor to create a document, the text represents your: |
Data |
|
Hardware can be defined as the: |
Physical parts of the computer system |
|
Instant messaging is considered: |
Software |
|
The process of using an operating system uses to confirm login information called:
|
Authentication
|
|
If your computer runs slowly when you have several programs open, the reason is usually: |
Random Access Memory (RAM) |
|
To make changes to a large document when traveling you should use a: |
Laptop |
|
To create business cards, brochures, or flyers use a: |
Desktop Publishing Program |
|
To have a real-time conversation with someone in another country you could use: |
Instant Messaging |
|
To move the desktop to the start screen in windows 8 press the _______ button. |
Windows |
|
An ________ _______ is a program that allows access to websites. |
Internet Browser |
|
To send an e-mail message you use an: |
E-mail Account |
|
A unique alphanumeric address for a website is a: |
Uniform Resource Location |
|
An online journal is called a: |
Blog |
|
The collection of icons displayed in the top-left corner of word is called the: |
Quick Access Toolbar |
|
To print a document use the: |
File Tab |
|
A word processor is used to create: |
Documents; Format Text; and Print Pages |
|
To find a word to use in the place of another word use a: |
Thesaurus |
|
To center in a word processor use the: |
Allignment Feature |
|
Preasentation programs are used to create: |
Audiovisuals and notes pages |
|
An e-mail that asks you for personal details when you don't know the sender is an example of: |
Spoofing |
|
An e-mail message with a hyperlink that tricks someone into entering a credit card number is and example of: |
Phishing |
|
To protect data in a natural disaster you should: |
Back it up and store it in a different location |
|
To install updates from microsoft in a timly manner you should set up: |
Automatic Updates |
|
The most ethical way to use images you find when browsing is to: |
Ask the owner permission if necessary |
|
You are commiting __________ if you copy information from the internet and use it as your own work. |
Plagiarism |
|
If someone post false staement about someone else, they are proforming: |
Defamation |
|
When holding a video conference participants,: |
Talk to each other and see each other. |
|
A smartphone will allow you to: |
Listen to music and play Games |
|
Speech synthesis software performs the following tasks: |
Converts text to audio and provides voice commands |
|
One strategy online perdators use to fool people online is: |
Using False Identity |
|
An _________ program ca help you detect and prevent malicious activity on your computer. |
AntiVirus |
|
You use the ____ ___ to enter geometric shapes in powerpoint. |
Home Tab |
|
In a spreadsheet, a ____ is the intersection of a row and a column. |
Cell |
|
The ___ is what you would use so two people dont see each otheres e-mail adresses. |
BBC |
|
To ensure an e-mail you send with credit card detail remaain private you sould: |
Encrypt the message |
|
To restrict access to data by others on your computer you should: |
Create accounts and define users |
|
A _____ is to show comparison in a presentation. |
Chart |
|
_______ is used to find a total amount in Excel. |
Autosum |
|
The _________ _____ is the blinking bar in a document that stays in place until you click the mouse to a new location. |
Insertion Point |
|
When a new type of trojan horse infects a computer, ______ ____ _________ _______ to prevent it from happening again. |
Update your Antivirus Program |
|
____ ______________ ensures only certain users have access to a network. |
User Identification |
|
___________ add diplay effects to your slides. |
Transitions |
|
A ___ _____ shows you portions of a whole. |
Pie chart |
|
Use the _____ ___ __ ____ ____ to key text in uppercase. |
Shift key or Caps Lock |
|
________ _______ allow you to block third party cookies. |
Internet Options |
|
______ _______ ______ are used to secure online transactions. |
Secure Socket Layers |
|
Types of objects you can create in Access include: |
Forms, Tables, Reports, and Queries |
|
The _________ is used to copy data between multiple documents using a word processor. |
Clipboard |
|
A windows firewall is used to: |
Reastrict unauthorized access |
|
The term for e-mail messages from unkown senders is known as: |
Spam |
|
In a database use a _______ ___ to ensure that new records have unique numbers. |
Primary Key |
|
To organize and store data in Access create a: |
Table |
|
The tool you would use in Excel to view data in a chart is the: |
Chart Wizard |