Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
107 Cards in this Set
- Front
- Back
In a worksheet formula, cell references (usually preceded by a $ symbol) that cannot change as a result of a move or copy operation
|
absolute reference
|
|
a feature found in spreadsheet software that automatically recalculates every formula after a user makes a change to any cell
|
automatic recalculation
|
|
a combination of more than one type of malicious program
|
blended threat
|
|
an intelligent agent that autonomously executes commands behind the scenes. Sometimes used to refer to a remote access Trojan horse that infects computers.
|
bot
|
|
a group of bots under the remote control of a botmaster, used to distribute spam and denial-of-service attacks.
|
botnet
|
|
an open source software license patterned on a license originally used by the university of california
|
BSD license (berkeley software distribution)
|
|
in spreadsheet terminology, the intersection of a column and a row. in cellular communications, a limited geographical area surrounding a cellular phone tower.
|
cell
|
|
the column letter and row number that designate the location of a worksheet cell. for example, C3.
|
cell reference
|
|
graphics designed to be inserted into documents, Web pages, and worksheets, usually available in CD-ROMs or Web-based collections
|
clip art
|
|
copyrighted computer applications sold to customers for profit
|
commercial software
|
|
a program designed to attach itself to a file, reproduce, and spread from one file to another, destroying data, displaying an irritating message, or otherwise disrupting computer operations
|
computer virus
|
|
a software program designed to enter a computer system, usually a network, through security "holes" and then replicate itself
|
computer worm
|
|
legal permission for an organization to use a certain number of copies of a software program at the same time
|
concurrent-use license
|
|
a form of legal protection that grants certain exclusive rights to the author of a program
|
copyright
|
|
a collection of information that might be stored in more than one file or in more than one record type
|
database
|
|
commercial software that is distributed free, but expires after a certain time limit and then requires users to pay to continuing using it
|
demoware
|
|
an interactive program that is represented on the desktop by an information-rich graphic, such as a clock or graph
|
desktop widget (gadget)
|
|
a type of system software that provides the computer with the means to control a peripheral device
|
device driver
|
|
one or more CDs, or DVDs that contain programs and data, which can be installed on a hard disk
|
distribution media
|
|
1) the specifications applied to fonts, spacing, margins, and other elements in a document created with word processing software
2) the file format, such as DOCX, used to store a document created with word processing software |
document format
|
|
a type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline
|
EULA (end user license agreement)
|
|
a file, usually with an .exe extension, containing instructions that tell a computer how to perform a specific task
|
executable file
|
|
the smallest meaningful unit of information contained in a data file
|
field
|
|
a typeface or style of lettering, such as Arial, Times New Roman, and Gothic
|
font
|
|
text that appears in the bottom margin of each page of a document
|
footer
|
|
in spreadsheet terminology, a combination of numbers and symbols that tells the computer how to use the contents of cells in calculations
|
formula
|
|
1) in the context of document production, an outline or boundary that defines a box that holds text or graphics
2) in the context of digital video, one of many image displayed in sequence to give the appearance of motion |
frames
|
|
copyrighted software that is given away by the author or copyright owner
|
freeware
|
|
1) in the context of spreadsheet software, a built-in formula for making a calculation
2) in the context of programming, a section of code that manipulates data, but is not included in the main sequential execution path or program |
function
|
|
a software license often used for freeware insures it will be distributed freely whether in its original form or as a derivative work
|
GPL (general public license)
|
|
any pictures, photograph, or image that can be manipulated or viewed on a computer
|
graphics
|
|
software that enables multiple users to collaborate on a project, usually through a pool of data that can be shared by members of the workgroup
|
groupware
|
|
a number produced by a hash function to create a unique digital "Fingerprint" that can be used to allow or deny access to a software application
|
hash value
|
|
text that is placed in the top margin of each page of a document
|
header
|
|
the process of looking for information by providing a related word or phrase
|
keyword search
|
|
any text used to describe data
|
label
|
|
also called line spacing, the vertical spacing between lines of text
|
leading
|
|
software designed to be installed on and run from a hard disk
|
local application
|
|
a feature of document production software that automates the process of producing customized documents, such as letters and advertising flyers
|
mail merge
|
|
any program or set of program instructions, such as a virus, worm, or Trojan horse, designed to surreptitiously enter a computer and disrupt its normal operations.
|
malicious software (malware)
|
|
a worm that sends itself to every e-mail in the address book of an infected computer
|
mass-mailing worm
|
|
legal permission for more than one person to use a particular software package
|
multiple user license
|
|
a query formulated in human language, as opposed to an artificially constructed language, such as machine language
|
natural language query
|
|
a type of compressed file that has to be unzipped manually to extract the file or files contained within it
|
non-executing zip file
|
|
software that includes its source code, allowing programmers to modify and improve it
|
open source software
|
|
the physical positions of elements on a document page, such as headers, footers, page numbering, and graphics
|
page layout
|
|
the horizontal alignment of the text in a document
|
paragraph alignment
|
|
a specification for the format of a paragraph, which includes the alignment of text within the margins and line spacing
|
paragraph style
|
|
software that is copied, sold or distributed without permission from the copyright holder
|
pirated software
|
|
a unit of measure (1/72 of an inch) used to specify the height of characters in a font
|
point size
|
|
software designed to be stored on a flash drive or CD, and which does not require installation before it is used
|
portable software
|
|
the process of becoming a registered user of a software product; the process might include entering a validation code to unlock the software
|
product activation
|
|
software that helps people work more efficiently. traditionally includes word processing, spreadsheet, presentation, e-mail, and database software
|
productivity software
|
|
software that carries restrictions on its use that are delineated by copyright, patents, or license agreements
|
proprietary software
|
|
software that is available for public use without restriction except that it cannot be copyrighted
|
public domain software
|
|
a file suspected to be infected with a virus that antivirus software moves to a special folder to prevent accidental access to it
|
quarantined file
|
|
a search specification that prompts the computer to look for particular records in a file
|
query
|
|
a type of database interface in which the user fills in a field with an example of the type of information that is being sought
|
query by example
|
|
a set of command words that can be used to direct the computer to create databases, locate information, sort records, and change the data in those records
|
query language
|
|
a feature found in some word processing software that can estimate the reading level of a written document
|
readability formula
|
|
in the context of database management, it is the fields of data that pertain to a single entity in a database
|
record
|
|
in a worksheet, a cell reference that can change if cells change position as a result of a move or copy operation
|
relative reference
|
|
a type of Trojan horse that provides a "backdoor" into a computer for remote hackers to transmit files, snoop, run programs, and launch attacks on other computers.
|
remote access trojan
|
|
software that conceals running processes; used by hackers to disguise security breaches and break-ins
|
rootkit
|
|
a software suite containing modules to protect computers against viruses, worms, intrusions, spyware, and other threats
|
security suite
|
|
a type of compressed file that can be run to unzip the file or files contained within it
|
self-extracting zip file
|
|
a program that automatically unzips and then initiates its set up program
|
self-installing executable file
|
|
a collection of patches designed to correct bugs and/or add features to an existing software program
|
service pack
|
|
a program module supplied with a software package for the purpose of installing the software
|
setup program
|
|
copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it
|
shareware
|
|
a legal agreement printed on computer software packaging, which becomes binding when the package is opened
|
shrink-wrap license
|
|
legal permission for one person to use a particular software package
|
single-user license
|
|
legal permission for software to be used on any and all computers at a specific location
|
site license
|
|
the process by which programs and data are copied to the hard disk of a computer system and otherwise prepared for access and use
|
software installation
|
|
a legal contract that defines the ways in which a user may use a computer program
|
software license
|
|
a collection of individual applications sold as one package
|
software suite
|
|
a section of code or a program module designed to correct errors or enhance security on an already installed software product.
|
software update (patch)
|
|
a new version of a software product, containing new features and designed to replace the entire earlier version of the product
|
software upgrade
|
|
a numerical model or representation of a real situation, presented in the form of a table
|
spreadsheet
|
|
any software that covertly gathers user information without the user's knowledge, usually for advertising purposes
|
spyware
|
|
a feature in many desktop publishing and word processing programs that allows the user to apply numerous format settings with a single command
|
style
|
|
1) the minimum hardware and operating system specifications necessary for a software application to operate correctly
|
system requirements
|
|
an arrangement of data in a grid of rows and columns; a collection of record types with their data
|
table
|
|
a feature in many desktop publishing and word processing programs that allows the user to apply numerous format settings with a single command
|
style
|
|
a computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password
|
trojan horse
|
|
1) the minimum hardware and operating system specifications necessary for a software application to operate correctly
|
system requirements
|
|
a program that removes software files, references and registry entries from a computer's hard disk
|
uninstall routine
|
|
an arrangement of data in a grid of rows and columns; a collection of record types with their data
|
table
|
|
refers to files that have been uncompressed
|
unzipped
|
|
a computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password
|
trojan horse
|
|
a type of system software, provided by the operating system or third party vendors, that specializes in tasks, such as system maintenance, security, or file management
|
utility software
|
|
a program that removes software files, references and registry entries from a computer's hard disk
|
uninstall routine
|
|
a number used in a calculation
|
value
|
|
refers to files that have been uncompressed
|
unzipped
|
|
a group of virus signatures used by antivirus software to identify and block viruses and other malware
|
virus definitions (virus databases)
|
|
a type of system software, provided by the operating system or third party vendors, that specializes in tasks, such as system maintenance, security, or file management
|
utility software
|
|
a message, usually e-mail, that makes claim about a virus problem that doesn't actually exist
|
virus hoax
|
|
a number used in a calculation
|
value
|
|
a group of virus signatures used by antivirus software to identify and block viruses and other malware
|
virus definitions (virus databases)
|
|
a message, usually e-mail, that makes claim about a virus problem that doesn't actually exist
|
virus hoax
|
|
the unique computer code contained in a virus that security software uses to identify it
|
virus signature
|
|
application software that is accessed and used from within a browser
|
web application
|
|
the process of setting up a model in a spreadsheet and experimenting to see what happens when different values are entered
|
what if analyses
|
|
a crucial set of data files maintained by the operating system that contains the settings needed by a computer to correctly use any hardware and software that has been installed
|
windows registry
|
|
a computerized, or electronic, spreadsheet
|
worksheet
|
|
refers to one or more files that have been compressed
|
zipped
|
|
a computer that has been compromised by malware that allows it to be controlled by a remote user
|
zombie
|