Question | Answer |
Adapter card | A card that adds additional functions to a computer by plugging into the motherboard |
Random Access Memory (RAM) | The temporary storage on a computer. |
Citation | A quote from a larger network |
Activation key | A combination of letters and numbers a user must enter before using software. These access codes serve as an intellectual property protection for the software developer, granting a license to the user and preventing multiple downloads. |
Application software | These computer programs are designed to help users complete tasks on their computers or smartphones. |
Byte | The basic measurement unit of computer storage and memory, equivalent to one character of text |
Download | The transfer of a file from the Internet to your computer |
Graphical User Interface (GUI) | A way to manipulate a computer system by interacting with graphics (icons, buttons, menus, and so on) instead of by typing in commands. |
Hard disk drive | The permanent storage on a computer |
Hardware | The physical parts of a computer. This includes internal and external parts, such as the hard drive, memory, keyboard, and mouse |
Input device | A device that provides information for the computer to process |
Memory card | A date storage device used in digital cameras and smartphones |
Motherboard | The large circuit board of a computer where peripherals attach |
Network | A group of connected computers |
Operating system | The system software provided to a computer user by the computer manufacturer. Popular operating systems include Microsoft Windows and the Apple Macintosh’s OS. |
Presentation application | A computer program that allows users to create a show to display for an audience with the ability to include media. One example is Microsoft PowerPoint |
Processor | The computing center of a computer where all information is processed. |
Server | The host computer that delivers web pages and other applications to your browser |
Software | A program that is not a physical device that directs the computer to perform certain tasks. |
Software upgrade | A change in an application or new feature added to a software program that a developer releases, usually on the Internet, for users to add |
Spreadsheet application | A computer program that allows a user to create worksheets with data in rows and columns to sort and manipulate as needed. One example is Microsoft Excel. |
Storage device | A device that keeps a computer’s information, even when the machine is off, until the user decides to delete the information; examples include hard disk drives, CDs, DVDs, and online storage |
Utility program | Computer software that maintains the system for maximum performance. Examples of utility programs are computer’s antivirus program or regular data backup |
Word processing | A computer program that allows a user to create documents with text. One example is Microsoft Word |
Browsing | The process of performing a search of online categories in order to find a website or web page |
Credibility | Whether or not a source provides reliable, accurate information, checked and verified experts |
Domain name | The words or numbers, known as IP addresses, that identify a website. |
e-commerce | The buying and selling of goods online |
Home page | The first page in a group of pages on a website that describes the site’s purpose and provides the navigational structure for moving through the website |
Internet Service Provider (ISP) | A company that sells Internet connectivity to individuals |
Keyword | A term or group of terms used to find information on the web |
Malware | Computer software that works as an independent program that infects a computer’s files and programs after being downloaded from what looks like a trusted source |
Netiquette | Informal rules of behavior for communicating on the web |
New media | Content not traditionally delivered in digital form that is now found online, such as music, movies, newspapers, or books |
Phishing | The practice of using spam e-mail to elicit a response and obtain a computer user’s private information. |
Rootkit | A computer virus that attacks a computer’s internal storage system. |
Search engine | An automated database that delivers a list of links as a response to a specific keyword request from the user |
Social engineering | The usually criminal practice of manipulating a person into providing sensitive information. |
Social networks | An online community |
Trojan horse | A computer virus disguised as a normal program that infects a computer after being downloaded from an e-mail, pop-up advertisement, or downloaded software |
World Wide Web | A collection of Internet sites that provide text, graphics, sound, video, and other digital content. |
Central processing unit | The main system of a computer that controls and carries out its functions |
Context-sensitive menus | These shortcut menu choices appear as a user right-clicks on the comp. screen |
Dialog box | A window that appears during the use of a computer application. The window contains a question or requests confirmation of an action the user must reply to before continuing |
Format painter | A command on the Home tab that provides access to document formatting styles |
Function key | One of the 12 keys located at the top of the computer keyboard, labeled, F1through F12. They are used to perform shortcut functions |
Key tips | A windows Ribbon feature allowing a user to use the keyboard keys instead of a mouse to switch tabs or activate commands from the Quick Access Toolbar |
Menu | A graphical collection of options that appears on your desktop so you can perform a function on your computer |
Microsoft Access | The database creation and management program in the Microsoft Office Suite. |
Microsoft Excel | The spreadsheet program in the Microsoft Office Suite. |
Microsoft Office 2010 | A suite of computer programs created and distributed by Microsoft that includes word processing, spreadsheet, presentation, and database software |
Microsoft | The multiuser collaboration program in the Microsoft Office suite. |
Microsoft Outlook | Is a personal information manager and e-mail client that is offered as a part of the Microsoft software package, Microsoft Exchange Server, and as a standalone product. |
Microsoft PowerPoint | Presentation software in the Microsoft Office suite of products. The software provides the user the ability to create professional-looking presentations with graphics, sound, animations, and movie clips |
Microsoft Publisher | The desktop publishing program in the Microsoft Office suite |
Microsoft Word | The word publishing program in the Microsoft Office suite |
Network drive | A location on a servers where networked users can access shared files by mapping to the specific location where they reside |
Quick Access Toolbar | A group of frequently used commands on the Windows Ribbon interface. You can customize the set of commands it displays |
Recycle Bin | A location on the desktop, represented by a wastebasket icon, where files appear after you delete them. In this location, you can retrieve deleted files or permanently delete them |
Scroll bar | Sliding control tools on the bottom and side of the computer window that allow you to navigate within your document. |
Shortcut | This is a row of information about the current application that appears at the bottom of the document window. |
Task bar | Appears at the bottom of the computer desktop screen and displays all running programs, frequently used programs, diagnostics and the date and time. |