click below
click below
Normal Size Small Size show me how
computer literature
word voc.study
| Question | Answer |
|---|---|
| Three most popular types of docoument production | word processing,desktop publishing,and web authoring |
| Format | elements of a document arranged on the page |
| Mathematical modeling | tools for solving math, science,and engineering problems |
| data base | data stored on one or more computers |
| Field | holds one item of data |
| Query Language | locating and manipulating data |
| Computer-aided design (CAD) | 3-D graphics software |
| Presentation | combining text, photo, clip art, graphs, animations, and sound |
| Disk defragmenter | optimal efficiency |
| Boxed Software | authenticity |
| Software Suite | sold as a single package |
| Pulblic Domain software | not protected by copyright |
| Commerial software | typically sold in computer stores or Web sites |
| Freeware | copyrighted available at no cost |
| Setup | guides you through the installation process |
| windows registry | keeps track of your computer's peripheral |
| Zipped | all files needed for new software |
| Unzipped | the original collection |
| software patch | small section of program code |
| Validation Code | To combat piracy user must enter an |
| Computer Virus | corrupt files |
| worm | designed to spread from computer to computer |
| Virus | attaches itself to a file |
| Payload | a virus might deliver |
| Trojan Horse | to perfrom one function while actually doing something else |
| Trojan Horse | e-mail attachment |
| Time bombs | viruses that deliver on a specific date |
| Keylogger | stealing passwords |
| back door | allows unauthorized access to victims computers |
| Remote Access Trojan (RAT) | remote hackers |
| A bot | can automate a task or autonomously execute a task |
| Bots | used to scan the Web |
| operating system | master controller |
| network | communications and routing |
| desktop | designed for a personal computer |
| interface | combination of hardware and software |
| graphical user | menus and icons |
| command line | memorize and type commands |
| boot strap | stored in ROM |
| kernel | memory management |
| Linx | allows everyone to make copies for their own use |
| site license | use at a specific location |
| multiple-user license | allows allocated number of people to use the software at any time |
| Malware | disrupt normal processing operation |
| .doc | word processing documents |
| A disk crash | reload the operating system on your hard drive |
| C drive | main hard disk drive |
| A drive | original IBM PCs |
| Subdirectory | a root directory can be subdivided |
| drive letter | c which appears first in a file specification |
| file name | appears after the thrid / and before the file extension in a file specification |
| file extension | appears at the end of file specification |
| text data file extension | .txt |
| save as | a file that does not yet have a name |
| finder | file management utility |
| files | the leaves at the end |
| two window pane | windows explorer window is divided |
| ctrl | select files that are not listed consecutively. |
| shift | select files that are listed consecutively |
| Windows Explorer | view a list of files, move them, copy them,rename them,and delet them |
| erases | formatting utility on a disk |
| cluster | a group of sectors |
| file | to keep track of the names and locations of files |
| index files | clusters are empty |
| contiguous (meaning adjacent) | files does not fit into a single cluster |
| USB | connects to your computer's |
| 35GB | average capacity of a removable hard disk |
| restore | before setting up a network or installing new hardware |
| Registy | full-system backups miss |
| registry | store configuration |
| full backup | makes a fresh copy or every file |
| incremental backup | makes a backup of the files |
| the registry | boot up |
| defragmentation | regain peak performance |