Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

computer literature

word voc.study

QuestionAnswer
Three most popular types of docoument production word processing,desktop publishing,and web authoring
Format elements of a document arranged on the page
Mathematical modeling tools for solving math, science,and engineering problems
data base data stored on one or more computers
Field holds one item of data
Query Language locating and manipulating data
Computer-aided design (CAD) 3-D graphics software
Presentation combining text, photo, clip art, graphs, animations, and sound
Disk defragmenter optimal efficiency
Boxed Software authenticity
Software Suite sold as a single package
Pulblic Domain software not protected by copyright
Commerial software typically sold in computer stores or Web sites
Freeware copyrighted available at no cost
Setup guides you through the installation process
windows registry keeps track of your computer's peripheral
Zipped all files needed for new software
Unzipped the original collection
software patch small section of program code
Validation Code To combat piracy user must enter an
Computer Virus corrupt files
worm designed to spread from computer to computer
Virus attaches itself to a file
Payload a virus might deliver
Trojan Horse to perfrom one function while actually doing something else
Trojan Horse e-mail attachment
Time bombs viruses that deliver on a specific date
Keylogger stealing passwords
back door allows unauthorized access to victims computers
Remote Access Trojan (RAT) remote hackers
A bot can automate a task or autonomously execute a task
Bots used to scan the Web
operating system master controller
network communications and routing
desktop designed for a personal computer
interface combination of hardware and software
graphical user menus and icons
command line memorize and type commands
boot strap stored in ROM
kernel memory management
Linx allows everyone to make copies for their own use
site license use at a specific location
multiple-user license allows allocated number of people to use the software at any time
Malware disrupt normal processing operation
.doc word processing documents
A disk crash reload the operating system on your hard drive
C drive main hard disk drive
A drive original IBM PCs
Subdirectory a root directory can be subdivided
drive letter c which appears first in a file specification
file name appears after the thrid / and before the file extension in a file specification
file extension appears at the end of file specification
text data file extension .txt
save as a file that does not yet have a name
finder file management utility
files the leaves at the end
two window pane windows explorer window is divided
ctrl select files that are not listed consecutively.
shift select files that are listed consecutively
Windows Explorer view a list of files, move them, copy them,rename them,and delet them
erases formatting utility on a disk
cluster a group of sectors
file to keep track of the names and locations of files
index files clusters are empty
contiguous (meaning adjacent) files does not fit into a single cluster
USB connects to your computer's
35GB average capacity of a removable hard disk
restore before setting up a network or installing new hardware
Registy full-system backups miss
registry store configuration
full backup makes a fresh copy or every file
incremental backup makes a backup of the files
the registry boot up
defragmentation regain peak performance
Created by: lvlysfit
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards