Create an account
while entering your ______, most computers hide the characters by displaying some other characters such as *** or dots
a ______ is a type of system software that allows a user to perform maintenance type tasks, usually related to managing a computer, its devices, or its programs
in a _____ a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions
command line interface (CLI)
screen savers originally were developed to prevent a problem called _____, in which images could be permanently etched on a monitors screen
_____ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer
the _____ interface in windows 7 offers and enhanced visual look, animation, and additional navigation options
with a ____ users interact with menus and visual images such as icons, buttons and other objects to issue commands
graphical user interface (GUI)
a ____ is a mini program with minimal functionality that connects to another program or provides information
widget or gadget
networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ______
with an operating system, ____ can include fixes to bugs, enhancements to security, modifications to devices drivers, and the like.
if a new device such as a printer or scanner, is attached to a computer, its _____ must be installed before the device can be used
the person overseeing network operations, called the ______ uses the network OS to add and remove users, computers, and other devices to and from a network
_______ software is privately owned software and limited to a specific vendor or computer model
a ______ is an icon on the desktop that provides a user with immediate access to a program or file
with virtual memory, when an operating system spends much of its time paging, instead of executing application software, it is said to be _____
a ____ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possible shutting down the system
collection of data organized in a manner that allows access, retrieval, and use of that data
a collection of computers and devices connected together via communications devices and transmission media
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together