Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account


Unwanted e-mail is called ________.

computer literate

Being ________ means being familiar enough with computers that you understand their capabilities and limitations.

biomedical chip research

The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.


________ tags, when placed on a car, can be used to record and track in a database all of the vehicle's movements.

computer forensics

The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________.


By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.


________ is a wearable device that hangs around your neck consisting of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology.

quick response codes

A technology named ________ lets any piece of print in the real world host a live link to online information and video content.

Creative surplus

________ is described as the ability of the world's populace to volunteer and collaborate on large projects.

mobile devices

One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.

Blackboard or Moodle

Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.


When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.

data mining

The process of searching huge amounts of data with the hope of finding a pattern is called ________.

Information technology

________ is a field of study focused on information handling and retrieval of information automatically.

being able to build a computer

Which of the following is NOT necessarily part of being computer literate?

computer systems

As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.


________ computing relates to emotion or deliberately tries to influence emotion.

Social networking

________ is the gathering together of groups of people using online tools to connect and exchange ideas.

the Internet, computers

Children who do not have access to ________ and ________ won't be prepared for future employment

certain Microsoft operating systems and Office software

The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.

digital divide

The difference between people with access to computers and the Internet and those without this access is known as the ________.


The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.

biomedical chip implants

One potential application of ________ is to provide sight to the blind.

collaborative consumption

Joining together as a group to use a specific product more efficiently is called ________.

computer literate

People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.


A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.

use the Internet and Web wisely,are able to maintain, upgrade, and troubleshoot your computer, and avoid hackers and viruses

Being computer savvy means you ________.

DYTHR project

The ________ lets information be created, distributed, and filtered by users themselves in real time.

Next Einstein Initiative

The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa

human rights

The Witness Project uses the power of video and a grassroots movement to advocate for ________.


________ binary digits (or bits) combine to create one byte.


________ is the place in a computer where the programs and data the computer is currently using are stored.


The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.


The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.

USB port

Flash drives plug into a(n) ________.

network interface card (NIC)

A ________ enables your computer to connect to other computers or to the Internet.

External drive bays

________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.

Expansion cards

________ plug into slots on the motherboard and provide additional functionality for your computer.


A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.

Universal serial bus (USB)

________ ports are now the most common ports for connecting input and output devices to the computer.


________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.


RAM is considered volatile storage, which means it is ________.


Computers gather data, which means that they allow users to ________ data.

parallel and serial

USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.


________ displays use organic compounds that produce light when exposed to an electric current.


After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.


The ________ language consists of just two digits: 0 and 1.


________ is data that has been organized or presented in a meaningful fashion.

analyzing the data or information

Which of the following is NOT one of the four major data processing functions of a computer?

legacy technology

The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.


Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.

power supply

The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.


Inkjet printers and laser printers are examples of ________ printers.

a warm boot

Restarting a computer when it is already powered on is called ________.


________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.

touch pad

The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.


________ microphones pick up sound from only one direction.

Function keys

________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.


A(n) ________ is a device that looks like a skinny pen but has no ink.

Control (Ctrl) key

The ________ is used in combination with other keys to perform shortcuts and special tasks.

input device

A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.

Tablet PC

A ________ was the first devices with touch screen capabilities.


________ software is the set of programs that enables the computer's hardware devices and application software to work together.


A ________ is approximately 1 million bytes.


The ________ contains the central electronic components of the computer.


Computers process data into information by working exclusively with ________.


________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

peripheral devices

Devices such as monitors and printers that are connected to the computer are called ________.


All the following are examples of input devices EXCEPT a ________.


________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.


Any computer parts that you can actually touch are considered to be ________.

eight bits

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.


________ is the set of computer programs that enables the hardware to perform different tasks.

binary digit

The term "bit" is short for ________.

3D printing, cloud printing, and inkless printing

boundaries of printing include ________.

New technologies pushing the boundaries of printing include ________.


A ________ is approximately 1 billion bytes.


________ is a form of permanent memory that holds all the instructions the computer needs to start up.


Large, expensive computers that support hundreds of users simultaneously are called ________.

Really Simple Syndication

RSS stands for ________.

broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

Podcasts enable you to ________.


Podcasts use which of the following technologies?

to develop new Internet technologies

The Internet2 is a project ________.


________ is a social networking service that enables you to exchange short text messages with your friends or "followers."

a trend of new Web applications that combine the functionality of multiple applications

What does Web 2.0 describe?

a spider, an indexer, and search engine software

Search engines have which three parts?

search engine

A set of programs that searches the Web to find information is called a ________.

the Cold War crisis

The concept of the Internet developed from ________.


A Web site that allows anyone to add or edit content is called a ________.


Which of the following are personal video journal entries posted on the Web?

a weblog

If you wanted to keep a written online journal, you would use ________.

buddy list

You can keep track of IM contacts by using a ________.

communicate in real time with others who are online

Instant messaging (IM) services are programs that enable you to ________.


Boolean operators include such words as ________.

social networking Web sites

Facebook and MySpace are considered to be ________.

the main pathway of high-speed communications lines through which all Internet traffic flows

The Internet backbone refers to ________.

Tim Berners-Lee at CERN

The World Wide Web was invented by ________.

Advanced Research Projects Agency Network

The agency that first began funding the Internet was called the ________.

a large network of networks

The Internet is ________.

personal information manager (PIM) software

Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?


In the URL, the portion labeled http is the ________.

Hypertext Transfer Protocol

HTTP is the abbreviation for ________.

Uniform Resource Locator (URL)

The text version of a Web site's Internet address is called the ________.


The name of the free Internet browser from Mozilla is ________.

that the address bar is green-colored,that a closed padlock appears in the toolbar,that the beginning URL changes from http:// to https:/&#47

When purchasing items over the Internet, be sure to check ________.

secure socket layer

The "s" in https stands for ________.


E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.


All of the following are examples of multimedia EXCEPT:

are not updated automatically

Webcasts differ from podcasts in that webcasts ________.


Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.

the broadcast of audio or video content over the Internet

A webcast is ________.


A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.

use Favorites or Bookmarks

One way to mark a Web site so that you can return to it later without typing the address is to ________.

breadcrumb trail

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.


What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?

top-level domain

In the URL, the portion labeled .com is the ________.

WWW.the protocol.and the domain name.

What are the three parts of a URL.

spreadsheet software

Software you can use to create a budget is called ________.

word processing software

Microsoft Word and Writer are examples of ________.

its ability to automatically recalculate formulas and functions

The primary benefit of a spreadsheet program is ________.


In a spreadsheet, equations you build yourself using values and cell references are called ________.


In a spreadsheet, the columns and rows form individual boxes called ________.

help run the computer,coordinate instructions between application software and the computer's hardware devices, and helps manage system resources.

what does the System software do?

application software

Software that lets you do tasks at home, school, and work is called ________.

is at column C, row 5 of the worksheet

The cell address C5 indicates that the cell ________.


Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.

presentation software

Which type of software is used to make a slide show?

themes, transitions, animation effects

What features does the Presentation software include?

digital image editing

Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.

audio editing software, image editing software, and animation software.

Multimedia software includes _______.


Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?


Custom software, developed to address the needs of a specific company, is known as ________ software.

locate restaurants, airports, and points of interest

GPS software allows users to ________.

enterprise resource planning software

Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.

vertical market

Software designed for a specific industry is known as ________ software.

customer relationship management software

Which type of software stores client information in one central database for use by sales professionals?

engineers to create models

Computer-aided design software is used primarily by ________.

Professional 2010

In which 2010 Office suite will you find Microsoft Access?

project management software

Which type of software helps managers with tasks such as scheduling charts?

accounting software

QuickBooks and Peachtree are examples of ________.


Microsoft ________ is software that allows students who have tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.

database software

Which type of software is used at colleges to keep track of student records?


A(n) ________ software installation allows you to decide which features you want to install on the hard drive.

use the application's uninstall program

When available, the best way to remove an unwanted software application is to ________.

Web page authoring software

Adobe Dreamweaver is an example of ________.

desktop publishing

QuarkXPress and Adobe InDesign are examples of ________ software.

Intuit Quicken

An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.

Starter 2010

Which suite is installed by computer manufacturers and replaced Works?


Predesigned forms that provide the basic structure for a particular kind of document are known as ________.

records, fields, tables

In databases, information is organized in ________.

See more

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording