Upgrade to remove ads
2nd Semester 2013 Exam Review
This study guide will help review you for all terms and material covered this semester.
Terms in this set (80)
receive data to a local system from a remote system.
to send data somewhere else
a type face WITHOUT semi-structural details on the ends of some of the strokes.
type face WITH semi-structural details on the ends of some of the strokes
new facts entered into the computer to be processed, but you can also have it as output
The art or profession of using design elements to convey a message.
largest network in the world, designed for the government.
electronic mail, sending a message from one computer to another
a symbol representing a company or product
Any large headline, especially one that spans the width of a page.
exclusive use of users WITHIN the organization and contains only company information.
applications that allow OUTSIDE organizations to access internal information systems.
a device that controls the transfer of data from the computer to a peripheral device
type of computer port that transmits data one bit at a time
a type of computer port that transmits data 8 bits at a time
internet tool that helps you locate information on the internet
the results of a search on the web
items you type into a search area to help locate specified information on the web.
junk mail sent to you through your e-mail account
objects on a web page that allow you to proceed to another location or link once clicked.
a web development tool that lets you create dynamic interactive web pages containing, text, images, hyperlinks, animations, etc.
an imitation of the operation of a real-world process or system over time.
a device by which pictorial information is entered into a computer in a manner similar to drawing. Allows you to hand draw on the computer.
a group of computers connected together in such a way as to allow resources to be shared.
LAN (Local Area Network)
a network confined to a small area. Usually a building or geographical area. Computers connecting are no more than a mile apart.
Wi-Fi Protected Access (WPA)
security certification programs developed by the Wi-Fi alliance to secure wireless computer networks.
a small, simple, inexpensive device that joins multiple computers together.
a device that transfers data from one network to another; can provide Internet access to others.
computers or devices on a network that manage network software
a piece of computer equipment that resembles a phone line or a data cable. Connects computers to a network.
a text-based language used to create web documents
an address for a resource on the World Wide Web.
the portion of a website address that identifies the type of site it is.
the individual who designs an Internet web page.
a method by which you moved through a website.
the name of a computer file applied to a specific program or application. Tells what program needs to be used to open the file.
the file extension used for images.
The file extension used for music.
The file extension used for Microsoft Word documents.
The file extension used for Microsoft Excel Spreadsheets.
software program that you use to retrieve documents from the world wide web and display them in readable format.
receives a message from the browser and retrieves your requested webpage
electronic list of your contacts that works in conjunction with e-mail
refers to intangibles such as ideas, music, art, photos, logos, movies, and programs that are the result of creativity and intellectual effort
These typically protect corporate logos and product names.
Usually protect inventions from being used without permission from the inventor
makes it illegal to copy and distribute protected works without the permission of the author or the author's representative
is any technology that surreptitiously gathers information and relays it to advertisers or interested parties.
First page displayed on your browser
contains the address of current page an dis where you enter the location for the web page you want to visit.
this allows you to maneuver within your computers. Moves the insertion point (I Beam cursor).
type of software that can process information on its own without human intervention.
a pattern or a picture that can be used on the desktop.
to trim graphics
a set of predefined elements such as icons, fonts, colors, and sounds that determine the look of your beginning screen.
to be an integral part of; to add into
the location where a file or folder will reside
a scheduled item in the calendar that can last 24 hours or longer.
special visual or sound effects you can add to text or objects when using PowerPoint
Miniature pictures of clip art and photos. Provides a preview.
a way to organize files into manageable groups.
located at the top of the keyboard, used to give commands to the computer.
nonprinting lines that display on the screen to show the boundary lines of a table. Ex. In Excel
type of printer in which the ink is sprayed onto the paper. Cheaper Ink
type of printer that produces images using the same technology as a copier machine. Ink is more expensive
the first level of folders on a disk. Subfolders are found inside this.
identifies the disk and any folders relative to the location of a document/file.
Information or content to which copyright protection does not apply and which is available for anyone to copy.
an input device that can change images into codes for input to the computer.
Converts spoken words to text; also known as automatic speech recognition.
any program that organizes facts and figures
a database object that organizes the information
part of the table that shows all of the information for that one person or item
part of the table that shows only ONE part of the information for that person or item
this is a way to identify a field in a way that is unique.
this is part of an email that shows what the email is about
this allows an email to be copied with the original recipient.
Blind Carbon Copy
this allows an email to be sent to another person but not visibile to the original recipient.
anything file that is provided with an email
when an individual uses all capital letters in an email.
YOU MIGHT ALSO LIKE...
Q3 Sets 1-3 Vocabulary
Exam 2 Vocabulary
Computer Security - Everything and secur…
CS 115 Final Exam Part 2
OTHER SETS BY THIS CREATOR
Chapter 2 Physical Science Vocabulary
Spanish 1 Number Flashcards
Ch.5&6 MS Studies
Seasons & The Weather