A video file extension produced by Microsoft. It is less compressed than the .mp4 format which results in a larger file size.
An older pre-2007 version of the Microsoft Word file extension. It keeps formatting styles, objects, and other document settings in place.
A Microsoft Word file extension used to maintain the integrity of a Word document's styles, text, and overall settings.
The file extension associated with an executable program file generated for the Windows or DOS operating systems. It can extract its files and save them to another specific location.
A compressed image format used to store digital photographs which supports up to 4-bit color.
A compressed audio format created by the Moving Picture Experts Group. It is used to store music files and audio books on hard drives.
A movie or video extension which uses MPEG-4 compression. It is used to distribute video via the Internet.
A universal file extension developed by Adobe Acrobat. It is used in any application that supports Adobe Acrobat.
A file extension used in Adobe Flash. It contains text, audio, and video as well as vector or raster-based graphics.
A high-quality image or graphic format used to store picture images.
A plain text file extension which uses a basic character set and does not contain any objects or formatting of any kind.
A standard file extension used for digital audio. It allows audio recordings to be saved with a special sampling of rates and bit rates.
An older, pre-2007 version of the Microsoft Excel file extension. It is used to maintain the style format of an Excel spreadsheet.
A Microsoft Excel file extension which is used to uphold the style format of an Excel spreadsheet.
A file extension which indicates a file or folder has been compressed to reduce overall file size and save space.
An operating system which is used for smartphones and tablet computers.
A type of software designed to detect and destroy computer viruses.
The range of frequencies used to establish an RF link.
A list of websites an individual has visited recently. This includes any data associated with the website and how long the user was on the website.
A form of memory which refers to a temporary storage area on a hard drive disk that holds the most recently downloaded websites.
A cellular service separate from calling that is used to view email, web pages, and download apps.
A wireless network which uses cell towers to transfer information.
A computing option which is a small box that when selected indicates that a particular feature has been enabled.
The act of using a cloud services like Gmail, OneDrive, or Workfront.
A server-based storage system used to back up data on a local machine. It can be accessed anywhere there is an Internet connection. It can be used to share data, collaborate with others, and synchronize data on multiple machines.
A small piece of text-based information stored on a user's computer that expires after a specified amount of time. Cookies are commonly used for authentication, or site preferences.
Software which tells hardware how to run.
A menu that drops from the menu bar when requested and remains open without further action until the user closes it or chooses a menu item.
A connection type used to connect a computer to a network with an RJ-45 connector.
A security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers; commonly used on local area networks that are connected to the Internet.
Software that is stored in ROM, which remains intact in the absence of power. Generally, low-level input/output operations and startup programs are stored using firmware. Firmware is used to help hardware and software communicate with each other.
High-Definition Multimedia Interface (HDMI )
____________________ is a high-quality audio/video connection system used to transmit digital data components.
The physical parts of a computer system such as the printer, mouse, and modem.
Internet Protocol version 4 (IPv4) is the fourth revision in the development of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed.
Address is a unique 32-bit number represented in dotted decimal notation (i.e. 188.8.131.52) that identifies an individual nodes on a network.
The next-generation Internet Protocol version designated as the successor to IPv4.
An address that is a unique 128-bit number containing a 64-bit network component and a 64-bit host component represented in dotted decimal notation that identifies individual nodes on a network. For example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
An action which allows a user to press certain keys to navigate to a certain area or to perform a given task.
Learning Management System (LMS)
A __________________ is used to administer, deliver, and track the progress of users in an eLearning environment.
An all-in-one computer which is portable.
An operating system that is a UNIX clone, developed by Linus Torvalds. Linux is freely distributed and has an open source code.
An application which is installed on the physical computer and performs a specific action, like the calculator app.
______________ is an instant messaging feature used to send pictures, video, audio, and text.
Any file or program designed to harm a computer. This includes viruses and Trojans horses.
Computer data storage referring to computer components, devices, and recording media that retain digital data.
A device which translates analog carrier signals to encode and decode digital information.
Programming software which is often installed by organizations as a means of protecting data and resources. It often leads to increased productivity and a decrease in company theft, however it can lead to a decrease in employee morale.
A hand-operated electronic device that controls the coordinates and click functions of a cursor on the computer screen as it is moved around.
___________________ is the primary form of software running on a computer that organizes files and folders as well as telling the hardware how to interact with the user and other software.
__________ is a device primarily used for personal and business computing needs.
Any device which can be connected to a computer to either download information or upload information. Some examples include digital cameras, speakers, microphones, printers, and USB devices.
A set of actions or items which a user or computer is allowed to access or control.
A control which displays a button that can be turned on or off.
A type of malware used to hijack a computer and make it so the rightful user cannot access it without them paying the attacker.
A hardware device that acts as a link between multiple networks through the use of protocols.
______________ is an instant messaging feature which is a text-only message and is limited to 160 characters.
___________________ is a hybrid of a web and a local app which is provided by a commercial vendor like Adobe or Microsoft.
The process of encoding a physical item like a picture into a digital medium.
A type of network that is sometimes referred to as a private network which requires a password for access and has some level of security to protect the user's personal information.
Hardware that enables communication by passing messages to other users on a network.
An attack method used to gain access or information by tricking individuals into volunteering potentially sensitive information. Social engineering techniques rely on human tendencies, such as perception, helpfulness, and trust.
The exchange of brief written messages between mobile phones and cellular networks.
A malicious program that is disguised as something else. Trojan horses may be used to steal or destroy data, crash systems, install backdoors, or replicate to other systems.
The act of discovering the unknown cause of a problem, to locating and isolating a problem in a program, computer system, or network and resolving it.
___________ is a hardware interface used to connect computers to peripheral devices including, but not limited to, keyboards, scanners, printers, external storage, and digital cameras.
Sometimes called a public network, this type of network provides no security for personal information and is not password protected.
_______________is a cable which is commonly used to connect a computer monitor to the stack.
__________________ is a computer network which is layered on top of an underlying network, such as a hot spot, and may provide a secure connection using tunneling protocols.
A self-replicating program which attaches itself to executable files or boot sectors. A virus can infect programs, hard drives, and removable disks.
_____________ is a form of communication through phone lines that use Internet connections.
An application which runs using an Internet connection. It requires a user account or login information.
_______________ is a local area network that uses high frequency radio signals to transmit and receive data over distances of a few hundred feet using Ethernet protocol and usually confirming to the IEEE 802.11 protocols.
A technology type that provides networking without the use of physical wires. It allows connection through transmission or radio frequency medium.
A computer file which has been compressed for storage or transmission.
An operating system which is used for mobile devices that is manufactured by Apple.