Study sets matching "computer business"

Study sets
Classes
Users

Study sets matching "computer business"

105 terms
Business Computing Lecture Content
What is the use of Utilities Program?…
In a table of student names and addres…
What is one way a firewall protects yo…
Which of the following is an example o…
D.) All of the above
Attribute
B.) Blocks access to your computer's logical parts
C.) Widow/Orphan Control
What is the use of Utilities Program?…
D.) All of the above
In a table of student names and addres…
Attribute
18 terms
Business Computing Quiz 1
Document Creation
Strategy
Tactic
Standardization
The act of entering, storing, and manipulating text for commu…
The means by which a company achieves its long-term objective…
The specific actions, sequences of actions to fulfill your st…
The adoption of a benchmark of performance that can be measur…
Document Creation
The act of entering, storing, and manipulating text for commu…
Strategy
The means by which a company achieves its long-term objective…
99 terms
Business Computing Final Vocab
Document Creation
Strategy
Tactics
Standardization
Act of entering, storing, and manipulating text for effective…
Means by which a company achieves its long-term objectives. D…
Specific actions, sequences of actions to fulfill strategy. A…
Adoption of a benchmark or performance that can be measured,…
Document Creation
Act of entering, storing, and manipulating text for effective…
Strategy
Means by which a company achieves its long-term objectives. D…
106 terms
Business Computing Final
Document Creation
Strategy
Tactic
Standardization
The act of entering, storing and manipulating text for effect…
The means by which a company achieves its long-term objective…
the specific actions, sequences of actions... to fulfill your…
the adoption of a benchmark of performance that can be measur…
Document Creation
The act of entering, storing and manipulating text for effect…
Strategy
The means by which a company achieves its long-term objective…
22 terms
Business computing quiz 1
Document creation
Strategy
Tactic
Standardization
Act of entering, storing, and manipulating text for effective…
The means by which a company achieves its long term objective…
The specific actions to fulfill your strategy.
The adoption of a benchmark of performance that can be measured
Document creation
Act of entering, storing, and manipulating text for effective…
Strategy
The means by which a company achieves its long term objective…
business computing quiz
Credit
Debit
Annuity
APR
Money coming into an account
Money leaving an account
An account with constant interest
Annual percentage rate
Credit
Money coming into an account
Debit
Money leaving an account
25 terms
Computing business midterm
Ben's Law
Change is a __________ ____________
Moore's Law
Melcalfe's Law
New class of computers establishes new industry each decade
Given Factor
Number of transistors per square inch on integrated chip doub…
Value equals number of uses (V=u^2)
Ben's Law
New class of computers establishes new industry each decade
Change is a __________ ____________
Given Factor
10 terms
(Marketing) Business and Computer Sci. Unit
Marketing
Exchange
Marketing Mix
Target market
the process of planning and executing the pricing, promotion…
when two parties each have something of value to the other.
unique combination of pricing, promotion, product offerings a…
customers who are most likely to buy the firm's products. a.k…
Marketing
the process of planning and executing the pricing, promotion…
Exchange
when two parties each have something of value to the other.
60 terms
Business Computing Final Exam
Information Technology people must:
Information Technology is...
Organization structure
Business process
-Know about business and information systems... -Focus on user n…
hardware, software, data repositories, networks
how culture materializes in organizational reporting, and hie…
tasks, process for doing things
Information Technology people must:
-Know about business and information systems... -Focus on user n…
Information Technology is...
hardware, software, data repositories, networks
6 terms
Computers In Business Exam 1
Copyright
Digital watermark
DRM
Trademark
Form of protection available to the creator. It gives the rig…
A subtle alteration of digital content that is usually not no…
Used to control the use of a work.
Word, phrase, symbol, or design that identifies one product o…
Copyright
Form of protection available to the creator. It gives the rig…
Digital watermark
A subtle alteration of digital content that is usually not no…
Business Computing Final
What is the use of the utilities progr…
In a table of student names and addres…
What is one way a firewall protects yo…
Which of the following is an example o…
Copy files b/t folders, repair damaged data files, translate…
Attribute
Blocks access to your computer's logical parts.
Widow/orphan control
What is the use of the utilities progr…
Copy files b/t folders, repair damaged data files, translate…
In a table of student names and addres…
Attribute
18 terms
Exam #2 Business Computing
filter a table
add a record to the end of a table
edit the data in a PivotTable
Filter a PivotChart
click the filter arrow for the column you want to filer, and…
select the row and then enter the data, pressing enter or tab…
make the desired changes in the data source, select the Pivot…
When you click the button arrow, an AutoFilter menu appears.…
filter a table
click the filter arrow for the column you want to filer, and…
add a record to the end of a table
select the row and then enter the data, pressing enter or tab…
Business Computing Lecture Questions
Depreciation & Amortization
Gain on sale of long term asset
Loss on sale of long term asset
Decreases in operating assets
Operating, Add
Operating, Subtract
Operating Add
Operating ADD
Depreciation & Amortization
Operating, Add
Gain on sale of long term asset
Operating, Subtract
90 terms
Business Computing Final Exam
Word Processing
Strategy
Tactic
Standardization
Act of entering, storing, and manipulating text
Means by which a company achieves its long-term objectives
Specific actions, sequence of actions, to fulfill your strategy
Adoption of a benchmark of performance that can be measured,…
Word Processing
Act of entering, storing, and manipulating text
Strategy
Means by which a company achieves its long-term objectives
Business computers final
Label the parts of a memo as if this m…
When is a memo used
How do you set up a memo... (Margins, tab…
Where do you sign a memo?
To... From... Date... SUBJECT
Within a buisness
Top: 2"... Line spacing: 1.0 ... Remove space after paragraph
Beside the name out to the side.
Label the parts of a memo as if this m…
To... From... Date... SUBJECT
When is a memo used
Within a buisness
Semester exams: business computers
Worksheet
Cell
=
Relative
A computerized spreadsheet
Intersection of a row and column
What all formulas start with
Type of formula that adjusts the cell references as it is cop…
Worksheet
A computerized spreadsheet
Cell
Intersection of a row and column
computer business applications trevor carroll
save
memory
input device
alignment
the process of storing data on a disk
hardware that stores computer processing instuctions and info…
transports data into the computer
how text is positioned between the margins
save
the process of storing data on a disk
memory
hardware that stores computer processing instuctions and info…
5 terms
Computer business quiz. Final set.
VPN
VRAM
WAN
WLAN
Virtual Private Network
Volatile random access memory
Wide Area Network
Wirless Local Area Network
VPN
Virtual Private Network
VRAM
Volatile random access memory
237 terms
FBLA Business Computer Technology-ML
database
entry
field
filters
a tool used to organize, store, retrieve, and communicate gro…
a single peice of data in a database table
a grouping or category of similar information contained on a…
allow for the retrieval of information that meets specific cr…
database
a tool used to organize, store, retrieve, and communicate gro…
entry
a single peice of data in a database table
22 terms
Computer App Business Letter Format
1.
2.
3.
4.
Change all margins to 1'
Change line spacing to single
Change paragraph spacing to opt before and after
1' margins
1.
Change all margins to 1'
2.
Change line spacing to single
144 terms
1-4 vocabulary -Computer in Business
Notebook (laptop) Computer:
Handheld (smartphone):
Tablets:
Desktop computers:
Portable computer, also known as a notebook computer, weighin…
A type of cell phone that offers a variety of advanced functi…
a personal computer that contains a thin system unit, most of…
A computer that is small enough to fit on top of a desk, yet…
Notebook (laptop) Computer:
Portable computer, also known as a notebook computer, weighin…
Handheld (smartphone):
A type of cell phone that offers a variety of advanced functi…
12 terms
Vocabulary Terms for Business and computer science
Insurance
Policyholder
Premium
Probability
A practice or arrangement by which a company or government ag…
A person or group in whose name an insurance policy is held
An amount to be paid for an insurance policy
The extent to which something is probable; the likelihood of…
Insurance
A practice or arrangement by which a company or government ag…
Policyholder
A person or group in whose name an insurance policy is held
15 terms
computer apps in business 3 vocabulary
hypertext transfer protocol
wiki
active-x
cookie
short for HyperText Transfer Protocol, HTTP is the underlying…
A collaborative Web site comprises the perpetual collective w…
ActiveX is an outgrowth of two other Microsoft technologies c…
Cookies are a message given to a Web browser by a Web server.…
hypertext transfer protocol
short for HyperText Transfer Protocol, HTTP is the underlying…
wiki
A collaborative Web site comprises the perpetual collective w…
105 terms
Business Computing Lecture Questions
What is the use of Utilities Program?…
In a table of student names and addres…
What is one way a firewall protects yo…
Which of the following is an example o…
D.) All of the above
Attribute
B.) Blocks access to your computer's logical parts
C.) Widow/Orphan Control
What is the use of Utilities Program?…
D.) All of the above
In a table of student names and addres…
Attribute
106 terms
Business Computing Lecture Questions
What is the use of Utilities Program:
In a table of student names and addres…
What is one way a firewall protects yo…
Which of the following is an example o…
A. Copy files between storage devices ... B. Repair damaged data…
Attribute
a) Searches for and destroys viruses on your computer ... -->b)…
A) Headers and Footers ... B) Page numbers ... -->C) Widow/Orphan C…
What is the use of Utilities Program:
A. Copy files between storage devices ... B. Repair damaged data…
In a table of student names and addres…
Attribute
18 terms
Business computer science work ethics
soft skills
life roles
wants
attitude
skill that are transferable from one job to another because t…
All the different facts to a person that change with time, pe…
What you would like to have but do not have the have to survive
The way you think and feel about certain topics or life in ge…
soft skills
skill that are transferable from one job to another because t…
life roles
All the different facts to a person that change with time, pe…
Business Computing Charts
What is the objective of graphics?
What are the criteria of graphics?
What are the two types of graphics?
Effective graphics...
Communication that is...... 1. concise... 2. effective... 3. unambiguo…
-clear and readable... -self-explanatory... -display usable data
1. tables... 2. figures
-integrate with text... -located near text... -add without repeatin…
What is the objective of graphics?
Communication that is...... 1. concise... 2. effective... 3. unambiguo…
What are the criteria of graphics?
-clear and readable... -self-explanatory... -display usable data
29 terms
Business Computing prelim quizzes
.potx
copy and paste
slide master
build
What is the file extension for a MS PowerPoint template?
Be careful not to use this method when putting pictures from…
You place text (other than footer text) on the ___________ if…
In MS PowerPoint, the effect of having bullets appear one at…
.potx
What is the file extension for a MS PowerPoint template?
copy and paste
Be careful not to use this method when putting pictures from…
10 terms
Business First 20B Computer Usage
in the long run
network
entertainment
laptop
pidemmän päälle
verkosto
viihde
kannettava tietokone
in the long run
pidemmän päälle
network
verkosto
26 terms
Business Computing Blackboard Questions
What is the use of Utilities Program:…
In a table of student names and addres…
What is one way a firewall protects yo…
Which of the following is an example o…
D
Attribute
b
c
What is the use of Utilities Program:…
D
In a table of student names and addres…
Attribute
26 terms
Computer Vocab Modern business 1
• Browser
• Remote access
• Modem
• Firewall
a program with a graphical user interface for displaying HTML…
the ability to get access to a computer or a network from a r…
a combined device for modulation and demodulation, for exampl…
a part of a computer system or network that is designed to bl…
• Browser
a program with a graphical user interface for displaying HTML…
• Remote access
the ability to get access to a computer or a network from a r…
22 terms
Business First 20A Computer Hardware
case
application
attach
battery
kotelo, kuori
sovellus
liittää, kiinnittää
patteri
case
kotelo, kuori
application
sovellus
14 terms
Business First 20B Computer Usage
addicted
carefree
considerably
entertainment
riippuvainen
huoleton
huomattavasti
viihde
addicted
riippuvainen
carefree
huoleton
Business First 20B Computer Usage
abroad
carefree
considerably
daily
ulkomailla
huolimaton
huomattavasti
päivittäinen
abroad
ulkomailla
carefree
huolimaton
Business First 20A Computer Hardware
acronym
application
attach
calculate
lyhenne
sovellus
liittää
laskea
acronym
lyhenne
application
sovellus
50 terms
Computer Business Applications - Semester Exam
Application Software
Central Processing Unit (CPU)
File Management
File Type
Computer software created to allow the user to perform specif…
Executes commands from a computer's hardware and software; th…
A program on a computer that allows the user to create, edit,…
An extension at the end of a file name, indicating which appl…
Application Software
Computer software created to allow the user to perform specif…
Central Processing Unit (CPU)
Executes commands from a computer's hardware and software; th…
Business first B Computer Usage
addicted
carefree
considerably
in the long run
riippuvainen
huoleton
huomattavasti
pidemmän päälle
addicted
riippuvainen
carefree
huoleton
21 terms
Business First 20A Computer Hardware
acronym
application
attach
calculate
lyhenne
sovellus
kiinnittää
laskea
acronym
lyhenne
application
sovellus
8 terms
Computer Applications - Business Letters Special Parts
Attention line
Subject Line
Reference initials
Attachment/Enclosure notation
Only used when the writer of the letter does not know the nam…
Specifies the main topic discussed in the letter.... Keyed in A…
Used only if the writer of the letter and the person keying t…
Use "Attachment" if another document is stapled or clipped to…
Attention line
Only used when the writer of the letter does not know the nam…
Subject Line
Specifies the main topic discussed in the letter.... Keyed in A…
20 terms
Business First - 20B - Computer Usage
Addicted
Presentation
Ready-made
Speed
Riippuvainen
Esitelmä
Valmis, Valmiiksi-
Nopeus
Addicted
Riippuvainen
Presentation
Esitelmä
20 terms
business Computing word- chapter 1
word processing software
word wrap
hard return
soft return
enables you to produce documents such as letters, reports, an…
moves words to the next line if they do not fit on the curren…
is created when you press Enter to move the insertion point i…
is created by the word processor as it wraps text to a new line
word processing software
enables you to produce documents such as letters, reports, an…
word wrap
moves words to the next line if they do not fit on the curren…
Phil 103 Business & Computer Ethics
software is intelligible as a non-tang…
reasoning by analogy
Veil of ignorance
Algorithm,source code, object program
A)software creators cannot have exclusive rights to ownership…
A)drawing a conclusion about an unfamiliar case by comparing…
A) imagine that you do not know what race, social economic st…
A)it is what makes a program... B) What rights does a software d…
software is intelligible as a non-tang…
A)software creators cannot have exclusive rights to ownership…
reasoning by analogy
A)drawing a conclusion about an unfamiliar case by comparing…
The Computer in Business Ch. 4 Flash Cards
Low vs. High Resolution
Optical vs. Digital Zoom
Wireless Keyboard Reciever
Function Key
High Resolution means better quality, but larger file size. D…
Optical Zoom: a true zoom lens, like the zoom lens you'd use…
A USB like device that plugs into a computer in order to make…
F1-F12, each F key performs a different function on your comp…
Low vs. High Resolution
High Resolution means better quality, but larger file size. D…
Optical vs. Digital Zoom
Optical Zoom: a true zoom lens, like the zoom lens you'd use…
The Computer in Business Ch. 3 Flash Cards
Internal Storage
External Storage
Remote Storage
Volatile
The computers internal hard drive. (Primary Storage)
Temporarily stores information for transporting from one comp…
Online or "cloud" backup type storage.
Temporary storage, requires power in order to open files of t…
Internal Storage
The computers internal hard drive. (Primary Storage)
External Storage
Temporarily stores information for transporting from one comp…
The Computer in Business Ch. 13 Flash Cards
Leading world region for internet users
Copyright (definition and length of pr…
Trademark
Patent (definition and length of prote…
Asia
Protection available to the creator of... original artistic or l…
Protect the word, phrase, symbol, or design that identifies g…
Protect inventions (can be a product, process, or procedure)…
Leading world region for internet users
Asia
Copyright (definition and length of pr…
Protection available to the creator of... original artistic or l…
153 terms
Business Computing Final
cyber crime/computer crime
examples of cyber crime
3 main drivers of cybercrime
other drivers of cybercrime
(1) any crime that involves a computer and a network... (2) the…
(1) spam... (2) fraud/theft... (3) obscene or offensive content... (4)…
(1) profitability (high expected gains/low expected costs...p…
(1) unequal access to information... (2) inability to afford mat…
cyber crime/computer crime
(1) any crime that involves a computer and a network... (2) the…
examples of cyber crime
(1) spam... (2) fraud/theft... (3) obscene or offensive content... (4)…
58 terms
Business Computing Lecture Final
Cybercrime trends
computer security
security threat
security attack
fraud, theft, harrassment, cyber warfare/terrorism
state of well-being of information and infrastructures in whi…
potential violation of security through flaws in design, impl…
an action that deliberately violates security, an active adve…
Cybercrime trends
fraud, theft, harrassment, cyber warfare/terrorism
computer security
state of well-being of information and infrastructures in whi…
Business Computer Applications: Chapter 3
Computers can run any type of program…
Each generation of computer hardware h…
A thin-client system is a desktop comp…
If your computer loses its power suppl…
False
True
True
True
Computers can run any type of program…
False
Each generation of computer hardware h…
True
189 terms
Business Computing Final 2016
What is a cyber crime/computer crime?
List 7 examples of cyber crimes.
What are the 3 main drivers of cybercr…
What are 4 other drivers of cybercrime?
(1) any crime that involves a computer and a network... (2) the…
(1) spam... (2) fraud/theft... (3) obscene or offensive content... (4)…
(1) profitability (high expected gains/low expected costs...p…
(1) unequal access to information... (2) inability to afford mat…
What is a cyber crime/computer crime?
(1) any crime that involves a computer and a network... (2) the…
List 7 examples of cyber crimes.
(1) spam... (2) fraud/theft... (3) obscene or offensive content... (4)…
Computer Business Applications: Unit 3 Spreadsheets
Absolute Cell Reference
Active Cell
Alignment
Argument
Cell reference that does not adjust to the new cell location…
A selected worksheet cell that is ready for data entry
The position of data within a cell
Value, cell reference, range, or text that acts as an operand…
Absolute Cell Reference
Cell reference that does not adjust to the new cell location…
Active Cell
A selected worksheet cell that is ready for data entry
5 of 10