How can we help?

You can also find more resources in our Help Center.

Study sets matching "computer chapter 9"

Study sets
Classes
Users

Study sets matching "computer chapter 9"

38 terms
Computer Science Chapter 9
Processor
Computer
Microprocessor
Central Processor
The component of a computer that computes (performs the instr…
A device that deterministically follows instruction to proces…
Component of a computer that computes or performs instruction…
The ALU and control components of a computer, typically inclu…
Processor
The component of a computer that computes (performs the instr…
Computer
A device that deterministically follows instruction to proces…
10 terms
Chapter 9 Computer
Accounts receivable (AR)
Day sheet
Aging report
Patient aging report
Monies that are coming into the practice
A report that provides information on practice activities for…
A report that lists the amount of money owed to the practice,…
A report that lists a patients balance by age, date, and amou…
Accounts receivable (AR)
Monies that are coming into the practice
Day sheet
A report that provides information on practice activities for…
12 terms
COMPUTER CHAPTER 9
Standard Functions
Concatenation
concatenation operator
LEN Function
Readymade programs saved in the inbuilt library of QBASIC
joining of two strings
+ plus symbol
find the length of the string
Standard Functions
Readymade programs saved in the inbuilt library of QBASIC
Concatenation
joining of two strings
19 terms
computer chapter 9
pharming
phishing
white-hat-hacker
adware
occurs when malicious code is plated on your computer, which…
lures internet users to reveal personal information that coul…
a hacker who breaks into systems just for the challenge of it
software that displays sponsored advertisements in a section…
pharming
occurs when malicious code is plated on your computer, which…
phishing
lures internet users to reveal personal information that coul…
16 terms
Computer Basics Chapter 9
3G Wireless
4G Wireless
Artificial Intelligence (AI)
Augmented Reality
Cell phone service that enables connectivity to the Internet.
The latest and fastest cell phone connection speed. The name…
A computer that simulates or achieves true intelligence.
A term used to define a new smartphone experience in which GP…
3G Wireless
Cell phone service that enables connectivity to the Internet.
4G Wireless
The latest and fastest cell phone connection speed. The name…
55 terms
Computer Maintenance Chapter 9 Printers
what printers do
technician printer-related tasks
uses electrostatic sprayers
criteria used when selecting a printer
produce paper copies of electronic files
select, install, configure, troubleshoot
Inkjet
capacity, speed, color quality, reliability
what printers do
produce paper copies of electronic files
technician printer-related tasks
select, install, configure, troubleshoot
55 terms
Computer Chapter 9 Vocab
Android
automatic update
backward compatible
boot drive
Open source, Linux-based mobile OS designed by Google for sma…
Feature that regularly provides new features or corrections t…
Recognizes and works with applications written for an earlier…
Drive from which your personal computer starts
Android
Open source, Linux-based mobile OS designed by Google for sma…
automatic update
Feature that regularly provides new features or corrections t…
Computer Science Chapter 9
The Language Progression
Assembly Language: Disadvantages
High-Level Languages
Compiler
Using computers to solve problems ... Often involves writing pro…
Programmer must "manually" manage the movement of data items…
Expectations of a program written in a high-level language ... P…
Converts high-level language instructions into machine langua…
The Language Progression
Using computers to solve problems ... Often involves writing pro…
Assembly Language: Disadvantages
Programmer must "manually" manage the movement of data items…
19 terms
Chapter 9: Computer Operations
Fetch/execute cycle
Memory
Random access memory
Control unit
getting the next instruction, figuring out what to do, gather…
stores both the program while it is running and the data on w…
computer can refer to the memory locations in any order
the hardware implementation of the Fetch/Execute Cycle; circu…
Fetch/execute cycle
getting the next instruction, figuring out what to do, gather…
Memory
stores both the program while it is running and the data on w…
8 terms
Computer Science Chapter 9
abstract class
abstract method
base class
derived class
a class that models an abstract concept. A class that contain…
a method that has been declared, but not implemented. abstrac…
a superclass
a subclass
abstract class
a class that models an abstract concept. A class that contain…
abstract method
a method that has been declared, but not implemented. abstrac…
10 terms
Computer Science Chapter 9
ARPANET
Internet
TCP/IP
TCP
Advanced Research Projects Agency Network ... -The predecessor…
Network of Networks ... -Links academic, research, government,…
Transmission Control Protocol/Internet Protocol... -The language…
Breaks down messages into packets
ARPANET
Advanced Research Projects Agency Network ... -The predecessor…
Internet
Network of Networks ... -Links academic, research, government,…
22 terms
Chapter 9- Computer Organization
5 basic parts of computer
5 steps of fetch/execute cycle
Fetch/Execute Cycle
ALU (math) and Control Unit (operation)
1) ALU 2) Control Unit 3) Memory 4) Input 5) Output
1) instruction fetch 2) Instruction decode 3) Data fetch 4) I…
gets next instruction, executes before repeating
Processor's two parts
5 basic parts of computer
1) ALU 2) Control Unit 3) Memory 4) Input 5) Output
5 steps of fetch/execute cycle
1) instruction fetch 2) Instruction decode 3) Data fetch 4) I…
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
14 terms
Computer Concepts Chapter 9
advance fee fraud, identity theft, FBI…
encryption viruses
backdoor programs
firewall
major types of cybercrime reported in the IC3
viruses that compress files and then demand money to restore…
the tool that hackers use to gain access to and take control…
software designed to close logical ports in your computer
advance fee fraud, identity theft, FBI…
major types of cybercrime reported in the IC3
encryption viruses
viruses that compress files and then demand money to restore…
13 terms
Chapter 9: Camera & Computer Arts
daguerrotype
Niepce
George Eastman
Muybridge
first practical photographic process
invented photography
Kodak. "you press the button, we do the rest" (1872)
first motion picture (1878, Horse galloping)
daguerrotype
first practical photographic process
Niepce
invented photography
47 terms
Computer Forensics Chapter 9
Examining and analyzing digital eviden…
What is it called when an investigatio…
List the three bullet points for Scope…
Why has Scope creep become more common?
the amount of data to process
Scope creep
1. Because of unexpected evidence found... 2. Attorneys may ask…
1. Criminal investigations require more detailed examination…
Examining and analyzing digital eviden…
the amount of data to process
What is it called when an investigatio…
Scope creep
18 terms
Computer chapter 9
A ______ application is an application…
Placing a computer in ______ mode save…
With a _____ interface, users interact…
A _____ operating system allows two or…
cross-platform
hibernate
natural user interface
multitasking
A ______ application is an application…
cross-platform
Placing a computer in ______ mode save…
hibernate
20 terms
chapter 9 computer terms
virtualization
mobile operating system
blackberry
sleep mode
the practice of sharing or pooling computing resources, such…
typically has one program running at a time, though others ma…
a proprietary mobile operating system
saves any open documents and programs to RAM, turns off all u…
virtualization
the practice of sharing or pooling computing resources, such…
mobile operating system
typically has one program running at a time, though others ma…
20 terms
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
20 terms
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
16 terms
Computer Chapter 9
android
boot drive
chrome OS
driver
an open source, Linux-based mobile operating system designed…
the drive from which your personal computer starts
Google's Linux-based operating system designed to work primar…
small program that tells the operating system how to communic…
android
an open source, Linux-based mobile operating system designed…
boot drive
the drive from which your personal computer starts
28 terms
Computer Vocab chapter 9
Access
Append
Ascending order
Boundary
The microsoft office RDMBS application
Adding data to the end of a table
In order from lowest to highest; alphabetical when based on l…
The column borders in a table
Access
The microsoft office RDMBS application
Append
Adding data to the end of a table
47 terms
Computer Chapter 9
Our present time is referred to as the…
A table is a database object that stor…
All the information about a customer c…
The columns in a table are called reco…
True
True
False
False
Our present time is referred to as the…
True
A table is a database object that stor…
True
98 terms
Chapter 9 - The Computer Industry
Abacus, 486
Alpha test, 504
Analytical Engine, 488
Apple I, 495
A manual calculator that consists of beads mounted on sticks…
One of the first phases of software testing, usually conducte…
A mechanical calculator designed by Charles Babbage that incl…
An unassembled computer kit released in 1976 by Apple Compute…
Abacus, 486
A manual calculator that consists of beads mounted on sticks…
Alpha test, 504
One of the first phases of software testing, usually conducte…
27 terms
Computer Science: Chapter 9
Most browsers offer this, which ensure…
Which type of program would likely be…
Programs used to secretly record an in…
_____ is concerned with protecting sof…
Privacy mode
Keystroke logger
spyware
Data security
Most browsers offer this, which ensure…
Privacy mode
Which type of program would likely be…
Keystroke logger
26 terms
Computer Science Chapter 9
Memory has a finite capacity.
Each byte in memory is limited in size.
A megabyte is exactly one million bytes.
The ADD instruction adds the values, n…
true
true
1,000,000 bytes of memory
true
Memory has a finite capacity.
true
Each byte in memory is limited in size.
true
46 terms
Computer Chapter 9
The operating system that a computer s…
The ____ is the core of an operating s…
Some people use the term _____ to refe…
You can start a computer from a _____,…
Platform
Kernel
Cold boot
Boot disk
The operating system that a computer s…
Platform
The ____ is the core of an operating s…
Kernel
15 terms
computer chapter 9 quiz
__ is used to enter, edit, and format…
__ is used to create a collection of s…
the files you create in excel are call…
the ribbon is organized into __ and gr…
word
PowerPoint
workbooks
tabs
__ is used to enter, edit, and format…
word
__ is used to create a collection of s…
PowerPoint
40 terms
Chapter 9: Computer Organization
Central processing unit
Random Access Memory
MegaByte
Arithmetic Logic Unit
CPU
RAM
MB
ALU
Central processing unit
CPU
Random Access Memory
RAM
13 terms
Computer Concepts Chapter 9
Formula ____ allows you to examine for…
One of the tools that Excel provides t…
A cell containing a formula that refer…
Identifying ____ highlights where chan…
auditing
Solver
precedents
dependents
Formula ____ allows you to examine for…
auditing
One of the tools that Excel provides t…
Solver
14 terms
Computer Concepts Chapter 9
advance fee fraud, identity theft, FBI…
encryption viruses
backdoor programs
firewall
major types of cybercrime reported in the IC3
viruses that compress files and then demand money to restore…
the tool that hackers use to gain access to and take control…
software designed to close logical ports in your computer
advance fee fraud, identity theft, FBI…
major types of cybercrime reported in the IC3
encryption viruses
viruses that compress files and then demand money to restore…
5 terms
Computer Concepts Chapter 9
The summary function that calculates t…
Which of the following is the path to…
The ____ value is a number from 0 to 1…
When creating a PivotTable report, the…
Count
(CHART TOOLS DESIGN tab | Chart Layouts group)
R-squared
anywhere in the range that contains the data
The summary function that calculates t…
Count
Which of the following is the path to…
(CHART TOOLS DESIGN tab | Chart Layouts group)
16 terms
Computer Programming: Chapter 9
True/False: With pointer variables you…
True/False: The ampersand (&) is used…
What will the following code output?…
The statement cin >> *num3
False
False
2
stores the keyboard input into the variable pointed to by num3.
True/False: With pointer variables you…
False
True/False: The ampersand (&) is used…
False
5 terms
computer chapter 9 beat the clock
similar to a task pane, a dialog box a…
the bold button on the word ribbon is…
800 x 600 is lower resolution than 136…
Backstage view contains commands that…
False
toggle
True
true
similar to a task pane, a dialog box a…
False
the bold button on the word ribbon is…
toggle
40 terms
Computer Science Chapter 9
Privacy
anonymity
Cookies
GUID; Globally unique identifier
refers to an individual's ability to restrict or eliminate th…
refers to the ability to convey a message without disclosing…
small text files that are written to your computers hard disk…
identification number that is generated by a hardware compone…
Privacy
refers to an individual's ability to restrict or eliminate th…
anonymity
refers to the ability to convey a message without disclosing…
26 terms
Chapter 9 - Computer Security
Ways a computer catches a virus
Ways an antivirus detects a virus
Malware
Spyware
Downloading infected files from web sites, emails, shared USB…
Looking for a virus signature
Softare that has malicious intent
Unwanted piggybacking program that usually downloads with oth…
Ways a computer catches a virus
Downloading infected files from web sites, emails, shared USB…
Ways an antivirus detects a virus
Looking for a virus signature
25 terms
Computer Science Chapter 9
4
compiling
making everything smaller
hard disk
A machine instruction uses how many bytes of memory?
Converting code that a programmer writes into assembly code i…
What makes computers faster?
What is used for input and output?
4
A machine instruction uses how many bytes of memory?
compiling
Converting code that a programmer writes into assembly code i…
15 terms
Computer Billing Chapter 9
Charges
Payments
Adjustments
Checkout
Amounts provider bills for services performed
Monies rcvd from patients and ins carriers
Changes to patients accounts
Providing receipts for all pymts made, scheduling follow up a…
Charges
Amounts provider bills for services performed
Payments
Monies rcvd from patients and ins carriers
14 terms
AP Computer Science Chapter 9 Vocabulary
Code Reuse
Is-a Relationship
Inheritance Hierarchy
Inheritance (Inherit)
The Practice of writing program code once and using it in man…
A hierarchical connection between two categories in which one…
A set of hierarchical relationships between classes of objects.
A programming technique that allows a derived class to extend…
Code Reuse
The Practice of writing program code once and using it in man…
Is-a Relationship
A hierarchical connection between two categories in which one…
10 terms
Chapter 9.1 Computer Applications
Database Program
Wifi
Hypertext Mark up Language
Presentation Software
Computer software that produces slide show or multimedia pres…
Software application for creating and modifying images.
Wireless fidelity; the technology that creates wireless inter…
the specific, detailed, and complicated code used to create a…
Database Program
Computer software that produces slide show or multimedia pres…
Wifi
Software application for creating and modifying images.
28 terms
Chapter 9- computer organization
Operating System
Arithmetic Logic Unit
Control Unit
word
OS
ALU, does the math, part one of a processor
part 2 of a processor, works like a traffic cop, controlling…
4 bytes taken as a unit is very common today, so this has bee…
Operating System
OS
Arithmetic Logic Unit
ALU, does the math, part one of a processor
24 terms
Computer Science Chapter 9
javaScript
event-driven
properties
methods
event-driven, object-based programming
programming language that responds to events
attributes that describe an object's characteristics
actions that an object can perform
javaScript
event-driven, object-based programming
event-driven
programming language that responds to events
22 terms
Chapter 9 Logistics - Computer
inventory
The Pareto Principle (aka 80-20 Rule)
knowing the demand pattern
how much variability there was in the…
Components, raw materials, work in process, finished goods an…
for many events, roughly 80% of the effects come from 20% of…
what is the key to good inventory management?
What does standard deviation tell us?
inventory
Components, raw materials, work in process, finished goods an…
The Pareto Principle (aka 80-20 Rule)
for many events, roughly 80% of the effects come from 20% of…
22 terms
Computer Chapter 9 Secondary
administrator account
backup and restore
backward compatible
blackberry operating system
sfdsfsdfsdsdf
sffds
...
...
administrator account
sfdsfsdfsdsdf
backup and restore
sffds
43 terms
Computer Service Chapter 9
active partition
actuator arm
AT Attachment (ATA)
basic disk
the designated boot disk fo rthe system.
The device that moves the read/write head over the disk.
A standard for disk drive interface that integrates the contr…
the traditional FAT16, FAT32, and NTFS file storage systems.
active partition
the designated boot disk fo rthe system.
actuator arm
The device that moves the read/write head over the disk.
76 terms
Chapter 9; Computer Applications in the Medical Office
Cookies
Downloading
Encryption
Ethernet
tiny files that are left on the computer's hard drive by a we…
transferring information from an outside location to your com…
scrambling email messages as they leave one site and unscramb…
system that allows the computer to be connected to a cable or…
Cookies
tiny files that are left on the computer's hard drive by a we…
Downloading
transferring information from an outside location to your com…
24 terms
Computer Security TIA Chapter 9
Computer virus
How does my computer catch a virus?
Logic Bomb
Time Bomb
Computer program that attaches itself to another program and…
downloading infected audio/video files from peer to peer shar…
virus triggered when certain logical conditions are met... open…
a virus triggered by the passage of time or on a specific date
Computer virus
Computer program that attaches itself to another program and…
How does my computer catch a virus?
downloading infected audio/video files from peer to peer shar…
20 terms
Computers for ESL Students: Chapter 9 Writing Letters in Microsoft Word
file tab
tab
group
Word Ribbon
opens the file menu that lets you open, save and print docume…
a small rectangle on the Word Ribbon that you click to see di…
a set of related buttons at that are together in a section un…
made of tabs and buttons grouped together
file tab
opens the file menu that lets you open, save and print docume…
tab
a small rectangle on the Word Ribbon that you click to see di…
57 terms
Computer I: Chapter 9
Our present time is referred to as the…
A table is a database object that stor…
All the information about a customer c…
The columns in a table are called reco…
True
True
False
False
Our present time is referred to as the…
True
A table is a database object that stor…
True
26 terms
Computer Science Chapter 9
Memory has a finite capacity.
Each byte in memory is limited in size.
A megabyte is exactly one million bytes.
The ADD instruction adds the values, n…
true
true
1,000,000 bytes of memory
true
Memory has a finite capacity.
true
Each byte in memory is limited in size.
true
1 of 10