Study sets matching "computer lit chapter 5"

Study sets
Classes
Users

Study sets matching "computer lit chapter 5"

Currents in Literature Chapter 5
abdicate
anonymous
cultivation
deplorable
to relinquish a power, right, position, or responsibility; to…
of unknown authorship or origin; unidentified
the act of growing and nurturing; development
wretched and miserable; shameful
abdicate
to relinquish a power, right, position, or responsibility; to…
anonymous
of unknown authorship or origin; unidentified
118 terms
Chapter 5 Computer Tech
Digital Security Risk
Computer Crime
Cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
An illegal act using a computer or related device
online or internet based illegal acts such distributing malwa…
software used by cybercriminals
Digital Security Risk
any event or action that could cause a loss of or damage to c…
Computer Crime
An illegal act using a computer or related device
World Literature Chapter 5
abound
array
comprised
created
teem
(n.) a large arrangement of people or things
(v.) contained, included; consisted of
(v.) made
abound
teem
array
(n.) a large arrangement of people or things
American Literature Chapter 5
ambiguous
dissident
embellish
fritter
(adj.) unclear
(n.) a rebel
(v.) to decorate
(v.) to waste
ambiguous
(adj.) unclear
dissident
(n.) a rebel
Computer Security Chapter 5
Algorithm
Block Cipher
Ciphertext
Collision Attack
a step-by-step, recursive computational procedure for solving…
segmenting the input data into blocks of a specified size, ty…
encrypted output from a cipher system
an attacker finds two different messages that hash to the sam…
Algorithm
a step-by-step, recursive computational procedure for solving…
Block Cipher
segmenting the input data into blocks of a specified size, ty…
52 terms
Computer Basics Chapter 5
Accessibility
Analytics
Bandwidth
Bits Per Second (bps)
Ensuring the capacity of disabled and able-bodied people to u…
Statistics on the amount of traffic and visitors to a website.
The amount of information that can be transferred on a networ…
Basic term for transmission speed.
Accessibility
Ensuring the capacity of disabled and able-bodied people to u…
Analytics
Statistics on the amount of traffic and visitors to a website.
37 terms
computer chapter 5
application software
Productivity Software
Software Suite or Productivity Suite
Word Processing Application
a broad term for any type of software that you use. It is a p…
This group of software is any soft ware used to efficiently p…
A group of productivity applications will typically be bundle…
software used to create documents mostly text
application software
a broad term for any type of software that you use. It is a p…
Productivity Software
This group of software is any soft ware used to efficiently p…
63 terms
computer chapter 5
QWERTY keyboard
ergonomic keyboard
ergonomics
optical mouse
most commonly used keyboard with the first letters spelling Q…
has a design that reduces the chance of wrist and hand injuries
used to incorporate comfort, efficiency, and safety in the de…
uses deices that emit and sense light to detect the mouses mo…
QWERTY keyboard
most commonly used keyboard with the first letters spelling Q…
ergonomic keyboard
has a design that reduces the chance of wrist and hand injuries
13 terms
Literature Chapter 5
Antagonist
Character
Characterization
Dynamic
The individual or force that opposes the protagonist.
A fictional person in a piece of literature.
The means a writer uses to reveal character: by outright desc…
Changing, often as a result of conflicts and circumstances en…
Antagonist
The individual or force that opposes the protagonist.
Character
A fictional person in a piece of literature.
57 terms
Literature Chapter 5
A Song for St. Cecilia's Day, 1687
An Essay on Man
On a Certain Lady at Court
Epigrams
John Dryden
Alexander Pope
Alexander Pope
Alexander Pope
A Song for St. Cecilia's Day, 1687
John Dryden
An Essay on Man
Alexander Pope
17 terms
computer chapter 5 vocab
Active cell
boundary
cell
cell reference
the cell displayed with a cell border, selected cell
the bar separating the column letters at the top of the works…
the intersection of a row and column
the column letter and row number that identify the cell
Active cell
the cell displayed with a cell border, selected cell
boundary
the bar separating the column letters at the top of the works…
chapter 5 computer concepts
Personal area network (PAN)
local area network (LAN)
Metropolitan area network (MAN)
Wide Area Network (WAN)
An interconnected group of personal digital devices located w…
An interconnected group of computers and peripherals located…
is a public high-speed network capable of voice and data tran…
An interconnected group of computers and peripherals that cov…
Personal area network (PAN)
An interconnected group of personal digital devices located w…
local area network (LAN)
An interconnected group of computers and peripherals located…
BJU American Literature Chapter 5
Henry Wadsworth Longfellow
Mezzo Cammin
Divine Commedia
John Greenleaf Whittier
Born in 1807 and died in 1882. The first American to have his…
Written by Henry Wadsworth Longfellow. The title is Italian f…
Translated by Henry Wadsworth Longfellow. Longfellow translat…
Born in 1807 and died in 1892. The foremost voice in the lite…
Henry Wadsworth Longfellow
Born in 1807 and died in 1882. The first American to have his…
Mezzo Cammin
Written by Henry Wadsworth Longfellow. The title is Italian f…
Computer Concepts Chapter 5
Active cell
Adjacent cells
Boundary
cell
The cell displayed with a bold border. Also called the select…
Cells that are next to each other
The bar separating the column letters at the top of the works…
The intersection of a row and column
Active cell
The cell displayed with a bold border. Also called the select…
Adjacent cells
Cells that are next to each other
31 terms
Computer Maintenance Chapter 5
Can a file name include a period (.),…
If "Notepad" is running and you go bac…
If an administrator account is wanted…
If you create a file called DOG.DAT in…
No
Notepad closes
As an option during the windows 7 installation
Files names are not case sensitive, therefore the 2 names are…
Can a file name include a period (.),…
No
If "Notepad" is running and you go bac…
Notepad closes
83 terms
Computer Terminology- Chapter 5
Application software
System software
Operating system (OS)
OS manages...
the software you use to do everyday tasks at home and work
the set of programs that helps run the computer and coordinat…
group of programs that controls how your computer system func…
computer's hardware, including the processor (Central process…
Application software
the software you use to do everyday tasks at home and work
System software
the set of programs that helps run the computer and coordinat…
21 terms
Computer II -- WORD Chapter 5
Cover page
Electronic portfolio
Employment portfolio
Reflection
The first page of a document that usually displays such infor…
A collection of digital information and documents that illust…
A collection of documents that illustrates the qualities and…
The act of thinking critically about items in a portfolio and…
Cover page
The first page of a document that usually displays such infor…
Electronic portfolio
A collection of digital information and documents that illust…
82 terms
Computer concepts chapter 5
AES
Application server
Bandwidth
Bluetooth
(Advanced Encryption Standard), the technology used for WPA2…
Runs software fir network workstations
A data transmission of a communications channel
A wireless technology used in conjunction with standard ether…
AES
(Advanced Encryption Standard), the technology used for WPA2…
Application server
Runs software fir network workstations
Computer Lit Vocabulary chapter 5
function key
game controller
optical character recognition
optical mark recognition
special keys programmed to issue commands to a computer
input devices that direct movements and actions of on-screen…
optical reader technology that involves reading typewritten c…
optical reader technology that reads hand drawn marks such as…
function key
special keys programmed to issue commands to a computer
game controller
input devices that direct movements and actions of on-screen…
Computer concepts chapter 5
AES
Application server
Bandwidth
Bluetooth
(Advanced Encryption Standard), the technology used for WPA2…
Runs software fir network workstations
A data transmission of a communications channel
A wireless technology used in conjunction with standard ether…
AES
(Advanced Encryption Standard), the technology used for WPA2…
Application server
Runs software fir network workstations
Keystone Literature chapter 5
Exposition
Climax
Plot
Structure
background information identifying the main characters, the s…
the turning point in a narrative; the moment when the conflic…
the series of events in a narrative or drama
the organizational pattern of a literary work.
Exposition
background information identifying the main characters, the s…
Climax
the turning point in a narrative; the moment when the conflic…
56 terms
Intro to Computers Chapter 5
Operating System (OS)
User Interface
Utility program
Multitask
A group of programs that controls how your computer functions
The desktop, icons, and menus that let you communicate with y…
A small program that performs many of the general housekeepin…
To perform more than one process at a time
Operating System (OS)
A group of programs that controls how your computer functions
User Interface
The desktop, icons, and menus that let you communicate with y…
40 terms
Computer concepts- Chapter 5
PAN (personal area network)
LAN (local area network)
MAN (metropolitan area network)
WAN (wide area network)
Refer to the interconnection of personal digital devices or c…
A data communications network that connects personal computer…
A public high-speed network capable of voice and data transmi…
Covers a large geographical area and usually consists of seve…
PAN (personal area network)
Refer to the interconnection of personal digital devices or c…
LAN (local area network)
A data communications network that connects personal computer…
28 terms
Chapter 5: Reviewing the literature
Once you have identified your research…
Searching the literature should answer…
A literature review can be.....
You will write a lit review because:
To search existing literature and write a literature review
Bryman: Social Research Methods, 4th edition... Searching the Li…
a list of relevant theories; a search for relevant informatio…
you need to know what is already known about your research ar…
Once you have identified your research…
To search existing literature and write a literature review
Searching the literature should answer…
Bryman: Social Research Methods, 4th edition... Searching the Li…
22 terms
Computer II -- Publisher Chapter 5
Flyer
Tear-off
Half-fold
Quarter-fold
A single-page sheet designed for mass distribution.
A feature designed to be torn or removed from a flyer, such a…
A card made by folding a piece of paper in half.
A card made by folding a piece of paper in half and then in h…
Flyer
A single-page sheet designed for mass distribution.
Tear-off
A feature designed to be torn or removed from a flyer, such a…
13 terms
Computer Programming I - Chapter 5
Algorithm
Boolean expression
Counter
Decision structure
A set of steps that tell how to solve a problem.
An expression that evaluates to either True or False.
A variable used to store a value that is updated by a constan…
A statement that uses a condition to determine which set of s…
Algorithm
A set of steps that tell how to solve a problem.
Boolean expression
An expression that evaluates to either True or False.
Computer Essentials Chapter 5
DOS
HCL
POST
Windows Registry
Device Operating System
Hardware Comparability List
Power On Self Test
A database holding all of the information about the computer.
DOS
Device Operating System
HCL
Hardware Comparability List
Computer Science Chapter 5
Null reference
NullPointerException
Object reference variable
null
when a reference variable is first declared as an instance va…
tells us there is no object to reference.
stores the address of an object
reserved word in java that represents a reference that does n…
Null reference
when a reference variable is first declared as an instance va…
NullPointerException
tells us there is no object to reference.
Literature Chapter 5 Garbage
Who was influenced by the French Liter…
a belief in an impersonal God, who, af…
the second half of the eighteenth cent…
the eighteenth century became known as…
the Restoration writers
deism
Age of Johnson
prose and satire
Who was influenced by the French Liter…
the Restoration writers
a belief in an impersonal God, who, af…
deism
27 terms
Computer Networks: Chapter 5
Routing Protocol Goal
Global
Decentralized
Link State
Determine "good" paths (equivalently, routes), from sending h…
Routing algorithm where all routers have complete topology, l…
Routing algorithm where router knows physically connected nei…
Routing protocol that uses Dijkstra's algorithm.
Routing Protocol Goal
Determine "good" paths (equivalently, routes), from sending h…
Global
Routing algorithm where all routers have complete topology, l…
20 terms
Computer 1A Chapter 5 Vocab
Digital signature
digital certificate
CA
digital security risk
An encrypted code that a person, website, or organization att…
A notice that guarantees a user or website is legitimate.
An authorized person or company that issues and verifies digi…
Any event or action that could cause a loss of or damage to c…
Digital signature
An encrypted code that a person, website, or organization att…
digital certificate
A notice that guarantees a user or website is legitimate.
90 terms
Discovering Computers Chapter 5
802.11i
access control
adware
anti-spam program
Sometimes called WPA2, a network standard developed by IEEE w…
Security measure that defines who can access a computer, when…
Program that displays an online advertisement in a banner or…
Program that attempts to remove spam before it reaches a user…
802.11i
Sometimes called WPA2, a network standard developed by IEEE w…
access control
Security measure that defines who can access a computer, when…
19 terms
Computer App Chapter 5
alignment
Bullet
Center
First (Line Indent)
The position of text between the margins.
Any small character that appears before an item in a list.
To position text so that it is centered between left and righ…
A description of the indent in a paragraph when only the firs…
alignment
The position of text between the margins.
Bullet
Any small character that appears before an item in a list.
31 terms
Computer Concepts Chapter 5
Bluetooth
Communications protocol
Bandwidth
Ethernet
A wireless technology used in conjunction with standard Ether…
A set of rules that ensures the orderly and accurate transmis…
The data transmission capacity of a communications channel. D…
A popular network technology in which network nodes are conne…
Bluetooth
A wireless technology used in conjunction with standard Ether…
Communications protocol
A set of rules that ensures the orderly and accurate transmis…
Computer Science Chapter 5
Branching
relational operators
equality operators
Boolean
Directs a program to execute either one group of statements o…
a < b a is less-than b... a > b a is greater-than b... a <= b a is…
a == b a is equal to b... a != b a is not-equal to b
True or False (yes they must be capitalized)
Branching
Directs a program to execute either one group of statements o…
relational operators
a < b a is less-than b... a > b a is greater-than b... a <= b a is…
18 terms
Computer Science Chapter 5
If statements
==
!=
Null
Allows a program to carry out different actions depending on…
Tests for equality 5 == 7-2
Not equal
Refers to no object
If statements
Allows a program to carry out different actions depending on…
==
Tests for equality 5 == 7-2
51 terms
Computer Organization and Design: Chapter 5
Temporal Locality
Spatial Locality
Memory Hierarchy
Block
The principle stating that if a data location is referenced t…
The locality principle stating that if a data location is ref…
A structure that uses multiple levels of memories; as the dis…
Also called a line. The minimum unit of information that can…
Temporal Locality
The principle stating that if a data location is referenced t…
Spatial Locality
The locality principle stating that if a data location is ref…
47 terms
Computer Science Chapter 5
Cursor
Spreadsheet Application
Presentation App
Data
Vertical blinking line to indicate where text will appear
App for representing tables of data to calculate data and cre…
Creates slideshows of text and graphics with animation
Collection of facts and values
Cursor
Vertical blinking line to indicate where text will appear
Spreadsheet Application
App for representing tables of data to calculate data and cre…
20 terms
Computer Science chapter 5
function definition:
function object:
header:
body:
A statement that creates a new function, specifying its name,…
A value created by a function definition. The name of the fun…
The first line of a function definition.
The sequence of statements inside a function definition.
function definition:
A statement that creates a new function, specifying its name,…
function object:
A value created by a function definition. The name of the fun…
Computer Chapter 5
IP Address
URL (Uniform Resource Locator)
domain Name
digital security risk
Short for Internet Protocol address, is a sequence of numbers…
A Brower retrieves a webpage using its own address
I a text-based name that corresponds to the IP address of a s…
Is any event or action that could cause a loss of or damage t…
IP Address
Short for Internet Protocol address, is a sequence of numbers…
URL (Uniform Resource Locator)
A Brower retrieves a webpage using its own address
22 terms
Chapter 5 Vocabulary - Literature
altruistic (adj)
assent (v)
assent (n)
benefactor (n)
unselfish
to express agreement
agreement
one who does good to others
altruistic (adj)
unselfish
assent (v)
to express agreement
26 terms
Computer Concepts Chapter 5
application software (apps)
productivity software
software (productivity) suite
word processing application
programs used by individuals to carry out tasks or otherwise…
used in the workplace to efficiently perform a wide variety o…
group of productivity software applications that are typicall…
used to create any kind of document that is mostly text
application software (apps)
programs used by individuals to carry out tasks or otherwise…
productivity software
used in the workplace to efficiently perform a wide variety o…
23 terms
Computer Concepts Chapter 5
Productivity Software
Software Suite
Word Processing Application
Accounting Software Application
Used in the workplace to efficiently performa wide variety of…
Group of productivity software applications will typically be…
Software used to create documents containing mostly text, alt…
To record and report financial information related to assets,…
Productivity Software
Used in the workplace to efficiently performa wide variety of…
Software Suite
Group of productivity software applications will typically be…
Chapter 5 vocab , computer lit. period 4
Label
Data
Value
Cell reference
Text stored in a cell that cannot be used in calculations
Information stored in a worksheet. Categorized as either labe…
Numeric data that can be used in calculations
The column letter and row number that identify a cell, such a…
Label
Text stored in a cell that cannot be used in calculations
Data
Information stored in a worksheet. Categorized as either labe…
17 terms
Computer Applications- Chapter 5 Vocabulary
backup
Basic Input/Output System (BIOS)
file
firmware
to copy or archive files for safekeeping
a set of programs, built into a PC's ROM chips, that controls…
a unit or grouping of information that has been given a uniqu…
permanent instructions stored in read-only memory (ROM) that…
backup
to copy or archive files for safekeeping
Basic Input/Output System (BIOS)
a set of programs, built into a PC's ROM chips, that controls…
41 terms
Chapter 5 Computer Vocab
El teclado
el raton
el sobre
la maquina de fax
keyboard
mouse
envelope
fax machine
El teclado
keyboard
el raton
mouse
Chapter 5 Computer Concepts
Active cell
Adjacent cells
Boundary
Cell
The cell displayed with a bold border. Also called the select…
Cells that are next to each other.
The bar separating the column letter at the top of the worksh…
The intersection of a row and column.
Active cell
The cell displayed with a bold border. Also called the select…
Adjacent cells
Cells that are next to each other.
88 terms
Computer Terminology- Chapter 5
Application software
System software
Operating system (OS)
OS manages...
the software you use to do everyday tasks at home and work
the set of programs that helps run the computer and coordinat…
group of programs that controls how your computer system func…
computer's hardware, including the processor (Central process…
Application software
the software you use to do everyday tasks at home and work
System software
the set of programs that helps run the computer and coordinat…
Computer Chapter 5 Terms
QWERTY keyboard
ergonomic keyboard
ergonomics
optical mouse
most common keyboard layout
keyboard designed so that it is less likely to injure hands o…
designing computer tools to be more comfortable for the user
mouse that uses light or sensors to detect movement
QWERTY keyboard
most common keyboard layout
ergonomic keyboard
keyboard designed so that it is less likely to injure hands o…
24 terms
Chapter 5 Vocab Computer
Label:
Data:
Value:
Cell reference :
Text stored in a cell that cannot be used in calculations
Information stored in a worksheet grid identified by the lett…
Numeric data that can be used in calculations
The column letter and row number that identify a cell, such a…
Label:
Text stored in a cell that cannot be used in calculations
Data:
Information stored in a worksheet grid identified by the lett…
1 of 10