I. | Binary code |
II. | Bit |
III. | Byte |
IV. | ASCII |
V. | Unicode |
A. | Smallest unit of digital data |
B. | Originally developed in the 1960s |
C. | Works like a bank of light switches |
D. | Represents a single character |
E. | The standard on the Internet |
I. | Vacuum tube |
II. | Transistor |
III. | Integrated circuits |
IV. | Microprocessor |
V. | ENIAC |
A. | Tiny electronic switch |
B. | Awarded 2000 Nobel Prize in physics |
C. | Resembles an incandescent light bulb |
D. | First developed in 1971 |
E. | Built at the University of Pennsylvania |
I. | Netbook |
II. | Tablet computer |
III. | Mobile app |
IV. | Mac |
V. | PC |
A. | Have screens smaller than 12 inches |
B. | Available in numerous models, configurations, and price ranges |
C. | Secure, stable, and fun |
D. | Extends the functionality of a mobile device |
E. | A handheld mobile device |
I. | Video game system |
II. | Game console |
III. | Game controller |
IV. | Backward compatibility |
V. | Video game simulation |
A. | Designed primarily to play games |
B. | Used to interact with a video game |
C. | Replicates realistic environments and scenarios |
D. | The ability to run some older programs |
E. | Connects to a television or monitor to display a game |
I. | Client |
II. | Enterprise server |
III. | Supercomputer |
IV. | Grid computing |
V. | Screensaver |
A. | Connects to, or requests services from, another computer |
B. | Can allow thousands of simultaneous users |
C. | Performs complex mathematical calculations |
D. | Distributed computing using a few computers in one location |
E. | A moving image that appears when the computer has been idle |
I. | Arithmetic logic unit |
II. | CPU |
III. | GPU |
IV. | Instruction cycle |
V. | Control unit |
A. | The brain of a computer |
B. | Manages the movement of data |
C. | Fetch, decode, execute, and store |
D. | Performs calculations |
E. | Video card processor |
I. | Point-and-shoot cameras |
II. | LCD |
III. | Shutter lag |
IV. | Burst mode |
V. | Image stabilization |
A. | Two layers of glass that are glued together |
B. | Can cause you to miss an action shot |
C. | Accounts for camera shake |
D. | Most do not have a viewfinder |
E. | Ability to take several pictures by holding down the shutter button |
I. | LCD |
II. | OLED |
III. | AMOLED |
IV. | HDMI |
V. | DLP |
A. | Has hundreds of thousands of tiny swiveling mirrors |
B. | Can transmit both audio and video signals |
C. | Found on most desktop and notebook computers |
D. | Can be found in mobile devices |
E. | Consists of extremely thin panels of organic molecules |
I | OS |
II. | Utility software |
III. | GUI |
IV. | User interface |
V. | Command-line interface |
A. | Graphics and buttons |
B. | Manages all the other programs |
C. | Required to type all instructions |
D. | Helps maintain, repair, and protect a computer |
E. | How you interact with a computer |
I. | Computer network |
II. | Network resources |
III. | P2P network |
IV. | Workgroup |
V. | Homegroup |
A. | Include software, hardware, and files |
B. | Computers on a home network running Windows 7 or later |
C. | Computers in a P2P network belong to this |
D. | Two or more computers that share resources |
E. | Each computer is considered equal |
I. | Client-server network |
II. | Server |
III. | Server virtualization |
IV. | IaaS |
V. | Client |
A. | Users log in to the network instead of their local computers |
B. | Personal computer or other device connected to a server |
C. | Takes advantage of an unused resource |
D. | Provides access to servers through the Internet |
E. | Multiuser computer system |
I. | Bus topology |
II. | Star topology |
III. | Ring topology |
IV. | VPN |
V. | Cellular network |
A. | Every node is attached to a central device |
B. | Data travels around the circle in one direction |
C. | Connected using a single cable terminated at both ends |
D. | Practical way for people on the move to connect to network resources |
E. | Creates a private network |
I. | Network adapter |
II. | Ethernet adapter |
III. | Wireless adapter |
IV. | Ad hoc network |
V. | Firewall |
A. | Looks like a large phone jack |
B. | Use the IEEE 802.11 standards |
C. | Blocks unauthorized access to a network |
D. | A communication device that establishes a connection with a network |
E. | Two wireless devices connected to each other directly |
I. | Domain controller |
II. | Domain |
III. | Protocol |
IV. | TCP |
V. | IP |
A. | Defines the rules for communication between devices |
B. | Protocol that ensures that data packets are transmitted reliably |
C. | Protocol that addresses and routes packets to their destination |
D. | Composed of a group of clients and servers |
E. | Server that contains one central security database on a special server |
I. | Clickjacking |
II. | Malicious script scam |
III. | Data breach |
IV. | Cyberterrorism |
V. | Computer fraud |
A. | Mass, unsolicited email messages |
B. | Occurs when sensitive data is stolen or viewed |
C. | Enables malware to post unwanted links on your page when a link is clicked |
D. | Convinces a victim to voluntarily and knowingly give money or property |
E. | Done to intimidate a government or its people for a political or social agenda |
I. | Disk formatting |
II. | Tracks |
III. | Sectors |
IV. | Clusters |
V. | File system |
A. | Consists of two steps: low-level and high-level |
B. | Set up by high-level formatting |
C. | Wedge-shaped |
D. | Groups of sectors |
E. | A set of concentric circles |
I. | Disk defragmenter |
II. | Disk cleanup utility |
III. | Mission-critical information |
IV. | Backing up |
V. | Incremental backup |
A. | If lost, will result in the failure of business operations |
B. | Only backs up files that have changed |
C. | Safely deletes files |
D. | The process of making copies of important files |
E. | Helps improve disk efficiency |
I. | Backup utilities |
II. | File History |
III. | Time Machine |
IV. | Drive imaging |
V. | System restore |
A. | Backup utility in Windows |
B. | Backup utility on a Mac |
C. | Can be built-in or third-party |
D. | Return the system to a previous state |
E. | Creates a mirror image of the entire hard disk |
I. | System requirements |
II. | Bug |
III. | Patch |
IV. | Service pack |
V. | Cookie |
A. | Flaw in the software programming |
B. | Also called a hotfix |
C. | Identifies you when you return to a website |
D. | The minimum hardware and software specifications required to run an application |
E. | A larger, planned software update |
I. | Malware |
II. | Spamming |
III. | Spyware |
IV. | Browser hijacker |
V. | Computer virus |
A. | Secretly gathers personal information about you |
B. | Spyware that changes your home page |
C. | A program that replicates itself and infects computers |
D. | Sending mass, unsolicited email messages |
E. | Programs that are designed to be harmful |
I. | Botnet |
II. | DoS |
III. | Trojan horse |
IV. | Rootkit |
V. | Antivirus software |
A. | Enables someone to gain control over a computer |
B. | Uses a pattern matching technique |
C. | A network of computer zombies controlled by a master |
D. | Used to cripple a server or network |
E. | Malicious program masked as a legitimate program |
I. | Windows Defender |
II. | Security suite |
III. | Antispyware software |
IV. | Heuristic method |
V. | File quarantine |
A. | Packages of security software that include a combination of features |
B. | Prevents adware and spyware software from installing itself |
C. | Found in OS X applications to check for known malware when opening a file |
D. | Windows program that protects against viruses and other malware |
E. | Used to catch new viruses that are not in the definition files |
I. | Software |
II. | Application software |
III. | Productivity program |
IV. | Office application suite |
V. | Presentation application |
A. | Includes any program that directs the computer to carry out a specific task |
B. | Microsoft PowerPoint or Apple Keynote |
C. | The most commonly used productivity software used in business |
D. | Tells the computer how to perform a certain task |
E. | The most popular general-purpose application |
I. | Word processor |
II. | Spreadsheet application |
III. | Three-dimensional spreadsheet |
IV. | DBMS |
V. | PIM |
A. | Used to create, edit, and format text documents |
B. | Microsoft Outlook |
C. | Can have multiple worksheets that are linked together |
D. | Microsoft Access |
E. | Electronic worksheet composed of rows and columns |
I. | Open source |
II. | Tax preparation software |
III. | Genealogy program |
IV. | Portable app |
V. | Game software |
A. | Used to create family trees |
B. | Typically requires a lot of processing |
C. | You can file electronically or print and mail it |
D. | Can run from a flash drive |
E. | A program in which the source code is published |
I. | Pixel |
II. | Video editor |
III. | Image editor |
IV. | Vector graphic program |
V. | Machinima |
A. | Professional-quality programs such as Adobe Premiere and Sony Vegas |
B. | Sophisticated graphics program |
C. | The art of creating videos using screens captured from video games |
D. | A single point on a display screen |
E. | Creates graphics that are math based |
I. | iOS device |
II. | Podcast |
III. | Cloud computing |
IV. | Cloud storage |
V. | Cloud |
A. | Prerecorded radio- and TV-like shows |
B. | Applications and services that are accessed over the Internet |
C. | iPod, iPhone, or iPad |
D. | Another term for the Internet |
E. | You can access your data from different places or devices |
I. | NSFNET |
II. | ARPANET |
III. | CERN |
IV. | NAPs |
V. | CSNET |
A. | Created by the National Science Foundation |
B. | The primary Internet backbone in the late 1980s |
C. | European Organization for Nuclear Research |
D. | The first five large network access points |
E. | Started in the 1960s |
I. | Bit |
II. | Byte |
III. | Mobile browser |
IV. | Home page |
V. | Search provider |
A. | Represents a single character in modern computer systems |
B. | Sometimes called a microbrowser |
C. | The smallest unit of digital data |
D. | In Chrome, the default is Google |
E. | First page of a website |
I. | Address bar |
II. | HTML |
III. | Web browser |
IV. | Microbrowser |
V. | Extension |
A. | Authoring language |
B. | Browser add-on, plug-in, or toolbar |
C. | Mobile browser |
D. | Contains the URL of the current web page |
E. | Program that interprets HTML |
I. | Cookie |
II. | Pop-up blocker |
III. | Widget |
IV. | Plug-in |
V. | Add-on |
A. | Prevents webpages from opening a new window |
B. | Small text file placed on your computer by a website that you visit |
C. | A third-party program, such as Adobe Reader |
D. | A small program in a webpage |
E. | Created for a specific browser to add features to it |
I. | URL |
II. | Protocol |
III. | Domain name |
IV. | Top-level domain |
V. | IP address |
A. | http: |
B. | www.pearsonhighered |
C. | Must be unique |
D. | http://www.pearsonhighered.com/go |
E. | .com |
I. |
II. | CAPTCHA |
III. | Subject line |
IV. | Signature line |
V. | Thread |
A. | Gives a clear idea of the content |
B. | Discussion board conversation |
C. | Series of letters and numbers that are distorted |
D. | Uses store-and-forward technology |
E. | Block of text at the end of an email |
I. | Hit |
II. | Search engine |
III. | Spider |
IV. | Metasearch engine |
V. | Boolean search |
A. | A search that uses logical operators |
B. | A result from performing a search |
C. | A program sent out by search engines |
D. | Searches other search engines and aggregates results |
E. | A program that looks in a database for specific words and returns results |
I. | Intellectual property |
II. | Patent |
III. | Trademark |
IV. | Copyright |
V. | Public domain |
A. | Protection for inventions |
B. | Protection for logos or symbols that represent a brand |
C. | Creations of the mind |
D. | Works that are not restricted by copyright |
E. | Protection for literary and artistic works |
I. | Plagiarism |
II. | Fair use |
III. | Censorship |
IV. | CC license |
V. | TurnItIn |
A. | Allows use without permission |
B. | Restricts what can be posted or published |
C. | The use of someone else's work without permission |
D. | Online tool that helps detect plagiarism |
E. | Determines what someone can do with your work |
I. | Netiquette |
II. | Flame |
III. | Ergonomics |
IV. | Digital footprint |
V. | SMM |
A. | Defines how to set up workspaces for optimal productivity |
B. | The rules for acceptable behavior and manners on the Internet |
C. | The practice of using social media sites to sell products and services |
D. | Your online identity |
E. | A message that may be seen as being confrontational and argumentative |
I. | E-commerce |
II. | B2B |
III. | C2C |
IV. | B2C |
V. | SSL |
A. | Enables smaller companies to have a web presence |
B. | A protocol that encrypts data |
C. | Websites such as Amazon.com and Overstock.com |
D. | Buying and selling products or services on the Internet |
E. | Websites such as eBay and Craigslist |
I. | SMS |
II. | Virtual reality |
III. | SharePoint |
IV. | Desktop application |
V. | Mobile application |
A. | An artificial world |
B. | Used to send brief electronic text messages to mobile devices |
C. | Requires a computer operating system |
D. | Enables employees to access information across boundaries |
E. | Extends the functionality of smartphones |
I. | App |
II. | Web app |
III. | Platform-neutral |
IV. | Mobile application |
V. | Desktop application |
A. | Runs in a browser |
B. | Runs on any device with a supported browser and Internet access |
C. | Requires a computer operating system |
D. | A self-contained program |
E. | Extends the functionality of a cell phone or tablet |
I. | Web browser |
II. | Chrome |
III. | Browsing |
IV. | Surfing |
V. | Chromebook |
A. | Software program used to navigate the Internet |
B. | A laptop that runs Google's Chrome operating system |
C. | The process of using your computer to view webpages |
D. | The process of navigating the Internet to move quickly between items |
E. | Browser developed by Google |
I. | Home page |
II. | Address bar |
III. | Browsing window |
IV. | Bookmarks bar |
V. | Search bar |
A. | Text box that enables you to enter lookup terms |
B. | The page that displays when a browser is opened |
C. | Displays the webpage content for the site you are visiting |
D. | Displays the URLs of pages you frequently visit |
E. | The area where you type a URL |
I. | URL |
II. | Protocol prefix |
III. | Domain name |
IV. | Footer |
V. | Navigation bar |
A. | Buttons that display on every webpage |
B. | http://www.nasa.gov |
C. | http |
D. | Typically contains copyright information and basic navigation links |
E. | www.nasa.gov |
I. | Bookmarks |
II. | Hamburger menu |
III. | Drag and drop |
IV. | Search provider |
V. | Search engine |
A. | Button that contains three horizontal lines |
B. | A mouse technique used to move objects |
C. | Saved links to commonly visited webpages |
D. | Computer program that searches for specific words |
E. | A website that provides search capabilities on the web |
I. | Google doodle |
II. | Sponsored links |
III. |
IV. | Gmail |
V. | Mouse over |
A. | Paid advertisements shown as links |
B. | A method of exchanging messages via the Internet |
C. | A modified Google search engine home page logo |
D. | Point to text or an image on a webpage |
E. | Google's free web-based email service |
I. | Cc |
II. | Bcc |
III. | Trimmed content |
IV. | Conversation |
V. | Email header |
A. | Shows the history of a Gmail message |
B. | An abbreviation for courtesy copy or carbon copy |
C. | In Gmail, it includes routing information and the subject line |
D. | An email message that gets sent back and forth many times |
E. | An abbreviation for blind carbon copy |
I. | Google Drive |
II. | My Drive |
III. | Shared with Me |
IV. | Upload |
V. | Label |
A. | Stores files that you create using Google applications |
B. | Used to organize messages into categories in Gmail |
C. | Stores files that you have uploaded to Google Drive |
D. | Provides free storage for any type of file |
E. | Stores files that others have shared with you |
I. | Hangouts |
II. | Hangouts On Air |
III. | SharePoint |
IV. | OneDrive |
V. | Cloud computing |
A. | Host and broadcast live discussions and performances |
B. | A Google communication platform |
C. | A free file storage and file-sharing service |
D. | Enables collaboration, file sharing, and web publishing in organizations |
E. | Using web servers on the Internet to store files |
I. | Skype |
II. | Page |
III. | OneNote |
IV. | Notebook |
V. | Section |
A. | An application used to make voice or video calls |
B. | The primary division of a OneNote notebook |
C. | An application used to create a digital notebook |
D. | A collection of files organized by major divisions |
E. | Subdivision of a OneNote section |
I. | Datasheet view |
II. | Design view |
III. | Data type |
IV. | Source file |
V. | Link |
A. | Displays the underlying structure |
B. | The file being imported |
C. | Classifies what can be stored in a field |
D. | Displays the data in columns and rows |
E. | Connection to data in another file |
I. | Query |
II. | Select query |
III. | Select |
IV. | Data source |
V. | Run |
A. | Retrieves specific data from one or more database objects |
B. | Performs the actions indicated in your query design |
C. | Objects from which a query selects the data |
D. | Pull out |
E. | Also called simple select query |
I. | Relationship |
II. | One-to-many relationship |
III. | Referential integrity |
IV. | Foreign key |
V. | Cascade |
A. | Update records in related tables when referential integrity is enforced |
B. | Association established between two tables on a common field |
C. | The most common type of relationship |
D. | Ensures that the data between related tables is valid |
E. | Used to connect to the primary key |
I. | Subset |
II. | Data source |
III. | Table area |
IV. | Design grid |
V. | Criteria |
A. | Conditions that identify the specific records |
B. | Portion of the total |
C. | Where the query selects its data |
D. | Lower area of the Query window |
E. | Upper area of the Query window |
I. | Comparison operator |
II. | Between...And operator |
III. | Compound criteria |
IV. | AND condition |
V. | OR condition |
A. | Looks for values within a range |
B. | Symbols that are used to evaluate data |
C. | Used to display records that match all parts of the specified criteria |
D. | Used to display records that meet one or more parts of the specified criteria |
E. | Uses AND and OR logical operators |
I. | Wildcard character |
II. | Asterisk (*) wildcard character |
III. | Question mark (?) wildcard character |
IV. | Calculated field |
V. | Expression |
A. | A formula |
B. | Represents unknown characters in a string |
C. | Represents one or more unknown characters |
D. | Stores the value of a mathematical operation |
E. | Searches for a single unknown character |
I. | Slide |
II. | Theme |
III. | Thumbnail |
IV. | Placeholder |
V. | Title slide |
A. | Can contain text, pictures, tables, and charts |
B. | Miniature slide image |
C. | Set of unified design elements |
D. | Usually the first slide in a presentation |
E. | Box on a slide that holds content |
I. | Status bar |
II. | Comments pane |
III. | Notes button |
IV. | Slide pane |
V. | View buttons |
A. | Control the look of the presentation window |
B. | Displays the current slide number and number of slides in a presentation |
C. | Read or write reviews |
D. | Displays an area below the Slide pane in which to type |
E. | Displays a large image of the active slide |
I. | Layout |
II. | Section Header |
III. | Sizing handle |
IV. | Rotation handle |
V. | Style |
A. | A collection of formatting options |
B. | Arrangement of slide elements |
C. | Type of slide layout |
D. | Circular arrow |
E. | Small circle |
I. | Variant |
II. | Artistic effect |
III. | Aspect ratio |
IV. | Style |
V. | Black slide |
A. | Displays after the last slide |
B. | Different theme style and color |
C. | Format applied to images |
D. | Collection of formatting options |
E. | Width related to height of the display |
I. | Variant |
II. | Artistic effect |
III. | Aspect ratio |
IV. | Style |
V. | Black slide |
A. | Displays after the last slide |
B. | Different theme style and color |
C. | Format applied to images |
D. | Collection of formatting options |
E. | Width related to height of the display |