Term
|
Definition
For each user, a network administrator establishes this, which enables a user to access, or log on to, a computer or to a network.
|
|
|
Term
|
Definition
When the contents of a file are scattered across two or more noncontiguous sectors.
|
|
|
Term
|
Definition
A private combination of characters associated with the user name that allows access to a certain computer resources.
|
|
|
Term
|
Definition
Compression type in which a compressed file can be returned to its exact original state.
|
|
|
Term
|
Definition
A filtering program that attempts to remove spam before it reaches a users inbox.
|
|
|
Term
|
Definition
To protect a computer from virus attacks, install this kind of program and update it frequently.
|
|
|
Term
|
Definition
The practice of sharing or pooling computing resources, such as servers.
|
|
|
Term
|
Definition
A mini-program with minimal functionality that connects to another program or provides information.
|
|
|
Term
|
Definition
Define who can access certain resources and when they can access those resources.
|
|
|
Term
|
Definition
An internet advertisement that appears ina new window in the foreground of a web page displayed in a users browser.
|
|
|
Term
|
Definition
When purchasing this, users must ensure that it works with the operating system installed on their computer.
|
|
|
Term
|
Definition
Enables you to access all files and programs on the computer or network, install programs, and specify settings that affect all users on a computer or network.
|
|
|
Term
|
Definition
If application software has stopped responding and the hard disks LED blinks repeatedly, the operating system is probably doing this.
|
|
|
Term
|
Definition
Type of compression in which the quality of a file decreases slightly each time the file is compressed, which makes it impossible to restore that file to its exact original state.
|
|
|
Term
|
Definition
A unique combination of characters that identifies a specific user.
|
|
|
Term
|
Definition
To make a program active in windows, click its program button here.
|
|
|
Term
|
Definition
Saves any open documents and programs to RAM, turns off all unnedded functions, and then places the computer in a low-power state.
|
|
|
Term
|
Definition
Saves any open documents and programs to a hard disk before removing power from the computer.
|
|
|
Term
|
Definition
Items sometimes are placed in buffers because the processor operates at a much _______ rate of speed than peripheral devices.
|
|
|
Term
|
Definition
In most cases the operating system is installed and resides on a computers ___________.
|
|
|
Term
|
Definition
users with broadband internet connection are _________ susceptible to attacks from a hacker.
|
|
|
Term
|
Definition
Windows _______ acesses the registry during the computers operation.
|
|
|
Term
|
Definition
When turning on a computer that has been powered off completely, users are performing a _________ boot.
|
|
|
Term
|
Definition
Fragmentation _________ disk access and thus the performance of the entire computer.
|
|
|
Term
|
Definition
In most cases, drive ___ is the boot drive.
|
|
|
Term
|
Definition
Many backup programs _______, or shrink the size of, files during the backup process.
|
|
|
Term
|
Definition
A disk ___________ is a utility that reorganzes the files and unused space on a computers hard disk so the operating system accesses data more quickly and programs run faster.
|
|
|
Term
|
Definition
Errors in programs are known as _______.
|
|
|
Term
|
Definition
Bell Labs developed __________ in the early 1970's and liscensed it for a low fee to numerous colleges and universities, where the operating system obtained a wide following.
|
|
|
Term
|
Definition
Screen savers originaly were developed to prevent aproblem called ________, in which images could be permanately etched on a moniters screen.
|
|
|
Term
|
Definition
Some of the file management functions that a ________ performs are displying a list of files on a storage medium; organzing files in folders; copying, renaming, deleting, moving, and sorting files and folders; and creating shortcuts.
|
|
|
Term
|
Definition
An image ________ allows users to display, print, and copy the contents of a graphic file.
|
|
|
Term
|
Definition
Windows automatically enables its built in personal firewall, called __________.
|
|
|
Term
|
Definition
Like Linux, __________ is a multipurpose operating system because it is both a stand alone and network operating system.
|
|
|
Term
|
Definition
The two most popular GUI's available for _________ are GNOME and KDE.
|
|
|
Term
|
Definition
A ________ is a type of system sofware that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
|
|
|
Term
|
Definition
The three basic categories of operating sytems that exist today are stand-alone, server, and __________.
|
|
|
Term
|
Definition
_________ is an open source multitasking operating system designed for smart phones.
|
|
|
Term
|
Definition
________ is the process of encoding data and information into an unreadable form.
|
|
|
Term
|
Definition
If a new device, such as a printer or scanner, is attached to a computer, its _______ must be installed before the device can be used.
|
|
|
Term
|
Definition
A ________ is a utility that detects and protects a personal computer from unautherized intrusions.
|
|
|
Term
|
Definition
Windows 7 includes an image viewer called Windows ____________.
|
|
|
Term
|
Definition
A ____________ is a mini-program with minimal functionality that connects to another program or provides information.
|
|
|
Term
|
Definition
A new feature of Windows 7 is the _____________ technology that helps programs start faster.
|
|
|
Term
|
Definition
_____________ programs included with most operating systems help with managing files, viewing images, uninstalling programs, diagnosing problems, and removing viruses, for example.
|
|
|
Term
|
Definition
____________ a disk, or reorganizing it so the files are stored in contiguous sectors, speed up disk access and thus the performance of the entire computer.
|
|
|
Term
|
Definition
A _______ is an icon on the desktop that provides a user with immediate acces to a program or file.
|
|
|
Term
|
Definition
The person overseeing network operations, called the network _____________, uses the severs OS to add and remove users, computers, and other devices to and from a network.
|
|
|
Term
|
Definition
Mac ________ includes features from previous apple computer operating systems, such as large photo-quality icons, built in networking support, and enhanced speech recognition.
|
|
|
Term
|
Definition
Some stand-alone operating systems are called _________ operating systems because they also work in conjunction with a server operating system.
|
|
|
Term
|
Definition
A performance __________ is a program that assesses and reports information about various computer resources and devices.
|
|
|