Discovering Computers Chapter 1 Glossary. BLOG: Informal Web site consisting
of time-stamped articles in a journal form. COMMUNICATIONS: Occurs over ...
Discovering Computers Chapter 5 Security and Ethics Glossary.
ANTIVIRUSPROGRAM Protects a computer against viruses by identifying and
removing viruses.
Discovering Computers 2011: Living in a Digital World. Chapter 14. 2 ...
Management below Chapter 14 .... the specific set of steps involved in completing
a.
Discuss the uses of the. Internet and World. Wide Web. Discovering Computers
2011: Living in a Digital World. Chapter 1. 2. See Page 3 for Detailed Objectives
...
Objectives Overview. Discovering Computers 2011: Living in a Digital World.
Chapter 9. 2. See Page 459 for Detailed Objectives ...
Objectives Overview. Discovering Computers 2011: Living in a Digital World.
Chapter 4. 2. See Page 209 for Detailed Objectives ...
Mar 1, 2005 ... After completing this chapter, you will be able to: ... 2 Define the term, data
integrity, and describe the qualities of ... 9/3/2011 SOC egupta.jpg.
2011 Edition. Living in a Digital ... programs. Discovering Computers and
Microsoft Office 2007. Chapter 4. 2 .... A stand-alone operating system is a
complete.
Online PDF Discovering Computers 2014 (Shelly Cashman Series), Read PDF .... evolving needs of the concepts portion of t
To keep content as current as possible, online coverage of contemporary ... The authors emphasize actionable content wit
well as date of birth to draw up a birth chart, typical media horoscopes are based only on aggregated birthdate ('Star' or 'Sun' sign), or year of birth (Oriental).
relate to how the sun, moon, planets and stars connect with life on earth. Some people .... have a vivid imagination' and 'I am the life of the party'. Responses ...
Download Online Teachers Discovering Computers: Integrating Technology in a Changing World (Shelly ... Computers: Integr
Discovering Computers 2014 (Shelly Cashman Series) Free PDF Download, .... A Wedding in Apple Grove book download C H Ad
... Get answer of your question fast from real experts the 3638323 to 1605548 a .... technology with new emphasis on Web
Best Seller E-book. Book details ... Publisher : Course Technology 2016-01-01 q. Language : ... technology skills assist
... I assume you shall assume For every atom belonging to me as good belongs to you I loafe ... technology skills assist
Discovering Computers Chapter 4 Glossary. ADMINISTRATOR ACCOUNT
Account that enables access to all files, installs programs, and specifies settings.
Discovering Computers Chapter 4 Glossary ADMINISTRATOR ACCOUNT Account that enables access to all files, installs programs, and specifies settings ASTERISKS Displays when entering a private password BUFFER Segment of memory where items are placed while waiting to be transferred DEFRAGMENTING Reorganizing the files on a disk DISK CLEANUP Detects and corrects physical and logical problems on a hard disk DRIVER Program that tells the operating system how to communicate with a device ENCRYPTION Process of encoding data and information into an unreadable form FILE MANAGER A utility that performs functions related to file management JOB An operation the processor manages LINUX Open-source operating system MAC OSX The latest version of the Macintosh operating system MEDIA PLAYER Program that allows you to view images, listen to audio, watch video MULTIUSER Operating system that enables two or more users to run programs simultaneously NETWORK ADMINISTRATOR Person overseeing network operations OPERATING SYSTEM Programs that coordinate the activities among computer hardware resources PASSWORD Private combination of characters associated with a user name PHISHING A scam in which a perpetrator attempts to obtain personal information PLATFORM The operating system that a computer uses PLUG AND PLAY The operating system automatically configures new devices QUEUE Where multiple print jobs line up within the buffer SCREENSAVER Causes a monitor's screen to display a moving image SEARCH UTILITY Program that attempts to locate a file based on specified criteria SERVICE PACK Free downloadable updates
SPAM Unsolicited e-mail SPOOLING Sending print jobs to a buffer instead of immediately to the printer SPYWARE Secret program that collects information about a user TROJAN HORSE Malicious-logic program that hides within a legitimate program UNINSTALLER Utility that removes a program and its associated entries in the system files UNIX A multitasking operating system VIRTUAL MEMORY Concept where hard disk functions as additional RAM VIRUS A potentially damaging computer program WARM BOOT Process of restarting a computer that is already powered on WEB FILTERING SOFTWARE A program that restricts access to certain material on the Web WINDOWS READYBOOST Can allocate up to 4 GB of removable flash memory as additional memory cache WORM Malicious-logic program that copies itself repeatedly