EULA |
End-user license agreement |
piracy |
The illegal copying and distribution of copyrighted software |
Trojan horses |
Used as keyloggers to steal passwords and online accounts. Usually disguised as programs like utilities |
device drivers |
Usually run in the background of a system whenever needed |
utility programs |
Widgets or gadgets that appear on the desktop and display little pieces of information such as a calendar |
platform |
Operating system system that manages computer hardware and software |
malware |
Created by hackers to intentionally damage computers by deleting files, erasing hard drives, stealing information, or slowing computer performance |
font type |
This defines what text characters look like |
text effect |
Shadowing and reflection are examples of this |
font size |
What you need to change to make words appear bigger on the page |
alignment |
The document formatting feature you use to make paragraphs line up with the left side of the page |
line spacing |
You adjust this to control the amount of white space in between rows of text |
scanners |
Types include flatbed, sheet-fed, pen, and handheld |
computer-aided design software |
Used by architects, scientists, interior designers, and engineers to create highly detailed and technically accurate drawings |
Shuttershock |
A Web site where you can download graphics and photos for a fee |
resolution |
The clarity or sharpness of an image |
lossless compression |
When TIFF, PNG, and GIF files can be compressed so the files contain all of their original data when uncompressed |
record |
All of the fields for a single database entry |
query |
A data retrieval tool that finds specified data within a database |
form |
A data entry tool you use to input data into a database |
view |
The display format that you choose when working with a database object on the screen |
table |
A collection of records |
portable software |
Applications that are stored on and run from removable storage devices like CDs, DVDs, or flash drives |
local software |
Applications that are installed on your computer’s hard drive |
mobile software |
Applications that run on smartphones and tablet computers |
Web-based software |
Applications that you access over the Internet |
disk cleanup utility |
Removes unused files like temporary Internet files from your hard drive |
adware |
Displays unsolicited advertisements in banners or pop-up windows |
disk defragmenter |
Reorganizes the data on a magnetic hard drive so that you can access files more quickly |
Recycle Bin |
Not emptying this lets files remain on your computer and take up space |
virus protection |
Software that scans incoming messages and programs to protect your computer |
Discovering Computers, Chapter 4
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price