Terminology C

Edit Answers
HG.LM.RPCBSLLEVTSCUTFZXXS VKMVEBXCXDHEJFKOMSN.RUPDH .JGMFOY.HNBKBCSXZNENWYPCB YKWURQ.EMIRCREBYCUOMRZPYP COMPRESSION.C.KAHXPUHEDIJ NRKT.SICCLTCOOAIHMALCU.NA ETU.JUCQROWARCNTVF.OXC.UK RYKSLIOHHIPXVRCCNLECIWFYZ RNDSRTGXSDTYNFX.AUCW.LTKX U.HCACOUNT.ERWEIKTOTWZ.KC CTDXAFY..HPCRICJZUECALYXO OVNCWZDCEYJKHIGKJJCNL.PRU TNSMIVROCCCUWHAHKNXWAZOXN PQTYDLFAQRNNDCQ.TJPCDTCOT YNCKZINCNOAEEJCYQ.GLGBEFB RUQ.TTOGGDQCGRQM.QFIEVJ.L CD.NEOLRQDOGKRRMSWTPCBTUA DOUVKLHQQFRMKIEUY.MBGTILN ZOIISICOMMENTSNVCJEO.CVRK CIEMRCTORCQWUFCGNERATMZP. A.QGNIDNUFDWORCE.OGRNOLSL C.YTIRUCESREBYCKDTCDES.DN UPGKFCLICKBAITKCCQF.I.LEM TWUQLRM.KSITAOEZKUOGLWSSX BP..OBGLQYXAXJFLSYVQCCLZE
1.
Term given to an online link in the form of an image, highly-styled text, or video thumbnail to encourage the user to click on it. The text is usually very evocative and the image of a shocking nature.
2.
A computer that connects to a network and accesses a main server is called a client. A client machine is normally a workstation that accesses the resources being made available via the server and the network infrastructure.
3.
The clipboard is a temporary storage area in the computer's memory for holding information that has been cut or copied. That information can then be pasted elsewhere.
4.
Complementary metal oxide semiconductor. A chip on the motherboard powered by a small battery which stores the basic input, output systems, bio settings such as date, time and certain hardware settings.
5.
Content Management system. An online application that allows a user to create and maintain content in various forms. Those forms could be a personal block, corporate block, or fully fledged website, or even a private Intranet. The application runs online
6.
Cyan, magenta, yellow and key black. For printers that use coloured ink, these 4 colours are used in separate cartridges. By mixing the colours in varying quantities, various colours can be produced.
7.
Vertical range of data consisting of cells either in a table or a spreadsheet. In a spreadsheet, a column is indicated by a letter in the top row. Columns in Word processing and spreadsheet documents might also contain column headers which allow for sorti
8.
. In an application such as Microsoft Word, in the Review section in the ribbon, the Comments option allows a user to leave comments in documents, to suggest editing changes, or merely to comment on something regarding the content.
9.
Using very efficient algorithms, compression software is able to take a digital file and squash or compress it in order to make the file size even smaller. Compression software is also able to take multiple files and compress them into one file.
10.
A function in Microsoft Excel and other spreadsheet applications that combine or join two or more strings into one string.
11.
A term to explain the combining of many technologies into a single device. Where devices previously used to be single purpose, they are now capable of executing many different tasks previously done by numerous single purpose devices.
12.
A small text file saved onto your computer by a website. The website stores information regarding your visit to the site, such as which pages you have seen, what items you may have put into a shopping cart the previous time you were there, or what prefere
13.
Duplicating an object or selected text to the clipboard in order to paste it elsewhere, be it in a folder or in a document. Shortcut key for this is Control + C.
14.
An intellectual property law that protects someone's original work. By using someone else's work without consent, or by copying someone else's work and claiming it as your own, you are infringing upon the copyright of that person.
15.
A function in Microsoft Excel and other spreadsheet applications. The COUNT function counts the number of cells in a specific range that contain only a number.
16.
A function in Microsoft Excel and other spreadsheet applications. The COUNTA function counts the number of cells in a specific range that contains a number and or Tex.
17.
A function in Microsoft Excel and other spreadsheet applications. The COUNTBLANK function counts the number of cells in a specified range that are empty.
18.
A function in Microsoft Excel and other spreadsheet applications. The COUNTIF function counts the number of cells in a specified range that meet a given criteria only.
19.
Central processing unit. Often referred to as the brain of the computer, the CPU in essence is a very fast calculator that processes all the instructions that control the data flow inside the computer. The CPU consists of two parts, the control unit and t
20.
access memory and executes them, and the arithmetic logic unit performs the mathematics and logical functions.
21.
A methodology employed or an application created to bypass the security of a computer system or to edit the source code of a software application to remove restrictions such as registration or product key entry.
22.
When you create a query using Microsoft Access, the criteria allow you to filter your request to include or exclude specific information relating to a field. For example, a gym could run a query displaying all the members of the gym but set criteria that
23.
A method of raising money to go towards a business venture, not-for-profit activity or social course. The money is raised by communicating via Internet and social media platforms. People contribute funds into an account without any guarantee or return on
24.
A digital currency that is purchased, transferred, and sold using cryptography. The data that is part of the transaction is encrypted and verified by a network of computers that have no relation to each other or any particular entity. This means that tran
25.
(Cascading Style Sheets) Code, often contained in a text file with a CSS extension that specifies how Hypertext Markup Language (HTML) elements, ID's, fonts and attributes should be formatted. CSS allows a user to separate the HTML textual content and the
26.
(comma- separated values). Tabular data are saved in a plain text format with each fields data separated by a comma. A CSV file is used when exporting data from one database system and importing it into another.
27.
Call to action. A marketing term used extensively in sales and advertising. An image or button on a web page designed to grab attention and entice users to click on the image or button. The image or button could be another page on the site with important
28.
A formatting option in Microsoft Excel and other spreadsheet applications. The data in a cell or range of cells can be formatted to be displayed as monetary data, provided the data consists of numbers only.
29.
Removing an object or selected text from its original location and placing it onto the clipboard in order to paste it elsewhere, be it in a folder or in a document. Or to delete it if paste is not used.
30.
Criminal activities that involve the use of computer technology and the Internet.
31.
Process and technologies that have been created to protect computers and networks from illegal online access. Online attacks will always try and find entry points into systems. It is the responsibility of cybersecurity systems to ensure that no entry poin