/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / ch03terms.dat | < prev | next > |
Comma Seperated Value File | 2008-10-25 | 2KB | 105 rows |
# | Absolute reference | 132 |
---|---|---|
1 | Automatic recalculation | 132 |
2 | Blended threat | 162 |
3 | Bot | 164 |
4 | Botnet | 164 |
5 | BSD license | 150 |
6 | Cell | 130 |
7 | Cell references | 131 |
8 | Clip art | 129 |
9 | Commercial software | 149 |
10 | Computer virus | 163 |
11 | Computer worm | 163 |
12 | Concurrent-use license | 147 |
13 | Copyright | 146 |
14 | Copyright notice | 147 |
15 | Database | 134 |
16 | Demoware | 149 |
17 | Desktop widget | 123 |
18 | Device driver | 124 |
19 | Distribution media | 146 |
20 | EULA | 148 |
21 | Executable file | 152 |
22 | Field | 134 |
23 | Font | 127 |
24 | Footer | 128 |
25 | Format | 127 |
26 | Formula | 131 |
27 | Frames | 129 |
28 | Freeware | 150 |
29 | Fully justified | 128 |
30 | Function | 131 |
31 | GPL | 151 |
32 | Grammar checker | 127 |
33 | Graphics | 137 |
34 | Groupware | 121 |
35 | Hash value | 157 |
36 | Header | 128 |
37 | Keylogger | 163 |
38 | Label | 130 |
39 | Leading | 128 |
40 | Line spacing | 128 |
41 | Local application | 154 |
42 | Mail merge | 129 |
43 | Malicious software | 162 |
44 | Malware | 162 |
45 | Mass-mailing worm | 163 |
46 | Mathematical operators | 131 |
47 | Multiple-user license | 147 |
48 | Natural language query | 136 |
49 | Non-executing zip file | 157 |
50 | Open source software | 150 |
51 | Page layout | 128 |
52 | Paragraph alignment | 128 |
53 | Paragraph style | 128 |
54 | Point size | 127 |
55 | Portable software | 158 |
56 | Product activation | 157 |
57 | Productivity software | 121 |
58 | Proprietary software | 149 |
59 | Public domain software | 149 |
60 | Quarantined file | 169 |
61 | Query | 136 |
62 | Query by example | 136 |
63 | Query language | 136 |
64 | Readability formula | 127 |
65 | Record | 134 |
66 | Relative reference | 132 |
67 | Remote Access Trojan | 163 |
68 | Rootkit | 165 |
69 | Search and Replace | 127 |
70 | Security suite | 166 |
71 | Self-executing zip file | 157 |
72 | Self-installing executable file | 157 |
73 | Service pack | 159 |
74 | Setup program | 154 |
75 | Shareware | 149 |
76 | Shrink-wrap license | 147 |
77 | Single-user license | 147 |
78 | Site license | 147 |
79 | Software installation | 153 |
80 | Software license | 147 |
81 | Software patch | 159 |
82 | Software suite | 144 |
83 | Spelling checker | 126 |
84 | Spelling dictionary | 126 |
85 | Spreadsheet | 130 |
86 | Spyware | 164 |
87 | Style | 128 |
88 | System requirements | 145 |
89 | Table | 129 |
90 | Thesaurus | 127 |
91 | Trojan horse | 163 |
92 | Uninstall routine | 160 |
93 | Unzipped | 156 |
94 | Utility software | 122 |
95 | Value | 130 |
96 | Virus definitions | 168 |
97 | Virus hoax | 166 |
98 | Virus signature | 167 |
99 | Web application | 158 |
100 | What-if analysis | 130 |
101 | Windows Registry | 154 |
102 | Worksheet | 130 |
103 | Zipped | 156 |
104 | Zombie | 164 |