Spreadsheet Flash Cards Flashcards

Computer program
Terms Definitions
Ergonomics is an applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace environment.
Microsoft Excel is a program that is used to make spread sheets.
VLOOKUP usually refers to searching a data structure for an item that satisfies some specified property.
A computer software used for accounting. figures and facts can be arranged in the rows and columns.
A cell is the intersection point of a column or row.
The allocation of a job or task that someone receives.
Board, schedule, chart list.
A formula is a mathematical relationship or rule expressed in symbols.
Autofill is a formula short cut that completes what has been done before.
Layout diagrams are hand drawn prior to creating the solution on a computer.
Means to alter the appearance of a document by changing features such as fonts, margins, spacing, columns, tables, graphics, borders, page numbers, headers and footers.
a range check determines whether a number is within a specified range.
The quality of having the properties that are right for a specific purpose.
Dependability, the quality of being dependable or reliable.
The quality or state of being correct or precise.
Not affected by the passage of time or changes in fashion.
Vested Interest
A personal stake or involvement in an undertaking or state of affairs, esp. one with an expectation of financial gain.
A particular point of time when something happens.
Data Validation
In computer science, data validation is the process of ensuring that a program operates on clean, correct and useful data.
Computer literate
Has familiarity with and has developed an understanding of computers and their uses.
Input devices
input devices are keyboards and barcode readers, and they communicate data to the computer in a form it can understand.
Bias can infiltrate data if the respondent to a survey or interview has a vested interest in the outcome of the research.
A report contains information that is presented in an organised form.
A detailed report contains precise information relating to all parameters affecting in decision making.
An exception report identifies data outside of a normal condition or a previously determined range.
A hard copy is the original copy of something. Sometimes if you are going to get a license they need the hard copy of your birth certificate.
Mail Merge
The automatic addition of names and addresses from a database to letters and envelopes in order to facilitate sending mail.
Combine or cause to combine to form a single entity, esp. a commercial organization.
Leader dots
Leader dots are to improve presentation and alignment.
A facility in a word-processing program, or a device on a typewriter, used for advancing to a sequence of set positions in tabular work.
something (such as a fact or circumstance) that shows an action to be reasonable or necessary.
The way in which something is arranged or set out.
Paper Medium
information displayed on paper is likely to contain several types of data. Eg letters, documents, reports and memos. Which are generally text data.
Electronic Medium
Electronic medium consists of text, numerical, graphical, sound and moving animations.
Intellectual Property
Intellectual Property rights are the rights to which creators are entitled for their inventions, writings and work of art.
Software Privacy
Software theft can take many forms, from someone physically stealing media that contains software, to illegally burning CD’s, to loading a software program onto more than one computer, to international piracy of software through the internet.
Information theft
Information is a valuable asset to a company. Information theft occurs when someone steals personal or confidential information. The loss of information can cause as much damage as if not more than the theft of hardware and software.
Hacking is another way that the ownership of information can be compromised. Hackers are individuals who gain unauthorized access to computer to computer systems for the purpose of stealing and corrupting data and information.
Music and movie downloading
A popular type of breaching copyright is the downloading and sharing of music and movies. Usually this is performed using peer-to-peer file sharing programs on the internet such as Kazaa and Bit Torrent. These programs do not promote the illegal copying of music and movies, but do facilitate it.
There are different types of electronic commerce, or e-commerce, based on the use of the internet. E-commerce is fast becoming an alternative to some types of normal commerce B2B (business-to-business), B2C (Business-to-customer) and C2C (customer-to-customer), B2B allows companies to buy and sell in a well –controlled environment.
Internet Ethics
In order to foster ethical behaviour with the use and development of the internet, various codes of ethics have been developed for all internet stakeholders- developers of a websites, information providers and users of the internet in order to make the internet a safe for themselves or others. The codes of ethics place obligations and responsibilities on those to whom it applies to.
Censorship on the internet occurs because parents, schools, businesses, countries and other authorities may wish to control access to sites relating to pornography, racial hatred, terrorism incitement, bomb making, and euthanasia and suicide.
/ 42

Leave a Comment ({[ getComments().length ]})

Comments ({[ getComments().length ]})


{[ comment.comment ]}

View All {[ getComments().length ]} Comments
Ask a homework question - tutors are online