SlideShare a Scribd company logo
1 of 1
Israel Suarez                                 6-7 Period                                         9-5-12


    1. Carpal Tunnel Syndrome- Severe hand or wrist pain due to an inflammation of the tendons in a
        user’s hand and wrist; often a result of overuse in combination with an improper physical
        environment.
    2. Computer User Support - A job function or department in an organization that provides
        information and services to workers or clients to help them use computers more productively in
        their employment or at home.
    3. Computer Virus - A piece of software created with malicious intent that can destroy information,
        erase or corrupt other software or data, or adversely affect the operation of a computer that is
        infected by the virus.
    4. Ergonomics- The study of how to design a workspace that promotes user health, safety, and
        productivity.
    5. GUI- Screen images that enable users to access program features and functions intuitively, using
        a mouse or other pointing device.
    6. Help Desk- A single point of contact for users in need of support services, whether in-house
        employees or external clients; a help desk may provide information and problem-solving
        services face to face, by telephone, by e-mail, or by an online chat session.
    7. Needs Analysis- An investigation to determine the features and configuration of hardware and
        software that will best match a user’s specific needs; also called needs assessment.
    8. Piracy- theft of computer resources such as software, services, or date; often involves illegal
        copying, distribution, or use of computer programs or information
    9. Technical Support – A level of user support that focuses on high- level troubleshooting and
        problem solving; whereas computer user support deals with broad spectrum of support issues,
        technical support usually deals with more advanced and difficult problems that users encounter.
    10. Total Cost of Ownership TCO- The total expenditures necessary to purchase, maintain, upgrade,
        and support an end user’s personal computer system over its expected useful lifetime; TCO
        includes hardware, software, network connectivity, information, training, and technical support
        costs.

More Related Content

Similar to Chapter 1 key terms

Itsm training
Itsm trainingItsm training
Itsm training
rhootan
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
Vijender Yadav
 

Similar to Chapter 1 key terms (20)

Tech 224-online-worksheet 1
Tech 224-online-worksheet 1Tech 224-online-worksheet 1
Tech 224-online-worksheet 1
 
IT Policy
IT Policy IT Policy
IT Policy
 
L49 slides
L49 slidesL49 slides
L49 slides
 
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGNSIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
SIWES REPORT ON NETWORKING AND BASIC WEB DESIGN
 
Itsm training
Itsm trainingItsm training
Itsm training
 
Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011Top 10 IT Security Issues 2011
Top 10 IT Security Issues 2011
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Ijricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individualityIjricit 01-004 progressive and translucent user individuality
Ijricit 01-004 progressive and translucent user individuality
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
mini-solution.pdf
mini-solution.pdfmini-solution.pdf
mini-solution.pdf
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 
Propalms Centralized Computing Solution Document
Propalms Centralized Computing   Solution DocumentPropalms Centralized Computing   Solution Document
Propalms Centralized Computing Solution Document
 
Exploring Electronic Tables.pptx
Exploring Electronic Tables.pptxExploring Electronic Tables.pptx
Exploring Electronic Tables.pptx
 
Microsoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop WhitepaperMicrosoft India – Managing the Dynamic Desktop Whitepaper
Microsoft India – Managing the Dynamic Desktop Whitepaper
 
Muralidhara_ppt_on_Desktop_Notifier.pptx
Muralidhara_ppt_on_Desktop_Notifier.pptxMuralidhara_ppt_on_Desktop_Notifier.pptx
Muralidhara_ppt_on_Desktop_Notifier.pptx
 
Network security
Network securityNetwork security
Network security
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
A+
A+A+
A+
 
Lessons About Mobile in Higher Education
Lessons About Mobile in Higher EducationLessons About Mobile in Higher Education
Lessons About Mobile in Higher Education
 
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptxYesist 12 PRESENTATION ON SECURE MOBILITY.pptx
Yesist 12 PRESENTATION ON SECURE MOBILITY.pptx
 

Chapter 1 key terms

  • 1. Israel Suarez 6-7 Period 9-5-12 1. Carpal Tunnel Syndrome- Severe hand or wrist pain due to an inflammation of the tendons in a user’s hand and wrist; often a result of overuse in combination with an improper physical environment. 2. Computer User Support - A job function or department in an organization that provides information and services to workers or clients to help them use computers more productively in their employment or at home. 3. Computer Virus - A piece of software created with malicious intent that can destroy information, erase or corrupt other software or data, or adversely affect the operation of a computer that is infected by the virus. 4. Ergonomics- The study of how to design a workspace that promotes user health, safety, and productivity. 5. GUI- Screen images that enable users to access program features and functions intuitively, using a mouse or other pointing device. 6. Help Desk- A single point of contact for users in need of support services, whether in-house employees or external clients; a help desk may provide information and problem-solving services face to face, by telephone, by e-mail, or by an online chat session. 7. Needs Analysis- An investigation to determine the features and configuration of hardware and software that will best match a user’s specific needs; also called needs assessment. 8. Piracy- theft of computer resources such as software, services, or date; often involves illegal copying, distribution, or use of computer programs or information 9. Technical Support – A level of user support that focuses on high- level troubleshooting and problem solving; whereas computer user support deals with broad spectrum of support issues, technical support usually deals with more advanced and difficult problems that users encounter. 10. Total Cost of Ownership TCO- The total expenditures necessary to purchase, maintain, upgrade, and support an end user’s personal computer system over its expected useful lifetime; TCO includes hardware, software, network connectivity, information, training, and technical support costs.