Documente Academic
Documente Profesional
Documente Cultură
2
26. What do you call a tool that allows you to extract information that meets certain
criteria?
(Query)
27. What does updating a file mean?
(Change fields, add new records, or delete old ones.)
28. What do you call a technique which consists of combing a database with a document
made with a word processor in order to personalize a standard letter?
(mail merge)
29. What program used for displaying web pages?
(Web browser)
30. Where your ISP stores your emails?
(Mail server)
31. What do you call a system used to distribute email to many different subscribers at
once?
(Mailing list)
32. What program used to read and send email from a computer?
(Mail program)
33. What is a part of an email address that identifies the user of the service?
(Username)
34. What do you call a computer file which is sent along with an email message?
(Attachment)
35. Why is videoconferencing so useful for virtual groups?
(It enables the virtual group to communicate easily over a long distance and
share the ideas & information as if they were in the same room)
36. What special hardware and software do you need to videoconference?
(A webcam, microphone, and conferencing programs such as NetMeeting or
CUSeeMe)
37. Which technology enables people to make phone calls over the internet?
(VoIP – Voice over Internet Protocol or internet telephony)
38. What is the difference between web chat rooms and Instant Messaging?
(Web chat room allow multiple users to join in a conversation & see what all
the other people are typing. IM refers to chatting with a select person on a
group of people)
39. What is netiquette?
(a general code of behavior for communicating online)
40. What do you call a big system of public discussion groups?
(Newsgroups)
41. What are ‘computer graphics’?
(Pictures and drawings produced by computer)
3
42. How does a worm spread itself?
(A worm spreads through email attachment ,and replicates itself and sends a
copy to everyone in an address book )
43. In what ways can a virus enter a computer system?
(A virus can enter a computer system via an infected disc or via Internet)
44. What do “encryption” and “decryption” mean?
(Encryption changes data into secret code so that only someone with a key
can read it. Decryption converts encrypted data back into its original form.)
45. What is compositing?
(Compositing is combining parts of different images to create a single image)
46. What do “filters”, “wireframe”, “rendering”, and “fractals” mean?
(Filters: special effects that can be applied to pictures
Wireframe: the drawing of a model by using features like edges or contour
lines
Rendering: a technique that generates realistic reflections, shadows and
highlights
Fractals: geometrical figures with special properties)
47. What are toolbox, primitives, attributes, and translation?
(Toolbox: a collection of drawing and painting tools that enable you to type,
select, draw, paint, edit, move & view images on the computer)
Primitive: the basic shapes which are used to make graphic objects
Attribute: color, line type, fill area, interior style… of each primitive
Translation: moving an object to a different location
48. What type of software is used for reading PDF files?
(Adobe Acrobat Reader)
48’.What type of software is used for the creation of DTP documents?
(DTP software)
49. Differences between DTP and word processing?
(DTP software uses high-quality scalable fonts & give you control over
typographic features such as kerning. Key feature of DTP software is text
flow to put text around graphic objects in a variety of ways)
50. What is a PDF and what can it do?
(PDF stands for Portable Document Format, it allows people to view, search,
and print documents exactly as the publisher intended, it can be published
and distributed anywhere)
51. What are kerning, text flow?
(Kerning: the process of adjusting the space between characters
Text flow: the ability to put text around graphic objects in variety of ways.)