Academic Reports: Reports That Are Usually Formatted in the MLA Style

Total Page:16

File Type:pdf, Size:1020Kb

Academic Reports: Reports That Are Usually Formatted in the MLA Style

GLOSSARY

1. Academic Achievement: The attainment of educational goals determined by data such as standardized achievement test scores, grades on tests, report cards, grade point averages, and state and local assessments of academic progress. 2. Academic Reports: Reports that are usually formatted in the MLA style. 3. Access: Differentiated by authorized and unauthorized. In order to gain access within the network, you must have permission via a username and password. Use of someone else's username and password constitutes unauthorized access. 4. Alignment: The horizontal positioning (such as left, right, or center) of text. 5. Antivirus Program: A software utility program that searches digital media for programs or pieces of code that are loaded onto technology systems and run without user knowledge or permission. These programs detect viruses and repairs/disinfects files. 6. Aptitude Assessment: An assessment of abilities based on performance of designated tacks. 7. ASCII: A code that stands for American Standard Code for Information Interchange. Computers can only understand numbers, so an ASCII code is the numerical representation of a character. 8. Attitude: An expression of favor or disfavor toward a person, place, thing, or event. 9. Bandwidth: The amount of data that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. 10.Bibliography: An alphabetical listing of all the books and articles consulted by the author of a report. 11.Bit/s: "Bit" is a grouping of the words "binary" and "digits." Think of a bit as a number, a 1 or a 0 to be exact. 12.Blog: An online journal comprised of links and postings in reverse chronological order that is intended to be viewed or commented on by others. 13.Bold: A print enhancement used to make characters appear darker than other text to add emphasis. 14.Bomb: A destructive code or virus designed to activate at a specific time. 15.Bullets and numbering: A word processing feature used to arrange items in a list with each item beginning with a bullet or a number. 16.Business Letters: A letter from a Business to a Business. 17.Byline: The name of the author of a report typed a double space below the title. 18.Byte: A unit of space. The way a computer’s memory is measured (with each stroke or character a byte of memory is used). 19.Career: A profession or field of employment for which one studies or trains, such as financial services or medicine. (See Job.) 20.Career Assessment: An interest inventory or aptitude test. 21.Career Development: The continuous, lifelong progression of growth in occupational knowledge, experience, and work-place readiness in relation to one’s career goal(s). 22.Career Objective: A student’s statement of interest toward seeking future employment in a given occupation based on knowledge obtained from a career assessment, personal experiences, and exploration and discovers experiences, etc. 23.Cell: the box formed at the intersection of a row and a column. 24.Center Justification: An alignment feature that centers text between margins. 25.Chart: A sheet of information in the form of a table, graph, or diagram. 26.Clip Art: Graphic images that can be inserted into documents. 27.Close: a software command that enables you to exit the current document without exiting from the program. 28.Columns: Information arranged vertically. 29.Commercial Software: Software whose copyright is owned by the author/software publisher. 30.Computer Ethics: A set of moral principles or values while using technology and the internet. 31.Computer Virus: A worm or a self-replicating program that can spread by email or by inserting copies of itself into other programs or documents. 32.Confidentiality: Not talking about business with other people. 33.Cooperative: Willing to work well with other to reach a common goal. 34.Copy: A command that allows you to create a duplicate of a selected item and move it to the clipboard. 35.Copyright: Protection giving the owner the exclusive right to reproduce or distribute copies of his or her own work. 36.CPU, Central Processing Unit or Microprocessor: Controls how data is stored and directs the flow of data and is often referred to as the brain of the computer. 37.Cut: A command that allows you to delete a selected item from its original location and move it to another location. 38.Cyberbullying: Using technologies, including e-mail, Web sites, instant messages, and cellular telephones, to deliberately harass, threaten, or intimidate someone. 39.Cyber safety: Is the ability to act in a safe and responsible manner on the Internet and other connected environments. 40.Data: Discrete pieces of information that can be organized for analysis or used for decision making. 41.Data Encryption: Converting data into a code that cannot be easily understood by unauthorized individuals. 42.Dependable: Able to be trusted and to do or provide what is needed. 43.Desktop Publishing: Special software or software features that enable you to design and create documents such as newsletters, flyers, and brochures. 44.Design Templates: A preformatted slide layout that includes colors, backgrounds, text styles, and other designs. 45.Diagram: A simplified drawing showing the appearance, structure, or workings of something; a schematic representation. 46.Digital Citizen(ship): The responsible, ethical, legal, and safe use of technology systems by individuals as members of society and citizens of the global community. 47.Digital Footprint: On the internet a digital footprint is the word used to describe the trail, traces or “footprints” that people leave online. This is information transmitted online, such as forum registration, emails and attachments, uploading videos or digital images and any other form of transmission of information – all of which leaves traces of personal information about yourself available to others online. 48.Digital Media: 1. Any form of information, including text, graphics, audio, and video, that is stored on a technology system or device. 2. Any storage device that holds digital content, including Universal Series Bus (USB) drives, music player (MP) 3 devices, compact diskettes (CDs), and digital video diskettes (DVDs). 49.Digital Tools: Hardware or software that aids in gathering data, organizing information, and creating products. Examples: word processing software, concept mapping tools, spreadsheet software, probes, personal digital assistants. 50.Dress Code: A set of rules or guidelines regarding the manner of dress acceptable. 51.Drop Cap: A large first letter that drops below the regular text. 52.Edit: The menu used to make a change to information in a file. 53.Educational Plan: A developmental plan used to ensure that students’ academic, social, emotional, and career and technical needs are addressed within their school environment. This four year individualized student plan provides a seamless transition from high school to further education or employment. 54.Effort: The use of physical or mental energy to do something. 55.Endnotes: Indicated in the body of a report and are consecutively numbered. They appear at the end of a report, either on the last page or a separate page. 56.Enumeration – A hacking technique that can be transmitted in a fixed amount of time. For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second. 57.Employee Benefit: Employee benefit: Compensation that an employee receives in addition to a wage or salary. Examples include health insurance, life insurance, childcare, and subsidized meals. 58.Ergonomics: The applied science of equipment design intended to maximize productivity by reducing user fatigue and discomfort. Something that is ergonomic is designed for safe, comfortable, and efficient use. 59.Exit: The command used to close a program. 60.Export: Export is a command usually found within a program's File menu (File → Export...). It is similar to the File → Save As... command, but is typically used for more specific purposes. For example, instead of simply saving a file with a different name or different format, "Export" might be used to save parts of a file, create a backup copy of a file, or save a file with customized settings; to move computer information from one computer to another, from one computer document to another, or from one piece of software to another. 61.File: A document or a collection of related records. 62.File Name: A unique name given to a document so that it can be saved and retrieved. 63.Firewall: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. 64.Font: A set of type characters of a particular design and size. 65.Footnotes: Indicated in the body of a report and are consecutively numbered. They appear at the bottom of the page on which the reference appears. 66.Format: The menu used to apply settings to control the appearance of text, paragraphs, and pages. 67.Formatting Toolbar: Contains buttons and boxes you can click to use common formatting features. 68.Formula: A mathematical expression that solves a problem. 69.Freeware: Software that is given away free of charge, but whose author still retains all rights. 70.Full Justification: an alignment feature that aligns text at the left and right margins by adding a space between characters. 71.Function Keys: Special keys located at the top of the keyboard that are used alone or with the Ctrl, Alt, and Shift keys to execute software commands. 72.Global Awareness: A conceptual understanding of global and cultural perspectives, including social, economic, cultural, political, and environmental factors. 73.Gigabyte (GB) It's about a billion bytes. Actually it's 2 to the 30th power or 1,073,741,824. 74.Graphics: Pictures, clip art, bar graphs, pie charts, or other images available on or created on a computer. 75.Graphic organizer: Visual representations of knowledge, concepts or ideas. 76.Gridlines: The lines appearing around the cells in a table. 77.Gross pay: Wages or salary before deductions for taxes and other purposes. 78.Hard Disk: A Hard disk or Hard Drive is a magnetic disk that the computer stores data on. Read and write times to this type of storage is much faster than floppy disks and is the most common media to store data on with computers. 79.Hacker: A person who secretly gains access to computers and files without permission. 80.Hacking: A generic term for penetrating a computer or computer system with malicious functionality, or the spreading of viruses, worms, and other malicious software code. 81.Hardware: Any part of a computer system that you can see or touch. 82.Help: On-screen information about how to use a program and its features. 83.Hoax: A program intended to scare users into thinking they have a virus. 84.Horizontal Ruler: Appears below the Formatting toolbar and shows the left and right margins. 85.Hyperlink: A word, phrase, or image that you can click on to jump to a new document or new section within the current document or application. 86.Import: Import is a command typically located within a program's File menu (File → Import...). Like the standard File → Open... command, Import is used for opening files, but it serves a more specific purpose. Instead of opening standard file types, Import is often used for importing parts of files, program settings, plug- ins, or other unconventional file formats; refers to the ability of an application to read and use data produced by a different application 87.Income: Money earned from investments and employment. 88.Information Technology: computers, networks, systems, and peripherals used to create, communicate, process, and store digital information. 89.Information Technology Ethics: The study of ethics and ethical behavior as it relates to the use of Information Technology. 90.Initiative: Doing what needs to be done without being told. 91.Integrity: The quality of being honest and fair. 92.Input: The ability to give the computer commands and feed it information, ex. Keyboard, mouse, digital cameras, scanners, etc. 93.Input Device: Any device that feeds data into a computer. Examples: keyboard, mouse, stylus, touch screen. 94.Insert: A software Menu and command that enables you to add text, page and column breaks, graphics, tables, charts, cells, row, columns, formulas, dates, time, fields, and so on, to a document. 95.Insertion Point: Indicates where you are located in a document. If it is displayed at the end of the document, it is also called the End-of-Document marker. 96.Instant Messaging (IM): Exchanging text messages between two or more individuals through a software application in real-time. 97.Integrity - (As in data integrity) Refers to the validity of data. 98.Interest Inventory/Assessment: A self-assessment tool that measures and individual’s interests in a broad range of occupations, work activities, leisure activities, and school subjects. 99.Italic: A special font attribute used to highlight text. 100. Intellectual Property: Property of the mind; property (as an idea, invention, or process) that derives from the work of the mind or intellect. 101. Kilobyte (KB): This is about a thousand bytes of space. In reality, it's two to the 10th power or 1,024 bytes. 102. Landscape: Page orientation in which data prints across the wider portion of the page. 103. Left Justification: A command used to align text at the left margin. 104. Letterhead: Stationery that has information such as the company name, address, and telephone number printed at the top. 105. Line Spacing: A software command that enables you to set the amount of space between the lines of type. 106. Malware: Software designed to interfere with a computer's normal functioning 107. Margins: The blank space at the top, bottom, left, and right sides of a document. 108. Megabyte (MB): About a million bytes of space. Actually its 2 raised to the 20th power or 1,048,576 bytes of space. 109. MLA or (Modern Language Association): The format used for Academic Reports. 110. Military Style Date: A date typed in the following sequence: day, month, and year (12 March (year): 111. Motherboard: A Motherboard is the main circuit board in your computer that the CPU, memory, video cards, etc plug into. 112. Move: The command that is used to select an item from one storage location to another. 113. MP3 - A type of software compression used to compress music files at near-CD quality for easy transmission over the Internet. 114. Multimedia Presentation: Using any combination of text, graphics, audio, or video to present information. 115. Netiquette: The correct or acceptable way of communicating on the Internet. 116. Network: A group of two or more computer systems linked together to share information Technology. 117. Networked Technology System: Any technology system that includes hardware, software, or peripherals and connects with other technological systems using cables or wireless frequencies. 118. Newsletters: One of the best ways to communicate a variety of information to a wide range of people. 119. Non Verbal Communication: Gestures and facial expressions, that do not involve verbal communication but which may include nonverbal aspects of speech itself (accent, tone of voice, speed of speaking, etc.) 120. Open: The command that is used to retrieve a file that was previously created and saved (an existing file). 121. Operating System: The first software program to load into a technology system’s main memory when the device is turned on. It manages all other programs of a technology system. 122. Opportunity cost: The value of possible alternatives that a person gives up when making one choice instead of another; also known as a trade-off. 123. Organizational Chart: A diagram of the relationships and responsibilities of individuals or functional departments within your business. 124. Output or Output Devices: Any device capable of representing information from a technology system and designed to serve the user. Examples: printer, plotter, display screen, Monitor, speakers, disk drives, pin drives, etc. 125. Page Orientation: The direction in which you can print on a page. 126. Password: A safeguard for access to a computer or computer program. 127. Paste: The command used to insert an item from the clipboard into a document. 128. Personal Business Letter: A letter from an individual to a business. 129. Pie Chart: A graphic illustration of spreadsheet data that compares the sizes of pieces to a whole. 130. Piracy: The illegal copying and distribution of software. These crimes may be punishable by fines and imprisonment. 131. Plagiarism: The act of using another person’s words or ideas without giving credit to that person; the act of plagiarizing something. 132. Podcast: A digital media file or collection of digital media files distributed over the Internet for playback on portable media players and other technology systems. 133. Portrait: Page orientation in which the data prints across the narrower portion of a page. 134. PowerPoint: A multimedia Presentation software application used to create slide show presentations. 135. Presentation: A set of slides and/or handouts that contain information you want to convey to an audience. 136. Print: The command used to print a document. 137. Print Preview: A command that enables you to view an entire document before it is printed. 138. Proofreaders’ Marks: Symbols on a document that indicate changes to be made. 139. Public Domain: Software that is not copyrighted and is free to copy and distribute. 140. Punctual: Arriving or doing something at the time expected or planned time. 141. RAM or Random Access Memory: A computer’s main memory which is used to constantly and temporarily store information. 142. ROM: A computer’s permanent and long term memory, on which data has been prerecorded. ROM retains its contents even when the computer is turned off. Once data has been written onto a ROM chip, it cannot be removed and can only be read. 143. Responsible: Willingness to accept an obligation and to be accountable for an action or situation. 144. Resume: A summary of your training, background, and qualifications for the job. 145. Ribbon: Contains all of the commands you will need to perform common tasks in Word. Its multiple tab feature contains several groups of commands. 146. Right Justification: A command that used to align text at the right margin. 147. Rows: Information arranged horizontally. 148. Salary: Compensation for work, expressed as an annual sum and paid in prorated portions regularly— usually weekly, bi-weekly, or monthly. (See Wage.) 149. Save: The command used to store a file on a disk. 150. Save As: The command used to store a file as a different name or in another location. 151. Scroll Bars: Allow you to see parts of a document that are not currently visible on the screen. 152. Shading: A command used to add fill to cells or boxes to add visual interest. 153. Shareware: Copyrighted software distributed free of charge on a trial basis with payment by the honor system. 154. Simulation Software – Programs that imitate real phenomena. The programs model real-world situations and processes such as weather conditions, chemical reactions, construction models, economic trends, and management of virtual businesses; can be used to design and test equipment without actually building the equipment. 155. Site License: Legal authorization to install and use commercial software on more than one computer located at a particular location (site). Typcially site licenses permit installation of the software onto a specific maximum number of computers, or sometimes it allows 156. Slide Layout: A preformatted slide layout that determines the placement of text and objects on the slide. 157. Social Networking – Online communities of people who share interests and activities, or who are interested in exploring the interests and activities of others. 158. Software: A set of electronic instructions that tell the computer what to do. 159. Special Characters: Unusual characters that is not available on the regular keyboard. 160. Spell Check: A command that checks the spelling of words in a document. 161. Spreadsheet: A software program that enables you to perform various calculations on data. 162. Standard toolbar: Contains buttons that you can click to quickly use some of Word’s common menu commands. 163. Start Button: Allows you to open menus and start applications. 164. SUM Function: A built-in spreadsheet formula that adds a range of cells. 165. Table: A grid of rows and columns that intersect to form cells into which information can be typed. 166. Taskbar: Contains shortcuts to applications, the date and time, and more and allows you to switch between different programs. 167. Task Pane: Appears on the right side of the screen and offers option on creating and opening documents. 168. Tax: A government fee on business and individual income, activities, or products. 169. Teamwork: Cooperative or coordinated effort on the part of a group of persons acting together as a team or tin the interests of a common cause. 170. Template: A predefined document format. 171. Technology System – Any technology device that includes hardware, software, or peripherals. Examples: computers, cellular telephones, personal digital assistants, MP3 devices. 172. Textbox: A created box that can contain text and/or art. 173. Time Management: Act or process of planning and exercising conscious control over the amount of time spent on specific activities, especially to increase effectiveness, efficiency or productivity. 174. Title Bar: Lists the name of the document and software program next to it. 175. Trojan Horse: A virus that is disguised as a useful piece of software. 176. Troubleshoot: To analyze a technology system that is not operating correctly and then apply strategies to solve problems. 177. Undo: A command that allows you to reverse an action or command. 178. Verbal Communication: Act of conveying messages, ideas, or feelings through the use of mouth. 179. Vertical Ruler: Appears at the left of the screen and shows the tope and bottom margins. 180. Virus: A computer program or piece of code that loaded onto a technology system designed to cause damage to computer files. 181. Wage: Compensation for work, usually calculated on an hourly, daily, or piecework basis and paid on schedule—usually weekly, biweekly, or monthly. (See Salary.) 182. Wiki: Server software that allows users to collaboratively create, edit, and link Web pages using any Web browser. 183. Windows Flip: Allows you to scroll through a preview of your open windows by pressing the Alt key+Tab. 184. Windows Peek: Allows you to view open windows on the taskbar by hovering the mouse over an icon in the taskbar. 185. Windows Shake: Allows you to select a single window and minimize the rest; prevents the desktop from being cluttered with open windows by shaking the mouse to select a single window. 186. Windows Snap: Allows you resize and open windows quickly by clicking, holding and dragging the desired window to the left or right until the cursor reaches the edge of the screen. 187. Windows XP: An operating system and a graphical user interface that allows you to use different types of applications or software. 188. Word Processing: An operation or process by which written, verbal or recorded information is transformed into typewritten or printed information. 189. Word Wrap: The automatic wrapping of text from the end of one line to the beginning of the next line. 190. Word Art: A word processing feature used to create special effects with text. 191. Workplace Etiquette: A code that governs the expectations of social behavior in a workplace, in a group or society. 192. Worksheet: A spreadsheet form that enables you to input data and formulas. 193. Worm – A destructive computer program or algorithm that replicates itself over a network without user knowledge or permission and performs malicious actions, including depleting system resources or shutting down system. 194. Written Communication: Communication by means of written letters, words, or symbols. 195. X-Axis: A horizontal bar-chart scale that displays a range of values. 196. Y-Axis: A vertical bar-chart scaled that display a range of values. 197. Zoom: A command used to enlarge or reduce an image on the screen.

Recommended publications