Glossary
- Absolute reference
-
The cell reference in the formula is constant (always use the same cell) even when it is copied to other cells. Is also called absolute cell reference.
- Adjacent
-
Close to or next to.
- Adware
-
Software that gathers information regarding a person’s browsing patterns and then displays related advertisements in their Web browser.
- Application software
-
May also be called application program, app, or application. May consist of one or several programs that allow the user to perform certain tasks or activities. Requires the system software to run it. All apps are programs, but not all programs are apps.
- Argument
-
The independent variable of a function.
- Ascending sort
-
Organizes the information from A to Z or from the smallest number to the largest number.
- Banded
-
Having strips or bands of contrasting colors.
- Breach
-
A prohibited disclosure or use of protected health information (PHI), which compromises the security or privacy of the information.
- Cell
-
A single box on a table or spreadsheet that can contain text or numbers.
- Cell reference
-
A unique name or address of cell that is based on a set of coordinates that a cell occupies on a worksheet. For example, a cell that appears in column C and in row 8 is C8.
- Click
-
Describes the action of pressing on the left or right mouse button; can be one or more clicks.
- Collated
-
Assembled in a specific way.
- Color gradient
-
A set of colors arranged in order to provide a smooth color transition. For example, the bottom of the area may be green, and the top may be blue. A variety of shades are arranged in order to provide a smooth transition between the green color and blue color.
- Column
-
Any of two or more vertical sections of type on a document.
- Column heading
-
Also known as column headers. The shaded area at the top of the column and contains a letter or a series of letters (e.g., XA, BB). By clicking the column header, the user selects the entire column. The column width can be changed by dragging the line to the right of the heading.
- Confidentiality
-
A legally protected right of patients. An ethical duty of designated healthcare professionals to keep patient information private.
- Contextual tab
-
A hidden tab on the Office ribbon that becomes visible when a specific item is selected, or a certain task is done by the user. For instance, when a picture is selected, the Picture Format tab appears on the tab row.
- Cookies
-
Allows a website to collect information during the user’s visit to the site.
- Cybersecurity
-
Actions taken to be safe from electronic crime.
- Default
-
The preset selection of an option offered by a system and will always be used unless the user changes it.
- Descending sort
-
Organizes the information from Z to A or from the largest number to the smallest number.
- Desktop
-
The main screen display of a personal computer where icons, windows and other items appear.
- Dialog box
-
A dialog box displays information and allows the user to interact with it. For instance, when the dialog box launcher is clicked, a dialog box appears. Unlike a window, most dialog boxes do not contain a maximize and minimize button, just a close button.
- Dialog box launcher
-
A button (with a picture of an arrow) found on the lower right corner of Ribbon groups that is used to open the dialog box.
- Electronic health records (EHRs)
-
A computerized software system that maintains patient health information, which can be created, managed, and consulted by authorized healthcare professionals and providers from more than one healthcare organization.
- File
-
A named collection of information, in the form of text, programs, graphics, etc., held on a permanent storage device such as a C drive or flash drive.
- File Management
-
Also called filed maintenance, copying, renaming, relocating and deleting files in the computer.
- Fill handle
-
A tool indicated by a plus sign cursor that is observed when the user moves the cursor to the bottom right corner of a selected cell or cell range in Excel. This tool is used to fill or extend a series or data.
- Fill Handles
-
A tool indicated by a plus sign cursor that is observed when the user moves the cursor to the bottom right corner of a selected cell or cell range in Excel. This tool is used to fill or extend a series or data.
- Folder
-
A place on a drive for holding and organizing multiple subfolders or files.
- Footer
-
A section of the document that appears in the bottom margin. May contain the page number, file name, date, and author’s name.
- Formula
-
A mathematical equation in a spreadsheet that performs a calculation and shows the result in a cell.
- Function
-
A predefined formula in a spreadsheet that performs a calculation with specific values.
- Gridlines
-
Lines for visual reference only in Word and PowerPoint and cannot be printed. Typically, used for formatting content. Gridlines in Excel show the cell boundaries and can be printed.
- Group
-
A section on the Microsoft Ribbon that has related tools, commands, and options.
- Header
-
A section of the document that appears in the top margin. May contain a variety of information including the page number and title of the document.
- Header row
-
The top row of a table that contains the titles for the columns.
- Healthcare providers
-
Also called providers; include doctors, nurse practitioners, midwives, and physician assistants.
- Hover over
-
Moving the mouse pointer over an option without selecting it.
- Hyperlink
-
A picture, icon, phrase, or word in an electronic document that when clicked on, relocates the user to another section of the document or to another document.
- I-beam pointer
-
Also called I-cursor; appears like a capital I and shows the location of where the mouse cursor is located.
- Icon
-
A small picture or image that represents an application, file, or folder. The user can click or double click the icon to open the application software, file, or folder.
- Identity theft
-
The act of acquiring and fraudulently using account numbers, passwords, or other company or personal information for financial gain.
- Keyboard shortcut
-
A key or a combination of keys that can be used to perform a task that can typically be done with the mouse.
- Landscape orientation
-
The orientation of the page is such that the top and bottom are longer than the sides.
- Liable
-
Legally responsible.
- Line spacing
-
The space between each line in a paragraph.
- Malware
-
Malicious computer software that affects the functioning of a computer. It can gather and send a person’s private information to unauthorized parties over the internet.
- Margin
-
The space between the printed area and the edge of the document.
- Multi-factor authentication (MFA)
-
Requires two or more steps to identify the user and verify permission to access an electronic device or computer network. Authorization may include a password, a code sent via a text message to the phone number on file, answers to security questions, or identification using the person’s face, retina, or fingerprint.
- Parenthetical
-
Using or containing parentheses.
- Patient portal
-
A secure online website designed for patients to access their health information and to communicate with their provider.
- Phishing
-
A type of fraud where cybercriminals send e-mails from a fake website to illegally obtain password information.
- Pin
-
Describes the action of placing a shortcut on the taskbar, which allows the user to quickly access the application software.
- Policies
-
Written plan of activities or behaviors that provide goals for the facility and the healthcare employees.
- Portrait orientation
-
The orientation of the page is such that the sides are longer than top and bottom.
- Privacy
-
The condition of being private or secret.
- Procedures
-
Detailed steps that describe how to perform specific tasks.
- Protected health information (PHI)
-
Includes a patient’s identifiable demographic information, physical and/or mental health information and conditions and related payment information. Under HIPAA, the security, privacy, and confidentiality of PHI must be safeguarded.
- Ransomware
-
Malware that disables the normal operation of a computer or encrypts files until money or other ransom is paid to the person or organization responsible for the malware.
- Relative reference
-
The cell reference changes when the formula is copied to another cell. Is also called relative cell reference.
- Ribbon
-
Command bar that helps to organize features which is usually on the top of the screen.
- Risk management
-
Techniques used to lower the risk of accidental loss to a business.
- Rootkit
-
A group of programs that illegally accesses a person’s computer operating system (e.g., Windows) and revises or delete files and spreads to other computers.
- Row
-
The horizontal series of cells separated by lines or space form other horizontal series of cells and found in a table or spreadsheet.
- Row heading
-
Also called row header. The shaded area at the left side of each row. By clicking the row header, the user selects the entire row. The row height can be changed by dragging the line below the row heading.
- Saturation
-
Vividness of the color in an image.
- Screenshot
-
A picture created by copying all or part of a computer screen.
- Select
-
To highlight a cell or multiple cells (cell range) and the next command will impact these cells.
- Selection bar
-
An invisible section of the document to the left of the left margin; often used when electing text with the mouse.
- Shortcut
-
Placed on the desktop or within a folder and creates a link to a file or folder. Double clicking on the shortcut, will open the file or folder.
- Social engineering
-
The use of fraud, dishonesty, or psychological manipulation to manipulate people to disclose corporate or personal information, or to take a particular action.
- Spoofing
-
The act of impersonating another person via email or on the internet in order to gain access to a system or to obtain personal information.
- Spyware
-
Malicious computer software installed on a person’s computer without their knowledge and collects information.
- Start button
-
Located on the bottom left or center of the taskbar. Clicking this will display the Start menu.
- Start menu
-
Opens a list of application software (apps), shortcuts to settings, and files that can be selected.
- Subfolder
-
A folder that is placed within another folder.
- Table
-
A rectangular grid consisting of columns and rows. Allows for an orderly arrangement of data.
- Taskbar
-
Found at the bottom of the computer screen by the default setting. Contains selectable buttons and icons of opened and pinned application software, along with the date and time.
- Template
-
A predesigned document with a specific layout, design, and style.
- Tiles
-
Found on the bottom left corner in the task bar. Clicking this will display the start menu.
- Tone
-
A color or shade of color in an image; can be described as light or dark colors or warm or cool colors.
- Transparency
-
The state of being transparent or easily detected.
- Transparent
-
Easy to see through.
- Trojan
-
Also called trojan horses; malware that misinforms the user about its true intent.
- Two-factor authentication (2FA)
-
A verification method that requires a password and another form of verification, such as a fingerprint, a code sent via a text message, phone call, or through a smartphone app.
- Uniform Resource Locator
-
A unique internet address of a certain website page.
- Virus
-
A self-replicating series of commands or a computer program that is illegally planted in a computer program, often to damage or shut down a system or network.
- Wallpaper
-
A picture or design that is displayed in the background on a computer screen or mobile device screen.
- Window
-
A rectangular area on a screen in which a document or application can be viewed. Most windows allow the user to minimize, maximize, and close them.
- Workbook
-
A spreadsheet program file created in MS Excel. Contains one or more worksheets.
- Worksheet
-
Found within a workbook; also called a spreadsheet. Consists of cells that can contain data, formulas, and functions.
- Worm
-
A type of Trojan horse malware that auto replicates (by itself) between computers.