Glossary

Absolute reference

The cell reference in the formula is constant (always use the same cell) even when it is copied to other cells. Is also called absolute cell reference.

Adjacent

Close to or next to.

Adware

Software that gathers information regarding a person’s browsing patterns and then displays related advertisements in their Web browser.

Application software

May also be called application program, app, or application. May consist of one or several programs that allow the user to perform certain tasks or activities. Requires the system software to run it. All apps are programs, but not all programs are apps.

Argument

The independent variable of a function.

Ascending sort

Organizes the information from A to Z or from the smallest number to the largest number.

Banded

Having strips or bands of contrasting colors.

Breach

A prohibited disclosure or use of protected health information (PHI), which compromises the security or privacy of the information.

Cell

A single box on a table or spreadsheet that can contain text or numbers.

Cell reference

A unique name or address of cell that is based on a set of coordinates that a cell occupies on a worksheet. For example, a cell that appears in column C and in row 8 is C8.

Click

Describes the action of pressing on the left or right mouse button; can be one or more clicks.

Collated

Assembled in a specific way.

Color gradient

A set of colors arranged in order to provide a smooth color transition. For example, the bottom of the area may be green, and the top may be blue. A variety of shades are arranged in order to provide a smooth transition between the green color and blue color.

Column

Any of two or more vertical sections of type on a document.

Column heading

Also known as column headers. The shaded area at the top of the column and contains a letter or a series of letters (e.g., XA, BB). By clicking the column header, the user selects the entire column. The column width can be changed by dragging the line to the right of the heading.

Confidentiality

A legally protected right of patients. An ethical duty of designated healthcare professionals to keep patient information private.

Contextual tab

A hidden tab on the Office ribbon that becomes visible when a specific item is selected, or a certain task is done by the user. For instance, when a picture is selected, the Picture Format tab appears on the tab row.

Cookies

Allows a website to collect information during the user’s visit to the site.

Cybersecurity

Actions taken to be safe from electronic crime.

Default

The preset selection of an option offered by a system and will always be used unless the user changes it.

Descending sort

Organizes the information from Z to A or from the largest number to the smallest number.

Desktop

The main screen display of a personal computer where icons, windows and other items appear.

Dialog box

A dialog box displays information and allows the user to interact with it. For instance, when the dialog box launcher is clicked, a dialog box appears. Unlike a window, most dialog boxes do not contain a maximize and minimize button, just a close button.

Dialog box launcher

A button (with a picture of an arrow) found on the lower right corner of Ribbon groups that is used to open the dialog box.

Electronic health record (EHR)

A computerized software system that maintains patient health information, which can be created, managed, and consulted by authorized healthcare professionals and providers from more than one healthcare organization.

File

A named collection of information, in the form of text, programs, graphics, etc., held on a permanent storage device such as a C drive or flash drive.

File Management

Also called filed maintenance, copying, renaming, relocating and deleting files in the computer.

Fill handle

A tool indicated by a plus sign cursor that is observed when the user moves the cursor to the bottom right corner of a selected cell or cell range in Excel. This tool is used to fill or extend a series or data.

Fill Handles

A tool indicated by a plus sign cursor that is observed when the user moves the cursor to the bottom right corner of a selected cell or cell range in Excel. This tool is used to fill or extend a series or data.

Folder

A place on a drive for holding and organizing multiple subfolders or files.

Footer

A section of the document that appears in the bottom margin. May contain the page number, file name, date, and author’s name.

Formula

A mathematical equation in a spreadsheet that performs a calculation and shows the result in a cell.

Function

A predefined formula in a spreadsheet that performs a calculation with specific values.

Gridlines

Lines for visual reference only in Word and PowerPoint and cannot be printed. Typically, used for formatting content. Gridlines in Excel show the cell boundaries and can be printed.

Group

A section on the Microsoft Ribbon that has related tools, commands, and options.

Header

A section of the document that appears in the top margin. May contain a variety of information including the page number and title of the document.

Header row

The top row of a table that contains the titles for the columns.

Healthcare providers

Also called providers; include doctors, nurse practitioners, midwives, and physician assistants.

Hover over

Moving the mouse pointer over an option without selecting it.

Hyperlink

A picture, icon, phrase, or word in an electronic document that when clicked on, relocates the user to another section of the document or to another document.

I-beam pointer

Also called I-cursor; appears like a capital I and shows the location of where the mouse cursor is located.

Icon

A small picture or image that represents an application, file, or folder. The user can click or double click the icon to open the application software, file, or folder.

Identity theft

The act of acquiring and fraudulently using account numbers, passwords, or other company or personal information for financial gain.

Keyboard shortcut

A key or a combination of keys that can be used to perform a task that can typically be done with the mouse.

Landscape orientation

The orientation of the page is such that the top and bottom are longer than the sides.

Liable

Legally responsible.

Line spacing

The space between each line in a paragraph.

Malware

Malicious computer software that affects the functioning of a computer. It can gather and send a person’s private information to unauthorized parties over the internet.

Margin

The space between the printed area and the edge of the document.

Multi-factor authentication (MFA)

Requires two or more steps to identify the user and verify permission to access an electronic device or computer network. Authorization may include a password, a code sent via a text message to the phone number on file, answers to security questions, or identification using the person’s face, retina, or fingerprint.

Parenthetical

Using or containing parentheses.

Patient portal

A secure online website designed for patients to access their health information and to communicate with their provider.

Phishing

A type of fraud where cybercriminals send e-mails from a fake website to illegally obtain password information.

Pin

Describes the action of placing a shortcut on the taskbar, which allows the user to quickly access the application software.

Policies

Written plan of activities or behaviors that provide goals for the facility and the healthcare employees.

Portrait orientation

The orientation of the page is such that the sides are longer than top and bottom.

Privacy

The condition of being private or secret.

Procedures

Detailed steps that describe how to perform specific tasks.

Protected health information (PHI)

Includes a patient’s identifiable demographic information, physical and/or mental health information and conditions and related payment information. Under HIPAA, the security, privacy, and confidentiality of PHI must be safeguarded.

Ransomware

Malware that disables the normal operation of a computer or encrypts files until money or other ransom is paid to the person or organization responsible for the malware.

Relative reference

The cell reference changes when the formula is copied to another cell. Is also called relative cell reference.

Ribbon

Command bar that helps to organize features which is usually on the top of the screen. 

Risk management

Techniques used to lower the risk of accidental loss to a business.

Rootkit

A group of programs that illegally accesses a person’s computer operating system (e.g., Windows) and revises or delete files and spreads to other computers.

Row

The horizontal series of cells separated by lines or space form other horizontal series of cells and found in a table or spreadsheet.

Row heading

Also called row header.  The shaded area at the left side of each row. By clicking the row header, the user selects the entire row. The row height can be changed by dragging the line below the row heading.

Saturation

Vividness of the color in an image.

Screenshot

A picture created by copying all or part of a computer screen.

Select

To highlight a cell or multiple cells (cell range) and the next command will impact these cells. 

Selection bar

An invisible section of the document to the left of the left margin; often used when electing text with the mouse.

Shortcut

Placed on the desktop or within a folder and creates a link to a file or folder. Double clicking on the shortcut, will open the file or folder.

Social engineering

The use of fraud, dishonesty, or psychological manipulation to manipulate people to disclose corporate or personal information, or to take a particular action.

Spoofing

The act of impersonating another person via email or on the internet in order to gain access to a system or to obtain personal information.

Spyware

Malicious computer software installed on a person’s computer without their knowledge and collects information.

Start button

Located on the bottom left or center of the taskbar. Clicking this will display the Start menu.

Start menu

Opens a list of application software (apps), shortcuts to settings, and files that can be selected.

Subfolder

A folder that is placed within another folder.

Table

A rectangular grid consisting of columns and rows. Allows for an orderly arrangement of data.

Taskbar

Found at the bottom of the computer screen by the default setting. Contains selectable buttons and icons of opened and pinned application software, along with the date and time.

Template

A predesigned document with a specific layout, design, and style.

Tiles

Found on the bottom left corner in the task bar. Clicking this will display the start menu. 

Tone

A color or shade of color in an image; can be described as light or dark colors or warm or cool colors.

Transparency

The state of being transparent or easily detected.

Transparent

Easy to see through.

Trojan

Also called trojan horses; malware that misinforms the user about its true intent.

Two-factor authentication (2FA)

A verification method that requires a password and another form of verification, such as a fingerprint, a code sent via a text message, phone call, or through a smartphone app.

Uniform Resource Locator

A unique internet address of a certain website page.

Virus

A self-replicating series of commands or a computer program that is illegally planted in a computer program, often to damage or shut down a system or network.

Wallpaper

A picture or design that is displayed in the background on a computer screen or mobile device screen.

Window

A rectangular area on a screen in which a document or application can be viewed. Most windows allow the user to minimize, maximize, and close them.

Workbook

A spreadsheet program file created in MS Excel. Contains one or more worksheets.

Worksheet

Found within a workbook; also called a spreadsheet. Consists of cells that can contain data, formulas, and functions.

Worm

A type of Trojan horse malware that auto replicates (by itself) between computers.

License

Icon for the Creative Commons Attribution 4.0 International License

Using Computers in Healthcare Copyright © 2024 by WisTech Open is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book