click below
click below
Normal Size Small Size show me how
chpt.8
CMW chpt 8
Question | Answer |
---|---|
Adware | Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services |
Anti-spam programs | Program that blocks spam and other unwanted programs Antivirus program |
BIOS | Basic input/output system |
Cold boot | Process of turning on a computer that has been powered off completely |
Command-line interface | Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions |
Compressed files/zipped | To shrink the size of a file |
Computer virus | A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes |
Cross platform | Program that runs the same on multiple operating systems Defragmenting |
Diagnostic utility | Utility program that compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems |
Disk defragmenter | Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster |
Disk scanner | Utility that searches for and removes unnecessary files |
DOS | Disk operating system, an operating system originally developed for IBM personal computers |
Driver | Small program that tells an operating system how to communicate with a specific device |
Encryption/decryption | The process of encoding data and information to an unreadable form |
Fault tolerant computer | Computer that has duplicate components so it can continue to operate when one of its main components fail |
File manager | Utility that performs functions related to file management |
Filters | A device that allows some signals to pass through but absorbs, attenuates, blocks, rejects, or removes all other signals, Folder |
Graphical user interface (GUI) | Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons |
Kernel | The core of an operating system that manages memory and devices, maintains the computer's clock, starts programs, and assigns the computer's resources |
Malware | Software that is intended to damage or disable computers and computer systems |
Memory resident | Remaining in memory while a computer is running |
Network administrator | A person who manages a local area communications network (LAN) or wide area network (WAN) for an organization Nonresident |
Operating system | Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices |
Password | Private combination of characters associated with a user name that allows access to certain computer resources |
Performance monitor | Operating system program that assesses and reports information about various computer resources and devices |
Phishing | Scam in which a perpetrator attempts to obtain your personal and/or financial information |
Platform | Set of programs containing instructions that coordinate all the activities among computer hardware resources |
Pop-up blocker | Filtering program that stops pop-up ads from displaying on Web pages |
Screen saver/ghosting | Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time |
Shortcut | Icon on the desktop that provides a user with immediate access to a program or file |
Single user/multitasking | In reference to an operating system, allowing a single user to work on two or more programs that reside in memory at the same time |
Spyware | Program placed on a computer without the user's knowledge that secretly collects information about the user |
System software | Programs that control or maintain the operations of a computer and its devices |
Trojan horse | Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program |
User interface | The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen |
User name | Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user |
Utility program | Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs |
Virtual memory | A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM |
Warm boot | Process of using the operating system to restart a computer |
Worm | Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system |