click below
click below
Normal Size Small Size show me how
Software & Security
Software and Security
| Term | Definition |
|---|---|
| Commercial software | software that must be purchased in order to use it |
| Shareware | software that can be for a trial period, but must be purchased to continue to use it |
| Freeware | software that is free for anyone to use but the owner keeps the rights to copy and distribute it |
| Malware | software that will harm a computer or data, such as spyware or viruses |
| malicious | intending to do harm |
| upload | sending data to another computer or device |
| download | receiving data from another computer or device |
| virus | a program written to infect the computer; causes damage to the data and/or programs |
| Worm | a program that repeatedly copies itself on the hardware making it impossible for the computer to turn on; easily sent through spam emails and unsecured websites |
| bomb | a time activated virus |
| Trojan Horse | a virus disguised as a good file, usually an .exe file |
| Security | Software and procedures that protect computers and networks from hackers and viruses |
| Antivirus Software | software application that detects and removes or disables viruses |
| Firewall | software that blocks access to unauthorized users and programs |
| Password | a secret security code that a person uses to access a computer, network or website. |
| Username | a unique identifying name for a person to login to a computer, network or site |
| Fair Use Policy | a policy that allows a reasonable amount of copyrighted material to be used for educational purposes without getting permission from the owner |
| Copyright | the rights of the owner or creator of a work (video, movie, song, book, etc.) to give permission for its use and/or receive money for its distribution |
| Plagarism | using someone else's work without given credit (citing the source) to the person who created the work used |
| citation | acknowledge or give credit to an author or artist for his/her work used in your own work |
| bibliography | a page at the end of a research paper listing all the sources used for the research presented; can also be a slide at the end of a presentation |
| Phishing | an attempt to gather personal information from a user's account; can be by malware or SPAM |
| Standalone computer | a computer that is not connected to a network; it can access the internet; personal or home computer that is not part of a network |
| Hacker | someone who accesses a computer or website without permission |
| spam | junk e-mail; Sending Particularly Annoying Messages |