click below
click below
Normal Size Small Size show me how
Graves Protect Terms
Protecting your computer
Question | Answer |
---|---|
Software that monitors the system for viruses by looking at irregularities in the system. | Anti-Virus Program |
Computer vocabulary for a technically sophisticated user who spends many hours at a computer. | Hacker |
May also be referred to a person illegally entering a computer system without permission. | Hacker |
Expectations of conduct computer users must acknowledge while using an online service. | Acceptable Use Policy |
A device that connects a computer to an electrical outlet and protects the computer against sudden increases in electrical power. | Surge Protector |
A serious computer failure. This means that the computer itself stops working or that a program aborts unexpectedly. Signifies either a hardware malfunction or a very serious software bug. | Crash |
An error or defect in software or hardware that causes a program to malfunction. | Bug |
An identifier for an account. | Username |
A security code used to access an account. | Password |
A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All are manmade. | Virus |
A program or code that makes the computer follow the wrong set of instructions. These can also replicate themselves. | Virus |
A program or algorithm that replicates itself over a computer network and usually performs malicious actions such as using up the computer's resources and possibly shutting the system down. One type of virus. | Worm |
Printed output or a piece of paper with data on it. | Hard Copy |
Making the computer restart by resetting is, perhaps by using a certain key combination. | Warm Boot |
Turning on the computer by using the power button. | Cold Boot |
Removing data from a file or removing a file from a storage device. | Delete |
Non-real-time communication using text over the web. | |
A file that's sent along with an electronic message. Paper clip icon. | Attachment |
A hacking technique used to fool a target into providing personal information to a fraudulent website meant to look real. | Phishing |
Unwanted e-mail that often tries to get the user to spend money. | Spam |
A kind of malware meant to look like something a user would want to open, like a game or movie file, so that it can be active to run its code. | Trojan Horse |
This kind of file can consist of text or graphics or both. It is dependent upon the application program for its creation. | Document |
Software that allows the parts of a computer or similar device to work together and that lets you operate it. | Operating System |
Another name for a computer program. Software that can be run on a computer that has a limited purpose or function. | Application |
Information stored as an organized series of bits so it can be recognized by computer software. | File |