click below
click below
Normal Size Small Size show me how
Graves Protect Terms
Protecting your computer
| Question | Answer |
|---|---|
| Software that monitors the system for viruses by looking at irregularities in the system. | Anti-Virus Program |
| Computer vocabulary for a technically sophisticated user who spends many hours at a computer. | Hacker |
| May also be referred to a person illegally entering a computer system without permission. | Hacker |
| Expectations of conduct computer users must acknowledge while using an online service. | Acceptable Use Policy |
| A device that connects a computer to an electrical outlet and protects the computer against sudden increases in electrical power. | Surge Protector |
| A serious computer failure. This means that the computer itself stops working or that a program aborts unexpectedly. Signifies either a hardware malfunction or a very serious software bug. | Crash |
| An error or defect in software or hardware that causes a program to malfunction. | Bug |
| An identifier for an account. | Username |
| A security code used to access an account. | Password |
| A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. All are manmade. | Virus |
| A program or code that makes the computer follow the wrong set of instructions. These can also replicate themselves. | Virus |
| A program or algorithm that replicates itself over a computer network and usually performs malicious actions such as using up the computer's resources and possibly shutting the system down. One type of virus. | Worm |
| Printed output or a piece of paper with data on it. | Hard Copy |
| Making the computer restart by resetting is, perhaps by using a certain key combination. | Warm Boot |
| Turning on the computer by using the power button. | Cold Boot |
| Removing data from a file or removing a file from a storage device. | Delete |
| Non-real-time communication using text over the web. | |
| A file that's sent along with an electronic message. Paper clip icon. | Attachment |
| A hacking technique used to fool a target into providing personal information to a fraudulent website meant to look real. | Phishing |
| Unwanted e-mail that often tries to get the user to spend money. | Spam |
| A kind of malware meant to look like something a user would want to open, like a game or movie file, so that it can be active to run its code. | Trojan Horse |
| This kind of file can consist of text or graphics or both. It is dependent upon the application program for its creation. | Document |
| Software that allows the parts of a computer or similar device to work together and that lets you operate it. | Operating System |
| Another name for a computer program. Software that can be run on a computer that has a limited purpose or function. | Application |
| Information stored as an organized series of bits so it can be recognized by computer software. | File |