click below
click below
Normal Size Small Size show me how
chapter 8 comp
chapter 8
| Question | Answer |
|---|---|
| Program that displays an online advertisement in a banner or pop-up window. | Adware |
| Program that attempts to remove spam before it reaches a user’s inbox. | Anti-spam programs |
| Program that protects a computer against viruses by identifying and removing any computer viruses. | Antivirus program |
| Basic input/output system. | BIOS |
| Process of turning on a computer that has been powered off completely. | Cold Boot |
| Type of user interface in which a user types command or presses special keys on the keyboard. | Command line interface |
| Type of compressed files that usually have a .zip extension. | Compressed files/zipped |
| A segment of self-replicating code planted illegally in a computer program, often to damage or shut down a system or network. | Computer virus |
| Program that runs the same on multiple operating systems. | Cross platform |
| Recognizing a disk so that the files are stored in contiguous sectors. | Defragmenting |
| Utility program that compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems. | Diagnostic Utility |
| Utility that reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster. | Disk Defragmenter |
| Utility that searches for and removes unnecessary files. | Disk scanner |
| Disk operating system. | DOS |
| Small program that tells an operating system how to communicate with a specific device. | Driver |
| Process of converting readable data into unreadable characters. | Encryption/ Decription |
| Computer that has multiple components so it can operate when one of its main components fail. | Fault tolerant computer |
| Utility that performs functions related to file management. | File manager |
| Audio editing software feature designed to enhance audio quality. | Filters |
| Specific named location on a storage medium that contains related documents. | Folder |
| Type of user interface that allows a user to interact with software. | Graphic user interface |
| The core of an operating system. | Kernel |
| Short for malicious software, programs that act without a user’s knowledge. | Malware |
| Remaining in memory while the computer is running. | Memory resident |
| Employee who configures internet systems. | Network Administrator |
| Instructions that remain on a hard disk until they are needed. | Nonresident |
| Set of programs containing instructions that work to together to coordinate all the activities among the computer hardware devices. | Operating system |
| Private combination of characters associated with a username. | Password |
| Program that assesses and reports information about various resources and devices. | Performance monitor |
| Scam in which a perpetrator sends an official looking email that attempts to obtain your personal and financial information. | Phishing |
| Set of programs containing instructions that coordinate all the activities among computer hardware resources. | Platform |
| Filtering program that stops pop-ups. | Ppo-up blocker |
| Program that causes a display device’s screen to show a moving image or blank screen if no mouse activity occurs over a specific time. | Screen saver/ghosting |
| Icon on the desktop that provides a user with immediate access to a program or file. | Shortcut |
| Allows a user to work on two or more things at once. | Single user/multitasking |
| Allows only one user to run one program at a time. | Single user/single tasking |
| Program placed on a computer that secretly collects knowledge about the user. | Spyware |
| Serves as an interface between the user, the application software, and the computer’s hardware. | System software |
| Malicious-logic program that hides within or looks like a legitimate program | Trojan horse |
| The portion of software that defines how a user interacts with a computer. | User interface |
| Unique combination of characters, such as letters of the alphabet that identifies a specific user. | Username |
| Type of system software that allows users to perform maintenance like tasks. | Utility program |
| A portion of a storage medium that the operating system allocates to function as additional RAM. | Vital memory |
| Process of using the operating system to restart a computer. | Warm boot |
| Malicious-logic program that copies itself repeatedly, using up system resources. | Worm |