click below
click below
Normal Size Small Size show me how
Chapter 8 V.
Vocabulary
| Question | Answer |
|---|---|
| Program that displays an online advertisement in a banner or pop-up window on web pages | Adware |
| Program that attempts to remove spam before it reaches a user’s inbox | Anti-spam programs |
| Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media | Antivirus program |
| Basic input output system;firmware that contains the computer’s startup instructions | BIOS |
| Process of turning on a computer that has been powered off completely | Cold boot |
| Type of user interface in which a user types commands or presses special keys on the keyboard | Command-line interface |
| To shrink the size of a file | Compressed files/zipped |
| Potentially damaging computer program that affects or infects a computer negatively | Computer virus |
| Program that runs the same on multiple operating systems | Cross platform |
| Recognizing a disc so that the files are stored in contiguous sectors, speeding up disc access | Defragmenting |
| Utility program that compiled technical information about a computers hardware and certain system software programs | Diagnostic utility |
| Utility that reorganizes the files and unused space on a computers hard disk | Disk defragmenter |
| Utility that searches for and removes unnecessary files | Disk scanner |
| Disk operating system | DOS |
| Small program that tells an operating system how to communicate with a specific device | Driver |
| Process of converting readable data into unreadable characters to prevent unauthorized access | Encryption/decryption |
| Computer that has duplicate components so it can continue to operate when one of the components fail | Fault tolerant computer (define & ex) |
| Utility that performs functions related to file management | File manager |
| Audio editing software feature designed to enhance audio quality | Filters |
| Specific named location on a storage medium that contains related documents | Folder |
| Allows a user to interact with software using text, graphics, and visual images | Graphical user interface (GUI) |
| Core of an operating system that manages memory and devices | Kernel |
| Program that acts without a user’s knowledge | Malware |
| Remaining in memory while a computer is running | Memory resident |
| Employee who configures, installs, and maintains LANs, WANs, intranets, and internet systems | Network administrator |
| Instructions that remain on a hard disk until they are needed | Nonresident |
| Set of programs containing instructions that work together to coordinate all the activities among computer devices | Operating system |
| Private combination of characters associated with a user name that allows access to certain computer resources | Password |
| Operating system progam that asses and reports information about various computer resources and devices | Performance monitor |
| Scam in which a perpetrator sends an official looking email that attempts to obtain your personal information | Phishing |
| Set of programs containing instructions that coordinate all the activities among computer hardware resources | Platform |
| Filtering program that stops pop up ads from displaying on web pages | Pop-up blocker |
| Utlity program that offers a display devices screen to show a moving image | Screen saver/ghosting |
| Icon on a desktop that provides a user with immediate access to a program | Shortcut |
| An operating system allowing a single user to work on two or more programs | Single user/multitasking |
| In reference to an operating system allowing only one user to run one program at a time | Single user/single tasking |
| [program placed on a computer without the users knowledge that secretly collects information about the user | Spyware |
| Software that serves as the interphase between the user and the application software and the computer hardware | System software |
| Malicious logic program named after the greek myth that hides within or looks like a legitimate program | Trojan horse |
| The portion of software that defines how a user interacts with a computer | User interface |
| Unique combination of characters that identifies a specific user | User name |
| Type of system software that allows a user to perform maintenance type tasks | Utility program |
| A portion of a storage medium that the operating system allocates to function as an additional RAM | Virtual memory |
| Process of losing the operating system to restart a computer | Warm boot |
| A program that copies | Worm |