click below
click below
Normal Size Small Size show me how
Chapter 8
| Vocabulary | Definition |
|---|---|
| Adware | Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services |
| Anti-spam programs | Program that attempts to remove spam before it reaches a user’s inbox |
| Antivirus program | Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files |
| BIOS | Basic input/output system; firmware that contains the computer’s startup instructions |
| Cold boot | Process of turning on a computer that has been powered off completely |
| Command-line interface | Type of user interface in which a user types commands or presses special keys on the keyboard( such as function keys or key combination) to enter data and instructions |
| Compressed files/zipped | To shrink the size of a file |
| Computer virus | Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. |
| Cross platform | Progress that runs the same on multiple operating systems |
| Defragmenting | Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer. |
| Diagnostic utility | Utility program that compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems |
| Disk defragmenter | Utility that reorganize the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster. |
| Disk scanner | Utility that searches for and removes unnecessary files. |
| DOS | Disk Operating System |
| Driver | Small program that tells an operating system how to communicate with a specific device |
| Encryption/decryption | Encryption-Process of converting readable data into characters to prevent unauthorized access Decryption-Process of deciphering encrypted data into a readable form |
| Fault tolerant computer (define & ex) | Computer that has duplicate components so it can continue to operate when one of its main components fail |
| File manager | Utility that performs functions related to file management |
| Filiter | Audio editing software feature designed to enhance audio quality |
| Folder | Specific named location on a storage medium that contains related documents |
| Graphical user interface (GUI) | Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons |
| Kernel | The core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and assigns the computer’s resources |
| Malware | Programs that act without a user’s knowledge and deliberately alter a computer’s operations |
| Memory resident | Remaining in memory while a computer is running |
| Network administrator | Person overseeing network operations users the network OS to add and remove users, computers, and other devices to and from the network |
| Nonresident | Instructions that remain on a hard disk until they are needed |
| Operating system | Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices. |
| Password | Private combination of characters associated with a username that allows access to certain computer resources |
| Performance monitor | Operating system program that assesses and reports information about various computer resources and devices |
| Phishing | Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information |
| Platform | Set of programs containing instructions that coordinate all the activities among computer hardware resources |
| Pop-up Blocker | Filtering program that stops pop-up ads from display on Web pages |
| Screen saver/ghosting | Utility program that causes a display device’s screen to show a moving image or blank screen if no mouse activity occurs for a specified time |
| Shortcut | Icon on the desktop that provides a user with immediate access to a program or file |
| Single user/single tasking | Allows only one to run one program at a time |
| Single user/multitasking | In reference to an operating system, allowing a single user to work on two or more programs that reside in memory at the same time |
| Spyware | Program placed on a computer without the user’s knowledge that secretly collects information about the user, often related to web browsing habits |
| System software | Software that serves as the interface between the user, the application software, and the computer's hardware |
| Trojan horse | hidese within or look a legimate program such as a scteen saver |
| User interface | The portion of software that defines how the user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen |
| user name | unique combination of characters, such as letters of the alphabet and/or numbers, the identifies a specic user |
| Utility program | Type of system software that allows the user to perform tasks, usually related to maintaining a computer, its devices, or its program |
| Virtual memory | A portion of a storage medium, usually the hard disk, that the operating system allocate to function as additional RAM |
| Warm boot | Process of using the operating system to restart a computer |
| Worm | Copies itself rapidly using up system resources and possibly shutting the system down |