click below
click below
Normal Size Small Size show me how
MondalS CMW Vocab 8
6th Period CMW Chapter 8 Vocab Terms
| Question | Answer |
|---|---|
| Program that displays an online advertisement in a banner or pop-up window on web pages, email, or other internet services | Adware |
| Program that attempts to remove spam before it reaches a user's inbox | Anti-spam Programs |
| Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files | Antivirus Program |
| Basic Input/Output systems;firmware that contains the computer's startup instructions | BIOS |
| Process of turning on a computer that has been powered off completely | Cold boot |
| Type of user interface in which a user types commands or presses special keys on the keyboard to enter data or instructions | Command-line interface |
| To shrink the size of a file | Compressed files/zipped |
| Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the users knowledge or permission | Computer virus |
| Program that runs the same on multiple operating sstems | Cross platform |
| Reorganzing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer | Degragmenting |
| Utility program that compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems | Diagnostic utility |
| Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster | Disk Defragmenter |
| Utility tat searches for and removes unnecessary files | Disk Scanner |
| Disk operating system | DOS |
| Small program that tells an operating system how to communicate with a specific device | Driver |
| Process of converting readable data into unreadable characters to prevent unauthorized access. | Encryption |
| Fault tolerant computer (define & ex) | Computer that has duplicate components so it can continue to operate when one of its main components fail |
| File Manager | Utility that performs functions related to file management |
| Audio editing software designed to enhance audio quality | Filters |
| Specirfic named location on a storage medium that contains related documents | Folder |
| Type of user interface that allows a user to interact with software using text, graphics, and visual images such as icons | Graphical User Interface (GUI) |
| The Core of an operating system that manages memory and devices, maintains the computer's clock, starts programs, and assigns the computer's resources | Kernel |
| Short for malicious; program that acts without a users knowledge and deliberately alter a computer's operations | Malware |
| Remaining in memory while a computer is running | Memory resident |
| Employee who configures, installs, and maintains LANs, WANs, Intranets and internet systems; identifies and resolves connectivity issues | Netowkr Administrator |
| Instructions that remain on a hard disk untill they are needed | Nonresident |
| Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices | Operating system |
| Private combination of character associated with a user name that allows access to certain computer resources | Password |
| Operating support and secuirty phase activity that determines whether a system is inefficient at any point | Performance monitor |
| Scam in which perpetrator sends an official looking emai that attempts to obtain personal and financial information | Phising |
| Set of programs containing instructions that coorddiate all the activies among computer hardware resources | Platform |
| Filtering program that stops popup ads from displaying web pages | Pop-up blocker |
| Utility program that causes a display device's screen to show a moving image or a blank screen if no mouse activity occurs for a specified time | Screen Saver/Ghosting |
| Icon on the desktop that provides a user with immediate access to a program or a file | Shortcut |
| In reference to an operating system, allowing a single user to work on two or more [rpgrams that reside in memory at the same time | Single user/Multitasking |
| In reference to an operating system allowing only one user to run one program at a time | Singer User/Single tasking |
| Program that places itself on a computer without the user's knowledge that scretly collects information about the user | Spyware |
| Software that serves as the interface between the user, the application software, and the computer's hardware | System Software |
| Malicious-logic program named after the greek myth that hides within or looks like a legit program | Trojan Horse |
| Portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen | User interface |
| Unique combination of characters, such as letters of the alphabet, and or numbers that identifies a specific user | User name |
| Type of system software taht allows a user to perform maintenance type tasks usually related to managing a computer, its devicess, or its programs | Utility Program |
| Portion of a storage medium, usually the hard disk, that the operating system, allocates to function as additional RAm | Virtual memory |
| Process of using the p[eratomg sustem to restart a computer | Warm Boot |
| Malicious logic program that copies itself repeateddly using up system resources | Worm |