click below
click below
Normal Size Small Size show me how
8 voc
computers
| Question | Answer |
|---|---|
| Program that displays an online advertisement in a banner or pop up window on the internet | Adware |
| Program that attempts to remove spam before it reaches a user’s inbox | Anti-spam programs |
| Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, storage media, or incoming files | Antivirus program |
| Basic input/output system | BIOS |
| Process of turning on a computer that has been powered off completely | Cold boot |
| Type of user interface in which a user types commands or special keys on the keyboard to enter data or instructions | Command-line interface |
| A computer file that has been reduced in size by a compression software program. | Compressed files/zipped |
| A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer | Computer virus |
| Program that runs on multiple operating systemsReorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer | Cross platform |
| Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer | Defragmenting |
| Compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems | Diagnostic utility |
| Reorganizes the files and unused space on a computer’s hard disk so that the operating system accesses data more quickly and programs run faster | Disk defragmenter |
| Searches for and removes unnecessary files | Disk scanner |
| Disk operating system | DOS |
| Tells an operating system how to communicate with a specific device | Driver |
| Process of converting readable data into unreadable characters to prevent unauthorized access | Encryption/decryption |
| Computer that has to duplicate components so it can continue to operate when one of STUFF | Fault tolerant computer (define & ex) |
| Performs functions related to file management | File manager |
| Programs that remove or block certain things from being displayed on the internet | Filters |
| Specific named location on a storage medium that contains related documentsallows a user to interact with software using text, graphics, and visual images, such as icons | Folder |
| Core of an operating system that manages memory and devices, maintains the computer’s clock, starts programs, and assigns the computer’s resources | Graphical user interface (GUI) |
| Short for, malicious software programs that act without a user’s knowledge and deliberately alter a computer’s operations. | Kernel |
| Remaining in memory while a computer is running | Malware |
| Employee who configures, installs, and maintains LANs, WANs, intranets, and internet systems | Memory resident |
| Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices. | Network administrator |
| Private combination of characters associated with a username that allows access to certain computer resources. | Operating system |
| Operating system program that assesses and reports information about various computer resources and devices. | Password |
| Scam in which a perpetrator sends an official e-mail that attempts to obtain your personal and financial information. | Performance monitor |
| Set of programs containing instructions that coordinate all the activities among computer hardware | Phishing |
| Filtering program that stops pop-up ads from displaying on web pages. | Platform |
| Utility program that causes display devices screen to show a moving image or blank screen if no mouse activity occurs for a specific time | Pop-up blocker |
| Icon on desktop that provides a user with immediate access to a program or file | Screen saver/ghosting |
| In reference to an operating system allowing a single user to work on two or more programs that reside in memory at the same time | Shortcut |
| In reference to an operating system allowing only one user to run one program at a time | Single user/multitasking |
| Program placed on a computers without the users knowledge that secretly collects information about the user | Single user/single tasking |
| Software that serves as the interface between the user, the application software and the computer’s hardware. | Spyware |
| Malicious logic program named after the Greek myth that hides within or looks like a legitimate program | System software |
| The portion of software that defines how a user interacts with a computer, including how the user enters the data and instructions and how information is on the screen. | Trojan horse |
| Unique combination of characters such as letters or numbers that identifies a user | User interface |
| Type of system software that allows a user to perform a maintenance-type tasks usually related to managing a computer its devices or its programs | User name |
| A portion of the storage medium, usually the hard disk, that the operating system allocates to function as additional RAM | Utility program |
| Process of using the operating system to restart a computer | Virtual memory |
| Malicious-logic program that copies itself repeatedly, using up | Warm boot |