click below
click below
Normal Size Small Size show me how
Chapter 8
| Question | Answer |
|---|---|
| Adware | Program that displays an online advertisement in a banner or pop-up window on web pages |
| Anti-spam programs | Program that attempts to remove spam before it reaches a user’s inbox |
| Antivirus program | Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, or storage media |
| BIOS | Basic input output system; firmware that contains the computer’s startup instructions |
| Cold boot | Process of turning on a computer that has been powered off completely |
| Command-line interface | Type of user interface in which a user types commands or presses special keys on the keyboard |
| Compressed files/zipped | To shrink the size of a file |
| Computer virus | Potentially damaging computer program that affects or infects a computer negatively |
| Cross platform | Program that runs the same on multiple operating systems |
| Defragmenting | Recognizing a disc so that the files are stored in contiguous sectors, speeding up disc access |
| Diagnostic utility | Utility program that compiled technical information about a computers hardware and certain system software programs |
| Disk defragmenter | Utility that reorganizes the files and unused space on a computers hard disk |
| Disk scanner | Utility that searches for and removes unnecessary files |
| DOS | Disk operating system |
| Driver | Small program that tells an operating system how to communicate with a specific device |
| Encryption/decryption | Process of converting readable data into unreadable characters to prevent unauthorized access |
| Fault tolerant computer (define & ex) | Computer that has duplicate components so it can continue to operate when one of the components fail |
| File manager | Utility that performs functions related to file management |
| Filters | Audio editing software feature designed to enhance audio quality |
| Folder | Specific named location on a storage medium that contains related documents |
| Graphical user interface (GUI) | Allows a user to interact with software using text, graphics, and visual images |
| Kernel | Core of an operating system that manages memory and devices |
| Malware | Program that acts without a user’s knowledge |
| Memory resident | Remaining in memory while a computer is running |
| Network administrator | Employee who configures, installs, and maintains LANs, WANs, intranets, and internet systems |
| Nonresident | Instructions that remain on a hard disk until they are needed |
| Operating system | Set of programs containing instructions that work together to coordinate all the activities among computer devices |
| Password | Private combination of characters associated with a user name that allows access to certain computer resources |
| Performance monitor | Operating system progam that asses and reports information about various computer resources and devices |
| Phishing | Scam in which a perpetrator sends an official looking email that attempts to obtain your personal information |
| Platform | Set of programs containing instructions that coordinate all the activities among computer hardware resources |
| Pop-up blocker | Filtering program that stops pop up ads from displaying on web pages |
| Screen saver/ghosting | Utlity program that offers a display devices screen to show a moving image |
| Shortcut | Icon on a desktop that provides a user with immediate access to a program |
| Single user/multitasking | An operating system allowing a single user to work on two or more programs |
| Single user/single tasking | In reference to an operating system allowing only one user to run one program at a time |
| Spyware | [rogram placed an a computer without the users knowledge that secretly collects information about the user |
| System software | Software that serves as the interphase between the user and the application software and the computer hardware |
| Trojan horse | Malicious logic program named after the greek myth that hides within or looks like a legitimate program |
| User interface | The portion of software that defines how a user interacts with a computer |
| User name | Unique combination of characters that identifies a specific user |
| Utility program | Type of system software that allows a user to perform maintenance type tasks |
| Virtual memory | A portion of a storage medium that the operating system allocates to function as an additional RAM |
| Warm boot | Process of losing the operating system to restart a computer |
| Worm | A program that copies |