click below
click below
Normal Size Small Size show me how
CMW Flashcards Ch. 8
CMW Flashcards
Question | Answer |
---|---|
Adware | Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. |
Anti-spam programs | Program that blocks spam and other unwanted programs |
Antivirus program | Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. |
BIOS | Basic input/output system; firmware that contains the computer's startup instructions. |
Cold boot | Process of turning on a computer that has been powered off completely. |
Command-line interface | Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. |
Compressed files/zipped | To shrink the size of a file. |
Computer virus | A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. |
Cross platform | Program that runs the same on multiple operating systems |
Defragmenting | Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer. |
Diagnostic utility | Utility program that compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems. |
Disk defragmenter | Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster. |
Disk scanner | Utility that searches for and removes unnecessary files. |
DOS | Disk operating system, an operating system originally developed for IBM personal computers. |
Driver | Small program that tells an operating system how to communicate with a specific device. |
Encryption/decryption | The process of encoding data and information to an unreadable form. |
Fault tolerant computer | Computer that has duplicate components so it can continue to operate when one of its main components fail. |
File manager | Utility that performs functions related to file management. |
Filters | A device that allows some signals to pass through but absorbs, attenuates, blocks, rejects, or removes all other signals, |
Folder | In a graphical user interface (GUI), a simulated file folder that holds data, applications and other folders. |
Graphical user interface (GUI) | Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons. |
Kernel | The core of an operating system that manages memory and devices, maintains the computer's clock, starts programs, and assigns the computer's resources. |
Malware | Software that is intended to damage or disable computers and computer systems. |
Memory resident | Remaining in memory while a computer is running. |
Network administrator | A person who manages a local area communications network (LAN) or wide area network (WAN) for an organization |
Nonresident | Instructions that remain on a hard disk until they are needed. |
Operating system | Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices. |
Password | Private combination of characters associated with a user name that allows access to certain computer resources. |
Performance monitor | Operating system program that assesses and reports information about various computer resources and devices. |
Phishing | Scam in which a perpetrator attempts to obtain your personal and/or financial information. |
Platform | Set of programs containing instructions that coordinate all the activities among computer hardware resources. |
Pop-up blocker | Filtering program that stops pop-up ads from displaying on Web pages. |
Screen saver/ghosting | Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time. |
Shortcut | Icon on the desktop that provides a user with immediate access to a program or file. |
Single user/multitasking | In reference to an operating system, allowing a single user to work on two or more programs that reside in memory at the same time. |
Single user/single tasking | In reference to an operating system allowing only one user to run one program at a time. |
Spyware | Program placed on a computer without the user's knowledge that secretly collects information about the user. |
System software | Programs that control or maintain the operations of a computer and its devices. |
Trojan horse | Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program. |
User interface | The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen. |
User name | Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user. |
Utility program | Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs. |
Virtual memory | A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM. |
Warm boot | Process of using the operating system to restart a computer. |
Worm | Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system. |