click below
click below
Normal Size Small Size show me how
chpt.8
CMW chpt 8
| Question | Answer |
|---|---|
| Adware | Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services |
| Anti-spam programs | Program that blocks spam and other unwanted programs Antivirus program |
| BIOS | Basic input/output system |
| Cold boot | Process of turning on a computer that has been powered off completely |
| Command-line interface | Type of user interface in which a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions |
| Compressed files/zipped | To shrink the size of a file |
| Computer virus | A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes |
| Cross platform | Program that runs the same on multiple operating systems Defragmenting |
| Diagnostic utility | Utility program that compiles technical information about a computer's hardware and certain system software programs and then prepares a report outlining any identified problems |
| Disk defragmenter | Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster |
| Disk scanner | Utility that searches for and removes unnecessary files |
| DOS | Disk operating system, an operating system originally developed for IBM personal computers |
| Driver | Small program that tells an operating system how to communicate with a specific device |
| Encryption/decryption | The process of encoding data and information to an unreadable form |
| Fault tolerant computer | Computer that has duplicate components so it can continue to operate when one of its main components fail |
| File manager | Utility that performs functions related to file management |
| Filters | A device that allows some signals to pass through but absorbs, attenuates, blocks, rejects, or removes all other signals, Folder |
| Graphical user interface (GUI) | Type of user interface that allows a user to interact with software using text, graphics, and visual images, such as icons |
| Kernel | The core of an operating system that manages memory and devices, maintains the computer's clock, starts programs, and assigns the computer's resources |
| Malware | Software that is intended to damage or disable computers and computer systems |
| Memory resident | Remaining in memory while a computer is running |
| Network administrator | A person who manages a local area communications network (LAN) or wide area network (WAN) for an organization Nonresident |
| Operating system | Set of programs containing instructions that work together to coordinate all the activities among computer hardware devices |
| Password | Private combination of characters associated with a user name that allows access to certain computer resources |
| Performance monitor | Operating system program that assesses and reports information about various computer resources and devices |
| Phishing | Scam in which a perpetrator attempts to obtain your personal and/or financial information |
| Platform | Set of programs containing instructions that coordinate all the activities among computer hardware resources |
| Pop-up blocker | Filtering program that stops pop-up ads from displaying on Web pages |
| Screen saver/ghosting | Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time |
| Shortcut | Icon on the desktop that provides a user with immediate access to a program or file |
| Single user/multitasking | In reference to an operating system, allowing a single user to work on two or more programs that reside in memory at the same time |
| Spyware | Program placed on a computer without the user's knowledge that secretly collects information about the user |
| System software | Programs that control or maintain the operations of a computer and its devices |
| Trojan horse | Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program |
| User interface | The portion of software that defines how a user interacts with a computer, including how the user enters data and instructions and how information is displayed on the screen |
| User name | Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user |
| Utility program | Type of system software that allows a user to perform maintenance-type tasks usually related to managing a computer, its devices, or its programs |
| Virtual memory | A portion of a storage medium, usually the hard disk, that the operating system allocates to function as additional RAM |
| Warm boot | Process of using the operating system to restart a computer |
| Worm | Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system |