click below
click below
Normal Size Small Size show me how
Ch. 8 CMW
CMW Review
| Question | Answer |
|---|---|
| Adware | advertising-supported software |
| Anti-spam Programs | filters and prevents spam and junk email for home or office |
| Antivirus Program | used to prevent, detect and remove malware |
| Bios | Basic Input Output System |
| Cold boot | Starting the computer by turning power on |
| Command-line Interface | means of interaction between a human user and a computer program |
| Compressed Flies/Zipped | the idea being that when the files were unzipped (decompressed) |
| Computer Virus | program that can replicate itself and spread from one computer to another |
| Cross Platform | an attribute conferred to computer software or computing methods |
| Defragmenting | tool can also reduce the time it takes to load programs |
| Diagnostic Utility | great way to quickly troubleshoot problems with your computer |
| Disk Defragmenter | utility in Microsoft Windows designed to increase access speed by rearranging files stored |
| Disk Scanner | freeware tiny utility to check the hard drive for read errors |
| DOS | Disk Operating System |
| Driver | computer program allowing higher-level computer programs to interact with a hardware device |
| Encryption | is the process of transforming information |
| Fault Tolerant Computer (Define & Ex) | systems are systems designed around the concepts ex- computer science |
| File Manager | browser is a computer program that provides a user interface to work with file systems |
| Filters | electronic circuits which perform signal processing functions |
| Folder | directory, catalog,, or drawer, is a virtual container within a digital file system |
| Graphical User Interface (GUI) | lists other pages on the Web where you can find additional information |
| Kennel | the name given to any structure or shelter for dogs |
| Malware | short for malicious software |
| Memory Resident | program that remains in memory at all times |
| Network Administrator | is a person who oversees and maintains a computer network |
| Nonresident | not residing in a specified place |
| Operating System | is a set of software that manages computer hardware resources and provides common services for computer programs |
| Password | Security |
| Performance Monitor | is a simple yet powerful visualization tool for viewing performance data |
| Phishing | is a way of attempting to acquire information |
| Platform | includes a hardware architecture and a software framework |
| Pop-up Blocker | is a program that prevents pop-ups from displaying in a user's Web browser |
| Screen Saver/Ghosting | for constant on-screen data and alarms monitoring and about other screensavers |
| Shortcut | easier way to get to a page |
| Single User/Multitasking | method where multiple tasks, also known as ... one user as it really would be if it were running only that user's program |
| Single User/Single Tasking | computer cannot have seperate user accounts in the sense it cannot allow multiple users |
| Spyware | is a type of malware |
| System Software | computer software designed to operate and control the computer hardware and to provide a platform for running application software |
| Trojan Horse | standalone malicious file or program that does not attempt to infect other files unlike a computer virus |
| User Interface | the industrial design field of human–machine interaction |
| User Name | allows you to access a website or account |
| Utility Program | program that performs a specific task related to the management of computer functions |
| Virtual Memory | management technique developed for multitasking kernels |
| Warm Boot | The act or process of restarting a computer without turning off the power |
| Worm | standalone malware computer program that replicates itself in order to spread to other computers |