Question | Answer |
Adware | advertising-supported software |
Anti-spam Programs | filters and prevents spam and junk email for home or office |
Antivirus Program | used to prevent, detect and remove malware |
Bios | Basic Input Output System |
Cold boot | Starting the computer by turning power on |
Command-line Interface | means of interaction between a human user and a computer program |
Compressed Flies/Zipped | the idea being that when the files were unzipped (decompressed) |
Computer Virus | program that can replicate itself and spread from one computer to another |
Cross Platform | an attribute conferred to computer software or computing methods |
Defragmenting | tool can also reduce the time it takes to load programs |
Diagnostic Utility | great way to quickly troubleshoot problems with your computer |
Disk Defragmenter | utility in Microsoft Windows designed to increase access speed by rearranging files stored |
Disk Scanner | freeware tiny utility to check the hard drive for read errors |
DOS | Disk Operating System |
Driver | computer program allowing higher-level computer programs to interact with a hardware device |
Encryption | is the process of transforming information |
Fault Tolerant Computer (Define & Ex) | systems are systems designed around the concepts ex- computer science |
File Manager | browser is a computer program that provides a user interface to work with file systems |
Filters | electronic circuits which perform signal processing functions |
Folder | directory, catalog,, or drawer, is a virtual container within a digital file system |
Graphical User Interface (GUI) | lists other pages on the Web where you can find additional information |
Kennel | the name given to any structure or shelter for dogs |
Malware | short for malicious software |
Memory Resident | program that remains in memory at all times |
Network Administrator | is a person who oversees and maintains a computer network |
Nonresident | not residing in a specified place |
Operating System | is a set of software that manages computer hardware resources and provides common services for computer programs |
Password | Security |
Performance Monitor | is a simple yet powerful visualization tool for viewing performance data |
Phishing | is a way of attempting to acquire information |
Platform | includes a hardware architecture and a software framework |
Pop-up Blocker | is a program that prevents pop-ups from displaying in a user's Web browser |
Screen Saver/Ghosting | for constant on-screen data and alarms monitoring and about other screensavers |
Shortcut | easier way to get to a page |
Single User/Multitasking | method where multiple tasks, also known as ... one user as it really would be if it were running only that user's program |
Single User/Single Tasking | computer cannot have seperate user accounts in the sense it cannot allow multiple users |
Spyware | is a type of malware |
System Software | computer software designed to operate and control the computer hardware and to provide a platform for running application software |
Trojan Horse | standalone malicious file or program that does not attempt to infect other files unlike a computer virus |
User Interface | the industrial design field of human–machine interaction |
User Name | allows you to access a website or account |
Utility Program | program that performs a specific task related to the management of computer functions |
Virtual Memory | management technique developed for multitasking kernels |
Warm Boot | The act or process of restarting a computer without turning off the power |
Worm | standalone malware computer program that replicates itself in order to spread to other computers |