Computing in the modern world, chapter eight vocabulary
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Program that displays an online advertisement in a banner or popup window. | Adware
🗑
|
||||
Program that attempts to remove spam before it reaches a user’s inbox | Anti-spam programs
🗑
|
||||
Protects computer agents viruses by identifying and removing any computer virus found. | Antivirus program
🗑
|
||||
Basic input/output system, contains computer startup instructions | BIOS
🗑
|
||||
Turning on a computer that had been powered off completely | Cold boot
🗑
|
||||
Type of user interface in which users type commands or presses special keys on keyboard to enter data | Command-line interface
🗑
|
||||
A file that is shrinked in order to save space. The file cannot be used until unzipped/unshrunk. | Compressed files/zipped
🗑
|
||||
A harmful file that is downloaded to a computer | Computer virus
🗑
|
||||
Program that runs the same on multiple operating systems | Cross platform
🗑
|
||||
Recognizing a disk so that the files are stored in contiguous sectors which speed up computer. | Defragmenting
🗑
|
||||
Complies technical info about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems. | Diagnostic utility
🗑
|
||||
Reorganizes the files and unused space on a computer’s hard disk to speed up performance | Disk defragmenter
🗑
|
||||
Utility that searches and removes unnecessary files. | Disk scanner
🗑
|
||||
Disk operating system | DOS
🗑
|
||||
Small program that tells an operating system how to communicate with a specific drive. | Driver
🗑
|
||||
Process of converting readable data into unreadable characters preventing unauthorized access. | Encryption/decryption
🗑
|
||||
Computers that have duplicate components so it can continue to operate | Fault tolerant computer (define & ex)
🗑
|
||||
Performs functions related to file management. | File manager
🗑
|
||||
Audio editing software used to enhance audio quality. | Filters
🗑
|
||||
Specific named location on a storage medium that contains related documents | Folder
🗑
|
||||
Allows users to interact with software using text, graphics, and visual images. | Graphical user interface (GUI)
🗑
|
||||
Core of an operating system | Kernel
🗑
|
||||
Program that acts outside the user’s knowledge to deliberately alter function. | Malware
🗑
|
||||
Remaining in memory while a computer is running | Memory resident
🗑
|
||||
Configures, installs, and maintains a network. | Network administrator
🗑
|
||||
Instructions that remain on a hard disk until they are needed. | Nonresident
🗑
|
||||
Sets programs containing instructions that collaborate to coordinate all computer activity and devices. | Operating system
🗑
|
||||
A sequence of letters and/or numbers that protects unauthorized users to use a certain computer. | Password
🗑
|
||||
Operating system program that assesses and reports info about various computer resources and devices. | Performance monitor
🗑
|
||||
A spam email trying to obtain your personal information. | Phishing
🗑
|
||||
Set of programs that coordinate all computer functions among hardware resources. | Platform
🗑
|
||||
A program that prevents pop ups from showing up on your computer. | Pop-up blocker
🗑
|
||||
Causes a display devices screen to show a moving image or black screen if no mouse activity occurs for a long time. | Screen saver/ghosting
🗑
|
||||
An Icon on a computer that quickly lets you access a file on your computer. | Shortcut
🗑
|
||||
Allowing a single user a single user to work on two or more programs. | Single user/multitasking
🗑
|
||||
Operating system that allows one user to run one program at a time. | Single user/single tasking
🗑
|
||||
Program placed on a user’s computer without the user knowing, and secretly collects info about the user. | Spyware
🗑
|
||||
Software that serves as an interface between the user, the application software, and the computer’s hardware. | System software
🗑
|
||||
A program that hides within or looks like a legit program. | Trojan horse
🗑
|
||||
The portion of software that defines how a user interacts with a computer. | User interface
🗑
|
||||
Unique combination of letters and/or numbers that specifies a specific user. | User name
🗑
|
||||
Allows a user to perform maintenance type tasks, usually related to managing a computer. | Utility program
🗑
|
||||
A portion of storage medium, usually the hard disk that the operating system allocates to function as an additional RAM. | Virtual memory
🗑
|
||||
Process of using the operating system to restart a computer | Warm boot
🗑
|
||||
Logic program that copies itself repeatedly using system resources and possibly shutting down the system. | Worm
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
99loolil
Popular Computers sets