Ch. 8 CMW Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
Adware | advertising-supported software |
Anti-spam Programs | filters and prevents spam and junk email for home or office |
Antivirus Program | used to prevent, detect and remove malware |
Bios | Basic Input Output System |
Cold boot | Starting the computer by turning power on |
Command-line Interface | means of interaction between a human user and a computer program |
Compressed Flies/Zipped | the idea being that when the files were unzipped (decompressed) |
Computer Virus | program that can replicate itself and spread from one computer to another |
Cross Platform | an attribute conferred to computer software or computing methods |
Defragmenting | tool can also reduce the time it takes to load programs |
Diagnostic Utility | great way to quickly troubleshoot problems with your computer |
Disk Defragmenter | utility in Microsoft Windows designed to increase access speed by rearranging files stored |
Disk Scanner | freeware tiny utility to check the hard drive for read errors |
DOS | Disk Operating System |
Driver | computer program allowing higher-level computer programs to interact with a hardware device |
Encryption | is the process of transforming information |
Fault Tolerant Computer (Define & Ex) | systems are systems designed around the concepts ex- computer science |
File Manager | browser is a computer program that provides a user interface to work with file systems |
Filters | electronic circuits which perform signal processing functions |
Folder | directory, catalog,, or drawer, is a virtual container within a digital file system |
Graphical User Interface (GUI) | lists other pages on the Web where you can find additional information |
Kennel | the name given to any structure or shelter for dogs |
Malware | short for malicious software |
Memory Resident | program that remains in memory at all times |
Network Administrator | is a person who oversees and maintains a computer network |
Nonresident | not residing in a specified place |
Operating System | is a set of software that manages computer hardware resources and provides common services for computer programs |
Password | Security |
Performance Monitor | is a simple yet powerful visualization tool for viewing performance data |
Phishing | is a way of attempting to acquire information |
Platform | includes a hardware architecture and a software framework |
Pop-up Blocker | is a program that prevents pop-ups from displaying in a user's Web browser |
Screen Saver/Ghosting | for constant on-screen data and alarms monitoring and about other screensavers |
Shortcut | easier way to get to a page |
Single User/Multitasking | method where multiple tasks, also known as ... one user as it really would be if it were running only that user's program |
Single User/Single Tasking | computer cannot have seperate user accounts in the sense it cannot allow multiple users |
Spyware | is a type of malware |
System Software | computer software designed to operate and control the computer hardware and to provide a platform for running application software |
Trojan Horse | standalone malicious file or program that does not attempt to infect other files unlike a computer virus |
User Interface | the industrial design field of human–machine interaction |
User Name | allows you to access a website or account |
Utility Program | program that performs a specific task related to the management of computer functions |
Virtual Memory | management technique developed for multitasking kernels |
Warm Boot | The act or process of restarting a computer without turning off the power |
Worm | standalone malware computer program that replicates itself in order to spread to other computers |
Created by:
amin_sagani
Popular Computers sets