Personal Computer Applications: SIMNET Quiz 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Security suite

A bundle of programs that accomplish a variety of security-related tasks.

Dataware house

A central repository where records from multiple databases are stored.

Copy

A command that pieces a copy of the selected object (or objects) into the clipboard

Path

A complete address that describes the exact location of a file

Information System (IS)

A complex system for acquiring, storing, organizing, using, and sharing data and information.

zip

A compressed zip file

Drives

A computer's storage device

Folders

A container that can store files or other folders. Also known as a directory

Backup

A copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.

Acceptable use policy (AUP)

A document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

Peer-to-peer (P2P)

A file transfer method that uses a distributed network of individual users instead of a central server to transfer files.

Social engineering

A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Business Intelligence (BI)

A framework that encompasses all of the data, tools, and strategies used by businesses to improve decision making and make decisions.

Malware

A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information.

Icon

A graphical representation of a file, folder, or drive.

Copyright

A legal concept that grants rights and control to the owner of any published work.

Frequently asked questions (FAQ)

A list of common questions and their responses on a website

History

A list of every website you have visited, kept by your web browser

Bookmarks

A list of favorite websites or pages.

Data validation

A method for checking and improving the reliability of data.

distributed denial-of-service (DDoS)

A network that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.

Trojan horse

A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Extension

A program used to add a variety of useful features to the web browser.

Ransomware

A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.

Plug-in

A separate program that allows your web browser to play several types of multimedia content.

Management Information Systems (MIS)

A set of software tools that enables managers to gather, organize, and evaluate information.

File extension

A short, unique sequence of characters located after a file's name that indicate the file type.

Cookies

A small data file created by a web browser that remembers your preferences for a specific website.

Firewall

A software utility dedicated to examining and blocking internet traffic.

Decision support systems (DSS)

A special application that collects and reports certain types of data, thus helping managers make better decisions.

Virtual machine

A special environment that allows parents to set a variety of limits on their children's internal usage.

Learning management system (LMS)

A system that offers students the ability to complete exams, turn in work, and communicate with their instructor and classmates.

Clipboard

A temporary holding space in the computer's memory for data that is being copied or moved.

Public domain

A term that refers to creative works whose copyright has expired or never existed in the first place. These works can be freely used without permission.

Big data

A term that refers to the large volumes of data that are constantly being generated by our devices and digital transactions.

Identity theft

A type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name.

Transaction processing system (TPS)

A type of information system that handles the processing and tracking of transactions.

Office automation system

A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.

Virus

A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

Worm

A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.

Scareware

A type of scam whose goal is to scare the user into doing exactly what the thief wants.

Trolling

A type of social interaction where a user acts in an annoying and antagonistic manner.

Disk cleanup

A utility that clears out temporary files that take up space on your hard drive.

Vulnerability

A weakness that has not been protected against threats, thereby making it open to harm.

Rogue hotspot

A wireless access point set up by a hacker in a public area to intercept users' communication.

Piracy

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.

Cache

Also known as temporary internet files, the browser cache stores every single page, image, and video for all the web pages you have recently viewed.

Fair use

An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission.

Zombies

An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.

Cyberbullying

An online form of aggression that involves repeated hostile behavior with intent to harm another individual.

Disk defragmentation

An optimization utility that will reorganize files and fragments to place related ones nearer to each other.

Countermeasure

Any step you take to ward off a threat.

Threat

Anything that can cause harm

Partitioning

Dividing a hard drive into multiple sections.

Pretexting

Gaining someone's trust by pretending you are someone else.

Hacktivism

Hacking with a social or political agenda

Massive Open Online Course (MOOC)

Huge online courses offered for free by a variety of universities.

Risk Assessment

Identifying and examining possible threats to a computer system.

Threads

In a forum, a topic that contains related posts.

Hacker

In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.

Cyberwarfare

Large-scale hacking conducted by countries, terrorist organizations, and large, independent hacking groups.

Phising

Luring individuals into entering personal information into a website controlled by a hacker.

Spyware

Malware that reports activity on your computer to another party.

Botnets

Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

.docx

Micosoft word

.accdb

Microsoft Access

.xlsx

Microsoft excel

.pptx

Microsoft powerpoint

Flaming

Online social interactions that exhibit anger and/or insults

Intellectual property

Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form.

Utilities

Programs that enhance or extend the operating system's capabilities or offer new features not provided by the operating system itself.

Security software

Programs that help keep you, your computer, and your personal information safe from a variety of threats.

MMORPGs

Stands for "massively multiplayer online role-playing game" and lets millions of players connect to various servers to team up with other players in very large virtual worlds.

Empathy

The ability to recognize, understand, and share the feelings of others.

Instant messaging (IM)

The act of having an online, text-based conversation with one or more individuals.

Data mining

The discovery of new patterns or relationships between data.

Root directory

The location on a drive that is outside of any folders or directors.

Files

The most fundamental component of storage that users interact with. A file can contain the instructions of a computer program or the data that you care to store.

File compression

The process of making a file smaller than its original size.

Formatting

The process of preparing a storage device for use by an operating system.

Encryption

The process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

Netiquette

The set of online behaviors that are considered polite and proper.

Virtualization software

The software that allows you to run a virtual machine.

Cybercrimes

The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.

Data analytics

The use of modeling software and statistics to extract knowledge from large volumes of data.

file hierarchy

The way a computer organizes files, consisting of drives, folders, and files.

File system

The way in which the operating system views and manages the space on a storage device.

Downloaded

To receive data

Uploaded

To send data

Voice over Internet Protocol (VoIP)

Translates analog voice signals into digital data and uses the Internet to transport the data; can connect to telephone networks and digital sources such as PCs.

Parental control

Utilities that allow parents to set a variety of limits on their children's Internet usage.

Cloud backup

Utility software that creates automated backups to an online account.

Real-time communication

When messages and conversations between two or more people occur instantaneously.

.exe

Windows executable file

Expert system

a type of information system that performs analytical tasks traditionally done by a human

.pdf

adobe pdf document

.jpg , .png , .gif

image files

.mp3 , .m4a

music files

Ethics

the philosophical study of morality

.mp4 , .avi , .mov

video files


Conjuntos de estudio relacionados

Bonus army, The New Deal And Great Depression

View Set

Basic Electricity Module Competencies

View Set

Autodesk Fusion 360 Integrated CAD/CAM/CAE: Week 3 quiz

View Set

AICE European History - Napoleon and The Industrial Revolution Unit Test Study Guide

View Set