CIS210 - Chapter 7 Key Terms

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Task Scheduler

A Windows feature that enables users to schedule and automate a variety of actions, such starting programs, displaying messages, and sending e-mails.

Action Center

A Windows feature that provides a single interface in which users can view the status of security and maintenance features. Action Center alerts users to problems they need to correct and usually provides a way to fix it.

Current Branch (CB) servicing

A Windows servicing option in which upgrades are received immediately after Microsoft makes them publicly available.

Disk Defragmenter

A Windows utility that helps improve a computer's performance by moving sectors of data on the hard disk, so that files are stored sequentially. This minimizes the movement a hard disk's arm must make to read all of the sectors that make up a file or program.

Disk Cleanup

A Windows utility that removes many different kinds of unnecessary files from a computer, such as downloaded program files, Temporary Internet files, offline Web pages, files in the Recycle Bin, setup log files, and temporary files left by programs.

security update

A broadly released fix for a product-specific, security-related vulnerability.

critical update

A broadly released fix for a specific problem addressing a critical, non-security-related bug.

Windows registry

A database in Windows that stores user preferences, file locations, program configuration settings, startup information, hardware settings, and more. In addition, the registry stores the associations between file types and the applications that use them.

Windows Defender

A free antispyware program provided by Microsoft.

Trojan horse

A program named after the Trojan horse story in Greek mythology. A Trojan horse is an executable program that appears as a desirable or useful program. Since it appears to be a desirable or useful program, users are tricked into loading and executing the program on their system. After the program is loaded, it can cause your computer to become unusable or it can bypass your system's security, allowing your private information (including passwords, credit card numbers, and social security numbers) to be read. Also, a Trojan horse may execute adware.

virus

A program that can copy itself and infect a computer without the user's consent or knowledge.

worm

A self-replicating program that replicates itself to other computers over the network without any user intervention.

signature

A sequence of text or code that's programmed into a virus and uniquely identifies it. Antivirus software uses an anti-malware engine to find viruses and other malware on a computer.

Windows Update

A service that keeps a Windows system patched and updated is vitally important to maintaining proper security.

hotfix

A single, cumulative package that includes one or more files that are used to address a problem in a software product, such as a software bug.

firewall

A software program or device that monitors traffic entering and leaving a computer.

Windows Firewall

A software program or device that monitors traffic entering and leaving a computer. Windows Firewall comes with Windows 10 and other Windows versions to protect a computer from traffic entering through communications ports.

service pack

A tested, cumulative set of hotfixes, security updates, critical updates, and updates, as well as additional fixes for problems found internally since the release of the product.

spyware

A type of malware that is installed on computers and collects personal information or browsing habits often without the user's knowledge. Spyware can also install additional software, and redirect your web browser to other sites or change your home page.

trigger

In Task Scheduler, an event that causes a task to run.

action

In Task Scheduler, the action taken when the task runs.

Long-Term Servicing Branch (LTSB) servicing

Intended for scenarios during which changes to software running on devices is limited to only essential updates (vulnerabilities and other important issues). Only Windows 10 Enterprise LTSB supports LTSB.

cumulative patch

Multiple hotfixes combined into a single package.

out-of-band patches

Occasional patches released at times when patches are deemed critical or time-sensitive.

Windows Insider program

Previously accessible to developers only, allowing users to sign up for early builds of the Windows operating system. Today, the Windows Insider program has been expanded to include enterprise testers and advanced users. This enables Microsoft to receive feedback before a new feature or update is released to the general public and is a way to test upcoming Windows features before they are released to the general public.

Windows 10 Anniversary Update

Released in August of 2016, it introduced a number of new features and enhancements over the previous November Update release, including new extension support for Microsoft Edge, biometric authentication support with Windows Hello, improvements to Cortana, and Windows Inking.

Microsoft Windows Malicious Software Removal Tool

Scans your computer for dangerous malware and attempts to remove it immediately.

Windows 10 Enterprise Long-Term Servicing Branch (LTSB)

Similar to Windows 10 Enterprise, but a stripped-down version. It does include Internet Explorer 11, and is compatible with the Windows 32-bit version of Microsoft Office. It does not include Microsoft Edge, Windows Store Client, Cortana, Outlook Mail, Outlook Calendar, OneNote, Weather, News, Sports, Money, Photos, Camera, Music, and Clock.

Patch Tuesday

The second Tuesday of each month, when Microsoft routinely releases security updates.

fragmented

The state of a disk in which portions of files are spread across sectors on different parts of the disk.

malicious software

Viruses, worms, and other forms of malware that may attack a computer connected to the Internet.


Kaugnay na mga set ng pag-aaral

Combo with "Econ chapter 10" and 18 others

View Set

Как пригласить на встречу? / Meeting invitations

View Set

Operating leverage and degree of financial leverage

View Set

Comm 409: Chapter 6 (Four Classic Theories Of Ethics)

View Set

Chapter 3: Hitler's Foreign Policy

View Set