Personal Computer Applications: SIMNET Quiz 1
Security suite
A bundle of programs that accomplish a variety of security-related tasks.
Dataware house
A central repository where records from multiple databases are stored.
Copy
A command that pieces a copy of the selected object (or objects) into the clipboard
Path
A complete address that describes the exact location of a file
Information System (IS)
A complex system for acquiring, storing, organizing, using, and sharing data and information.
zip
A compressed zip file
Drives
A computer's storage device
Folders
A container that can store files or other folders. Also known as a directory
Backup
A copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.
Acceptable use policy (AUP)
A document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
Peer-to-peer (P2P)
A file transfer method that uses a distributed network of individual users instead of a central server to transfer files.
Social engineering
A form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Business Intelligence (BI)
A framework that encompasses all of the data, tools, and strategies used by businesses to improve decision making and make decisions.
Malware
A generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information.
Icon
A graphical representation of a file, folder, or drive.
Copyright
A legal concept that grants rights and control to the owner of any published work.
Frequently asked questions (FAQ)
A list of common questions and their responses on a website
History
A list of every website you have visited, kept by your web browser
Bookmarks
A list of favorite websites or pages.
Data validation
A method for checking and improving the reliability of data.
distributed denial-of-service (DDoS)
A network that attempts to shut down or block access to websites or other network resources by overwhelming them with requests.
Trojan horse
A program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Extension
A program used to add a variety of useful features to the web browser.
Ransomware
A scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief.
Plug-in
A separate program that allows your web browser to play several types of multimedia content.
Management Information Systems (MIS)
A set of software tools that enables managers to gather, organize, and evaluate information.
File extension
A short, unique sequence of characters located after a file's name that indicate the file type.
Cookies
A small data file created by a web browser that remembers your preferences for a specific website.
Firewall
A software utility dedicated to examining and blocking internet traffic.
Decision support systems (DSS)
A special application that collects and reports certain types of data, thus helping managers make better decisions.
Virtual machine
A special environment that allows parents to set a variety of limits on their children's internal usage.
Learning management system (LMS)
A system that offers students the ability to complete exams, turn in work, and communicate with their instructor and classmates.
Clipboard
A temporary holding space in the computer's memory for data that is being copied or moved.
Public domain
A term that refers to creative works whose copyright has expired or never existed in the first place. These works can be freely used without permission.
Big data
A term that refers to the large volumes of data that are constantly being generated by our devices and digital transactions.
Identity theft
A type of crime in which criminals essentially assume your identity and begin to open new bank accounts under your name.
Transaction processing system (TPS)
A type of information system that handles the processing and tracking of transactions.
Office automation system
A type of information system that is designed to manage information in an office environment and help users handle certain information-related tasks more efficiently.
Virus
A type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
Worm
A type of malware that self-replicates and spreads through computers and networks without the need to attach to a host file.
Scareware
A type of scam whose goal is to scare the user into doing exactly what the thief wants.
Trolling
A type of social interaction where a user acts in an annoying and antagonistic manner.
Disk cleanup
A utility that clears out temporary files that take up space on your hard drive.
Vulnerability
A weakness that has not been protected against threats, thereby making it open to harm.
Rogue hotspot
A wireless access point set up by a hacker in a public area to intercept users' communication.
Piracy
Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator.
Cache
Also known as temporary internet files, the browser cache stores every single page, image, and video for all the web pages you have recently viewed.
Fair use
An exception to copyright law that provides for a limited set of circumstances where others can use copyrighted material without first obtaining permission.
Zombies
An infected and compromised computer that is under the external control of a hacker, usually without the knowledge of the computer's owner.
Cyberbullying
An online form of aggression that involves repeated hostile behavior with intent to harm another individual.
Disk defragmentation
An optimization utility that will reorganize files and fragments to place related ones nearer to each other.
Countermeasure
Any step you take to ward off a threat.
Threat
Anything that can cause harm
Partitioning
Dividing a hard drive into multiple sections.
Pretexting
Gaining someone's trust by pretending you are someone else.
Hacktivism
Hacking with a social or political agenda
Massive Open Online Course (MOOC)
Huge online courses offered for free by a variety of universities.
Risk Assessment
Identifying and examining possible threats to a computer system.
Threads
In a forum, a topic that contains related posts.
Hacker
In the negative sense, this term refers to an individual who uses a computer and/or network to commit a variety of crimes, such as creating viruses and disrupting computer networks.
Cyberwarfare
Large-scale hacking conducted by countries, terrorist organizations, and large, independent hacking groups.
Phising
Luring individuals into entering personal information into a website controlled by a hacker.
Spyware
Malware that reports activity on your computer to another party.
Botnets
Massive networks of zombies that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
.docx
Micosoft word
.accdb
Microsoft Access
.xlsx
Microsoft excel
.pptx
Microsoft powerpoint
Flaming
Online social interactions that exhibit anger and/or insults
Intellectual property
Products of the mind such as ideas, designs, and expressions of creativity that may not have any physical form.
Utilities
Programs that enhance or extend the operating system's capabilities or offer new features not provided by the operating system itself.
Security software
Programs that help keep you, your computer, and your personal information safe from a variety of threats.
MMORPGs
Stands for "massively multiplayer online role-playing game" and lets millions of players connect to various servers to team up with other players in very large virtual worlds.
Empathy
The ability to recognize, understand, and share the feelings of others.
Instant messaging (IM)
The act of having an online, text-based conversation with one or more individuals.
Data mining
The discovery of new patterns or relationships between data.
Root directory
The location on a drive that is outside of any folders or directors.
Files
The most fundamental component of storage that users interact with. A file can contain the instructions of a computer program or the data that you care to store.
File compression
The process of making a file smaller than its original size.
Formatting
The process of preparing a storage device for use by an operating system.
Encryption
The process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Netiquette
The set of online behaviors that are considered polite and proper.
Virtualization software
The software that allows you to run a virtual machine.
Cybercrimes
The use of a computer and/or network to commit a variety of crimes, such as creating viruses or disrupting networks.
Data analytics
The use of modeling software and statistics to extract knowledge from large volumes of data.
file hierarchy
The way a computer organizes files, consisting of drives, folders, and files.
File system
The way in which the operating system views and manages the space on a storage device.
Downloaded
To receive data
Uploaded
To send data
Voice over Internet Protocol (VoIP)
Translates analog voice signals into digital data and uses the Internet to transport the data; can connect to telephone networks and digital sources such as PCs.
Parental control
Utilities that allow parents to set a variety of limits on their children's Internet usage.
Cloud backup
Utility software that creates automated backups to an online account.
Real-time communication
When messages and conversations between two or more people occur instantaneously.
.exe
Windows executable file
Expert system
a type of information system that performs analytical tasks traditionally done by a human
adobe pdf document
.jpg , .png , .gif
image files
.mp3 , .m4a
music files
Ethics
the philosophical study of morality
.mp4 , .avi , .mov
video files