SlideShare a Scribd company logo
1 of 12
PROCESS OF LOCATING THE NONCONTIGUOUS
FRAGMENTS OF DATA INTO WHICH A
COMPUTER FILE MAY BE DIVIDED
AS IT IS STORED ON A HARD DISK, AND
REARRANGING THE FRAGMENTS AND RESTORING
THEM INTO FEWER FRAGMENTS OR INTO THE
WHOLE FILE.
DETERIORATION OF COMPUTER DATA
AS A RESULT OF SOME EXTERNAL
AGENT
TO REQUEST CONFIDENTIAL INFORMATION OVER
THE INTERNET OR
BY TELEPHONE UNDER FALSE PRETENSES IN ORDER
TO FRAUDULENTLY OBTAIN CREDIT CARD NUMBERS,
PASSWORDS, OR OTHER PERSONAL DATA.
REFERS TO THE COPYING AND
ARCHIVING OF COMPUTER DATA
SO IT MAY BE USED TO RESTORE THE
ORIGINAL AFTER A DATA LOSS EVENT.
AN INDIVIDUAL WHO USES COMPUTER,
NETWORKING
OR OTHER SKILLS TO OVERCOME A
TECHNICAL PROBLEM.
TYPE OF UTILITY USED FOR
SCANNING AND
REMOVING VIRUSES FROM YOUR
COMPUTER.
TO PREPARE THE CHOSEN PARTITION
ON THE DRIVE TO BE USED BY
AN OPERATING SYSTEM BY DELETING
ALL OF THE DATA1 AND SETTING UP A
FILE SYSTEM.
MALICIOUS LITTLE PROGRAMS CAN
CREATE FILES, MOVE FILES, ERASE FILES,
CONSUME YOUR COMPUTER'S MEMORY,
AND CAUSE YOUR COMPUTER NOT TO
FUNCTION CORRECTLY.
RELATIVELY MINOR RELEASE OR VERSION
UPGRADE TO
AN EXISTING SOFTWARE PRODUCT THAT
ADDS MINOR FEATURES OR CORRECTS
BUGS.
ILLEGAL COPYING, DISTRIBUTION,
OR USE OF SOFTWARE
A SOFTWARE THAT IS INSTALLED ON A
COMPUTING DEVICE
WITHOUT THE USER'S KNOWLEDGE OR
PERMISSION.
Troubleshooting vocab

More Related Content

Similar to Troubleshooting vocab

computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfGnanavi2
 
It security
It securityIt security
It securityavi2607
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensicsRahul Baghla
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics SlidesVarun Sehgal
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensicsLalit Garg
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesSTO STRATEGY
 

Similar to Troubleshooting vocab (20)

Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
computerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdfcomputerforensics-140212060522-phpapp02.pdf
computerforensics-140212060522-phpapp02.pdf
 
It security
It securityIt security
It security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Computer +forensics
Computer +forensicsComputer +forensics
Computer +forensics
 
Information systems
Information systemsInformation systems
Information systems
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Computer security
Computer securityComputer security
Computer security
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer forensics Slides
Computer forensics SlidesComputer forensics Slides
Computer forensics Slides
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Computer forensics
Computer  forensicsComputer  forensics
Computer forensics
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Comparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniquesComparison of android and black berry forensic techniques
Comparison of android and black berry forensic techniques
 

More from Frya Lora

Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010Frya Lora
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unitFrya Lora
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012Frya Lora
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautionsFrya Lora
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsFrya Lora
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computersFrya Lora
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system errorFrya Lora
 
Network cable
Network cableNetwork cable
Network cableFrya Lora
 
Functions and formulas
Functions and formulasFunctions and formulas
Functions and formulasFrya Lora
 
Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpointsFrya Lora
 

More from Frya Lora (20)

GPU
GPUGPU
GPU
 
Introducing ppt 2010
Introducing ppt 2010Introducing ppt 2010
Introducing ppt 2010
 
Chapter04 system unit
Chapter04 system unitChapter04 system unit
Chapter04 system unit
 
Chapter01discovering computers2012
Chapter01discovering computers2012Chapter01discovering computers2012
Chapter01discovering computers2012
 
Mod4 l2.2
Mod4 l2.2Mod4 l2.2
Mod4 l2.2
 
Mod4 l2.1
Mod4 l2.1Mod4 l2.1
Mod4 l2.1
 
Lo1.1 safety precautions
Lo1.1 safety precautionsLo1.1 safety precautions
Lo1.1 safety precautions
 
Lo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systemsLo1.3 diagnosing computer systems
Lo1.3 diagnosing computer systems
 
Troubleshoot beeping computers
Troubleshoot beeping computersTroubleshoot beeping computers
Troubleshoot beeping computers
 
Lo1.2 types of computer system error
Lo1.2 types of computer system errorLo1.2 types of computer system error
Lo1.2 types of computer system error
 
Port types
Port typesPort types
Port types
 
Ergonomics
ErgonomicsErgonomics
Ergonomics
 
Network cable
Network cableNetwork cable
Network cable
 
Functions and formulas
Functions and formulasFunctions and formulas
Functions and formulas
 
2.4
2.42.4
2.4
 
2.3
2.32.3
2.3
 
Uses of powerpoints
Uses of powerpointsUses of powerpoints
Uses of powerpoints
 
2.2
2.22.2
2.2
 
2.1
2.12.1
2.1
 
5 s
5 s5 s
5 s
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 

Troubleshooting vocab

  • 1. PROCESS OF LOCATING THE NONCONTIGUOUS FRAGMENTS OF DATA INTO WHICH A COMPUTER FILE MAY BE DIVIDED AS IT IS STORED ON A HARD DISK, AND REARRANGING THE FRAGMENTS AND RESTORING THEM INTO FEWER FRAGMENTS OR INTO THE WHOLE FILE.
  • 2. DETERIORATION OF COMPUTER DATA AS A RESULT OF SOME EXTERNAL AGENT
  • 3. TO REQUEST CONFIDENTIAL INFORMATION OVER THE INTERNET OR BY TELEPHONE UNDER FALSE PRETENSES IN ORDER TO FRAUDULENTLY OBTAIN CREDIT CARD NUMBERS, PASSWORDS, OR OTHER PERSONAL DATA.
  • 4. REFERS TO THE COPYING AND ARCHIVING OF COMPUTER DATA SO IT MAY BE USED TO RESTORE THE ORIGINAL AFTER A DATA LOSS EVENT.
  • 5. AN INDIVIDUAL WHO USES COMPUTER, NETWORKING OR OTHER SKILLS TO OVERCOME A TECHNICAL PROBLEM.
  • 6. TYPE OF UTILITY USED FOR SCANNING AND REMOVING VIRUSES FROM YOUR COMPUTER.
  • 7. TO PREPARE THE CHOSEN PARTITION ON THE DRIVE TO BE USED BY AN OPERATING SYSTEM BY DELETING ALL OF THE DATA1 AND SETTING UP A FILE SYSTEM.
  • 8. MALICIOUS LITTLE PROGRAMS CAN CREATE FILES, MOVE FILES, ERASE FILES, CONSUME YOUR COMPUTER'S MEMORY, AND CAUSE YOUR COMPUTER NOT TO FUNCTION CORRECTLY.
  • 9. RELATIVELY MINOR RELEASE OR VERSION UPGRADE TO AN EXISTING SOFTWARE PRODUCT THAT ADDS MINOR FEATURES OR CORRECTS BUGS.
  • 11. A SOFTWARE THAT IS INSTALLED ON A COMPUTING DEVICE WITHOUT THE USER'S KNOWLEDGE OR PERMISSION.

Editor's Notes

  1. BOOST
  2. clever or expert programmer
  3. clever or expert programmer
  4. clever or expert programmer
  5. clever or expert programmer
  6. Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.