1. PROCESS OF LOCATING THE NONCONTIGUOUS
FRAGMENTS OF DATA INTO WHICH A
COMPUTER FILE MAY BE DIVIDED
AS IT IS STORED ON A HARD DISK, AND
REARRANGING THE FRAGMENTS AND RESTORING
THEM INTO FEWER FRAGMENTS OR INTO THE
WHOLE FILE.
3. TO REQUEST CONFIDENTIAL INFORMATION OVER
THE INTERNET OR
BY TELEPHONE UNDER FALSE PRETENSES IN ORDER
TO FRAUDULENTLY OBTAIN CREDIT CARD NUMBERS,
PASSWORDS, OR OTHER PERSONAL DATA.
4. REFERS TO THE COPYING AND
ARCHIVING OF COMPUTER DATA
SO IT MAY BE USED TO RESTORE THE
ORIGINAL AFTER A DATA LOSS EVENT.
5. AN INDIVIDUAL WHO USES COMPUTER,
NETWORKING
OR OTHER SKILLS TO OVERCOME A
TECHNICAL PROBLEM.
6. TYPE OF UTILITY USED FOR
SCANNING AND
REMOVING VIRUSES FROM YOUR
COMPUTER.
7. TO PREPARE THE CHOSEN PARTITION
ON THE DRIVE TO BE USED BY
AN OPERATING SYSTEM BY DELETING
ALL OF THE DATA1 AND SETTING UP A
FILE SYSTEM.
8. MALICIOUS LITTLE PROGRAMS CAN
CREATE FILES, MOVE FILES, ERASE FILES,
CONSUME YOUR COMPUTER'S MEMORY,
AND CAUSE YOUR COMPUTER NOT TO
FUNCTION CORRECTLY.
9. RELATIVELY MINOR RELEASE OR VERSION
UPGRADE TO
AN EXISTING SOFTWARE PRODUCT THAT
ADDS MINOR FEATURES OR CORRECTS
BUGS.
11. A SOFTWARE THAT IS INSTALLED ON A
COMPUTING DEVICE
WITHOUT THE USER'S KNOWLEDGE OR
PERMISSION.
Editor's Notes
BOOST
clever or expert programmer
clever or expert programmer
clever or expert programmer
clever or expert programmer
Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.