SlideShare a Scribd company logo
1 of 3
Download to read offline
COMPUTER VOCABULARY
Match the following concepts with their corresponding definitions. Write the number you deem more
appropriate in the right column.
1. Adware
It is a small piece of information on the times and dates you have visited
web sites. A web server can temporarily store this information within your
browser. The main purpose of cookies is to identify users and possibly
prepare customized web pages for them.
2. Application Frequently asked questions
3. E-mail
A program or tool such as Internet Explorer or Mozilla Firefox that
enables you to browse or surf the World Wide Web and view internet
sites.
4. Bug
A particular kind of lettering (for example: Arial, Bookman, Times New
Roman).
5. Cache
It is any program designed to perform a specific function directly for the
user. OpenOffice Writer, Gimp, Windows Media Player are examples of
application programs
6. Cookies
A software application which displays unwanted pop-up advertisements
on your computer while in use. Adware is often installed on your
computer at the same time as free software or shareware.
7. Crash
A defect or fault in a computer program that prevents it from working
correctly. Bugs are caused by mistakes or errors made by the people who
write the program.
8. Cursor
In computing, it is what happens when a program, or the entire operating
system, unexpectedly stops working.
9. Driver
A blinking symbol on the screen that shows where any new text will next
be entered.
10. Home Page Business done over the internet or any internet-based network.
11. Browser
Electronic mail: messages sent from one computer to another over the
Internet.
Page 1 / 3
12. FAQ
A sort of fast memory used for temporary storage of recently accessed
web pages, which enables the browser to display them more quickly on
the next visit.
13. Hardware
Specialized hardware or software designed to prevent unrestricted or
unauthorized access into or out of a computer or network.
14. Font
A special program which enables a computer to work with a particular
piece of hardware such as a printer.
15. Firewall
The physical equipment or touchable parts of a computer system, the CPU
(central processing unit), the monitor, the keyboard, the mouse, the
external speakers, the scanner, the printer, etc.
16. Hit A visit to a website.
17. E-business
The main page or opening page that appears when you visit a web site. It
usually contains links to the other pages.
18. Login
Unwanted, irrelevant or inappropriate e-mail messages, especially
commercial advertising. Also referred to as "junk e-mail".
19. Portal
A device that enables a computer to send and receive information over a
telephone line. You need a modem to connect to the Internet, to send
email and to fax.
20. Program
Network etiquette: a set of informal rules defining proper behaviour on the
Internet.
21. Modem
A website that acts as a gateway or entry point to the internet (for
example, Yahoo). Typically, a portal offers a search engine and links to
other sites grouped into categories, as well as news or other services.
22. Netiquette
A sequence of instructions that a computer can interpret and execute in
order to do a particular job. Programs are collectively referred to as
"software".
23. Provider
World Wide Web: A hypertext information system consisting of a
network of web pages which runs on the Internet and can be accessed with
a browser.
Page 2 / 3
24. Scanner
It is a malicious self-replicating program that spreads by inserting copies
of itself into other executable code or documents, and whose sole intent is
to cause problems on a computer. It acts in a way similar to a biological
virus, and the infected file is called a host.
25. Spam
A piece of hardware, or peripheral device, used to scan a document and
create a digital copy.
26. Spyware Process by which a user enters a name and password to access a computer.
27. Trojan
Software that collects information, without your knowledge, about your
web-surfing. habits and uses it for marketing purposes.
Very often contained in free downloads or shareware programs.
28.
Videoconference
What you see is what you get. (pronounced 'wizzy-wig'). A WYSIWYG
application enables you to see on the screen exactly what will appear
when the document is printed.
29. Virus
It is a computer program that is hidden in a useful software application
and actually used to gain access to your computer. It then performs
malicious actions such as displaying messages or erasing files. Trojans
may be found in a hacked legitimate program or in free software.
30. WYSIWYG
Interactive, audiovisual meeting between two or more people in different
geographic locations using two-way video technology.
31. WWW Company that provides access to the Internet.
32. Worm
To zip a file is to compress it so that it occupies less space in storage and
can be transferred quickly over the Internet.
33. Zip
It is a self-replicating computer program, similar to a computer virus. It
infects additional computers (typically by making use of network
connections), often clogging networks and information systems as it
spreads.
Page 3 / 3

More Related Content

What's hot

List of Malwares
List of MalwaresList of Malwares
List of MalwaresVishalya Dulam
Β 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015fidel barrios
Β 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
Β 
Malware
MalwareMalware
MalwareTuhin_Das
Β 
Virus
VirusVirus
VirusCHITRA S
Β 
Ppt123
Ppt123Ppt123
Ppt123Faiz Khan
Β 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
Β 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
Β 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
Β 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1Sameep Sood
Β 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware QuizPEC
Β 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its typesJatin Kumar
Β 
Malware and security
Malware and securityMalware and security
Malware and securityGurbakash Phonsa
Β 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
Β 
Types of malware
Types of malwareTypes of malware
Types of malwaretechexpert2345
Β 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureMargus Meigo
Β 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
Β 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
Β 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your ComputerBikashPayeng
Β 

What's hot (20)

List of Malwares
List of MalwaresList of Malwares
List of Malwares
Β 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
Β 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Β 
Malware
MalwareMalware
Malware
Β 
Virus
VirusVirus
Virus
Β 
Ppt123
Ppt123Ppt123
Ppt123
Β 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
Β 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
Β 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
Β 
Virus presentation1
Virus presentation1Virus presentation1
Virus presentation1
Β 
Virus Spyware Quiz
Virus Spyware QuizVirus Spyware Quiz
Virus Spyware Quiz
Β 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Β 
Malware and security
Malware and securityMalware and security
Malware and security
Β 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
Β 
Types of malware
Types of malwareTypes of malware
Types of malware
Β 
Slicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecureSlicksheet best practicesforkeepingyourhomenetworksecure
Slicksheet best practicesforkeepingyourhomenetworksecure
Β 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
Β 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
Β 
You Got To Protect Your Computer
You Got To Protect Your ComputerYou Got To Protect Your Computer
You Got To Protect Your Computer
Β 
Computer security
Computer securityComputer security
Computer security
Β 

Similar to Vocabulary link - Computers

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
Β 
Internet security
Internet securityInternet security
Internet securityat1211
Β 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
Β 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computerRodz Tech
Β 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crimeQondileRamokgadi
Β 
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyLisleySebumpan
Β 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
Β 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
Β 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
Β 
Information of Virus
Information of VirusInformation of Virus
Information of Virusjazz_306
Β 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
Β 
Digital literacy review
Digital literacy reviewDigital literacy review
Digital literacy reviewshemwilliams
Β 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
Β 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
Β 

Similar to Vocabulary link - Computers (20)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
Β 
Internet security
Internet securityInternet security
Internet security
Β 
Malware
MalwareMalware
Malware
Β 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
Β 
Lesson 01 introduction to computer
Lesson 01   introduction to computerLesson 01   introduction to computer
Lesson 01 introduction to computer
Β 
Computer crimes
Computer crimesComputer crimes
Computer crimes
Β 
Spyware
SpywareSpyware
Spyware
Β 
Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
Β 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
Β 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
Β 
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyyComputer-Systems.pptx-hhh-yyyy-wwww+yyyy
Computer-Systems.pptx-hhh-yyyy-wwww+yyyy
Β 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
Β 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Β 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
Β 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
Β 
Information of Virus
Information of VirusInformation of Virus
Information of Virus
Β 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
Β 
Digital literacy review
Digital literacy reviewDigital literacy review
Digital literacy review
Β 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
Β 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Β 

More from mospetelos

Principado de asturias
Principado de asturiasPrincipado de asturias
Principado de asturiasmospetelos
Β 
Lesson plan wind energy. Subject: History. Spainsh team.
Lesson plan  wind energy. Subject: History. Spainsh team.Lesson plan  wind energy. Subject: History. Spainsh team.
Lesson plan wind energy. Subject: History. Spainsh team.mospetelos
Β 
Lesson plan about "no impact project". Subject: Science. Spanish team.
Lesson plan about "no impact project". Subject: Science. Spanish team. Lesson plan about "no impact project". Subject: Science. Spanish team.
Lesson plan about "no impact project". Subject: Science. Spanish team. mospetelos
Β 
Lesson plan about global warming. Subject: English. Spanish team
Lesson plan about global warming. Subject: English. Spanish teamLesson plan about global warming. Subject: English. Spanish team
Lesson plan about global warming. Subject: English. Spanish teammospetelos
Β 
Booklet education system of Spain
Booklet education system of SpainBooklet education system of Spain
Booklet education system of Spainmospetelos
Β 
A normal day at the school by Yaiza Bugallo. Spain
A normal day at the school by Yaiza Bugallo. SpainA normal day at the school by Yaiza Bugallo. Spain
A normal day at the school by Yaiza Bugallo. Spainmospetelos
Β 
A day at school by Andrea Dieguez. Spain
A day at school by Andrea Dieguez. SpainA day at school by Andrea Dieguez. Spain
A day at school by Andrea Dieguez. Spainmospetelos
Β 
A day in my school by Sara and Erea. Spain
A day in my school by Sara and Erea. SpainA day in my school by Sara and Erea. Spain
A day in my school by Sara and Erea. Spainmospetelos
Β 
Spain, presentation about IES de Mos, Galicia, and education system in Galic...
Spain, presentation about  IES de Mos, Galicia, and education system in Galic...Spain, presentation about  IES de Mos, Galicia, and education system in Galic...
Spain, presentation about IES de Mos, Galicia, and education system in Galic...mospetelos
Β 
Galician folk
Galician folkGalician folk
Galician folkmospetelos
Β 

More from mospetelos (10)

Principado de asturias
Principado de asturiasPrincipado de asturias
Principado de asturias
Β 
Lesson plan wind energy. Subject: History. Spainsh team.
Lesson plan  wind energy. Subject: History. Spainsh team.Lesson plan  wind energy. Subject: History. Spainsh team.
Lesson plan wind energy. Subject: History. Spainsh team.
Β 
Lesson plan about "no impact project". Subject: Science. Spanish team.
Lesson plan about "no impact project". Subject: Science. Spanish team. Lesson plan about "no impact project". Subject: Science. Spanish team.
Lesson plan about "no impact project". Subject: Science. Spanish team.
Β 
Lesson plan about global warming. Subject: English. Spanish team
Lesson plan about global warming. Subject: English. Spanish teamLesson plan about global warming. Subject: English. Spanish team
Lesson plan about global warming. Subject: English. Spanish team
Β 
Booklet education system of Spain
Booklet education system of SpainBooklet education system of Spain
Booklet education system of Spain
Β 
A normal day at the school by Yaiza Bugallo. Spain
A normal day at the school by Yaiza Bugallo. SpainA normal day at the school by Yaiza Bugallo. Spain
A normal day at the school by Yaiza Bugallo. Spain
Β 
A day at school by Andrea Dieguez. Spain
A day at school by Andrea Dieguez. SpainA day at school by Andrea Dieguez. Spain
A day at school by Andrea Dieguez. Spain
Β 
A day in my school by Sara and Erea. Spain
A day in my school by Sara and Erea. SpainA day in my school by Sara and Erea. Spain
A day in my school by Sara and Erea. Spain
Β 
Spain, presentation about IES de Mos, Galicia, and education system in Galic...
Spain, presentation about  IES de Mos, Galicia, and education system in Galic...Spain, presentation about  IES de Mos, Galicia, and education system in Galic...
Spain, presentation about IES de Mos, Galicia, and education system in Galic...
Β 
Galician folk
Galician folkGalician folk
Galician folk
Β 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
Β 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
Β 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
Β 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
Β 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
Β 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
Β 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
Β 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
Β 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
Β 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
Β 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
Β 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Β 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
Β 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
Β 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Β 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
Β 
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Tilak Nagar Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”Model Call Girl in Bikash Puri  Delhi reach out to us at πŸ”9953056974πŸ”
Model Call Girl in Bikash Puri Delhi reach out to us at πŸ”9953056974πŸ”
Β 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Β 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
Β 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
Β 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
Β 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
Β 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
Β 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
Β 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
Β 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Β 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
Β 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
Β 

Vocabulary link - Computers

  • 1. COMPUTER VOCABULARY Match the following concepts with their corresponding definitions. Write the number you deem more appropriate in the right column. 1. Adware It is a small piece of information on the times and dates you have visited web sites. A web server can temporarily store this information within your browser. The main purpose of cookies is to identify users and possibly prepare customized web pages for them. 2. Application Frequently asked questions 3. E-mail A program or tool such as Internet Explorer or Mozilla Firefox that enables you to browse or surf the World Wide Web and view internet sites. 4. Bug A particular kind of lettering (for example: Arial, Bookman, Times New Roman). 5. Cache It is any program designed to perform a specific function directly for the user. OpenOffice Writer, Gimp, Windows Media Player are examples of application programs 6. Cookies A software application which displays unwanted pop-up advertisements on your computer while in use. Adware is often installed on your computer at the same time as free software or shareware. 7. Crash A defect or fault in a computer program that prevents it from working correctly. Bugs are caused by mistakes or errors made by the people who write the program. 8. Cursor In computing, it is what happens when a program, or the entire operating system, unexpectedly stops working. 9. Driver A blinking symbol on the screen that shows where any new text will next be entered. 10. Home Page Business done over the internet or any internet-based network. 11. Browser Electronic mail: messages sent from one computer to another over the Internet. Page 1 / 3
  • 2. 12. FAQ A sort of fast memory used for temporary storage of recently accessed web pages, which enables the browser to display them more quickly on the next visit. 13. Hardware Specialized hardware or software designed to prevent unrestricted or unauthorized access into or out of a computer or network. 14. Font A special program which enables a computer to work with a particular piece of hardware such as a printer. 15. Firewall The physical equipment or touchable parts of a computer system, the CPU (central processing unit), the monitor, the keyboard, the mouse, the external speakers, the scanner, the printer, etc. 16. Hit A visit to a website. 17. E-business The main page or opening page that appears when you visit a web site. It usually contains links to the other pages. 18. Login Unwanted, irrelevant or inappropriate e-mail messages, especially commercial advertising. Also referred to as "junk e-mail". 19. Portal A device that enables a computer to send and receive information over a telephone line. You need a modem to connect to the Internet, to send email and to fax. 20. Program Network etiquette: a set of informal rules defining proper behaviour on the Internet. 21. Modem A website that acts as a gateway or entry point to the internet (for example, Yahoo). Typically, a portal offers a search engine and links to other sites grouped into categories, as well as news or other services. 22. Netiquette A sequence of instructions that a computer can interpret and execute in order to do a particular job. Programs are collectively referred to as "software". 23. Provider World Wide Web: A hypertext information system consisting of a network of web pages which runs on the Internet and can be accessed with a browser. Page 2 / 3
  • 3. 24. Scanner It is a malicious self-replicating program that spreads by inserting copies of itself into other executable code or documents, and whose sole intent is to cause problems on a computer. It acts in a way similar to a biological virus, and the infected file is called a host. 25. Spam A piece of hardware, or peripheral device, used to scan a document and create a digital copy. 26. Spyware Process by which a user enters a name and password to access a computer. 27. Trojan Software that collects information, without your knowledge, about your web-surfing. habits and uses it for marketing purposes. Very often contained in free downloads or shareware programs. 28. Videoconference What you see is what you get. (pronounced 'wizzy-wig'). A WYSIWYG application enables you to see on the screen exactly what will appear when the document is printed. 29. Virus It is a computer program that is hidden in a useful software application and actually used to gain access to your computer. It then performs malicious actions such as displaying messages or erasing files. Trojans may be found in a hacked legitimate program or in free software. 30. WYSIWYG Interactive, audiovisual meeting between two or more people in different geographic locations using two-way video technology. 31. WWW Company that provides access to the Internet. 32. Worm To zip a file is to compress it so that it occupies less space in storage and can be transferred quickly over the Internet. 33. Zip It is a self-replicating computer program, similar to a computer virus. It infects additional computers (typically by making use of network connections), often clogging networks and information systems as it spreads. Page 3 / 3